diff --git a/windows/deploy/TOC.md b/windows/deploy/TOC.md index 19c548352f..67bd762b59 100644 --- a/windows/deploy/TOC.md +++ b/windows/deploy/TOC.md @@ -1 +1,136 @@ -#[Deploy](placeholder.md) \ No newline at end of file +# [Deploy Windows 10](deploy-windows-10.md) +## [Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) +## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) +## [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md) +### [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) +#### [Key features in MDT 2013 Update 1](key-features-in-mdt-2013.md) +#### [MDT 2013 Update 1 Lite Touch components](mdt-2013-lite-touch-components.md) +#### [Prepare for deployment with MDT 2013 Update 1](prepare-for-deployment-with-mdt-2013.md) +### [Create a Windows 10 reference image](create-a-windows-81-reference-image.md) +### [Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) +### [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) +### [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) +### [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) +### [Configure MDT settings](configure-mdt-2013-settings.md) +#### [Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) +#### [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) +#### [Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) +#### [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) +#### [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) +#### [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) +#### [Use web services in MDT](use-web-services-in-mdt-2013.md) +#### [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) +## [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-81-with-system-center-2012-r2-configuration-manager.md) +### [Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) +### [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) +### [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) +### [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) +### [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) +### [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) +### [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) +### [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-operating-system-configuration-for-windows-81-deployment-with-configuration-manager.md) +### [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) +### [Monitor the Windows 10 deployment with Configuration Manager](monitor-the-windows-81-deployment-with-configuration-manager.md) +### [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) +### [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) +## [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) +## [Upgrade to Windows 10 with System Center Configuration Manager](upgrade-to-windows-10-with-system-center-configuraton-manager.md) +## [Windows 10 edition upgrade](windows-10-edition-upgrades.md) +## [Deploy Windows To Go in your organization](deploy-windows-to-go-in-your-organization-small-scenario.md) +## [Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md) +## [Sideload apps in Windows 10](sideload-apps-in-windows-10.md) +## [Volume Activation [client]](volume-activation-for-windows-81-client.md) +### [Plan for volume activation [client]](plan-for-volume-activation-client.md) +### [Activate using Key Management Service [client]](activate-using-key-management-service-client.md) +### [Activate using Active Directory-based activation [client]](activate-using-active-directory-based-activation-client.md) +### [Activate clients running Windows 10](activate-clients-running-windows-81-client.md) +### [Monitor activation [client]](monitor-activation-client.md) +### [Use the Volume Activation Management Tool [client]](use-the-volume-activation-management-tool-client.md) +### [Appendix: Information sent to Microsoft during activation [client]](appendix-information-sent-to-microsoft-during-activation-client.md) +## [Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) +### [Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) +### [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md) +### [Volume Activation Management Tool (VAMT) Technical Reference](volume-activation-management-tool--vamt--overview-vamt-30-win8.md) +#### [Introduction to VAMT](introduction-to-vamtvamt-30-win8.md) +#### [Active Directory-Based Activation Overview](active-directory-based-activation-overview.md) +#### [Install and Configure VAMT](install-and-configure-vamt-vamt-30-win8.md) +##### [VAMT Requirements](vamt-requirements-vamt-30-win8.md) +##### [Install VAMT](install-vamt-vamt-30-win8.md) +##### [Configure Client Computers](configure-client-computers-vamt-30-win8.md) +#### [Add and Manage Products](add-and-manage-products-vamt-30-win8.md) +##### [Add and Remove Computers](add-and-remove-computers-vamt-30-win8.md) +##### [Update Product Status](update-product-status-vamt-30-win8.md) +##### [Remove Products](remove-products-vamt-30-win8.md) +#### [Manage Product Keys](manage-product-keys-vamt-30-win8.md) +##### [Add and Remove a Product Key](add-and-remove-a-product-key-vamt-30-win8.md) +##### [Install a Product Key](install-a-product-key-vamt-30-win8.md) +##### [Install a KMS Client Key](install-a-kms-client-key-vamt-30-win8.md) +#### [Manage Activations](manage-activations-vamt-30-win8.md) +##### [Perform Online Activation](perform-online-activation-vamt-30-win8.md) +##### [Perform Proxy Activation](perform-proxy-activation-vamt-30-win8.md) +##### [Perform KMS Activation](perform-kms-activation-vamt-30-win8.md) +##### [Perform Local Reactivation](perform-local-reactivation-vamt-30-win8.md) +##### [Activate an Active Directory Forest Online](activate-an-active-directory-forest-online.md) +##### [Activate by Proxy an Active Directory Forest](activate-by-proxy-an-active-directory-forest.md) +#### [Manage VAMT Data](manage-vamt-data-vamt-30-win8.md) +##### [Import and Export VAMT Data](import-and-export-vamt-data-vamt-30-win8.md) +##### [Use VAMT in Windows PowerShell](use-vamt-in-windows-powershell.md) +#### [VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md) +##### [Scenario 1: Online Activation](scenario-1-online-activation-vamt-30-win8.md) +##### [Scenario 2: Proxy Activation](scenario-2-proxy-activation-vamt-30-win8.md) +##### [Scenario 3: KMS Client Activation](scenario-3-kms-client-activation-vamt-30-win8.md) +#### [VAMT Known Issues](vamt-known-issues-vamt-30-win8.md) +### [User State Migration Tool (USMT) Technical Reference](user-state-migration-tool--usmt--technical-reference.md) +#### [User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) +##### [User State Migration Tool (USMT) Overview](user-state-migration-tool--usmt--overview.md) +##### [Getting Started with the User State Migration Tool (USMT)](getting-started-with-the-user-state-migration-tool--usmt-.md) +##### [Windows Upgrade and Migration Considerations](windows-upgrade-and-migration-considerations-win8.md) +#### [User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md) +##### [Exclude Files and Settings](exclude-files-and-settings-usmt.md) +##### [Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md) +##### [Include Files and Settings](include-files-and-settings-usmt.md) +##### [Migrate Application Settings](migrate-application-settings.md) +##### [Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md) +##### [Migrate User Accounts](migrate-user-accounts-usmt.md) +##### [Reroute Files and Settings](reroute-files-and-settings-usmt.md) +##### [Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md) +#### [User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) +##### [Common Issues](common-issues-usmt-win8.md) +##### [Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md) +##### [Log Files](log-files-usmt-win7-usmt-win8.md) +##### [Return Codes](return-codes-usmt-win8.md) +##### [USMT Resources](usmt-resources-usmt-win8.md) +#### [User State Migration Toolkit (USMT) Reference](user-state-migration-toolkit--usmt--reference.md) +##### [USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md) +##### [USMT Best Practices](usmt-best-practices-usmt-win7-usmt-win8.md) +##### [How USMT Works](how-usmt-works-usmt-win7-usmt-win8.md) +##### [Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) +###### [Common Migration Scenarios](common-migration-scenarios-usmt-win7-usmt-win8.md) +###### [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) +###### [Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md) +####### [Migration Store Types Overview](migration-store-types-overview.md) +####### [Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md) +####### [Hard-Link Migration Store](hard-link-migration-store-usmt-win8.md) +####### [Migration Store Encryption](migration-store-encryption-usmt-win8.md) +###### [Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md) +####### [Identify Users](identify-users-usmt-win7-usmt-win8.md) +####### [Identify Applications Settings](identify-applications-settings-usmt-win7-usmt-win8.md) +####### [Identify Operating System Settings](identify-operating-system-settings-usmt-win7-usmt-win8.md) +####### [Identify File Types, Files, and Folders](identify-file-types-files-and-folders-usmt-win8.md) +###### [Test Your Migration](test-your-migration-usmt-win7-usmt-win8.md) +##### [User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md) +###### [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) +###### [LoadState Syntax](loadstate-syntax-usmt-win7-usmt-win8.md) +###### [UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md) +##### [USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) +###### [Understanding Migration XML Files](understanding-migration-xml-files.md) +###### [Config.xml File](configxml-file-usmt-win7-usmt-win8.md) +###### [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) +###### [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md) +###### [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) +###### [General Conventions](general-conventions-usmt-win7-usmt-win8.md) +###### [XML File Requirements](xml-file-requirements.md) +###### [Recognized Environment Variables](recognized-environment-variables-usmt-win7-usmt-win8.md) +###### [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) +##### [Offline Migration Reference](offline-migration-reference.md) + diff --git a/windows/deploy/activate-an-active-directory-forest-online.md b/windows/deploy/activate-an-active-directory-forest-online.md new file mode 100644 index 0000000000..3180b988fe --- /dev/null +++ b/windows/deploy/activate-an-active-directory-forest-online.md @@ -0,0 +1,69 @@ +--- +title: Activate an Active Directory Forest Online (Windows 10) +description: Activate an Active Directory Forest Online +ms.assetid: 9b5bc193-799b-4aa5-9d3e-0e495f7195d3 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Activate an Active Directory Forest Online + + +You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate an Active Directory (AD) forest over the Internet. ADBA enables certain products to inherit activation from the domain. + +**Important**   +ADBA is only applicable to Generic Volume License Keys (GVLKs) and KMS Host keys (CSVLKs). To use ADBA, one or more KMS Host keys (CSVLKs) must be installed on the AD forest, and client keys (GVLKs) must be installed on the client products. + +  + +## Requirements + + +Before performing online activation, ensure that the network and the VAMT installation meet the following requirements: + +- VAMT is installed on a host computer that has Internet access. + +- VAMT has administrative permissions to the Active Directory domain. + +- The KMS Host key (CSVLK) you intend to use is added to VAMT in the **Product Keys** node. + +### To Perform an Online Active Directory Forest Activation + +1. Open VAMT. + +2. In the left-side pane, click the **Active Directory-Based Activation** node. + +3. In the right-side **Actions** pane, click **Online activate forest** to open the **Install Product Key** dialog box. + +4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to apply to the AD forest. + +5. If required, enter a new Active Directory-Based Activation Object name + + **Important**   + If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed. + +   + +6. Click **Install Key**. + +7. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. + +The activated object and the date that is was created appear in the **Active Directory-Based Activation** node in the center pane. + +## Related topics + + +[Scenario 1: Online Activation](scenario-1-online-activation-vamt-30-win8.md) + +[Add and Remove Computers](add-and-remove-computers-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/activate-by-proxy-an-active-directory-forest.md b/windows/deploy/activate-by-proxy-an-active-directory-forest.md new file mode 100644 index 0000000000..60a3ce5a9a --- /dev/null +++ b/windows/deploy/activate-by-proxy-an-active-directory-forest.md @@ -0,0 +1,88 @@ +--- +title: Activate by Proxy an Active Directory Forest (Windows 10) +description: Activate by Proxy an Active Directory Forest +ms.assetid: 6475fc87-a6f7-4fa8-b0aa-de19f2dea7e5 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Activate by Proxy an Active Directory Forest + + +You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate by proxy an Active Directory (AD) forest for an isolated workgroup that does not have Internet access. ADBA enables certain volume products to inherit activation from the domain. + +**Important**   +ADBA is only applicable to Generic Volume License Keys (GVLKs) and KMS Host key (CSVLK). To use ADBA, one or more KMS Host keys (CSVLK) must be installed on the AD forest, and client keys (GVLKs) must be installed on the client products. + +  + +In a typical proxy-activation scenario, the VAMT host computer distributes a product key to one or more client computers and collects the installation ID (IID) from each computer. The VAMT host computer sends the IIDs to Microsoft on behalf of the client computers and obtains the corresponding Confirmation IDs (CIDs). The VAMT host computer then installs the CIDs on the client computer to complete the activation. If you use this activation method, only the VAMT host computer needs to have Internet access. + +**Note**   +For workgroups that are isolated from any larger network, you can still perform an AD forest activation. This requires installing a second instance of VAMT on a computer in the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. You can also activate by proxy a KMS Host key (CSVLK) in the core network if you do not want the host computer to connect to Microsoft over the Internet. + +  + +## Requirements + + +Before performing proxy activation, ensure that the network and the VAMT installation meet the following requirements: + +1. There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you must also have VAMT installed on one of the computers in the workgroup. + +2. VAMT has administrative permissions to the Active Directory domain. + +### To Perform an Active Directory Forest Proxy Activation + +1. Open VAMT. + +2. In the left-side pane, click the **Active Directory-Based Activation** node. + +3. In the right-side **Actions** pane, click **Proxy activate forest** to open the **Install Product Key** dialog box. + +4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to activate. + +5. If you want to rename the ADBA object, enter a new Active Directory-Based Activation Object name. + + **Important**   + If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed. + +   + +6. Enter the name of the file where you want to save the offline installation ID, or browse to the file location and then click **Open**. If you are activating an AD forest in an isolated workgroup, save the .cilx file to a removable media device. + +7. Click **Install Key**. + +8. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. The activated object and the date that it was created appear in the **Active Directory-Based Activation** node in the center pane. + +9. Insert the removable media into the VAMT host that has Internet access. Make sure that you are on the root node, and that the **Volume Activation Management Tool** view is displayed in the center pane. + +10. In the right-side **Actions** pane, click **Acquire confirmation IDs for CILX** to open the **Acquire confirmation IDs for file** dialog box. + +11. In the **Acquire confirmation IDs for file** dialog box, browse to where the .cilx file you exported from the isolated workgroup host computer is located. Select the file, and then click **Open**. VAMT displays an **Acquiring Confirmation IDs** message while it contacts Microsoft and acquires the CIDs. + +12. When the CID collection process is complete, VAMT displays a **Volume Activation Management Tool** message that shows how many confirmation IDs were successfully acquired, and the name of the file to which the IDs were saved. Click **OK** to close the message. + +13. Remove the storage device that contains the .cilx file from the Internet-connected VAMT host computer and insert it into the VAMT host computer in the isolated workgroup. + +14. Open VAMT and then click the **Active Directory-Based Activation** node in the left-side pane. + +15. In the right-side **Actions** pane, click **Apply confirmation ID to Active Directory domain**, browse to the .cilx file and then click **Open**. + +VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. The activated object and the date that it was created appear in the **Active Directory-Based Activation** node in the center pane. + +## Related topics + + +[Add and Remove Computers](add-and-remove-computers-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/activate-clients-running-windows-81-client.md b/windows/deploy/activate-clients-running-windows-81-client.md new file mode 100644 index 0000000000..fc3e722384 --- /dev/null +++ b/windows/deploy/activate-clients-running-windows-81-client.md @@ -0,0 +1,146 @@ +--- +title: Activate clients running Windows 10 (Windows 10) +description: After you have configured Key Management Service (KMS) or Active Directory-based activation on your network, activating a client running Windows 10 is easy. +ms.assetid: 39446e49-ad7c-48dc-9f18-f85a11ded643 +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Activate clients running Windows 10 + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +After you have configured Key Management Service (KMS) or Active Directory-based activation on your network, activating a client running Windows 10 is easy. If the computer has been configured with a Generic Volume License Key (GVLK), neither IT nor the user need take any action. It just works. + +Enterprise edition images and installation media should already be configured with the GVLK. When the client computer starts, the Licensing service examines the current licensing condition of the computer. If activation or reactivation is required, the following sequence occurs: + +1. If the computer is a member of a domain, it asks a domain controller for a volume activation object. If Active Directory-based activation is configured, the domain controller returns the object. If the object matches the edition of the software that is installed and the computer has a matching GVLK, the computer is activated (or reactivated), and it will not need to be activated again for 180 days, although the operating system will attempt reactivation at much shorter, regular intervals. + +2. If the computer is not a member of a domain or if the volume activation object is not available, the computer will issue a DNS query to attempt to locate a KMS server. If a KMS server can be contacted, activation occurs if the KMS has a key that matches the computer’s GVLK. + +3. The computer tries to activate against Microsoft servers if it is configured with a MAK. + +If the client is not able to activate itself successfully, it will periodically try again. The frequency of the retry attempts depends on the current licensing state and whether the client computer has been successfully activated in the past. For example, if the client computer had been previously activated by Active Directory-based activation, it will periodically try to contact the domain controller at each restart. + +## How Key Management Service works + + +KMS uses a client–server topology. KMS client computers can locate KMS host computers by using DNS or a static configuration. KMS clients contact the KMS host by using RPCs carried over TCP/IP. + +### Key Management Service activation thresholds + +You can activate physical computers and virtual machines by contacting a KMS host. To qualify for KMS activation, there must be a minimum number of qualifying computers (called the activation threshold). KMS clients will be activated only after this threshold has been met. Each KMS host counts the number of computers that have requested activation until the threshold is met. + +A KMS host responds to each valid activation request from a KMS client with the count of how many computers have already contacted the KMS host for activation. Client computers that receive a count below the activation threshold are not activated. For example, if the first two computers that contact the KMS host are running Windows 10, the first receives an activation count of 1, and the second receives an activation count of 2. If the next computer is a virtual machine on a computer running Windows 10, it receives an activation count of 3, and so on. None of these computers will be activated, because computers running Windows 10, like other client operating system versions, must receive an activation count of 25 or more. + +When KMS clients are waiting for the KMS to reach the activation threshold, they will connect to the KMS host every two hours to get the current activation count. They will be activated when the threshold is met. + +In our example, if the next computer that contacts the KMS host is running Windows Server 2012 R2, it receives an activation count of 4, because activation counts are cumulative. If a computer running Windows Server 2012 R2 receives an activation count that is 5 or more, it is activated. If a computer running Windows 10 receives an activation count of 25 or more, it is activated. + +### Activation count cache + +To track the activation threshold, the KMS host keeps a record of the KMS clients that request activation. The KMS host gives each KMS client a client ID designation, and the KMS host saves each client ID in a table. By default, each activation request remains in the table for up to 30 days. When a client renews its activation, the cached client ID is removed from the table, a new record is created, and the 30day period begins again. If a KMS client computer does not renew its activation within 30 days, the KMS host removes the corresponding client ID from the table and reduces the activation count by one. + +However, the KMS host only caches twice the number of client IDs that are required to meet the activation threshold. Therefore, only the 50 most recent client IDs are kept in the table, and a client ID could be removed much sooner than 30 days. + +The total size of the cache is set by the type of client computer that is attempting to activate. If a KMS host receives activation requests only from servers, the cache will hold only 10 client IDs (twice the required 5). If a client computer running Windows 10 contacts that KMS host, KMS increases the cache size to 50 to accommodate the higher threshold. KMS never reduces the cache size. + +### Key Management Service connectivity + +KMS activation requires TCP/IP connectivity. By default, KMS hosts and clients use DNS to publish and find the KMS. The default settings can be used, which require little or no administrative action, or KMS hosts and client computers can be manually configured based on network configuration and security requirements. + +### Key Management Service activation renewal + +KMS activations are valid for 180 days (the *activation validity interval*). To remain activated, KMS client computers must renew their activation by connecting to the KMS host at least once every 180 days. By default, KMS client computers attempt to renew their activation every 7 days. If KMS activation fails, the client computer retries every two hours. After a client computer’s activation is renewed, the activation validity interval begins again. + +### Publication of the Key Management Service + +The KMS uses service (SRV) resource records in DNS to store and communicate the locations of KMS hosts. KMS hosts use the DNS dynamic update protocol, if available, to publish the KMS service (SRV) resource records. If dynamic update is not available or the KMS host does not have rights to publish the resource records, the DNS records must be published manually, or you must configure client computers to connect to specific KMS hosts. + +### Client discovery of the Key Management Service + +By default, KMS client computers query DNS for KMS information. The first time a KMS client computer queries DNS for KMS information, it randomly chooses a KMS host from the list of service (SRV) resource records that DNS returns. The address of a DNS server that contains the service (SRV) resource records can be listed as a suffixed entry on KMS client computers, which allows one DNS server to advertise the service (SRV) resource records for KMS, and KMS client computers with other primary DNS servers to find it. + +Priority and weight parameters can be added to the DnsDomainPublishList registry value for KMS. Establishing KMS host priority groupings and weighting within each group allows you to specify which KMS host the client computers should try first and balances traffic among multiple KMS hosts. Only Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 provide these priority and weight parameters. + +If the KMS host that a client computer selects does not respond, the KMS client computer removes that KMS host from its list of service (SRV) resource records and randomly selects another KMS host from the list. When a KMS host responds, the KMS client computer caches the name of the KMS host and uses it for subsequent activation and renewal attempts. If the cached KMS host does not respond on a subsequent renewal, the KMS client computer discovers a new KMS host by querying DNS for KMS service (SRV) resource records. + +By default, client computers connect to the KMS host for activation by using anonymous RPCs through TCP port 1688. (You can change the default port.) After establishing a TCP session with the KMS host, the client computer sends a single request packet. The KMS host responds with the activation count. If the count meets or exceeds the activation threshold for that operating system, the client computer is activated and the session is closed. The KMS client computer uses this same process for renewal requests. 250 bytes are used for communication each way. + +### Domain Name System server configuration + +The default KMS automatic publishing feature requires the service (SRV) resource record and support for DNS dynamic update protocol. KMS client computer default behavior and the KMS service (SRV) resource record publishing are supported on a DNS server that is running Microsoft software or any other DNS server that supports service (SRV) resource records (per Internet Engineering Task Force \[IETF\] Request for Comments \[RFC\] 2782) and dynamic updates (per IETF RFC 2136). For example, Berkeley Internet Domain Name versions 8.x and 9.x support service (SRV) resource records and dynamic update. + +The KMS host must be configured so that it has the credentials needed to create and update the following resource records on the DNS servers: service (SRV), IPv4 host (A), and IPv6 host (AAAA), or the records need to be created manually. The recommended solution for giving the KMS host the needed credentials is to create a security group in AD DS, then add all KMS hosts to that group. On a DNS server that is running Microsoft software, ensure that this security group is given full control over the \_VLMCS.\_TCP record in each DNS domain that will contain the KMS service (SRV) resource records. + +### Activating the first Key Management Service host + +KMS hosts on the network need to install a KMS key, and then be activated with Microsoft. Installation of a KMS key enables the KMS on the KMS host. After installing the KMS key, complete the activation of the KMS host by telephone or online. Beyond this initial activation, a KMS host does not communicate any information to Microsoft. KMS keys are only installed on KMS hosts, never on individual KMS client computers. + +### Activating subsequent Key Management Service hosts + +Each KMS key can be installed on up to six KMS hosts. These hosts can be physical computers or virtual machines. After activating a KMS host, the same host can be reactivated up to nine times with the same key. If the organization needs more than six KMS hosts, you can request additional activations for your organization’s KMS key by calling a Microsoft Volume [Licensing Activation Center](http://go.microsoft.com/fwlink/p/?LinkID=618264) to request an exception. + +## How Multiple Activation Key works + + +A MAK is used for one-time activation with Microsoft’s hosted activation services. Each MAK has a predetermined number of allowed activations. This number is based on volume licensing agreements, and it might not match the organization’s exact license count. Each activation that uses a MAK with the Microsoft hosted activation service counts toward the activation limit. + +You can activate computers by using a MAK in two ways: + +- **MAK independent activation**. Each computer independently connects and is activated with Microsoft over the Internet or by telephone. MAK independent activation is best suited to computers within an organization that do not maintain a connection to the corporate network. MAK independent activation is shown in Figure 16. + + ![mak independent activation](images/volumeactivationforwindows81-16.jpg) + + **Figure 16**. MAK independent activation + +- **MAK proxy activation**. MAK proxy activation enables a centralized activation request on behalf of multiple computers with one connection to Microsoft. You configure MAK proxy activation by using the VAMT. MAK proxy activation is appropriate for environments in which security concerns restrict direct access to the Internet or the corporate network. It is also suited for development and test labs that lack this connectivity. MAK proxy activation with the VAMT is shown in Figure 17. + + ![mak proxy activation](images/volumeactivationforwindows81-17.jpg) + + **Figure 17**. MAK proxy activation with the VAMT + +A MAK is recommended for computers that rarely or never connect to the corporate network and for environments in which the number of computers that require activation does not meet the KMS activation threshold. + +You can use a MAK for individual computers or with an image that can be duplicated or installed by using Microsoft deployment solutions. You can also use a MAK on a computer that was originally configured to use KMS activation. This is useful for moving a computer off the core network to a disconnected environment. + +### Multiple Activation Key architecture and activation + +MAK independent activation installs a MAK product key on a client computer. The key instructs that computer to activate itself with Microsoft servers over the Internet. + +In MAK proxy activation, the VAMT installs a MAK product key on a client computer, obtains the installation ID from the target computer, sends the installation ID to Microsoft on behalf of the client, and obtains a confirmation ID. The tool then activates the client computer by installing the confirmation ID. + +## Activating as a standard user + + +Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 do not require administrator privileges for activation, but this change does not allow standard user accounts to remove computers running Windows 7 or Windows Server 2008 R2 from the activated state. An administrator account is still required for other activation- or license-related tasks, such as “rearm.” + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/activate-using-active-directory-based-activation-client.md b/windows/deploy/activate-using-active-directory-based-activation-client.md new file mode 100644 index 0000000000..07fd4d9f30 --- /dev/null +++ b/windows/deploy/activate-using-active-directory-based-activation-client.md @@ -0,0 +1,139 @@ +--- +title: Activate using Active Directory-based activation (Windows 10) +description: Active Directory-based activation is implemented as a role service that relies on AD DS to store activation objects. +ms.assetid: 08cce6b7-7b5b-42cf-b100-66c363a846af +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Activate using Active Directory-based activation + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +Active Directory-based activation is implemented as a role service that relies on AD DS to store activation objects. Active Directory-based activation requires that the forest schema be updated by adprep.exe on a computer running Windows Server 2012 R2 or Windows Server 2012, but after the schema is updated, older domain controllers can still activate clients. + +Any domain-joined computers running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 with a GVLK will be activated automatically and transparently. They will stay activated as long as they remain members of the domain and maintain periodic contact with a domain controller. Activation takes place after the Licensing service starts. When this service starts, the computer contacts AD DS automatically, receives the activation object, and is activated without user intervention. + +To allow computers with GVLKs to activate themselves, use the Volume Activation Tools console in Windows Server 2012 R2 or the VAMT in earlier versions of Windows Server to create an object in the AD DS forest. You create this activation object by submitting a KMS host key to Microsoft, as shown in Figure 10. + +The process proceeds as follows: + +1. Perform one of the following tasks: + + - Install the Volume Activation Services server role on a domain controller running Windows Server 2012 R2, and add a KMS host key by using the Volume Activation Tools Wizard. + + - Extend the domain to the Windows Server 2012 R2 schema level, and add a KMS host key by using the VAMT. + +2. Microsoft verifies the KMS host key, and an activation object is created. + +3. Client computers are activated by receiving the activation object from a domain controller during startup. + +![active directory-based activation flow](images/volumeactivationforwindows81-10.jpg) + +**Figure 10**. The Active Directory-based activation flow + +For environments in which all computers are running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2, and they are joined to a domain, Active Directory-based activation is the best option for activating all client computers and servers, and you may be able to remove any KMS hosts from your environment. + +If an environment will continue to contain earlier volume licensing operating systems and applications or if you have workgroup computers outside the domain, you need to maintain a KMS host to maintain activation status for earlier volume licensing editions of Windows and Office. + +Clients that are activated with Active Directory-based activation will maintain their activated state for up to 180 days since the last contact with the domain, but they will periodically attempt to reactivate before then and at the end of the 180day period. By default, this reactivation event occurs every seven days. + +When a reactivation event occurs, the client queries AD DS for the activation object. Client computers examine the activation object and compare it to the local edition as defined by the GVLK. If the object and GVLK match, reactivation occurs. If the AD DS object cannot be retrieved, client computers use KMS activation. If the computer is removed from the domain, when the computer or the Software Protection service is restarted, the operating system will change the status from activated to not activated, and the computer will try to activate with KMS. + +## Step-by-step configuration: Active Directory-based activation + + +**Note**   +You must be a member of the local Administrators group on all computers mentioned in these steps. You also need to be a member of the Enterprise Administrators group, because setting up Active Directory-based activation changes forest-wide settings. + +  + +To configure Active Directory-based activation on Windows Server 2012 R2, complete the following steps: + +1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller. + +2. Launch Server Manager. + +3. Add the Volume Activation Services role, as shown in Figure 11. + + ![image of menu](images/volumeactivationforwindows81-11.jpg) + + **Figure 11**. Adding the Volume Activation Services role + +4. Click the link to launch the Volume Activation Tools (Figure 12). + + ![image of menu](images/volumeactivationforwindows81-12.jpg) + + **Figure 12**. Launching the Volume Activation Tools + +5. Select the **Active Directory-Based Activation** option (Figure 13). + + ![image of menu](images/volumeactivationforwindows81-13.jpg) + + **Figure 13**. Selecting Active Directory-Based Activation + +6. Enter your KMS host key and (optionally) a display name (Figure 14). + + ![image of menu](images/volumeactivationforwindows81-14.jpg) + + **Figure 14**. Entering your KMS host key + +7. Activate your KMS host key by phone or online (Figure 15). + + ![image of menu](images/volumeactivationforwindows81-15.jpg) + + **Figure 15**. Choosing how to activate your product + +8. After activating the key, click **Commit**, and then click **Close**. + +## Verifying the configuration of Active Directory-based activation + + +To verify your Active Directory-based activation configuration, complete the following steps: + +1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing. + +2. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key. + +3. If the computer is not joined to your domain, join it to the domain. + +4. Sign in to the computer. + +5. Open Windows Explorer, right-click **Computer**, and then click **Properties**. + +6. Scroll down to the **Windows activation** section, and verify that this client has been activated. + +**Note**   +If you are using both KMS and Active Directory-based activation, it may be difficult to see whether a client has been activated by KMS or by Active Directory-based activation. Consider disabling KMS during the test, or make sure that you are using a client computer that has not already been activated by KMS. The **slmrg.vbs /dlv** command also indicates whether KMS has been used. + +  + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/activate-using-key-management-service-client.md b/windows/deploy/activate-using-key-management-service-client.md new file mode 100644 index 0000000000..b78eddcbe0 --- /dev/null +++ b/windows/deploy/activate-using-key-management-service-client.md @@ -0,0 +1,175 @@ +--- +title: Activate using Key Management Service (Windows 10) +ms.assetid: f2417bfe-7d25-4e82-bc07-de316caa8dac +description: +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Activate using Key Management Service + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +There are three possible scenarios for volume activation of Windows 10 or Windows Server 2012 R2 by using a Key Management Service (KMS) host: + +- Host KMS on a computer running Windows 10 + +- Host KMS on a computer running Windows Server 2012 R2 + +- Host KMS on a computer running an earlier version of Windows + +## Key Management Service in Windows 10 + + +Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. + +Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. + +To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft’s activation services. + +**Configure KMS in Windows 10** + +1. Open an elevated command prompt. + +2. Enter one of the following commands. + - To install a KMS key, type **slmgr.vbs /ipk <KmsKey>**. + - To activate online, type **slmgr.vbs /ato**. + - To activate by using the telephone, type **slui.exe 4**. + +3. After activating the KMS key, restart the Software Protection Service. + +For more information, see the information for Windows 7 in [Deploy KMS Activation](http://go.microsoft.com/fwlink/p/?LinkId=717032). + +## Key Management Service in Windows Server 2012 R2 + + +Installing a KMS host key on a computer running Windows Server allows you to activate computers running Windows Server 2012 R2, Windows Sever 2008 R2, Windows Server 2008, Windows 10, Windows 8.1, Windows 7, and Windows Vista. + +**Note**   +You cannot install a client KMS key into the KMS in Windows Server. + +  + +This scenario is commonly used in larger organizations that do not find the overhead of using a server a burden. + +**Note**   +If you receive error 0xC004F015 when trying to activate Windows 10 Enterprise, see [KB 3086418](http://go.microsoft.com/fwlink/p/?LinkId=620687). + +  + +**Configure KMS in Windows Server 2012 R2** + +1. Sign in to a computer running Windows Server 2012 R2 with an account that has local administrative credentials. + +2. Launch Server Manager. + +3. Add the Volume Activation Services role, as shown in Figure 4. + + ![image of menu](images/volumeactivationforwindows81-04.jpg) + + **Figure 4**. Adding the Volume Activation Services role in Server Manager + +4. When the role installation is complete, click the link to launch the Volume Activation Tools (Figure 5). + + ![image of menu](images/volumeactivationforwindows81-05.jpg) + + **Figure 5**. Launching the Volume Activation Tools + +5. Select the **Key Management Service (KMS)** option, and specify the computer that will act as the KMS host (Figure 6). + + This can be the same computer on which you installed the role or another computer. For example, it can be a client computer running Windows 10. + + ![image of menu](images/volumeactivationforwindows81-06.jpg) + + **Figure 6**. Configuring the computer as a KMS host + +6. Install your KMS host key by typing it in the text box, and then click **Commit** (Figure 7). + + ![image of menu](images/volumeactivationforwindows81-07.jpg) + + **Figure 7**. Installing your KMS host key + +7. If asked to confirm replacement of an existing key, click **Yes**. + +8. After the product key is installed, you must activate it. Click **Next** (Figure 8). + + ![image of menu](images/volumeactivationforwindows81-08.jpg) + + **Figure 8**. Activating the software + +The KMS key can be activated online or by phone. See Figure 9. + +![image of menu](images/volumeactivationforwindows81-09.jpg) + +**Figure 9**. Choosing to activate online + +Now that the KMS host is configured, it will begin to listen for activation requests. However, it will not activate clients successfully until the activation threshold is met. + +## Verifying the configuration of Key Management Service + + +You can verify KMS volume activation from the KMS host server or from the client computer. KMS volume activation requires a minimum threshold of 25 computers before activation requests will be processed. The verification process described here will increment the activation count each time a client computer contacts the KMS host, but unless the activation threshold is reached, the verification will take the form of an error message rather than a confirmation message. + +**Note**   +If you configured Active Directory-based activation before configuring KMS activation, you must use a client computer that will not first try to activate itself by using Active Directory-based activation. You could use a workgroup computer that is not joined to a domain or a computer running Windows 7 or Windows Server 2008 R2. + +  + +To verify that KMS volume activation works, complete the following steps: + +1. On the KMS host, open the event log and confirm that DNS publishing is successful. + +2. On a client computer, open a Command Prompt window, type **Slmgr.vbs /ato**, and then press ENTER. + + The **/ato** command causes the operating system to attempt activation by using whichever key has been installed in the operating system. The response should show the license state and detailed Windows version information. + +3. On a client computer or the KMS host, open an elevated Command Prompt window, type **Slmgr /dlv**, and then press ENTER. + + The **/dlv** command displays the detailed licensing information. The response should return an error that states that the KMS activation count is too low. This confirms that KMS is functioning correctly, even though the client has not been activated. + +For more information about the use and syntax of slmgr.vbs, see [Slmgr.vbs Options](http://go.microsoft.com/fwlink/p/?LinkId=733639). + +## Key Management Service in earlier versions of Windows + + +If you have already established a KMS infrastructure in your organization for an earlier version of Windows, you may want to continue using that infrastructure to activate computers running Windows 10 or Windows Server 2012 R2. Your existing KMS host must be running Windows 7 or later. To upgrade your KMS host, complete the following steps: + +1. Download and install the correct update for your current KMS host operating system. Restart the computer as directed. + +2. Request a new KMS host key from the Volume Licensing Service Center. + +3. Install the new KMS host key on your KMS host. + +4. Activate the new KMS host key by running the slmrg.vbs script. + +For detailed instructions, see [Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows](http://go.microsoft.com/fwlink/p/?LinkId=618265) and [Update that enables Windows 7 and Windows Server 2008 R2 KMS hosts to activate Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=626590). + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/active-directory-based-activation-overview.md b/windows/deploy/active-directory-based-activation-overview.md new file mode 100644 index 0000000000..77e064ff4e --- /dev/null +++ b/windows/deploy/active-directory-based-activation-overview.md @@ -0,0 +1,39 @@ +--- +title: Active Directory-Based Activation Overview (Windows 10) +description: Active Directory-Based Activation Overview +ms.assetid: c1dac3bd-6a86-4c45-83dd-421e63a398c0 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Active Directory-Based Activation Overview + + +Active Directory-Based Activation (ADBA) enables enterprises to activate computers through a connection to their domain. Many companies have computers at offsite locations that use products that are registered to the company. Previously these computers needed to either use a retail key or a Multiple Activation Key (MAK), or physically connect to the network in order to activate their products by using Key Management Services (KMS). ADBA provides a way to activate these products if the computers can join the company’s domain. When the user joins their computer to the domain, the ADBA object automatically activates Windows installed on their computer, as long as the computer has a Generic Volume License Key (GVLK) installed. No single physical computer is required to act as the activation object, because it is distributed throughout the domain. + +## Active Directory-Based Activation Scenarios + + +VAMT enables IT Professionals to manage and activate the Active Directory-Based Activation object. Activation can be performed by using a scenario such as the following: + +- Online activation: To activate an ADBA forest online, the user selects the **Online activate forest** function, selects a KMS Host key (CSVLK) to use, and gives the Active Directory-Based Activation Object a name. + +- Proxy activation: For a proxy activation, the user first selects the **Proxy activate forest** function, selects a KMS Host key (CSVLK) to use, gives the Active Directory-Based Activation Object a name, and provides a file name to save the CILx file that contains the Installation ID. Next, the user takes that file to a computer that is running VAMT with an Internet connection and then selects the **Acquire confirmation IDs for CILX** function on the VAMT landing page, and provides the original CILx file. When VAMT has loaded the Confirmation IDs into the original CILx file, the user takes this file back to the original VAMT instance, where the user completes the proxy activation process by selecting the **Apply confirmation ID to Active Directory domain** function. + +## Related topics + + +[How to Activate an Active Directory Forest Online](http://go.microsoft.com/fwlink/p/?LinkId=246565) + +[How to Proxy Activate an Active Directory Forest](http://go.microsoft.com/fwlink/p/?LinkId=246566) + +  + +  + + + + + diff --git a/windows/deploy/add-a-windows-81-operating-system-image-using-configuration-manager.md b/windows/deploy/add-a-windows-81-operating-system-image-using-configuration-manager.md new file mode 100644 index 0000000000..4cda450540 --- /dev/null +++ b/windows/deploy/add-a-windows-81-operating-system-image-using-configuration-manager.md @@ -0,0 +1,75 @@ +--- +title: Add a Windows 10 operating system image using Configuration Manager (Windows 10) +description: Operating system images are typically the production image used for deployment throughout the organization. +ms.assetid: 77f769cc-1a47-4f36-8082-201cd77b8d3b +keywords: ["image, deploy, distribute"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Add a Windows 10 operating system image using Configuration Manager + + +**Applies to** + +- Windows 10 + +Operating system images are typically the production image used for deployment throughout the organization. This topic shows you how to add a Windows 10 operating system image created with Microsoft System Center 2012 R2 Configuration Manager, and how to distribute the image to a distribution point. + +For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard, as the distribution point. CM01 is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). Our image is named REFW10-X64-001.wim. For details on building this image, please see [Create a Windows 10 reference image](create-a-windows-81-reference-image.md). + +1. Using File Explorer, in the **E:\\Sources\\OSD\\OS** folder, create a subfolder named **Windows 10 Enterprise x64 RTM**. + +2. Copy the REFW10-X64-001.wim file to the **E:\\Sources\\OSD\\OS\\Windows 10 Enterprise x64 RTM** folder. + + ![figure 17](images/fig17-win10image.png) + + Figure 17. The Windows 10 image copied to the Sources folder structure. + +3. Using the Configuration Manager Console, in the Software Library workspace, right-click **Operating System Images**, and select **Add Operating System Image**. + +4. On the **Data Source** page, in the **Path:** text box, browse to \\\\CM01\\Sources$\\OSD\\OS\\Windows 10 Enterprise x64 RTM\\REFW10-X64-001.wim and click **Next**. + +5. On the **General** page, assign the name Windows 10 Enterprise x64 RTM and click **Next** twice, and then click **Close**. + +6. Distribute the operating system image to the CM01 distribution point by right-clicking the Windows 10 Enterprise x64 RTM operating system image and selecting **Distribute Content**. + +7. In the Distribute Content Wizard, add the CM01 distribution point. + +8. View the content status for the Windows 10 Enterprise x64 RTM package. Do not continue until the distribution is completed. You also can review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for the **STATMSG: ID=2301** line. + + ![figure 18](images/fig18-distwindows.png) + + Figure 18. The distributed Windows 10 Enterprise x64 RTM package. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/add-and-manage-products-vamt-30-win8.md b/windows/deploy/add-and-manage-products-vamt-30-win8.md new file mode 100644 index 0000000000..ae6d624167 --- /dev/null +++ b/windows/deploy/add-and-manage-products-vamt-30-win8.md @@ -0,0 +1,49 @@ +--- +title: Add and Manage Products (Windows 10) +description: Add and Manage Products +ms.assetid: a48fbc23-917d-40f7-985c-e49702c05e51 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Add and Manage Products + + +This section describes how to add client computers into the Volume Activation Management Tool (VAMT). After the computers are added, you can manage the products that are installed on your network. + +## In this Section + + + ++++ + + + + + + + + + + + + + + +

[Add and Remove Computers](add-and-remove-computers-vamt-30-win8.md)

Describes how to add client computers to VAMT.

[Update Product Status](update-product-status-vamt-30-win8.md)

Describes how to update the status of product license.

[Remove Products](remove-products-vamt-30-win8.md)

Describes how to remove a product from the product list.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/add-and-remove-a-product-key-vamt-30-win8.md b/windows/deploy/add-and-remove-a-product-key-vamt-30-win8.md new file mode 100644 index 0000000000..1ad27d20ad --- /dev/null +++ b/windows/deploy/add-and-remove-a-product-key-vamt-30-win8.md @@ -0,0 +1,53 @@ +--- +title: Add and Remove a Product Key (Windows 10) +description: Add and Remove a Product Key +ms.assetid: feac32bb-fb96-4802-81b8-c69220dcfcce +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Add and Remove a Product Key + + +Before you can use a Multiple Activation Key (MAK), retail, or KMS Host key (CSVLK) product key, you must first add it to the Volume Activation Management Tool (VAMT) database. + +## To Add a Product Key + + +1. Open VAMT. + +2. In the left-side pane, right-click the **Product Keys** node to open the **Actions** menu. + +3. Click **Add product keys** to open the **Add Product Keys** dialog box. + +4. In the **Add Product Keys** dialog box, select from one of the following methods to add product keys: + + - To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys separated by line breaks, and click **Add Key(s)**. + + - To import a Comma Separated Values (CSV) file containing a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**. + +**Note**   +If you are activating a large number of products with a MAK, you should refresh the activation count of the MAK, to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs. + +  + +## Remove a Product Key + + +- To remove a product key from the list, simply select the key in the list and click **Delete** on the **Selected Items** menu in the right-side pane. Click **Yes** to confirm deletion of the product key. Removing a product key from the VAMT database will not affect the activation state of any products or computers on the network. + +## Related topics + + +[Manage Product Keys](manage-product-keys-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/add-and-remove-computers-vamt-30-win8.md b/windows/deploy/add-and-remove-computers-vamt-30-win8.md new file mode 100644 index 0000000000..92f99c7ce1 --- /dev/null +++ b/windows/deploy/add-and-remove-computers-vamt-30-win8.md @@ -0,0 +1,89 @@ +--- +title: Add and Remove Computers (Windows 10) +description: Add and Remove Computers +ms.assetid: cb6f3a78-ece0-4dc7-b086-cb003d82cd52 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Add and Remove Computers + + +You can add computers that have any of the supported Windows or Office products installed to a Volume Activation Management Tool (VAMT) database by using the **Discover products** function. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query. You can remove computers from a VAMT database by using the **Delete** function. After you add the computers, you can add the products that are installed on the computers by running the **Update license status** function. + +Before adding computers, ensure that the Windows Management Instrumentation (WMI) firewall exception required by VAMT has been enabled on all target computers. For more information see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +## To add computers to a VAMT database + + +1. Open VAMT. + +2. Click **Discover products** in the **Actions** menu in the right-side pane to open the **Discover Products** dialog box. + +3. In the **Discover products** dialog box, click **Search for computers in the Active Directory** to display the search options, then click the search option you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query. + + - To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**, then under **Domain Filter Criteria**, in the list of domain names click the name of the domain you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a". + + - To search by individual computer name or IP address, click **Manually enter name or IP address**, then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing. + + - To search for computers in a workgroup, click **Search for computers in the workgroup**, then under **Workgroup Filter Criteria**, in the list of workgroup names click the name of the workgroup you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a". + + - To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box provided. VAMT will validate only the LDAP query syntax, but will otherwise run the query without further checks. + +4. Click **Search**. + +5. VAMT searches for the specified computers and adds them to the VAMT database. During the search, VAMT displays the **Finding computers** message shown below. + + To cancel the search, click **Cancel**. When the search is complete the names of the newly-discovered computers appear in the product list view in the center pane. + + **Important**   + Note that this step adds only the computers to the VAMT database, and not the products that are installed on the computers. To add the products, you need to run the **Update license status** function. + +   + +![vamt find a computer dialog box](images/dep-win8-l-vamt-findingcomputerdialog.gif) + +## To add products to VAMT + + +1. In the **Products** list, select the computers that need to have their product information added to the VAMT database. + +2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +4. Click **Filter**. VAMT displays the filtered list in the center pane. + +5. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**. + +6. VAMT displays the **Collecting product information** dialog box while it collects the licensing status of all supported products on the selected computers. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane. + +**Note**   +If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading. + +  + +## To remove computers from a VAMT database + + +You can delete a computer by clicking on it in the product list view, and then clicking **Delete** in the **Selected Item** menu in the right-hand pane. In the **Confirm Delete Selected Products** dialog box that appears, click **Yes** to delete the computer. If a computer has multiple products listed, you must delete each product to completely remove the computer from the VAMT database. + +## Related topics + + +[Add and Manage Products](add-and-manage-products-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md b/windows/deploy/add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md new file mode 100644 index 0000000000..b247cebc50 --- /dev/null +++ b/windows/deploy/add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md @@ -0,0 +1,118 @@ +--- +title: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager (Windows 10) +description: In this topic, you will learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. +ms.assetid: 97b3ea46-28d9-407e-8c42-ded2e45e8d5c +keywords: ["deploy, task sequence"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Add drivers for Windows PE](#sec01) +- [Add drivers for Windows 10](#sec02) +- [Related topics](#related_topics) + +In this topic, you will learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. Even though the Windows PE boot image and the Windows 10 operating system contain many out-of-the-box drivers, it is likely you will have to add new or updated drivers to support all your hardware. In this section, you import drivers for both Windows PE and the full Windows 10 operating system. + +For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +## Add drivers for Windows PE + + +This section will show you how to import some network and storage drivers for Windows PE. This section assumes you have downloaded some drivers to the E:\\Sources\\OSD\\DriverSources\\WinPE x64 folder on CM01. + +1. On CM01, using the Configuration Manager Console, in the Software Library workspace, right-click the **Drivers** node and select **Import Driver**. + +2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, below the Import all drivers in the following network path (UNC) option, browse to the **\\\\CM01\\Sources$\\OSD\\DriverSources\\WinPE x64** folder and click **Next**. + +3. On the **Specify the details for the imported driver** page, click **Categories**, create a category named **WinPE x64**, and then click **Next**. + +4. On the **Select the packages to add the imported driver** page, click **Next**. + +5. On the **Select drivers to include in the boot image** page, select the **Zero Touch WinPE x64** boot image. Also select the **Update distribution points when finished** check box, and click **Next** twice. + +![figure 21](images/fig21-add-drivers.png) + +Figure 21. Add drivers to Windows PE. + +**Note**   +The Updating Boot Image part of the wizard will appear to hang when displaying Done. It will complete in a minute or two. + +  + +## Add drivers for Windows 10 + + +This section illustrates how to add drivers for Windows 10 through an example in which you want to import Windows 10 drivers for the HP EliteBook 8560w model. For the purposes of this section, we assume that you have downloaded the Windows 10 drivers for the HP EliteBook 8560w model and copied them to the E:\\Sources\\OSD\\DriverSources\\Windows 10 x64\\HP EliteBook 8560w folder on CM01. + +1. On CM01, using the Configuration Manager Console, right-click the **Drivers** folder and select **Import Driver**. + +2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, below the Import all drivers in the following network path (UNC) option, browse to the **\\\\CM01\\Sources$\\OSD\\DriverSources\\Windows 10 x64\\HP EliteBook 8560w** folder and click **Next**. + +3. On the **Specify the details for the imported driver** page, click **Categories**, create a category named Windows 10 x64 - HP EliteBook 8560w, and then click **Next**. + + ![figure 22](images/fig22-createcategories.png) + + Figure 22. Create driver categories. + +4. On the **Select the packages to add the imported driver** page, click **New Package**, use the following settings for the package, and then click **Next**: + + 1. Name: Windows 10 x64 - HP EliteBook 8560w + + 2. Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\HP EliteBook 8560w + + **Note**   + The package path does not yet exist, so you have to type it in. The wizard will create the new package in that folder. + +   + +5. On the **Select drivers to include in the boot image** page, do not select anything, and click **Next** twice. After the package has been created, click **Close**. + +**Note**   +If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import. + +  + +![figure 23](images/mdt-06-fig26.png) + +Figure 23. Drivers imported and a new driver package created. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md b/windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md new file mode 100644 index 0000000000..5700cf58c7 --- /dev/null +++ b/windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md @@ -0,0 +1,92 @@ +--- +title: Appendix-- Information sent to Microsoft during activation (Windows 10) +ms.assetid: 4bfff495-07d0-4385-86e3-7a077cbd64b8 +description: +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Appendix: Information sent to Microsoft during activation + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +When you activate a computer running Windows 10, the following information is sent to Microsoft: + +- The Microsoft product code (a five-digit code that identifies the Windows product you are activating) + +- A channel ID or site code that identifies how the Windows product was originally obtained + + For example, a channel ID or site code identifies whether the product was originally purchased from a retail store, obtained as an evaluation copy, obtained through a volume licensing program, or preinstalled by a computer manufacturer. + +- The date of installation and whether the installation was successful + +- Information that helps confirm that your Windows product key has not been altered + +- Computer make and model + +- Version information for the operating system and software + +- Region and language settings + +- A unique number called a *globally unique identifier*, which is assigned to your computer + +- Product key (hashed) and product ID + +- BIOS name, revision number, and revision date + +- Volume serial number (hashed) of the hard disk drive + +- The result of the activation check + + This includes error codes and the following information about any activation exploits and related malicious or unauthorized software that was found or disabled: + + - The activation exploit’s identifier + + - The activation exploit’s current state, such as cleaned or quarantined + + - Computer manufacturer’s identification + + - The activation exploit’s file name and hash in addition to a hash of related software components that may indicate the presence of an activation exploit + +- The name and a hash of the contents of your computer’s startup instructions file + +- If your Windows license is on a subscription basis, information about how your subscription works + +Standard computer information is also sent, but your computer’s IP address is only retained temporarily. + +## Use of information + + +Microsoft uses the information to confirm that you have a licensed copy of the software. Microsoft does not use the information to contact individual consumers. + +For additional details, see [Windows 10 Privacy Statement](http://go.microsoft.com/fwlink/p/?LinkId=619879). + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/assign-applications-using-roles-in-mdt-2013.md b/windows/deploy/assign-applications-using-roles-in-mdt-2013.md new file mode 100644 index 0000000000..b21ce2162d --- /dev/null +++ b/windows/deploy/assign-applications-using-roles-in-mdt-2013.md @@ -0,0 +1,167 @@ +--- +title: Assign applications using roles in MDT (Windows 10) +description: This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer. +ms.assetid: d82902e4-de9c-4bc4-afe0-41d649b83ce7 +keywords: ["settings, database, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Assign applications using roles in MDT + + +**In this article** + +- [Create and assign a role entry in the database](#sec01) +- [Associate the role with a computer in the database](#sec02) +- [Verify database access in the MDT simulation environment](#sec03) +- [Related topics](#related_topics) + +This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer. For the purposes of this topic, the application we are adding is Adobe Reader XI. In addition to using computer-specific entries in the database, you can use roles in MDT to group settings together. + +## Create and assign a role entry in the database + + +1. On MDT01, using Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration** and then expand **Database**. + +2. In the **Database** node, right-click **Role**, select **New**, and create a role entry with the following settings: + + 1. Role name: Standard PC + + 2. Applications / Lite Touch Applications: + + 3. Install - Adobe Reader XI - x86 + +![figure 12](images/mdt-09-fig12.png) + +Figure 12. The Standard PC role with the application added + +## Associate the role with a computer in the database + + +After creating the role, you can associate it with one or more computer entries. + +1. Using Deployment Workbench, expand **MDT Production**, expand **Advanced Configuration**, expand **Database**, and select **Computers**. + +2. In the **Computers** node, double-click the **PC00075** entry, and add the following setting: + + - Roles: Standard PC + +![figure 13](images/mdt-09-fig13.png) + +Figure 13. The Standard PC role added to PC00075 (having ID 1 in the database). + +## Verify database access in the MDT simulation environment + + +When the database is populated, you can use the MDT simulation environment to simulate a deployment. The applications are not installed, but you can see which applications would be installed if you did a full deployment of the computer. + +1. On PC0001, log on as **CONTOSO\\MDT\_BA**. + +2. Modify the C:\\MDT\\CustomSettings.ini file to look like the following: + + ``` syntax + [Settings] + Priority=CSettings, CRoles, RApplications, Default + + [Default] + _SMSTSORGNAME=Contoso + OSInstall=Y + UserDataLocation=AUTO + TimeZoneName=Pacific Standard Time + AdminPassword=P@ssw0rd + JoinDomain=contoso.com + DomainAdmin=CONTOSO\MDT_JD + DomainAdminPassword=P@ssw0rd + MachineObjectOU=OU=Workstations,OU=Computers,OU=Contoso,DC=contoso,DC=com + SLShare=\\MDT01\Logs$ + ScanStateArgs=/ue:*\* /ui:CONTOSO\* + USMTMigFiles001=MigApp.xml + USMTMigFiles002=MigUser.xml + HideShell=YES + ApplyGPOPack=NO + SkipAppsOnUpgrade=NO + SkipAdminPassword=YES + SkipProductKey=YES + SkipComputerName=NO + SkipDomainMembership=YES + SkipUserData=NO + SkipLocaleSelection=YES + SkipTaskSequence=NO + SkipTimeZone=YES + SkipApplications=NO + SkipBitLocker=YES + SkipSummary=YES + SkipCapture=YES + SkipFinalSummary=NO + EventService=http://MDT01:9800 + + [CSettings] + SQLServer=MDT01 + Instance=SQLEXPRESS + Database=MDT + Netlib=DBNMPNTW + SQLShare=Logs$ + Table=ComputerSettings + Parameters=UUID, AssetTag, SerialNumber, MacAddress + ParameterCondition=OR + + [CRoles] + SQLServer=MDT01 + Instance=SQLEXPRESS + Database=MDT + Netlib=DBNMPNTW + SQLShare=Logs$ + Table=ComputerRoles + Parameters=UUID, AssetTag, SerialNumber, MacAddress + ParameterCondition=OR + + [RApplications] + SQLServer=MDT01 + Instance=SQLEXPRESS + Database=MDT + Netlib=DBNMPNTW + SQLShare=Logs$ + Table=RoleApplications + Parameters=Role + Order=Sequence + ``` + +3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command: + + ``` syntax + Set-Location C:\MDT + .\Gather.ps1 + ``` + +![figure 14](images/mdt-09-fig14.png) + +Figure 14. ZTIGather.log displaying the application GUID belonging to the Adobe Reader XI application that would have been installed if you deployed this machine. + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/build-a-distributed-environment-for-windows-81-deployment.md b/windows/deploy/build-a-distributed-environment-for-windows-81-deployment.md new file mode 100644 index 0000000000..519850a254 --- /dev/null +++ b/windows/deploy/build-a-distributed-environment-for-windows-81-deployment.md @@ -0,0 +1,320 @@ +--- +title: Build a distributed environment for Windows 10 deployment (Windows 10) +description: In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations. +ms.assetid: a6cd5657-6a16-4fff-bfb4-44760902d00c +keywords: ["replication, replicate, deploy, configure, remote"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Build a distributed environment for Windows 10 deployment + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Replicate deployment shares](#sec01) +- [Set up Distributed File System Replication (DFS-R) for replication](#sec02) +- [Replicate the content](#sec03) +- [Configure Windows Deployment Services (WDS) in a remote site](#sec04) +- [Deploy the Windows 10 client to the remote site](#sec05) +- [Related topics](#related_topics) + +In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations. If you work in a distributed environment, replicating the deployment shares is an important part of the deployment solution. With images reaching 5 GB in size or more, you can't deploy machines in a remote office over the wire. You need to replicate the content, so that the clients can do local deployments. + +We will use four machines for this topic: DC01, MDT01, MDT02, and PC0006. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 standard server, and PC0006 is a blank machine to which you will deploy Windows 10. You will configure a second deployment server (MDT02) for a remote site (Stockholm) by replicating the deployment share in the original site (New York). MDT01, MDT02, and PC0006 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-10-fig01.png) + +Figure 1. The machines used in this topic. + +## Replicate deployment shares + + +Replicating the content between MDT01 (New York) and MDT02 (Stockholm) can be done in a number of different ways. The most common content replication solutions with Microsoft Deployment Toolkit (MDT) 2013 use either the Linked Deployment Shares (LDS) feature or Distributed File System Replication (DFS-R). Some organizations have used a simple robocopy script for replication of the content. + +**Note**   +Robocopy has options that allow for synchronization between folders. It has a simple reporting function; it supports transmission retry; and, by default, it will only copy/remove files from the source that are newer than files on the target. + +  + +### Linked deployment shares in MDT 2013 Update 1 + +LDS is a built-in feature in MDT for replicating content. However, LDS works best with strong connections such as LAN connections with low latency. For most WAN links, DFS-R is the better option. + +### Why DFS-R is a better option + +DFS-R is not only very fast and reliable, but it also offers central monitoring, bandwidth control, and a great delta replication engine. DFS-R will work equally well whether you have 2 sites or 90. When using DFS-R for MDT, we recommend running your deployment servers on Windows Server 2008 R2 or higher. From that version on, you can configure the replication target(s) as read-only, which is exactly what you want for MDT. This way, you can have your master deployment share centralized and replicate out changes as they happen. DFS-R will quickly pick up changes at the central deployment share in MDT01 and replicate the delta changes to MDT02. + +## Set up Distributed File System Replication (DFS-R) for replication + + +Setting up DFS-R for replication is a quick and straightforward process. You prepare the deployment servers and then create a replication group. To complete the setup, you configure some replication settings. + +### Prepare MDT01 for replication + +1. On MDT01, using Server Manager, click **Add roles and features**. + +2. On the **Select installation type** page, select **Role-based or feature-based installation**. + +3. On the **Select destination server** page, select **MDT01.contoso.com** and click **Next**. + +4. On the **Select server roles** page, expand **File and Storage Services (Installed)** and expand **File and iSCSI Services (Installed)**. + +5. In the **Roles** list, select **DFS Replication**. In the **Add Roles and Features Wizard** dialog box, select **Add Features**, and then click **Next**. + + ![figure 2](images/mdt-10-fig02.png) + + Figure 2. Adding the DFS Replication role to MDT01. + +6. On the **Select features** page, accept the default settings, and click **Next**. + +7. On the **Confirm installation selections** page, click **Install**. + +8. On the **Installation progress** page, click **Close**. + +### Prepare MDT02 for replication + +1. On MDT02, using Server Manager, click **Add roles and features**. + +2. On the **Select installation type** page, select **Role-based or feature-based installation**. + +3. On the **Select destination server** page, select **MDT02.contoso.com** and click **Next**. + +4. On the **Select server roles** page, expand **File and Storage Services (Installed)** and expand **File and iSCSI Services (Installed)**. + +5. In the **Roles** list, select **DFS Replication**. In the **Add Roles and Features Wizard** dialog box, select **Add Features**, and then click **Next**. + +6. On the **Select features** page, accept the default settings, and click **Next**. + +7. On the **Confirm installation selections** page, click **Install**. + +8. On the **Installation progress** page, click **Close**. + +### Create the MDTProduction folder on MDT02 + +1. On MDT02, using File Explorer, create the **E:\\MDTProduction** folder. + +2. Share the **E:\\MDTProduction** folder as **MDTProduction$**. Use the default permissions. + + ![figure 3](images/mdt-10-fig03.png) + + Figure 3. Sharing the **E:\\MDTProduction folder** on MDT02. + +### Configure the deployment share + +When you have multiple deployment servers sharing the same content, you need to configure the Bootstrap.ini file with information about which server to connect to based on where the client is located. In MDT, that can be done by using the DefaultGateway property. + +1. On MDT01, using Notepad, navigate to the **E:\\MDTProduction\\Control** folder and modify the Boostrap.ini file to look like this: + + ``` syntax + [Settings] + Priority=DefaultGateway, Default + [DefaultGateway] + 192.168.1.1=NewYork + 192.168.2.1=Stockholm + [NewYork] + DeployRoot=\\MDT01\MDTProduction$ + [Stockholm] + DeployRoot=\\MDT02\MDTProduction$ + [Default] + UserDomain=CONTOSO + UserID=MDT_BA + SkipBDDWelcome=YES + ``` + + **Note**   + The DeployRoot value needs to go into the Bootstrap.ini file, but you can use the same logic in the CustomSettings.ini file. For example, you can redirect the logs to the local deployment server (SLSHARE), or have the User State Migration Tool (USMT) migration store (UDDIR) local. To learn more about USMT, see [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) and [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md). + +   + +2. Save the Bootstrap.ini file. + +3. Using the Deployment Workbench, right-click the **MDT Production** deployment share and select **Update Deployment Share**. + + ![figure 4](images/mdt-10-fig04.png) + + Figure 4. Updating the MDT Production deployment share. + +4. Use the default settings for the Update Deployment Share Wizard. + +5. After the update is complete, use the Windows Deployment Services console. In the **Boot Images** node, right-click the **MDT Production x64** boot image and select **Replace Image**. + + ![figure 5](images/mdt-10-fig05.png) + + Figure 5. Replacing the updated boot image in WDS. + +6. Browse and select the **E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim** boot image, and then complete Replace Boot Image Wizard using the default settings. + +## Replicate the content + + +Once the MDT01 and MDT02 servers are prepared, you are ready to configure the actual replication. + +### Create the replication group + +1. On MDT01, using DFS Management, right-click **Replication**, and select **New Replication Group**. + +2. On the **Replication Group Type** page, select **Multipurpose replication group**, and click **Next**. + +3. On the **Name and Domain** page, assign the **MDTProduction** name, and click **Next**. + +4. On the **Replication Group Members** page, click **Add**, add **MDT01** and **MDT02**, and then click **Next**. + + ![figure 6](images/mdt-10-fig06.png) + + Figure 6. Adding the Replication Group Members. + +5. On the **Topology Selection** page, select the **Full mesh** option and click **Next**. + +6. On the **Replication Group Schedule and Bandwidth** page, accept the default settings and click **Next**. + +7. On the **Primary Member** page, select **MDT01** and click **Next**. + +8. On the **Folders to Replicate** page, click **Add**, type in **E:\\MDTProduction** as the folder to replicate, click **OK**, and then click **Next**. + +9. On the **Local Path of MDTProduction** on the **Other Members** page, select **MDT02**, and click **Edit**. + +10. On the **Edit** page, select the **Enabled** option, type in **E:\\MDTProduction** as the local path of folder, select the **Make the selected replicated folder on this member read-only** check box, click **OK**, and then click **Next**. + + ![figure 7](images/mdt-10-fig07.png) + + Figure 7. Configure the MDT02 member. + +11. On the **Review Settings and Create Replication Group** page, click **Create**. + +12. On the **Confirmation** page, click **Close**. + +### Configure replicated folders + +1. On MDT01, using DFS Management, expand **Replication** and then select **MDTProduction**. + +2. In the middle pane, right-click the **MDT01** member and select **Properties**. + +3. On the **MDT01 (MDTProduction) Properties** page, configure the following and then click **OK**: + + 1. In the **Staging** tab, set the quota to **20480 MB**. + + 2. In the **Advanced** tab, set the quota to **8192 MB**. + + In this scenario the size of the deployment share is known, but you might need to change the values for your environment. A good rule of thumb is to get the size of the 16 largest files and make sure they fit in the staging area. Here is a Windows PowerShell example that calculates the size of the 16 largest files in the E:\\MDTProduction deployment share: + + ``` syntax + (Get-ChildItem E:\MDTProduction -Recurse | Sort-Object Length -Descending | Select-Object -First 16 | Measure-Object -Property Length -Sum).Sum /1GB + ``` + + ![figure 8](images/mdt-10-fig08.png) + + Figure 8. Configure the Staging settings. + +4. In the middle pane, right-click the **MDT02** member and select **Properties**. + +5. On the **MDT02 (MDTProduction) Properties** page, configure the following and then click **OK**: + + 1. In the **Staging** tab, set the quota to **20480 MB**. + + 2. In the **Advanced** tab, set the quota to **8192 MB**. + +**Note**   +It will take some time for the replication configuration to be picked up by the replication members (MDT01 and MDT02). The time for the initial sync will depend on the WAN link speed between the sites. After that, delta changes are replicated quickly. + +  + +### Verify replication + +1. On MDT02, wait until you start to see content appear in the **E:\\MDTProduction** folder. + +2. Using DFS Management, expand **Replication**, right-click **MDTProduction**, and select **Create Diagnostics Report**. + +3. In the Diagnostics Report Wizard, on the **Type of Diagnostics Report or Test** page, select **Health report** and click **Next**. + +4. On the **Path and Name** page, accept the default settings and click **Next**. + +5. On the **Members to Include** page, accept the default settings and click **Next**. + +6. On the **Options** page, accept the default settings and click **Next**. + +7. On the **Review Settings and Create Report** page, click **Create**. + +8. Open the report in Internet Explorer, and if necessary, select the **Allow blocked content** option. + +![figure 9](images/mdt-10-fig09.png) + +Figure 9. The DFS Replication Health Report. + +## Configure Windows Deployment Services (WDS) in a remote site + + +Like you did in the previous topic for MDT01, you need to add the MDT Production Lite Touch x64 Boot image to Windows Deployment Services on MDT02. For the following steps, we assume that WDS has already been installed on MDT02. + +1. On MDT02, using the WDS console, right-click **Boot Images** and select **Add Boot Image**. + +2. Browse to the E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim file and add the image with the default settings. + +## Deploy the Windows 10 client to the remote site + + +Now you should have a solution ready for deploying the Windows 10 client to the remote site, Stockholm, connecting to the MDT Production deployment share replica on MDT02. + +1. Create a virtual machine with the following settings: + + 1. Name: PC0006 + + 2. Location: C:\\VMs + + 3. Generation: 2 + + 4. Memory: 2048 MB + + 5. Hard disk: 60 GB (dynamic disk) + +2. Start the PC0006 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The machine will now load the Windows PE boot image from the WDS server. + +3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings: + + 1. Password: P@ssw0rd + + 2. Select a task sequence to execute on this computer: + + 1. Windows 10 Enterprise x64 RTM Custom Image + + 2. Computer Name: PC0006 + + 3. Applications: Select the Install - Adobe Reader XI - x86 application + +4. The setup will now start and do the following: + + 1. Install the Windows 10 Enterprise operating system. + + 2. Install the added application. + + 3. Update the operating system via your local Windows Server Update Services (WSUS) server. + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/change-history-for-deploy-windows-10.md b/windows/deploy/change-history-for-deploy-windows-10.md new file mode 100644 index 0000000000..3810a3e281 --- /dev/null +++ b/windows/deploy/change-history-for-deploy-windows-10.md @@ -0,0 +1,53 @@ +--- +title: Change history for Deploy Windows 10 (Windows 10) +description: This topic lists new and updated topics in the Deploy Windows 10 documentation for Windows 10 and Windows 10 Mobile. +ms.assetid: 19C50373-6B25-4F5C-A6EF-643D36904349 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Change history for Deploy Windows 10 + + +This topic lists new and updated topics in the [Deploy Windows 10](deploy-windows-10.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). + +## December 2015 + + +| New or changed topic | Description | +|-------------------------------------------------------------------------------------------|-------------| +| [Activate using Key Management Service](activate-using-key-management-service-client.md) | Updated | +| [Windows 10 edition upgrade](windows-10-edition-upgrades.md) | Updated | + +  + +## November 2015 + + +| New or changed topic | Description | +|---------------------------------------------------------------|-------------| +| [Windows 10 edition upgrade](windows-10-edition-upgrades.md) | New | + +  + +## Related topics + + +[Change history for What's new in Windows 10](../whats-new/change-history-for-what-s-new-in-windows-10.md) + +[Change history for Plan for Windows 10 deployment](../plan/change-history-for-plan-for-windows-10-deployment.md) + +[Change history for Keep Windows 10 secure](../keep-secure/change-history-for-keep-windows-10-secure.md) + +[Change history for Manage and update Windows 10](../manage/change-history-for-manage-and-update-windows-10.md) + +  + +  + + + + + diff --git a/windows/deploy/choose-a-migration-store-type-usmt-win7-usmt-win8.md b/windows/deploy/choose-a-migration-store-type-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..07f05e35d7 --- /dev/null +++ b/windows/deploy/choose-a-migration-store-type-usmt-win7-usmt-win8.md @@ -0,0 +1,60 @@ +--- +title: Choose a Migration Store Type (Windows 10) +description: Choose a Migration Store Type +ms.assetid: 4e163e90-9c57-490b-b849-2ed52ab6765f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Choose a Migration Store Type + + +One of the main considerations for planning your migration is to determine which migration store type best meets your needs. As part of these considerations, determine how much space is required to run the User State Migration Tool (USMT) 10.0 components on your source and destination computers, and how much space is needed to create and host the migration store, whether you are using a local share, network share, or storage device. The final consideration is ensuring that user date integrity is maintained by encrypting the migration store. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + +

[Migration Store Types Overview](migration-store-types-overview.md)

Choose the migration store type that works best for your needs and migration scenario.

[Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md)

Estimate the amount of disk space needed for computers in your organization based on information about your organization's infrastructure.

[Hard-Link Migration Store](hard-link-migration-store-usmt-win8.md)

Learn about hard-link migration stores and the scenarios in which they are used.

[Migration Store Encryption](migration-store-encryption-usmt-win8.md)

Learn about the using migration store encryption to protect user data integrity during a migration.

+ +  + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +[User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md) + +  + +  + + + + + diff --git a/windows/deploy/common-issues-usmt-win8.md b/windows/deploy/common-issues-usmt-win8.md new file mode 100644 index 0000000000..5be6c43f91 --- /dev/null +++ b/windows/deploy/common-issues-usmt-win8.md @@ -0,0 +1,307 @@ +--- +title: Common Issues (Windows 10) +description: Common Issues +ms.assetid: 5a37e390-8617-4768-9eee-50397fbbb2e1 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Common Issues + + +The following sections discuss common issues that you might see when you run the User State Migration Tool (USMT) 10.0 tools. USMT produces log files that describe in further detail any errors that occurred during the migration process. These logs can be used to troubleshoot migration failures. + +## In This Topic + + +[User Account Problems](#User) + +[Command-line Problems](#Command) + +[XML File Problems](#XML) + +[Migration Problems](#Migration) + +[Offline Migration Problems](#BKMK_Offline) + +[Hard Link Migration Problems](#BKMK_Hardlink) + +## General Guidelines for Identifying Migration Problems + + +When you encounter a problem or error message during migration, you can use the following general guidelines to help determine the source of the problem: + +- Examine the ScanState, LoadState, and UsmtUtils logs to obtain the exact USMT error messages and Windows® application programming interface (API) error messages. For more information about USMT return codes and error messages, see [Return Codes](return-codes-usmt-win8.md). For more information about Windows API error messages, type **nethelpmsg** on the command line. + + In most cases, the ScanState and LoadState logs indicate why a USMT migration is failing. We recommend that you use the **/v***:5* option when testing your migration. This verbosity level can be adjusted in a production migration; however, reducing the verbosity level might make it more difficult to diagnose failures that are encountered during production migrations. You can use a verbosity level higher than 5 if you want the log files output to go to a debugger. + + **Note**   + Running the ScanState and LoadState tools with the **/v***:5* option creates a detailed log file. Although this option makes the log file large, the extra detail can help you determine where migration errors occurred. + +   + +- Use the **/Verify** option in the UsmtUtils tool to determine whether any files in a compressed migration store are corrupted. For more information, see [Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md). + +- Use the **/Extract** option in the UsmtUtils tool to extract files from a compressed migration store. For more information, see [Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md). + +- Create a progress log using the **/Progress** option to monitor your migration. + +- For the source and destination computers, obtain operating system information, and versions of applications such as Internet Explorer and any other relevant programs. Then verify the exact steps that are needed to reproduce the problem. This information might help you to understand what is wrong and to reproduce the issue in your testing environment. + +- Log off after you run the LoadState tool. Some settings—for example, fonts, desktop backgrounds, and screen-saver settings—will not take effect until the next time the end user logs on. + +- Close all applications before running ScanState or LoadState tools. If some applications are running during the ScanState or LoadState process, USMT might not migrate some data. For example, if Microsoft Outlook® is open, USMT might not migrate PST files. + + **Note**   + USMT will fail if it cannot migrate a file or setting unless you specify the **/c** option. When you specify the **/c** option, USMT ignores errors. However, it logs an error when it encounters a file that is in use that did not migrate. + +   + +## User Account Problems + + +The following sections describe common user account problems. Expand the section to see recommended solutions. + +### I'm having problems creating local accounts on the destination computer. + +**Resolution:** For more information about creating accounts and migrating local accounts, see [Migrate User Accounts](migrate-user-accounts-usmt.md). + +### Not all of the user accounts were migrated to the destination computer. + +**Causes/Resolutions** There are two possible causes for this problem: + +When running the ScanState tool on Windows Vista, or the ScanState and LoadState tools on Windows 7, Windows 8, or Windows 10, you must run them in Administrator mode from an account with administrative credentials to ensure that all specified users are migrated. To run in Administrator mode: + +1. Click **Start**. + +2. Click **All Programs**. + +3. Click **Accessories**. + +4. Right-click **Command Prompt**. + +5. Click **Run as administrator**. + +Then specify your LoadState or ScanState command. If you do not run USMT in Administrator mode, only the user profile that is logged on will be included in the migration. + +Any user accounts on the computer that have not been used will not be migrated. For example, if you add User1 to the computer, but User1 never logs on, then USMT will not migrate the User1 account. + +### User accounts that I excluded were migrated to the destination computer. + +**Cause:** The command that you specified might have had conflicting **/ui** and **/ue** options. If a user is specified with the **/ui** option and is also specified to be excluded with either the **/ue** or **/uel** options, the user will be included in the migration. For example, if you specify `/ui:domain1\* /ue:domain1\user1`, then User1 will be migrated because the **/ui** option takes precedence. + +**Resolution:** For more information about how to use the **/ui** and **/ue** options together, see the examples in the [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) topic. + +### I am using the /uel option, but many accounts are still being included in the migration. + +**Cause** The **/uel** option depends on the last modified date of the users' NTUser.dat file. There are scenarios in which this last modified date might not match the users' last logon date. + +**Resolution** This is a limitation of the **/uel** option. You might need to exclude these users manually with the **/ue** option. + +### The LoadState tool reports an error as return code 71 and fails to restore a user profile during a migration test. + +**Cause:** During a migration test, if you run the ScanState tool on your test computer and then delete user profiles in order to test the LoadState tool on the same computer, you may have a conflicting key present in the registry. Using the **net use** command to remove a user profile will delete folders and files associated with that profile, but will not remove the registry key. + +**Resolution:** To delete a user profile, use the **User Accounts** item in Control Panel. To correct an incomplete deletion of a user profile: + +1. Open the registry editor by typing `regedit` at an elevated command prompt. + +2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList`. + + Each user profile is stored in a System Identifier key under `ProfileList`. + +3. Delete the key for the user profile you are trying to remove. + +### Files that were not encrypted before the migration are now encrypted with the account used to run the LoadState tool. + +**Cause:** The ScanState tool was run using the **/EFS: copyraw** option to migrate encrypted files and Encrypting File System (EFS) certificates. The encryption attribute was set on a folder that was migrated, but the attribute was removed from file contents of that folder prior to migration. + +**Resolution:** Before using the ScanState tool for a migration that includes encrypted files and EFS certificates, you can run the Cipher tool at the command prompt to review and change encryption settings on files and folders. You must remove the encryption attribute from folders that contain unencrypted files or encrypt the contents of all files within an encrypted folder. + +To remove encryption from files that have already been migrated incorrectly, you must log on to the computer with the account that you used to run the LoadState tool and then remove the encryption from the affected files. + +### The LoadState tool reports an error as return code 71 and a Windows Error 2202 in the log file. + +**Cause:** The computer name was changed during an offline migration of a local user profile. + +**Resolution:** You can use the **/mu** option when you run the LoadState tool to specify a new name for the user. For example, + +``` syntax +loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore +/progress:prog.log /l:load.log /mu:fareast\user1:farwest\user1 +``` + +## Command-line Problems + + +The following sections describe common command-line problems. Expand the section to see recommended solutions. + +### I received the following error message: "Usage Error: You cannot specify a file path with any of the command-line options that exceeds 256 characters." + +**Cause:** You might receive this error message in some cases even if you do not specify a long store or file path, because the path length is calculated based on the absolute path. For example, if you run the **scanstate.exe /o store** command from C:\\Program Files\\USMT40, then each character in "`C:\Program Files\USMT40`" will be added to the length of "store" to get the length of the path. + +**Resolution:** Ensure that the total path length—the store path plus the current directory—does not exceed 256 characters. + +### I received the following error message: "USMT was unable to create the log file(s). Ensure that you have write access to the log directory." + +**Cause:** If you are running the ScanState or LoadState tools from a shared network resource, you will receive this error message if you do not specify **/l**. + +**Resolution:** To fix this issue in this scenario, specify the **/l:scan.log** or **/l:load.log** option. + +## XML File Problems + + +The following sections describe common XML file problems. Expand the section to see recommended solutions. + +### I used the /genconfig option to create a Config.xml file, but I see only a few applications and components that are in MigApp.xml. Why does Config.xml not contain all of the same applications? + +**Cause:** Config.xml will contain only operating system components, applications, and the user document sections that are in both of the .xml files and are installed on the computer when you run the **/genconfig** option. Otherwise, these applications and components will not appear in the Config.xml file. + +**Resolution:** Install all of the desired applications on the computer before running the **/genconfig** option. Then run ScanState with all of the .xml files. For example, run the following: + +`scanstate /genconfig:config.xml /i:migdocs.xml /i:migapp.xml /v:5 /l:scanstate.log` + +### I am having problems with a custom .xml file that I authored, and I cannot verify that the syntax is correct. + +**Resolution:** You can load the XML schema (MigXML.xsd), included with USMT, into your XML authoring tool. For examples, see the [Visual Studio Development Center](http://go.microsoft.com/fwlink/p/?LinkId=74513). Then, load your .xml file in the authoring tool to see if there is a syntax error. In addition, see [USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) for more information about using the XML elements. + +### I am using a MigXML helper function, but the migration isn’t working the way I expected it to.  How do I troubleshoot this issue? + +**Cause:** Typically, this issue is caused by incorrect syntax used in a helper function. You receive a Success return code, but the files you wanted to migrate did not get collected or applied, or weren’t collected or applied in the way you expected. + +**Resolution:** You should search the ScanState or LoadState log for either the component name which contains the MigXML helper function, or the MigXML helper function title, so that you can locate the related warning in the log file. + +## Migration Problems + + +The following sections describe common migration problems. Expand the section to see recommended solutions. + +### Files that I specified to exclude are still being migrated. + +**Cause:** There might be another rule that is including the files. If there is a more specific rule or a conflicting rule, the files will be included in the migration. + +**Resolution:** For more information, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) and the Diagnostic Log section in [Log Files](log-files-usmt-win7-usmt-win8.md). + +### I specified rules to move a folder to a specific location on the destination computer, but it has not migrated correctly. + +**Cause:** There might be an error in the XML syntax. + +**Resolution:** You can use the USMT XML schema (MigXML.xsd) to write and validate migration .xml files. Also see the XML examples in the following topics: + +[Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) + +[Exclude Files and Settings](exclude-files-and-settings-usmt.md) + +[Reroute Files and Settings](reroute-files-and-settings-usmt.md) + +[Include Files and Settings](include-files-and-settings-usmt.md) + +[Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md) + +### After LoadState completes, the new desktop background does not appear on the destination computer. + +There are three typical causes for this issue. + +**Cause \#1:**: Some settings such as fonts, desktop backgrounds, and screen-saver settings are not applied by LoadState until after the destination computer has been restarted. + +**Resolution:** To fix this issue, log off, and then log back on to see the migrated desktop background. + +**Cause \#2:** If the source computer was running Windows® XP and the desktop background was stored in the *Drive*:\\WINDOWS\\Web\\Wallpaper folder—the default folder where desktop backgrounds are stored in Windows XP—the desktop background will not be migrated. Instead, the destination computer will have the default Windows® desktop background. This will occur even if the desktop background was a custom picture that was added to the \\WINDOWS\\Web\\Wallpaper folder. However, if the end user sets a picture as the desktop background that was saved in another location, for example, My Pictures, then the desktop background will migrate. + +**Resolution:** Ensure that the desktop background images that you want to migrate are not in the \\WINDOWS\\Web\\Wallpaper folder on the source computer. + +**Cause \#3:** If ScanState was not run on Windows XP from an account with administrative credentials, some operating system settings will not migrate. For example, desktop background settings, screen-saver selections, modem options, media-player settings, and Remote Access Service (RAS) connection phone book (.pbk) files and settings will not migrate. + +**Resolution:** Run the ScanState and LoadState tools from within an account with administrative credentials. + +### I included MigApp.xml in the migration, but some PST files aren’t migrating. + +**Cause:** The MigApp.xml file migrates only the PST files that are linked to Outlook profiles. + +**Resolution:** To migrate PST files that are not linked to Outlook profiles, you must create a separate migration rule to capture these files. + +## Offline Migration Problems + + +The following sections describe common offline migration problems. Expand the section to see recommended solutions. + +### Some of my system settings do not migrate in an offline migration. + +**Cause:** Some system settings, such as desktop backgrounds and network printers, are not supported in an offline migration. For more information, see [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) + +**Resolution:** In an offline migration, these system settings must be restored manually. + +### The ScanState tool fails with return code 26. + +**Cause:** A common cause of return code 26 is that a temp profile is active on the source computer. This profile maps to c:\\users\\temp. The ScanState log shows a MigStartupOfflineCaught exception that includes the message "User profile duplicate SID error". + +**Resolution:** You can reboot the computer to get rid of the temp profile or you can set MIG\_FAIL\_ON\_PROFILE\_ERROR=0 to skip the error and exclude the temp profile. + +### Include and Exclude rules for migrating user profiles do not work the same offline as they do online. + +**Cause:** When offline, the DNS server cannot be queried to resolve the user name and SID mapping. + +**Resolution:** Use a Security Identifier (SID) to include a user when running the ScanState tool. For example: + +``` syntax +Scanstate /ui:S1-5-21-124525095-708259637-1543119021* +``` + +The wild card (\*) at the end of the SID will migrate the *SID*\_Classes key as well. + +You can also use patterns for SIDs that identify generic users or groups. For example, you can use the */ue:\*-500* option to exclude the local administrator accounts. For more information about Windows SIDs, see [this Microsoft Web site](http://go.microsoft.com/fwlink/p/?LinkId=190277). + +### My script to wipe the disk fails after running the ScanState tool on a 64-bit system. + +**Cause:** The HKLM registry hive is not unloaded after the ScanState tool has finished running. + +**Resolution:** Reboot the computer or unload the registry hive at the command prompt after the ScanState tool has finished running. For example, at a command prompt, type: + +``` syntax +reg.exe unload hklm\$dest$software +``` + +## Hard-Link Migration Problems + + +The following sections describe common hard-link migration problems. Expand the section to see recommended solutions. + +### EFS files are not restored to the new partition. + +**Cause:** EFS files cannot be moved to a new partition with a hard link. The **/efs:hardlink** command-line option is only applicable to files migrated on the same partition. + +**Resolution:** Use the **/efs:copyraw** command-line option to copy EFS files during the migration instead of creating hard links, or manually copy the EFS files from the hard-link store. + +### The ScanState tool cannot delete a previous hard-link migration store. + +**Cause:** The migration store contains hard links to locked files. + +**Resolution:** Use the UsmtUtils tool to delete the store or change the store name. For example, at a command prompt, type: + +``` syntax +USMTutils /rd +``` + +You should also reboot the machine. + +## Related topics + + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +[Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md) + +[Return Codes](return-codes-usmt-win8.md) + +[UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/common-migration-scenarios-usmt-win7-usmt-win8.md b/windows/deploy/common-migration-scenarios-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..59a55c11e2 --- /dev/null +++ b/windows/deploy/common-migration-scenarios-usmt-win7-usmt-win8.md @@ -0,0 +1,149 @@ +--- +title: Common Migration Scenarios (Windows 10) +description: Common Migration Scenarios +ms.assetid: 1d8170d5-e775-4963-b7a5-b55e8987c1e4 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Common Migration Scenarios + + +You use the User State Migration Tool (USMT) 10.0 when hardware and/or operating system upgrades are planned for a large number of computers. USMT manages the migration of an end-user's digital identity by capturing the user's operating-system settings, application settings, and personal files from a source computer and reinstalling them on a destination computer after the upgrade has occurred. + +One common scenario when only the operating system, and not the hardware, is being upgraded is referred to as *PC refresh*. A second common scenario is known as *PC replacement*, where one piece of hardware is being replaced, typically by newer hardware and a newer operating system. + +## In This Topic + + +[PC Refresh](#BKMK_PCRefresh) + +[Scenario One: PC-refresh offline using Windows PE and a hard-link migration store](#BKMK_OnePCRefresh) + +[Scenario Two: PC-refresh using a compressed migration store](#BKMK_TwoPCRefresh) + +[Scenario Three: PC-refresh using a hard-link migration store](#BKMK_ThreePCRefresh) + +[Scenario Four: PC-refresh using Windows.old folder and a hard-link migration store](#BKMK_FourPCRefresh) + +[PC Replacement](#BKMK_PCReplace) + +[Scenario One: Offline migration using Windows PE and an external migration store](#BKMK_OnePCReplace) + +[Scenario Two: Manual network migration](#BKMK_TwoPCReplace) + +[Scenario Three: Managed network migration](#BKMK_ThreePCReplace) + +## PC-Refresh + + +The following diagram shows a PC-refresh migration, also known as a computer refresh migration. First, the administrator migrates the user state from a source computer to an intermediate store. After installing the operating system, the administrator migrates the user state back to the source computer. + +  + +![usmt pc refresh scenario](images/dep-win8-l-usmt-pcrefresh.jpg) + +  + +### Scenario One: PC-refresh offline using Windows PE and a hard-link migration store + +A company has just received funds to update the operating system on all of its computers in the accounting department to Windows 10. Each employee will keep the same computer, but the operating system on each computer will be updated. In this scenario, the update is being handled completely offline, without a network connection. An administrator uses Windows Preinstallation Environment (WinPE) and a hard-link migration store to save each user state to their respective computer. + +1. On each computer, the administrator boots the machine into WinPE and runs the ScanState command-line tool, specifying the **/hardlink /nocompress** command-line options. ScanState saves the user state to a hard-link migration store on each computer, improving performance by minimizing network traffic as well as minimizing migration failures on computers with very limited space available on the hard drive. + +2. On each computer, the administrator installs the company’s standard operating environment (SOE) which includes Windows 10 and other company applications. + +3. The administrator runs the LoadState command-line tool on each computer. LoadState restores each user state back to each computer. + +### Scenario Two: PC-refresh using a compressed migration store + +A company has just received funds to update the operating system on all of its computers to Windows 10. Each employee will keep the same computer, but the operating system on each computer will be updated. In this scenario, an administrator uses a compressed migration store to save the user states to a server. + +1. The administrator runs the ScanState command-line tool on each computer. ScanState saves each user state to a server. + +2. On each computer, the administrator installs the company's standard SOE which includes Windows 10 and other company applications. + +3. The administrator runs the LoadState command-line tool on each source computer, and LoadState restores each user state back to the computer. + +### Scenario Three: PC-refresh using a hard-link migration store + +A company has just received funds to update the operating system on all of its computers to Windows 10. Each employee will keep the same computer, but the operating system on each computer will be updated. In this scenario, an administrator uses a hard-link migration store to save each user state to their respective computer. + +1. The administrator runs the ScanState command-line tool on each computer, specifying the **/hardlink /nocompress** command-line options. ScanState saves the user state to a hard-link migration store on each computer, improving performance by minimizing network traffic as well as minimizing migration failures on computers with very limited space available on the hard drive. + +2. On each computer, the administrator installs the company's SOE which includes Windows 10 and other company applications. + +3. The administrator runs the LoadState command-line tool on each computer. LoadState restores each user state back on each computer. + +### Scenario Four: PC-refresh using Windows.old folder and a hard-link migration store + +A company has decided to update the operating system on all of its computers to Windows 10. Each employee will keep the same computer, but the operating system on each computer will be updated. In this scenario, an administrator uses Windows.old and a hard-link migration store to save each user state to their respective computer. + +1. The administrator clean installs Windows 10 on each computer, making sure that the Windows.old directory is created by installing Windows 10 without formatting or repartitioning and by selecting a partition that contains the previous version of Windows. + +2. On each computer, the administrator installs the company’s SOE which includes company applications. + +3. The administrator runs the ScanState and LoadState command-line tools successively on each computer while specifying the **/hardlink /nocompress** command-line options. + +## PC-Replacement + + +The following diagram shows a PC-replacement migration. First, the administrator migrates the user state from the source computer to an intermediate store. After installing the operating system on the destination computer, the administrator migrates the user state from the store to the destination computer. + +  + +![usmt pc replace scenario](images/dep-win8-l-usmt-pcreplace.jpg) + +  + +### Scenario One: Offline migration using WinPE and an external migration store + +A company is allocating 20 new computers to users in the accounting department. The users each have a source computer with their files and settings. In this scenario, migration is being handled completely offline, without a network connection. + +1. On each source computer, an administrator boots the machine into WinPE and runs ScanState to collect the user state to either a server or an external hard disk. + +2. On each new computer, the administrator installs the company's SOE which includes Windows 10 and other company applications. + +3. On each of the new computers, the administrator runs the LoadState tool, restoring each user state from the migration store to one of the new computers. + +### Scenario Two: Manual network migration + +A company receives 50 new laptops for their managers and needs to reallocate 50 older laptops to new employees. In this scenario, an administrator runs the ScanState tool from the cmd prompt on each computer to collect the user states and save them to a server in a compressed migration store. + +1. The administrator runs the ScanState tool on each of the manager’s old laptops, and saves each user state to a server. + +2. On the new laptops, the administrator installs the company's SOE, which includes Windows 10 and other company applications. + +3. The administrator runs the LoadState tool on the new laptops to migrate the managers’ user states to the appropriate computer. The new laptops are now ready for the managers to use. + +4. On the old computers, the administrator installs the company’s SOE, which includes Windows 10, Microsoft Office, and other company applications. The old computers are now ready for the new employees to use. + +### Scenario Three: Managed network migration + +A company is allocating 20 new computers to users in the accounting department. The users each have a source computer that contains their files and settings. An administrator uses a management technology such as a logon script or a batch file to run ScanState on each source computer to collect the user states and save them to a server in a compressed migration store. + +1. On each source computer, the administrator runs the ScanState tool using Microsoft System Center Configuration Manager (SCCM), Microsoft Deployment Toolkit (MDT), a logon script, a batch file, or a non-Microsoft management technology. ScanState collects the user state from each source computer and then saves it to a server. + +2. On each new computer, the administrator installs the company's SOE, which includes Windows 10 and other company applications. + +3. On each of the new computers, the administrator runs the LoadState tool using System Center Configuration Manager, a logon script, a batch file, or a non-Microsoft management technology. LoadState migrates each user state from the migration store to one of the new computers. + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +[Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md) + +[Offline Migration Reference](offline-migration-reference.md) + +  + +  + + + + + diff --git a/windows/deploy/configure-client-computers-vamt-30-win8.md b/windows/deploy/configure-client-computers-vamt-30-win8.md new file mode 100644 index 0000000000..81ba303192 --- /dev/null +++ b/windows/deploy/configure-client-computers-vamt-30-win8.md @@ -0,0 +1,134 @@ +--- +title: Configure Client Computers (Windows 10) +description: Configure Client Computers +ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Configure Client Computers + + +To enable the Volume Activation Management Tool (VAMT) to function correctly, certain configuration changes are required on all client computers: + +- An exception must be set in the client computer's firewall. + +- A registry key must be created and set properly, for computers in a workgroup; otherwise, Windows® User Account Control (UAC) will not allow remote administrative operations. + +Organizations where the VAMT will be widely used may benefit from making these changes inside the master image for Windows. + +**Important**   +This procedure only applies to clients running Windows Vista or later. For clients running Windows XP Service Pack 1, see [Connecting Through Windows Firewall](http://go.microsoft.com/fwlink/p/?LinkId=182933). + +  + +## Configuring the Windows Firewall to allow VAMT access + + +Enable the VAMT to access client computers using the **Windows Firewall** Control Panel: + +1. Open Control Panel and double-click **System and Security**. + +2. Click **Windows Firewall**. + +3. Click **Allow a program or feature through Windows Firewall**. + +4. Click the **Change settings** option. + +5. Select the **Windows Management Instrumentation (WMI)** checkbox. + +6. Click **OK**. + +**Warning**   +By default, Windows Firewall Exceptions only apply to traffic originating on the local subnet. To expand the exception to apply to multiple subnets, you need to change the exception settings in the Windows Firewall with Advanced Security, as described below. + +  + +## Configure Windows Firewall to allow VAMT access across multiple subnets + + +Enable the VAMT to access client computers across multiple subnets using the **Windows Firewall with Advanced Security** Control Panel: + +![vamt firewall configuration for multiple subnets](images/dep-win8-l-vamt-firewallconfigurationformultiplesubnets.gif) + +1. Open the Control Panel and double-click **Administrative Tools**. + +2. Click **Windows Firewall with Advanced Security**. + +3. For each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private), make the changes listed in steps a-c: + + - Windows Management Instrumentation (ASync-In) + + - Windows Management Instrumentation (DCOM-In) + + - Windows Management Instrumentation (WMI-In) + + 1. In the **Windows Firewall with Advanced Security** dialog box, select **Inbound Rules** from the left-hand panel. + + 2. Right-click the desired rule and select **Properties** to open the **Properties** dialog box. + + 3. On the **General** tab, select the **Allow the connection** checkbox. + + 4. On the **Scope** tab, change the Remote IP Address setting from "Local Subnet" (default) to allow the specific access you need. + + 5. On the **Advanced** tab, verify selection of all profiles that are applicable to the network (Domain or Private/Public). + +In certain scenarios, only a limited set of TCP/IP ports are allowed through a hardware firewall. Administrators must ensure that WMI (which relies on RPC over TCP/IP) is allowed through these types of firewalls. By default, the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically-allocated ports. This is useful if, for example, the hardware firewall only allows traffic in a certain range of ports. + +For more info, see [How to configure RPC dynamic port allocation to work with firewalls](http://go.microsoft.com/fwlink/p/?LinkId=182911). + +## Create a registry value for the VAMT to access workgroup-joined computers + + +**Caution**   +This section contains information about how to modify the registry. Make sure to back up the registry before you modify it; in addition, ensure that you know how to restore the registry, if a problem occurs. For more information about how to back up, restore, and modify the registry, see [Windows registry information for advanced users](http://go.microsoft.com/fwlink/p/?LinkId=182912). + +  + +On the client computer, create the following registry key using regedit.exe. + +1. Navigate to `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system` + +2. Enter the following details: + + **Value Name: LocalAccountTokenFilterPolicy** + + **Type: DWORD** + + **Value Data: 1** + +**Note**   +To discover VAMT-manageable Windows computers in workgroups, you must enable network discovery on each client. + +  + +## Deployment options + + +There are several options for organizations to configure the WMI firewall exception for computers: + +- **Image.** Add the configurations to the master Windows image deployed to all clients. + +- **Group Policy.** If the clients are part of a domain, then all clients can be configured using Group Policy. The Group Policy setting for the WMI firewall exception is found in GPMC.MSC at: **Computer Configuration\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Inbound Rules**. + +- **Script.** Execute a script using Microsoft System Center Configuration Manager or a third-party remote script execution facility. + +- **Manual.** Configure the WMI firewall exception individually on each client. + +The above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. In order to allow VAMT to query the up-to-date licensing status, the WMI exception must be maintained. We recommend administrators consult their network security policies and make clear decisions when creating the WMI exception. + +## Related topics + + +[Install and Configure VAMT](install-and-configure-vamt-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/configure-mdt-2013-for-userexit-scripts.md b/windows/deploy/configure-mdt-2013-for-userexit-scripts.md new file mode 100644 index 0000000000..cc1c3d23bd --- /dev/null +++ b/windows/deploy/configure-mdt-2013-for-userexit-scripts.md @@ -0,0 +1,89 @@ +--- +title: Configure MDT for UserExit scripts (Windows 10) +description: In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address. +ms.assetid: 29a421d1-12d2-414e-86dc-25b62f5238a7 +keywords: ["rules, script"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Configure MDT for UserExit scripts + + +**In this article** + +- [Configure the rules to call a UserExit script](#configure_the_rules_to_call_a_userexit_script) +- [The Setname.vbs UserExit script](#the_setname.vbs_userexit_script) +- [Related topics](#related_topics) + +In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address. MDT supports calling external VBScripts as part of the Gather process; these scripts are referred to as UserExit scripts. The script also removes the colons in the MAC Address. + +## Configure the rules to call a UserExit script + + +You can call a UserExit by referencing the script in your rules. Then you can configure a property to be set to the result of a function of the VBScript. In this example, we have a VBScript named Setname.vbs (provided in the book sample files, in the UserExit folder). + +``` syntax +[Settings] +Priority=Default +[Default] +OSINSTALL=YES +UserExit=Setname.vbs +OSDComputerName=#SetName("%MACADDRESS%")# +``` + +The UserExit=Setname.vbs calls the script and then assigns the computer name to what the SetName function in the script returns. In this sample the %MACADDRESS% variable is passed to the script + +## The Setname.vbs UserExit script + + +The Setname.vbs script takes the MAC Address passed from the rules. The script then does some string manipulation to add a prefix (PC) and remove the semicolons from the MAC Address. + +``` syntax +Function UserExit(sType, sWhen, sDetail, bSkip) + UserExit = Success +End Function +Function SetName(sMac) + Dim re + Set re = new RegExp + re.IgnoreCase = true + re.Global = true + re.Pattern = ":" + SetName = "PC" & re.Replace(sMac, "") +End Function +``` + +The first three lines of the script make up a header that all UserExit scripts have. The interesting part is the lines between Function and End Function. Those lines add a prefix (PC), remove the colons from the MAC Address, and return the value to the rules by setting the SetName value. + +**Note**   +The purpose of this sample is not to recommend that you use the MAC Address as a base for computer naming, but to show you how to take a variable from MDT, pass it to an external script, make some changes to it, and then return the new value to the deployment process. + +  + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/configure-mdt-2013-settings.md b/windows/deploy/configure-mdt-2013-settings.md new file mode 100644 index 0000000000..5bb7696dc1 --- /dev/null +++ b/windows/deploy/configure-mdt-2013-settings.md @@ -0,0 +1,64 @@ +--- +title: Configure MDT settings (Windows 10) +description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) 2013 is its extension capabilities; there is virtually no limitation to what you can do in terms of customization. +ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122 +keywords: ["customize, customization, deploy, features, tools"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Configure MDT settings + + +One of the most powerful features in Microsoft Deployment Toolkit (MDT) 2013 is its extension capabilities; there is virtually no limitation to what you can do in terms of customization. In this topic, you learn about configuring customizations for your environment. + +For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-09-fig01.png) + +Figure 1. The machines used in this topic. + +## In this section + + +- [Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +- [Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +- [Use web services in MDT](use-web-services-in-mdt-2013.md) + +- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +  + +  + + + + + diff --git a/windows/deploy/configure-mdt-deployment-share-rules.md b/windows/deploy/configure-mdt-deployment-share-rules.md new file mode 100644 index 0000000000..d06c838dfb --- /dev/null +++ b/windows/deploy/configure-mdt-deployment-share-rules.md @@ -0,0 +1,143 @@ +--- +title: Configure MDT deployment share rules (Windows 10) +description: In this topic, you will learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine. +ms.assetid: b5ce2360-33cc-4b14-b291-16f75797391b +keywords: ["rules, configuration, automate, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Configure MDT deployment share rules + + +**In this article** + +- [Assign settings](#sec01) +- [Sample configurations](#sec02) +- [Related topics](#related_topics) + +In this topic, you will learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine. The rules engine in MDT is powerful: most of the settings used for operating system deployments are retrieved and assigned via the rules engine. In its simplest form, the rules engine is the CustomSettings.ini text file. + +## Assign settings + + +When using MDT, you can assign setting in three distinct ways: + +- You can pre-stage the information before deployment. + +- You can prompt the user or technician for information. + +- You can have MDT generate the settings automatically. + +In order illustrate these three options, let's look at some sample configurations. + +## Sample configurations + + +Before adding the more advanced components like scripts, databases, and web services, consider the commonly used configurations below; they demonstrate the power of the rules engine. + +### Set computer name by MAC Address + +If you have a small test environment, or simply want to assign settings to a very limited number of machines, you can edit the rules to assign settings directly for a given MAC Address. If you have many machines, it makes sense to use the database instead. + +``` syntax +[Settings] +Priority=MacAddress, Default +[Default] +OSInstall=YES +[00:15:5D:85:6B:00] +OSDComputerName=PC00075 +``` + +In the preceding sample, you set the PC00075 computer name for a machine with a MAC Address of 00:15:5D:85:6B:00. + +### Set computer name by serial number + +Another way to assign a computer name is to identify the machine via its serial number. + +``` syntax +[Settings] +Priority=SerialNumber, Default +[Default] +OSInstall=YES +[CND0370RJ7] +OSDComputerName=PC00075 +``` + +In this sample, you set the PC00075 computer name for a machine with a serial number of CND0370RJ7. + +### Generate a computer name based on a serial number + +You also can configure the rules engine to use a known property, like a serial number, to generate a computer name on the fly. + +``` syntax +[Settings] +Priority=Default +[Default] +OSInstall=YES +OSDComputerName=PC-%SerialNumber% +``` + +In this sample, you configure the rules to set the computer name to a prefix (PC-) and then the serial number. If the serial number of the machine is CND0370RJ7, the preceding configuration sets the computer name to PC-CND0370RJ7. + +**Note**   +Be careful when using the serial number to assign computer names. A serial number can contain more than 15 characters, but the Windows setup limits a computer name to 15 characters. + +  + +### Generate a limited computer name based on a serial number + +To avoid assigning a computer name longer than 15 characters, you can configure the rules in more detail by adding VBScript functions, as follows: + +``` syntax +[Settings] +Priority=Default +[Default] +OSInstall=YES +OSDComputerName=PC-#Left(?%SerialNumber%?,12)# +``` + +In the preceding sample, you still configure the rules to set the computer name to a prefix (PC-) followed by the serial number. However, by adding the Left VBScript function, you configure the rule to use only the first 12 serial-number characters for the name. + +### Add laptops to a different organizational unit (OU) in Active Directory + +In the rules, you find built-in properties that use a Windows Management Instrumentation (WMI) query to determine whether the machine you are deploying is a laptop, desktop, or server. In this sample, we assume you want to add laptops to different OUs in Active Directory. Note that ByLaptopType is not a reserved word; rather, it is the name of the section to read. + +``` syntax +[Settings] +Priority=ByLaptopType, Default +[Default] +MachineObjectOU=OU=Workstations,OU=Contoso,DC=contoso,DC=com +[ByLaptopType] +Subsection=Laptop-%IsLaptop% +[Laptop-True] +MachineObjectOU=OU=Laptops,OU=Contoso,DC=contoso,DC=com +``` + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/configxml-file-usmt-win7-usmt-win8.md b/windows/deploy/configxml-file-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..80691df55a --- /dev/null +++ b/windows/deploy/configxml-file-usmt-win7-usmt-win8.md @@ -0,0 +1,584 @@ +--- +title: Config.xml File (Windows 10) +description: Config.xml File +ms.assetid: 9dc98e76-5155-4641-bcb3-81915db538e8 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Config.xml File + + +## Config.xml File + + +The Config.xml file is an optional User State Migration Tool (USMT) 10.0 file that you can create using the **/genconfig** option with the ScanState.exe tool. If you want to include all of the default components, and do not want to change the default store-creation or profile-migration behavior, you do not need to create a Config.xml file. + +However, if you are satisfied with the default migration behavior defined in the MigApp.xml, MigUser.xml and MigDocs.xml files, but you want to exclude certain components, you can create and modify a Config.xml file and leave the other .xml files unchanged. For example, you must create and modify the Config.xml file if you want to exclude any of the operating-system settings that are migrated. It is necessary to create and modify this file if you want to change any of the default store-creation or profile-migration behavior. + +The Config.xml file has a different format than the other migration .xml files, because it does not contain any migration rules. It contains only a list of the operating-system components, applications, user documents that can be migrated, as well as user-profile policy and error-control policy. For this reason, excluding components using the Config.xml file is easier than modifying the migration .xml files, because you do not need to be familiar with the migration rules and syntax. However, you cannot use wildcard characters in this file. + +For more information about using the Config.xml file with other migration files, such as the MigDocs.xml and MigApps.xml files, see [Understanding Migration XML Files](understanding-migration-xml-files.md). + +**Note**   +To exclude a component from the Config.xml file, set the **migrate** value to **"no"**. Deleting the XML tag for the component from the Config.xml file will not exclude the component from your migration. + +  + +## In This Topic + + +In USMT there are new migration policies that can be configured in the Config.xml file. For example, you can configure additional **<ErrorControl>**, **<ProfileControl>**, and **<HardLinkStoreControl>** options. The following elements and parameters are for use in the Config.xml file only. + +[<Policies>](#BKMK_Policies) + +[<ErrorControl>](#BKMK_ErrorControl) + +[<fatal>](#BKMK_fatal) + +[<fileError>](#BKMK_fileError) + +[<nonfatal>](#BKMK_nonFatal) + +[<registryError>](#BKMK_registryError) + +[<HardLinkStoreControl>](#BKMK_HardLinkStoreControl) + +[<fileLocked>](#BKMK_fileLock) + +[<createHardLink>](#BKMK_createHardLink) + +[<errorHardLink>](#BKMK_errorHardLink) + +[<ProfileControl>](#BKMK_ProfileControl) + +[<localGroups>](#BKMK_localGroups) + +[<mappings>](#BKMK_mappings) + +[<changeGroup>](#BKMK_changeGrou) + +[<include>](#BKMK_include) + +[<exclude>](#BKMK_exclude) + +[Sample Config.xml File](#BKMK_SampleConfigXJMLfile) + +## <Policies> + + +The **<Policies>** element contains elements that describe the policies that USMT follows while creating a migration store. Valid children of the **<Policies>** element are **<ErrorControl>** and **<HardLinkStoreControl>**. The **<Policies>** element is a child of **<Configuration>**. + +Syntax: ` ` + +## <ErrorControl> + + +The **<ErrorControl>** element is an optional element you can configure in the Config.xml file. The configurable **<ErrorControl>** rules support only the environment variables for the operating system that is running and the currently logged-on user. As a workaround, you can specify a path using the (\*) wildcard character. + +- **Number of occurrences**: Once for each component + +- **Parent elements**: The **<Policies>** element + +- **Child elements**: The **<fileError>** and **<registryError>** element + +Syntax: `` + +The following example specifies that all locked files, regardless of their location (including files in C:\\Users), should be ignored. However, the migration fails if any file in C:\\Users cannot be accessed because of any other reason. In the example below, the **<ErrorControl>** element ignores any problems in migrating registry keys that match the supplied pattern, and it resolves them to an **Access denied** error. + +Additionally, the order in the **<ErrorControl>** section implies priority. In this example, the first **<nonFatal>** tag takes precedence over the second **<fatal>** tag. This precedence is applied, regardless of how many tags are listed. + +``` syntax + + + * [*] + C:\Users\* [*] + + + HKCU\SOFTWARE\Microsoft\* [*] + + +``` + +**Important**   +The configurable **<ErrorControl>** rules support only the environment variables for the operating system that is running and the currently logged-on user. As a workaround, you can specify a path using the (\*) wildcard character. + +  + +### <fatal> + +The **<fatal>** element is not required. + +- **Number of occurrences**: Once for each component + +- **Parent elements**: **<fileError>** and **<registryError>** + +- **Child elements**: None. + +Syntax: ``*<pattern>*`` + + +++++ + + + + + + + + + + + + + + +
ParameterRequiredValue

errorCode

No

"any" or "specify system error message here"

+ +  + +You use the **<fatal>** element to specify that errors matching a specific pattern should cause USMT to halt the migration. + +## <fileError> + + +The **<fileError>** element is not required. + +- **Number of occurrences**: Once for each component + +- **Parent elements**: **<ErrorControl>** + +- **Child elements**: **<nonFatal>** and **<fatal>** + +Syntax: `` + +You use the **<fileError>** element to represent the behavior associated with file errors. + +## <nonFatal> + + +The **<nonFatal>** element is not required. + +- **Number of occurrences**: Once for each component + +- **Parent elements**: The **<fileError>** and **<registryError>** elements. + +- **Child elements**: None. + +Syntax: ``*<pattern>*`` + + +++++ + + + + + + + + + + + + + + +
ParameterRequiredValue

<errorCode>

No

"any" or "specify system error message here". If system error messages are not specified, the default behavior applies the parameter to all system error messages.

+ +  + +You use the **<nonFatal>** element to specify that errors matching a specific pattern should not cause USMT to halt the migration. + +## <registryError> + + +The **<registryError>**element is not required. + +- **Number of occurrences**: Once for each component + +- **Parent elements**: **<ErrorControl>** + +- **Child elements**: **<nonfatal>** and **<fatal>** + +Syntax: `` + + +++++ + + + + + + + + + + + + + + +
ParameterRequiredValue

<errorCode>

No

"any" or "specify system error message here". If system error messages are not specified, the default behavior applies the parameter to all system error messages.

+ +  + +You use the **<registryError>** element to specify that errors matching a specific pattern should not cause USMT to halt the migration. + +## <HardLinkStoreControl> + + +The **<HardLinkStoreControl>** element contains elements that describe how to handle files during the creation of a hard-link migration store. Its only valid child is **<fileLocked>**. + +Syntax: ` ` + +- **Number of occurrences**: Once for each component + +- **Parent elements**: **<Policies>** + +- **Child elements**: **<fileLocked>** + +Syntax: `` + +The **<HardLinkStoreControl>** sample code below specifies that hard links can be created to locked files only if the locked file resides somewhere under C:\\Users\\. Otherwise, a file-access error occurs when a locked file is encountered that cannot be copied, even though is technically possible for the link to be created. + +**Important**   +The **<ErrorControl>** section can be configured to conditionally ignore file access errors, based on the file’s location. + +  + +``` syntax + + + + C:\Users\* + C:\* + + + + […] + + +``` + +## <fileLocked> + + +The **<fileLocked>** element contains elements that describe how to handle files that are locked for editing. The rules defined by the **<fileLocked>** element are processed in the order in which they appear in the XML file. + +Syntax: `` + +## <createHardLink> + + +The **<createHardLink>** element defines a standard MigXML pattern that describes file paths where hard links should be created, even if the file is locked for editing by another application. + +Syntax: ``*<pattern>*`` + +## <errorHardLink> + + +The **<errorHardLink>** element defines a standard MigXML pattern that describes file paths where hard links should not be created if the file is locked for editing by another application. USMT will attempt to copy files under these paths into the migration store. However, if that is not possible, **Error\_Locked** is thrown. This is a standard Windows application programming interface (API) error that can be captured by the **<ErrorControl>** section to either cause USMT to skip the file or abort the migration. + +Syntax: ``*<pattern>*`` + +## <ProfileControl> + + +This element is used to contain other elements that establish rules for migrating profiles, users, and policies around local group membership during the migration. **<ProfileMigration>** is a child of **<Configuration>**. + +Syntax: <`ProfileControl> ` + +## <localGroups> + + +This element is used to contain other elements that establish rules for how to migrate local groups. **<localGroups>** is a child of **<ProfileControl>**. + +Syntax: ` ` + +## <mappings> + + +This element is used to contain other elements that establish mappings between groups. + +Syntax: ` ` + +## <changeGroup> + + +This element describes the source and destination groups for a local group membership change during the migration. It is a child of **<localGroups>**. The following parameters are defined: + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
ParameterRequiredValue

From

Yes

A valid local group on the source machine that contains users selected for migration on the command line.

To

Yes

A local group that the users are to be moved to during the migration.

appliesTo

Yes

nonmigratedUsers, migratedUsers, AllUsers. This value defines which users the change group operation should apply to.

+ +  + +The valid and required children of **<changeGroup>** are **<include>** and **<exclude>**. Although both can be children at the same time, only one is required. + +Syntax: ` ` + +## <include> + + +This element specifies that its required child, *<pattern>*, should be included in the migration. + +Syntax: ```` + +## <exclude> + + +This element specifies that its required child, *<pattern>*, should be excluded from the migration. + +Syntax: ``` ` + +## Sample Config.xml File + + +Refer to the following sample Config.xml file for additional details about items you can choose to exclude from a migration. + +``` syntax + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/conflicts-and-precedence-usmt-win7-usmt-win8.md b/windows/deploy/conflicts-and-precedence-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..bad280c132 --- /dev/null +++ b/windows/deploy/conflicts-and-precedence-usmt-win7-usmt-win8.md @@ -0,0 +1,459 @@ +--- +title: Conflicts and Precedence (Windows 10) +description: Conflicts and Precedence +ms.assetid: 0e2691a8-ff1e-4424-879b-4d5a2f8a113a +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Conflicts and Precedence + + +When you include, exclude, and reroute files and settings, it is important to know how User State Migration Tool (USMT) 10.0 deals with conflicts and precedence. When working with USMT, the following are the most important conflicts and precedence guidelines to keep in mind. + +- **If there are conflicting rules within a component, the most specific rule is applied.** However, the <unconditionalExclude> rule is an exception because it takes precedence over all others. Directory names take precedence over file extensions. For examples, see [What happens when there are conflicting include and exclude rules?](#BKMK1) and the first example in [Include and exclude precedence examples](#PrecExamples)****later in this topic. + +- **Only rules inside the same component can affect each other, depending on specificity.** Rules that are in different components do not affect each other, except for the <unconditionalExclude> rule. + +- **If the rules are equally specific, <exclude> takes precedence over <include>.** For example, if you use the <exclude> rule to exclude a file and use the <include> rule to include the same file, the file will be excluded. + +- **The ordering of components does not matter.** It does not matter which components are listed in which .xml file, because each component is processed independently of the other components across all of the .xml files. + +- **The ordering of the <include> and <exclude> rules within a component does not matter.** + +- **You can use the <unconditionalExclude> element to globally exclude data.** This element excludes objects, regardless of any other <include> rules that are in the .xml files. For example, you can use the <unconditionalExclude> element to exclude all MP3 files on the computer or to exclude all files from C:\\UserData. + +## In This Topic + + +**General** + +- [What is the relationship between rules that are located within different components?](#BKMK2) + +- [How does precedence work with the Config.xml file?](#BKMK3) + +- [How does USMT process each component in an .xml file with multiple components?](#BKMK4) + +- [How are rules processed?](#BKMK5) + +- [How does USMT combine all of the .xml files that I specify on the command line?](#BKMK6) + +**The <include> and <exclude> rules** + +- [What happens when there are conflicting include and exclude rules?](#BKMK1) + +- [<include> and <exclude> precedence examples](#PrecExamples) + +**File collisions** + +- [What is the default behavior when there are file collisions?](#Collisions) + +- [How does the <merge> rule work when there are file collisions?](#BKMK11) + +## General + + +### What is the relationship between rules that are located within different components? + +Only rules inside the same component can affect each other, depending on specificity, except for the <unconditionalExclude> rule. Rules that are in different components do not affect each other. If there is an <include> rule in one component and an identical <exclude> rule in another component, the data will be migrated because the two rules are independent of each other. + +If you have an <include> rule in one component and a <locationModify> rule in another component for the same file, the file will be migrated in both places. That is, it will be included based on the <include> rule, and it will be migrated based on the <locationModify> rule. + +The following .xml file migrates all files from C:\\Userdocs, including .mp3 files, because the <exclude> rule is specified in a separate component. + +``` syntax + + +User Documents + + + + + C:\Userdocs\* [*.mp3] + + + + + + + + User documents to include + + + + + C:\Userdocs\ [*] + + + + + + +``` + +### How does precedence work with the Config.xml file? + +Specifying `migrate="no"` in the Config.xml file is the same as deleting the corresponding component from the migration .xml file. However, if you set `migrate="no"` for My Documents, but you have a rule similar to the one shown below in a migration .xml file (which includes all of the .doc files from My Documents), then only the .doc files will be migrated, and all other files will be excluded. + +``` syntax + + + %CSIDL_PERSONAL%\* [*.doc] + + +``` + +### How does USMT process each component in an .xml file with multiple components? + +The ordering of components does not matter. Each component is processed independently of other components. For example, if you have an <include> rule in one component and a <locationModify> rule in another component for the same file, the file will be migrated in both places. That is, it will be included based on the <include> rule, and it will be migrated based on the <locationModify> rule. + +### How are rules processed? + +There are two broad categories of rules. + +- **Rules that affect the behavior of both the ScanState and LoadState tools**. For example, the <include>, <exclude>, and <unconditionalExclude> rules are processed for each component in the .xml files. For each component, USMT creates an include list and an exclude list. Some of the rules in the component might be discarded due to specificity, but all of the remaining rules are processed. For each <include> rule, USMT iterates through the elements to see if any of the locations need to be excluded. USMT enumerates all of the objects and creates a list of objects it is going to collect for each user. Once the list is complete, each of the objects is stored or migrated to the destination computer. + +- **Rules that affect the behavior of only the LoadState tool**. For example, the <locationModify>, <contentModify>, and <destinationCleanup> rules do not affect ScanState. They are processed only with LoadState. First, the LoadState tool determines the content and location of each component based on the <locationModify>and <contentModify> rules. Then, LoadState processes all of the <destinationCleanup> rules and deletes data from the destination computer. Lastly, LoadState applies the components to the computer. + +### How does USMT combine all of the .xml files that I specify on the command line? + +USMT does not distinguish the .xml files based on their name or content. It processes each component within the files separately. USMT supports multiple .xml files only to make it easier to maintain and organize the components within them. Because USMT uses a urlid to distinguish each component from the others, be sure that each .xml file that you specify on the command line has a unique migration urlid. + +## The <include> and <exclude> rules + + +### What happens when there are conflicting <include> and <exclude> rules? + +If there are conflicting rules within a component, the most specific rule is applied, except with the <unconditionalExclude> rule, which takes precedence over all other rules. If the rules are equally specific, then the data will be not be migrated. For example if you exclude a file, and include the same file, the file will not be migrated. If there are conflicting rules within different components, the rules do not affect each other because each component is processed independently. + +In the following example, mp3 files will not be excluded from the migration. This is because directory names take precedence over the file extensions. + +``` syntax + + + C:\Data\* [*] + + + + + C:\* [*.mp3] + + +``` + +### <include> and <exclude> rules precedence examples + +These examples explain how USMT deals with <include> and <exclude> rules. When the rules are in different components, the resulting behavior will be the same regardless of whether the components are in the same or in different migration .xml files. + +- [Including and excluding files](#FilesEx) + +- [Including and excluding registry objects](#RegEx) + +### Including and excluding files + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
If you have the following code in the same componentResulting behaviorExplanation
    +
  • Include rule: <pattern type="File">C:\Dir1\* [*]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\* [*.txt]</pattern>

  • +

Migrates all files and subfolders in Dir1 (including all .txt files in C:).

The <exclude> rule does not affect the migration because the <include> rule is more specific.

    +
  • Include rule: <pattern type="File">C:\Dir1\* [*]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\Dir1\Dir2\* [*.txt]</pattern>

  • +

Migrates all files and subfolders in C:\Dir1, except the .txt files in C:\Dir1\Dir2 and its subfolders.

Both rules are processed as intended.

    +
  • Include rule: <pattern type="File">C:\Dir1\* [*]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\Dir1\ * [*.txt]</pattern>

  • +

Migrates all files and subfolders in C:\Dir1, except the .txt files in C:\Dir1 and its subfolders.

Both rules are processed as intended.

    +
  • Include rule: <pattern type="File">C:\Dir1\Dir2\* [*.txt]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\Dir1\Dir2\* [*.txt]</pattern>

  • +

Nothing will be migrated.

The rules are equally specific, so the <exclude> rule takes precedence over the <include> rule.

    +
  • Include rule: C:\Dir1\* [*.txt]

  • +
  • Exclude rule: C:\Dir1\Dir2\* [*]

  • +

Migrates the .txt files in Dir1 and the .txt files from subfolders other than Dir2.

+

No files are migrated from Dir2 or its subfolders.

Both rules are processed as intended.

    +
  • Include rule: C:\Dir1\Dir2\* [*]

  • +
  • Exclude rule: C:\Dir1\* [*.txt]

  • +

Migrates all files and subfolders of Dir2, except the .txt files from Dir1 and any subfolders of Dir1 (including Dir2).

Both rules are processed as intended.

+ +  + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
If you have the following code in different componentsResulting behaviorExplanation

Component 1:

+
    +
  • Include rule: <pattern type="File">C:\Dir1\* [*]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\Dir1\Dir2\* [*.txt]</pattern>

  • +
+

Component 2:

+
    +
  • Include rule: <pattern type="File">C:\Dir1\Dir2\* [*.txt]</pattern>

  • +
  • Exclude rule: <pattern type="File">C:\Dir1\* [*]</pattern>

  • +

Migrates all files and subfolders of C:\Dir1\ (including C:\Dir1\Dir2).

Rules that are in different components do not affect each other, except for the <unconditionalExclude> rule. Therefore, in this example, although some .txt files were excluded when Component 1 was processed, they were included when Component 2 was processed.

Component 1:

+
    +
  • Include rule: C:\Dir1\Dir2\* [*]

  • +
+

Component 2:

+
    +
  • Exclude rule: C:\Dir1\* [*.txt]

  • +

Migrates all files and subfolders from Dir2 except the .txt files in C:\Dir1 and its subfolders.

Both rules are processed as intended.

Component 1:

+
    +
  • Exclude rule: C:\Dir1\Dir2\* [*]

  • +
+

Component 2:

+
    +
  • Include rule: C:\Dir1\* [*.txt]

  • +

Migrates all .txt files in Dir1 and any subfolders.

Component 1 does not contain an <include> rule, so the <exclude> rule is not processed.

+ +  + +### Including and excluding registry objects + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
If you have the following code in the same componentResulting behaviorExplanation
    +
  • Include rule: HKLM\Software\Microsoft\Command Processor\* [*]

  • +
  • Exclude Rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +

Migrates all keys in HKLM\Software\Microsoft\Command Processor except DefaultColor.

Both rules are processed as intended.

    +
  • Include rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +
  • Exclude Rule: HKLM\Software\Microsoft\Command Processor\* [*]

  • +

Migrates only DefaultColor in HKLM\Software\Microsoft\Command Processor.

DefaultColor is migrated because the <include> rule is more specific than the <exclude> rule.

    +
  • Include rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +
  • Exclude rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +

Does not migrate DefaultColor.

The rules are equally specific, so the <exclude> rule takes precedence over the <include> rule.

+ +  + + +++++ + + + + + + + + + + + + + + +
If you have the following code in different componentsResulting behaviorExplanation

Component 1:

+
    +
  • Include rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +
  • Exclude rule: HKLM\Software\Microsoft\Command Processor\* [*]

  • +
+

Component 2:

+
    +
  • Include rule: HKLM\Software\Microsoft\Command Processor\* [*]

  • +
  • Exclude rule: HKLM\Software\Microsoft\Command Processor [DefaultColor]

  • +

Migrates all the keys/values under HKLM\Software\Microsoft\Command Processor.

Rules that are in different components do not affect each other, except for the <unconditionalExclude> rule. Therefore, in this example, the objects that were excluded when Component 1 was processed were included when Component 2 was processed.

+ +  + +## File collisions + + +### What is the default behavior when there are file collisions? + +If there is not a <merge> rule, the default behavior for the registry is for the source to overwrite the destination. The default behavior for files is for the source to be renamed incrementally: for example, OriginalFileName(1).OriginalExtension, OriginalFileName(2).OriginalExtension, and so on. + +### How does the <merge> rule work when there are file collisions? + +When a collision is detected, USMT will select the most specific <merge> rule and apply it to resolve the conflict. For example, if you have a <merge> rule for C:\\\* \[\*\] set to **sourcePriority()** and another <merge> rule for C:\\subfolder\\\* \[\*\] set to **destinationPriority()** , then USMT uses the destinationPriority() rule because it is the most specific. + +### Example scenario + +The source computer contains the following files: + +- C:\\Data\\SampleA.txt + +- C:\\Data\\SampleB.txt + +- C:\\Data\\Folder\\SampleB.txt + +The destination computer contains the following files: + +- C:\\Data\\SampleB.txt + +- C:\\Data\\Folder\\SampleB.txt + +You have a custom .xml file that contains the following code: + +``` syntax + + + c:\data\* [*] + + +``` + +For this example, the following table describes the resulting behavior if you add the code in the first column to your custom .xml file. + + ++++ + + + + + + + + + + + + + + + + + + + + +
If you specify the following codeResulting behavior
<merge script="MigXmlHelper.DestinationPriority()"> 
+   <objectSet> 
+      <pattern type="File">c:\data\* [*]</pattern> 
+   </objectSet> 
+</merge>

During ScanState, all the files will be added to the store.

+

During LoadState, only C:\Data\SampleA.txt will be restored.

<merge script="MigXmlHelper.SourcePriority()"> 
+   <objectSet> 
+      <pattern type="File">c:\data\* [*]</pattern> 
+   </objectSet> 
+</merge> 

During ScanState, all the files will be added to the store.

+

During LoadState, all the files will be restored, overwriting the existing files on the destination computer.

<merge script="MigXmlHelper.SourcePriority()"> 
+   <objectSet> 
+      <pattern type="File">c:\data\ [*]</pattern> 
+   </objectSet> 
+</merge> 

During ScanState, all the files will be added to the store.

+

During LoadState, the following will occur:

+
    +
  • C:\Data\SampleA.txt will be restored.

  • +
  • C:\Data\SampleB.txt will be restored, overwriting the existing file on the destination computer.

  • +
  • C:\Data\Folder\SampleB.txt will not be restored.

  • +
+ +  + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md b/windows/deploy/create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md new file mode 100644 index 0000000000..f08c563ad6 --- /dev/null +++ b/windows/deploy/create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md @@ -0,0 +1,123 @@ +--- +title: Create a custom Windows PE boot image with Configuration Manager (Windows 10) +description: In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. +ms.assetid: b9e96974-324d-4fa4-b0ce-33cfc49c4809 +keywords: ["tool, customize, deploy, boot image"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Create a custom Windows PE boot image with Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Add DaRT 10 files and prepare to brand the boot image](#sec01) +- [Create a boot image for Configuration Manager using the MDT wizard](#sec02) +- [Related topics](#related_topics) + +In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This topic shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) 2013 Update 1 wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process. + +For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. Both are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +## Add DaRT 10 files and prepare to brand the boot image + + +The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. We assume you have downloaded Microsoft Desktop Optimization Pack (MDOP) 2015 and copied the x64 version of MSDaRT10.msi to the C:\\Setup\\DaRT 10 folder. We also assume you have created a custom background image and saved it in C:\\Setup\\Branding on CM01. In this section, we use a custom background image named ContosoBackground.bmp. + +1. Install DaRT 10 (C:\\Setup\\DaRT 10\\MSDaRT10.msi) using the default settings. + +2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder. + +3. Copy the Toolsx64.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x64** folder. + +4. Copy the Toolsx86.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x86** folder. + +5. Using File Explorer, navigate to the **C:\\Setup** folder. + +6. Copy the **Branding** folder to **E:\\Sources\\OSD**. + +## Create a boot image for Configuration Manager using the MDT wizard + + +By using the MDT wizard to create the boot image in Configuration Manager, you gain additional options for adding components and features to the boot image. In this section, you create a boot image for Configuration Manager using the MDT wizard. + +1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**. + +2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Boot\\Zero Touch WinPE x64** and click **Next**. + + **Note**   + The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard. + +   + +3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and click **Next**. + +4. On the **Options** page, select the **x64** platform, and click **Next**. + +5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box. + + ![figure 15](images/mdt-06-fig16.png) + + Figure 15. Add the DaRT component to the Configuration Manager boot image. + +6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **\\\\CM01\\Sources$\\OSD\\Branding\\ ContosoBackground.bmp**. Then click **Next** twice. + + **Note**   + It will take a few minutes to generate the boot image. + +   + +7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**. + +8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard. + +9. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Do not continue until you can see that the boot image is distributed. Look for the line that reads STATMSG: ID=2301. You also can view Content Status in the Configuration Manager Console by selecting **the Zero Touch WinPE x86** boot image. + + ![figure 16](images/fig16-contentstatus.png) + + Figure 16. Content status for the Zero Touch WinPE x64 boot image. + +10. Using the Configuration Manager Console, right-click the **Zero Touch WinPE x64** boot image and select **Properties**. + +11. In the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and click **OK**. + +12. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for this text: Expanding PS10000B to E:\\RemoteInstall\\SMSImages. + +13. Review the **E:\\RemoteInstall\\SMSImages** folder. You should see three folders containing boot images. Two are from the default boot images, and the third folder (PS10000B) is from your new boot image with DaRT. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md b/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md new file mode 100644 index 0000000000..c71d1ef790 --- /dev/null +++ b/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md @@ -0,0 +1,204 @@ +--- +title: Create a task sequence with Configuration Manager and MDT (Windows 10) +description: In this topic, you will learn how to create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard. +ms.assetid: 0b069bec-5be8-47c6-bf64-7a630f41ac98 +keywords: ["deploy, upgrade, task sequence, install"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Create a task sequence with Configuration Manager and MDT + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Create a task sequence using the MDT Integration Wizard](#sec01) +- [Edit the task sequence](#sec02) +- [Move the packages](#sec03) +- [Related topics](#related_topics) + +In this topic, you will learn how to create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard. Creating task sequences in System Center 2012 R2 Configuration Manager requires many more steps than creating task sequences for MDT Lite Touch installation. Luckily, the MDT wizard helps you through the process and also guides you through creating the needed packages. + +For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard, both of which are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +## Create a task sequence using the MDT Integration Wizard + + +This section will walk you through the process of creating a System Center 2012 R2 Configuration Manager task sequence for production use. + +1. On CM01, using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**. + +2. On the **Choose Template** page, select the **Client Task Sequence** template and click **Next**. + +3. On the **General** page, assign the following settings and then click **Next**: + + 1. Task sequence name: Windows 10 Enterprise x64 RTM + + 2. Task sequence comments: Production image with Office 2013 + +4. On the **Details** page, assign the following settings and then click **Next**: + + 1. Join a Domain + + 2. Domain: contoso.com + + 1. Account: CONTOSO\\CM\_JD + + 2. Password: Passw0rd! + + 3. Windows Settings + + 1. User name: Contoso + + 2. Organization name: Contoso + + 3. Product key: <blank> + +5. On the **Capture Settings** page, accept the default settings, and click **Next**. + +6. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then click **Next**. + +7. On the **MDT Package** page, select **Create a new Microsoft Deployment Toolkit Files package**, and in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\MDT\\MDT 2013**. Then click **Next**. + +8. On the **MDT Details** page, assign the name **MDT 2013** and click **Next**. + +9. On the **OS Image** page, browse and select the **Windows 10 Enterprise x64 RTM** package. Then click **Next**. + +10. On the **Deployment Method** page, accept the default settings and click **Next**. + +11. On the **Client Package** page, browse and select the **OSD / Configuration Manager Client** package. Then click **Next**. + +12. On the **USMT Package** page, browse and select **the OSD / Microsoft Corporation User State Migration Tool for Windows 8 10.0.10240.16384** package. Then click **Next**. + +13. On the **Settings Package** page, select the **Create a new settings package** option, and in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Settings\\Windows 10 x64 Settings**. Then click **Next**. + +14. On the **Settings Details** page, assign the name **Windows 10 x64 Settings** and click **Next**. + +15. On the **Sysprep Package** page, click **Next** twice. + +16. On the **Confirmation** page, click **Finish**. + +## Edit the task sequence + + +After you create the task sequence, we recommend that you configure the task sequence for an optimal deployment experience. The configurations include enabling support for Unified Extensible Firmware Interface (UEFI), dynamic organizational unit (OU) allocation, computer replace scenarios, and more. + +1. On CM01, using the Configuration Manager Console, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM** task sequence, and select **Edit**. + +2. In the **Install** group, select the **Set Variable for Drive Letter** action and configure the following: + + - OSDPreserveDriveLetter: True + + **Note**   + If you don't change this value, your Windows installation will end up in E:\\Windows. + +   + +3. In the **Post Install** group, select **Apply Network Settings**, and configure the Domain OU value to use the **Contoso / Workstations** OU (browse for values). + +4. In the **Post Install** group, disable the **Auto Apply Drivers** action. (Disabling is done by selecting the action and, in the **Options** tab, selecting the **Disable this step** check box.) + +5. After the disabled **Post Install / Auto Apply Drivers** action, add a new group name: **Drivers**. + +6. After the **Post Install / Drivers** group, add an **Apply Driver Package** action with the following settings: + + 1. Name: HP EliteBook 8560w + + 2. Driver Package: Windows 10 x64 - HP EliteBook 8560w + + 3. Options: Task Sequence Variable: Model equals HP EliteBook 8560w + + **Note**   + You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%' + +   + + ![figure 24](images/fig27-driverpackage.png) + + Figure 24. The driver package options. + +7. In the **State Restore / Install Applications** group, select the **Install Application** action. + +8. Select the **Install the following applications** option, and add the OSD / Adobe Reader XI - OSD Install application to the list. + + ![figure 25](images/fig28-addapp.png) + + Figure 25. Add an application to the Configuration Manager task sequence. + +9. In the **State Restore** group, after the **Set Status 5** action, add a **Request State Store** action with the following settings: + + 1. Restore state from another computer + + 2. If computer account fails to connect to state store, use the Network Access account + + 3. Options: Continue on error + + 4. Options / Condition: + + 1. Task Sequence Variable + + 2. USMTLOCAL not equals True + +10. In the **State Restore** group, after the **Restore User State** action, add a **Release State Store** action with the following settings: + + 1. Options: Continue on error + + 2. Options / Condition: + + 1. Task Sequence Variable + + 2. USMTLOCAL not equals True + +11. Click **OK**. + +**Note**   +The Request State Store and Release State Store actions need to be added for common computer replace scenarios. + +  + +## Move the packages + + +While creating the task sequence with the MDT wizard, a few operating system deployment packages were created. To move these packages to the OSD folder, take the following steps. + +1. On CM01, using the Configuration Manager Console, in the Software Library workspace, expand **Application Management**, and then select **Packages**. + +2. Select the **MDT 2013** and **Windows 10 x64 Settings** packages, right-click and select **Move**. + +3. In the **Move Selected Items** dialog box, select the **OSD** folder, and click **OK**. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/create-a-windows-81-reference-image.md b/windows/deploy/create-a-windows-81-reference-image.md new file mode 100644 index 0000000000..2063b83dd5 --- /dev/null +++ b/windows/deploy/create-a-windows-81-reference-image.md @@ -0,0 +1,868 @@ +--- +title: Create a Windows 10 reference image (Windows 10) +description: Creating a reference image is important because that image serves as the foundation for the devices in your organization. +ms.assetid: 9da2fb57-f2ff-4fce-a858-4ae4c237b5aa +keywords: ["deploy, deployment, configure, customize, install, installation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Create a Windows 10 reference image + + +**Applies to** + +- Windows 10 + +**In this article** + +- [The reference image](#the_reference_image) +- [Set up the MDT build lab deployment share](#sec01) +- [Add the setup files](#sec02) +- [Add applications](#sec03) +- [Create the reference image task sequence](#sec04) +- [Configure the MDT deployment share rules](#sec05) +- [Build the Windows 10 reference image](#sec06) +- [Related topics](#related_topics) + +Creating a reference image is important because that image serves as the foundation for the devices in your organization. In this topic, you will learn how to create a Windows 10 reference image using the Microsoft Deployment Toolkit (MDT) 2013 Update 1. You will create a deployment share, configure rules and settings, and import all the applications and operating system files required to build a Windows 10 reference image. After completing the steps outlined in this topic, you will have a Windows 10 reference image that can be used in your deployment solution. + +For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, PC0001 is a Windows 10 Enterprise x64 client, and MDT01 is a Windows Server 2012 R2 standard server. HV01 is a Hyper-V host server, but HV01 could be replaced by PC0001 as long as PC0001 has enough memory and is capable of running Hyper-V. MDT01, HV01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-08-fig01.png) + +Figure 1. The machines used in this topic. + +## The reference image + + +The reference image described in this documentation is designed primarily for deployment to physical machines. However, the reference image is created on a virtual platform, before being automatically run through the System Preparation (Sysprep) tool process and captured to a Windows Imaging (WIM) file. The reasons for creating the reference image on a virtual platform are the following: + +- You reduce development time and can use snapshots to test different configurations quickly. + +- You rule out hardware issues. You simply get the best possible image, and if you have a problem, it's not likely to be hardware related. + +- It ensures that you won't have unwanted applications that could be installed as part of a driver install but not removed by the Sysprep process. + +- It's easy to move between lab, test, and production. + +## Set up the MDT build lab deployment share + + +With Windows 10, there is no hard requirement to create reference images; however, to reduce the time needed for deployment, you may want to create a reference image that contains a few base applications as well as all of the latest updates. This section will show you how to create and configure the MDT Build Lab deployment share to create a Windows 10 reference image. Because reference images will be deployed only to virtual machines during the creation process and have specific settings (rules), you should always create a separate deployment share specifically for this process. + +### Create the MDT build lab deployment share + +- On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**. + +- Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. + +- Use the following settings for the New Deployment Share Wizard: + +- Deployment share path: E:\\MDTBuildLab + +- Share name: MDTBuildLab$ + +- Deployment share description: MDT Build Lab + +- <default> + +- Verify that you can access the \\\\MDT01\\MDTBuildLab$ share. + +![figure 2](images/mdt-08-fig02.png) + +Figure 2. The Deployment Workbench with the MDT Build Lab deployment share created. + +### Configure permissions for the deployment share + +In order to write the reference image back to the deployment share, you need to assign Modify permissions to the MDT Build Account (MDT\_BA) for the **Captures** subfolder in the **E:\\MDTBuildLab** folder + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Modify the NTFS permissions for the **E:\\MDTBuildLab\\Captures** folder by running the following command in an elevated Windows PowerShell prompt: + + ``` syntax + icacls E:\MDTBuildLab\Captures /grant '"MDT_BA":(OI)(CI)(M)' + ``` + +![figure 3](images/mdt-08-fig03.png) + +Figure 3. Permissions configured for the MDT\_BA user. + +## Add the setup files + + +This section will show you how to populate the MDT 2013 Update 1 deployment share with the Windows 10 operating system source files, commonly referred to as setup files, which will be used to create a reference image. Setup files are used during the reference image creation process and are the foundation for the reference image. + +### Add the Windows 10 installation files + +MDT 2013 supports adding both full source Windows 10 DVDs (ISOs) and custom images that you have created. In this case, you create a reference image, so you add the full source setup files from Microsoft. + +**Note**   +Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM. + +  + +### Add Windows 10 Enterprise x64 (full source) + +In these steps we assume that you have copied the content of a Windows 10 Enterprise x64 ISO to the **E:\\Downloads\\Windows 10 Enterprise x64** folder. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Build Lab**. + +3. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**. + +4. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard: + +5. Full set of source files + +6. Source directory: E:\\Downloads\\Windows 10 Enterprise x64 + +7. Destination directory name: W10EX64RTM + +8. After adding the operating system, in the **Operating Systems / Windows 10** folder, double-click the added operating system name in the **Operating System** node and change the name to the following: **Windows 10 Enterprise x64 RTM Default Image** + +![figure 4](images/figure4-deployment-workbench.png) + +Figure 4. The imported Windows 10 operating system after renaming it. + +## Add applications + + +Before you create an MDT task sequence, you need to add all of the applications and other sample scripts to the MDT Build Lab share. + +The steps in this section use a strict naming standard for your MDT applications. You add the "Install - " prefix for typical application installations that run a setup installer of some kind, and you use the "Configure - " prefix when an application configures a setting in the operating system. You also add an " - x86", " - x64", or "- x86-x64" suffix to indicate the application's architecture (some applications have installers for both architectures). Using a script naming standard is always recommended when using MDT as it helps maintain order and consistency. + +By storing configuration items as MDT applications, it is easy to move these objects between various solutions, or between test and production environments. In this topic's step-by-step sections, you will add the following applications: + +- Install - Microsoft Office 2013 Pro Plus - x86 + +- Install - Microsoft Silverlight 5.0 - x64 + +- Install - Microsoft Visual C++ 2005 SP1 - x86 + +- Install - Microsoft Visual C++ 2005 SP1 - x64 + +- Install - Microsoft Visual C++ 2008 SP1 - x86 + +- Install - Microsoft Visual C++ 2008 SP1 - x64 + +- Install - Microsoft Visual C++ 2010 SP1 - x86 + +- Install - Microsoft Visual C++ 2010 SP1 - x64 + +- Install - Microsoft Visual C++ 2012 Update 4 - x86 + +- Install - Microsoft Visual C++ 2012 Update 4 - x64 + +In these examples, we assume that you downloaded the software in this list to the E:\\Downloads folder. The first application is added using the UI, but because MDT supports Windows PowerShell, you add the other applications using Windows PowerShell. + +**Note**   +All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](http://go.microsoft.com/fwlink/p/?LinkId=619523). + +  + +### Create the install: Microsoft Office Professional Plus 2013 x86 + +You can customize Office 2013. In the volume license versions of Office 2013, there is an Office Customization Tool you can use to customize the Office installation. In these steps we assume you have copied the Office 2013 installation files to the E:\\Downloads\\Office2013 folder. + +### Add the Microsoft Office Professional Plus 2013 x86 installation files + +After adding the Microsoft Office Professional Plus 2013 x86 application, you then automate its setup by running the Office Customization Tool. In fact, MDT 2013 detects that you added the Office Professional Plus 2013 x86 application and creates a shortcut for doing this. + +You also can customize the Office installation using a Config.xml file. But we recommend that you use the Office Customization Tool as described in the following steps, as it provides a much richer way of controlling Office 2013 settings. + +1. Using the Deployment Workbench in the MDT Build Lab deployment share, expand the **Applications / Microsoft** node, and double-click **Install - Microsoft Office 2013 Pro Plus x86**. + +2. In the **Office Products** tab, click **Office Customization Tool**, and click **OK** in the **Information** dialog box. + + ![figure 5](images/mdt-08-fig05.png) + + Figure 5. The Install - Microsoft Office 2013 Pro Plus - x86 application properties. + + **Note**   + If you don't see the Office Products tab, verify that you are using a volume license version of Office. If you are deploying Office 365, you need to download the Admin folder from Microsoft. + +   + +3. In the Office Customization Tool dialog box, select the Create a new Setup customization file for the following product option, select the Microsoft Office Professional Plus 2013 (32-bit) product, and click OK. + +4. Use the following settings to configure the Office 2013 setup to be fully unattended: + + 1. Install location and organization name + + - Organization name: Contoso + + 2. Licensing and user interface + + 1. Select Use KMS client key + + 2. Select I accept the terms in the License Agreement. + + 3. Select Display level: None + + ![figure 6](images/mdt-08-fig06.png) + + Figure 6. The licensing and user interface screen in the Microsoft Office Customization Tool + + 3. Modify Setup properties + + - Add the **SETUP\_REBOOT** property and set the value to **Never**. + + 4. Modify user settings + + - In the **Microsoft Office 2013** node, expand **Privacy**, select **Trust Center**, and enable the Disable Opt-in Wizard on first run setting. + +5. From the **File** menu, select **Save**, and save the configuration as 0\_Office2013ProPlusx86.msp in the **E:\\MDTBuildLab\\Applications\\Install - Microsoft Office 2013 Pro Plus - x86\\Updates** folder. + + **Note**   + The reason for naming the file with a 0 (zero) at the beginning is that the Updates folder also handles Microsoft Office updates, and they are installed in alphabetical order. The Office 2013 setup works best if the customization file is installed before any updates. + +   + +6. Close the Office Customization Tool, click Yes in the dialog box, and in the **Install - Microsoft Office 2013 Pro Plus - x86 Properties** window, click **OK**. + +### Connect to the deployment share using Windows PowerShell + +If you need to add many applications, you can take advantage of the PowerShell support that MDT has. To start using PowerShell against the deployment share, you must first load the MDT PowerShell snap-in and then make the deployment share a PowerShell drive (PSDrive). + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Import the snap-in and create the PSDrive by running the following commands in an elevated PowerShell prompt: + + ``` syntax + Import-Topic "C:\Program Files\Microsoft Deployment Toolkit\bin\MicrosoftDeploymentToolkit.psd1" + + New-PSDrive -Name "DS001" -PSProvider MDTProvider -Root "E:\MDTBuildLab" + ``` + +### Create the install: Microsoft Visual C++ 2005 SP1 x86 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2005SP1x86. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2005 SP1 - x86" + $CommandLine = "vcredist_x86.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2005SP1x86" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -Commandline $Commandline -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2005 SP1 x64 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2005SP1x64. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2005 SP1 ? x64" + $CommandLine = "vcredist_x64.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2005SP1x64" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -Commandline $Commandline -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2008 SP1 x86 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2008SP1x86. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2008 SP1 - x86" + $CommandLine = "vcredist_x86.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2008SP1x86" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -Commandline $Commandline -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2008 SP1 x64 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2008SP1x64. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2008 SP1 ? x64" + $CommandLine = "vcredist_x64.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2008SP1x64" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -Commandline $Commandline -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2010 SP1 x86 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2010SP1x86. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2010 SP1 - x86" + $CommandLine = "vcredist_x86.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2010SP1x86" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -CommandLine $CommandLine -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2010 SP1 x64 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2010SP1x64. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2010 SP1 ? x64" + $CommandLine = "vcredist_x64.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2010SP1x64" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -CommandLine $CommandLine -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2012 Update 4 x86 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Update 4 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2012Ux86. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2012 Update 4 - x86" + $CommandLine = "vcredist_x86.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2012Ux86" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -CommandLine $CommandLine -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +### Create the install: Microsoft Visual C++ 2012 Update 4 x64 + +In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Update 4 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2012Ux64. + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create the application by running the following commands in an elevated PowerShell prompt: + + ``` syntax + $ApplicationName = "Install - Microsoft Visual C++ 2012 Update 4 ? x64" + $CommandLine = "vcredist_x64.exe /Q" + $ApplicationSourcePath = "E:\Downloads\VC++2012Ux64" + Import-MDTApplication -Path "DS001:\Applications\Microsoft" -Enable "True" -Name $ApplicationName -ShortName $ApplicationName -CommandLine $CommandLine -WorkingDirectory ".\Applications\$ApplicationName" -ApplicationSourcePath $ApplicationSourcePath -DestinationFolder $ApplicationName + -Verbose + ``` + +## Create the reference image task sequence + + +In order to build and capture your Windows 10 reference image for deployment using MDT, you will create a task sequence. The task sequence will reference the operating system and applications that you previously imported into the MDT Build Lab deployment share to build a Windows 10 reference image. + +After creating the task sequence, you configure it to enable patching against the Windows Server Update Services (WSUS) server. The Task Sequence Windows Update action supports getting updates directly from Microsoft Update, but you get more stable patching if you use a local WSUS server. WSUS also allows for an easy process of approving the patches that you are deploying. + +### Drivers and the reference image + +Because we use modern virtual platforms for creating our reference images, we don’t need to worry about drivers when creating reference images for Windows 10. We use Hyper-V in our environment, and Windows Preinstallation Environment (Windows PE) already has all the needed drivers built-in for Hyper-V. + +### Create a task sequence for Windows 10 Enterprise + +To create a Windows 10 reference image task sequence, the process is as follows: + +1. Using the Deployment Workbench in the MDT Build Lab deployment share, right-click **Task Sequences**, and create a new folder named **Windows 10**. + +2. Expand the **Task Sequences** node, right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: + + 1. Task sequence ID: REFW10X64-001 + + 2. Task sequence name: Windows 10 Enterprise x64 RTM Default Image + + 3. Task sequence comments: Reference Build + + 4. Template: Standard Client Task Sequence + + 5. Select OS: Windows 10 Enterprise x64 RTM Default Image + + 6. Specify Product Key: Do not specify a product key at this time + + 7. Full Name: Contoso + + 8. Organization: Contoso + + 9. Internet Explorer home page: http://www.contoso.com + + 10. Admin Password: Do not specify an Administrator Password at this time + +### Edit the Windows 10 task sequence + +The steps below walk you through the process of editing the Windows 10 reference image task sequence to include the actions required to update the reference image with the latest updates from WSUS, install roles and features, and utilities, and install Microsoft Office 2013. + +1. In the Task Sequences / Windows 10 folder, right-click the Windows 10 Enterprise x64 RTM Default Image task sequence, and select Properties. + +2. On the **Task Sequence** tab, configure the Windows 10 Enterprise x64 RTM Default Image task sequence with the following settings: + + 1. State Restore. Enable the Windows Update (Pre-Application Installation) action. + + **Note**   + Enable an action by going to the Options tab and clearing the Disable this step check box. + +   + + 2. State Restore. Enable the Windows Update (Post-Application Installation) action. + + 3. State Restore. Enable the Windows Update (Post-Application Installation) action. State Restore. After the **Tattoo** action, add a new **Group** action with the following setting: + + - Name: Custom Tasks (Pre-Windows Update) + + 4. State Restore. After Windows Update (Post-Application Installation) action, rename Custom Tasks to Custom Tasks (Post-Windows Update). + + **Note**   + The reason for adding the applications after the Tattoo action but before running Windows Update is simply to save time during the deployment. This way we can add all applications that will upgrade some of the built-in components and avoid unnecessary updating. + +   + + 5. State Restore / Custom Tasks (Pre-Windows Update). Add a new Install Roles and Features action with the following settings: + + 1. Name: Install - Microsoft NET Framework 3.5.1 + + 2. Select the operating system for which roles are to be installed: Windows 8.1 + + 3. Select the roles and features that should be installed: .NET Framework 3.5 (includes .NET 2.0 and 3.0) + + **Important**   + This is probably the most important step when creating a reference image. Many applications need the .NET Framework, and we strongly recommend having it available in the image. The one thing that makes this different from other components is that .NET Framework 3.5.1 is not included in the WIM file. It is installed from the **Sources\\SxS** folder on the media, and that makes it more difficult to add after the image has been deployed. + +   + + ![figure 7](images/fig8-cust-tasks.png) + + Figure 7. The task sequence after creating the Custom Tasks (Pre-Windows Update) group and adding the Install - Microsoft NET Framework 3.5.1 action. + + 6. State Restore - Custom Tasks (Pre-Windows Update). After the **Install - Microsoft NET Framework 3.5.1** action, add a new **Install Application** action with the following settings: + + 1. Name: Install - Microsoft Visual C++ 2005 SP1 - x86 + + 2. Install a Single Application: Install - Microsoft Visual C++ 2005 SP1 - x86-x64 + + 7. Repeat the previous step (add a new **Install Application**) to add the following applications: + + 1. Install - Microsoft Visual C++ 2005 SP1 - x64 + + 2. Install - Microsoft Visual C++ 2008 SP1 - x86 + + 3. Install - Microsoft Visual C++ 2008 SP1 - x64 + + 4. Install - Microsoft Visual C++ 2010 SP1 - x86 + + 5. Install - Microsoft Visual C++ 2010 SP1 - x64 + + 6. Install - Microsoft Visual C++ 2012 Update 4 - x86 + + 7. Install - Microsoft Visual C++ 2012 Update 4 - x64 + + 8. Install - Microsoft Office 2013 Pro Plus - x86 + + 8. After the Install - Microsoft Office 2013 Pro Plus - x86 action, add a new Restart computer action. + +3. Click **OK**. + +### Optional configuration: Add a suspend action + +The goal when creating a reference image is of course to automate everything. But sometimes you have a special configuration or application setup that is too time-consuming to automate. If you need to do some manual configuration, you can add a little-known feature called Lite Touch Installation (LTI) Suspend. If you add the LTISuspend.wsf script as a custom action in the task sequence, it will suspend the task sequence until you click the Resume Task Sequence shortcut icon on the desktop. In addition to using the LTI Suspend feature for manual configuration or installation, you can also use it simply for verifying a reference image before you allow the task sequence to continue and use Sysprep and capture the virtual machine. + +![figure 8](images/fig8-suspend.png) + +Figure 8. A task sequence with optional Suspend action (LTISuspend.wsf) added. + +![figure 9](images/fig9-resumetaskseq.png) + +Figure 9. The Windows 10 desktop with the Resume Task Sequence shortcut. + +### Edit the Unattend.xml file for Windows 10 Enterprise + +When using MDT, you don't need to edit the Unattend.xml file very often because most configurations are taken care of by MDT. However if, for example, you want to configure Internet Explorer 11 behavior, then you can edit the Unattend.xml for this. Editing the Unattend.xml for basic Internet Explorer settings is easy, but for more advanced settings, you will want to use Internet Explorer Administration Kit (IEAK). + +**Note**   +You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the Install Roles and Features action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you are adding packages via Unattend.xml, it is version specific, so Unattend.xml must match the exact version of the operating system you are servicing. + +  + +Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence: + +1. Using the Deployment Workbench, right-click the **Windows 10 Enterprise x64 RTM Default Image** task sequence and select **Properties**. + +2. In the **OS Info** tab, click **Edit Unattend.xml**. MDT now generates a catalog file. This will take a few minutes, and then Windows System Image Manager (Windows SIM) will start. + +3. In Windows SIM, expand the **4 specialize** node in the **Answer File** pane and select the amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral entry. + +4. In the **amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral properties** window (right-hand window), set the following values: + + - DisableDevTools: true + +5. Save the Unattend.xml file, and close Windows SIM. + +6. On the Windows 10 Enterprise x64 RTM Default Image Properties, click **OK**. + +![figure 10](images/fig10-unattend.png) + +Figure 10. Windows System Image Manager with the Windows 10 Unattend.xml. + +## Configure the MDT deployment share rules + + +Understanding rules is critical to successfully using MDT. Rules are configured using the Rules tab of the deployment share's properties. The Rules tab is essentially a shortcut to edit the CustomSettings.ini file that exists in the E:\\MDTBuildLab\\Control folder. This section discusses how to configure the MDT deployment share rules as part of your Windows 10 Enterprise deployment. + +### MDT deployment share rules overview + +In MDT, there are always two rule files: the CustomSettings.ini file and the Bootstrap.ini file. You can add almost any rule to either; however, the Bootstrap.ini file is copied from the Control folder to the boot image, so the boot image needs to be updated every time you change that file. + +For that reason, add only a minimal set of rules to Bootstrap.ini, such as which deployment server and share to connect to - the DEPLOYROOT value. Put the other rules in CustomSettings.ini because that file is updated immediately when you click OK. By taking the following steps, you will configure the rules for the MDT Build Lab deployment share: + +1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Properties**. + +2. Select the **Rules** tab and modify using the following information: + + ``` syntax + [Settings] + Priority=Default + [Default] + _SMSTSORGNAME=Contoso + UserDataLocation=NONE + DoCapture=YES + OSInstall=Y + AdminPassword=P@ssw0rd + TimeZoneName=Pacific Standard Time + JoinWorkgroup=WORKGROUP + HideShell=YES + FinishAction=SHUTDOWN + DoNotCreateExtraPartition=YES + WSUSServer=http://mdt01.contoso.com:8530 + ApplyGPOPack=NO + SLSHARE=\\MDT01\Logs$ + SkipAdminPassword=YES + SkipProductKey=YES + SkipComputerName=YES + SkipDomainMembership=YES + SkipUserData=YES + SkipLocaleSelection=YES + SkipTaskSequence=NO + SkipTimeZone=YES + SkipApplications=YES + SkipBitLocker=YES + SkipSummary=YES + SkipRoles=YES + SkipCapture=NO + SkipFinalSummary=YES + ``` + + ![figure 11](images/mdt-08-fig14.png) + + Figure 11. The server-side rules for the MDT Build Lab deployment share. + +3. Click **Edit Bootstrap.ini** and modify using the following information: + + ``` syntax + Settings] + Priority=Default + [Default] + DeployRoot=\\MDT01\MDTBuildLab$ + UserDomain=CONTOSO + UserID=MDT_BA + UserPassword=P@ssw0rd + SkipBDDWelcome=YES + ``` + + ![figure 12](images/mdt-08-fig15.png) + + Figure 12. The boot image rules for the MDT Build Lab deployment share. + + **Note**   + For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it is acceptable to do so in this situation. + +   + +4. In the **Windows PE** tab, in the **Platform** drop-down list, select **x86**. + +5. In the **Lite Touch Boot Image Settings** area, configure the following settings: + + 1. Image description: MDT Build Lab x86 + + 2. ISO file name: MDT Build Lab x86.iso + +6. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**. + +7. In the **Lite Touch Boot Image Settings** area, configure the following settings: + + 1. Image description: MDT Build Lab x64 + + 2. ISO file name: MDT Build Lab x64.iso + +8. Click **OK**. + +**Note**   +In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface). + +  + +### Update the deployment share + +After the deployment share has been configured, it needs to be updated. This is the process when the Windows Windows PE boot images are created. + +1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Update Deployment Share**. + +2. Use the default options for the Update Deployment Share Wizard. + +**Note**   +The update process will take 5 to 10 minutes. + +  + +### The rules explained + +Now that the MDT Build Lab deployment share (the share used to create the reference images) has been configured, it is time to explain the various settings used in the Bootstrap.ini and CustomSettings.ini files. + +The Bootstrap.ini and CustomSettings.ini files work together. The Bootstrap.ini file is always present on the boot image and is read first. The basic purpose for Bootstrap.ini is to provide just enough information for MDT to find the CustomSettings.ini. + +The CustomSettings.ini file is normally stored on the server, in the Deployment share\\Control folder, but also can be stored on the media (when using offline media). + +**Note**   +The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section. + +  + +### The Bootstrap.ini file + +The Bootstrap.ini file is available via the deployment share's Properties dialog box, or via the E:\\MDTBuildLab\\Control folder on MDT01. + +``` syntax +[Settings] +Priority=Default + +[Default] +DeployRoot=\\MDT01\MDTBuildLab$ +UserDomain=CONTOSO +UserID=MDT_BA +UserPassword=P@ssw0rd + +SkipBDDWelcome=YES +``` + +So, what are these settings? + +- **Priority.** This determines the order in which different sections are read. This Bootstrap.ini has only one section, named \[Default\]. + +- **DeployRoot.** This is the location of the deployment share. Normally, this value is set by MDT, but you need to update the DeployRoot value if you move to another server or other share. If you don't specify a value, the Windows Deployment Wizard prompts you for a location. + +- **UserDomain, UserID, and UserPassword.** These values are used for automatic log on to the deployment share. Again, if they are not specified, the wizard prompts you. + + **Note**   + Caution is advised. These values are stored in clear text on the boot image. Use them only for the MDT Build Lab deployment share and not for the MDT Production deployment share that you learn to create in the next topic. + +   + +- **SkipBDDWelcome.** Even if it is nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard. + +**Note**   +All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values. + +  + +### The CustomSettings.ini file + +The CustomSettings.ini file, whose content you see on the Rules tab of the deployment share Properties dialog box, contains most of the properties used in the configuration. + +``` syntax +[Settings] +Priority=Default +[Default] +_SMSTSORGNAME=Contoso +UserDataLocation=NONE +DoCapture=YES +OSInstall=Y +AdminPassword=P@ssw0rd +TimeZoneName=Pacific Standard Time +JoinWorkgroup=WORKGROUP +HideShell=YES +FinishAction=SHUTDOWN +DoNotCreateExtraPartition=YES +WSUSServer=http://mdt01.contoso.com:8530 +ApplyGPOPack=NO +SLSHARE=\\MDT01\Logs$ +SkipAdminPassword=YES +SkipProductKey=YES +SkipComputerName=YES +SkipDomainMembership=YES +SkipUserData=YES +SkipLocaleSelection=YES +SkipTaskSequence=NO +SkipTimeZone=YES +SkipApplications=YES +SkipBitLocker=YES +SkipSummary=YES +SkipRoles=YES +SkipCapture=NO +SkipFinalSummary=YES +``` + +- **Priority.** Has the same function as in Bootstrap.ini. Priority determines the order in which different sections are read. This CustomSettings.ini has only one section, named \[Default\]. In general, if you have multiple sections that set the same value, the value from the first section (higher priority) wins. The rare exceptions are listed in the ZTIGather.xml file. + +- **\_SMSTSORGNAME.** The organization name displayed in the task sequence progress bar window during deployment. + +- **UserDataLocation.** Controls the settings for user state backup. You do not need to use when building and capturing a reference image. + +- **DoCapture.** Configures the task sequence to run the System Preparation (Sysprep) tool and capture the image to a file when the operating system is installed. + +- **OSInstall.** Must be set to Y or YES (the code actually just looks for the Y character) for the setup to proceed. + +- **AdminPassword.** Sets the local Administrator account password. + +- **TimeZoneName.** Establishes the time zone to use. Don't confuse this value with TimeZone, which is only for legacy operating systems (Windows 7 and Windows Server 2003). + + **Note**   + The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names. + +   + +- **JoinWorkgroup.** Configures Windows to join a workgroup. + +- **HideShell.** Hides the Windows Shell during deployment. This is especially useful for Windows 8.1 deployments in which the deployment wizard will otherwise appear behind the tiles. + +- **FinishAction.** Instructs MDT what to do when the task sequence is complete. + +- **DoNotCreateExtraPartition.** Configures the task sequence not to create the extra partition for BitLocker. There is no need to do this for your reference image. + +- **WSUSServer.** Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied. + +- **SLSHARE.** Instructs MDT to copy the log files to a server share if something goes wrong during deployment, or when a deployment is successfully completed. + +- **ApplyGPOPack.** Allows you to deploy local group policies created by Microsoft Security Compliance Manager (SCM). + +- **SkipAdminPassword.** Skips the pane that asks for the Administrator password. + +- **SkipProductKey.** Skips the pane that asks for the product key. + +- **SkipComputerName.** Skips the Computer Name pane. + +- **SkipDomainMemberShip.** Skips the Domain Membership pane. If set to Yes, you need to configure either the JoinWorkgroup value or the JoinDomain, DomainAdmin, DomainAdminDomain, and DomainAdminPassword properties. + +- **SkipUserData.** Skips the pane for user state migration. + +- **SkipLocaleSelection.** Skips the pane for selecting language and keyboard settings. + +- **SkipTimeZone.** Skips the pane for setting the time zone. + +- **SkipApplications.** Skips the Applications pane. + +- **SkipBitLocker.** Skips the BitLocker pane. + +- **SkipSummary.** Skips the initial Windows Deployment Wizard summary pane. + +- **SkipRoles.** Skips the Install Roles and Features pane. + +- **SkipCapture.** Skips the Capture pane. + +- **SkipFinalSummary.** Skips the final Windows Deployment Wizard summary. Because you use FinishAction=Shutdown, you don't want the wizard to stop in the end so that you need to click OK before the machine shuts down. + +## Build the Windows 10 reference image + + +Once you have created your task sequence, you are ready to create the Windows 10 reference image. This will be performed by launching the task sequence from a virtual machine which will then automatically perform the reference image creation and capture process. + +This steps below outline the process used to boot a virtual machine using an ISO boot image created by MDT, and then execute the reference image task sequence image to create and capture the Windows 10 reference image. + +1. Copy the E:\\MDTBuildLab\\Boot\\MDT Build Lab x86.iso on MDT01 to C:\\ISO on the Hyper-V host. + + **Note**   + Remember, in MDT you can use the x86 boot image to deploy both x86 and x64 operating system images. That's why you can use the x86 boot image instead of the x64 boot image. + +   + +2. Create a virtual machine with the following settings: + + 1. Name: REFW10X64-001 + + 2. Location: C:\\VMs + + 3. Memory: 1024 MB + + 4. Network: External (The network that is connected to the same infrastructure as MDT01 is) + + 5. Hard disk: 60 GB (dynamic disk) + + 6. Image file: C:\\ISO\\MDT Build Lab x86.iso + +3. Take a snapshot of the REFW10X64-001 virtual machine, and name it **Clean with MDT Build Lab x86 ISO**. + + **Note**   + Taking a snapshot is useful if you need to restart the process and want to make sure you can start clean. + +   + +4. Start the REFW10X64-001 virtual machine. After booting into Windows PE, complete the Windows Deployment Wizard using the following settings: + + 1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Default Image + + 2. Specify whether to capture an image: Capture an image of this reference computer + + - Location: \\\\MDT01\\MDTBuildLab$\\Captures + + 3. File name: REFW10X64-001.wim + + ![figure 13](images/fig13-captureimage.png) + + Figure 13. The Windows Deployment Wizard for the Windows 10 reference image. + +5. The setup now starts and does the following: + + 1. Installs the Windows 10 Enterprise operating system. + + 2. Installs the added applications, roles, and features. + + 3. Updates the operating system via your local Windows Server Update Services (WSUS) server. + + 4. Stages Windows PE on the local disk. + + 5. Runs System Preparation (Sysprep) and reboots into Windows PE. + + 6. Captures the installation to a Windows Imaging (WIM) file. + + 7. Turns off the virtual machine. + +After some time, you will have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the E:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim. + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/create-an-application-to-deploy-with-windows-81-using-configuration-manager.md b/windows/deploy/create-an-application-to-deploy-with-windows-81-using-configuration-manager.md new file mode 100644 index 0000000000..a76f9d928b --- /dev/null +++ b/windows/deploy/create-an-application-to-deploy-with-windows-81-using-configuration-manager.md @@ -0,0 +1,102 @@ +--- +title: Create an application to deploy with Windows 10 using Configuration Manager (Windows 10) +description: Microsoft System Center 2012 R2 Configuration Manager supports deploying applications as part of the Windows 10 deployment process. +ms.assetid: 2dfb2f39-1597-4999-b4ec-b063e8a8c90c +keywords: ["deployment, task sequence, custom, customize"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Create an application to deploy with Windows 10 using Configuration Manager + + +**Applies to** + +- Windows 10 + +Microsoft System Center 2012 R2 Configuration Manager supports deploying applications as part of the Windows 10 deployment process. In this section, you create an application in System Center 2012 R2 Configuration Manager that you later configure the task sequence to use. + +For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +**Note**   +Even though the new application model is fully supported to deploy via the task sequence, the most reliable way to deploy software via the task sequence is still the legacy packages, especially if you deploy many applications. + +  + +## Example: Create the Adobe Reader XI application + + +The steps below show you how to create the Adobe Reader XI application. This section assumes that you have downloaded the MSI version of Adobe Reader XI to the C:\\Setup\\Adobe Reader XI folder on CM01. + +1. On CM01, using File Explorer, copy the **C:\\Setup\\Adobe Reader XI** folder to the **E:\\Sources\\Software\\Adobe** folder. + +2. Using the Configuration Manager Console, in the Software Library workspace, expand **Application Management**. + +3. Right-click **Applications** and select **Folder / Create Folder**. Assign the name **OSD**. + +4. Right-click the **OSD** folder, and select **Create Application**. + +5. In the Create Application Wizard, on the **General** page, use the following settings: + + 1. Automatically detect information about this application from installation files + + 2. Type: Windows Installer (\*.msi file) + + 3. Location: \\\\CM01\\Sources$\\Software\\Adobe\\Adobe Reader XI + + 4. \\AdbeRdr11000\_en\_US.msi + + ![figure 19](images/mdt-06-fig20.png) + + Figure 19. The Create Application Wizard. + +6. Click **Next**, and wait while Configuration Manager parses the MSI file. + +7. On the **Import Information** page, review the information and then click **Next**. + +8. On the **General Information** page, name the application Adobe Reader XI - OSD Install, click **Next** twice, and then click **Close**. + + **Note**   + Since it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence. + +   + + ![figure 20](images/mdt-06-fig21.png) + + Figure 20. Add the "OSD Install" suffix to the application name. + +9. In the **Applications** node, select the Adobe Reader XI - OSD Install application, and click **Properties** on the ribbon bar. + +10. In the **General Information** tab, select the **Allow this application to be installed from the Install Application task sequence action without being deployed** check box, and click **OK**. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/custom-xml-examples-usmt-win7-usmt-win8.md b/windows/deploy/custom-xml-examples-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..3767188242 --- /dev/null +++ b/windows/deploy/custom-xml-examples-usmt-win7-usmt-win8.md @@ -0,0 +1,313 @@ +--- +title: Custom XML Examples (Windows 10) +description: Custom XML Examples +ms.assetid: 48f441d9-6c66-43ef-91e9-7c78cde6fcc0 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Custom XML Examples + + +**Note**   +Because the tables in this topic are wide, you may need to adjust the width of its window. + +  + +## In This Topic: + + +- [Example 1: Migrating an Unsupported Application](#Example) + +- [Example 2: Migrating the My Videos Folder](#Example2) + +- [Example 3: Migrating Files and Registry Keys](#Example3) + +- [Example 4: Migrating Specific Folders from Various Locations](#Example4) + +## Example 1: Migrating an Unsupported Application + + +The following is a template for the sections that you need to migrate your application. The template is not functional on its own, but you can use it to write your own .xml file. + +``` syntax + + + + Some Application + + + + + + value + + + + + + + + + + + + MigXMLHelper.DoesObjectExist("Registry","HKLM\Software\MyApp [win32_version]") + + + + + MigXMLHelper.DoesFileVersionMatch("%MyAppExePath%","ProductVersion","8.*") + MigXMLHelper.DoesFileVersionMatch("%MyAppExePath%","ProductVersion","9.*") + + + + + + + + + HKCU\Software\MyApp\Toolbar\* [*] + HKCU\Software\MyApp\ListView\* [*] + HKCU\Software\MyApp [ShowTips] + + + + + + + HKCU\Software\MyApp\Toolbar\* [*] + HKCU\Software\MyApp\ListView\* [*] + HKCU\Software\MyApp [ShowTips] + + + + + + + HKCU\Software\MyApp [Display] + + + + + + +``` + +## Example 2: Migrating the My Videos Folder + + +The following is a custom .xml file named CustomFile.xml that migrates My Videos for all users, if the folder exists on the source computer. + + ++++ + + + + + + + + + + + + + + + + + + + + +
CodeBehavior
<condition>MigXmlHelper.DoesObjectExist("File","%CSIDL_MYVIDEO%")</condition>

Verifies that My Videos exists on the source computer.

<include filter='MigXmlHelper.IgnoreIrrelevantLinks()'>

Filters out the shortcuts in My Videos that do not resolve on the destination computer. This has no effect on files that are not shortcuts. For example, if there is a shortcut in My Videos on the source computer that points to C:\Folder1, that shortcut will be migrated only if C:\Folder1 exists on the destination computer. However, all other files, such as .mp3 files, migrate without any filtering.

<pattern type="File">%CSIDL_MYVIDEO%\* [*]</pattern>

Migrates My Videos for all users.

+ +  + +``` syntax + + + + My Video + + + + MigXmlHelper.DoesObjectExist("File","%CSIDL_MYVIDEO%") + + + + + + %CSIDL_MYVIDEO%\* [*] + + + + + + +``` + +## Example 3: Migrating Files and Registry Keys + + +This table describes the behavior in the following example .xml file. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
CodeBehavior
<pattern type="File">%ProgramFiles%\USMTTestFolder\* [USMTTestFile.txt]</pattern>

Migrates all instances of the file Usmttestfile.txt from all sub-directories under %ProgramFiles%\USMTTestFolder.

<pattern type="File">%ProgramFiles%\USMTDIRTestFolder\* [*]</pattern>

Migrates the whole directory under %ProgramFiles%\USMTDIRTestFolder.

<pattern type="Registry">HKCU\Software\USMTTESTKEY\* [MyKey]</pattern>

Migrates all instances of MyKey under HKCU\Software\USMTTESTKEY.

<pattern type="Registry">HKLM\Software\USMTTESTKEY\* [*]</pattern>

Migrates the entire registry hive under HKLM\Software\USMTTESTKEY.

+ +  + +``` syntax + + + File Migration Test + + + + + %ProgramFiles%\USMTTestFolder\* [USMTTestFile.txt] + %ProgramFiles%\USMTDIRTestFolder\* [*] + + + + + + + Registry Migration Test + + + + + HKCU\Software\USMTTESTKEY\* [MyKey] + HKLM\Software\USMTTESTKEY\* [*] + + + + + + +``` + +## Example 4: Migrating Specific Folders from Various Locations + + +The behavior for this custom .xml file is described within the <`displayName`> tags in the code. + +``` syntax + + + + Component to migrate all Engineering Drafts subfolders without documents in this folder + + + + + C:\EngineeringDrafts\* [*] + + + + + C:\EngineeringDrafts\ [*] + + + + + + + + Component to migrate all user documents except Sample.doc + + + + + C:\UserDocuments\* [*] + + + + + C:\UserDocuments\ [Sample.doc] + + + + + + + + Component to migrate all Requests folders on any drive on the computer + + + + + + + + + + + + + + Component to migrate all Presentations folder from any location on the C: drive + + + + + C:\*\Presentations\* [*] + C:\Presentations\* [*] + + + + + + +``` + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +[Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/customize-usmt-xml-files-usmt-win7-usmt-win8.md b/windows/deploy/customize-usmt-xml-files-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..719255d7bd --- /dev/null +++ b/windows/deploy/customize-usmt-xml-files-usmt-win7-usmt-win8.md @@ -0,0 +1,133 @@ +--- +title: Customize USMT XML Files (Windows 10) +description: Customize USMT XML Files +ms.assetid: d58363c1-fd13-4f65-8b91-9986659dc93e +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Customize USMT XML Files + + +## In This Topic + + +[Overview](#BKMK_Overview) + +[Migration .xml Files](#BKMK_MigXML) + +[Custom .xml Files](#BKMK_CustomXMLFiles) + +[The Config.xml File](#BKMK_ConfigXML) + +[Examples](#BKMK_Examples) + +[Additional Information](#BKMK_AddlInfo) + +## Overview + + +If you want the **ScanState** and **LoadState** tools to use any of the migration .xml files, specify these files at the command line using the **/i** option. Because the **ScanState** and **LoadState** tools need the .xml files to control the migration, specify the same set of .xml files for both the **ScanState** and **LoadState** commands. However, you do not have to specify the Config.xml file with the **/config** option, unless you want to exclude some of the files and settings that you migrated to the store. For example, you might want to migrate the My Documents folder to the store but not to the destination computer. To do this, modify the Config.xml file and specify the updated file with the **LoadState** command. Then the **LoadState** command will migrate only the files and settings that you want to migrate. + +If you leave out an .xml file from the **LoadState** command, all of the data in the store that was migrated with the missing .xml files will be migrated. However, the migration rules that were specified with the **ScanState** command will not apply. For example, if you leave out an .xml file, and it contains a rerouting rule such as: `MigsysHelperFunction.RelativeMove("c:\data", "%CSIDL_PERSONAL%")`, USMT will not reroute the files, and they will be migrated to C:\\data. + +To modify the migration, do one or more of the following. + +- **Modify the migration .xml files.** If you want to exclude a portion of a component—for example, you want to migrate C:\\ but exclude all of the .mp3 files—or if you want to move data to a new location on the destination computer, modify the .xml files. To modify these files, you must be familiar with the migration rules and syntax. If you want **ScanState** and **LoadState** to use these files, specify them at the command line when each command is entered. + +- **Create a custom .xml file.** You can also create a custom .xml file to migrate settings for another application, or to change the migration behavior to suit your needs. For **ScanState** and **LoadState** to use this file, specify them on both command lines. + +- **Create and modify a Config.xml file.** Do this if you want to exclude an entire component from the migration. For example, you can use a Config.xml file to exclude the entire My Documents folder, or exclude the settings for an application. Excluding components using a Config.xml file is easier than modifying the migration .xml files because you do not need to be familiar with the migration rules and syntax. In addition, using a Config.xml file is the only way to exclude the operating system settings from being migrated. + +For more information about excluding data, see the [Exclude Files and Settings](exclude-files-and-settings-usmt.md) topic. + +## Migration .xml Files + + +This section describes the migration .xml files that are included with USMT. Each file contains migration rules that control which components are migrated and where they are migrated to on the destination computer. + +**Note**   +You can use the asterisk (\*) wildcard character in each of these files. However, you cannot use a question mark (?) as a wildcard character. + +  + +- **The MigApp.xml file.** Specify this file with both the **ScanState** and **LoadState** commands to migrate application settings. + +- **The MigDocs.xml file.** Specify this file with both the **ScanState** and **LoadState** tools to migrate all user folders and files that are found by the **MigXmlHelper.GenerateDocPatterns** helper function. This helper function finds user data that resides on the root of any drive and in the Users directory. However, it does not find and migrate any application data, program files, or any files in the Windows directory. You can modify the MigDocs.xml file. + +- **The MigUser.xml file.** Specify this file with both the **ScanState** and **LoadState** commands to migrate user folders, files, and file types. You can modify the MigUser.xml file. This file does not contain rules that migrate specific user accounts. The only way to specify which user accounts to migrate is on the command line using the **ScanState** and the **LoadState** user options. + + **Note**   + Do not use the MigUser.xml and MigDocs.xml files together. For more information, see the [Identify File Types, Files, and Folders](identify-file-types-files-and-folders-usmt-win8.md) and [USMT Best Practices](usmt-best-practices-usmt-win7-usmt-win8.md) topics. + +   + +## Custom .xml Files + + +You can create custom .xml files to customize the migration for your unique needs. For example, you may want to create a custom file to migrate a line-of-business application or to modify the default migration behavior. If you want **ScanState** and **LoadState** to use this file, specify it with both commands. For more information, see the How to Create a Custom .xml File topic. + +## The Config.xml File + + +The Config.xml file is an optional file that you create using the **/genconfig** option with the **ScanState** command. You should create and modify this file if you want to exclude certain components from the migration. In addition, you must create and modify this file if you want to exclude any of the operating system settings from being migrated. The Config.xml file format is different from that of the migration .xml files because it does not contain any migration rules. It contains only a list of the operating system components, applications, and the user documents that can be migrated. For an example, see the [Config.xml File](configxml-file-usmt-win7-usmt-win8.md) topic. For this reason, excluding components using this file is easier than modifying the migration .xml files because you do not need to be familiar with the migration rules and syntax. However, you cannot use wildcard characters in a Config.xml file. + +If you want to include all of the default components, you do not need to create the Config.xml file. Alternatively, if you are satisfied with the default migration behavior defined in the MigApp.xml, MigDocs.xml, and MigUser.xml files, and you want to exclude only some components, you can create and modify a Config.xml file and leave the other .xml files in their original state. + +When you run the **ScanState** command with the **/genconfig** option, **ScanState** reads the other .xml files that you specify using the **/i** option to create a custom list of components that can be migrated from the computer. This file will contain only operating system components, applications, and the user document sections that are in both of the .xml files and that are installed on the computer when you run the **ScanState** command with the **/genconfig** option. Therefore, you should create this file on a source computer that contains all of the components, applications, and settings that will be present on the destination computers. This will ensure that this file contains every component that can be migrated. The components are organized into sections: <Applications>, <WindowsComponents>, and <Documents>. To choose not to migrate a component, change its entry to `migrate="no"`. + +After you create this file, you need to specify it only with the **ScanState** command using the **/Config** option for it to affect the migration. However, if you want to exclude additional data that you migrated to the store, modify the Config.xml file and specify the updated file with the **LoadState** command. For example, if you collected the My Documents folder in the store, but you decide that you do not want to migrate the My Documents folder to a destination computer, you can modify the Config.xml file to indicate `migrate="no"` before you run the **LoadState** command, and the file will not be migrated. For more information about the precedence that takes place when excluding data, see the [Exclude Files and Settings](exclude-files-and-settings-usmt.md) topic. + +In addition, note the following functionality with the Config.xml file: + +- If a parent component is removed from the migration in the Config.xml file by specifying `migrate="no"`, all of its child components will automatically be removed from the migration, even if the child component is set to `migrate="yes"`. + +- If you mistakenly have two lines of code for the same component where one line specifies `migrate="no" `and the other line specifies `migrate="yes"`, the component will be migrated. + +- In USMT there are several migration policies that can be configured in the Config.xml file. For example, you can configure additional **<ErrorControl>**, **<ProfileControl>**, and **<HardLinkStoreControl>** options. For more information, see the [Config.xml File](configxml-file-usmt-win7-usmt-win8.md) topic. + +**Note**   +To exclude a component from the Config.xml file, set the **migrate** value to **"no"**. Deleting the XML tag for the component from the Config.xml file will not exclude the component from your migration. + +  + +### Examples + +- The following command creates a Config.xml file in the current directory, but it does not create a store: + + `scanstate /i:migapp.xml /i:migdocs.xml /genconfig:config.xml /v:5` + +- The following command creates an encrypted store using the Config.xml file and the default migration .xml files: + + `scanstate \\server\share\migration\mystore /i:migapp.xml /i:migdocs.xml /o /config:config.xml /v:5 /encrypt /key:"mykey"` + +- The following command decrypts the store and migrates the files and settings: + + `loadstate \\server\share\migration\mystore /i:migapp.xml /i:migdocs.xml /v:5 /decrypt /key:"mykey"` + +## Additional Information + + +- For more information about how to change the files and settings that are migrated, see the [User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md). + +- For more information about each .xml element, see the [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) topic. + +- For answers to common questions, see ".xml files" in the [Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md) topic. + +## Related topics + + +[User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md) + +[USMT Resources](usmt-resources-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/deploy-a-windows-81-image-using-mdt-2013.md b/windows/deploy/deploy-a-windows-81-image-using-mdt-2013.md new file mode 100644 index 0000000000..44b839f055 --- /dev/null +++ b/windows/deploy/deploy-a-windows-81-image-using-mdt-2013.md @@ -0,0 +1,927 @@ +--- +title: Deploy a Windows 10 image using MDT 2013 Update 1 (Windows 10) +description: This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 specifically. +ms.assetid: 1d70a3d8-1b1d-4051-b656-c0393a93f83c +keywords: ["deployment, automate, tools, configure"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy a Windows 10 image using MDT 2013 Update 1 + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Step 1: Configure Active Directory permissions](#sec01) +- [Step 2: Set up the MDT production deployment share](#sec02) +- [Step 3: Add a custom image](#sec03) +- [Step 4: Add an application](#sec04) +- [Step 5: Prepare the drivers repository](#sec05) +- [Step 6: Create the deployment task sequence](#sec06) +- [Step 7: Configure the MDT production deployment share](#sec07) +- [Step 8: Deploy the Windows 10 client image](#sec08) +- [Multicast deployments](#sec09) +- [Use offline media to deploy Windows 10](#sec10) +- [Unified Extensible Firmware Interface (UEFI)-based deployments](#sec11) +- [Related topics](#related_topics) + +This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 specifically. You will prepare for this by creating a MDT deployment share that is used solely for image deployment. Separating the processes of creating reference images from the processes used to deploy them in production allows greater control of on both processes. You will then configure the deployment share, create a new task sequence, add applications, add drivers, add rules, and configure Active Directory permissions for deployment. + +For the purposes of this topic, we will use three machines: DC01, MDT01, and PC0005. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 standard server, and PC0005 is a blank machine to which you deploy Windows 10. MDT01 and PC0005 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +![figure 1](images/mdt-07-fig01.png) + +Figure 1. The machines used in this topic. + +## Step 1: Configure Active Directory permissions + + +These steps will show you how to configure an Active Directory account with the permissions required to deploy a Windows 10 machine to the domain using MDT. These steps assume you have downloaded the sample [Set-OUPermissions.ps1 script](http://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to C:\\Setup\\Scripts on DC01. The account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01. In order for MDT to join machines into the contoso.com domain you need to create an account and configure permissions in Active Directory. + +1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**. + +2. Select the **Service Accounts** organizational unit (OU) and create the MDT\_JD account using the following settings: + + 1. Name: MDT\_JD + + 2. User logon name: MDT\_JD + + 3. Password: P@ssw0rd + + 4. User must change password at next logon: Clear + + 5. User cannot change password: Select + + 6. Password never expires: Select + +3. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands and press **Enter** after each command: + + ``` syntax + Set-ExecutionPolicy -ExecutionPolicy RemoteSigned ?Force + Set-Location C:\Setup\Scripts + .\Set-OUPermissions.ps1 -Account MDT_JD + -TargetOU "OU=Workstations,OU=Computers,OU=Contoso" + ``` + +4. The Set-OUPermissions.ps1 script allows the MDT\_JD user account permissions to manage computer accounts in the Contoso / Computers OU. Below you find a list of the permissions being granted: + + 1. Scope: This object and all descendant objects + + 1. Create Computer objects + + 2. Delete Computer objects + + 2. Scope: Descendant Computer objects + + 1. Read All Properties + + 2. Write All Properties + + 3. Read Permissions + + 4. Modify Permissions + + 5. Change Password + + 6. Reset Password + + 7. Validated write to DNS host name + + 8. Validated write to service principal name + +## Step 2: Set up the MDT production deployment share + + +When you are ready to deploy Windows 10 in a production environment, you will first create a new MDT deployment share. You should not use the same deployment share that you used to create the reference image for a production deployment. For guidance on creating a custom Windows 10 image, see [Create a Windows 10 reference image](create-a-windows-81-reference-image.md). + +### Create the MDT production deployment share + +The steps for creating the deployment share for production are the same as when you created the deployment share for creating the custom reference image: + +1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd.** + +2. Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. + +3. On the **Path** page, in the **Deployment share path** text box, type **E:\\MDTProduction** and click **Next**. + +4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and click **Next**. + +5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and click **Next**. + +6. On the **Options** page, accept the default settings and click **Next** twice, and then click **Finish**. + +7. Using File Explorer, verify that you can access the **\\\\MDT01\\MDTProduction$** share. + +## Step 3: Add a custom image + + +The next step is to add a reference image into the deployment share with the setup files required to successfully deploy Windows 10. When adding a custom image, you still need to copy setup files (an option in the wizard) because Windows 10 stores additional components in the Sources\\SxS folder which is outside the image and may be required when installing components. + +### Add the Windows 10 Enterprise x64 RTM custom image + +In these steps, we assume that you have completed the steps in the [Create a Windows 10 reference image](create-a-windows-81-reference-image.md) topic, so you have a Windows 10 reference image in the E:\\MDTBuildLab\\Captures folder on MDT01. + +1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**; select the **Operating Systems** node, and create a folder named **Windows 10**. + +2. Right-click the **Windows 10** folder and select **Import Operating System**. + +3. On the **OS Type** page, select **Custom image file** and click **Next**. + +4. On the **Image** page, in the **Source file** text box, browse to **E:\\MDTBuildLab\\Captures\\REFW10X64-001.wim** and click **Next**. + +5. On the **Setup** page, select the **Copy Windows 7, Windows Server 2008 R2, or later setup files from the specified path** option; in the **Setup source directory** text box, browse to **E:\\MDTBuildLab\\Operating Systems\\W10EX64RTM** and click **Next**. + +6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, click **Next** twice, and then click **Finish**. + +7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to match the following: **Windows 10 Enterprise x64 RTM Custom Image**. + +**Note**   +The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image. + +  + +![figure 2](images/fig2-importedos.png) + +Figure 2. The imported operating system after renaming it. + +## Step 4: Add an application + + +When you configure your MDT Build Lab deployment share, you will also add any applications to the new deployment share before creating your task sequence. This section walks you through the process of adding an application to the MDT Production deployment share using Adobe Reader as an example. + +### Create the install: Adobe Reader XI x86 + +In this example, we assume that you have downloaded the Adobe Reader XI installation file (AdbeRdr11000\_eu\_ES.msi) to E:\\Setup\\Adobe Reader on MDT01. + +1. Using the Deployment Workbench, expand the **MDT Production** node and navigate to the **Applications** node. + +2. Right-click the **Applications** node, and create a new folder named **Adobe**. + +3. In the **Applications** node, right-click the **Adobe** folder and select **New Application**. + +4. On the **Application Type** page, select the **Application with source files** option and click **Next**. + +5. On the **Details** page, in the **Application** name text box, type **Install - Adobe Reader XI - x86** and click **Next**. + +6. On the **Source** page, in the **Source Directory** text box, browse to **E:\\Setup\\Adobe Reader XI** and click **Next**. + +7. On the **Destination** page, in the **Specify the name of the directory that should be created** text box, type **Install - Adobe Reader XI - x86** and click **Next**. + +8. On the **Command Details** page, in the **Command Line** text box, type **msiexec /i AdbeRdr11000\_eu\_ES.msi /q**, click **Next** twice, and then click **Finish**. + +![figure 3](images/mdt-07-fig03.png) + +Figure 3. The Adobe Reader application added to the Deployment Workbench. + +## Step 5: Prepare the drivers repository + + +In order to deploy Windows 10 with MDT 2013 Update 1 successfully, you need drivers for the boot images and for the actual operating system. This section will show you how to add drivers for the boot image and operating system, using the following hardware models as examples: + +- Lenovo ThinkPad T420 + +- Dell Latitude E6440 + +- HP EliteBook 8560w + +- Microsoft Surface Pro + +For boot images, you need to have storage and network drivers; for the operating system, you need to have the full suite of drivers. + +**Note**   +You should only add drivers to the Windows PE images if the default drivers don't work. Adding drivers that are not necessary will only make the boot image larger and potentially delay the download time. + +  + +### Create the driver source structure in the file system + +The key to successful management of drivers for MDT 2013 Update 1, as well as for any other deployment solution, is to have a really good driver repository. From this repository, you import drivers into MDT for deployment, but you should always maintain the repository for future use. + +1. On MDT01, using File Explorer, create the **E:\\Drivers** folder. + +2. In the **E:\\Drivers** folder, create the following folder structure: + + 1. WinPE x86 + + 2. WinPE x64 + + 3. Windows 10 x64 + +3. In the new Windows 10 x64 folder, create the following folder structure: + + - Dell + + - Latitude E6440 + + - HP + + - HP EliteBook 8560w + + - Lenovo + + - ThinkPad T420 (4178) + + - Microsoft + + - Surface Pro 3 + +**Note**   +Even if you are not going to use both x86 and x64 boot images, we still recommend that you add the support structure for future use. + +  + +### Create the logical driver structure in MDT 2013 Update 1 + +When you import drivers to the MDT 2013 Update 1 driver repository, MDT creates a single instance folder structure based on driver class names. However, you can, and should, mimic the driver structure of your driver source repository in the Deployment Workbench. This is done by creating logical folders in the Deployment Workbench. + +1. On MDT01, using Deployment Workbench, select the **Out-of-Box Drivers** node. + +2. In the **Out-Of-Box Drivers** node, create the following folder structure: + + 1. WinPE x86 + + 2. WinPE x64 + + 3. Windows 10 x64 + +3. In the **Windows 10 x64** folder, create the following folder structure: + + - Dell Inc. + + - Latitude E6440 + + - Hewlett-Packard + + - HP EliteBook 8560w + + - Lenovo + + - 4178 + + - Microsoft + + - Surface Pro 3 + +The preceding folder names are selected because they match the actual make and model values that MDT reads from the machines during deployment. You can find out the model values for your machines via the following command in Windows PowerShell: + +``` syntax +Get-WmiObject -Class:Win32_ComputerSystem +``` + +Or, you can use this command in a normal command prompt: + +``` syntax +wmic csproduct get name +``` + +If you want a more standardized naming convention, try the ModelAliasExit.vbs script from the Deployment Guys blog post entitled [Using and Extending Model Aliases for Hardware Specific Application Installation](http://go.microsoft.com/fwlink/p/?LinkId=619536). + +![figure 4](images/fig4-oob-drivers.png) + +Figure 4. The Out-of-Box Drivers structure in Deployment Workbench. + +### Create the selection profiles for boot image drivers + +By default, MDT adds any storage and network drivers that you import to the boot images. However, you should add only the drivers that are necessary to the boot image. You can control which drivers are added by using selection profiles. + +The drivers that are used for the boot images (Windows PE) are Windows 10 drivers. If you can’t locate Windows 10 drivers for your device, a Windows 7 or Windows 8.1 driver will most likely work, but Windows 10 drivers should be your first choice. + +1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Advanced Configuration** node, right-click the **Selection Profiles** node, and select **New Selection Profile**. + +2. In the New Selection Profile Wizard, create a selection profile with the following settings: + + 1. Selection Profile name: WinPE x86 + + 2. Folders: Select the WinPE x86 folder in Out-of-Box Drivers. + +3. Again, right-click the **Selection Profiles** node, and select **New Selection Profile**. + +4. In the New Selection Profile Wizard, create a selection profile with the following settings: + + 1. Selection Profile name: WinPE x64 + + 2. Folders: Select the WinPE x64 folder in Out-of-Box Drivers. + +![figure 5](images/fig5-selectprofile.png) + +Figure 5. Creating the WinPE x64 selection profile. + +### Extract and import drivers for the x64 boot image + +Windows PE supports all the hardware models that we have, but here you learn to add boot image drivers to accommodate any new hardware that might require additional drivers. In this example, you add the latest Intel network drivers to the x64 boot image. + +In these steps, we assume you have downloaded PROWinx64.exe from Intel.com and saved it to a temporary folder. + +1. Extract PROWinx64.exe to a temporary folder - in this example to the **C:\\Tmp\\ProWinx64** folder. + +2. Using File Explorer, create the **E:\\Drivers\\WinPE x64\\Intel PRO1000** folder. + +3. Copy the content of the **C:\\Tmp\\PROWinx64\\PRO1000\\Winx64\\NDIS64** folder to the **E:\\Drivers\\WinPE x64\\Intel PRO1000** folder. + +4. Using Deployment Workbench, expand the **Out-of-Box Drivers** node, right-click the **WinPE x64** node, and select **Import Drivers**. Use the following setting for the Import Drivers Wizard: + + - Driver source directory: **E:\\Drivers\\WinPE x64\\Intel PRO1000** + +### Download, extract, and import drivers + +### For the ThinkPad T420 + +For the Lenovo T420 model, you use the Lenovo ThinkVantage Update Retriever software to download the drivers. With Update Retriever, you need to specify the correct Lenovo Machine Type for the actual hardware (the first four characters of the model name). As an example, the Lenovo T420 model has the 4178B9G model name, meaning the Machine Type is 4178. + +To get the updates, you download the drivers from the Lenovo ThinkVantage Update Retriever using its export function. You can download the drivers from the [Lenovo website](http://go.microsoft.com/fwlink/p/?LinkId=619543). + +In these steps, we assume you have downloaded and extracted the drivers using ThinkVantage Update Retriever v5.0 to the E:\\Drivers\\Lenovo\\ThinkPad T420 (4178) folder. + +1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Lenovo** node. + +2. Right-click the **4178** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard: + + - Driver source directory: **E:\\Drivers\\Windows 10 x64\\Lenovo\\ThinkPad T420 (4178)** + +### For the Latitude E6440 + +For the Dell Latitude E6440 model, you use the Dell Driver CAB file, which is accessible via the [Dell TechCenter website](http://go.microsoft.com/fwlink/p/?LinkId=619544). + +In these steps, we assume you have downloaded and extracted the CAB file for the Latitude E6440 model to the E:\\Drivers\\Dell\\Latitude E6440 folder. + +1. On **MDT01**, using the **Deployment Workbench**, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Dell** node. + +2. Right-click the **Latitude E6440** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard: + + - Driver source directory: **E:\\Drivers\\Windows 10 x64\\Dell\\Latitude E6440** + +### For the HP EliteBook 8560w + +For the HP EliteBook 8560w, you use HP SoftPaq Download Manager to get the drivers. The HP SoftPaq Download Manager can be accessed on the [HP Support site](http://go.microsoft.com/fwlink/p/?LinkId=619545). + +In these steps, we assume you have downloaded and extracted the drivers for the HP EliteBook 8650w model to the E:\\Drivers\\Windows 10 x64\\HP\\HP EliteBook 8560w folder. + +1. On **MDT01**, using the **Deployment Workbench**, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Hewlett-Packard** node. + +2. Right-click the **HP EliteBook 8560w** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard: + + - Driver source directory: **E:\\Drivers\\Windows 10 x64\\HP\\HP EliteBook 8560w** + +### For the Microsoft Surface Pro 3 + +For the Microsoft Surface Pro model, you find the drivers on the Microsoft website. In these steps we assume you have downloaded and extracted the Surface Pro 3 drivers to the E:\\Drivers\\Windows 10 x64\\Microsoft\\Surface Pro 3 folder. + +1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Microsoft** node. + +2. Right-click the **Surface Pro 3** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard: + + - Driver source directory: **E:\\Drivers\\Windows 10 x64\\Microsoft\\Surface Pro 3** + +## Step 6: Create the deployment task sequence + + +This section will show you how to create the task sequence used to deploy your production Windows 10 reference image. You will then configure the tasks sequence to enable patching via a Windows Server Update Services (WSUS) server. + +### Create a task sequence for Windows 10 Enterprise + +1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, and create a folder named **Windows 10**. + +2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: + + 1. Task sequence ID: W10-X64-001 + + 2. Task sequence name: Windows 10 Enterprise x64 RTM Custom Image + + 3. Task sequence comments: Production Image + + 4. Template: Standard Client Task Sequence + + 5. Select OS: Windows 10 Enterprise x64 RTM Custom Image + + 6. Specify Product Key: Do not specify a product key at this time + + 7. Full Name: Contoso + + 8. Organization: Contoso + + 9. Internet Explorer home page: about:blank + + 10. Admin Password: Do not specify an Administrator Password at this time + +### Edit the Windows 10 task sequence + +1. Right-click the **Windows 10 Enterprise x64 RTM Custom Image** task sequence, and select **Properties**. + +2. On the **Task Sequence** tab, configure the **Windows 10 Enterprise x64 RTM Custom Image** task sequence with the following settings: + + 1. Preinstall. After the **Enable BitLocker (Offline)** action, add a **Set Task Sequence Variable** action with the following settings: + + 1. Name: Set DriverGroup001 + + 2. Task Sequence Variable: DriverGroup001 + + 3. Value: Windows 10 x64\\%Make%\\%Model% + + 2. Configure the **Inject Drivers** action with the following settings: + + 1. Choose a selection profile: Nothing + + 2. Install all drivers from the selection profile + + **Note**   + The configuration above indicates that MDT should only use drivers from the folder specified by the DriverGroup001 property, which is defined by the "Choose a selection profile: Nothing" setting, and that MDT should not use plug and play to determine which drivers to copy, which is defined by the "Install all drivers from the selection profile" setting. + +   + + 3. State Restore. Enable the **Windows Update (Pre-Application Installation)** action. + + 4. State Restore. Enable the **Windows Update (Post-Application Installation)** action. + +3. Click **OK**. + +![figure 6](images/fig6-taskseq.png) + +Figure 6. The task sequence for production deployment. + +## Step 7: Configure the MDT production deployment share + + +In this section, you will learn how to configure the MDT Build Lab deployment share with the rules required to create a simple and dynamic deployment process. This includes configuring commonly used rules and an explanation of how these rules work. + +### Configure the rules + +1. On MDT01, using File Explorer, copy the following files from the **D:\\Setup\\Sample Files\\MDT Production\\Control** folder to **E:\\MDTProduction\\Control**. Overwrite the existing files. + + 1. Bootstrap.ini + + 2. CustomSettings.ini + +2. Right-click the **MDT Production** deployment share and select **Properties**. + +3. Select the **Rules** tab and modify using the following information: + + ``` syntax + [Settings] + Priority=Default + [Default] + _SMSTSORGNAME=Contoso + OSInstall=YES + UserDataLocation=AUTO + TimeZoneName=Pacific Standard Time + AdminPassword=P@ssw0rd + JoinDomain=contoso.com + DomainAdmin=CONTOSO\MDT_JD + DomainAdminPassword=P@ssw0rd + MachineObjectOU=OU=Workstations,OU=Computers,OU=Contoso,DC=contoso,DC=com + SLShare=\\MDT01\Logs$ + ScanStateArgs=/ue:*\* /ui:CONTOSO\* + USMTMigFiles001=MigApp.xml + USMTMigFiles002=MigUser.xml + HideShell=YES + ApplyGPOPack=NO + WSUSServer=mdt01.contoso.com:8530 + SkipAppsOnUpgrade=NO + SkipAdminPassword=YES + SkipProductKey=YES + SkipComputerName=NO + SkipDomainMembership=YES + SkipUserData=YES + SkipLocaleSelection=YES + SkipTaskSequence=NO + SkipTimeZone=YES + SkipApplications=NO + SkipBitLocker=YES + SkipSummary=YES + SkipCapture=YES + SkipFinalSummary=NO + ``` + +4. Click **Edit Bootstrap.ini** and modify using the following information: + + ``` syntax + [Settings] + Priority=Default + [Default] + DeployRoot=\\MDT01\MDTProduction$ + UserDomain=CONTOSO + UserID=MDT_BA + SkipBDDWelcome=YES + ``` + +5. In the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected. + +6. In the **General** sub tab, configure the following settings: + + - In the **Lite Touch Boot Image Settings** area: + + 1. Image description: MDT Production x86 + + 2. ISO file name: MDT Production x86.iso + + **Note**   + Because you are going to use Pre-Boot Execution Environment (PXE) later to deploy the machines, you do not need the ISO file; however, we recommend creating ISO files because they are useful when troubleshooting deployments and for quick tests. + +   + +7. In the **Drivers and Patches** sub tab, select the **WinPE x86** selection profile and select the **Include all drivers from the selection profile** option. + +8. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**. + +9. In the **General** sub tab, configure the following settings: + + - In the **Lite Touch Boot Image Settings** area: + + 1. Image description: MDT Production x64 + + 2. ISO file name: MDT Production x64.iso + +10. In the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option. + +11. In the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box. + +12. Click **OK**. + +**Note**   +It will take a while for the Deployment Workbench to create the monitoring database and web service. + +  + +![figure 8](images/mdt-07-fig08.png) + +Figure 7. The Windows PE tab for the x64 boot image. + +### The rules explained + +The rules for the MDT Production deployment share are somewhat different from those for the MDT Build Lab deployment share. The biggest differences are that you deploy the machines into a domain instead of a workgroup and that you do not automate the logon. + +### The Bootstrap.ini file + +This is the MDT Production Bootstrap.ini without the user credentials (except domain information): + +``` syntax +[Settings] +Priority=Default +[Default] +DeployRoot=\\MDT01\MDTProduction$ + +UserDomain=CONTOSO +UserID=MDT_BA + +SkipBDDWelcome=YES +``` + +### The CustomSettings.ini file + +This is the CustomSettings.ini file with the new join domain information: + +``` syntax +[Settings] +Priority=Default +[Default] +_SMSTSORGNAME=Contoso +OSInstall=Y +UserDataLocation=AUTO +TimeZoneName=Pacific Standard Time +AdminPassword=P@ssw0rd +JoinDomain=contoso.com +DomainAdmin=CONTOSO\MDT_JD +DomainAdminPassword=P@ssw0rd +MachineObjectOU=OU=Workstations,OU=Computers,OU=Contoso,DC=contoso,DC=com +SLShare=\\MDT01\Logs$ +ScanStateArgs=/ue:*\* /ui:CONTOSO\* +USMTMigFiles001=MigApp.xml +USMTMigFiles002=MigUser.xml +HideShell=YES +ApplyGPOPack=NO +WSUSServer=http://mdt01.contoso.com:8530 +SkipAppsOnUpgrade=NO +SkipAdminPassword=YES +SkipProductKey=YES +SkipComputerName=NO +SkipDomainMembership=YES +SkipUserData=YES +SkipLocaleSelection=YES +SkipTaskSequence=NO +SkipTimeZone=YES +SkipApplications=NO +SkipBitLocker=YES +SkipSummary=YES +SkipCapture=YES +SkipFinalSummary=NO +EventService=http://MDT01:9800 +``` + +The additional properties to use in the MDT Production rules file are as follows: + +- **JoinDomain.** The domain to join. + +- **DomainAdmin.** The account to use when joining the machine to the domain. + +- **DomainAdminDomain.** The domain for the join domain account. + +- **DomainAdminPassword.** The password for the join domain account. + +- **MachineObjectOU.** The organizational unit (OU) to which to add the computer account. + +- **ScanStateArgs.** Arguments for the User State Migration Tool (USMT) ScanState command. + +- **USMTMigFiles(\*).** List of USMT templates (controlling what to backup and restore). + +- **EventService.** Activates logging information to the MDT monitoring web service. + +### Optional deployment share configuration + +If your organization has a Microsoft Software Assurance agreement, you also can subscribe to the additional Microsoft Desktop Optimization Package (MDOP) license (at an additional cost). Included in MDOP is Microsoft Diagnostics and Recovery Toolkit (DaRT), which contains tools that can help you troubleshoot MDT deployments, as well as troubleshoot Windows itself. + +### Add DaRT 10 to the boot images + +If you have licensing for MDOP and DaRT, you can add DaRT to the boot images using the steps in this section. If you do not have DaRT licensing, or don't want to use it, simply skip to the next section, [Update the Deployment Share](#BKMK_update_deployment). To enable the remote connection feature in MDT 2013 Update 1, you need to do the following: + +- Install DaRT 10 (part of MDOP 2015 R1). + +- Copy the two tools CAB files (Toolsx86.cab and Toolsx64.cab) to the deployment share. + +- Configure the deployment share to add DaRT. + +In these steps, we assume that you downloaded MDOP 2015 R1 and copied DaRT 10 to the E:\\Setup\\DaRT 10 folder on MDT01. + +1. On MDT01, install DaRT 10 (MSDaRT10.msi) using the default settings. + +2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder. + +3. Copy the Toolsx64.cab file to **E:\\MDTProduction\\Tools\\x64**. + +4. Copy the Toolsx86.cab file to **E:\\MDTProduction\\Tools\\x86**. + +5. Using the Deployment Workbench, right-click the **MDT Production** deployment share and select **Properties**. + +6. In the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected. + +7. In the **Features** sub tab, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box. + + ![figure 8](images/mdt-07-fig09.png) + + Figure 8. Selecting the DaRT 10 feature in the deployment share. + +8. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**. + +9. In the **Features** sub tab, in addition to the default selected feature pack, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box. + +10. Click **OK**. + +### Update the deployment share + +Like the MDT Build Lab deployment share, the MDT Production deployment share needs to be updated after it has been configured. This is the process during which the Windows PE boot images are created. + +1. Right-click the **MDT Production** deployment share and select **Update Deployment Share**. + +2. Use the default options for the Update Deployment Share Wizard. + +**Note**   +The update process will take 5 to 10 minutes. + +  + +## Step 8: Deploy the Windows 10 client image + + +These steps will walk you throug the process of using task sequences to deploy Windows 10 images through a fully automated process. First, you need to add the boot image to Windows Deployment Services (WDS) and then start the deployment. In contrast with deploying images from the MDT Build Lab deployment share, we recommend using the Pre-Installation Execution Environment (PXE) to start the full deployments in the datacenter, even though you technically can use an ISO/CD or USB to start the process. + +### Configure Windows Deployment Services + +You need to add the MDT Production Lite Touch x64 Boot image to WDS in preparation for the deployment. For the following steps, we assume that Windows Deployment Services has already been installed on MDT01. + +1. Using the WDS console, right-click **Boot Images** and select **Add Boot Image**. + +2. Browse to the E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim file and add the image with the default settings. + +![figure 9](images/mdt-07-fig10.png) + +Figure 9. The boot image added to the WDS console. + +### Deploy the Windows 10 client + +At this point, you should have a solution ready for deploying the Windows 10 client. We recommend starting by trying a few deployments at a time until you are confident that your configuration works as expected. We find it useful to try some initial tests on virtual machines before testing on physical hardware. This helps rule out hardware issues when testing or troubleshooting. Here are the steps to deploy your Windows 10 image to a virtual machine: + +1. Create a virtual machine with the following settings: + + 1. Name: PC0005 + + 2. Location: C:\\VMs + + 3. Generation: 2 + + 4. Memory: 2048 MB + + 5. Hard disk: 60 GB (dynamic disk) + +2. Start the PC0005 virtual machine, and press **Enter** to start the PXE boot. The machine will now load the Windows PE boot image from the WDS server. + + ![figure 10](images/mdt-07-fig11.png) + + Figure 10. The initial PXE boot process of PC0005. + +3. After Windows PE has booted, complete the Windows Deployment Wizard using the following setting: + + 1. Password: P@ssw0rd + + 2. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image + + 3. Computer Name: PC0005 + + 4. Applications: Select the Install - Adobe Reader XI - x86 application. + +4. The setup now starts and does the following: + + 1. Installs the Windows 10 Enterprise operating system. + + 2. Installs the added application. + + 3. Updates the operating system via your local Windows Server Update Services (WSUS) server. + +### Use the MDT 2013 monitoring feature + +Now that you have enabled the monitoring on the MDT Production deployment share, you can follow your deployment of PC0005 via the monitoring node. + +1. On MDT01, using Deployment Workbench, expand the **MDT Production** deployment share folder. + +2. Select the **Monitoring** node, and wait until you see PC0005. + +3. Double-click PC0005, and review the information. + +![figure 11](images/mdt-07-fig13.png) + +Figure 11. The Monitoring node, showing the deployment progress of PC0005. + +### Use information in the Event Viewer + +When monitoring is enabled, MDT also writes information to the event viewer on MDT01. This information can be used to trigger notifications via scheduled tasks when deployment is completed. For example, you can configure scheduled tasks to send an email when a certain event is created in the event log. + +![figure 12](images/mdt-07-fig14.png) + +Figure 12. The Event Viewer showing a successful deployment of PC0005. + +## Multicast deployments + + +Multicast deployment allows for image deployment with reduced network load during simultaneous deployments. Multicast is a useful operating system deployment feature in MDT deployments, however it is important to ensure that your network supports it and is designed for it. + +### Requirements + +Multicast requires that Windows Deployment Services (WDS) is running on Windows Server 2008 or later. In addition to the core MDT 2013 setup for multicast, the network needs to be configured to support multicast. In general, this means involving the organization networking team to make sure that Internet Group Management Protocol (IGMP) snooping is turned on and that the network is designed for multicast traffic. The multicast solution uses IGMPv3. + +### Set up MDT for multicast + +Setting up MDT for multicast is straightforward. You enable multicast on the deployment share, and MDT takes care of the rest. + +1. On MDT01, right-click the **MDT Production** deployment share folder and select **Properties**. + +2. In the **General** tab, select the **Enable multicast for this deployment share (requires Windows Server 2008 R2 Windows Deployment Services)** check box, and click **OK**. + +3. Right-click the **MDT Production** deployment share folder and select **Update Deployment Share**. + +4. After updating the deployment share, use the Windows Deployment Services console to, verify that the multicast namespace was created. + +![figure 13](images/mdt-07-fig15.png) + +Figure 13. The newly created multicast namespace. + +## Use offline media to deploy Windows 10 + + +In addition to network-based deployments, MDT supports the use of offline media-based deployments of Windows 10. You can very easily generate an offline version of your deployment share - either the full deployment share or a subset of it - by the use of selection profiles. The generated offline media can be burned to a DVD or copied to a USB stick for deployment. + +Offline media are useful not only when you do not have network connectivity to the deployment share, but also when you have limited connection to the deployment share and do not want to copy 5 GB of data over the wire. Offline media can still join the domain, but you save the transfer of operating system images, drivers, and applications over the wire. + +### Create the offline media selection profile + +To filter what is being added to the media, you create a selection profile. When creating selection profiles, you quickly realize the benefits of having created a good logical folder structure in the Deployment Workbench. + +1. On MDT01, using Deployment Workbench, in the **MDT Production / Advanced Configuration** node, right-click **Selection Profile**, and select **New Selection Profile**. + +2. Use the following settings for the New Selection Profile Wizard: + + 1. General Settings + + - Selection profile name: Windows 10 Offline Media + + 2. Folders + + 1. Applications / Adobe + + 2. Operating Systems / Windows 10 + + 3. Out-Of-Box Drivers / WinPE x64 + + 4. Out-Of-Box Drivers / Windows 10 x64 + + 5. Task Sequences / Windows 10 + +### Create the offline media + +In these steps, you generate offline media from the MDT Production deployment share. To filter what is being added to the media, you use the previously created selection profile. + +1. On MDT01, using File Explorer, create the **E:\\MDTOfflineMedia** folder. + + **Note**   + When creating offline media, you need to create the target folder first. It is crucial that you do not create a subfolder inside the deployment share folder because it will break the offline media. + +   + +2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration** node, right-click the **Media** node, and select **New Media**. + +3. Use the following settings for the New Media Wizard: + + - General Settings + + 1. Media path: **E:\\MDTOfflineMedia** + + 2. Selection profile: Windows 10 Offline Media + +### Configure the offline media + +Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini files. These files are stored in the Control folder of the offline media; they also can be accessed via properties of the offline media in the Deployment Workbench. + +1. On MDT01, using File Explorer, copy the CustomSettings.ini file from the **E:\\MDTBuildLab\\Control** folder to **E:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files. + +2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**. + +3. In the **General** tab, configure the following: + + 1. Clear the Generate x86 boot image check box. + + 2. ISO file name: Windows 10 Offline Media.iso + +4. Still in the **Windows PE** tab, in the **Platform** drop-down list, select **x64**. + +5. In the **General** sub tab, configure the following settings: + + 1. In the **Lite Touch Boot Image Settings** area: + + - Image description: MDT Production x64 + + 2. In the **Windows PE Customizations** area, set the Scratch space size to 128. + +6. In the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option. + +7. Click **OK**. + +### Generate the offline media + +You have now configured the offline media deployment share however the share has not yet been populated with the files required for deployment. Now everything is ready you populate the deployment share content folder and generate the offline media ISO. + +1. On MDT01, using Deployment Workbench, navigate to the **MDT Production / Advanced Configuration / Media** node. + +2. Right-click the **MEDIA001** media, and select **Update Media Content**. The Update Media Content process now generates the offline media in the **E:\\MDTOfflineMedia\\Content** folder. + +### Create a bootable USB stick + +The ISO that you got when updating the offline media item can be burned to a DVD and used directly (it will be bootable), but it is often more efficient to use USB sticks instead since they are faster and can hold more data. (A dual-layer DVD is limited to 8.5 GB.) + +Follow these steps to create a bootable USB stick from the offline media content: + +1. On a physical machine running Windows 7 or later, insert the USB stick you want to use. + +2. Copy the content of the **MDTOfflineMedia\\Content** folder to the root of the USB stick. + +3. Start an elevated command prompt (run as Administrator), and start the Diskpart utility by typing **Diskpart** and pressing **Enter**. + +4. In the Diskpart utility, you can type **list volume** (or the shorter **list vol**) to list the volumes, but you really only need to remember the drive letter of the USB stick to which you copied the content. In our example, the USB stick had the drive letter F. + +5. In the Diskpart utility, type **select volume F** (replace F with your USB stick drive letter). + +6. In the Diskpart utility, type **active**, and then type **exit**. + +## Unified Extensible Firmware Interface (UEFI)-based deployments + + +As referenced in [Windows 10 deployment tools](http://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UFEI. + +![figure 14](images/mdt-07-fig16.png) + +Figure 14. The partitions when deploying an UEFI-based machine. + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/deploy-windows-10.md b/windows/deploy/deploy-windows-10.md new file mode 100644 index 0000000000..9cdeed5942 --- /dev/null +++ b/windows/deploy/deploy-windows-10.md @@ -0,0 +1,91 @@ +--- +title: Deploy Windows 10 (Windows 10) +description: Learn about deploying Windows 10 for IT professionals. +ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy Windows 10 + + +Learn about deploying Windows 10 for IT professionals. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md)

This topic lists new and updated topics in the Deploy Windows 10 documentation for [Windows 10 and Windows 10 Mobile](../index.md).

[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)

To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task.

[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md)

This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 specifically.

[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-81-with-system-center-2012-r2-configuration-manager.md)

If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or, more specifically, MDT 2013 Update 1.

[Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md)

The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Deployment Toolkit (MDT) 2013 Update 1 task sequence to completely automate the process.

[Upgrade to Windows 10 with System Center Configuration Manager](upgrade-to-windows-10-with-system-center-configuraton-manager.md)

The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a System Center Configuration Manager task sequence to completely automate the process.

[Windows 10 edition upgrade](windows-10-edition-upgrades.md)

With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported.

[Deploy Windows To Go in your organization](deploy-windows-to-go-in-your-organization-small-scenario.md)

This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you have reviewed the topics [Windows To Go: feature overview](../plan/windows-to-go-feature-overview-scenario.md) and [Prepare your organization for Windows To Go](../plan/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment.

[Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md)

Use a provisioning package to apply settings, profiles, and file assets to a Windows 10 image.

[Sideload apps in Windows 10](sideload-apps-in-windows-10.md)

Sideload line-of-business apps in Windows 10.

[Volume Activation [client]](volume-activation-for-windows-81-client.md)

This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows.

[Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md)

Learn about the tools available to deploy Windows 10.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/deploy-windows-81-using-pxe-and-configuration-manager.md b/windows/deploy/deploy-windows-81-using-pxe-and-configuration-manager.md new file mode 100644 index 0000000000..de5b1d0ee6 --- /dev/null +++ b/windows/deploy/deploy-windows-81-using-pxe-and-configuration-manager.md @@ -0,0 +1,67 @@ +--- +title: Deploy Windows 10 using PXE and Configuration Manager (Windows 10) +description: In this topic, you will learn how to deploy Windows 10 using Microsoft System Center 2012 R2 Configuration Manager deployment packages and task sequences. +ms.assetid: fb93f514-5b30-4f4b-99dc-58e6860009fa +keywords: ["deployment, image, UEFI, task sequence"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy Windows 10 using PXE and Configuration Manager + + +**Applies to** + +- Windows 10 + +In this topic, you will learn how to deploy Windows 10 using Microsoft System Center 2012 R2 Configuration Manager deployment packages and task sequences. This topic will walk you through the process of deploying the Windows 10 Enterprise image to a Unified Extensible Firmware Interface (UEFI) machine named PC0001. + +For the purposes of this topic, we will use two additional machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. DC01, CM01, and PC0001 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +1. Start the PC0001 machine. At the Pre-Boot Execution Environment (PXE) boot menu, press **Enter** to allow it to PXE boot. + + ![figure 31](images/mdt-06-fig36.png) + + Figure 31. PXE booting PC0001. + +2. On the **Welcome to the Task Sequence Wizard** page, type in the password **Passw0rd!** and click **Next**. + +3. On the **Select a task sequence to run** page, select **Windows 10 Enterprise x64 RTM** and click **Next**. + +4. On the **Edit Task Sequence Variables** page, double-click the **OSDComputerName** variable, and in the **Value** field, type **PC0001** and click **OK**. Then click **Next**. + +![figure 32](images/mdt-06-fig37.png) + +Figure 32. Typing in the computer name. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/deploy-windows-81-with-system-center-2012-r2-configuration-manager.md b/windows/deploy/deploy-windows-81-with-system-center-2012-r2-configuration-manager.md new file mode 100644 index 0000000000..67fef6a4df --- /dev/null +++ b/windows/deploy/deploy-windows-81-with-system-center-2012-r2-configuration-manager.md @@ -0,0 +1,105 @@ +--- +title: Deploy Windows 10 with System Center 2012 R2 Configuration Manager (Windows 10) +description: If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. +ms.assetid: eacd7b7b-dde0-423d-97cd-29bde9e8b363 +keywords: ["deployment, custom, boot"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy Windows 10 with System Center 2012 R2 Configuration Manager + + +**Applies to** + +- Windows 10 + +If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or, more specifically, MDT 2013 Update 1. + +For the purposes of this topic, we will use four machines: DC01, CM01, PC0003, and PC0004. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 standard. PC0003 and PC0004 are machines with Windows 7 SP1, on which Windows 10 will be deployed via both refresh and replace scenarios. In addition to these four ready-made machines, you could also include a few blank virtual machines to be used for bare-metal deployments. DC01, CM01, PC003, and PC0004 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +![figure 1](images/mdt-06-fig01.png) + +Figure 1. The machines used in this topic. + +## In this section + + +- [Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +- [Prepare for Zero Touch Installation of Windows with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +- [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +- [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +- [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +- [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +- [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +- [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-operating-system-configuration-for-windows-81-deployment-with-configuration-manager.md) + +- [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +- [Monitor the Windows 10 deployment with Configuration Manager](monitor-the-windows-81-deployment-with-configuration-manager.md) + +- [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +- [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +## Components of Configuration Manager operating system deployment + + +Operating system deployment with Configuration Manager is part of the normal software distribution infrastructure, but there are additional components. For example, operating system deployment in Configuration Manager may use the State Migration Point role, which is not used by normal application deployment in Configuration Manager. This section describes the Configuration Manager components involved with the deployment of an operating system, such as Windows 10. + +- **State migration point (SMP).** The state migration point is used to store user state migration data during computer replace scenarios. + +- **Distribution point (DP).** The distribution point is used to store all packages in Configuration Manager, including the operating system deployment-related packages. + +- **Software update point (SUP).** The software update point, which is normally used to deploy updates to existing machines, also can be used to update an operating system as part of the deployment process. You also can use offline servicing to update the image directly on the Configuration Manager server. + +- **Reporting services point.** The reporting services point can be used to monitor the operating system deployment process. + +- **Boot images.** Boot images are the Windows Preinstallation Environment (Windows PE) images Configuration Manager uses to start the deployment. + +- **Operating system images.** The operating system image package contains only one file, the custom .wim image. This is typically the production deployment image. + +- **Operating system installers.** The operating system installers were originally added to create reference images using Configuration Manager. Instead, we recommend that you use MDT 2013 Update 1 Lite Touch to create your reference images. For more information on how to create a reference image, see [Create a Windows 10 reference image](create-a-windows-81-reference-image.md). + +- **Drivers.** Like MDT 2013 Update 1 Lite Touch, Configuration Manager also provides a repository (catalog) of managed device drivers. + +- **Task sequences.** The task sequences in Configuration Manager look and feel pretty much like the sequences in MDT 2013 Update 1 Lite Touch, and they are used for the same purpose. However, in Configuration Manager the task sequence is delivered to the clients as a policy via the Management Point (MP). MDT 2013 Update 1 provides additional task sequence templates to Configuration Manager. + + **Note**  Configuration Manager SP1 along with the Windows Assessment and Deployment Kit (ADK) for Windows 10 are required to support management and deployment of Windows 10. + +   + +## See also + + +- [Microsoft Deployment Toolkit downloads and resources](http://go.microsoft.com/fwlink/p/?LinkId=618117) + +- [Windows deployment tools](windows-deployment-scenarios-and-tools.md) + +- [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md) + +- [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) + +- [Deploy Windows To Go in your organization](deploy-windows-to-go-in-your-organization-small-scenario.md) + +- [Sideload Windows Store apps](http://technet.microsoft.com/library/dn613831.aspx) + +- [Windows ADK for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526803) + +  + +  + + + + + diff --git a/windows/deploy/deploy-windows-81-with-the-microsoft-deployment-toolkit.md b/windows/deploy/deploy-windows-81-with-the-microsoft-deployment-toolkit.md new file mode 100644 index 0000000000..463cab9240 --- /dev/null +++ b/windows/deploy/deploy-windows-81-with-the-microsoft-deployment-toolkit.md @@ -0,0 +1,130 @@ +--- +title: Deploy Windows 10 with the Microsoft Deployment Toolkit (Windows 10) +description: This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 specifically. +ms.assetid: 837f009c-617e-4b3f-9028-2246067ee0fb +keywords: ["deploy", "tools", "configure", "script"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy Windows 10 with the Microsoft Deployment Toolkit + + +**Applies to** + +- Windows 10 + +This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 specifically. + +The Microsoft Deployment Toolkit is a unified collection of tools, processes, and guidance for automating desktop and server deployment. In addition to reducing deployment time and standardizing desktop and server images, MDT enables you to more easily manage security and ongoing configurations. MDT builds on top of the core deployment tools in the Windows Assessment and Deployment Kit (Windows ADK) with additional guidance and features designed to reduce the complexity and time required for deployment in an enterprise environment. + +MDT 2013 Update 1 supports the deployment of Windows 10, as well as Windows 7, Windows 8, Windows 8.1, and Windows Server 2012 R2. It also includes support for zero-touch installation (ZTI) with Microsoft System Center 2012 R2 Configuration Manager. + +To download the latest version of MDT, visit the [MDT resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117). + +## In this section + + +- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +- [Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +- [Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +- [Configure MDT settings](configure-mdt-2013-settings.md) + +## Proof-of-concept environment + + +For the purposes of this guide, and the topics discussed herein, we will use the following servers and client machines: DC01, MDT01, CM01, PC0001, and PC0002. + +![figure 1](images/mdt-01-fig01.png) + +Figure 1. The servers and machines used for examples in this guide. + +DC01 is a domain controller; the other servers and client machines are members of the domain contoso.com for the fictitious Contoso Corporation. + +![figure 2](images/mdt-01-fig02.jpg) + +Figure 2. The organizational unit (OU) structure used in this guide. + +### Server details + +- **DC01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as Active Directory Domain Controller, DNS Server, and DHCP Server in the contoso.com domain. + + - Server name: DC01 + + - IP Address: 192.168.1.200 + + - Roles: DNS, DHCP, and Domain Controller + +- **MDT01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as a member server in the contoso.com domain. + + - Server name: MDT01 + + - IP Address: 192.168.1.210 + +- **CM01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as a member server in the contoso.com domain. + + - Server name: CM01 + + - IP Address: 192.168.1.214 + +### Client machine details + +- **PC0001.** A Windows 10 Enterprise x64 machine, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This machine is referenced as the admin workstation. + + - Client name: PC0001 + + - IP Address: DHCP + +- **PC0002.** A Windows 7 SP1 Enterprise x64 machine, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This machine is referenced during the migration scenarios. + + - Client name: PC0002 + + - IP Address: DHCP + +## Sample files + + +The information in this guide is designed to help you deploy Windows 10. In order to help you put the information you learn into practice more quickly, we recommend that you download a small set of sample files for the fictitious Contoso Corporation: + +- [Gather.ps1](http://go.microsoft.com/fwlink/p/?LinkId=619361). This sample Windows PowerShell script performs the MDT Gather process in a simulated MDT environment. This allows you to test the MDT gather process and check to see if it is working correctly without performing a full Windows deployment. + +- [Set-OUPermissions.ps1](http://go.microsoft.com/fwlink/p/?LinkId=619362). This sample Windows PowerShell script creates a domain account and then configures OU permissions to allow the account to join machines to the domain in the specified OU. + +- [MDTSample.zip](http://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT. + +## Related topics + + +[Microsoft Deployment Toolkit downloads and resources](http://go.microsoft.com/fwlink/p/?LinkId=618117) + +[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) + +[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) + +[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-81-with-system-center-2012-r2-configuration-manager.md) + +[Deploy Windows To Go in your organization](deploy-windows-to-go-in-your-organization-small-scenario.md) + +[Sideload apps in Windows 10](sideload-apps-in-windows-10.md) + +[Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/deploy-windows-to-go-in-your-organization-small-scenario.md b/windows/deploy/deploy-windows-to-go-in-your-organization-small-scenario.md new file mode 100644 index 0000000000..75ab54d40e --- /dev/null +++ b/windows/deploy/deploy-windows-to-go-in-your-organization-small-scenario.md @@ -0,0 +1,1043 @@ +--- +title: Deploy Windows To Go in your organization (Windows 10) +description: This topic helps you to deploy Windows To Go in your organization. +ms.assetid: cfe550be-ffbd-42d1-ab4d-80efae49b07f +keywords: ["deployment, USB, device, BitLocker, workspace, security, data"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Deploy Windows To Go in your organization + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Deployment tips](#deployment_tips) +- [Basic deployment steps](#basic_deployment_steps) +- [Advanced deployment steps](#advanced_deployment_steps) +- [Considerations when using different USB keyboard layouts with Windows To Go](#considerations_when_using_different_usb_keyboard_layouts_with_windows_to_go) +- [Related topics](#related_topics) + +This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you have reviewed the topics [Windows To Go: feature overview](../plan/windows-to-go-feature-overview-scenario.md) and [Prepare your organization for Windows To Go](../plan/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment. + +**Note**   +This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see [Using Cmdlets](http://go.microsoft.com/fwlink/p/?linkid=230693). + +  + +## Deployment tips + + +The following is a list of items that you should be aware of before you start the deployment process: + +- Only use recommended USB drives for Windows To Go. Use of other drives is not supported. Check the list at [Windows To Go: feature overview](../plan/windows-to-go-feature-overview-scenario.md) for the latest USB drives certified for use as Windows To Go drives. + +- After you provision a new workspace, always eject a Windows To Go drive using the **Safely Remove Hardware and Eject Media** control that can be found in the notification area or in Windows Explorer. Removing the drive from the USB port without ejecting it first can cause the drive to become corrupted. + +- When running a Windows To Go workspace, always shutdown the workspace before unplugging the drive. + +- System Center 2012 Configuration Manager SP1 and later includes support for user self-provisioning of Windows To Go drives. You can download Configuration Manager for evaluation from the [Microsoft TechNet Evaluation Center](http://go.microsoft.com/fwlink/p/?LinkId=618746). For more information on this deployment option, see [How to Provision Windows To Go in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=619148). + +- If you are planning on using a USB drive duplicator to duplicate Windows To Go drives, do not configure offline domain join or BitLocker on the drive. + +## Basic deployment steps + + +Unless you are using a customized operating system image, your initial Windows To Go workspace will not be domain joined and will not contain applications. This is exactly like a new installation of Windows on a desktop or laptop computer. When planning your deployment, you should develop methods to join Windows to Go drives to the domain and install the standard applications that users in your organization require. These methods probably will be similar to the ones used for setting up desktop and laptop computers with domain privileges and applications. This section describes the instructions for creating the correct disk layout on the USB drive, applying the operating system image and the core Windows To Go specific configurations to the drive. The following steps are used in both small-scale and large-scale Windows To Go deployment scenarios. + +Completing these steps will give you a generic Windows To Go drive that can be distributed to your users and then customized for their usage as needed. This drive is also appropriate for use with USB drive duplicators. Your specific deployment scenarios will involve more than just these basic steps but these additional deployment considerations are similar to traditional PC deployment and can be incorporated into your Windows To Go deployment plan. For additional information, see [Windows Deployment Options](http://go.microsoft.com/fwlink/p/?LinkId=619149). + +**Warning**   +If you are planning to use the generic Windows To Go drive as the master drive in a USB duplicator, the drive should not be booted. If the drive has been booted inadvertently it should be reprovisioned prior to duplication. + +  + +### Create the Windows To Go workspace + +In this step we are creating the operating system image that will be used on the Windows To Go drives. You can use the Windows To Go Creator Wizard or you can [do this manually](http://go.microsoft.com/fwlink/p/?LinkId=619174) using a combination of Windows PowerShell and command-line tools. + +**Warning**   +The preferred method for creating a single Windows To Go drive is to use the Windows To Go Creator Wizard included in Windows 10 Enterprise and Windows 10 Education. + +  + +**To create a Windows To Go workspace with the Windows To Go Creator Wizard** + +1. Sign into your Windows PC using an account with Administrator privileges. + +2. Insert the USB drive that you want to use as your Windows To Go drive into your PC. + +3. Verify that the .wim file location (which can be a network share, a DVD , or a USB drive) is accessible and that it contains a valid Windows 10 Enterprise or Windows 10 Education image that has been generalized using sysprep. Many environments can use the same image for both Windows To Go and desktop deployments. + + **Note**   + For more information about .wim files, see [Windows System Image Manager (Windows SIM) Technical Reference](http://go.microsoft.com/fwlink/p/?LinkId=619150). For more information about using sysprep, see [Sysprep Overview](http://go.microsoft.com/fwlink/p/?LinkId=619151). + +   + +4. Using Cortana, search for **Windows To Go** and then press **Enter**. If the **User Account Control** dialog box appears, confirm that the action it displays is what you want, and then click **Yes**. The **Windows To Go Creator Wizard** opens. + +5. On the **Choose the drive you want to use** page select the drive that represents the USB drive you inserted previously, then click **Next.** + +6. On the **Choose a Windows image** page, click **Add Search Location** and then navigate to the .wim file location and click select folder. The wizard will display the installable images present in the folder; select the Windows 10 Enterprise or Windows 10 Education image you wish to use and then click **Next**. + +7. (Optional) On the **Set a BitLocker password (optional)** page, you can select **Use BitLocker with my Windows To Go Workspace** to encrypt your Windows To Go drive. If you do not wish to encrypt the drive at this time, click **Skip**. If you decide you want to add BitLocker protection later, see [Enable BitLocker protection for your Windows To Go drive](http://go.microsoft.com/fwlink/p/?LinkId=619152) for instructions. + + **Warning**   + If you are planning to use a USB-Duplicator to create multiple Windows To Go drives, do not enable BitLocker. Drives protected with BitLocker should not be duplicated. + +   + + If you choose to encrypt the Windows To Go drive now: + + - Type a password that is at least eight characters long and conforms to your organizations password complexity policy. This password will be provided before the operating system is started so any characters you use must be able to be interpreted by the firmware. Some firmware does not support non-ASCII characters. + + - Retype the password, and then click Next. + + **Important**   + The BitLocker recovery password will be saved in the documents library of the computer used to create the workspace automatically. If your organization is using Active Directory Domain Services (AD DS) to store recovery passwords it will also be saved in AD DS under the computer account of the computer used to create the workspace. This password will be used only if you need to recover access to the drive because the BitLocker password specified in the previous step is not available, such as if a password is lost or forgotten. For more information about BitLocker and AD DS, see [Active Directory Domain Services considerations](http://go.microsoft.com/fwlink/p/?LinkId=619157). + +   + +8. Verify that the USB drive inserted is the one you want to provision for Windows To Go and then click **Create** to start the Windows To Go workspace creation process. + + **Warning**   + The USB drive identified will be reformatted as part of the Windows To Go provisioning process and any data on the drive will be erased. + +   + +9. Wait for the creation process to complete, which can take 20 to 30 minutes. A completion page will be displayed that tells you when your Windows To Go workspace is ready to use. From the completion page you can configure the Windows To Go startup options to configure the current computer as a Windows To Go host computer. + +Your Windows To Go workspace is now ready to be started. You can now [prepare a host computer](http://go.microsoft.com/fwlink/p/?LinkId=619159) using the Windows To Go startup options and boot your Windows To Go drive. + +**Windows PowerShell equivalent commands** + +The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. This procedure can only be used on PCs that are running Windows 10. Before starting, ensure that only the USB drive that you want to provision as a Windows To Go drive is connected to the PC. + +1. Using Cortana, search for **powershell**, right-click **Windows PowerShell**, and then select **Run as administrator**. + +2. In the Windows PowerShell session type the following commands to partition a master boot record (MBR) disk for use with a FAT32 system partition and an NTFS-formatted operating system partition. This disk layout can support computers that use either UEFI or BIOS firmware: + + ``` syntax +# The following command will set $Disk to all USB drives with >20 GB of storage + + $Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot } + +#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase. +# +# To skip the confirmation prompt, append –confirm:$False + Clear-Disk –InputObject $Disk[0] -RemoveData + +# This command initializes a new MBR disk + Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR + +# This command creates a 350 MB system partition + $SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive + +# This formats the volume with a FAT32 Filesystem +# To skip the confirmation dialog, append –Confirm:$False + Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 ` + -Partition $SystemPartition + +# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage. + $OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize + Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS ` + -Partition $OSPartition + +# This command assigns drive letters to the new drive, the drive letters chosen should not already be in use. + Set-Partition -InputObject $SystemPartition -NewDriveLetter "S" + Set-Partition -InputObject $OSPartition -NewDriveLetter "W" + +# This command sets the NODEFAULTDRIVELETTER flag on the partition which prevents drive letters being assigned to either partition when inserted into a different computer. + Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE + ``` + +3. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](http://go.microsoft.com/fwlink/p/?LinkId=619161) command-line tool (DISM): + + **Tip**   + The index number must be set correctly to a valid Enterprise image in the .WIM file. + +   + + ``` syntax +#The WIM file must contain a sysprep generalized image. + dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\ + ``` + +4. Now use the [bcdboot](http://go.microsoft.com/fwlink/p/?LinkId=619163) command line tool to move the necessary boot components to the system partition on the disk. This helps ensure that the boot components, operating system versions, and architectures match. The `/f ALL` parameter indicates that boot components for UEFI and BIOS should be placed on the system partition of the disk. The following example illustrates this step: + + ``` syntax + W:\Windows\System32\bcdboot W:\Windows /f ALL /s S: + ``` + +5. Apply SAN policy—OFFLINE\_INTERNAL - “4” to prevent the operating system from automatically bringing online any internally connected disk. This is done by creating and saving a **san\_policy.xml** file on the disk. The following example illustrates this step: + + ``` syntax + + + + + 4 + + + 4 + + + + ``` + +6. Place the **san\_policy.xml** file created in the previous step into the root directory of the Windows partition on the Windows To Go drive (W: from the previous examples) and run the following command: + + ``` syntax + Dism.exe /Image:W:\ /Apply-Unattend:W:\san_policy.xml + ``` + +7. Create an answer file (unattend.xml) that disables the use of Windows Recovery Environment with Windows To Go. You can use the following code sample to create a new answer file or you can paste it into an existing answer file: + + ``` syntax + + + + + true + + + true + + + + ``` + + Once the answer file has been saved, copy unattend.xml into the sysprep folder on the Windows To Go drive (for example, W:\\Windows\\System32\\sysprep\) + + **Important**   + Setup unattend files are processed based on their location. Setup will place a temporary unattend file into the **%systemroot%\\panther** folder which is the first location that setup will check for installation information. You should make sure that folder does not contain a previous version of an unattend.xml file to ensure that the one you just created is used. + + If you do not wish to boot your Windows To Go device on this computer and want to remove it to boot it on another PC, be sure to use the **Safely Remove Hardware and Eject Media** option to safely disconnect the drive before physically removing it from the PC. + +   + +Your Windows To Go workspace is now ready to be started. You can now [prepare a host computer](http://go.microsoft.com/fwlink/p/?LinkId=619165) using the Windows To Go startup options to test your workspace configuration, [configure the workspace for offline domain join](http://go.microsoft.com/fwlink/p/?LinkId=619166), or [enable BitLocker protection for your Windows To Go drive](http://go.microsoft.com/fwlink/p/?LinkId=619167). + +### To prepare a host computer + +Computers running Windows 8 and later can be configured as host computers that use Windows To Go automatically whenever a Windows To Go workspace is available at startup. When the Windows To Go startup options are enabled on a host computer, Windows will divert startup to the Windows To Go drive whenever it is attached to the computer. This makes it easy to switch from using the host computer to using the Windows To Go workspace. + +**Tip**   +If you will be using a PC running Windows 7 as your host computer, see [Tips for configuring your BIOS settings to work with Windows To Go](http://go.microsoft.com/fwlink/p/?LinkId=618951) for information to help you prepare the host computer. + +  + +If you want to use the Windows To Go workspace, simply shut down the computer, plug in the Windows To Go drive, and turn on the computer. To use the host computer, shut down the Windows To Go workspace, unplug the Windows To Go drive, and turn on the computer. + +To set the Windows To Go Startup options for host computers running Windows 10: + +1. Using Cortana, search for **Windows To Go startup options** and then press **Enter**. + +2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then click **Save Changes** to configure the computer to boot from USB + +For host computers running Windows 8 or Windows 8.1: + +1. Press **Windows logo key+W**, search for **Windows To Go startup options**, and then press **Enter**. +2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then click **Save Changes** to configure the computer to boot from USB. + +You can configure your organization's computers to automatically start from the USB drive by enabling the following Group Policy setting: + +**\\\\Computer Configuration\\Administrative Templates\\Windows Components\\Portable Operating System\\Windows To Go Default Startup Options** + +After this policy setting is enabled, automatic starting of a Windows To Go workspace will be attempted when a USB drive is connected to the computer when it is started. Users will not be able to use the Windows To Go Startup Options to change this behavior. If you disable this policy setting, booting to Windows To Go when a USB drive is connected will not occur unless a user configures the option manually in the firmware. If you do not configure this policy setting, users who are members of the Administrators group can enable or disable booting from a USB drive using the Windows To Go Startup Options. + +Your host computer is now ready to boot directly into Windows To Go workspace when it is inserted prior to starting the computer. Optionally you can perform [Configure Windows To Go workspace for offline domain join](http://go.microsoft.com/fwlink/p/?LinkId=619169) and [Enable BitLocker protection for your Windows To Go drive](http://go.microsoft.com/fwlink/p/?LinkId=619152). + +### Booting your Windows To Go workspace + +After you have configured your host PC to boot from USB, you can use the following procedure to boot your Windows To Go workspace: + +**To boot your workspace** + +1. Make sure that the host PC is not in a sleep state. If the computer is in a sleep state, either shut it down or hibernate it. + +2. Insert the Windows To Go USB drive directly into a USB 3.0 or USB 2.0 port on the PC. Do not use a USB hub or extender. + +3. Turn on the PC. If your Windows To Go drive is protected with BitLocker you will be asked to type the password, otherwise the workspace will boot directly into the Windows To Go workspace. + +## Advanced deployment steps + + +The following steps are used for more advanced deployments where you want to have further control over the configuration of the Windows To Go drives, ensure that they are correctly configured for remote access to your organizational resources, and have been protected with BitLocker Drive Encryption. + +### Configure Windows To Go workspace for remote access + +Making sure that Windows To Go workspaces are effective when used off premises is essential to a successful deployment. One of the key benefits of Windows To Go is the ability for your users to use the enterprise managed domain joined workspace on an unmanaged computer which is outside your corporate network. To enable this usage, typically you would provision the USB drive as described in the basic deployment instructions and then add the configuration to support domain joining of the workspace, installation of any line-of-business applications, and configuration of your chosen remote connectivity solution such as a virtual private network client or DirectAccess. Once these configurations have been performed the user can work from the workspace using a computer that is off-premises. The following procedure allows you to provision domain joined Windows To Go workspaces for workers that do not have physical access to your corporate network. + +**Prerequisites for remote access scenario** + +- A domain-joined computer running Windows 8 or later and is configured as a Windows To Go host computer + +- A Windows To Go drive that hasn’t been booted or joined to the domain using unattend settings. + +- A domain user account with rights to add computer accounts to the domain and is a member of the Administrator group on the Windows To Go host computer + +- [DirectAccess](http://go.microsoft.com/fwlink/p/?LinkId=619170) configured on the domain + +**To configure your Windows To Go workspace for remote access** + +1. Start the host computer and sign in using a user account with privileges to add workstations to the domain and then run the following command from an elevated command prompt replacing the example placeholder parameters (denoted by <>) with the ones applicable for your environment: + + ``` syntax + djoin /provision /domain /machine /certtemplate /policynames /savefile /reuse + ``` + + **Note**   + The /certtemplate parameter supports the use of certificate templates for distributing certificates for DirectAccess, if your organization is not using certificate templates you can omit this parameter. Additionally, if are using djoin.exe with Windows Server 2008-based Domain Controllers, append the /downlevel switch during provisioning. For more information see the [Offline Domain Join Step-by-Step guide](http://go.microsoft.com/fwlink/p/?LinkId=619171). + +   + +2. Insert the Windows To Go drive. + +3. Launch an elevated Windows PowerShell prompt by right-clicking the Windows PowerShell shortcut in the taskbar, and then clicking **Run as Administrator**. + +4. From the Windows PowerShell command prompt run: + + ``` syntax +# The following command will set $Disk to all USB drives with >20 GB of storage + + $Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot } + +#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase. +# +# To skip the confirmation prompt, append –confirm:$False + Clear-Disk –InputObject $Disk[0] -RemoveData + +# This command initializes a new MBR disk + Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR + +# This command creates a 350 MB system partition + $SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive + +# This formats the volume with a FAT32 Filesystem +# To skip the confirmation dialog, append –Confirm:$False + Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 ` + -Partition $SystemPartition + +# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage. + $OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize + Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS ` + -Partition $OSPartition + +# This command assigns drive letters to the new drive, the drive letters chosen should not already be in use. + Set-Partition -InputObject $SystemPartition -NewDriveLetter "S" + Set-Partition -InputObject $OSPartition -NewDriveLetter "W" + +# This command toggles the NODEFAULTDRIVELETTER flag on the partition which prevents drive letters being assigned to either partition when inserted into a different computer. + Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE + ``` + +5. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](http://go.microsoft.com/fwlink/p/?LinkId=619161) command-line tool (DISM): + + **Tip**   + The index number must be set correctly to a valid Enterprise image in the .WIM file. + +   + + ``` syntax +#The WIM file must contain a sysprep generalized image. + dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\ + ``` + +6. Once those commands have completed, run the following command: + + ``` syntax + djoin /requestodj /loadfile C:\example\path\domainmetadatafile /windowspath W:\Windows + ``` + +7. Next, we will need to edit the unattend.xml file to configure the first run (OOBE) settings. In this example we are hiding the Microsoft Software License Terms (EULA) page, configuring automatic updates to install important and recommended updates automatically, and identifying this workspace as part of a private office network. You can use other OOBE settings that you have configured for your organization if desired. For more information about the OOBE settings, see [OOBE](http://go.microsoft.com/fwlink/p/?LinkId=619172): + + ``` syntax + + + + + true + + true + 1 + Work + + + + true + + true + 1 + Work + + + + + ``` + +8. Safely remove the Windows To Go drive. + +9. From a host computer, either on or off premises, start the computer and boot the Windows To Go workspace. + + 1. If on premises using a host computer with a direct network connection, sign on using your domain credentials. + + 2. If off premises, join a wired or wireless network with internet access and then sign on again using your domain credentials. + + **Note**   + Depending on your DirectAccess configuration you might be asked to insert your smart card to logon to the domain. + +   + +You should now be able to access your organization’s network resources and work from your Windows To Go workspace as you would normally work from your standard desktop computer on premises. + +### Enable BitLocker protection for your Windows To Go drive + +Enabling BitLocker on your Windows To Go drive will help ensure that your data is protected from unauthorized use and that if your Windows To Go drive is lost or stolen it will not be easy for an unauthorized person to obtain confidential data or use the workspace to gain access to protected resources in your organization. When BitLocker is enabled, each time you boot your Windows To Go drive, you will be asked to provide the BitLocker password to unlock the drive. The following procedure provides the steps for enabling BitLocker on your Windows To Go drive: + +**Prerequisites for enabling BitLocker scenario** + +- A Windows To Go drive that can be successfully provisioned. + +- A computer running Windows 8 configured as a Windows To Go host computer + +- Review the following Group Policy settings for BitLocker Drive Encryption and modify the configuration as necessary: + + **\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Require additional authentication at startup**. This policy allows the use of a password key protector with an operating system drive; this policy must be enabled to configure BitLocker from within the Windows To Go workspace. This policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with or without a Trusted Platform Module (TPM). You must enable this setting and select the **Allow BitLocker without a compatible TPM** check box and then enable the **Configure use of passwords for operating system drives** setting. + + **\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Configure use of passwords for operating system drives**. This policy setting enables passwords to be used to unlock BitLocker-protected operating system drives and provides the means to configure complexity and length requirements on passwords for Windows To Go workspaces. For the complexity requirement setting to be effective the Group Policy setting **Password must meet complexity requirements** located in **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\** must be also enabled. + + **\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Enable use of BitLocker authentication requiring preboot keyboard input on slates**. This policy setting allows users to enable authentication options that require user input from the preboot environment even if the platform indicates a lack of preboot input capability. If this setting is not enabled, passwords cannot be used to unlock BitLocker-protected operating system drives. + +You can choose to enable BitLocker protection on Windows To Go drives before distributing them to users as part of your provisioning process or you can allow your end-users to apply BitLocker protection to them after they have taken possession of the drive. A step-by-step procedure is provided for both scenarios. + +Enabling BitLocker during provisioning ensures that your operating system image is always protected by BitLocker. When enabling BitLocker during the provisioning process you can significantly reduce the time required for encrypting the drive by enabling BitLocker after configuring the disk and just prior to applying the image. If you use this method, you will need to give users their BitLocker password when you give then their Windows To Go workspace. Also, you should instruct your users to boot their workspace and change their BitLocker password as soon as possible (this can be done with standard user privileges). + +Enabling BitLocker after distribution requires that your users turn on BitLocker. This means that your Windows To Go workspaces are unprotected until the user enables BitLocker. Administrative rights on the Windows To Go workspace are required to enable BitLocker. For more information about BitLocker see the [BitLocker Overview](http://go.microsoft.com/fwlink/p/?LinkId=619173). + +**BitLocker recovery keys** + +BitLocker recovery keys are the keys that can be used to unlock a BitLocker protected drive if the standard unlock method fails. It is recommended that your BitLocker recovery keys be backed up to Active Directory Domain Services (AD DS). If you do not want to use AD DS to store recovery keys you can save recovery keys to a file or print them. How BitLocker recovery keys are managed differs depending on when BitLocker is enabled. + +- If BitLocker protection is enabled during provisioning, the BitLocker recovery keys will be stored under the computer account of the computer used for provisioning the drives. If backing up recovery keys to AD DS is not used, the recovery keys will need to be printed or saved to a file for each drive. The IT administrator must track which keys were assigned to which Windows To Go drive. + +- **Warning**   + If BitLocker is enabled after distribution, the recovery key will be backed up to AD DS under the computer account of the workspace. If backing up recovery keys to AD DS is not used, they can be printed or saved to a file by the user. If the IT administrator wants a central record of recovery keys, a process by which the user provides the key to the IT department must be put in place. + +   + +**To enable BitLocker during provisioning** + +1. Start the host computer that is running Windows 8. + +2. Insert your Windows To Go drive. + +3. Launch an elevated Windows PowerShell prompt by right-clicking the Windows PowerShell shortcut in the taskbar, and then clicking **Run as Administrator**. + +4. Provision the Windows To Go drive using the following cmdlets: + + **Note**   + If you used the [manual method for creating a workspace](http://go.microsoft.com/fwlink/p/?LinkId=619174) you should have already provisioned the Windows To Go drive. If so, you can continue on to the next step. + +   + + ``` syntax +# The following command will set $Disk to all USB drives with >20 GB of storage + + $Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot } + +#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase. +# +# To skip the confirmation prompt, append –confirm:$False + Clear-Disk –InputObject $Disk[0] -RemoveData + +# This command initializes a new MBR disk + Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR + +# This command creates a 350 MB system partition + $SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive + +# This formats the volume with a FAT32 Filesystem +# To skip the confirmation dialog, append –Confirm:$False + Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 ` + -Partition $SystemPartition + +# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage. + $OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize + Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS ` + -Partition $OSPartition + +# This command assigns drive letters to the new drive, the drive letters chosen should not already be in use. + Set-Partition -InputObject $SystemPartition -NewDriveLetter "S" + Set-Partition -InputObject $OSPartition -NewDriveLetter "W" + +# This command toggles the NODEFAULTDRIVELETTER flag on the partition which prevents drive letters being assigned to either partition when inserted into a different computer. + Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE + ``` + + Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](http://go.microsoft.com/fwlink/p/?LinkId=619161) command-line tool (DISM): + + **Tip**   + The index number must be set correctly to a valid Enterprise image in the .WIM file. + +   + + ``` syntax +#The WIM file must contain a sysprep generalized image. + dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\ + ``` + +5. In the same PowerShell session use the following cmdlet to add a recovery key to the drive: + + ``` syntax + $BitlockerRecoveryProtector = Add-BitLockerKeyProtector W: -RecoveryPasswordProtector + ``` + +6. Next, use the following cmdlets to save the recovery key to a file: + + ``` syntax +#The BitLocker Recovery key is essential if for some reason you forget the BitLocker password +#This recovery key can also be backed up into Active Directory using manage-bde.exe or the +#PowerShell cmdlet Backup-BitLockerKeyProtector. + $RecoveryPassword = $BitlockerRecoveryProtector.KeyProtector.RecoveryPassword + $RecoveryPassword > WTG-Demo_Bitlocker_Recovery_Password.txt + ``` + +7. Then, use the following cmdlets to add the password as a secure string. If you omit the password the cmdlet will prompt you for the password before continuing the operation: + + ``` syntax +# Create a variable to store the password + $spwd = ConvertTo-SecureString -String -AsplainText –Force + Enable-BitLocker W: -PasswordProtector $spwd + ``` + + **Warning**   + To have BitLocker only encrypt used space on the disk append the parameter `–UsedSpaceOnly` to the `Enable-BitLocker` cmdlet. As data is added to the drive BitLocker will encrypt additional space. Using this parameter will speed up the preparation process as a smaller percentage of the disk will require encryption. If you are in a time critical situation where you cannot wait for encryption to complete you can also safely remove the Windows To Go drive during the encryption process. The next time the drive is inserted in a computer it will request the BitLocker password. Once the password is supplied, the encryption process will continue. If you do this, make sure your users know that BitLocker encryption is still in process and that they will be able to use the workspace while the encryption completes in the background. + +   + +8. Copy the numerical recovery password and save it to a file in a safe location. The recovery password will be required if the password is lost or forgotten. + + **Warning**   + If the **Choose how BitLocker-protected removable data drives can be recovered** Group Policy setting has been configured to back up recovery information to Active Directory Domain Services, the recovery information for the drive will be stored under the account of the host computer used to apply the recovery key. + + If you want to have the recovery information stored under the account of the Windows To Go workspace you can turn BitLocker from within the Windows To Go workspace using the BitLocker Setup Wizard from the BitLocker Control Panel item as described in [To enable BitLocker after distribution](#enable_bitlocker). + +   + +9. Safely remove the Windows To Go drive. + +The Windows To Go drives are now ready to be distributed to users and are protected by BitLocker. When you distribute the drives, make sure the users know the following: + +- Initial BitLocker password that they will need to boot the drives. + +- Current encryption status. + +- Instructions to change the BitLocker password after the initial boot. + +- Instructions for how to retrieve the recovery password if necessary. This may be a help desk process, an automated password retrieval site, or a person to contact. + + +**To enable BitLocker after distribution** + +1. Insert your Windows To Go drive into your host computer (that is currently shut down) and then turn on the computer and boot into your Windows To Go workspace + +2. Press **Windows logo key+W** to open **Search Settings**, type BitLocker and then select the item for BitLocker Drive Encryption. + +3. The drives on the workspace are displayed, click **Turn BitLocker On** for the C: drive. The **BitLocker Setup Wizard** appears. + +4. Complete the steps in the **BitLocker Setup Wizard** selecting the password protection option. + +**Note**   +If you have not configured the Group Policy setting **\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Require additional authentication at startup** to specify **Allow BitLocker without a compatible TPM** you will not be able to enable BitLocker from within the Windows To Go workspace. + +  + +### Advanced deployment sample script + +The following sample script supports the provisioning of multiple Windows To Go drives and the configuration of offline domain join. + +The sample script creates an unattend file that streamlines the deployment process so that the initial use of the Windows To Go drive does not prompt the end user for any additional configuration information before starting up. + +**Prerequisites for running the advanced deployment sample script** + +- To run this sample script you must open a Windows PowerShell session as an administrator from a domain-joined computer using an account that has permission to create domain accounts. + +- Using offline domain join is required by this script, since the script does not create a local administrator user account. However, domain membership will automatically put “Domain admins” into the local administrators group. Review your domain policies. If you are using DirectAccess you will need to modify the djoin.exe command to include the `policynames` and potentially the `certtemplate` parameters. + +- The script needs to use drive letters, so you can only provision half as many drives as you have free drive letters. + +**To run the advanced deployment sample script** + +1. Copy entire the code sample titled “Windows To Go multiple drive provisioning sample script” into a PowerShell script (.ps1) file. + +2. Make the modifications necessary for it to be appropriate to your deployment and save the file. + +3. Configure the PowerShell execution policy. By default PowerShell’s execution policy is set to Restricted; that means that scripts won’t run until you have explicitly given them permission to. To configure PowerShell’s execution policy to allow the script to run, use the following command from an elevated PowerShell prompt: + + ``` syntax + Set-ExecutionPolicy RemoteSigned + ``` + + The RemoteSigned execution policy will prevent unsigned scripts from the internet from running on the computer, but will allow locally created scripts to run. For more information on execution policies, see [Set-ExecutionPolicy](http://go.microsoft.com/fwlink/p/?LinkId=619175). + + **Tip**   + To get online help for any Windows PowerShell cmdlet, whether or not it is installed locally type the following cmdlet, replacing <cmdlet-name> with the name of the cmdlet you want to see the help for: + + `Get-Help -Online` + + This command causes Windows PowerShell to open the online version of the help topic in your default Internet browser. + +   + +**Windows To Go multiple drive provisioning sample script** + +``` syntax +<# +.SYNOPSIS +Windows To Go multiple drive provisioning sample script. + +.DESCRIPTION +This sample script will provision one or more Windows To Go drives, configure offline domain join (using random machine names) and provides an option for BitLocker encryption. To provide a seamless first boot experience, an unattend file is created that will set the first run (OOBE) settings to defaults. To improve performance of the script, copy your install image to a local location on the computer used for provisioning the drives. + +.EXAMPLE +.\WTG_MultiProvision.ps1 -InstallWIMPath c:\companyImages\amd64_enterprise.wim +provision drives connected to your machine with the provided image. +#> +param ( + [parameter(Mandatory=$true)] + [string] +#Path to install wim. If you have the full path to the wim or want to use a local file. + $InstallWIMPath, + + [string] +#Domain to which to join the Windows To Go workspaces. + $DomainName +) + + +<# + In order to set BitLocker Group Policies for our offline WTG image we need to create a Registry.pol file + in the System32\GroupPolicy folder. This file requires binary editing, which is not possible in PowerShell + directly so we have some C# code that we can use to add a type in our PowerShell instance that will write + the data for us. +#> +$Source = @" +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +namespace MS.PolicyFileEditor +{ + //The PolicyEntry represents the DWORD Registry Key/Value/Data entry that will + //be written into the file. + public class PolicyEntry + { + private List byteList; + + public string KeyName { get; set; } + public string ValueName { get; set; } + + internal List DataBytes + { + get { return this.byteList; } + } + + public PolicyEntry( + string Key, + string Value, + uint data) + { + KeyName = Key; + ValueName = Value; + this.byteList = new List(); + byte[] arrBytes = BitConverter.GetBytes(data); + if (BitConverter.IsLittleEndian == false) { Array.Reverse(arrBytes); } + this.byteList.AddRange(arrBytes); + } + + ~PolicyEntry() + { + this.byteList = null; + } + } + + public class PolicyFile + { + private Dictionary entries; + + public List Entries + { + get + { + List policyList = new List(entries.Values); + return policyList; + } + } + + public PolicyFile() + { + this.entries = new Dictionary(StringComparer.OrdinalIgnoreCase); + } + + public void SetDWORDValue(string key, string value, uint data) + { + PolicyEntry entry = new PolicyEntry(key, value, data); + this.entries[entry.KeyName + "\\" + entry.ValueName] = entry; + } + + public void SaveFile(string file) + { + using (FileStream fs = new FileStream(file, FileMode.Create, FileAccess.Write)) + { + fs.Write(new byte[] { 0x50, 0x52, 0x65, 0x67, 0x01, 0x00, 0x00, 0x00 }, 0, 8); + byte[] openBracket = UnicodeEncoding.Unicode.GetBytes("["); + byte[] closeBracket = UnicodeEncoding.Unicode.GetBytes("]"); + byte[] semicolon = UnicodeEncoding.Unicode.GetBytes(";"); + byte[] nullChar = new byte[] { 0, 0 }; + + byte[] bytes; + + foreach (PolicyEntry entry in this.Entries) + { + fs.Write(openBracket, 0, 2); + bytes = UnicodeEncoding.Unicode.GetBytes(entry.KeyName); + fs.Write(bytes, 0, bytes.Length); + fs.Write(nullChar, 0, 2); + + fs.Write(semicolon, 0, 2); + bytes = UnicodeEncoding.Unicode.GetBytes(entry.ValueName); + fs.Write(bytes, 0, bytes.Length); + fs.Write(nullChar, 0, 2); + + fs.Write(semicolon, 0, 2); + bytes = BitConverter.GetBytes(4); + if (BitConverter.IsLittleEndian == false) { Array.Reverse(bytes); } + fs.Write(bytes, 0, 4); + + fs.Write(semicolon, 0, 2); + byte[] data = entry.DataBytes.ToArray(); + bytes = BitConverter.GetBytes((uint)data.Length); + if (BitConverter.IsLittleEndian == false) { Array.Reverse(bytes); } + fs.Write(bytes, 0, 4); + + fs.Write(semicolon, 0, 2); + fs.Write(data, 0, data.Length); + fs.Write(closeBracket, 0, 2); + } + fs.Close(); + } + } + } +} +"@ + +######################################################################## +# +# Helper Functions +# +Function CreateUnattendFile { +param ( + [parameter(Mandatory=$true)] + [string] + $Arch +) + + if ( Test-Path "WtgUnattend.xml" ) { + del .\WtgUnattend.xml + } + $unattendFile = New-Item "WtgUnattend.xml" -type File + $fileContent = @" + + + + + + true + 1 + Work + + + + en-US + en-US + en-US + en-US + + + true + + + +"@ + + Set-Content $unattendFile $fileContent + +#return the file object + $unattendFile +} + +Function CreateRegistryPolicyFile { + + $saveFileLocaiton = "" + (get-location) + "\registry.pol" + + $policyFile = New-Object MS.PolicyFileEditor.PolicyFile + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "UseAdvancedStartup", 1) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "EnableBDEWithNoTPM", 1) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "UseTPM", 2) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "UseTPMPIN", 2) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "UseTPMKey", 2) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "UseTPMKeyPIN", 2) + $policyFile.SetDWORDValue("Software\Policies\Microsoft\FVE", "OSEnablePrebootInputProtectorsOnSlates", 1) + $policyFile.SaveFile($saveFileLocaiton) + + $saveFileLocaiton +} + +######################################################################## + +if ( Test-Path $installWIMPath ){ + write-output "Image: $installWIMPath" +} +else{ + write-output "Unable to find image: $installWIMPath" "Exiting the script" + exit +} + +if ( (Get-WindowsImage -ImagePath $InstallWIMPath -Index 1).Architecture -eq 0 ){ + $Arch = "x86" +} +else{ + $Arch = "amd64" +} + +$starttime = get-date + +#Add type information for modifing the Registy Policy file +Add-Type -TypeDefinition $Source -Language CSharp + +#Create helper files +$unattendFile = CreateUnattendFile -Arch $Arch +$registryPolFilePath = CreateRegistryPolicyFile + +$Disks = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot } +if ($Disks -eq $null) +{ + Write-Output "No USB Disks found, exiting the script. Please check that you have a device connected." + exit +} + +#We want to make sure that all non-boot connected USB drives are online, writeable and cleaned. +#This command will erase all data from all USB drives larger than 20Gb connected to your machine +#To automate this step you can add: -confirm:$False +Clear-Disk –InputObject $Disks -RemoveData -erroraction SilentlyContinue + +# Currently the provisioning script needs drive letters (for dism and bcdboot.exe) and the script is more +# reliable when the main process determines all of the free drives and provides them to the sub-processes. +# Use a drive index starting at 1, since we need 2 free drives to proceed. (system & operating system) +$driveLetters = 68..90 | ForEach-Object { "$([char]$_):" } | + Where-Object { + (new-object System.IO.DriveInfo $_).DriveType -eq 'noRootdirectory' + } +$driveIndex = 1 + +foreach ($disk in $Disks) +{ + + if ( $driveIndex -lt $driveLetters.count ) + { + Start-Job -ScriptBlock { + $installWIMPath = $args[0] + $unattendFile = $args[1] + $Disk = $args[2] + $SystemDriveLetter = $args[3] + $OSDriveLetter = $args[4] + $DomainName = $args[5] + $policyFilePath = $args[6] + +#For compatibility between UEFI and legacy BIOS we use MBR for the disk. + Initialize-Disk –InputObject $Disk -PartitionStyle MBR + +#A short sleep between creating a new partition and formatting helps ensure the partition +#is ready before formatting. + $SystemPartition = New-Partition –InputObject $Disk -Size (350MB) -IsActive + Sleep 1 + Format-Volume -Partition $SystemPartition -FileSystem FAT32 -NewFileSystemLabel "UFD-System" -confirm:$False | Out-Null + + $OSPartition = New-Partition –InputObject $Disk -UseMaximumSize + Sleep 1 + Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS -Partition $OSPartition -confirm:$False | Out-Null + + +#The No default drive letter prevents other computers from displaying contents of the drive when connected as a Data drive. + Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE + Set-Partition -InputObject $SystemPartition -NewDriveLetter $SystemDriveLetter + Set-Partition -InputObject $OSPartition -NewDriveLetter $OSDriveLetter + + dism /apply-image /index:1 /applydir:${OSDriveLetter}:\ /imagefile:$InstallWIMPath + if (!$?){ + write-output "DISM image application failed, exiting." + exit + } + + copy $unattendFile ${OSDriveLetter}:\Windows\System32\sysprep\unattend.xml + +#Create the directory for the Machine Registry Policy file, surpressing the output and any error +#and copy the pre-created Registry.pol file to that location. + write-output "Set BitLocker default policies for WindowsToGo" + md ${OSDriveLetter}:\windows\System32\GroupPolicy\Machine | out-null + copy $policyFilePath ${OSDriveLetter}:\windows\System32\GroupPolicy\Machine + +#modify the registry of the image to set SanPolicy. This is also where you could set the default +#keyboard type for USB keyboards. + write-output "Modify SAN Policy" + reg load HKLM\PW-System ${OSDriveLetter}:\Windows\System32\config\SYSTEM > info.log + reg add HKLM\PW-System\ControlSet001\Services\Partmgr\Parameters /v SanPolicy /d 4 /t REG_DWORD /f > info.log + reg unload HKLM\PW-System > info.log + +#We're running bcdboot from the newly applied image so we know that the correct boot files for the architecture and operating system are used. +#This will fail if we try to run an amd64 bcdboot.exe on x86. + cmd /c "$OSDriveLetter`:\Windows\system32\bcdboot $OSDriveLetter`:\Windows /f ALL /s $SystemDriveLetter`:" + if (!$?){ + write-output "BCDBOOT.exe failed, exiting script." + exit + } + + <# + If a domain name was provided to the script, we will create a random computer name + and perform an offline domain join for the device. With this command we also supress the + Add User OOBE screen. +#> + if ($DomainName) + { +#using get-random, we will create a random computer name for the drive. + $suffix = Get-Random + $computername = "wtg-" + $suffix + djoin /provision /domain $DomainName /savefile ${OSDriveLetter}:\tempBLOB.bin /reuse /machine $computername + djoin /requestodj /loadfile ${OSDriveLetter}:\tempBLOB.bin /windowspath ${OSDriveLetter}:\windows > info.log + del ${OSDriveLetter}:\tempBLOB.bin + +#add offline registry key to skip user account screen + write-output "Add Offline Registry key for skipping UserAccount OOBE page." + reg load HKLM\PW-Temp${OSDriveLetter} ${OSDriveLetter}:\Windows\System32\config\SOFTWARE > info.log + reg add HKLM\PW-Temp${OSDriveLetter}\Microsoft\Windows\CurrentVersion\Setup\OOBE /v UnattendCreatedUser /d 1 /t REG_DWORD > info.log + reg unload HKLM\PW-Temp${OSDriveLetter} > info.log + } + + try + { + Write-VolumeCache -DriveLetter ${OSDriveLetter} + Write-Output "Disk is now ready to be removed." + } + catch [System.Management.Automation.CommandNotFoundException] + { + write-output "Flush Cache not supported, Be sure to safely remove the WTG device." + } + + + } -ArgumentList @($installWIMPath, $unattendFile, $disk, $driveLetters[$driveIndex-1][0], $driveLetters[$driveIndex][0], $DomainName, $registryPolFilePath) + } + $driveIndex = $driveIndex + 2 +} +#wait for all threads to finish +get-job | wait-job + +#print output from all threads +get-job | receive-job + +#delete the job objects +get-job | remove-job + + +#Cleanup helper files +del .\WtgUnattend.xml +del .\Registry.pol + +$finishtime = get-date +$elapsedTime = new-timespan $starttime $finishtime +write-output "Provsioning completed in: $elapsedTime (hh:mm:ss.000)" +write-output "" "Provisioning script complete." +``` + +## Considerations when using different USB keyboard layouts with Windows To Go + + +Before provisioning your Windows To Go drive you need to consider if your workspace will boot on a computer with a non-English USB keyboard attached. As described in [KB article 927824](http://go.microsoft.com/fwlink/p/?LinkId=619176) there is a known issue where the plug and play ID causes the keyboard to be incorrectly identified as an English 101 key keyboard. To avoid this problem, you can modify the provisioning script to set the override keyboard parameters. + +In the PowerShell provisioning script, after the image has been applied, you can add the following commands that will correctly set the keyboard settings. The following example uses the Japanese keyboard layout: + +``` syntax + reg load HKLM\WTG-Keyboard ${OSDriveLetter}:\Windows\System32\config\SYSTEM > info.log + reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v LayerDriver /d JPN:kbd106dll /t REG_SZ /f + reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardIdentifier /d PCAT_106KEY /t REG_SZ /f + reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardSubtype /d 2 /t REG_DWORD /f + reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardType /d 7 /t REG_DWORD /f + reg unload HKLM\WTG-Keyboard +``` + +## Related topics + + +[Windows To Go: feature overview](../plan/windows-to-go-feature-overview-scenario.md) + +[Windows 10 forums](http://go.microsoft.com/fwlink/p/?LinkId=618949) + +[Prepare your organization for Windows To Go](../plan/prepare-your-organization-for-windows-to-go.md) + +[Deployment considerations for Windows To Go](../plan/deployment-considerations-for-windows-to-go.md) + +[Security and data protection considerations for Windows To Go](../plan/security-and-data-protection-considerations-for-windows-to-go.md) + +[BitLocker overview](http://go.microsoft.com/fwlink/p/?LinkId=619173) + +  + +  + + + + + diff --git a/windows/deploy/determine-what-to-migrate-usmt-win7-usmt-win8.md b/windows/deploy/determine-what-to-migrate-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..8927d465bc --- /dev/null +++ b/windows/deploy/determine-what-to-migrate-usmt-win7-usmt-win8.md @@ -0,0 +1,62 @@ +--- +title: Determine What to Migrate (Windows 10) +description: Determine What to Migrate +ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Determine What to Migrate + + +By default, User State Migration Tool (USMT) 10.0 migrates the items listed in [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md), depending on the migration .xml files you specify. These default settings are often enough for a basic migration. + +However, when considering what settings to migrate, you should also consider what settings you would like the user to be able to configure, if any, and what settings you would like to standardize. Many organizations use their migration as an opportunity to create and begin enforcing a better-managed environment. Some of the settings that users can configure on unmanaged computers prior to the migration can be locked on the new, managed computers. For example, standard wallpaper, Internet Explorer security settings, and desktop configuration are some of the items you can choose to standardize. + +To reduce complexity and increase standardization, your organization should consider creating a *standard operating environment (SOE)*. An SOE is a combination of hardware and software that you distribute to all users. This means selecting a baseline for all computers, including standard hardware drivers; core operating system features; core productivity applications, especially if they are under volume licensing; and core utilities. This environment should also include a standard set of security features, as outlined in the organization’s corporate policy. Using a standard operating environment can vastly simplify the migration and reduce overall deployment challenges. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + +

[Identify Users](identify-users-usmt-win7-usmt-win8.md)

Use command-line options to specify which users to migrate and how they should be migrated.

[Identify Applications Settings](identify-applications-settings-usmt-win7-usmt-win8.md)

Determine which applications you want to migrate and prepare a list of application settings to be migrated.

[Identify Operating System Settings](identify-operating-system-settings-usmt-win7-usmt-win8.md)

Use migration to create a new standard environment on each of the destination computers.

[Identify File Types, Files, and Folders](identify-file-types-files-and-folders-usmt-win8.md)

Determine and locate the standard, company-specified, and non-standard locations of the file types, files, folders, and settings that you want to migrate.

+ +  + +## Related topics + + +[What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/estimate-migration-store-size-usmt-win7-usmt-win8.md b/windows/deploy/estimate-migration-store-size-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..628dcfaaae --- /dev/null +++ b/windows/deploy/estimate-migration-store-size-usmt-win7-usmt-win8.md @@ -0,0 +1,134 @@ +--- +title: Estimate Migration Store Size (Windows 10) +description: Estimate Migration Store Size +ms.assetid: cfb9062b-7a2a-467a-a24e-0b31ce830093 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Estimate Migration Store Size + + +The disk space requirements for a migration are dependent on the size of the migration store and the type of migration. You can estimate the amount of disk space needed for computers in your organization based on information about your organization's infrastructure. You can also calculate the disk space requirements using the ScanState tool. + +## In This Topic + + +- [Hard Disk Space Requirements](#BKMK_SpaceReqs). Describes the disk space requirements for the migration store and other considerations on the source and destination computers. + +- [Calculate Disk Space Requirements Using the ScanState Tool](#BKMK_calcDiskSpace). Describes how to use the ScanState tool to determine how big the migration store will be on a particular computer. + +- [Estimate Migration Store Size](#BKMK_EstMigStoreSize). Describes how to estimate the average size of migration stores for the computers in your organization, based on your infrastructure. + +## Hard Disk Space Requirements + + +- **Store.** For non-hard-link migrations, you should ensure that there is enough available disk space at the location where you will save your store to contain the data being migrated. You can save your store to another partition, an external storage device such as a USB flash drive or a server. For more information, see [Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md). + +- **Source Computer.** The source computer needs enough available space for the following: + + - [E250 megabytes (MB) minimum of hard disk space.](#BKMK_EstMigStoreSize) Space is needed to support the User State Migration Tool (USMT) 10.0 operations, for example, growth in the page file. Provided that every volume involved in the migration is formatted as NTFS, 250 MB should be enough space to ensure success for almost every hard-link migration, regardless of the size of the migration. The USMT tools will not create the migration store if 250 MB of disk space is not available. + + - [Temporary space for USMT to run.](#BKMK_EstMigStoreSize) Additional disk space for the USMT tools to operate is required. This does not include the minimum 250 MB needed to create the migration store. The amount of temporary space required can be calculated using the ScanState tool. + + - [Hard-link migration store.](#BKMK_EstMigStoreSize) It is not necessary to estimate the size of a hard-link migration store. The only case where the hard-link store can be quite large is when non-NTFS file systems exist on the system and contain data being migrated. + +- [Destination computer.](#BKMK_EstMigStoreSize) The destination computer needs enough available space for the following: + + - [Operating system.](#BKMK_EstMigStoreSize) + + - [Applications.](#BKMK_EstMigStoreSize) + + - [Data being migrated.](#BKMK_EstMigStoreSize) It is important to consider that in addition to the files being migrated, registry information will also require hard disk space for storage. + + - [Temporary space for USMT to run.](#BKMK_EstMigStoreSize) Additional disk space for the USMT tools to operate is required. The amount of temporary space required can be calculated using the ScanState tool. + +## Calculate Disk Space Requirements using the ScanState Tool + + +You can use the ScanState tool to calculate the disk space requirements for a particular compressed or uncompressed migration. It is not necessary to estimate the migration store size for a hard-link migration since this method does not create a separate migration store. The ScanState tool provides disk space requirements for the state of the computer at the time the tool is run. The state of the computer may change during day to day use so it is recommended that you use the calculations as an estimate when planning your migration. + +**To run the ScanState tool on the source computer with USMT installed,** + +1. Open a command prompt with administrator privileges. + +2. Navigate to the USMT tools. For example, type + + ``` syntax + cd /d "C:\Program Files (x86)\Windows Kits\8.0\Assessment and Deployment Kit\User State Migration Tool\" + ``` + + Where *<architecture>* is x86 or amd64. + +3. Run the **ScanState** tool to generate an XML report of the space requirements. At the command prompt, type + + ``` syntax + ScanState.exe /p: + ``` + + Where *<StorePath>* is a path to a directory where the migration store will be saved and *<path to a file>* is the path and filename where the XML report for space requirements will be saved. For example, + + ``` syntax + ScanState.exe c:\store /p:c:\spaceRequirements.xml + ``` + + The migration store will not be created by running this command, but `StorePath` is a required parameter. + +The ScanState tool also allows you to estimate disk space requirements based on a customized migration. For example, you might not want to migrate the My Documents folder to the destination computer. You can specify this in a configuration file when you run the ScanState tool. For more information, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md). + +**Note**   +To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, the **/p** option, without specifying *<path to a file>* is still available in USMT. + +  + +The space requirements report provides two elements, <**storeSize**> and <**temporarySpace**>. The <**temporarySpace**> value shows the disk space, in bytes, that USMT uses to operate during the migration—this does not include the minimum 250 MB needed to support USMT. The <**storeSize**> value shows the disk space, in bytes, required to host the migration store contents on both the source and destination computers. The following example shows a report generated using **/p:***<path to a file>*. + +``` syntax + + + + 11010592768 + + + 58189144 + + +``` + +Additionally, USMT performs a compliance check for a required minimum of 250 MB of available disk space and will not create a store if the compliance check fails. + +## Estimate Migration Store Size + + +Determine how much space you will need to store the migrated data. You should base your calculations on the volume of e-mail, personal documents, and system settings for each user. The best way to estimate these is to survey several computers to arrive at an average for the size of the store that you will need. + +The amount of space that is required in the store will vary, depending on the local storage strategies your organization uses. For example, one key element that determines the size of migration data sets is e-mail storage. If e-mail is stored centrally, data sets will be smaller. If e-mail is stored locally, such as offline-storage files, data sets will be larger. Mobile users will typically have larger data sets than workstation users. You should perform tests and inventory the network to determine the average data set size in your organization. + +**Note**   +You can create a space-estimate file (Usmtsize.txt), by using the legacy **/p** command-line option to estimate the size of the store. + +  + +When trying to determine how much disk space you will need, consider the following issues: + +- **E-mail** : If users deal with a large volume of e-mail or keep e-mail on their local computers instead of on a mail server, the e-mail can take up as much disk space as all other user files combined. Prior to migrating user data, make sure that users who store e-mail locally synchronize their inboxes with their mail server. + +- **User documents**: Frequently, all of a user's documents fit into less than 50 MB of space, depending on the types of files involved. This estimate assumes typical office work, such as word-processing documents and spreadsheets. This estimate can vary substantially based on the types of documents that your organization uses. For example, an architectural firm that predominantly uses computer-aided design (CAD) files needs much more space than a law firm that primarily uses word-processing documents. You do not need to migrate the documents that users store on file servers through mechanisms such as Folder Redirection, as long as users will have access to these locations after the migration. + +- **User system settings** Five megabytes is usually adequate space to save the registry settings. This requirement can fluctuate, however, based on the number of applications that have been installed. It is rare, however, for the user-specific portion of the registry to exceed 5 MB. + +## Related topics + + +[Common Migration Scenarios](common-migration-scenarios-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/exclude-files-and-settings-usmt.md b/windows/deploy/exclude-files-and-settings-usmt.md new file mode 100644 index 0000000000..6facd19b59 --- /dev/null +++ b/windows/deploy/exclude-files-and-settings-usmt.md @@ -0,0 +1,304 @@ +--- +title: Exclude Files and Settings (Windows 10) +description: Exclude Files and Settings +ms.assetid: df85baf1-6e29-4995-a4bb-ba3f8f7fed0b +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Exclude Files and Settings + + +When you specify the migration .xml files, MigApp.xml, Migdocs, and MigUser.xml, the User State Migration Tool (USMT) 10.0 migrates the settings and components listed, as discussed in [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) You can create a custom .xml file to further specify what to include or exclude in the migration. In addition you can create a Config.xml file to exclude an entire component from a migration. You cannot, however, exclude users by using the migration .xml files or the Config.xml file. The only way to specify which users to include and exclude is by using the User options on the command line in the ScanState tool. For more information, see [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +In this topic: + +- [Create a custom .xml file](#Options). You can use the following elements to specify what to exclude: + + - [include and exclude](#BKMK_IncludeExclude): You can use the <include> and <exclude> elements to exclude objects with conditions. For example, you can migrate all files located in the C:\\ drive, except any .mp3 files. It is important to remember that [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) apply to these elements. + + - [unconditionalExclude](#ExOne): You can use the <unconditionalExclude> element to globally exclude data. This element takes precedence over all other include and exclude rules in the .xml files. Therefore, this element excludes objects regardless of any other <include> rules that are in the .xml files. For example, you can exclude all .mp3 files on the computer, or you can exclude all files from C:\\UserData. + +- [Create a Config.xml file](#Co): You can create and modify a Config.xml file to exclude an entire component from the migration. For example, you can use this file to exclude the settings for one of the default applications. In addition, creating and modifying a Config.xml file is the only way to exclude the operating-system settings that are migrated to computers running Windows. Excluding components using this file is easier than modifying the migration .xml files because you do not need to be familiar with the migration rules and syntax. + +## Create a custom .xml file + + +We recommend that you create a custom .xml file instead of modifying the default migration .xml files. When you use a custom .xml file, you can keep your changes separate from the default .xml files, which makes it easier to track your modifications. + +### <include> and <exclude> + +The migration .xml files, MigApp.xml, MigDocs, and MigUser.xml, contain the <component> element, which typically represents a self-contained component or an application such as Microsoft® Office Outlook® and Word. To exclude the files and registry settings that are associated with these components, use the <include> and <exclude> elements. For example, you can use these elements to migrate all files and settings with pattern X except files and settings with pattern Y, where Y is more specific than X. For the syntax of these elements, see [USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md). + +**Note**   +If you specify an <exclude> rule, always specify a corresponding <include> rule. Otherwise, if you do not specify an <include> rule, the specific files or settings will not be included. They will already be excluded from the migration. Thus, an unaccompanied <exclude> rule is unnecessary. + +  + +- [Example 1: How to migrate all files from C:\\ except .mp3 files](#Ex1) + +- [Example 2: How to migrate all files located in C:\\Data except files in C:\\Data\\tmp](#Ex2) + +- [Example 3: How to exclude the files in a folder but include all subfolders](#Ex3) + +- [Example 4: How to exclude a file from a specific folder](#Ex4) + +- [Example 5: How to exclude a file from any location](#Ex5) + +### Example 1: How to migrate all files from C:\\ except .mp3 files + +The following .xml file migrates all files located on the C: drive, except any .mp3 files. + +``` syntax + + + + MP3 Files + + + + + C:\* [*] + + + + + C:\* [*.mp3] + + + + + + +``` + +### Example 2: How to migrate all files located in C:\\Data except files in C:\\Data\\tmp + +The following .xml file migrates all files and subfolders in C:\\Data, except the files and subfolders in C:\\Data\\tmp. + +``` syntax + + + Test component + + + + + C:\Data\* [*] + + + + + C:\Data\temp\* [*] + + + + + + +``` + +### Example 3: How to exclude the files in a folder but include all subfolders + +The following .xml file migrates any subfolders in C:\\EngineeringDrafts, but excludes all files that are in C:\\EngineeringDrafts. + +``` syntax + + + Component to migrate all Engineering Drafts Documents without subfolders + + + + + C:\EngineeringDrafts\* [*] + + + + + C:\EngineeringDrafts\ [*] + + + + + + +``` + +### Example 4: How to exclude a file from a specific folder + +The following .xml file migrates all files and subfolders in C:\\EngineeringDrafts, except for the Sample.doc file in C:\\EngineeringDrafts. + +``` syntax + + + Component to migrate all Engineering Drafts Documents except Sample.doc + + + + + C:\EngineeringDrafts\* [*] + + + + + C:\EngineeringDrafts\ [Sample.doc] + + + + + + +``` + +### Example 5: How to exclude a file from any location + +To exclude a Sample.doc file from any location on the C: drive, use the <pattern> element. If multiple files exist with the same name on the C: drive, all of these files will be excluded. + +``` syntax + C:\* [Sample.doc] +``` + +To exclude a Sample.doc file from any drive on the computer, use the <script> element. If multiple files exist with the same name, all of these files will be excluded. + +``` syntax + +``` + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +### Example 1: How to exclude all .mp3 files + +The following .xml file excludes all .mp3 files from the migration: + +``` syntax + + + Test + + + + + + + + + + + +``` + +### Example 2: How to exclude all of the files on a specific drive + +The following .xml file excludes only the files located on the C: drive. + +``` syntax + + + Test + + + + + c:\*[*] + + + + + + +``` + +### Example 3: How to exclude registry keys + +The following .xml file unconditionally excludes the HKey\_Current\_User registry key and all of its subkeys. + +``` syntax + + + + Test + + + + + HKCU\testReg[*] + + + + + HKCU\*[*] + + + + + + +``` + +### Example 4: How to Exclude C:\\Windows and C:\\Program Files + +The following .xml file unconditionally excludes the system folders of C:\\Windows and C:\\Program Files. Note that all \*.docx, \*.xls and \*.ppt files will not be migrated because the <unconditionalExclude> element takes precedence over the <include> element. + +``` syntax + + + + Test + + + + + + + + + + + + C:\Program Files\* [*] +C:\Windows\* [*] + + + + + + +``` + +## Create a Config.xml File + + +You can create and modify a Config.xml file if you want to exclude components from the migration. Excluding components using this file is easier than modifying the migration .xml files because you do not need to be familiar with the migration rules and syntax. Config.xml is an optional file that you can create using the **/genconfig** command-line option with the ScanState tool. For example, you can use the Config.xml file to exclude the settings for one of the default applications. In addition, creating and modifying this file is the only way to exclude the operating-system settings that are migrated to computers running Windows. + +- **To exclude the settings for a default application:** Specify `migrate="no"` for the application under the <Applications> section of the Config.xml file. + +- **To exclude an operating system setting:** Specify `migrate="no"` for the setting under the <WindowsComponents> section. + +- **To exclude My Documents:** Specify `migrate="no"` for My Documents under the <Documents> section. Note that any <include> rules in the .xml files will still apply. For example, if you have a rule that includes all the .docx files in My Documents, then only the .docx files will be migrated, but the rest of the files will not. + +See [Config.xml File](configxml-file-usmt-win7-usmt-win8.md) for more information. + +**Note**   +To exclude a component from the Config.xml file, set the **migrate** value to **"no"**. Deleting the XML tag for the component from the Config.xml file will not exclude the component from your migration. + +  + +## Related topics + + +[Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +[Config.xml File](configxml-file-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/extract-files-from-a-compressed-usmt-migration-store.md b/windows/deploy/extract-files-from-a-compressed-usmt-migration-store.md new file mode 100644 index 0000000000..12366a7d4d --- /dev/null +++ b/windows/deploy/extract-files-from-a-compressed-usmt-migration-store.md @@ -0,0 +1,117 @@ +--- +title: Extract Files from a Compressed USMT Migration Store (Windows 10) +description: Extract Files from a Compressed USMT Migration Store +ms.assetid: ad9fbd6e-f89e-4444-8538-9b11566b1f33 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Extract Files from a Compressed USMT Migration Store + + +When you migrate files and settings during a typical PC-refresh migration, you usually create a compressed migration store file on the intermediate store. This migration store is a single image file that contains all files being migrated as well as a catalog file. To protect the compressed file, you can encrypt it by using different encryption algorithms. When you migrate the file back to the source computer after the operating system is installed, you can run the **Usmtutils** command with the **/extract** option to recover the files from the compressed migration store. You can also use the **Usmtutils** command with the **/extract** option any time you need to recover data from a migration store. + +Options used with the **/extract** option can specify: + +- The cryptographic algorithm that was used to create the migration store. + +- The encryption key or the text file that contains the encryption key. + +- Include and exclude patterns for selective data extraction. + +In addition, you can specify the file patterns that you want to extract by using the **/i** option to include file patterns or the **/e** option to exclude file patterns. When both the **/i** option and the **/e** option are used in the same command, include patterns take precedence over exclude patterns. Note that this is different from the include and exclude rules used in the ScanState and LoadState tools. + +## In this topic + + +- [To run the USMTutils tool with the /extract option](#BKMK_extractSyntax) + +- [To extract all files from a compressed migration store](#BKMK_extractAllFiles) + +- [To extract specific file types from an encrypted compressed migration store](#BKMK_extractSpecificFiles) + +- [To extract all but one, or more, file types from an encrypted compressed migration store](#BKMK_excludeFilePattern) + +- [To extract file types using the include pattern and the exclude pattern](#BKMK_includeExcludeFiles) + +### To run the USMTutils tool with the /extract option + +To extract files from the compressed migration store onto the destination computer, use the following USMTutils syntax: + +Cd /d <USMTpath> usmtutils /extract <filePath> <destinationPath> \[/i:<includePattern>\] \[/e:<excludePattern>\] \[/l:<logfile>\] \[/decrypt\[:<AlgID>\] {/key:<keystring> | /keyfile:<filename>}\] \[/o\] + +Where the placeholders have the following values: + +- *<USMTpath>* is the location where you have saved the USMT files and tools. + +- *<filePath>* is the location of the migration store. + +- *<destination path>* is the location of the file where you want the **/extract** option to put the extracted migration store contents. + +- *<includePattern>* specifies the pattern for the files to include in the extraction. + +- *<excludePattern>* specifies the pattern for the files to omit from the extraction. + +- *<AlgID>* is the cryptographic algorithm that was used to create the migration store on the **ScanState** command line. + +- *<logfile>* is the location and name of the log file. + +- *<keystring>* is the encryption key that was used to encrypt the migration store. + +- *<filename>* is the location and name of the text file that contains the encryption key. + +### To extract all files from a compressed migration store + +To extract everything from a compressed migration store to a file on the C:\\ drive, type: + +``` syntax +usmtutils /extract D:\MyMigrationStore\USMT\store.mig C:\ExtractedStore +``` + +### To extract specific file types from an encrypted compressed migration store + +To extract specific files, such as .txt and .pdf files, from an encrypted compressed migration store, type: + +``` syntax +usmtutils /extract D:\MyMigrationStore\USMT\store.mig /i:"*.txt,*.pdf" C:\ExtractedStore /decrypt /keyfile:D:\encryptionKey.txt +``` + +In this example, the file is encrypted and the encryption key is located in a text file called encryptionKey. + +### To extract all but one, or more, file types from an encrypted compressed migration store + +To extract all files except for one file type, such as .exe files, from an encrypted compressed migration store, type: + +``` syntax +usmtutils /extract D:\MyMigrationStore\USMT\store.mig /e:*.exe C:\ExtractedStore /decrypt:AES_128 /key:password /l:C:\usmtutilslog.txt +``` + +### To extract file types using the include pattern and the exclude pattern + +To extract files from a compressed migration store, and to exclude files of one type (such as .exe files) while including only specific files, use both the include pattern and the exclude pattern, as in this example: + +``` syntax +usmtutils /extract D:\MyMigrationStore\USMT\store.mig /i:myProject.* /e:*.exe C:\ExtractedStore /o +``` + +In this example, if there is a myProject.exe file, it will also be extracted because the include pattern option takes precedence over the exclude pattern option. + +## Related topics + + +[UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md) + +[Return Codes](return-codes-usmt-win8.md) + +[Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md) + +  + +  + + + + + diff --git a/windows/deploy/finalize-the-operating-system-configuration-for-windows-81-deployment-with-configuration-manager.md b/windows/deploy/finalize-the-operating-system-configuration-for-windows-81-deployment-with-configuration-manager.md new file mode 100644 index 0000000000..fb3172ef6f --- /dev/null +++ b/windows/deploy/finalize-the-operating-system-configuration-for-windows-81-deployment-with-configuration-manager.md @@ -0,0 +1,203 @@ +--- +title: Finalize the operating system configuration for Windows 10 deployment with Configuration Manager (Windows 10) +description: This topic walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enablement of the optional Microsoft Deployment Toolkit (MDT) monitoring for Microsoft System Center 2012 R2 Configuration Manager, logs folder creation, rules configuration, content distribution, and deployment of the previously created task sequence. +ms.assetid: 38b55fa8-e717-4689-bd43-8348751d493e +keywords: ["configure, deploy, upgrade"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Finalize the operating system configuration for Windows 10 deployment with Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Enable MDT monitoring](#sec01) +- [Create and share the Logs folder](#sec02) +- [Configure the rules (Windows 10 x64 Settings package)](#sec03) +- [Distribute content to the CM01 distribution portal](#sec04) +- [Create a deployment for the task sequence](#sec05) +- [Configure Configuration Manager to prompt for the computer name during deployment (optional)](#sec06) +- [Related topics](#related_topics) + +This topic walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enablement of the optional Microsoft Deployment Toolkit (MDT) monitoring for Microsoft System Center 2012 R2 Configuration Manager, logs folder creation, rules configuration, content distribution, and deployment of the previously created task sequence. + +For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. Both are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +## Enable MDT monitoring + + +This section will walk you through the process of creating the E:\\MDTProduction deployment share using the MDT Deployment Workbench to enable monitoring for Configuration Manager. + +1. On CM01, using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. Use the following settings for the New Deployment Share Wizard: + + 1. Deployment share path: E:\\MDTProduction + + 2. Share name: MDTProduction$ + + 3. Deployment share description: MDT Production + + 4. Options: <default settings> + +2. Right-click the **MDT Production** deployment share, and select **Properties**. In the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box, and click **OK**. + +![figure 26](images/mdt-06-fig31.png) + +Figure 26. Enabling MDT monitoring for Configuration Manager. + +## Create and share the Logs folder + + +To support additional server-side logging in Configuration Manager, you create and share the E:\\Logs folder on CM01 using Windows PowerShell. Then in the next step, you enable server-side logging by modifying the CustomSettings.ini file used by the Configuration Manager task sequence. + +1. On CM01, start an elevated Windows PowerShell prompt (run as Administrator). + +2. Type the following commands, pressing **Enter** after each one: + + ``` syntax + New-Item -Path E:\Logs -ItemType directory + New-SmbShare ?Name Logs$ ?Path E:\Logs -ChangeAccess EVERYONE + icacls E:\Logs /grant '"CM_NAA":(OI)(CI)(M)' + ``` + +## Configure the rules (Windows 10 x64 Settings package) + + +This section will show you how to configure the rules (the Windows 10 x64 Settings package) to support the Contoso environment. + +1. On CM01, using File Explorer, navigate to the **E:\\Sources\\OSD\\Settings\\Windows 10 x64 Settings** folder. + +2. Using Notepad, edit the CustomSetting.ini file with the following settings: + + ``` syntax + [Settings] + Priority=Default + Properties=OSDMigrateConfigFiles,OSDMigrateMode + [Default] + DoCapture=NO + ComputerBackupLocation=NONE + MachineObjectOU=ou=Workstations,ou=Computers,ou=Contoso,dc=contoso,dc=com + OSDMigrateMode=Advanced + OSDMigrateAdditionalCaptureOptions=/ue:*\* /ui:CONTOSO\* + OSDMigrateConfigFiles=Miguser.xml,Migapp.xml + SLSHARE=\\CM01\Logs$ + EventService=http://CM01:9800 + ApplyGPOPack=NO + ``` + + ![figure 27](images/fig30-settingspack.png) + + Figure 27. The Settings package, holding the rules and the Unattend.xml template used during deployment + +3. Update the distribution point for the **Windows 10 x64 Settings** package by right-clicking the **Windows 10 x64 Settings** package and selecting **Update Distribution Points**. + +**Note**   +Although you have not yet added a distribution point, you still need to select Update Distribution Points. That process also updates the Configuration Manager 2012 content library with changes. + +  + +## Distribute content to the CM01 distribution portal + + +In Configuration Manager, you can distribute all packages needed by a task sequence in a single task. In this section, you distribute packages that have not yet been distributed to the CM01 distribution point. + +1. **On CM01, using the Configuration Manager Console**, select **Task Sequences**, right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Distribute Content.** + +2. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard. + +3. Using Configuration Manager Trace, verify the distribution to the CM01 distribution point by reviewing the distmgr.log file, or use the Distribution Status / Content Status option in the Monitoring workspace. Do not continue until you see all the new packages being distributed successfully. + +## Create a deployment for the task sequence + + +This sections provides steps to help you create a deployment for the task sequence. + +1. On CM01, using the Configuration Manager Console, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM**, and then select **Deploy**. + +2. On the **General** page, select the **All Unknown Computers** collection and click **Next**. + +3. On the **Deployment Settings** page, use the following settings and then click **Next**: + + 1. Purpose: Available + + 2. Make available to the following: Only media and PXE + + ![figure 28](images/mdt-06-fig33.png) + + Figure 28. Configure the deployment settings. + +4. On the **Scheduling** page, accept the default settings and click **Next**. + +5. On the **User Experience** page, accept the default settings and click **Next**. + +6. On the **Alerts** page, accept the default settings and click **Next**. + +7. On the **Distribution Points** page, accept the default settings, click **Next** twice, and then click **Close**. + +![figure 29](images/fig32-deploywiz.png) + +Figure 29. The Windows 10 Enterprise x64 RTM task sequence deployed to the All Unknown Computers collections available for media and PXE. + +## Configure Configuration Manager to prompt for the computer name during deployment (optional) + + +You can have Configuration Manager prompt you for a computer name or you can use rules to generate a computer name. For more details on how to do this, see [Configure MDT settings](configure-mdt-2013-settings.md). + +This section provides steps to help you configure the All Unknown Computers collection to have Configuration Manager prompt for computer names. + +1. Using the Configuration Manager Console, in the Asset and Compliance workspace, select **Device Collections**, right-click **All Unknown Computers**, and select **Properties**. + +2. In the **Collection Variables** tab, create a new variable with the following settings: + + 1. Name: OSDComputerName + + 2. Clear the **Do not display this value in the Configuration Manager console** check box. + +3. Click **OK**. + +**Note**   +Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard. + +  + +![figure 30](images/mdt-06-fig35.png) + +Figure 30. Configure a collection variable. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/frequently-asked-questions-usmt-win7-usmt-win8.md b/windows/deploy/frequently-asked-questions-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..a29a68af08 --- /dev/null +++ b/windows/deploy/frequently-asked-questions-usmt-win7-usmt-win8.md @@ -0,0 +1,132 @@ +--- +title: Frequently Asked Questions (Windows 10) +description: Frequently Asked Questions +ms.assetid: 813c13a7-6818-4e6e-9284-7ee49493241b +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Frequently Asked Questions + + +The following sections provide frequently asked questions and recommended solutions for migrations using User State Migration Tool (USMT) 10.0. + +## General + + +### How much space is needed on the destination computer? + +The destination computer needs enough available space for the following: + +- Operating system + +- Applications + +- Uncompressed store + +### Can I store the files and settings directly on the destination computer or do I need a server? + +You do not need to save the files to a server. If you are moving the user state to a new computer, you can create the store on a shared folder, on media that you can remove, such as a USB flash drive (UFD), or you can store it directly on the destination computer, as in the following steps: + +1. Create and share the directory C:\\store on the destination computer. + +2. Run the ScanState tool on the source computer and save the files and settings to \\\\*DestinationComputerName*\\store + +3. Run the LoadState tool on the destination computer and specify C:\\store as the store location. + +### Can I migrate data between operating systems with different languages? + +No. USMT does not support migrating data between operating systems with different languages; the source computer's operating-system language must match the destination computer's operating-system language. + +### Can I change the location of the temporary directory on the destination computer? + +Yes. The environment variable USMT\_WORKING\_DIR can be changed to an alternative temporary directory. There are some offline migration scenarios where this is necessary, for example, when the USMT binaries are located on read-only Windows Preinstallation Environment (WinPE) boot media. + +### How do I install USMT? + +Because USMT is included in Windows Assessment and Deployment Kit (Windows ADK), you need to install the Windows ADK package on at least one computer in your environment. However, the USMT binaries are designed to be deployed using xcopy. This means that they are installed on a computer simply by recursively copying the USMT directory from the computer containing the Windows ADK to each client computer. + +### How do I uninstall USMT? + +If you have installed the Windows ADK on the computer, uninstalling Windows ADK will uninstall USMT. For client computers that do not have the Windows ADK installed, you can simply delete the USMT directory to uninstall USMT. + +## Files and Settings + + +### How can I exclude a folder or a certain type of file from the migration? + +You can use the **<unconditionalExclude>** element to globally exclude data from the migration. For example, you can use this element to exclude all MP3 files on the computer or to exclude all files from C:\\UserData. This element excludes objects regardless of any other <include> rules that are in the .xml files. For an example, see <unconditionalExclude> in the [Exclude Files and Settings](exclude-files-and-settings-usmt.md) topic. For the syntax of this element, see [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md). + +### What happens to files that were located on a drive that does not exist on the destination computer? + +USMT migrates the files to the %SystemDrive% while maintaining the correct folder hierarchy. For example, if E:\\data\\File.pst is on the source computer, but the destination computer does not have an E:\\ drive, the file will be migrated to C:\\data\\File.pst, if C:\\ is the system drive. This holds true even when <locationModify> rules attempt to move data to a drive that does not exist on the destination computer. + +## USMT .xml Files + + +### Where can I get examples of USMT .xml files? + +The following topics include examples of USMT .xml files: + +- [Exclude Files and Settings](exclude-files-and-settings-usmt.md) + +- [Reroute Files and Settings](reroute-files-and-settings-usmt.md) + +- [Include Files and Settings](include-files-and-settings-usmt.md) + +- [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md) + +### Can I use custom .xml files that were written for USMT 5.0? + +Yes. You can use custom .xml files that were written for USMT 5.0 with USMT for Windows 10. However, in order to use new USMT functionality, you must revisit your custom USMT files and refresh them to include the new command-line options and XML elements. + +### How can I validate the .xml files? + +You can use the USMT XML Schema (MigXML.xsd) to write and validate migration .xml files. + +### Why must I list the .xml files with both the ScanState and LoadState commands? + +The .xml files are not copied to the store as in previous versions of USMT. Because the ScanState and LoadState tools need the .xml files to control the migration, you must specify the same set of .xml files for the **ScanState** and **LoadState** commands. If you used a particular set of mig\*.xml files in the ScanState tool, either called through the "/auto" option, or individually through the "/i" option, then you should use same option to call the exact same mig\*.xml files in the LoadState tool. However, you do not have to specify the Config.xml file, unless you want to exclude some of the files and settings that you migrated to the store. For example, you might want to migrate the My Documents folder to the store, but not to the destination computer. To do this, modify the Config.xml file and specify the updated file with the **LoadState** command. **LoadState** will migrate only the files and settings that you want to migrate. + +If you exclude an .xml file from the **LoadState** command, then all of the data that is in the store that was migrated with the missing .xml files will be migrated. However, the migration rules that were specified for the **ScanState** command will not apply. For example, if you exclude a MigApp.xml file that has a rerouting rule such as `MigsysHelperFunction.RelativeMove("c:\data", "%CSIDL_PERSONAL%")`, USMT will not reroute the files. Instead, it will migrate them to C:\\data. + +### Which files can I modify and specify on the command line? + +You can specify the MigUser.xml and MigApp.xml files on the command line. You can modify each of these files. The migration of operating system settings is controlled by the manifests, which you cannot modify. If you want to exclude certain operating-system settings or any other components, create and modify the Config.xml file. + +### What happens if I do not specify the .xml files on the command line? + +- **ScanState** + + If you do not specify any files with the **ScanState** command, all user accounts and default operating system components are migrated. + +- **LoadState** + + If you do not specify any files with the **LoadState** command, all data that is in the store is migrated. However, any target-specific migration rules that were specified in .xml files with the **ScanState** command will not apply. For example, if you exclude a MigApp.xml file that has a rerouting rule such as `MigsysHelperFunction.RelativeMove("c:\data", "%CSIDL_PERSONAL%")`, USMT will not reroute the files. Instead, it will migrate them to C:\\data. + +## Conflicts and Precedence + + +### What happens when there are conflicting XML rules or conflicting objects on the destination computer? + +For more information, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +## Related topics + + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +[Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md) + +[Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md) + +  + +  + + + + + diff --git a/windows/deploy/general-conventions-usmt-win7-usmt-win8.md b/windows/deploy/general-conventions-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..8de760ce4c --- /dev/null +++ b/windows/deploy/general-conventions-usmt-win7-usmt-win8.md @@ -0,0 +1,101 @@ +--- +title: General Conventions (Windows 10) +description: General Conventions +ms.assetid: 5761986e-a847-41bd-bf8e-7c1bd01acbc6 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# General Conventions + + +This topic describes the XML helper functions. + +## In This Topic + + +[General XML Guidelines](#BKMK_General) + +[Helper Functions](#BKMK_HelperFunctions) + +## General XML Guidelines + + +Before you modify the .xml files, become familiar with the following guidelines: + +- **XML schema** + + You can use the User State Migration Tool (USMT) 10.0 XML schema, MigXML.xsd, to write and validate migration .xml files. + +- **Conflits** + + In general, when there are conflicts within the XML schema, the most specific pattern takes precedence. For more information, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +- **Required elements** + + The required elements for a migration .xml file are **<migration>**, **<component>**, **<role>**, and **<rules>**. + +- **Required child elements** + + - USMT does not fail with an error if you do not specify the required child elements. However, you must specify the required child elements for the parent element to affect the migration. + + - The required child elements apply only to the first definition of the element. If these elements are defined and then referred to using their name, the required child elements do not apply. For example, if you define `` in **<namedElements>**, and you specify `` in **<component>** to refer to this element, the definition inside **<namedElements>** must have the required child elements, but the **<component>** element does not need to have the required child elements. + +- **File names with brackets** + + If you are migrating a file that has a bracket character (\[ or \]) in the file name, you must insert a carat (^) character directly before the bracket for the bracket character to be valid. For example, if there is a file named File.txt, you must specify `c:\documents\mydocs [file^].txt] `instead of `c:\documents\mydocs [file].txt]`. + +- **Using quotation marks** + + When you surround code in quotation marks, you can use either double ("") or single (') quotation marks. + +## Helper Functions + + +You can use the XML helper functions in the [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) to change migration behavior. Before you use these functions in an .xml file, note the following: + +- **All of the parameters are strings** + +- **You can leave NULL parameters blank** + + As with parameters with a default value convention, if you have a NULL parameter at the end of a list, you can leave it out. For example, the following function: + + ``` syntax + SomeFunction("My String argument",NULL,NULL) + ``` + + is equivalent to: + + ``` syntax + SomeFunction("My String argument") + ``` + +- **The encoded location used in all the helper functions is an unambiguous string representation for the name of an object** + + It is composed of the node part, optionally followed by the leaf enclosed in square brackets. This makes a clear distinction between nodes and leaves. + + For example, specify the file C:\\Windows\\Notepad.exe: **c:\\Windows\[Notepad.exe\]**. Similarly, specify the directory C:\\Windows\\System32 like this: **c:\\Windows\\System32**; note the absence of the \[\] characters. + + The registry is represented in a similar way. The default value of a registry key is represented as an empty \[\] construct. For example, the default value for the HKLM\\SOFTWARE\\MyKey registry key is **HKLM\\SOFTWARE\\MyKey\[\]**. + +- **You specify a location pattern in a way that is similar to how you specify an actual location** + + The exception is that both the node and leaf part accept patterns. However, a pattern from the node does not extend to the leaf. + + For example, the pattern **c:\\Windows\\\*** will match the \\Windows directory and all subdirectories, but it will not match any of the files in those directories. To match the files as well, you must specify **c:\\Windows\\\*\[\*\]**. + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/get-started-with-the-microsoft-deployment-toolkit--mdt-.md b/windows/deploy/get-started-with-the-microsoft-deployment-toolkit--mdt-.md new file mode 100644 index 0000000000..eb6862892e --- /dev/null +++ b/windows/deploy/get-started-with-the-microsoft-deployment-toolkit--mdt-.md @@ -0,0 +1,62 @@ +--- +title: Get started with the Microsoft Deployment Toolkit (MDT) (Windows 10) +description: This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 in particular, as part of a Windows operating system deployment. +ms.assetid: a256442c-be47-4bb9-a105-c831f58ce3ee +keywords: ["deploy", "image", "feature", "install", "tools"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Get started with the Microsoft Deployment Toolkit (MDT) + + +**Applies to** + +- Windows 10 + +This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 1 in particular, as part of a Windows operating system deployment. MDT is one of the most important tools available to IT professionals today. You can use it to create reference images or as a complete deployment solution. MDT 2013 Update 1 also can be used to extend the operating system deployment features available in Microsoft System Center 2012 R2 Configuration Manager. + +In addition to familiarizing you with the features and options available in MDT 2013 Update 1, this topic will walk you through the process of preparing for deploying Windows 10 using MDT by configuring Active Directory, creating an organizational unit (OU) structure, creating service accounts, configuring log files and folders, and installing the tools needed to view the logs and continue with the deployment process. + +For the purposes of this topic, we will use two machines: DC01 and MDT01. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. MDT01 is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-05-fig01.png) + +Figure 1. The machines used in this topic. + +## In this section + + +- [Key features in MDT 2013 Update 1](key-features-in-mdt-2013.md) + +- [MDT 2013 Update 1 Lite Touch components](mdt-2013-lite-touch-components.md) + +- [Prepare for deployment with MDT 2013 Update 1](prepare-for-deployment-with-mdt-2013.md) + +## Related topics + + +[Microsoft Deployment Toolkit downloads and documentation](http://go.microsoft.com/fwlink/p/?LinkId=618117) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/getting-started-with-the-user-state-migration-tool--usmt-.md b/windows/deploy/getting-started-with-the-user-state-migration-tool--usmt-.md new file mode 100644 index 0000000000..956079c951 --- /dev/null +++ b/windows/deploy/getting-started-with-the-user-state-migration-tool--usmt-.md @@ -0,0 +1,113 @@ +--- +title: Getting Started with the User State Migration Tool (USMT) (Windows 10) +description: Getting Started with the User State Migration Tool (USMT) +ms.assetid: 506ff1d2-94b8-4460-8672-56aad963504b +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Getting Started with the User State Migration Tool (USMT) + + +This topic outlines the general process that you should follow to migrate files and settings. + +## In this Topic + + +- [Step One: Plan Your Migration](#BKMK_PlanMig) + +- [Step Two: Collect Files and Settings from the Source Computer](#BKMK_CollectFiles) + +- [Step Three: Prepare the Destination Computer and Restore Files and Settings](#BKMK_PrepareDestination) + +## Step One: Plan Your Migration + + +1. [Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md). Depending on whether your migration scenario is refreshing or replacing computers, you can choose an online migration or an offline migration using Windows Preinstallation Environment (WinPE) or the files in the Windows.old directory. For more information, see [Common Migration Scenarios](common-migration-scenarios-usmt-win7-usmt-win8.md). + +2. [Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md). Data you might consider migrating includes end-user information, applications settings, operating-system settings, files, folders, and registry keys. + +3. Determine where to store data. Depending on the size of your migration store, you can store the data remotely, locally in a hard-link migration store or on a local external storage device, or directly on the destination computer. For more information, see [Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md). + +4. Use the **/GenMigXML** command-line option to determine which files will be included in your migration, and to determine whether any modifications are necessary. For more information see [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) + +5. Modify copies of the Migration.xml and MigDocs.xml files and create custom .xml files, if it is required. To modify the migration behavior, such as migrating the **Documents** folder but not the **Music** folder, you can create a custom .xml file or modify the rules in the existing migration .xml files. The document finder, or **MigXmlHelper.GenerateDocPatterns** helper function, can be used to automatically find user documents on a computer without creating extensive custom migration .xml files. + + **Important**   + We recommend that you always make and modify copies of the .xml files included in User State Migration Tool (USMT) 10.0. Never modify the original .xml files. + +   + + You can use the MigXML.xsd file to help you write and validate the .xml files. For more information about how to modify these files, see [USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md). + +6. Create a [Config.xml File](configxml-file-usmt-win7-usmt-win8.md) if you want to exclude any components from the migration. To create this file, use the [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) option together with the other .xml files when you use the **ScanState** command. For example, the following command creates a Config.xml file by using the MigDocs and MigApp.xml files: + + `scanstate /genconfig:config.xml /i:migdocs.xml /i:migapp.xml /v:13 /l:scanstate.log` + +7. Review the migration state of the components listed in the Config.xml file, and specify `migrate=no` for any components that you do not want to migrate. + +## Step Two: Collect Files and Settings from the Source Computer + + +1. Back up the source computer. + +2. Close all applications. If some applications are running when you run the **ScanState** command, USMT might not migrate all of the specified data. For example, if Microsoft® Office Outlook® is open, USMT might not migrate PST files. + + **Note**   + USMT will fail if it cannot migrate a file or setting unless you specify the **/C** option. When you specify the **/C** option, USMT will ignore the errors, and log an error every time that it encounters a file that is being used that USMT did not migrate. You can use the **<ErrorControl>** section in the Config.xml file to specify which errors should be ignored, and which should cause the migration to fail. + +   + +3. Run the **ScanState** command on the source computer to collect files and settings. You should specify all of the .xml files that you want the **ScanState** command to use. For example, + + `scanstate \\server\migration\mystore /config:config.xml /i:migdocs.xml /i:migapp.xml /v:13 /l:scan.log` + + **Note**   + If the source computer is running Windows 7, or Windows 8, you must run the **ScanState** command in **Administrator** mode. To run in **Administrator** mode, right-click **Command Prompt**, and then click **Run As Administrator**. If the source computer is running Windows XP, you must run the **ScanState** command from an account that has administrative credentials. For more information about the how the **ScanState** command processes and stores the data, see [How USMT Works](how-usmt-works-usmt-win7-usmt-win8.md). + +   + +4. Run the **USMTUtils** command with the **/Verify** option to ensure that the store you created is not corrupted. + +## Step Three: Prepare the Destination Computer and Restore Files and Settings + + +1. Install the operating system on the destination computer. + +2. Install all applications that were on the source computer. Although it is not always required, we recommend installing all applications on the destination computer before you restore the user state. This makes sure that migrated settings are preserved. + + **Note**   + The application version that is installed on the destination computer should be the same version as the one on the source computer. USMT does not support migrating the settings for an older version of an application to a newer version. The exception to this is Microsoft® Office, which USMT can migrate from an older version to a newer version. + +   + +3. Close all applications. If some applications are running when you run the **LoadState** command, USMT might not migrate all of the specified data. For example, if Microsoft Office Outlook is open, USMT might not migrate PST files. + + **Note**   + Use **/C** to continue your migration if errors are encountered, and use the **<ErrorControl>** section in the Config.xml file to specify which errors should be ignored, and which errors should cause the migration to fail. + +   + +4. Run the **LoadState** command on the destination computer. Specify the same set of .xml files that you specified when you used the **ScanState** command. However, you do not have to specify the Config.xml file, unless you want to exclude some of the files and settings that you migrated to the store. For example, you might want to migrate the My Documents folder to the store, but not to the destination computer. To do this, modify the Config.xml file and specify the updated file by using the **LoadState** command. Then, the **LoadState** command will migrate only the files and settings that you want to migrate. For more information about the how the **LoadState** command processes and migrates data, see [How USMT Works](how-usmt-works-usmt-win7-usmt-win8.md). + + For example, the following command migrates the files and settings: + + `loadstate \\server\migration\mystore /config:config.xml /i:migdocs.xml /i:migapp.xml /v:13 /l:load.log` + + **Note**   + Run the **LoadState** command in administrator mode. To do this, right-click **Command Prompt**, and then click **Run As Administrator**. + +   + +5. Log off after you run the **LoadState** command. Some settings (for example, fonts, wallpaper, and screen saver settings) will not take effect until the next time that the user logs on. + +  + +  + + + + + diff --git a/windows/deploy/hard-link-migration-store-usmt-win8.md b/windows/deploy/hard-link-migration-store-usmt-win8.md new file mode 100644 index 0000000000..d4a1b48056 --- /dev/null +++ b/windows/deploy/hard-link-migration-store-usmt-win8.md @@ -0,0 +1,230 @@ +--- +title: Hard-Link Migration Store (Windows 10) +description: Hard-Link Migration Store +ms.assetid: b0598418-4607-4952-bfa3-b6e4aaa2c574 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Hard-Link Migration Store + + +A *hard-link migration store* enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario. Use of a hard-link migration store for a computer-refresh scenario drastically improves migration performance and significantly reduces hard-disk utilization, reduces deployment costs and enables entirely new migration scenarios. + +## In This Topic + + +[When to Use a Hard-Link Migration](#BKMK_When) + +[Understanding a Hard-Link Migration](#BKMK_UnderstandHardlinkMig) + +[Scenario](#BKMK_Scenario) + +[Hard-Link Migration Store Details](#BKMK_HardLinkStoreDetails) + +[Hard Disk Space](#BKMK_HardDiskSpace) + +[Hard-Link Store Size Estimation](#BKMK_HardLinkStoreSizeEst) + +[Migration Store Path on Multiple Volumes](#BKMK_MigStoreMultVolumes) + +[Location Modifications](#BKMK_LocationModify) + +[Migrating Encrypting File System (EFS) Certificates and Files](#BKMK_EFS) + +[Migrating Locked Files With the Hard-Link Migration Store](#BKMK_MigLockedFiles) + +[XML Elements in the Config.xml File](#BKMK_XMLElementsinConfig) + +## When to Use a Hard-Link Migration + + +You can use a hard-link migration store when your planned migration meets both of the following criteria: + +- You are upgrading the operating system on existing hardware rather than migrating to new computers. + +- You are upgrading the operating system on the same volume of the computer. + +You cannot use a hard-link migration store if your planned migration includes any of the following: + +- You are migrating data from one computer to a second computer. + +- You are migrating data from one volume on a computer to another volume, for example from C: to D:. + +- You are formatting or repartitioning the disk outside of Windows Setup, or specifying a disk format or repartition during Windows Setup that will remove the migration store. + +## Understanding a Hard-Link Migration + + +The hard-link migration store is created using the command-line option, **/hardlink**, and is equivalent to other migration-store types. However, it differs in that hard links are utilized to keep files stored on the source computer during the migration. Keeping the files in place on the source computer eliminates the redundant work of duplicating files. It also enables the performance benefits and reduction in disk utilization that define this scenario. + +When you create a hard link, you give an existing file an additional path. For instance, you could create a hard link to c:\\file1.txt called c:\\hard link\\myFile.txt. These are two paths to the same file. If you open c:\\file1.txt, make changes, and save the file, you will see those changes when you open c:\\hard link\\myFile.txt. If you delete c:\\file1.txt, the file still exists on your computer as c:\\hardlink\\myFile.txt. You must delete both references to the file in order to delete the file. + +**Note**   +A hard link can only be created for a file on the same volume. If you copy a hard-link migration store to another drive or external device, the files, and not the links, are copied, as in a non-compressed migration-store scenario. + +  + +For more information about hard links, please see [Hard Links and Junctions](http://go.microsoft.com/fwlink/p/?LinkId=132934) + +In most aspects, a hard-link migration store is identical to an uncompressed migration store. It is located where specified by the Scanstate command-line tool and you can view the contents of the store by using Windows® Explorer. Once created, it can be deleted or copied to another location without changing user state. Restoring a hard-link migration store is similar to restoring any other migration store; however, as with creating the store, the same hard-link functionality is used to keep files in-place. + +As a best practice, we recommend that you delete the hard-link migration store after you confirm that the Loadstate tool has successfully migrated the files. Since Loadstate has created new paths to the files on your new installation of a Windows operating system, deleting the hard links in the migration store will only delete one path to the files and will not delete the actual files or the paths to them from your new operating system. + +**Important**   +Using the **/c** option will force the Loadstate tool to continue applying files when non-fatal errors occur. If you use the **/c** option, you should verify that no errors are reported in the logs before deleting the hard-link migration store in order to avoid data loss. + +  + +Keeping the hard-link migration store can result in additional disk space being consumed or problems with some applications for the following reasons: + +- Applications reporting file-system statistics, for example, space used and free space, might incorrectly report these statistics while the hard-link migration store is present. The file may be reported twice because of the two paths that reference that file. + +- A hard link may lose its connection to the original file. Some applications save changes to a file by creating a temporary file and then renaming the original to a backup filename. The path that was not used to open the file in this application will continue to refer to the unmodified file. The unmodified file that is not in use is taking up additional disk space. You should create the hard-link migration store just before you perform the migration, and not use applications once the store is created, in order to make sure you are migrating the latest versions of all files. + +- Editing the file by using different paths simultaneously may result in data corruption. + +**Important**   +The read-only file attribute on migrated files is lost when the hard-link migration store is deleted. This is due to a limitation in NTFS file system hard links. + +  + +## Hard-Link Migration Scenario + + +For example, a company has decided to deploy Windows 10 on all of their computers. Each employee will keep the same computer, but the operating system on each computer will be updated. + +1. An administrator runs the ScanState command-line tool on each computer, specifying the **/hardlink** command-line option. The ScanState tool saves the user state to a hard-link migration store on each computer, improving performance by reducing file duplication, except in certain specific instances. + + **Note**   + As a best practice, we recommend that you do not create your hard-link migration store until just before you perform the migration in order to migrate the latest versions of your files. You should not use your software applications on the computer after creating the migration store until you have finished migrating your files with Loadstate. + +   + +2. On each computer, an administrator installs the company's standard operating environment (SOE), which includes Windows 7 and other applications the company currently uses. + +3. An administrator runs the LoadState command-line tool on each computer. The LoadState tool restores user state back on each computer. + +## Hard-Link Migration Store Details + + +This section provides details about hard-link migration stores. + +### Hard Disk Space + +The **/hardlink** command-line option proceeds with creating the migration store only if there is 250 megabytes (MB) of free space on the hard disk. Provided that every volume involved in the migration is formatted as NTFS, 250 MB should be enough space to ensure success for almost every hard-link migration, regardless on the size of the migration. + +### Hard-Link Store Size Estimation + +It is not necessary to estimate the size of a hard-link migration store. Estimating the size of a migration store is only useful in scenarios where the migration store is very large, and on NTFS volumes the hard-link migration store will require much less incremental space than other store options. The only case where the local store can be quite large is when non-NTFS file systems exist on the system and contain data being migrated. Since NTFS has been the default file system format for Windows XP and newer operating systems, this situation is unusual. + +### Migration Store Path on Multiple Volumes + +Separate hard-link migration stores are created on each NTFS volume that contain data being migrated. In this scenario, the primary migration-store location will be specified on the command line, and should be the operating-system volume. Migration stores with identical names and directory names will be created on every volume containing data being migrated. For example: + +`Scanstate /hardlink c:\USMTMIG […]` + +Running this command on a system that contains the operating system on the C: drive and the user data on the D: drive will generate migration stores in the following locations, assuming that both drives are NTFS: + +C:\\USMTMIG\\ + +D:\\USMTMIG\\ + +The drive you specify on the command line for the hard-link migration store is important, because it defines where the *master migration store* should be placed. The *master migration store* is the location where data migrating from non-NTFS volumes is stored. This volume must have enough space to contain all of the data that comes from non-NTFS volumes. As in other scenarios, if a migration store already exists at the specified path, the **/o** option must be used to overwrite the existing data in the store. + +### Location Modifications + +Location modifications that redirect migrated content from one volume to a different volume have an adverse impact on the performance of a hard-link migration. This is because the migrating data that must cross system volumes cannot remain in the hard-link migration store, and must be copied across the system volumes. + +### Migrating Encrypting File System (EFS) Certificates and Files + +To migrate Encrypting File System (EFS) files to a new installation of an operating system on the same volume of the computer, specify the **/efs:hardlink** option in the Scanstate command-line syntax. + +If the EFS files are being restored to a different partition, you should use the **/efs:copyraw** option instead of the **/efs:hardlink** option. Hard links can only be created for files on the same volume. Moving the files to another partition during the migration requires a copy of the files to be created on the new partition. The **/efs:copyraw** option will copy the files to the new partition in encrypted format. + +For more information, see [Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md) and the Encrypted File Options in [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +### Migrating Locked Files with the Hard-Link Migration Store + +Files that are locked by an application or the operating system are handled differently when using a hard-link migration store. + +Files that are locked by the operating system cannot remain in place and must be copied into the hard-link migration store. As a result, selecting many operating-system files for migration significantly reduces performance during a hard-link migration. As a best practice, we recommend that you do not migrate any files out of the \\Windows directory, which minimizes performance-related issues. + +Files that are locked by an application are treated the same in hard-link migrations as in other scenarios when the volume shadow-copy service is not being utilized. The volume shadow-copy service cannot be used in conjunction with hard-link migrations. However, by modifying the new **<HardLinkStoreControl>** section in the Config.xml file, it is possible to enable the migration of files locked by an application. + +**Important**   +There are some scenarios in which modifying the **<HardLinkStoreControl>** section in the Config.xml file makes it more difficult to delete a hard-link migration store. In these scenarios, you must use USMTutils.exe to schedule the migration store for deletion on the next restart. + +  + +## XML Elements in the Config.xml File + + +A new section in the Config.xml file allows optional configuration of some of the hard-link migration behavior introduced with the **/HardLink** option. + + ++++ + + + + + + + + + + + + + + + + + + + + + + +

<Policies>

This element contains elements that describe the policies that USMT follows while creating a migration store.

<HardLinkStoreControl>

This element contains elements that describe how to handle files during the creation of a hard link migration store.

<fileLocked>

This element contains elements that describe how to handle files that are locked for editing.

<createHardLink>

This element defines a standard MigXML pattern that describes file paths where hard links should be created, even if the file is locked for editing by another application.

+

Syntax: <createHardLink> [pattern] </createHardLink>

<errorHardLink>

This element defines a standard MigXML pattern that describes file paths where hard links should not be created, if the file is locked for editing by another application.

+

<errorHardLink> [pattern] </errorHardLink>

+ +  + +**Important**   +You must use the **/nocompress** option with the **/HardLink** option. + +  + +The following XML sample specifies that files locked by an application under the \\Users directory can remain in place during the migration. It also specifies that locked files that are not located in the \\Users directory should result in the **File in Use** error. It is important to exercise caution when specifying the paths using the **File in Use<createhardlink>** tag in order to minimize scenarios that make the hard-link migration store more difficult to delete. + +``` syntax + + + + c:\Users\* [*] + C:\* [*] + + + +``` + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/how-usmt-works-usmt-win7-usmt-win8.md b/windows/deploy/how-usmt-works-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..3556032849 --- /dev/null +++ b/windows/deploy/how-usmt-works-usmt-win7-usmt-win8.md @@ -0,0 +1,145 @@ +--- +title: How USMT Works (Windows 10) +description: How USMT Works +ms.assetid: 5c8bd669-9e1e-473d-81e6-652f40b24171 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# How USMT Works + + +USMT includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer. + +- [ScanState Process](#BKMK_SSProcess) + +- [LoadState Process](#BKMK_LSProcess) + + **Note**   + For more information about how USMT processes the rules and the XML files, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +   + +## The ScanState Process + + +When you run the ScanState tool on the source computer, it goes through the following process: + +1. It parses and validates the command-line parameters, creates the ScanState.log file, and then begins logging. + +2. It collects information about all of the migration components that need to be migrated. A *migration component* is a logical group of files, registry keys, and values. For example, the set of files, registry keys, and values that store the settings of Adobe Acrobat is grouped into a single migration component. + + There are three types of components: + + - Components that migrate the operating system settings + + - Components that migrate application settings + + - Components that migrate users’ files + + The ScanState tool collects information about the application settings and user data components from the .xml files that are specified on the command line. + + In Windows 7, and Windows 8, the manifest files control how the operating-system settings are migrated. You cannot modify these files. If you want to exclude certain operating-system settings, you must create and modify a Config.xml file. + +3. ScanState determines which user profiles should be migrated. By default, all user profiles on the source computer are migrated. However, you can include and exclude users using the User Options. The public profile in a source computer running Windows 7, Windows 8, and Windows 10 is always migrated, and you cannot exclude these profiles from the migration. + +4. In the "Scanning" phase, ScanState does the following for each user profile selected for migration: + + 1. For each component, ScanState checks the type of the component. If the current user profile is the system profile and the component type is “System” or “UserAndSystem”, the component is selected for this user. Otherwise, the component is ignored. Alternatively, if the current user profile is not the system profile and the component type is “User” or “UserAndSystem”, the component is selected for this user. Otherwise, this component is ignored. + + **Note**   + From this point on, ScanState does not distinguish between components that migrate operating-system settings, those that migrate application settings, and those that migrate users’ files. ScanState processes all components in the same way. + +   + + 2. Each component that is selected in the previous step is processed further. Any profile-specific variables (such as CSIDL\_PERSONAL) are evaluated in the context of the current profile. For example, if the profile that is being processed belongs to “User1”, then CSIDL\_PERSONAL would expand to C:\\Users\\User1\\Documents, assuming that the user profiles are stored in the C:\\Users directory. + + 3. For each selected component, ScanState evaluates the <detects> section. If the condition in the <detects> section evaluates to false, the component is not processed any further. Otherwise, the processing of this component continues. + + 4. For each selected component, ScanState evaluates the <rules> sections. For each <rules> section, if the current user profile is the system profile and the context of the <rules> section is “System” or “UserAndSystem”, the rule is processed further. Otherwise, this rule is ignored. Alternatively, if the current user profile is not the system profile and the context of the <rules> section is “User” or “UserAndSystem”, the rule is processed further. Otherwise, this rule is ignored. + + 5. ScanState creates a list of migration units that need to be migrated by processing the various subsections under this <rules> section. Each unit is collected if it is mentioned in an <include> subsection, as long as there is not a more specific rule for it in an <exclude> subsection in the same <rules> section. For more information about precedence in the .xml files, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + + In addition, any migration unit (such as a file, registry key, or set of registry values) that is in an <UnconditionalExclude> section is not migrated. + + **Note**   + ScanState ignores some subsections such as <destinationCleanup> and <locationModify>. These sections are evaluated only on the destination computer. + +   + +5. In the "Collecting" phase, ScanState creates a master list of the migration units by combining the lists that were created for each selected user profile. + +6. In the "Saving" phase, ScanState writes the migration units that were collected to the store location. + + **Note**   + ScanState does not modify the source computer in any way. + +   + +## The LoadState Process + + +The LoadState process is very similar to the ScanState process. The ScanState tool collects migration units such as file, registry key, or registry values from the source computer and saves them to the store. Similarly, the LoadState tool collects migration units from the store and applies them to the destination computer. + +1. ScanState parses and validates the command-line parameters, creates the ScanState.log file, and then begins logging. + +2. LoadState collects information about the migration components that need to be migrated. + + LoadState obtains information for the application-settings components and user-data components from the migration .xml files that are specified by the LoadState command. + + In Windows 7, and Windows 8, the manifest files control how the operating-system settings are migrated. You cannot modify these files. If you want to exclude certain operating-system settings, you must create and modify a Config.xml file. + +3. LoadState determines which user profiles should be migrated. By default, all user profiles present on the source computer are migrated. However, you can include and exclude users using the User Options. The system profile, the "All users" profile in a source computer running Windows XP, or the Public profile in a source computer running Windows Vista, Windows 7, and Windows 8, is always migrated and you cannot exclude these profiles from the migration. + + - If you are migrating local user accounts and if the accounts do not already exist on the destination computer, you must use the**/lac** command-line option. If you do not specify the **/lac** option, any local user accounts that are not already present on the destination computer, are not migrated. + + - The **/md** and **/mu** options are processed to rename the user profile on the destination computer, if they have been included when the LoadState command was specified. + + - For each user profile selected from the store, LoadState creates a corresponding user profile on the destination computer. The destination computer does not need to be connected to the domain for domain user profiles to be created. If USMT cannot determine a domain, it attempts to apply the settings to a local account. For more information, see [Identify Users](identify-users-usmt-win7-usmt-win8.md). + +4. In the "Scanning" phase, LoadState does the following for each user profile: + + 1. For each component, LoadState checks the type of the component. If the current user profile is the system profile and the component type is “System” or “UserAndSystem”, the component is selected for this user. Otherwise, the component is ignored. Alternatively, if the current user profile is not the system profile and the component type is “User” or “UserAndSystem”, the component is selected for this user. Otherwise, this component is ignored. + + **Note**   + From this point on, LoadState does not distinguish between components that migrate operating-system settings, those that migrate application settings, and those that migrate users’ files. LoadState evaluates all components in the same way. + +   + + 2. Each component that is selected is processed further. Any profile-specific variables (such as CSIDL\_PERSONAL) are evaluated in the context of the current profile. For example, if the profile being processed belongs to “User1”, then CSIDL\_PERSONAL would expand to C:\\Users\\User1\\Documents (assuming that the user profiles are stored in the C:\\Users directory). + + **Note**   + LoadState ignores the <detects> section specified in a component. At this point, all specified components are considered to be detected and are selected for migration. + +   + + 3. For each selected component, LoadState evaluates the <rules> sections. For each <rules> section, if the current user profile is the system profile and the context of the <rules> section is “System” or “UserAndSystem”, the rule is processed further. Otherwise, this rule is ignored. Alternatively, if the current user profile is not the system profile and the context of the <rules> section is “User” or “UserAndSystem”, the rule is processed further. Otherwise, this rule is ignored. + + 4. LoadState creates a master list of migration units by processing the various subsections under the <rules> section. Each migration unit that is in an <include> subsection is migrated as long, as there is not a more specific rule for it in an <exclude> subsection in the same <rules> section. For more information about precedence, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + + 5. LoadState evaluates the destination computer-specific subsections; for example, the <destinationCleanup> and <locationModify> subsections. + + 6. If the destination computer is running Windows 7 or Windows 8 then the migunits that were collected by ScanState using downlevel manifest files are processed by LoadState using the corresponding Component Manifest for Windows 7. The downlevel manifest files are not used during LoadState. + + **Important**   + It is important to specify the .xml files with the LoadState command if you want LoadState to use them. Otherwise, any destination-specific rules, such as <locationModify>, in these .xml files are ignored, even if the same .xml files were provided when the ScanState command ran. + +   + +5. In the "Apply" phase, LoadState writes the migration units that were collected to the various locations on the destination computer. If there are conflicts and there is not a <merge> rule for the object, the default behavior for the registry is for the source to overwrite the destination. The default behavior for files is for the source to be renamed incrementally, for example, OriginalFileName(1).OriginalExtension. Some settings, such as fonts, wallpaper, and screen-saver settings, do not take effect until the next time the user logs on. For this reason, you should log off when the LoadState command actions have completed. + +## Related topics + + +[User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md) + +  + +  + + + + + diff --git a/windows/deploy/identify-applications-settings-usmt-win7-usmt-win8.md b/windows/deploy/identify-applications-settings-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..eabc9bea29 --- /dev/null +++ b/windows/deploy/identify-applications-settings-usmt-win7-usmt-win8.md @@ -0,0 +1,57 @@ +--- +title: Identify Applications Settings (Windows 10) +description: Identify Applications Settings +ms.assetid: eda68031-9b02-4a5b-a893-3786a6505381 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Identify Applications Settings + + +When planning for your migration, you should identify which applications and settings you want to migrate. For more information about how to create a custom .xml file to migrate the settings of another application, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md). + +## Applications + + +First, create and prioritize a list of applications that to be migrated. It may be helpful to review the application lists and decide which applications will be redeployed and which applications will be retired. Often, the applications are prioritized based on a combination of how widely the application is used and how complex the application is. + +Next, identify an application owner to be in charge of each application. This is necessary because the developers will not be experts on all of the applications in the organization. The application owner should have the most experience with an application. The application owner provides insight into how the organization installs, configures, and uses the application. + +## Application Settings + + +Next, determine and locate the application settings to be migrated. You can acquire much of the information that you need for this step when you are testing the new applications for compatibility with the new operating system. + +After completing the list of applications to be migrated, review the list and work with each application owner on a list of settings to be migrated. For each setting, determine whether it needs to be migrated or if the default settings are adequate. Then, determine where the setting is located; for example, in the registry or in an .ini file. Next, consider the following questions to determine what needs to be done to migrate the setting successfully: + +- Is the destination version of the application newer than the source version? + +- Do these settings work with the new version? + +- Do the settings need to be moved or altered? + +- Can the first-run process force the application to appear as if it had run already? If so, does this work correctly, or does it break the application? + +After answering these questions, create a custom .xml file to migrate settings. Work with the application owner to develop test cases and to determine the file types that need to be migrated for the application. + +## Locating Where Settings Are Stored + + +See [Migrate Application Settings](migrate-application-settings.md) and follow the directions. + +## Related topics + + +[Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/identify-file-types-files-and-folders-usmt-win8.md b/windows/deploy/identify-file-types-files-and-folders-usmt-win8.md new file mode 100644 index 0000000000..18b2876980 --- /dev/null +++ b/windows/deploy/identify-file-types-files-and-folders-usmt-win8.md @@ -0,0 +1,46 @@ +--- +title: Identify File Types, Files, and Folders (Windows 10) +description: Identify File Types, Files, and Folders +ms.assetid: 93bb2a33-c126-4f7a-a961-6c89686d54e0 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Identify File Types, Files, and Folders + + +When planning for your migration, if not using MigDocs.xml, you should identify the file types, files, folders, and settings that you want to migrate. First, you should determine the standard file locations on each computer, such as **My Documents.** , **C:\\Data** , and company-specified locations, such as **\\EngineeringDrafts**. Next, you should determine and locate the non-standard locations. For non-standard locations, consider the following: + +- **File types**. Consider which file types need to be included and excluded from the migration. You can create this list based on common applications used in your organization. Applications normally use specific file name extensions. For example, Microsoft Office Word primarily uses .doc, .docx and .dotx file name extension. However, it also uses other file types, such as templates (.dot files), on a less frequent basis. + +- **Excluded locations**. Consider the locations on the computer that should be excluded from the migration (for example, %WINDIR% and Program Files). + +- **New locations**. Decide where files should be migrated to on the destination computer for example, \\My Documents, a designated folder, or a folder matching the files' name and location on the source computer. For example, you might have shared data on source machine or you might wish to clean up documents outside the user profiles on the source system. Identify any data that needs to be redirected to a new location in the apply phase. This can be accomplished with location modify rules. + +Once you have verified which files and file types that the end users work with regularly, you will need to locate them. Files may be saved to a single folder or scattered across a drive. A good starting point for finding files types to include is to look at the registered file types on the computer. + +**To find the registered file types on a computer running Windows 7 or Windows 8** + +1. Click **Start**. Open **Control Panel**, click **Control Panel Home**, and click **Programs**. + +2. Click **Default Programs**, and click **Associate a file type or protocol with a program**. + +3. On this screen, the registered file types are displayed. + +For more information about how to change the file types, files, and folders that are migrated when you specify the MigUser.xml file, see [User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md). + +## Related topics + + +[Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/identify-operating-system-settings-usmt-win7-usmt-win8.md b/windows/deploy/identify-operating-system-settings-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..03ccb749c5 --- /dev/null +++ b/windows/deploy/identify-operating-system-settings-usmt-win7-usmt-win8.md @@ -0,0 +1,55 @@ +--- +title: Identify Operating System Settings (Windows 10) +description: Identify Operating System Settings +ms.assetid: 1704ab18-1765-41fb-a27c-3aa3128fa242 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Identify Operating System Settings + + +When planning for your migration, you should identify which operating system settings you want to migrate and to what extent you want to create a new standard environment on each of the computers. User State Migration Tool (USMT) 10.0 enables you to migrate select settings and keep the default values for all others. The operating system settings include the following: + +- **Apperance.** + + This includes items such as wallpaper, colors, sounds, and the location of the taskbar. + +- **Action.** + + This includes items such as the key-repeat rate, whether double-clicking a folder opens it in a new window or the same window, and whether you need to single-click or double-click an item to open it. + +- **Internet.** + + These are the settings that let you connect to the Internet and control how your browser operates. This includes items such as your home page URL, favorites, bookmarks, cookies, security settings, dial-up connections, and proxy settings. + +- **Mail.** + + This includes the information that you need to connect to your mail server, your signature file, views, mail rules, local mail, and contacts. + +To help you decide which settings to migrate, you should consider any previous migration experiences as well as the results of any surveys and tests that you have conducted. You should also consider the number of help-desk calls related to operating-system settings that you have had in the past, and are able to handle in the future. Also decide how much of the new operating-system functionality you want to take advantage of. + +You should migrate any settings that users need to get their jobs done, those that make the work environment comfortable, and those that will reduce help-desk calls after the migration. Although it is easy to dismiss migrating user preferences, you should consider that users can spend a significant amount of time restoring items such as wallpaper, screen savers, and other customizable user-interface features. Most users do not remember how these settings were applied. Although these items are not critical to migration success, migrating these items increases user productivity and overall satisfaction of the migration process. + +**Note**   +For more information about how to change the operating-system settings that are migrated, see [User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md). + +For information about the operating-system settings that USMT migrates, see [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) + +  + +## Related topics + + +[Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/identify-users-usmt-win7-usmt-win8.md b/windows/deploy/identify-users-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..bd0e798d4c --- /dev/null +++ b/windows/deploy/identify-users-usmt-win7-usmt-win8.md @@ -0,0 +1,85 @@ +--- +title: Identify Users (Windows 10) +description: Identify Users +ms.assetid: 957a4fe9-79fd-44a2-8c26-33e50f71f9de +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Identify Users + + +It is important to carefully consider how you plan to migrate users. By default, all users are migrated by User State Migration Tool (USMT) 5.0. You must specify which users to include by using the command line. You cannot specify users in the .xml files. For instructions on how to migrate users, see [Migrate User Accounts](migrate-user-accounts-usmt.md). + +## In This Topic + + +- [Migrating Local Accounts](#BKMK_8) + +- [Migrating Domain Accounts](#BKMK_9) + +- [Command-Line Options](#BKMK_7) + +## Migrating Local Accounts + + +Before migrating local accounts, note the following: + +- [You must explicitly specify that local accounts that are not on the destination computer should be migrated.](#BKMK_8) If you are migrating local accounts and the local account does not exist on the destination computer, you must use the**/lac** option when using the LoadState command. If the **/lac** option is not specified, no local user accounts will be migrated. + +- [Consider whether to enable user accounts that are new to the destination computer.](#BKMK_8) The **/lae** option enables the account that was created with the **/lac** option. However, if you create a disabled local account by using only the **/lac** option, a local administrator must enable the account on the destination computer. + +- [Be careful when specifying a password for local accounts.](#BKMK_8) If you create the local account with a blank password, anyone could log on to that account on the destination computer. If you create the local account with a password, the password is available to anyone with access to the USMT command-line tools. + + **Note**   + If there are multiple users on a computer, and you specify a password with the **/lac** option, all migrated users will have the same password. + +   + +## Migrating Domain Accounts + + +The source and destination computers do not need to be connected to the domain for domain user profiles to be migrated. + +## Command-Line Options + + +USMT provides several options to migrate multiple users on a single computer. The following command-line options specify which users to migrate. + +- [Specifying users.](#BKMK_8) You can specify which users to migrate with the **/all**, **/ui**, **/uel**, and **/ue** options with both the ScanState and LoadState command-line tools. + + **Important**   + The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. + +   + +- [Moving users to another domain.](#BKMK_8) You can move user accounts to another domain using the **/md** option with the LoadState command-line tool. + +- [Creating local accounts.](#BKMK_8) You can create and enable local accounts using the **/lac** and **/lae** options with the LoadState command-line tool. + +- [Renaming user accounts.](#BKMK_8) You can rename user accounts using the **/mu** option. + + **Note**   + By default, if a user name is not specified in any of the command-line options, the user will be migrated. + +   + +## Related topics + + +[Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md) + +[ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) + +[LoadState Syntax](loadstate-syntax-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/images/checkmark.png b/windows/deploy/images/checkmark.png new file mode 100644 index 0000000000..04cc421e12 Binary files /dev/null and b/windows/deploy/images/checkmark.png differ diff --git a/windows/deploy/images/crossmark.png b/windows/deploy/images/crossmark.png new file mode 100644 index 0000000000..2b267dc802 Binary files /dev/null and b/windows/deploy/images/crossmark.png differ diff --git a/windows/deploy/images/dep-win8-l-usmt-migrationcomparemigstores.gif b/windows/deploy/images/dep-win8-l-usmt-migrationcomparemigstores.gif new file mode 100644 index 0000000000..c23cf5f98c Binary files /dev/null and b/windows/deploy/images/dep-win8-l-usmt-migrationcomparemigstores.gif differ diff --git a/windows/deploy/images/dep-win8-l-usmt-pcrefresh.jpg b/windows/deploy/images/dep-win8-l-usmt-pcrefresh.jpg new file mode 100644 index 0000000000..79f874d895 Binary files /dev/null and b/windows/deploy/images/dep-win8-l-usmt-pcrefresh.jpg differ diff --git a/windows/deploy/images/dep-win8-l-usmt-pcreplace.jpg b/windows/deploy/images/dep-win8-l-usmt-pcreplace.jpg new file mode 100644 index 0000000000..507f783aff Binary files /dev/null and b/windows/deploy/images/dep-win8-l-usmt-pcreplace.jpg differ diff --git a/windows/deploy/images/dep-win8-l-vamt-findingcomputerdialog.gif b/windows/deploy/images/dep-win8-l-vamt-findingcomputerdialog.gif new file mode 100644 index 0000000000..3d745d4a77 Binary files /dev/null and b/windows/deploy/images/dep-win8-l-vamt-findingcomputerdialog.gif differ diff --git a/windows/deploy/images/dep-win8-l-vamt-firewallconfigurationformultiplesubnets.gif b/windows/deploy/images/dep-win8-l-vamt-firewallconfigurationformultiplesubnets.gif new file mode 100644 index 0000000000..21fc338e12 Binary files /dev/null and b/windows/deploy/images/dep-win8-l-vamt-firewallconfigurationformultiplesubnets.gif differ diff --git a/windows/deploy/images/dep-win8-l-vamt-image001-enterprise.jpg b/windows/deploy/images/dep-win8-l-vamt-image001-enterprise.jpg new file mode 100644 index 0000000000..b7a1411562 Binary files /dev/null and b/windows/deploy/images/dep-win8-l-vamt-image001-enterprise.jpg differ diff --git a/windows/deploy/images/dep-win8-l-vamt-makindependentactivationscenario.jpg b/windows/deploy/images/dep-win8-l-vamt-makindependentactivationscenario.jpg new file mode 100644 index 0000000000..52203b7593 Binary files /dev/null and b/windows/deploy/images/dep-win8-l-vamt-makindependentactivationscenario.jpg differ diff --git a/windows/deploy/images/dep-win8-l-vamt-makproxyactivationscenario.jpg b/windows/deploy/images/dep-win8-l-vamt-makproxyactivationscenario.jpg new file mode 100644 index 0000000000..3a02a1f17e Binary files /dev/null and b/windows/deploy/images/dep-win8-l-vamt-makproxyactivationscenario.jpg differ diff --git a/windows/deploy/images/fig10-contosoinstall.png b/windows/deploy/images/fig10-contosoinstall.png new file mode 100644 index 0000000000..ac4eaf2aa0 Binary files /dev/null and b/windows/deploy/images/fig10-contosoinstall.png differ diff --git a/windows/deploy/images/fig10-unattend.png b/windows/deploy/images/fig10-unattend.png new file mode 100644 index 0000000000..a9d2bc16df Binary files /dev/null and b/windows/deploy/images/fig10-unattend.png differ diff --git a/windows/deploy/images/fig13-captureimage.png b/windows/deploy/images/fig13-captureimage.png new file mode 100644 index 0000000000..678a43ca73 Binary files /dev/null and b/windows/deploy/images/fig13-captureimage.png differ diff --git a/windows/deploy/images/fig16-contentstatus.png b/windows/deploy/images/fig16-contentstatus.png new file mode 100644 index 0000000000..5ea8ba275a Binary files /dev/null and b/windows/deploy/images/fig16-contentstatus.png differ diff --git a/windows/deploy/images/fig17-win10image.png b/windows/deploy/images/fig17-win10image.png new file mode 100644 index 0000000000..d16eee554d Binary files /dev/null and b/windows/deploy/images/fig17-win10image.png differ diff --git a/windows/deploy/images/fig18-distwindows.png b/windows/deploy/images/fig18-distwindows.png new file mode 100644 index 0000000000..d8525ddd3e Binary files /dev/null and b/windows/deploy/images/fig18-distwindows.png differ diff --git a/windows/deploy/images/fig2-gather.png b/windows/deploy/images/fig2-gather.png new file mode 100644 index 0000000000..01ffca2770 Binary files /dev/null and b/windows/deploy/images/fig2-gather.png differ diff --git a/windows/deploy/images/fig2-importedos.png b/windows/deploy/images/fig2-importedos.png new file mode 100644 index 0000000000..ed72d2ef4d Binary files /dev/null and b/windows/deploy/images/fig2-importedos.png differ diff --git a/windows/deploy/images/fig2-taskseq.png b/windows/deploy/images/fig2-taskseq.png new file mode 100644 index 0000000000..1da70bd6e7 Binary files /dev/null and b/windows/deploy/images/fig2-taskseq.png differ diff --git a/windows/deploy/images/fig21-add-drivers.png b/windows/deploy/images/fig21-add-drivers.png new file mode 100644 index 0000000000..f53fe672e2 Binary files /dev/null and b/windows/deploy/images/fig21-add-drivers.png differ diff --git a/windows/deploy/images/fig22-createcategories.png b/windows/deploy/images/fig22-createcategories.png new file mode 100644 index 0000000000..8912ad974f Binary files /dev/null and b/windows/deploy/images/fig22-createcategories.png differ diff --git a/windows/deploy/images/fig27-driverpackage.png b/windows/deploy/images/fig27-driverpackage.png new file mode 100644 index 0000000000..c2f66669be Binary files /dev/null and b/windows/deploy/images/fig27-driverpackage.png differ diff --git a/windows/deploy/images/fig28-addapp.png b/windows/deploy/images/fig28-addapp.png new file mode 100644 index 0000000000..a7ba6b3709 Binary files /dev/null and b/windows/deploy/images/fig28-addapp.png differ diff --git a/windows/deploy/images/fig30-settingspack.png b/windows/deploy/images/fig30-settingspack.png new file mode 100644 index 0000000000..3479184140 Binary files /dev/null and b/windows/deploy/images/fig30-settingspack.png differ diff --git a/windows/deploy/images/fig32-deploywiz.png b/windows/deploy/images/fig32-deploywiz.png new file mode 100644 index 0000000000..a1387b19d8 Binary files /dev/null and b/windows/deploy/images/fig32-deploywiz.png differ diff --git a/windows/deploy/images/fig4-oob-drivers.png b/windows/deploy/images/fig4-oob-drivers.png new file mode 100644 index 0000000000..b1f6924665 Binary files /dev/null and b/windows/deploy/images/fig4-oob-drivers.png differ diff --git a/windows/deploy/images/fig5-selectprofile.png b/windows/deploy/images/fig5-selectprofile.png new file mode 100644 index 0000000000..452ab4f581 Binary files /dev/null and b/windows/deploy/images/fig5-selectprofile.png differ diff --git a/windows/deploy/images/fig6-taskseq.png b/windows/deploy/images/fig6-taskseq.png new file mode 100644 index 0000000000..8696cc04c4 Binary files /dev/null and b/windows/deploy/images/fig6-taskseq.png differ diff --git a/windows/deploy/images/fig8-cust-tasks.png b/windows/deploy/images/fig8-cust-tasks.png new file mode 100644 index 0000000000..378215ee2b Binary files /dev/null and b/windows/deploy/images/fig8-cust-tasks.png differ diff --git a/windows/deploy/images/fig8-suspend.png b/windows/deploy/images/fig8-suspend.png new file mode 100644 index 0000000000..8094f01274 Binary files /dev/null and b/windows/deploy/images/fig8-suspend.png differ diff --git a/windows/deploy/images/fig9-resumetaskseq.png b/windows/deploy/images/fig9-resumetaskseq.png new file mode 100644 index 0000000000..0a83019f69 Binary files /dev/null and b/windows/deploy/images/fig9-resumetaskseq.png differ diff --git a/windows/deploy/images/figure4-deployment-workbench.png b/windows/deploy/images/figure4-deployment-workbench.png new file mode 100644 index 0000000000..b5d0e7cc32 Binary files /dev/null and b/windows/deploy/images/figure4-deployment-workbench.png differ diff --git a/windows/deploy/images/mdt-01-fig01.png b/windows/deploy/images/mdt-01-fig01.png new file mode 100644 index 0000000000..d7f8c4e452 Binary files /dev/null and b/windows/deploy/images/mdt-01-fig01.png differ diff --git a/windows/deploy/images/mdt-01-fig02.jpg b/windows/deploy/images/mdt-01-fig02.jpg new file mode 100644 index 0000000000..1533bdd336 Binary files /dev/null and b/windows/deploy/images/mdt-01-fig02.jpg differ diff --git a/windows/deploy/images/mdt-03-fig01.png b/windows/deploy/images/mdt-03-fig01.png new file mode 100644 index 0000000000..fc68fb0c25 Binary files /dev/null and b/windows/deploy/images/mdt-03-fig01.png differ diff --git a/windows/deploy/images/mdt-03-fig02.png b/windows/deploy/images/mdt-03-fig02.png new file mode 100644 index 0000000000..d0fd979449 Binary files /dev/null and b/windows/deploy/images/mdt-03-fig02.png differ diff --git a/windows/deploy/images/mdt-03-fig03.png b/windows/deploy/images/mdt-03-fig03.png new file mode 100644 index 0000000000..ba1de39aa0 Binary files /dev/null and b/windows/deploy/images/mdt-03-fig03.png differ diff --git a/windows/deploy/images/mdt-03-fig04.png b/windows/deploy/images/mdt-03-fig04.png new file mode 100644 index 0000000000..26600a2036 Binary files /dev/null and b/windows/deploy/images/mdt-03-fig04.png differ diff --git a/windows/deploy/images/mdt-03-fig05.png b/windows/deploy/images/mdt-03-fig05.png new file mode 100644 index 0000000000..9c44837022 Binary files /dev/null and b/windows/deploy/images/mdt-03-fig05.png differ diff --git a/windows/deploy/images/mdt-04-fig01.png b/windows/deploy/images/mdt-04-fig01.png new file mode 100644 index 0000000000..8a90c1a934 Binary files /dev/null and b/windows/deploy/images/mdt-04-fig01.png differ diff --git a/windows/deploy/images/mdt-05-fig01.png b/windows/deploy/images/mdt-05-fig01.png new file mode 100644 index 0000000000..490f1579d9 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig01.png differ diff --git a/windows/deploy/images/mdt-05-fig02.png b/windows/deploy/images/mdt-05-fig02.png new file mode 100644 index 0000000000..1223432581 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig02.png differ diff --git a/windows/deploy/images/mdt-05-fig03.png b/windows/deploy/images/mdt-05-fig03.png new file mode 100644 index 0000000000..a0ffbec429 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig03.png differ diff --git a/windows/deploy/images/mdt-05-fig04.png b/windows/deploy/images/mdt-05-fig04.png new file mode 100644 index 0000000000..778cbae1b7 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig04.png differ diff --git a/windows/deploy/images/mdt-05-fig05.png b/windows/deploy/images/mdt-05-fig05.png new file mode 100644 index 0000000000..e172a29754 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig05.png differ diff --git a/windows/deploy/images/mdt-05-fig07.png b/windows/deploy/images/mdt-05-fig07.png new file mode 100644 index 0000000000..135a2367c1 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig07.png differ diff --git a/windows/deploy/images/mdt-05-fig08.png b/windows/deploy/images/mdt-05-fig08.png new file mode 100644 index 0000000000..1f4534e89b Binary files /dev/null and b/windows/deploy/images/mdt-05-fig08.png differ diff --git a/windows/deploy/images/mdt-05-fig09.png b/windows/deploy/images/mdt-05-fig09.png new file mode 100644 index 0000000000..a3d0155096 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig09.png differ diff --git a/windows/deploy/images/mdt-05-fig10.png b/windows/deploy/images/mdt-05-fig10.png new file mode 100644 index 0000000000..576da23ea6 Binary files /dev/null and b/windows/deploy/images/mdt-05-fig10.png differ diff --git a/windows/deploy/images/mdt-06-fig01.png b/windows/deploy/images/mdt-06-fig01.png new file mode 100644 index 0000000000..466cfda0f4 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig01.png differ diff --git a/windows/deploy/images/mdt-06-fig03.png b/windows/deploy/images/mdt-06-fig03.png new file mode 100644 index 0000000000..9d2786e46a Binary files /dev/null and b/windows/deploy/images/mdt-06-fig03.png differ diff --git a/windows/deploy/images/mdt-06-fig04.png b/windows/deploy/images/mdt-06-fig04.png new file mode 100644 index 0000000000..216e1f371b Binary files /dev/null and b/windows/deploy/images/mdt-06-fig04.png differ diff --git a/windows/deploy/images/mdt-06-fig05.png b/windows/deploy/images/mdt-06-fig05.png new file mode 100644 index 0000000000..3af74bb5ee Binary files /dev/null and b/windows/deploy/images/mdt-06-fig05.png differ diff --git a/windows/deploy/images/mdt-06-fig06.png b/windows/deploy/images/mdt-06-fig06.png new file mode 100644 index 0000000000..324c8960c1 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig06.png differ diff --git a/windows/deploy/images/mdt-06-fig07.png b/windows/deploy/images/mdt-06-fig07.png new file mode 100644 index 0000000000..399fac75f6 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig07.png differ diff --git a/windows/deploy/images/mdt-06-fig08.png b/windows/deploy/images/mdt-06-fig08.png new file mode 100644 index 0000000000..33cb90327a Binary files /dev/null and b/windows/deploy/images/mdt-06-fig08.png differ diff --git a/windows/deploy/images/mdt-06-fig10.png b/windows/deploy/images/mdt-06-fig10.png new file mode 100644 index 0000000000..1d92505b96 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig10.png differ diff --git a/windows/deploy/images/mdt-06-fig12.png b/windows/deploy/images/mdt-06-fig12.png new file mode 100644 index 0000000000..f33eca6174 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig12.png differ diff --git a/windows/deploy/images/mdt-06-fig13.png b/windows/deploy/images/mdt-06-fig13.png new file mode 100644 index 0000000000..ab578f69fe Binary files /dev/null and b/windows/deploy/images/mdt-06-fig13.png differ diff --git a/windows/deploy/images/mdt-06-fig14.png b/windows/deploy/images/mdt-06-fig14.png new file mode 100644 index 0000000000..13158231fd Binary files /dev/null and b/windows/deploy/images/mdt-06-fig14.png differ diff --git a/windows/deploy/images/mdt-06-fig15.png b/windows/deploy/images/mdt-06-fig15.png new file mode 100644 index 0000000000..2f1a0eba18 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig15.png differ diff --git a/windows/deploy/images/mdt-06-fig16.png b/windows/deploy/images/mdt-06-fig16.png new file mode 100644 index 0000000000..40cb46adbd Binary files /dev/null and b/windows/deploy/images/mdt-06-fig16.png differ diff --git a/windows/deploy/images/mdt-06-fig20.png b/windows/deploy/images/mdt-06-fig20.png new file mode 100644 index 0000000000..475fad7597 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig20.png differ diff --git a/windows/deploy/images/mdt-06-fig21.png b/windows/deploy/images/mdt-06-fig21.png new file mode 100644 index 0000000000..7cbd1d20bc Binary files /dev/null and b/windows/deploy/images/mdt-06-fig21.png differ diff --git a/windows/deploy/images/mdt-06-fig26.png b/windows/deploy/images/mdt-06-fig26.png new file mode 100644 index 0000000000..fc56839b14 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig26.png differ diff --git a/windows/deploy/images/mdt-06-fig31.png b/windows/deploy/images/mdt-06-fig31.png new file mode 100644 index 0000000000..5e98d623b1 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig31.png differ diff --git a/windows/deploy/images/mdt-06-fig33.png b/windows/deploy/images/mdt-06-fig33.png new file mode 100644 index 0000000000..18ae4c82dd Binary files /dev/null and b/windows/deploy/images/mdt-06-fig33.png differ diff --git a/windows/deploy/images/mdt-06-fig35.png b/windows/deploy/images/mdt-06-fig35.png new file mode 100644 index 0000000000..a68750925d Binary files /dev/null and b/windows/deploy/images/mdt-06-fig35.png differ diff --git a/windows/deploy/images/mdt-06-fig36.png b/windows/deploy/images/mdt-06-fig36.png new file mode 100644 index 0000000000..a8350244bd Binary files /dev/null and b/windows/deploy/images/mdt-06-fig36.png differ diff --git a/windows/deploy/images/mdt-06-fig37.png b/windows/deploy/images/mdt-06-fig37.png new file mode 100644 index 0000000000..5a89f2f431 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig37.png differ diff --git a/windows/deploy/images/mdt-06-fig39.png b/windows/deploy/images/mdt-06-fig39.png new file mode 100644 index 0000000000..650aec9a30 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig39.png differ diff --git a/windows/deploy/images/mdt-06-fig42.png b/windows/deploy/images/mdt-06-fig42.png new file mode 100644 index 0000000000..12b0e6817a Binary files /dev/null and b/windows/deploy/images/mdt-06-fig42.png differ diff --git a/windows/deploy/images/mdt-06-fig43.png b/windows/deploy/images/mdt-06-fig43.png new file mode 100644 index 0000000000..015edd21e3 Binary files /dev/null and b/windows/deploy/images/mdt-06-fig43.png differ diff --git a/windows/deploy/images/mdt-07-fig01.png b/windows/deploy/images/mdt-07-fig01.png new file mode 100644 index 0000000000..b2ccfec334 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig01.png differ diff --git a/windows/deploy/images/mdt-07-fig03.png b/windows/deploy/images/mdt-07-fig03.png new file mode 100644 index 0000000000..c178d6a15d Binary files /dev/null and b/windows/deploy/images/mdt-07-fig03.png differ diff --git a/windows/deploy/images/mdt-07-fig08.png b/windows/deploy/images/mdt-07-fig08.png new file mode 100644 index 0000000000..66e2969916 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig08.png differ diff --git a/windows/deploy/images/mdt-07-fig09.png b/windows/deploy/images/mdt-07-fig09.png new file mode 100644 index 0000000000..ce320427ee Binary files /dev/null and b/windows/deploy/images/mdt-07-fig09.png differ diff --git a/windows/deploy/images/mdt-07-fig10.png b/windows/deploy/images/mdt-07-fig10.png new file mode 100644 index 0000000000..7aff3c2d76 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig10.png differ diff --git a/windows/deploy/images/mdt-07-fig11.png b/windows/deploy/images/mdt-07-fig11.png new file mode 100644 index 0000000000..905f8bd572 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig11.png differ diff --git a/windows/deploy/images/mdt-07-fig13.png b/windows/deploy/images/mdt-07-fig13.png new file mode 100644 index 0000000000..849949a2f2 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig13.png differ diff --git a/windows/deploy/images/mdt-07-fig14.png b/windows/deploy/images/mdt-07-fig14.png new file mode 100644 index 0000000000..cfe7843eeb Binary files /dev/null and b/windows/deploy/images/mdt-07-fig14.png differ diff --git a/windows/deploy/images/mdt-07-fig15.png b/windows/deploy/images/mdt-07-fig15.png new file mode 100644 index 0000000000..5271690c89 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig15.png differ diff --git a/windows/deploy/images/mdt-07-fig16.png b/windows/deploy/images/mdt-07-fig16.png new file mode 100644 index 0000000000..80e0925a40 Binary files /dev/null and b/windows/deploy/images/mdt-07-fig16.png differ diff --git a/windows/deploy/images/mdt-08-fig01.png b/windows/deploy/images/mdt-08-fig01.png new file mode 100644 index 0000000000..7f795c42d4 Binary files /dev/null and b/windows/deploy/images/mdt-08-fig01.png differ diff --git a/windows/deploy/images/mdt-08-fig02.png b/windows/deploy/images/mdt-08-fig02.png new file mode 100644 index 0000000000..50c97d8d0c Binary files /dev/null and b/windows/deploy/images/mdt-08-fig02.png differ diff --git a/windows/deploy/images/mdt-08-fig03.png b/windows/deploy/images/mdt-08-fig03.png new file mode 100644 index 0000000000..e80b242192 Binary files /dev/null and b/windows/deploy/images/mdt-08-fig03.png differ diff --git a/windows/deploy/images/mdt-08-fig05.png b/windows/deploy/images/mdt-08-fig05.png new file mode 100644 index 0000000000..62ae133bb8 Binary files /dev/null and b/windows/deploy/images/mdt-08-fig05.png differ diff --git a/windows/deploy/images/mdt-08-fig06.png b/windows/deploy/images/mdt-08-fig06.png new file mode 100644 index 0000000000..97d83a20fb Binary files /dev/null and b/windows/deploy/images/mdt-08-fig06.png differ diff --git a/windows/deploy/images/mdt-08-fig14.png b/windows/deploy/images/mdt-08-fig14.png new file mode 100644 index 0000000000..21b358d1f8 Binary files /dev/null and b/windows/deploy/images/mdt-08-fig14.png differ diff --git a/windows/deploy/images/mdt-08-fig15.png b/windows/deploy/images/mdt-08-fig15.png new file mode 100644 index 0000000000..2a8bc4252e Binary files /dev/null and b/windows/deploy/images/mdt-08-fig15.png differ diff --git a/windows/deploy/images/mdt-09-fig01.png b/windows/deploy/images/mdt-09-fig01.png new file mode 100644 index 0000000000..0549174435 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig01.png differ diff --git a/windows/deploy/images/mdt-09-fig02.png b/windows/deploy/images/mdt-09-fig02.png new file mode 100644 index 0000000000..dd69922d80 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig02.png differ diff --git a/windows/deploy/images/mdt-09-fig03.png b/windows/deploy/images/mdt-09-fig03.png new file mode 100644 index 0000000000..56102b2031 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig03.png differ diff --git a/windows/deploy/images/mdt-09-fig04.png b/windows/deploy/images/mdt-09-fig04.png new file mode 100644 index 0000000000..f123d85af5 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig04.png differ diff --git a/windows/deploy/images/mdt-09-fig06.png b/windows/deploy/images/mdt-09-fig06.png new file mode 100644 index 0000000000..49042d95f3 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig06.png differ diff --git a/windows/deploy/images/mdt-09-fig07.png b/windows/deploy/images/mdt-09-fig07.png new file mode 100644 index 0000000000..431f212f80 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig07.png differ diff --git a/windows/deploy/images/mdt-09-fig08.png b/windows/deploy/images/mdt-09-fig08.png new file mode 100644 index 0000000000..c73ef398e4 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig08.png differ diff --git a/windows/deploy/images/mdt-09-fig09.png b/windows/deploy/images/mdt-09-fig09.png new file mode 100644 index 0000000000..14614aaa42 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig09.png differ diff --git a/windows/deploy/images/mdt-09-fig10.png b/windows/deploy/images/mdt-09-fig10.png new file mode 100644 index 0000000000..c8dbe11eac Binary files /dev/null and b/windows/deploy/images/mdt-09-fig10.png differ diff --git a/windows/deploy/images/mdt-09-fig11.png b/windows/deploy/images/mdt-09-fig11.png new file mode 100644 index 0000000000..dd38911dfc Binary files /dev/null and b/windows/deploy/images/mdt-09-fig11.png differ diff --git a/windows/deploy/images/mdt-09-fig12.png b/windows/deploy/images/mdt-09-fig12.png new file mode 100644 index 0000000000..ed363ae01a Binary files /dev/null and b/windows/deploy/images/mdt-09-fig12.png differ diff --git a/windows/deploy/images/mdt-09-fig13.png b/windows/deploy/images/mdt-09-fig13.png new file mode 100644 index 0000000000..5155b0ecf0 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig13.png differ diff --git a/windows/deploy/images/mdt-09-fig14.png b/windows/deploy/images/mdt-09-fig14.png new file mode 100644 index 0000000000..f294a8d69f Binary files /dev/null and b/windows/deploy/images/mdt-09-fig14.png differ diff --git a/windows/deploy/images/mdt-09-fig15.png b/windows/deploy/images/mdt-09-fig15.png new file mode 100644 index 0000000000..f8de66afbd Binary files /dev/null and b/windows/deploy/images/mdt-09-fig15.png differ diff --git a/windows/deploy/images/mdt-09-fig16.png b/windows/deploy/images/mdt-09-fig16.png new file mode 100644 index 0000000000..ad04b64077 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig16.png differ diff --git a/windows/deploy/images/mdt-09-fig17.png b/windows/deploy/images/mdt-09-fig17.png new file mode 100644 index 0000000000..fe4503b950 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig17.png differ diff --git a/windows/deploy/images/mdt-09-fig18.png b/windows/deploy/images/mdt-09-fig18.png new file mode 100644 index 0000000000..4f087172d9 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig18.png differ diff --git a/windows/deploy/images/mdt-09-fig19.png b/windows/deploy/images/mdt-09-fig19.png new file mode 100644 index 0000000000..917444c811 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig19.png differ diff --git a/windows/deploy/images/mdt-09-fig20.png b/windows/deploy/images/mdt-09-fig20.png new file mode 100644 index 0000000000..6c2d1c4dba Binary files /dev/null and b/windows/deploy/images/mdt-09-fig20.png differ diff --git a/windows/deploy/images/mdt-09-fig21.png b/windows/deploy/images/mdt-09-fig21.png new file mode 100644 index 0000000000..628ea98ad9 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig21.png differ diff --git a/windows/deploy/images/mdt-09-fig22.png b/windows/deploy/images/mdt-09-fig22.png new file mode 100644 index 0000000000..9d71f62796 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig22.png differ diff --git a/windows/deploy/images/mdt-09-fig23.png b/windows/deploy/images/mdt-09-fig23.png new file mode 100644 index 0000000000..4cd29dc389 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig23.png differ diff --git a/windows/deploy/images/mdt-09-fig24.png b/windows/deploy/images/mdt-09-fig24.png new file mode 100644 index 0000000000..89cb67a048 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig24.png differ diff --git a/windows/deploy/images/mdt-09-fig25.png b/windows/deploy/images/mdt-09-fig25.png new file mode 100644 index 0000000000..fb308c0be5 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig25.png differ diff --git a/windows/deploy/images/mdt-09-fig26.png b/windows/deploy/images/mdt-09-fig26.png new file mode 100644 index 0000000000..681c6516cd Binary files /dev/null and b/windows/deploy/images/mdt-09-fig26.png differ diff --git a/windows/deploy/images/mdt-09-fig27.png b/windows/deploy/images/mdt-09-fig27.png new file mode 100644 index 0000000000..396290346d Binary files /dev/null and b/windows/deploy/images/mdt-09-fig27.png differ diff --git a/windows/deploy/images/mdt-09-fig28.png b/windows/deploy/images/mdt-09-fig28.png new file mode 100644 index 0000000000..d36dda43fa Binary files /dev/null and b/windows/deploy/images/mdt-09-fig28.png differ diff --git a/windows/deploy/images/mdt-09-fig29.png b/windows/deploy/images/mdt-09-fig29.png new file mode 100644 index 0000000000..404842d49c Binary files /dev/null and b/windows/deploy/images/mdt-09-fig29.png differ diff --git a/windows/deploy/images/mdt-09-fig30.png b/windows/deploy/images/mdt-09-fig30.png new file mode 100644 index 0000000000..be962f40ec Binary files /dev/null and b/windows/deploy/images/mdt-09-fig30.png differ diff --git a/windows/deploy/images/mdt-09-fig31.png b/windows/deploy/images/mdt-09-fig31.png new file mode 100644 index 0000000000..a40aa9d3bb Binary files /dev/null and b/windows/deploy/images/mdt-09-fig31.png differ diff --git a/windows/deploy/images/mdt-09-fig32.png b/windows/deploy/images/mdt-09-fig32.png new file mode 100644 index 0000000000..446812a3e8 Binary files /dev/null and b/windows/deploy/images/mdt-09-fig32.png differ diff --git a/windows/deploy/images/mdt-10-fig01.png b/windows/deploy/images/mdt-10-fig01.png new file mode 100644 index 0000000000..8a3ebd9711 Binary files /dev/null and b/windows/deploy/images/mdt-10-fig01.png differ diff --git a/windows/deploy/images/mdt-10-fig02.png b/windows/deploy/images/mdt-10-fig02.png new file mode 100644 index 0000000000..d9e5930152 Binary files /dev/null and b/windows/deploy/images/mdt-10-fig02.png differ diff --git a/windows/deploy/images/mdt-10-fig03.png b/windows/deploy/images/mdt-10-fig03.png new file mode 100644 index 0000000000..f652db736c Binary files /dev/null and b/windows/deploy/images/mdt-10-fig03.png differ diff --git a/windows/deploy/images/mdt-10-fig04.png b/windows/deploy/images/mdt-10-fig04.png new file mode 100644 index 0000000000..f98c0501df Binary files /dev/null and b/windows/deploy/images/mdt-10-fig04.png differ diff --git a/windows/deploy/images/mdt-10-fig05.png b/windows/deploy/images/mdt-10-fig05.png new file mode 100644 index 0000000000..64c0c4a6ee Binary files /dev/null and b/windows/deploy/images/mdt-10-fig05.png differ diff --git a/windows/deploy/images/mdt-10-fig06.png b/windows/deploy/images/mdt-10-fig06.png new file mode 100644 index 0000000000..91dc7c5c33 Binary files /dev/null and b/windows/deploy/images/mdt-10-fig06.png differ diff --git a/windows/deploy/images/mdt-10-fig07.png b/windows/deploy/images/mdt-10-fig07.png new file mode 100644 index 0000000000..8613d905a4 Binary files /dev/null and b/windows/deploy/images/mdt-10-fig07.png differ diff --git a/windows/deploy/images/mdt-10-fig08.png b/windows/deploy/images/mdt-10-fig08.png new file mode 100644 index 0000000000..ee00637019 Binary files /dev/null and b/windows/deploy/images/mdt-10-fig08.png differ diff --git a/windows/deploy/images/mdt-10-fig09.png b/windows/deploy/images/mdt-10-fig09.png new file mode 100644 index 0000000000..ccdd05f34e Binary files /dev/null and b/windows/deploy/images/mdt-10-fig09.png differ diff --git a/windows/deploy/images/mdt-11-fig05.png b/windows/deploy/images/mdt-11-fig05.png new file mode 100644 index 0000000000..b03c414fb8 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig05.png differ diff --git a/windows/deploy/images/mdt-11-fig06.png b/windows/deploy/images/mdt-11-fig06.png new file mode 100644 index 0000000000..b5944d909e Binary files /dev/null and b/windows/deploy/images/mdt-11-fig06.png differ diff --git a/windows/deploy/images/mdt-11-fig07.png b/windows/deploy/images/mdt-11-fig07.png new file mode 100644 index 0000000000..b80f0908ab Binary files /dev/null and b/windows/deploy/images/mdt-11-fig07.png differ diff --git a/windows/deploy/images/mdt-11-fig08.png b/windows/deploy/images/mdt-11-fig08.png new file mode 100644 index 0000000000..9c258bdd3e Binary files /dev/null and b/windows/deploy/images/mdt-11-fig08.png differ diff --git a/windows/deploy/images/mdt-11-fig09.png b/windows/deploy/images/mdt-11-fig09.png new file mode 100644 index 0000000000..49b3d0b88f Binary files /dev/null and b/windows/deploy/images/mdt-11-fig09.png differ diff --git a/windows/deploy/images/mdt-11-fig10.png b/windows/deploy/images/mdt-11-fig10.png new file mode 100644 index 0000000000..e5c71225f7 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig10.png differ diff --git a/windows/deploy/images/mdt-11-fig11.png b/windows/deploy/images/mdt-11-fig11.png new file mode 100644 index 0000000000..e3e2c70516 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig11.png differ diff --git a/windows/deploy/images/mdt-11-fig12.png b/windows/deploy/images/mdt-11-fig12.png new file mode 100644 index 0000000000..1e1a7888d6 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig12.png differ diff --git a/windows/deploy/images/mdt-11-fig13.png b/windows/deploy/images/mdt-11-fig13.png new file mode 100644 index 0000000000..36554c72a6 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig13.png differ diff --git a/windows/deploy/images/mdt-11-fig14.png b/windows/deploy/images/mdt-11-fig14.png new file mode 100644 index 0000000000..075d331bc1 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig14.png differ diff --git a/windows/deploy/images/mdt-11-fig15.png b/windows/deploy/images/mdt-11-fig15.png new file mode 100644 index 0000000000..302847c2a6 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig15.png differ diff --git a/windows/deploy/images/mdt-11-fig16.png b/windows/deploy/images/mdt-11-fig16.png new file mode 100644 index 0000000000..608c161797 Binary files /dev/null and b/windows/deploy/images/mdt-11-fig16.png differ diff --git a/windows/deploy/images/upgradecfg-fig2-upgrading.png b/windows/deploy/images/upgradecfg-fig2-upgrading.png new file mode 100644 index 0000000000..c53de79c29 Binary files /dev/null and b/windows/deploy/images/upgradecfg-fig2-upgrading.png differ diff --git a/windows/deploy/images/upgradecfg-fig3-upgrade.png b/windows/deploy/images/upgradecfg-fig3-upgrade.png new file mode 100644 index 0000000000..d0c1ceaaf9 Binary files /dev/null and b/windows/deploy/images/upgradecfg-fig3-upgrade.png differ diff --git a/windows/deploy/images/upgrademdt-fig1-machines.png b/windows/deploy/images/upgrademdt-fig1-machines.png new file mode 100644 index 0000000000..38129332e6 Binary files /dev/null and b/windows/deploy/images/upgrademdt-fig1-machines.png differ diff --git a/windows/deploy/images/upgrademdt-fig2-importedos.png b/windows/deploy/images/upgrademdt-fig2-importedos.png new file mode 100644 index 0000000000..93b92efd93 Binary files /dev/null and b/windows/deploy/images/upgrademdt-fig2-importedos.png differ diff --git a/windows/deploy/images/upgrademdt-fig3-tasksequence.png b/windows/deploy/images/upgrademdt-fig3-tasksequence.png new file mode 100644 index 0000000000..1ad66c2098 Binary files /dev/null and b/windows/deploy/images/upgrademdt-fig3-tasksequence.png differ diff --git a/windows/deploy/images/upgrademdt-fig4-selecttask.png b/windows/deploy/images/upgrademdt-fig4-selecttask.png new file mode 100644 index 0000000000..dcbc73871a Binary files /dev/null and b/windows/deploy/images/upgrademdt-fig4-selecttask.png differ diff --git a/windows/deploy/images/upgrademdt-fig5-winupgrade.png b/windows/deploy/images/upgrademdt-fig5-winupgrade.png new file mode 100644 index 0000000000..f3bc05508a Binary files /dev/null and b/windows/deploy/images/upgrademdt-fig5-winupgrade.png differ diff --git a/windows/deploy/images/vamtuserinterfaceupdated.jpg b/windows/deploy/images/vamtuserinterfaceupdated.jpg new file mode 100644 index 0000000000..32ce362c60 Binary files /dev/null and b/windows/deploy/images/vamtuserinterfaceupdated.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-01.jpg b/windows/deploy/images/volumeactivationforwindows81-01.jpg new file mode 100644 index 0000000000..f6042a82a9 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-01.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-02.jpg b/windows/deploy/images/volumeactivationforwindows81-02.jpg new file mode 100644 index 0000000000..630d9a03e2 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-02.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-03.jpg b/windows/deploy/images/volumeactivationforwindows81-03.jpg new file mode 100644 index 0000000000..27962b207c Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-03.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-04.jpg b/windows/deploy/images/volumeactivationforwindows81-04.jpg new file mode 100644 index 0000000000..d5b572f1aa Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-04.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-05.jpg b/windows/deploy/images/volumeactivationforwindows81-05.jpg new file mode 100644 index 0000000000..a4bd9776ac Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-05.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-06.jpg b/windows/deploy/images/volumeactivationforwindows81-06.jpg new file mode 100644 index 0000000000..c29a628b05 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-06.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-07.jpg b/windows/deploy/images/volumeactivationforwindows81-07.jpg new file mode 100644 index 0000000000..346cbaa5c1 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-07.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-08.jpg b/windows/deploy/images/volumeactivationforwindows81-08.jpg new file mode 100644 index 0000000000..eff421d6bb Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-08.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-09.jpg b/windows/deploy/images/volumeactivationforwindows81-09.jpg new file mode 100644 index 0000000000..1e3cf9c0d8 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-09.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-10.jpg b/windows/deploy/images/volumeactivationforwindows81-10.jpg new file mode 100644 index 0000000000..d3cd196c34 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-10.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-11.jpg b/windows/deploy/images/volumeactivationforwindows81-11.jpg new file mode 100644 index 0000000000..72e4b613da Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-11.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-12.jpg b/windows/deploy/images/volumeactivationforwindows81-12.jpg new file mode 100644 index 0000000000..9e44ec24f0 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-12.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-13.jpg b/windows/deploy/images/volumeactivationforwindows81-13.jpg new file mode 100644 index 0000000000..e599fcd528 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-13.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-14.jpg b/windows/deploy/images/volumeactivationforwindows81-14.jpg new file mode 100644 index 0000000000..3b3cbc18cb Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-14.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-15.jpg b/windows/deploy/images/volumeactivationforwindows81-15.jpg new file mode 100644 index 0000000000..792b24b282 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-15.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-16.jpg b/windows/deploy/images/volumeactivationforwindows81-16.jpg new file mode 100644 index 0000000000..facdf1d084 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-16.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-17.jpg b/windows/deploy/images/volumeactivationforwindows81-17.jpg new file mode 100644 index 0000000000..0f4c683b7e Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-17.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-18.jpg b/windows/deploy/images/volumeactivationforwindows81-18.jpg new file mode 100644 index 0000000000..8728697ed8 Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-18.jpg differ diff --git a/windows/deploy/images/volumeactivationforwindows81-19.jpg b/windows/deploy/images/volumeactivationforwindows81-19.jpg new file mode 100644 index 0000000000..db97a0ba0e Binary files /dev/null and b/windows/deploy/images/volumeactivationforwindows81-19.jpg differ diff --git a/windows/deploy/images/win-10-adk-select.png b/windows/deploy/images/win-10-adk-select.png new file mode 100644 index 0000000000..1dfaa23175 Binary files /dev/null and b/windows/deploy/images/win-10-adk-select.png differ diff --git a/windows/deploy/images/windows-icd.png b/windows/deploy/images/windows-icd.png new file mode 100644 index 0000000000..4bc8a18f4c Binary files /dev/null and b/windows/deploy/images/windows-icd.png differ diff --git a/windows/deploy/import-and-export-vamt-data-vamt-30-win8.md b/windows/deploy/import-and-export-vamt-data-vamt-30-win8.md new file mode 100644 index 0000000000..29a1152f66 --- /dev/null +++ b/windows/deploy/import-and-export-vamt-data-vamt-30-win8.md @@ -0,0 +1,75 @@ +--- +title: Import and Export VAMT Data (Windows 10) +description: Import and Export VAMT Data +ms.assetid: 09a2c595-1a61-4da6-bd46-4ba8763cfd4f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Import and Export VAMT Data + + +You can use the Volume Activation Management Tool (VAMT) to import product-activation data from a Computer Information List (.cilx or .cil) file into SQL Server, and to export product-activation data into a .cilx file. A .cilx file is an XML file that stores computer and product-activation data. You can import data or export data during the following scenarios: + +- Import and merge data from previous versions of VAMT. + +- Export data to use to perform proxy activations. + +**Warning**   +Editing a .cilx file using an application other than VAMT can corrupt the .cilx file and is not supported. + +  + +## Import VAMT Data + + +To import data into VAMT: + +1. Open VAMT. + +2. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box. + +3. In the **Import List** dialog box, navigate to the .cilx file location, select the file, and click **Open**. + +4. In the **Volume Activation Management Tool** dialog box, click **OK** to begin the import. VAMT displays a progress message while the file is being imported. Click **OK** when a message appears and confirms that the import has completed successfully. + +## Export VAMT Data + + +Exporting VAMT data from a non-Internet-connected VAMT host computer is the first step of proxy activation using multiple VAMT hosts. To export product-activation data to a .cilx file: + +1. In the left-side pane, you can click a product you want to export data for, or click **Products** if the list contains data for all products. + +2. If you want to export only part of the data in a product list, in the product list view in the center pane select the products you want to export. + +3. In the right-side **Actions** pane on, click **Export list** to open the **Export List** dialog box. + +4. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file. + +5. Under **Export options**, select one of the following data-type options: + + - Export products and product keys + + - Export products only + + - Export proxy activation data only. Selecting this option ensures that the export contains only the licensing information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is checked. + +6. If you have selected products to export, select the **Export selected product rows only** check box. + +7. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully. + +## Related topics + + +[Perform Proxy Activation](perform-proxy-activation-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/include-files-and-settings-usmt.md b/windows/deploy/include-files-and-settings-usmt.md new file mode 100644 index 0000000000..d962c8b220 --- /dev/null +++ b/windows/deploy/include-files-and-settings-usmt.md @@ -0,0 +1,221 @@ +--- +title: Include Files and Settings (Windows 10) +description: Include Files and Settings +ms.assetid: 9009c6a5-0612-4478-8742-abe5eb6cbac8 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Include Files and Settings + + +When you specify the migration .xml files, User State Migration Tool (USMT) 10.0 migrates the settings and components specified in [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) To include additional files and settings, we recommend that you create a custom .xml file and then include this file when using both the ScanState and LoadState commands. By creating a custom .xml file, you can keep your changes separate from the default .xml files, which makes it easier to track your modifications. + +In this topic: + +[Migrate a Single Registry Key](#BKMK_MigSingleRegKey) + +[Migrate a Specific Folder](#BKMK_MigSpecificFolder) + +[Migrate a Folder from a Specific Drive](#BKMK_MigFoldSpecDrive) + +[Migrate a Folder from Any Location](#BKMK_MigFolderAnyLoc) + +[Migrate a File Type Into a Specific Folder](#BKMK_MigFileTypeToSpecificFolder) + +[Migrate a Specific File](#BKMK_MigSpecificFile) + +## Migrate a Single Registry Key + + +The following .xml file migrates a single registry key. + +``` syntax + + + Component to migrate only registry value string + + + + + HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Cache [Persistent] + + + + + + +``` + +## Migrate a Specific Folder + + +The following examples show how to migrate a folder from a specific drive, and from any location on the computer. + +### Migrate a Folder from a Specific Drive + +- **Including subfolders.** The following .xml file migrates all files and subfolders from C:\\EngineeringDrafts to the destination computer. + + ``` syntax + + + Component to migrate all Engineering Drafts Documents including subfolders + +    +       + + C:\EngineeringDrafts\* [*] + + +     +    + + + ``` + +- **Excluding subfolders.** The following .xml file migrates all files from C:\\EngineeringDrafts, but it does not migrate any subfolders within C:\\EngineeringDrafts. + + ``` syntax + + + Component to migrate all Engineering Drafts Documents without subfolders + +    +       + + C:\EngineeringDrafts\ [*] + + +     +    + + + ``` + +### Migrate a Folder from Any Location + +The following .xml file migrates all files and subfolders of the EngineeringDrafts folder from any drive on the computer. If multiple folders exist with the same name, then all files with this name are migrated. + +``` syntax + + + Component to migrate all Engineering Drafts Documents folder on any drive on the computer + + + + + + + + + + + + +``` + +The following .xml file migrates all files and subfolders of the EngineeringDrafts folder from any location on the C:\\ drive. If multiple folders exist with the same name, they are all migrated. + +``` syntax + + + Component to migrate all Engineering Drafts Documents EngineeringDrafts folder from where ever it exists on the C: drive + + + + + C:\*\EngineeringDrafts\* [*] + C:\EngineeringDrafts\* [*] + + + + + + +``` + +## Migrate a File Type Into a Specific Folder + + +The following .xml file migrates .mp3 files located in the specified drives on the source computer into the C:\\Music folder on the destination computer. + +``` syntax + + + All .mp3 files to My Documents + + + + + + + + + + + + + + + + + +``` + +## Migrate a Specific File + + +The following examples show how to migrate a file from a specific folder, and how to migrate a file from any location. + +- **To migrate a file from a folder.** The following .xml file migrates only the Sample.doc file from C:\\EngineeringDrafts on the source computer to the destination computer. + + ``` syntax + + + Component to migrate all Engineering Drafts Documents + +    +       + + C:\EngineeringDrafts\ [Sample.doc] + + +     +    + + + ``` + +- **To migrate a file from any location.** To migrate the Sample.doc file from any location on the C:\\ drive, use the <pattern> element, as the following example shows. If multiple files exist with the same name on the C:\\ drive, all of files with this name are migrated. + + ``` syntax + C:\* [Sample.doc] + ``` + + To migrate the Sample.doc file from any drive on the computer, use <script> as the following example shows. If multiple files exist with the same name, all files with this name are migrated. + + ``` syntax + + ``` + +## Related topics + + +[Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) + +[Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md) + +[Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/install-a-kms-client-key-vamt-30-win8.md b/windows/deploy/install-a-kms-client-key-vamt-30-win8.md new file mode 100644 index 0000000000..cc2d11a292 --- /dev/null +++ b/windows/deploy/install-a-kms-client-key-vamt-30-win8.md @@ -0,0 +1,57 @@ +--- +title: Install a KMS Client Key (Windows 10) +description: Install a KMS Client Key +ms.assetid: d234468e-7917-4cf5-b0a8-4968454f7759 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Install a KMS Client Key + + +You can use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys. For example, if you are converting a MAK-activated product to KMS activation. + +**Note**   +By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products. + +  + +1. Open VAMT. + +2. In the left-side pane click **Products** to open the product list view in the center pane. + +3. In the products list view in the center pane, select the products that need to have GVLKs installed. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. VAMT displays the filtered list in the center pane. + +6. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box. + +7. The **Install Product Key** dialog box displays the keys that are available to be installed. + +8. Select the **Automatically select an AD or KMS client key** option and then click **Install Key**. + +VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + +The same status is shown under the **Status of Last Action** column in the product list view in the center pane. + +## Related topics + + +[Perform KMS Activation](perform-kms-activation-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/install-a-product-key-vamt-30-win8.md b/windows/deploy/install-a-product-key-vamt-30-win8.md new file mode 100644 index 0000000000..7e97fb0215 --- /dev/null +++ b/windows/deploy/install-a-product-key-vamt-30-win8.md @@ -0,0 +1,57 @@ +--- +title: Install a Product Key (Windows 10) +description: Install a Product Key +ms.assetid: 78812c87-2208-4f8b-9c2c-5a8a18b2d648 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Install a Product Key + + +You can use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK). + +1. Open VAMT. + +2. In the left-side pane, click the product that you want to install keys onto. + +3. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. + +6. In the products list view in the center pane, sort the list if needed and then select the products that need to have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product. + +7. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box. + +8. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAK based on the selected products. You can select a recommended product key or a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key you want to install, click **Install Key**. Note that only one key can be installed at a time. + +9. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + + The same status is shown under the **Status of Last Action** column in the product list view in the center pane. + +**Note**   +Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct MAK or KMS Host key (CSVLK), see [How to Choose the Right Volume License Key for Windows](http://go.microsoft.com/fwlink/p/?linkid=238382). + +  + +## Related topics + + +[Manage Product Keys](manage-product-keys-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/install-and-configure-vamt-vamt-30-win8.md b/windows/deploy/install-and-configure-vamt-vamt-30-win8.md new file mode 100644 index 0000000000..bc8673ff41 --- /dev/null +++ b/windows/deploy/install-and-configure-vamt-vamt-30-win8.md @@ -0,0 +1,54 @@ +--- +title: Install and Configure VAMT (Windows 10) +description: Install and Configure VAMT +ms.assetid: 5c7ae9b9-0dbc-4277-bc4f-8b3e4ab0bf50 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Install and Configure VAMT + + +This section describes how to install and configure the Volume Activation Management Tool (VAMT). + +## In this Section + + + ++++ + + + + + + + + + + + + + + +

[VAMT Requirements](vamt-requirements-vamt-30-win8.md)

Provides system requirements for installing VAMT on a host computer.

[Install VAMT](install-vamt-vamt-30-win8.md)

Describes how to get and install VAMT.

[Configure Client Computers](configure-client-computers-vamt-30-win8.md)

Describes how to configure client computers on your network to work with VAMT.

+ +  + +## Related topics + + +[Introduction to VAMT](introduction-to-vamtvamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/install-vamt-vamt-30-win8.md b/windows/deploy/install-vamt-vamt-30-win8.md new file mode 100644 index 0000000000..4ac4452734 --- /dev/null +++ b/windows/deploy/install-vamt-vamt-30-win8.md @@ -0,0 +1,74 @@ +--- +title: Install VAMT (Windows 10) +description: Install VAMT +ms.assetid: 2eabd3e2-0a68-43a5-8189-2947e46482fc +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Install VAMT + + +This topic describes how to install the Volume Activation Management Tool (VAMT). + +## Install VAMT + + +You can install VAMT as part of the [Windows Assessment and Deployment Kit (ADK)](http://go.microsoft.com/fwlink/p/?LinkId=526740) for Windows 10. + +**Important**   +VAMT requires local administrator privileges on all managed computers in order to deposit confirmation IDs (CIDs), get the client products’ license status, and install product keys. If VAMT is being used to manage products and product keys on the local host computer and you do not have administrator privileges, start VAMT with elevated privileges. For Active Directory-Based Activation use, for best results we recommend running VAMT while logged on as a domain administrator. + +  + +**Note**   +The VAMT Microsoft Management Console snap-in ships as an x86 package. + +  + +**Note**   +After you install VAMT, if you have a computer information list (CIL) that was created in a previous version of VAMT, you must import the list into a SQL database. If you do not have SQL installed, you can download a free copy of Microsoft SQL Server Express and create a new database into which you can import the CIL. To install SQL Server Express: + +1. Install the Windows ADK. + +2. Ensure that **Volume Activation Management Tool** and **Microsoft® SQL Server® 2012 Express** are selected to be installed. + +3. Click **Install**. + +  + +## Select a Database + + +**Using a SQL database installed during ADK setup** + +If SQL Server 2012 Express was installed during ADK setup, the default database name will be **ADK**.By default, VAMT is configure to use a SQL database that is installed on the local machine during ADK setup and displays the server name as **.\\ADK**. If the SQL database was installed on another machine, you must configure the database to allow remote connections and you must provide the corresponding server name. If a new VAMT database needs to be created, provide a name for the new database. + +**Using a SQL database installed outside of ADK setup** + +You must configure SQL installation to allow remote connections and you must provide the corresponding server name in the format: *Machine Name\\SQL Server Name*. If a new VAMT database needs to be created, provide a name for the new database. + +## Uninstall VAMT + + +To uninstall VAMT via the **Programs and Features** Control Panel: + +1. Open the **Control Panel** and select **Programs and Features**. + +2. Select **Assessment and Deployment Kit** from the list of installed programs and click **Change**. Follow the instructions in the Windows ADK installer to remove VAMT. + +## Related topics + + +[Install and Configure VAMT](install-and-configure-vamt-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/integrate-configuration-manager-with-mdt-2013.md b/windows/deploy/integrate-configuration-manager-with-mdt-2013.md new file mode 100644 index 0000000000..70bd7a7c89 --- /dev/null +++ b/windows/deploy/integrate-configuration-manager-with-mdt-2013.md @@ -0,0 +1,142 @@ +--- +title: Integrate Configuration Manager with MDT 2013 Update 1 (Windows 10) +description: This topic will help you understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy a new or updated version of the Windows operating system. +ms.assetid: 3bd1cf92-81e5-48dc-b874-0f5d9472e5a5 +keywords: ["deploy, image, customize, task sequence"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Integrate Configuration Manager with MDT 2013 Update 1 + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Why integrate MDT 2013 Update 1 with Configuration Manager](#sec01) +- [Why use MDT Lite Touch to create reference images](#sec02) +- [Related topics](#related_topics) + +This topic will help you understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy a new or updated version of the Windows operating system. + +MDT 2013 is a free, supported download from Microsoft that adds approximately 280 enhancements to Windows operating system deployment with System Center 2012 R2 Configuration Manager SP1. It is, therefore, recommended that you utilize MDT when deploying the Windows operating system with Configuration Manager SP1. In addition to integrating MDT with Configuration Manager, we also recommend using MDT Lite Touch to create the Windows 10 reference images used in Configuration Manager. For more information on how to create a reference image, see [Create a Windows 10 reference image](create-a-windows-81-reference-image.md). + +## Why integrate MDT 2013 Update 1 with Configuration Manager + + +As noted above, MDT adds many enhancements to Configuration Manager. While these enhancements are called Zero Touch, that name does not reflect how deployment is conducted. The following sections provide a few samples of the 280 enhancements that MDT 2013 Update 1 adds to Configuration Manager. + +### MDT enables dynamic deployment + +When MDT is integrated with Configuration Manager, the task sequence takes additional instructions from the MDT rules. In its most simple form, these settings are stored in a text file, the CustomSettings.ini file, but you can store the settings in Microsoft SQL Server databases, or have Microsoft Visual Basic Scripting Edition (VBScripts) or web services provide the settings used. + +The task sequence uses instructions that allow you to reduce the number of task sequences in Configuration Manager and instead store settings outside the task sequence. Here are a few examples: + +- The following settings instruct the task sequence to install the HP Hotkeys package, but only if the hardware is a HP EliteBook 8570w. Note that you don't have to add the package to the task sequence. + + ``` syntax + [Settings] + Priority=Model + [HP EliteBook 8570w] + Packages001=PS100010:Install HP Hotkeys + ``` + +- The following settings instruct the task sequence to put laptops and desktops in different organizational units (OUs) during deployment, assign different computer names, and finally have the task sequence install the Cisco VPN client, but only if the machine is a laptop. + + ``` syntax + [Settings] + Priority= ByLaptopType, ByDesktopType + [ByLaptopType] + Subsection=Laptop-%IsLaptop% + [ByDesktopType] + Subsection=Desktop-%IsDesktop% + [Laptop-True] + Packages001=PS100012:Install Cisco VPN Client + OSDComputerName=LT-%SerialNumber% + MachineObjectOU=ou=laptops,ou=Contoso,dc=contoso,dc=com + [Desktop-True] + OSDComputerName=DT-%SerialNumber% + MachineObjectOU=ou=desktops,ou=Contoso,dc=contoso,dc=com + ``` + +![figure 2](images/fig2-gather.png) + +Figure 2. The Gather action in the task sequence is reading the rules. + +### MDT adds an operating system deployment simulation environment + +When testing a deployment, it is important to be able to quickly test any changes you make to the deployment without needing to run through an entire deployment. MDT rules can be tested very quickly, saving significant testing time in a deployment project. For more information, see [Configure MDT settings](configure-mdt-2013-settings.md). + +![figure 3](images/mdt-06-fig03.png) + +Figure 3. The folder that contains the rules, a few scripts from MDT, and a custom script (Gather.ps1). + +### MDT adds real-time monitoring + +With MDT integration, you can follow your deployments in real time, and if you have access to Microsoft Diagnostics and Recovery Toolkit (DaRT), you can even remote into Windows Preinstallation Environment (Windows PE) during deployment. The real-time monitoring data can be viewed from within the MDT Deployment Workbench, via a web browser, Windows PowerShell, the Event Viewer, or Microsoft Excel 2013. In fact, any script or app that can read an Open Data (OData) feed can read the information. + +![figure 4](images/mdt-06-fig04.png) + +Figure 4. View the real-time monitoring data with PowerShell. + +### MDT adds an optional deployment wizard + +For some deployment scenarios, you may need to prompt the user for information during deployment such as the computer name, the correct organizational unit (OU) for the computer, or which applications should be installed by the task sequence. With MDT integration, you can enable the User-Driven Installation (UDI) wizard to gather the required information, and customize the wizard using the UDI Wizard Designer. + +![figure 5](images/mdt-06-fig05.png) + +Figure 5. The optional UDI wizard open in the UDI Wizard Designer. + +MDT Zero Touch simply extends Configuration Manager with many useful built-in operating system deployment components. By providing well-established, supported solutions, MDT reduces the complexity of deployment in Configuration Manager. + +## Why use MDT Lite Touch to create reference images + + +You can create reference images for Configuration Manager in Configuration Manager, but in general we recommend creating them in MDT Lite Touch for the following reasons: + +- In a deployment project, it is typically much faster to create a reference image using MDT Lite Touch than Configuration Manager. + +- You can use the same image for every type of operating system deployment - Microsoft Virtual Desktop Infrastructure (VDI), Microsoft System Center 2012 R2 Virtual Machine Manager (SCVMM), MDT, Configuration Manager, Windows Deployment Services (WDS), and more. + +- Microsoft System Center 2012 R2 performs deployment in the LocalSystem context. This means that you cannot configure the Administrator account with all of the settings that you would like to be included in the image. MDT runs in the context of the Local Administrator, which means you can configure the look and feel of the configuration and then use the CopyProfile functionality to copy these changes to the default user during deployment. + +- The Configuration Manager task sequence does not suppress user interface interaction. + +- MDT Lite Touch supports a Suspend action that allows for reboots, which is useful when you need to perform a manual installation or check the reference image before it is automatically captured. + +- MDT Lite Touch does not require any infrastructure and is easy to delegate. + +## Related topics + + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/introduction-to-vamtvamt-30-win8.md b/windows/deploy/introduction-to-vamtvamt-30-win8.md new file mode 100644 index 0000000000..18822f6007 --- /dev/null +++ b/windows/deploy/introduction-to-vamtvamt-30-win8.md @@ -0,0 +1,90 @@ +--- +title: Introduction to VAMT (Windows 10) +description: Introduction to VAMT +ms.assetid: 0439685e-0bae-4967-b0d4-dd84ca6d7fa7 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Introduction to VAMT + + +The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office®, and select other Microsoft products volume and retail activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in and can be installed on any computer that has one of the following Windows operating systems: Windows® 7, Windows 8, Windows 8.1, Windows 10,Windows Server 2008 R2, or Windows Server 2012. + +**Note**   +VAMT can be installed on, and can manage, physical or virtual instances. VAMT cannot detect whether or not the remote products are virtual. As long as the products can respond to Windows Management Instrumentation (WMI) calls, they will be discovered and activated. + +  + +## In this Topic + + +- [Managing Multiple Activation Key (MAK) and Retail Activation](#BKMK_ManagingMAK) + +- [Managing Key Management Service (KMS) Activation](#BKMK_ManagingKMS) + +- [Enterprise Environment](#BKMK_EnterpriseEnvironment) + +- [VAMT User Interface](#BKMK_UserInterface) + +## Managing Multiple Activation Key (MAK) and Retail Activation + + +You can use a MAK or a retail product key to activate Windows, Windows Server, or Office on an individual computer or a group of computers. VAMT enables two different activation scenarios: + +- **Online activation.** Many enterprises maintain a single Windows system image or Office installation package for deployment across the enterprise. Occasionally there is also a need to use retail product keys in special situations. Online activation enables you to activate over the Internet any products installed with MAK, KMS host, or retail product keys on one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft. + +- **Proxy activation.** This activation method enables you to perform volume activation for products installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS Host key (CSVLK), or retail product key to one or more client products and collects the installation ID (IID) from each client product. The VAMT host sends the IIDs to Microsoft on behalf of the client products and obtains the corresponding Confirmation IDs (CIDs). The VAMT host then installs the CIDs on the client products to complete the activation. Using this method, only the VAMT host computer needs Internet access. You can also activate products installed on computers in a workgroup that is completely isolated from any larger network, by installing a second instance of VAMT on a computer within the workgroup. Then, use removable media to transfer activation data between this new instance of VAMT and the Internet-connected VAMT host. + +## Managing Key Management Service (KMS) Activation + + +In addition to MAK or retail activation, you can use VAMT to perform volume activation using the Key Management Service (KMS). VAMT can install and activate GVLK (KMS client) keys on client products. GVLKs are the default product keys used by Volume License editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 as well as Microsoft Office 2010. + +VAMT treats a KMS Host key (CSVLK) product key identically to a retail-type product key; therefore, the experience for product key entry and activation management are identical for both these product key types. + +## Enterprise Environment + + +VAMT is commonly implemented in enterprise environments. The following illustrates three common environments—Core Network, Secure Zone, and Isolated Lab. + +![vamt in the enterprise](images/dep-win8-l-vamt-image001-enterprise.jpg) + +In the Core Network environment, all computers are within a common network managed by Active Directory® Domain Services (AD DS). The Secure Zone represents higher-security Core Network computers that have additional firewall protection. + +The Isolated Lab environment is a workgroup that is physically separate from the Core Network, and its computers do not have Internet access. The network security policy states that no information that could identify a specific computer or user may be transferred out of the Isolated Lab. + +## VAMT User Interface + + +The following screenshot shows the VAMT graphical user interface. + +![screenshot of the vamt user interface](images/vamtuserinterfaceupdated.jpg) + +VAMT provides a single, graphical user interface for managing activations, and for performing other activation-related tasks such as: + +- **Adding and removing computers.** You can use VAMT to discover computers in the local environment. VAMT can discover computers by querying AD DS, workgroups, by individual computer name or IP address, or via a general LDAP query. + +- **Discovering products.** You can use VAMT to discover Windows, Windows Server, Office, and select other products installed on the client computers. + +- **Monitoring activation status.** You can collect activation information about each product, including the last 5 characters of the product key being used, the current license state (such as Licensed, Grace, Unlicensed), and the product edition information. + +- **Managing product keys.** You can store multiple product keys and use VAMT to install these keys to remote client products. You can also determine the number of activations remaining for MAKs. + +- **Managing activation data.** VAMT stores activation data in a SQL database. VAMT can export this data to other VAMT hosts or to an archive in XML format. + +## Related topics + + +[VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/key-features-in-mdt-2013.md b/windows/deploy/key-features-in-mdt-2013.md new file mode 100644 index 0000000000..4dcfcbab88 --- /dev/null +++ b/windows/deploy/key-features-in-mdt-2013.md @@ -0,0 +1,91 @@ +--- +title: Key features in MDT 2013 Update 1 (Windows 10) +description: The Microsoft Deployment Toolkit (MDT) has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0. +ms.assetid: 858e384f-e9db-4a93-9a8b-101a503e4868 +keywords: ["deploy, feature, tools, upgrade, migrate, provisioning"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Key features in MDT 2013 Update 1 + + +**Applies to** + +- Windows 10 + +The Microsoft Deployment Toolkit (MDT) has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0. The toolkit has evolved, both in functionality and popularity, and today it is considered fundamental to Windows operating system and enterprise application deployment. + +MDT 2013 has many useful features, the most important of which are: + +- **Windows Client support.** Supports Windows 7, Windows 8, Windows 8.1, and Windows 10. + +- **Windows Server support.** Supports Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. + +- **Additional operating systems support.** Supports Windows Thin PC and Windows Embedded POSReady 7, as well as Windows 8.1 Embedded Industry. + +- **UEFI support.** Supports deployment to machines using Unified Extensible Firmware Interface (UEFI) version 2.3.1. + +- **GPT support.** Supports deployment to machines that require the new GUID (globally unique identifier) partition table (GPT) format. This is related to UEFI. + +- **Enhanced Windows PowerShell support.** Provides support for running PowerShell scripts. + + ![figure 2](images/mdt-05-fig02.png) + + Figure 2. The deployment share mounted as a standard PSDrive allows for administration using PowerShell. + +- **Add local administrator accounts.** Allows you to add multiple user accounts to the local Administrators group on the target computers, either via settings or the deployment wizard. + +- **Automated participation in CEIP and WER.** Provides configuration for participation in Windows Customer Experience Improvement Program (CEIP) and Windows Error Reporting (WER). + +- **Deploy Windows RE.** Enables deployment of a customized Windows Recovery Environment (Windows RE) as part of the task sequence. + +- **Deploy to VHD.** Provides ready-made task sequence templates for deploying Windows into a virtual hard disk (VHD) file. + +- **Improved deployment wizard.** Provides additional progress information and a cleaner UI for the Lite Touch Deployment Wizard. + +- **Monitoring.** Allows you to see the status of currently running deployments. + +- **Apply GPO Pack.** Allows you to deploy local group policy objects created by Microsoft Security Compliance Manager (SCM). + +- **Partitioning routines.** Provides improved partitioning routines to ensure that deployments work regardless of the current hard drive structure. + +- **Offline BitLocker.** Provides the capability to have BitLocker enabled during the Windows Preinstallation Environment (Windows PE) phase, thus saving hours of encryption time. + +- **USMT offline user-state migration.** Provides support for running the User State Migration Tool (USMT) capture offline, during the Windows PE phase of the deployment. + + ![figure 3](images/mdt-05-fig03.png) + + Figure 3. The offline USMT backup in action. + +- **Install or uninstall Windows roles or features.** Enables you to select roles and features as part of the deployment wizard. MDT also supports uninstall of roles and features. + +- **Microsoft System Center 2012 Orchestrator integration.** Provides the capability to use Orchestrator runbooks as part of the task sequence. + +- **Support for DaRT.** Supports optional integration of the DaRT components into the boot image. + +- **Support for Office 2013.** Provides added support for deploying Microsoft Office Professional Plus 2013. + +- **Support for Modern UI app package provisioning.** Provisions applications based on the new Windows app package standard, which is used in Windows 8 and later. + +- **Extensibility.** Provides the capability to extend MDT far beyond the built-in features by adding custom scripts, web services, System Center Orchestrator runbooks, PowerShell scripts, and VBScripts. + +- **Upgrade task sequence.** Provides a new upgrade task sequence template that you can use to upgrade existing Windows 7, Windows 8, and Windows 8.1 systems directly to Windows 10, automatically preserving all data, settings, applications, and drivers. For more information about using this new upgrade task sequence, refer to the [Microsoft Deployment Toolkit resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117). + +## Related topics + + +[Prepare for deployment with MDT 2013 Update 1](prepare-for-deployment-with-mdt-2013.md) + +[MDT 2013 Update 1 Lite Touch components](mdt-2013-lite-touch-components.md) + +  + +  + + + + + diff --git a/windows/deploy/loadstate-syntax-usmt-win7-usmt-win8.md b/windows/deploy/loadstate-syntax-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..d7332ae809 --- /dev/null +++ b/windows/deploy/loadstate-syntax-usmt-win7-usmt-win8.md @@ -0,0 +1,709 @@ +--- +title: LoadState Syntax (Windows 10) +description: LoadState Syntax +ms.assetid: 53d2143b-cbe9-4cfc-8506-36e9d429f6d4 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# LoadState Syntax + + +This topic discusses the **LoadState** command syntax and options. + +## In This Topic + + +[Before You Begin](#Before) + +[Syntax](#BKMK_S) + +[Storage Options](#BKMK_St) + +[Migration Rule Options](#BKMK_Mig) + +[Monitoring Options](#BKMK_Mon) + +[User Options](#BKMK_User) + +[Incompatible Command-Line Options](#BKMK_CLOI) + +## Before You Begin + + +Before you run the **LoadState** command, note the following: + +- To ensure that all operating system settings migrate, we recommend that you run the **LoadState** commands in administrator mode from an account with administrative credentials. + +- For information about software requirements for running the **LoadState** command, see [USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md). + +- You should log off after you run the **LoadState** command. Some settings (for example, fonts, wallpaper, and screensaver settings) will not take effect until the next time the user logs in. + +- Unless otherwise specified, you can use each option only once when running a tool on the command line. + +- **LoadState** does not require domain controller access to apply domain profiles. This functionality is available without any additional configuration. It is not necessary for the source computer to have had domain controller access when the user profile was gathered using **ScanState**. However, domain profiles are inaccessible until the destination computer is joined to the domain. + +- The [Incompatible Command-Line Options](#BKMK_CLOI) table lists which options you can use together and which command-line options are incompatible. + +## Syntax + + +This section explains the syntax and usage of the command-line options available when you use the **LoadState** command. The options can be specified in any order. If the option contains a parameter, you can specify either a colon or space separator. + +The **LoadState** command's syntax is: + +loadstate *StorePath* \[/i:\[*Path*\\\]*FileName*\] \[/v:*VerbosityLevel*\] \[/nocompress\] \[/decrypt /key:*KeyString*|/keyfile:\[Path\\\]*FileName*\] \[/l:\[*Path*\\\]*FileName*\] \[/progress:\[*Path*\\\]*FileName*\] \[/r:*TimesToRetry*\] \[/w:*SecondsToWait*\] \[/c\] \[/all\] \[/ui:\[*DomainName*|*ComputerName*\\\]*UserName*\] \[/ue:\[\[*DomainName*|*ComputerName*\\\]*UserName*\] \[/uel:*NumberOfDays*|*YYYY/MM/DD*|0\] \[/md:*OldDomain*:*NewDomain*\] \[/mu:*OldDomain*\\*OldUserName*:\[*NewDomain*\\\]*NewUserName*\] \[/lac:\[*Password*\]\] \[/lae\] \[/config:\[*Path*\\\]*FileName*\] \[/?|help\] + +For example, to decrypt the store and migrate the files and settings to a computer running Windows 7 type the following on the command line: + +`loadstate \\server\share\migration\mystore /i:migapp.xml /i:migdocs.xml /v:13 /decrypt /key:"mykey"` + +## Storage Options + + +USMT provides the following options that you can use to specify how and where the migrated data is stored. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

StorePath

Indicates the folder where the files and settings data are stored. You must specify StorePath when using the LoadState command. You cannot specify more than one StorePath.

/decrypt /key:KeyString

+

or

+

/decrypt /key:"Key String"

+

or

+

/decrypt /keyfile:[Path\]FileName

Decrypts the store with the specified key. With this option, you will need to specify the encryption key in one of the following ways:

+
    +
  • /key:KeyString specifies the encryption key. If there is a space in KeyString, you must surround the argument with quotation marks.

  • +
  • /keyfile:FilePathAndName specifies a text (.txt) file that contains the encryption key

  • +
+

KeyString cannot exceed 256 characters.

+

The /key and /keyfile options cannot be used on the same command line.

+

The /decrypt and /nocompress options cannot be used on the same command line.

+
+Important   +

Use caution with this option, because anyone who has access to the LoadState command-line script will also have access to the encryption key.

+
+
+  +
+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /decrypt /key:mykey

/decrypt:"encryption strength"

The /decrypt option accepts a command-line parameter to define the encryption strength specified for the migration store encryption. For more information about supported encryption algorithms, see [Migration Store Encryption](migration-store-encryption-usmt-win8.md).

/hardlink

Enables user-state data to be restored from a hard-link migration store. The /nocompress parameter must be specified with /hardlink option.

/nocompress

Specifies that the store is not compressed. You should only use this option in testing environments. We recommend that you use a compressed store during your actual migration. This option cannot be used with the /decrypt option.

+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /nocompress

+ +  + +## Migration Rule Options + + +USMT provides the following options to specify what files you want to migrate. + + ++++ + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/i:[Path\]FileName

(include)

+

Specifies an .xml file that contains rules that define what state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigSys.xml, MigDocs.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.

+

For more information about which files to specify, see the "XML files" section of the [Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md) topic.

/config:[Path\]FileName

Specifies the Config.xml file that the LoadState command should use. You cannot specify this option more than once on the command line. Path can be either a relative or full path. If you do not specify the Path variable, then the FileName must be located in the current directory.

+

This example migrates the files and settings based on the rules in the Config.xml, MigDocs.xml, and MigApp.xml files:

+

loadstate \\server\share\migration\mystore /config:config.xml /i:migdocs.xml /i:migapp.xml /v:5 /l:loadstate.log

/auto:"path to script files"

This option enables you to specify the location of the default .xml files and then launch your migration. If no path is specified, USMT will use the directory where the USMT binaries are located. The /auto option has the same effect as using the following options: /i:MigDocs.xml /i:MigApp.xml /v:5.

+ +  + +## Monitoring Options + + +USMT provides several command-line options that you can use to analyze problems that occur during migration. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/l:[Path\]FileName

Specifies the location and name of the LoadState log. You cannot store any of the log files in StorePath. Path can be either a relative or full path. If you do not specify the Path variable, then the log will be created in the current directory. You can specify the /v option to adjust the amount of output.

+

If you run the LoadState command from a shared network resource, you must specify this option or USMT will fail with the error: "USMT was unable to create the log file(s)". To fix this issue, use the /l:load.log option.

/v:<VerbosityLevel>

(Verbosity)

+

Enables verbose output in the LoadState log file. The default value is 0.

+

You can set the VerbosityLevel to one of the following levels:

+ ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
LevelExplanation

0

Only the default errors and warnings are enabled.

1

Enables verbose output.

4

Enables error and status output.

5

Enables verbose and status output.

8

Enables error output to a debugger.

9

Enables verbose output to a debugger.

12

Enables error and status output to a debugger.

13

Enables verbose, status, and debugger output.

+

 

+

For example:

+

loadstate \\server\share\migration\mystore /v:5 /i:migdocs.xml /i:migapp.xml

/progress:[Path\]FileName

Creates the optional progress log. You cannot store any of the log files in StorePath. Path can be either a relative or full path. If you do not specify the Path variable, then FileName will be created in the current directory.

+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /progress:prog.log /l:scanlog.log

/c

When this option is specified, the LoadState command will continue to run, even if non-fatal errors occur. Any files or settings that cause an error are logged in the progress log. For example, if there is a large file that will not fit on the computer, the LoadState command will log an error and continue with the migration. Without the /c option, the LoadState command will exit on the first error. You can use the new <ErrorControl> section in the Config.xml file to specify which file or registry read/write errors can be safely ignored and which might cause the migration to fail. This enables the /c command-line option to safely skip all input/output (I/O) errors in your environment. In addition, the /genconfig option now generates a sample <ErrorControl> section that is enabled by specifying error messages and desired behaviors in the Config.xml file.

/r:<TimesToRetry>

(Retry)

+

Specifies the number of times to retry when an error occurs while migrating the user state from a server. The default is three times. This option is useful in environments where network connectivity is not reliable.

+

While restoring the user state, the /r option will not recover data that is lost due to a network-hardware failure, such as a faulty or disconnected network cable, or when a virtual private network (VPN) connection fails. The retry option is intended for large, busy networks where connectivity is satisfactory, but communication latency is a problem.

/w:<SecondsBeforeRetry>

(Wait)

+

Specifies the time to wait, in seconds, before retrying a network file operation. The default is 1 second.

/? or /help

Displays Help on the command line.

+ +  + +## User Options + + +By default, all users are migrated. The only way to specify which users to include and exclude is by using the following options. You cannot exclude users in the migration .xml files or by using the Config.xml file. For more information, see [Identify Users](identify-users-usmt-win7-usmt-win8.md). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/all

Migrates all of the users on the computer.

+

USMT migrates all user accounts on the computer, unless you specifically exclude an account with the /ue or /uel options. For this reason, you do not need to specify this option on the command line. However, if you choose to use the /all option, you cannot also use the /ui, /ue or /uel options.

/ui:DomainName\UserName

+

or

+

/ui:"DomainName\User Name"

+

or

+

/ui:ComputerName\LocalUserName

(User include)

+

Migrates the specified user. By default, all users are included in the migration. Therefore, this option is helpful only when used with the /ue option. You can specify multiple /ui options, but you cannot use the /ui option with the /all option. DomainName and UserName can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you will need to surround it with quotations marks.

+

For example:

+
    +
  • To include only User2 from the Corporate domain, type:

    +

    /ue:*\* /ui:corporate\user2

  • +
+
+Note   +

If a user is specified for inclusion with the /ui option, and also is specified to be excluded with either the /ue or /uel options, the user will be included in the migration.

+
+
+  +
+

For more examples, see the descriptions of the /uel, /ue, and /ui options in this table.

/uel:<NumberOfDays>

+

or

+

/uel:<YYYY/MM/DD>

+

or

+

/uel:0

(User exclude based on last logon)

+

Migrates only the users that logged onto the source computer within the specified time period, based on the Last Modified date of the Ntuser.dat file on the source computer. The /uel option acts as an include rule. For example, the /uel:30 option migrates users who logged on, or whose user account was modified, within the last 30 days from the date when the ScanState command is run. You can specify a number of days or you can specify a date. You cannot use this option with the /all option. USMT retrieves the last logon information from the local computer, so the computer does not need to be connected to the network when you run this option. In addition, if a domain user has logged onto another computer, that logon instance is not considered by USMT.

+
+Note   +

The /uel option is not valid in offline migrations.

+
+
+  +
+

Examples:

+
    +
  • /uel:0 migrates accounts that were logged on to the source computer when the ScanState command was run.

  • +
  • /uel:90 migrates users who have logged on, or whose accounts have been otherwise modified, within the last 90 days.

  • +
  • /uel:1 migrates users whose accounts have been modified within the last 24 hours.

  • +
  • /uel:2002/1/15 migrates users who have logged on or whose accounts have been modified since January 15, 2002.

  • +
+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /uel:0

/ue:DomainName\UserName

+

or

+

/ue:"DomainName\User Name"

+

or

+

/ue:ComputerName\LocalUserName

(User exclude)

+

Excludes the specified users from the migration. You can specify multiple /ue options but you cannot use the /ue option with the /all option. DomainName and UserName can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you will need to surround it with quotation marks.

+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /ue:contoso\user1

+

For more examples, see the descriptions of the /uel, /ue, and /ui options in this table.

/md:OldDomain:NewDomain

+

or

+

/md:LocalComputerName:NewDomain

(move domain)

+

Specifies a new domain for the user. Use this option to change the domain for users on a computer or to migrate a local user to a domain account. OldDomain may contain the asterisk (*) wildcard character.

+

You can specify this option more than once. You may want to specify multiple /md options if you are consolidating users across multiple domains to a single domain. For example, you could specify the following to consolidate the users from the Corporate and FarNorth domains into the Fabrikam domain: /md:corporate:fabrikam and /md:farnorth:fabrikam.

+

If there are conflicts between two /md commands, the first rule that you specify is applied. For example, if you specify the /md:corporate:fabrikam and /md:corporate:farnorth commands, then Corporate users would be mapped to the Fabrikam domain.

+
+Note   +

If you specify an OldDomain that did not exist on the source computer, the LoadState command will appear to complete successfully, without an error or warning. However, in this case, users will not be moved to NewDomain but will remain in their original domain. For example, if you misspell "contoso" and you specify "/md:contso:fabrikam", the users will remain in contoso on the destination computer.

+
+
+  +
+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore

+

/progress:prog.log /l:load.log /md:contoso:fabrikam

/mu:OldDomain\OldUserName:[NewDomain\]NewUserName

+

or

+

/mu:OldLocalUserName:NewDomain\NewUserName

Specifies a new user name for the specified user. If the store contains more than one user, you can specify multiple /mu options. You cannot use wildcard characters with this option.

+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore

+

/progress:prog.log /l:load.log /mu:contoso\user1:fabrikam\user1

/lac:[Password]

(local account create)

+

Specifies that if a user account is a local (non-domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option.

+

If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated.

+

Password is the password for the newly created account. An empty password is used by default.

+
+Caution   +

Use the Password variable with caution because it is provided in plain text and can be obtained by anyone with access to the computer that is running the LoadState command.

+

Also, if the computer has multiple users, all migrated users will have the same password.

+
+
+  +
+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore

+

For instructions, see [Migrate User Accounts](migrate-user-accounts-usmt.md).

/lae

(local account enable)

+

Enables the account that was created with the /lac option. You must specify the /lac option with this option.

+

For example:

+

loadstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore

+

/progress:prog.log /l:load.log /lac:password /lae

+

For instructions, see [Migrate User Accounts](migrate-user-accounts-usmt.md).

+ +  + +### Examples for the /ui and /ue options + +The following examples apply to both the **/ui** and **/ue** options. You can replace the **/ue** option with the **/ui** option to include, rather than exclude, the specified users. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
BehaviorCommand

Exclude the user named User One in the Corporate domain.

/ue:"corporate\user one"

Exclude the user named User1 in the Corporate domain.

/ue:corporate\user1

Exclude the local user named User1.

/ue:%computername%\user1

Exclude all domain users.

/ue:Domain\*

Exclude all local users.

/ue:%computername%\*

Exclude users in all domains named User1, User2, and so on.

/ue:*\user*

+ +  + +### Using the Options Together + +You can use the **/uel**, **/ue** and **/ui** options together to migrate only the users that you want migrated. + +**The /ui option has precedence over the /ue and /uel options.** If a user is specified to be included using the **/ui** option, and also specified to be excluded using either the **/ue** or **/uel** options, the user will be included in the migration. For example, if you specify `/ui:contoso\* /ue:contoso\user1`, then User1 will be migrated, because the **/ui** option takes precedence over the **/ue** option. + +**The /uel option takes precedence over the /ue option.** If a user has logged on within the specified time period set by the **/uel** option, that user’s profile will be migrated even if they are excluded by using the **/ue** option. For example, if you specify `/ue:contoso\user1 /uel:14`, the User1 will be migrated if they have logged on to the computer within the last 14 days. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
BehaviorCommand

Include only User2 from the Fabrikam domain and exclude all other users.

/ue:*\* /ui:fabrikam\user2

Include only the local user named User1 and exclude all other users.

/ue:*\* /ui:user1

Include only the domain users from Contoso, except Contoso\User1.

This behavior cannot be completed using a single command. Instead, to migrate this set of users, you will need to specify the following:

+
    +
  • Using the ScanState command-line tool, type: /ue:*\* /ui:contoso\*

  • +
  • Using the LoadState command-line tool, type: /ue:contoso\user1

  • +

Include only local (non-domain) users.

/ue:*\* /ui:%computername%\*

+ +  + +## Incompatible Command-Line Options + + +The following table indicates which command-line options are not compatible with the **LoadState** command. If the table entry for a particular combination is blank, the options are compatible and you can use them together. The X symbol means that the options are not compatible. For example, you cannot use the **/nocompress** option with the **/encrypt** option. + + +++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line Option/keyfile/nocompress/genconfig/all

/i

/v

/nocompress

N/A

X

/key

X

X

/decrypt

Required*

X

X

/keyfile

N/A

X

/l

/progress

X

/r

X

/w

X

/c

X

/p

X

N/A

/all

X

/ui

X

X

/ue

X

X

/uel

X

X

/genconfig

N/A

/config

X

StorePath

/md

/mu

/lae

/lac

+ +  + +**Note**   +You must specify either the **/key** or **/keyfile** option with the **/encrypt** option. + +  + +## Related topics + + +[XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/log-files-usmt-win7-usmt-win8.md b/windows/deploy/log-files-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..c4e911631f --- /dev/null +++ b/windows/deploy/log-files-usmt-win7-usmt-win8.md @@ -0,0 +1,488 @@ +--- +title: Log Files (Windows 10) +description: Log Files +ms.assetid: 28185ebd-630a-4bbd-94f4-8c48aad05649 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Log Files + + +You can use User State Migration Tool (USMT) 10.0 logs to monitor your migration and to troubleshoot errors and failed migrations. This topic describes the available command-line options to enable USMT logs, and new XML elements that configure which types of errors are fatal and should halt the migration, which types are non-fatal and should be skipped so that the migration can continue. + +[Log Command-Line Options](#BKMK_CommandLineOptions) + +[ScanState and LoadState Logs](#BKMK_ScanLoadStateLogs) + +[Progress Log](#BKMK_ProgressLog) + +[List Files Log](#BKMK_ListFilesLog) + +[Diagnostic Log](#BKMK_DiagnosticLog) + +## Log Command-Line Options + + +The following table describes each command-line option related to logs, and it provides the log name and a description of what type of information each log contains. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command line OptionFile NameDescription

/l[Path\]FileName

Scanstate.log or LoadState.log

Specifies the path and file name of the ScanState.log or LoadState log.

/progress[Path\]FileName

Specifies the path and file name of the Progress log.

Provides information about the status of the migration, by percentage complete.

/v[VerbosityLevel]

Not applicable

See the "Monitoring Options" section in [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md).

/listfiles[Path\]FileName

Specifies the path and file name of the Listfiles log.

Provides a list of the files that were migrated.

Set the environment variable MIG_ENABLE_DIAG to a path to an XML file.

USMTDiag.xml

The diagnostic log contains detailed system environment information, user environment information, and information about the migration units (migunits) being gathered and their contents.

+ +  + +**Note**   +You cannot store any of the log files in *StorePath*. If you do, the log will be overwritten when USMT is run. + +  + +## ScanState and LoadState Logs + + +ScanState and LoadState logs are text files that are create when you run the ScanState and LoadState tools. You can use these logs to help monitor your migration. The content of the log depends on the command-line options that you use and the verbosity level that you specify. For more information about verbosity levels, see Monitoring Options in [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +## Progress Log + + +You can create a progress log using the **/progress** option. External tools, such as Microsoft System Center Operations Manager 2007, can parse the progress log to update your monitoring systems. The first three fields in each line are fixed as follows: + +- **Date:** Date, in the format of *day* *shortNameOfTheMonth* *year*. For example: 08 Jun 2006. + +- **Local time:** Time, in the format of *hrs*:*minutes*:*seconds* (using a 24-hour clock). For example: 13:49:13. + +- **Migration time:** Duration of time that USMT was run, in the format of *hrs:minutes:seconds*. For example: 00:00:10. + +The remaining fields are key/value pairs as indicated in the following table. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
KeyValue

program

ScanState.exe or LoadState.exe.

productVersion

The full product version number of USMT.

computerName

The name of the source or destination computer on which USMT was run.

commandLine

The full command used to run USMT.

PHASE

Reports that a new phase in the migration is starting. This can be one of the following:

+
    +
  • Initializing

  • +
  • Scanning

  • +
  • Collecting

  • +
  • Saving

  • +
  • Estimating

  • +
  • Applying

  • +

detectedUser

    +
  • For the ScanState tool, these are the users USMT detected on the source computer that can be migrated.

  • +
  • For the LoadState tool, these are the users USMT detected in the store that can be migrated.

  • +

includedInMigration

Defines whether the user profile/component is included for migration. Valid values are Yes or No.

forUser

Specifies either of the following:

+
    +
  • The user state being migrated.

  • +
  • This Computer, meaning files and settings that are not associated with a user.

  • +

detectedComponent

Specifies a component detected by USMT.

+
    +
  • For ScanState, this is a component or application that is installed on the source computer.

  • +
  • For LoadState, this is a component or application that was detected in the store.

  • +

totalSizeInMBToTransfer

Total size of the files and settings to migrate in megabytes (MB).

totalPercentageCompleted

Total percentage of the migration that has been completed by either ScanState or LoadState.

collectingUser

Specifies which user ScanState is collecting files and settings for.

totalMinutesRemaining

Time estimate, in minutes, for the migration to complete.

error

Type of non-fatal error that occurred. This can be one of the following:

+
    +
  • UnableToCopy: Unable to copy to store because the disk on which the store is located is full.

  • +
  • UnableToOpen: Unable to open the file for migration because the file is opened in non-shared mode by another application or service.

  • +
  • UnableToCopyCatalog: Unable to copy because the store is corrupted.

  • +
  • UnableToAccessDevice: Unable to access the device.

  • +
  • UnableToApply: Unable to apply the setting to the destination computer.

  • +

objectName

The name of the file or setting that caused the non-fatal error.

action

Action taken by USMT for the non-fatal error. The values are:

+
    +
  • Ignore: Non-fatal error ignored and the migration continued because the /c option was specified on the command line.

  • +
  • Abort: Stopped the migration because the /c option was not specified.

  • +

errorCode

The errorCode or return value.

numberOfIgnoredErrors

The total number of non-fatal errors that USMT ignored.

message

The message corresponding to the errorCode.

+ +  + +## List Files Log + + +The List files log (Listfiles.txt) provides a list of the files that were migrated. This list can be used to troubleshoot XML issues or can be retained as a record of the files that were gathered into the migration store. The List Files log is only available for ScanState.exe. + +## Diagnostic Log + + +You can obtain the diagnostic log by setting the environment variable MIG\_ENABLE\_DIAG to a path to an XML file. + +The diagnostic log contains: + +- Detailed system environment information + +- Detailed user environment information + +- Information about the migration units (migunits) being gathered and their contents + +## Using the Diagnostic Log + + +The diagnostic log is essentially a report of all the migration units (migunits) included in the migration. A migunit is a collection of data that is identified by the component it is associated with in the XML files. The migration store is made up of all the migunits in the migration. The diagnostic log can be used to verify which migunits were included in the migration and can be used for troubleshooting while authoring migration XML files. + +The following examples describe common scenarios in which you can use the diagnostic log. + +**Why is this file not migrating when I authored an "include" rule for it?** + +Let’s imagine that we have the following directory structure and that we want the “data” directory to be included in the migration along with the “New Text Document.txt” file in the “New Folder.” The directory of **C:\\data** contains: + +``` syntax +01/21/2009 10:08 PM . +01/21/2009 10:08 PM .. +01/21/2009 10:08 PM New Folder +01/21/2009 09:19 PM 13 test (1).txt +01/21/2009 09:19 PM 13 test.txt + 2 File(s) 26 bytes +``` + +The directory of **C:\\data\\New Folder** contains: + +``` syntax +01/21/2009 10:08 PM . +01/21/2009 10:08 PM .. +01/21/2009 10:08 PM 0 New Text Document.txt + 1 File(s) 0 bytes +``` + +To migrate these files you author the following migration XML: + +``` syntax + + + + + DATA1 + + + + + c:\data\ [*] + + + + + + + +``` + +However, upon testing the migration you notice that the “New Text Document.txt” file isn’t included in the migration. To troubleshoot this failure, the migration can be repeated with the environment variable MIG\_ENABLE\_DIAG set such that the diagnostic log is generated. Upon searching the diagnostic log for the component “DATA1”, the following XML section is discovered: + +``` syntax + + + + + + + + + + + + + + +``` + +Analysis of this XML section reveals the migunit that was created when the migration rule was processed. The <Perform> section details the actual files that were scheduled for gathering and the result of the gathering operation. The “New Text Document.txt” file doesn’t appear in this section, which confirms that the migration rule was not correctly authored. + +An analysis of the XML elements reference topic reveals that the <pattern> tag needs to be modified as follows: + +``` syntax +c:\data\* [*] +``` + +When the migration is preformed again with the modified tag, the diagnostic log reveals the following: + +``` syntax + + + + + + + + + + + + + + + + +``` + +This diagnostic log confirms that the modified <pattern> value enables the migration of the file. + +**Why is this file migrating when I authored an exclude rule excluding it?** + +In this scenario, you have the following directory structure and you want all files in the “data” directory to migrate, except for text files. The **C:\\Data** folder contains: + +``` syntax +Directory of C:\Data + +01/21/2009 10:08 PM . +01/21/2009 10:08 PM .. +01/21/2009 10:08 PM New Folder +01/21/2009 09:19 PM 13 test (1).txt +01/21/2009 09:19 PM 13 test.txt + 2 File(s) 26 bytes +``` + +The **C:\\Data\\New Folder\\** contains: + +``` syntax +01/21/2009 10:08 PM . +01/21/2009 10:08 PM .. +01/21/2009 10:08 PM 0 New Text Document.txt + 1 File(s) 0 bytes +``` + +You author the following migration XML: + +``` syntax + + + + + DATA1 + + + + + c:\data\* [*] + + + + + + + c:\* [*.txt] + + + + + + +``` + +However, upon testing the migration you notice that all the text files are still included in the migration. In order to troubleshoot this issue, the migration can be performed with the environment variable MIG\_ENABLE\_DIAG set so that the diagnostic log is generated. Upon searching the diagnostic log for the component “DATA1”, the following XML section is discovered: + +``` syntax + + + + + + + + + + + + + + + + + + + + + +``` + +Upon reviewing the diagnostic log, you confirm that the files are still migrating, and that it is a problem with the authored migration XML rule. You author an update to the migration XML script as follows: + +``` syntax + + + + + DATA1 + + + + + c:\data\* [*] + + + + + + + c:\data\* [*.txt] + + + + + + + + + +``` + +Your revised migration XML script excludes the files from migrating, as confirmed in the diagnostic log: + +``` syntax + + + + + + + + + + + + + + + + + + +``` + +## Related topics + + +[XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) + +[ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) + +[LoadState Syntax](loadstate-syntax-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/manage-activations-vamt-30-win8.md b/windows/deploy/manage-activations-vamt-30-win8.md new file mode 100644 index 0000000000..ee543fd45b --- /dev/null +++ b/windows/deploy/manage-activations-vamt-30-win8.md @@ -0,0 +1,61 @@ +--- +title: Manage Activations (Windows 10) +description: Manage Activations +ms.assetid: 53bad9ed-9430-4f64-a8de-80613870862c +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Manage Activations + + +This section describes how to activate a client computer, by using a variety of activation methods. + +## In this Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +

[Perform Online Activation](perform-online-activation-vamt-30-win8.md)

Describes how to activate a client computer over the Internet.

[Perform Proxy Activation](perform-proxy-activation-vamt-30-win8.md)

Describes how to perform volume activation for client products that do not have Internet access.

[Perform KMS Activation](perform-kms-activation-vamt-30-win8.md)

Describes how perform volume activation using the Key Management Service (KMS).

[Perform Local Reactivation](perform-local-reactivation-vamt-30-win8.md)

Describes how to reactivate an operating system or Office program that was reinstalled.

[Activate an Active Directory Forest Online](activate-an-active-directory-forest-online.md)

Describes how to use Active Directory-Based Activation to online activate an Active Directory forest.

[Activate by Proxy an Active Directory Forest](activate-by-proxy-an-active-directory-forest.md)

Describes how to use Active Directory-Based Activation to proxy activate an Active Directory forest that is not connected to the Internet.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/manage-product-keys-vamt-30-win8.md b/windows/deploy/manage-product-keys-vamt-30-win8.md new file mode 100644 index 0000000000..ccb59f63d1 --- /dev/null +++ b/windows/deploy/manage-product-keys-vamt-30-win8.md @@ -0,0 +1,49 @@ +--- +title: Manage Product Keys (Windows 10) +description: Manage Product Keys +ms.assetid: 4c6c4216-b4b7-437c-904e-4cb257f913cd +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Manage Product Keys + + +This section describes how to add and remove a product key from the Volume Activation Management Tool (VAMT). After you add a product key to VAMT, you can install that product key on a product or products you select in the VAMT database. + +## In this Section + + + ++++ + + + + + + + + + + + + + + +

[Add and Remove a Product Key](add-and-remove-a-product-key-vamt-30-win8.md)

Describes how to add a product key to the VAMT database.

[Install a Product Key](install-a-product-key-vamt-30-win8.md)

Describes how to install a product key for specific product.

[Install a KMS Client Key](install-a-kms-client-key-vamt-30-win8.md)

Describes how to install a GVLK (KMS client) key.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/manage-vamt-data-vamt-30-win8.md b/windows/deploy/manage-vamt-data-vamt-30-win8.md new file mode 100644 index 0000000000..a7a4fcf257 --- /dev/null +++ b/windows/deploy/manage-vamt-data-vamt-30-win8.md @@ -0,0 +1,45 @@ +--- +title: Manage VAMT Data (Windows 10) +description: Manage VAMT Data +ms.assetid: 233eefa4-3125-4965-a12d-297a67079dc4 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Manage VAMT Data + + +This section describes how to save, import, export, and merge a Computer Information List (CILX) file using the Volume Activation Management Tool (VAMT). + +## In this Section + + + ++++ + + + + + + + + + + +

[Import and Export VAMT Data](import-and-export-vamt-data-vamt-30-win8.md)

Describes how to import and export VAMT data.

[Use VAMT in Windows PowerShell](use-vamt-in-windows-powershell.md)

Describes how to access Windows PowerShell and how to import the VAMT PowerShell module.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/mdt-2013-lite-touch-components.md b/windows/deploy/mdt-2013-lite-touch-components.md new file mode 100644 index 0000000000..f17ca7db38 --- /dev/null +++ b/windows/deploy/mdt-2013-lite-touch-components.md @@ -0,0 +1,183 @@ +--- +title: MDT 2013 Update 1 Lite Touch components (Windows 10) +description: This topic provides an overview of the features in the Microsoft Deployment Toolkit (MDT) 2013 Update 1 that support Lite Touch Installation (LTI) for Windows 10. +ms.assetid: 7d6fc159-e338-439e-a2e6-1778d0da9089 +keywords: ["deploy, install, deployment, boot, log, monitor"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# MDT 2013 Update 1 Lite Touch components + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Deployment shares](#sec01) +- [Rules](#sec02) +- [Boot images](#sec03) +- [Operating systems](#sec04) +- [Applications](#sec05) +- [Driver repository](#sec06) +- [Packages](#sec07) +- [Task sequences](#sec08) +- [Task sequence templates](#sec09) +- [Selection profiles](#sec10) +- [Logging](#sec11) +- [Monitoring](#sec12) +- [Related topics](#related_topics) + +This topic provides an overview of the features in the Microsoft Deployment Toolkit (MDT) 2013 Update 1 that support Lite Touch Installation (LTI) for Windows 10. An LTI deployment strategy requires very little infrastructure or user interaction, and can be used to deploy an operating system from a network share or from a physical media, such as a USB flash drive or disc. + +When deploying the Windows operating system using MDT, most of the administration and configuration is done through the Deployment Workbench, but you also can perform many of the tasks using Windows PowerShell. The easiest way to find out how to use PowerShell in MDT is to use the Deployment Workbench to perform an operation and at the end of that task, click View Script. That will give you the PowerShell command. + +![figure 4](images/mdt-05-fig04.png) + +Figure 4. If you click **View Script** on the right side, you will get the PowerShell code that was used to perform the task. + +## Deployment shares + + +A deployment share is essentially a folder on the server that is shared and contains all the setup files and scripts needed for the deployment solution. It also holds the configuration files (called rules) that are gathered when a machine is deployed. These configuration files can reach out to other sources, like a database, external script, or web server to get additional settings for the deployment. For Lite Touch deployments, it is common to have two deployment shares: one for creating the reference images and one for deployment. For Zero Touch, it is common to have only the deployment share for creating reference images because Microsoft System Center 2012 R2 Configuration Manager deploys the image in the production environment. + +## Rules + + +The rules (CustomSettings.ini and Bootstrap.ini) make up the brain of MDT. The rules control the Windows Deployment Wizard on the client and, for example, can provide the following settings to the machine being deployed: + +- Computer name + +- Domain to join, and organizational unit (OU) in Active Directory to hold the computer object + +- Whether to enable BitLocker + +- Regional settings + +You can manage hundreds of settings in the rules. For more information, see the [Microsoft Deployment Toolkit resource center](http://go.microsoft.com/fwlink/p/?LinkId=618117). + +![figure 5](images/mdt-05-fig05.png) + +Figure 5. Example of a MDT rule. In this example, the new computer name is being calculated based on PC- plus the first seven (Left) characters from the serial number + +## Boot images + + +Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment. They can be started from a CD or DVD, an ISO file, a USB device, or over the network using a Pre-Boot Execution Environment (PXE) server. The boot images connect to the deployment share on the server and start the deployment. + +## Operating systems + + +Using the Deployment Workbench, you import the operating systems you want to deploy. You can import either the full source (like the full Windows 10 DVD/ISO) or a custom image that you have created. The full-source operating systems are primarily used to create reference images; however, they also can be used for normal deployments. + +## Applications + + +Using the Deployment Workbench, you also add the applications you want to deploy. MDT supports virtually every executable Windows file type. The file can be a standard .exe file with command-line switches for an unattended install, a Microsoft Windows Installer (MSI) package, a batch file, or a VBScript. In fact, it can be just about anything that can be executed unattended. MDT also supports the new Universal Windows apps. + +## Driver repository + + +You also use the Deployment Workbench to import the drivers your hardware needs into a driver repository that lives on the server, not in the image. + +## Packages + + +With the Deployment Workbench, you can add any Microsoft packages that you want to use. The most commonly added packages are language packs, and the Deployment Workbench Packages node works well for those. You also can add security and other updates this way. However, we generally recommend that you use Windows Server Update Services (WSUS) for operating system updates. The rare exceptions are critical hotfixes that are not available via WSUS, packages for the boot image, or any other package that needs to be deployed before the WSUS update process starts. + +## Task sequences + + +Task sequences are the heart and soul of the deployment solution. When creating a task sequence, you need to select a template. The templates are located in the Templates folder in the MDT installation directory, and they determine which default actions are present in the sequence. + +You can think of a task sequence as a list of actions that need to be executed in a certain order. Each action can also have conditions. Some examples of actions are as follows: + +- **Gather.** Reads configuration settings from the deployment server. + +- **Format and Partition.** Creates the partition(s) and formats them. + +- **Inject Drivers.** Finds out which drivers the machine needs and downloads them from the central driver repository. + +- **Apply Operating System.** Uses ImageX to apply the image. + +- **Windows Update.** Connects to a WSUS server and updates the machine. + +## Task sequence templates + + +MDT comes with nine default task sequence templates. You can also create your own templates. As long as you store them in the Templates folder, they will be available when you create a new task sequence. + +- **Sysprep and Capture task sequence.** Used to run the System Preparation (Sysprep) tool and capture an image of a reference computer. + + **Note**   + It is preferable to use a complete build and capture instead of the Sysprep and Capture task sequence. A complete build and capture can be automated, whereas Sysprep and Capture cannot. + +   + +- **Standard Client task sequence.** The most frequently used task sequence. Used for creating reference images and for deploying clients in production. + +- **Standard Client Replace task sequence.** Used to run User State Migration Tool (USMT) backup and the optional full Windows Imaging (WIM) backup action. Can also be used to do a secure wipe of a machine that is going to be decommissioned. + +- **Custom task sequence.** As the name implies, a custom task sequence with only one default action (one Install Application action). + +- **Standard Server task sequence.** The default task sequence for deploying operating system images to servers. The main difference between this template and the Standard Client task sequence template is that it does not contain any USMT actions because USMT is not supported on servers. + +- **Lite Touch OEM task sequence.** Used to preload operating systems images on the computer hard drive. Typically used by computer original equipment manufacturers (OEMs) but some enterprise organizations also use this feature. + +- **Post OS Installation task sequence.** A task sequence prepared to run actions after the operating system has been deployed. Very useful for server deployments but not often used for client deployments. + +- **Deploy to VHD Client task sequence.** Similar to the Standard Client task sequence template but also creates a virtual hard disk (VHD) file on the target computer and deploys the image to the VHD file. + +- **Deploy to VHD Server task sequence.** Same as the Deploy to VHD Client task sequence but for servers. + +- **Standard Client Upgrade task sequence.** A simple task sequence template used to perform an in-place upgrade from Windows 7, Windows 8, or Windows 8.1 directly to Windows 10, automatically preserving existing data, settings, applications, and drivers. + +## Selection profiles + + +Selection profiles, which are available in the Advanced Configuration node, provide a way to filter content in the Deployment Workbench. Selection profiles are used for several purposes in the Deployment Workbench and in Lite Touch deployments. For example, they can be used to: + +- Control which drivers and packages are injected into the Lite Touch (and generic) boot images. + +- Control which drivers are injected during the task sequence. + +- Control what is included in any media that you create. + +- Control what is replicated to other deployment shares. + +- Filter which task sequences and applications are displayed in the Deployment Wizard. + +## Logging + + +MDT uses many log files during operating system deployments. By default the logs are client side, but by configuring the deployment settings, you can have MDT store them on the server, as well. + +**Note**   +The easiest way to view log files is to use Configuration Manager Trace (CMTrace), which is included in the [System Center 2012 R2 Configuration Manager Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=734717). + +  + +## Monitoring + + +On the deployment share, you also can enable monitoring. After you enable monitoring, you will see all running deployments in the Monitor node in the Deployment Workbench. + +## Related topics + + +[Key features in MDT 2013 Update 1](key-features-in-mdt-2013.md) + +[Prepare for deployment with MDT 2013 Update 1](prepare-for-deployment-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/migrate-application-settings.md b/windows/deploy/migrate-application-settings.md new file mode 100644 index 0000000000..15706657dc --- /dev/null +++ b/windows/deploy/migrate-application-settings.md @@ -0,0 +1,167 @@ +--- +title: Migrate Application Settings (Windows 10) +description: Migrate Application Settings +ms.assetid: 28f70a83-0a3e-4a6b-968a-2b78ccd3cc07 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Migrate Application Settings + + +You can create a custom .xml file to migrate specific line-of-business application settings or to change the default migration behavior of the User State Migration Tool (USMT) 10.0. For ScanState and LoadState to use this file, you must specify the custom .xml file on both command lines. + +This topic defines how to author a custom migration .xml file that migrates the settings of an application that is not migrated by default using MigApp.xml. You should migrate the settings after you install the application, but before the user runs the application for the first time. + +This topic does not contain information about how to migrate applications that store settings in an application-specific store, only the applications that store the information in files or in the registry. It also does not contain information about how to migrate the data that users create using the application. For example, if the application creates .doc files using a specific template, this topic does not discuss how to migrate the .doc files and templates themselves. + +## In this Topic + + +- [Before You Begin](#BKMK_BeforeBegin) + +- [Step 1: Verify that the application is installed on the source computer, and that it is the same version as the version to be installed on the destination computer](#BKMK_Step1). + +- [Step 2: Identify settings to collect and determine where each setting is stored on the computer](#BKMK_Step2). + +- [Step 3: Identify how to apply the gathered settings](#BKMK_Step3). + +- [Step 4: Create the migration XML component for the application](#BKMK_Step4). + +- [Step 5: Test the application settings migration](#BKMK_Step5). + +## Before You Begin + + +You should identify a test computer that contains the operating system of your source computers, and the application whose settings you want to migrate. For example, if you are planning on migrating from Windows 7 to Windows 10, install Windows 7 on your test computer and then install the application. + +## Step 1: Verify that the application is installed on the source computer, and that it is the same version as the version to be installed on the destination computer. + + +Before USMT migrates the settings, you need it to check whether the application is installed on the source computer, and that it is the correct version. If the application is not installed on the source computer, you probably do not want USMT to spend time searching for the application’s settings. More importantly, if USMT collects settings for an application that is not installed, it may migrate settings that will cause the destination computer to function incorrectly. You should also investigate whether there is more than one version of the application. This is because the new version may not store the settings in the same place, which may lead to unexpected results on the destination computer. + +There are many ways to detect if an application is installed. The best practice is to check for an application uninstall key in the registry, and then search the computer for the executable file that installed the application. It is important that you check for both of these items, because sometimes different versions of the same application share the same uninstall key. So even if the key is there, it may not correspond to the version of the application that you want. + +### Check the registry for an application uninstall key. + +When many applications are installed (especially those installed using the Microsoft® Windows® Installer technology), an application uninstall key is created under **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall**. For example, when Adobe Acrobat Reader 7 is installed, it creates a key named **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall \\{AC76BA86-7AD7-1033-7B44-A70000000000}**. Therefore, if a computer contains this key, then Adobe Acrobat Reader 7 is installed on the computer. You can check for the existence of a registry key using the **DoesObjectExist** helper function. + +Usually, you can find this key by searching under **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall** for the name of the application, the name of the application executable file, or for the name of the company that makes the application. You can use the Registry Editor (**Regedit.exe** located in the %**SystemRoot**%) to search the registry. + +### Check the file system for the application executable file. + +You should also check the application binaries for the executable that installed the application. To do this, you will first need to determine where the application is installed and what the name of the executable is. Most applications store the installation location of the application binaries in the registry. You should search the registry for the name of the application, the name of the application executable, or for the name of the company that makes the application, until you find the registry value that contains the installation path. Once you have determined the path to the application executable, you can use the **DoesFileVersionMatch** helper function to check for the correct version of the application executable. For an example of how to do this, see the Windows Live™ Messenger section of the MigApp.xml file. + +## Step 2: Identify settings to collect and determine where each setting is stored on the computer. + + +Next, you should go through the user interface and make a list of all of the available settings. You can reduce the list if there are settings that you do not want to migrate. To determine where each setting is stored, you will need to change each setting and monitor the activity on the registry and the file system. You do not need to migrate the binary files and registry settings that are made when the application is installed. This is because you will need to reinstall the application onto the destination computer. You only need to migrate those settings that are customizable. + +### + +**How To Determine Where Each Setting is Stored** + +1. Download a file and registry monitoring tool, such as the Regmon and Filemon tools, from the [Windows Sysinternals Web site](http://go.microsoft.com/fwlink/p/?linkid=36109). + +2. Shut down as many applications as possible to limit the registry and file system activity on the computer. + +3. Filter the output of the tools so it only displays changes being made by the application. + + **Note**   + Most applications store their settings under the user profile. That is, the settings stored in the file system are under the %**UserProfile**% directory, and the settings stored in the registry are under the **HKEY\_CURRENT\_USER** hive. For these applications you can filter the output of the file and registry monitoring tools to show activity only under these locations. This will considerably reduce the amount of output that you will need to examine. + +   + +4. Start the monitoring tool(s), change a setting, and look for registry and file system writes that occurred when you changed the setting. Make sure the changes you make actually take effect. For example, if you are changing a setting in Microsoft Word by selecting a check box in the **Options** dialog box, the change typically will not take effect until you close the dialog box by clicking **OK**. + +5. When the setting is changed, note the changes to the file system and registry. There may be more than one file or registry values for each setting. You should identify the minimal set of file and registry changes that are required to change this setting. This set of files and registry keys is what you will need to migrate in order to migrate the setting. + + **Note**   + Changing an application setting invariably leads to writing to registry keys. If possible, filter the output of the file and registry monitor tool to display only writes to files and registry keys/values. + +   + +## Step 3: Identify how to apply the gathered settings. + + +If the version of the application on the source computer is the same as the one on the destination computer, then you do not have to modify the collected files and registry keys. By default, USMT migrates the files and registry keys from the source location to the corresponding location on the destination computer. For example, if a file was collected from the C:\\Documents and Settings\\User1\\My Documents folder and the profile directory on the destination computer is located at D:\\Users\\User1, then USMT will automatically migrate the file to D:\\Users\\User1\\My Documents. However, you may need to modify the location of some settings in the following three cases: + +### Case 1: The version of the application on the destination computer is newer than the one on the source computer. + +In this case, the newer version of the application may be able to read the settings from the source computer without modification. That is, the data collected from an older version of the application is sometimes compatible with the newer version of the application. However, you may need to modify the setting location if either of the following is true: + +- **The newer version of the application has the ability to import settings from an older version.** This mapping usually happens the first time a user runs the newer version after the settings have been migrated. Some applications do this automatically after settings are migrated; however, other applications will only do this if the application was upgraded from the older version. When the application is upgraded, a set of files and/or registry keys is installed that indicates the older version of the application was previously installed. If you perform a clean installation of the newer version (which is the case in most migrations), the computer does not contain this set of files and registry keys so the mapping does not occur. In order to trick the newer version of the application into initiating this import process, your migration script may need to create these files and/or registry keys on the destination computer. + + To identify which files and/or registry keys/values need to be created to cause the import, you should upgrade the older version of the application to the newer one and monitor the changes made to the file system and registry by using the same process described in [How To determine where each setting is stored](#BKMKDetermine). Once you know the set of files that the computer needs, you can use the <`addObjects`> element to add them to the destination computer. + +- [The newer version of the application cannot read settings from the source computer and it is also unable to import the settings into the new format.](#BKMKDetermine) In this case, you will need to create a mapping for each setting from the old locations to the new locations. To do this, determine where the newer version stores each setting using the process described in How to determine where each setting is stored. After you have created the mapping, apply the settings to the new location on the destination computer using the <`locationModify`> element, and the **RelativeMove** and **ExactMove** helper functions. + +### Case 2: The destination computer already contains settings for the application. + +We recommend that you migrate the settings after you install the application, but before the user runs the application for the first time. We recommend this because this ensures that there are no settings on the destination computer when you migrate the settings. If you must install the application before the migration, you should delete any existing settings using the <`destinationCleanup`> element. If for any reason you want to preserve the settings that are on the destination computer, you can use the <`merge`> element and **DestinationPriority** helper function. + +### Case 3: The application overwrites settings when it is installed. + +We recommend that you migrate the settings after you install the application, but before the user runs the application for the first time. We recommend this because this ensures that there are no settings on the destination computer when you migrate the settings. Also, when some applications are installed, they overwrite any existing settings that are on the computer. In this scenario, if you migrated the data before you installed the application, your customized settings would be overwritten. This is common for applications that store settings in locations that are outside of the user profile (typically these are settings that apply to all users). These universal settings are sometimes overwritten when an application is installed, and they are replaced by default values. To avoid this, you must install these applications before migrating the files and settings to the destination computer. By default with USMT, data from the source computer overwrites data that already exists in the same location on the destination computer. + +## Step 4: Create the migration XML component for the application + + +After you have completed steps 1 through 3, you will need to create a custom migration .xml file that migrates the application based on the information that you now have. You can use the MigApp.xml file as a model because it contains examples of many of the concepts discussed in this topic. You can also see [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md) for another sample .xml file. + +**Note**   +We recommend that you create a separate .xml file instead of adding your script to the **MigApp.xml** file. This is because the **MigApp.xml** file is a very large file and it will be difficult to read and edit. In addition, if you reinstall USMT for some reason, the **MigApp.xml** file will be overwritten by the default version of the file and you will lose your customized version. + +  + +**Important**   +Some applications store information in the user profile that should not be migrated (for example, application installation paths, the computer name, and so on). You should make sure to exclude these files and registry keys from the migration. + +  + +Your script should do the following: + +1. Check whether the application and correct version is installed by: + + - Searching for the installation uninstall key under **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall** using the **DoesObjectExist** helper function. + + - Checking for the correct version of the application executable file using the **DoesFileVersionMatch** helper function. + +2. If the correct version of the application is installed, then ensure that each setting is migrated to the appropriate location on the destination computer. + + - If the versions of the applications are the same on both the source and destination computers, migrate each setting using the <`include`> and <`exclude`> elements. + + - If the version of the application on the destination computer is newer than the one on the source computer, and the application cannot import the settings, your script should either 1) add the set of files that trigger the import using the <`addObjects`> element or 2) create a mapping that applies the old settings to the correct location on the destination computer using the <`locationModify`> element, and the **RelativeMove** and **ExactMove** helper functions. + + - If you must install the application before migrating the settings, delete any settings that are already on the destination computer using the <`destinationCleanup`> element. + +For information about the .xml elements and helper functions, see [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md). + +## Step 5: Test the application settings migration + + +On a test computer, install the operating system that will be installed on the destination computers. For example, if you are planning on migrating from Windows 7 to Windows 10, install Windows 10 and the application. Next, run LoadState on the test computer and verify that all settings migrate. Make corrections if necessary and repeat the process until all the necessary settings are migrated correctly. + +To speed up the time it takes to collect and migrate the data, you can migrate only one user at a time, and you can exclude all other components from the migration except the application that you are testing. To specify only User1 in the migration, type: **/ue:\*\\\* /ui:user1**. For more information, see [Exclude Files and Settings](exclude-files-and-settings-usmt.md) and User options in the [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) topic. To troubleshoot a problem, check the progress log, and the ScanState and LoadState logs, which contain warnings and errors that may point to problems with the migration. + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +[Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) + +[XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) + +[Log Files](log-files-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/migrate-efs-files-and-certificates-umst.md b/windows/deploy/migrate-efs-files-and-certificates-umst.md new file mode 100644 index 0000000000..7b210b30f0 --- /dev/null +++ b/windows/deploy/migrate-efs-files-and-certificates-umst.md @@ -0,0 +1,50 @@ +--- +title: Migrate EFS Files and Certificates (Windows 10) +description: Migrate EFS Files and Certificates +ms.assetid: 7f19a753-ec45-4433-b297-cc30f16fdee1 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Migrate EFS Files and Certificates + + +This topic describes how to migrate Encrypting File System (EFS) certificates. For more information about the **/efs** For options, see [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +## To Migrate EFS Files and Certificates + + +Encrypting File System (EFS) certificates will be migrated automatically. However, by default, the User State Migration Tool (USMT) 10.0 fails if an encrypted file is found (unless you specify an **/efs** option). Therefore, you must specify **/efs:abort | skip | decryptcopy | copyraw | hardlink** with the ScanState command to migrate the encrypted files. Then, when you run the LoadState command on the destination computer, the encrypted file and the EFS certificate will be automatically migrated. + +**Note**   +The **/efs** options are not used with the LoadState command. + +  + +Before using the ScanState tool for a migration that includes encrypted files and EFS certificates, you must ensure that all files in an encrypted folder are encrypted as well or remove the encryption attribute from folders that contain unencrypted files. If the encryption attribute has been removed from a file but not from the parent folder, the file will be encrypted during the migration using the credentials of the account used to run the LoadState tool. + +You can run the Cipher tool at a Windows command prompt to review and change encryption settings on files and folders. For example, to remove encryption from a folder, at a command prompt type: + +``` syntax +Cipher /D /S: +``` + +Where *<Path>* is the full path of the topmost parent directory where the encryption attribute is set. + +## Related topics + + +[What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) + +[Identify File Types, Files, and Folders](identify-file-types-files-and-folders-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/migrate-user-accounts-usmt.md b/windows/deploy/migrate-user-accounts-usmt.md new file mode 100644 index 0000000000..4d4bf8a92c --- /dev/null +++ b/windows/deploy/migrate-user-accounts-usmt.md @@ -0,0 +1,91 @@ +--- +title: Migrate User Accounts (Windows 10) +description: Migrate User Accounts +ms.assetid: a3668361-43c8-4fd2-b26e-9a2deaeaeb09 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Migrate User Accounts + + +By default, all users are migrated. The only way to specify which users to include and exclude is on the command line by using the User options. You cannot specify users in the migration XML files or by using the Config.xml file. + +## In this Topic + + +- [To migrate all user accounts and user settings](#BKMK_MigrateAll) + +- [To migrate two domain accounts (User1 and User2)](#BKMK_MigrateTwo) + +- [To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain](#BKMK_MigrateMoveUserOne) + +## To migrate all user accounts and user settings + + +1. Log on to the source computer as an administrator, and specify the following in a **Command-Prompt** window: + + `scanstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml /o` + +2. Log on to the destination computer as an administrator. + +3. Do one of the following: + + - If you are migrating domain accounts, specify: + + `loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml` + + - If you are migrating local accounts along with domain accounts, specify: + + `loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml /lac /lae` + + **Note**   + You do not have to specify the **/lae** option, which enables the account that was created with the **/lac** option. Instead, you can create a disabled local account by specifying only the **/lac** option, and then a local administrator needs to enable the account on the destination computer. + +   + +## To migrate two domain accounts (User1 and User2) + + +1. Log on to the source computer as an administrator, and specify: + + `scanstate \\server\share\migration\mystore /ue:*\* /ui:contoso\user1 /ui:fabrikam\user2 /i:migdocs.xml /i:migapp.xml /o` + +2. Log on to the destination computer as an administrator. + +3. Specify the following: + + `loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml` + +## To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain + + +1. Log on to the source computer as an administrator, and type the following at the command-line prompt: + + `scanstate \\server\share\migration\mystore /ue:*\* /ui:contoso\user1 /ui:contoso\user2 /i:migdocs.xml /i:migapp.xml /o` + +2. Log on to the destination computer as an administrator. + +3. Specify the following: + + `loadstate \\server\share\migration\mystore /mu:contoso\user1:fabrikam\user2 /i:migdocs.xml /i:migapp.xml` + +## Related topics + + +[Identify Users](identify-users-usmt-win7-usmt-win8.md) + +[ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md) + +[LoadState Syntax](loadstate-syntax-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/migration-store-encryption-usmt-win8.md b/windows/deploy/migration-store-encryption-usmt-win8.md new file mode 100644 index 0000000000..e0a0ca87ba --- /dev/null +++ b/windows/deploy/migration-store-encryption-usmt-win8.md @@ -0,0 +1,71 @@ +--- +title: Migration Store Encryption (Windows 10) +description: Migration Store Encryption +ms.assetid: b28c2657-b986-4487-bd38-cb81500b831d +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Migration Store Encryption + + +This topic discusses User State Migration Tool (USMT) 10.0 options for migration store encryption to protect the integrity of user data during a migration. + +## USMT Encryption Options + + +USMT enables support for stronger encryption algorithms, called Advanced Encryption Standard (AES), in several bit-level options. AES is a National Institute of Standards and Technology (NIST) specification for the encryption of electronic data. + +The encryption algorithm you choose must be specified for both the **ScanState** and the **LoadState** commands, so that these commands can create or read the store during encryption and decryption. The new encryption algorithms can be specified on the **ScanState** and the **LoadState** command lines by using the **/encrypt**:*"encryptionstrength"* and the **/decrypt**:*"encryptionstrength"* command-line options. All of the encryption application programming interfaces (APIs) used by USMT are available in Windows 7, Windows 8, and Windows 10 operating systems. However, export restrictions might limit the set of algorithms that are available to computers in certain locales. You can use the Usmtutils.exe file to determine which encryption algorithms are available to the computers' locales before you begin the migration. + +The following table describes the command-line encryption options in USMT. + + +++++ + + + + + + + + + + + + + + + + + + + +
ComponentOptionDescription

ScanState

/encrypt<AES, AES_128, AES_192, AES_256, 3DES, 3DES_112>

This option and argument specify that the migration store is encrypted and which algorithm to use. When the algorithm argument is not provided, the ScanState tool employs the 3DES algorithm.

LoadState

/decrypt<AES, AES_128, AES_192, AES_256, 3DES, 3DES_112>

This option and argument specify that the store must be decrypted and which algorithm to use. When the algorithm argument is not provided, the LoadState tool employs the 3DES algorithm.

+ +  + +**Important**   +Some encryption algorithms may not be available on your systems. You can verify which algorithms are available by running the UsmtUtils command with the **/ec** option. For more information see [UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md) + +  + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/migration-store-types-overview.md b/windows/deploy/migration-store-types-overview.md new file mode 100644 index 0000000000..baae7fdace --- /dev/null +++ b/windows/deploy/migration-store-types-overview.md @@ -0,0 +1,76 @@ +--- +title: Migration Store Types Overview (Windows 10) +description: Migration Store Types Overview +ms.assetid: 3b6ce746-76c6-43ff-8cd5-02ed0ae0cf70 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Migration Store Types Overview + + +When planning your migration, you should determine which migration store type best meets your needs. As part of these considerations, determine how much space is required to run the User State Migration Tool (USMT) 10.0 components on your source and destination computers. You should also determine the space needed to create and host the migration store, whether you are using a local share, network share, or storage device. + +## In This Topic + + +[Migration Store Types](#BKMK_Types) + +[Local Store vs. Remote Store](#BKMK_LocalVRemote) + +[The /localonly Command-Line Option](#BKMK_LocalOnly) + +## Migration Store Types + + +This section describes the three migration store types available in USMT. + +### Uncompressed (UNC) + +The uncompressed (UNC) migration store is an uncompressed directory with a mirror image of the folder hierarchy being migrated. Each directory and file retains the same access permissions that it has on the local file system. You can use Windows Explorer to view this migration store type. Settings are stored in a catalog file that also describes how to restore files on the destination computer. + +### Compressed + +The compressed migration store is a single image file that contains all files being migrated and a catalog file. This image file is often encrypted and protected with a password, and cannot be navigated with Windows Explorer. + +### Hard-Link + +A hard-link migration store functions as a map that defines how a collection of bits on the hard disk are “wired” into the file system. You use the new USMT hard-link migration store in the PC Refresh scenario only. This is because the hard-link migration store is maintained on the local computer while the old operating system is removed and the new operating system is installed. Using a hard-link migration store saves network bandwidth and minimizes the server use needed to accomplish the migration. + +You use a command-line option,**/hardlink** , to create a hard-link migration store, which functions the same as an uncompressed migration store. Files are not duplicated on the local computer when user state is captured, nor are they duplicated when user state is restored. For more information, see [Hard-Link Migration Store](hard-link-migration-store-usmt-win8.md). + +The following flowchart illustrates the procedural differences between a local migration store and a remote migration store. In this example, a hard-link migration store is used for the local store. + +![migration store comparison](images/dep-win8-l-usmt-migrationcomparemigstores.gif) + +## Local Store vs. Remote Store + + +If you have enough space and you are migrating the user state back to the same computer, storing data on a local device is normally the best option to reduce server storage costs and network performance issues. You can store the data locally either on a different partition or on a removable device such as a USB flash drive (UFD). Also, depending on the imaging technology that you are using, you might be able to store the data on the partition that is being re-imaged, if the data will be protected from deletion during the process. To increase performance, store the data on high-speed drives that use a high-speed network connection. It is also good practice to ensure that the migration is the only task the server is performing. + +If there is not enough local disk space, or if you are moving the user state to another computer, then you must store the data remotely. For example, you can store it in on a shared folder, on removable media such as a UFD drive, or you can store it directly on the destination computer. For example, create and share C:\\store on the destination computer. Then run the ScanState command on the source computer and save the files and settings to \\\\*DestinationComputerName*\\store. Then, run the **LoadState** command on the destination computer and specify **C:\\Store** as the store location. By doing this, you do not need to save the files to a server. + +**Important**   +If possible, have users store their data within their %UserProfile%\\My Documents and %UserProfile%\\Application Data folders. This will reduce the chance of USMT missing critical user data that is located in a directory that USMT is not configured to check. + +  + +### The /localonly Command-Line Option + +You should use this option to exclude the data from removable drives and network drives mapped on the source computer. For more information about what is excluded when you specify **/LocalOnly**, see [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/monitor-activation-client.md b/windows/deploy/monitor-activation-client.md new file mode 100644 index 0000000000..254c5c35ad --- /dev/null +++ b/windows/deploy/monitor-activation-client.md @@ -0,0 +1,55 @@ +--- +title: Monitor activation (Windows 10) +ms.assetid: 264a3e86-c880-4be4-8828-bf4c839dfa26 +description: +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Monitor activation + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +You can monitor the success of the activation process for a computer running Windows 8.1 in several ways. The most popular methods include: + +- Using the Volume Licensing Service Center website to track use of MAK keys. + +- Using the **Slmgr /dlv** command on a client computer or on the KMS host. (For a full list of options, see [Slmgr.vbs Options](http://technet.microsoft.com/library/ff793433.aspx).) + +- Viewing the licensing status, which is exposed through Windows Management Instrumentation (WMI); therefore, it is available to non-Microsoft or custom tools that can access WMI. (Windows PowerShell can also access WMI information.) + +- Most licensing actions and events are recorded in the Event log. + +- Microsoft System Center Operations Manager and the KMS Management Pack can provide insight and information to users of System Center Operations Manager. + +- The VAMT provides a single site from which to manage and monitor volume activations. This is explained in the next section. + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/monitor-the-windows-81-deployment-with-configuration-manager.md b/windows/deploy/monitor-the-windows-81-deployment-with-configuration-manager.md new file mode 100644 index 0000000000..a7726e7898 --- /dev/null +++ b/windows/deploy/monitor-the-windows-81-deployment-with-configuration-manager.md @@ -0,0 +1,88 @@ +--- +title: Monitor the Windows 10 deployment with Configuration Manager (Windows 10) +description: In this topic, you will learn how to monitor a Windows 10 deployment that was started previously using Microsoft System Center 2012 R2 Configuration Manager and the Microsoft Deployment Toolkit (MDT) Deployment Workbench. +ms.assetid: 4863c6aa-6369-4171-8e1a-b052ca195fce +keywords: ["deploy, upgrade"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Monitor the Windows 10 deployment with Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [](#) +- [Related topics](#related_topics) + +In this topic, you will learn how to monitor a Windows 10 deployment that was started previously using Microsoft System Center 2012 R2 Configuration Manager and the Microsoft Deployment Toolkit (MDT) Deployment Workbench. You will also use the Deployment Workbench to access the computer remotely via the Microsoft Diagnostics and Recovery Toolkit (DaRT) Remote Connection feature. + +For the purposes of this topic, we will use four machines: DC01, CM01, and PC0001. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. PC0001 is a Unified Extensible Firmware Interface (UEFI) machine to which Windows 10 Enterprise has been deployed. DC01, CM01, and PC0001 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +To monitor an operating system deployment conducted through System Center 2012 R2 Configuration Manager, you will use the Deployment Workbench in MDT as follows: + +1. On CM01, using the Deployment Workbench, expand **MDT Production**, and use the **Monitoring** node to view the deployment process (press **F5** to refresh). + + **Note**   + It takes a little while for the task sequence to start reporting monitor information, so if PC0001 does not appear when you press F5 the first time, wait 20 seconds and try again. + +   + + ![figure 33](images/mdt-06-fig39.png) + + Figure 33. PC0001 being deployed by Configuration Manager. + +2. When you see the PC0001 entry, double-click **PC0001**, and then click **DaRT Remote Control** and review the **Remote Control** option. + +3. The task sequence will now run and do the following: + + 1. Install the Windows 10 operating system. + + 2. Install the Configuration Manager client and the client hotfix. + + 3. Join the machine to the domain. + + 4. Install the application added to the task sequence. + + **Note**   + You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress. + +   + +4. If time permits, allow the deployment of PC0001 to complete. Then log in as Administrator in the CONTOSO domain and verify that Adobe Reader XI was installed. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/offline-migration-reference.md b/windows/deploy/offline-migration-reference.md new file mode 100644 index 0000000000..be4b677a08 --- /dev/null +++ b/windows/deploy/offline-migration-reference.md @@ -0,0 +1,263 @@ +--- +title: Offline Migration Reference (Windows 10) +description: Offline Migration Reference +ms.assetid: f347547c-d601-4c3e-8f2d-0138edeacfda +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Offline Migration Reference + + +Offline migration enables the ScanState tool to run inside a different Windows® operating system than the Windows operating system from which ScanState is gathering files and settings. There are two primary offline scenarios: + +- **Windows PE.** The ScanState tool can be run from within Windows PE, gathering files and settings from the offline Windows operating system on that machine. + +- **Windows.old.** The ScanState tool can now gather files and settings from the Windows.old directory that is created during Windows installation on a partition that contains a previous installation of Windows. For example, the ScanState tool can run in Windows 10, gathering files from a previous Windows 7or Windows 8 installation contained in the Windows.old directory. + +When you use User State Migration Tool (USMT) 10.0 to gather and restore user state, offline migration reduces the cost of deployment by: + +- **Reducing complexity.** In computer-refresh scenarios, migrations from the Windows.old directory reduce complexity by eliminating the need for the ScanState tool to be run before the operating system is deployed. Also, migrations from the Windows.old directory enable ScanState and LoadState to be run successively. + +- **Improving performance.** When USMT runs in an offline Windows Preinstallation Environment (WinPE) environment, it has better access to the hardware resources. This may increase performance on older machines with limited hardware resources and numerous installed software applications. + +- **New recovery scenario.** In scenarios where a machine no longer restarts properly, it might be possible to gather user state with the ScanState tool from within WinPE. + +## In This Topic + + +- [What Will Migrate Offline?](#BKMK_WhatWillMigrate) + +- [What Offline Environments are Supported?](#BKMK_OfflineEnvironments) + +- [User-Group Membership and Profile Control](#BKMK_UserGroupMembership) + +- [Command-Line Options](#BKMK_CommandLineOptions) + +- [Environment Variables](#BKMK_EnvironmentVariables) + +- [Offline.xml Elements](#BKMK_OfflineXML) + +## What Will Migrate Offline? + + +The following user data and settings migrate offline, similar to an online migration: + +- Data and registry keys specified in MigXML + +- User accounts + +- Application settings + +- Limited set of operating-system settings + +- EFS files + +- Internet Explorer® Favorites + +For exceptions to what you can migrate offline, see [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md) + +## What Offline Environments are Supported? + + +The following table defines the supported combination of online and offline operating systems in USMT. + + ++++ + + + + + + + + + + + + + + + + +
Running Operating SystemOffline Operating System

WinPE 5.0 or greater, with the MSXML library

Windows Vista, Windows 7, Windows 8, Windows 10

Windows 7, Windows 8, Windows 10

Windows.old directory

+ +  + +**Note**   +It is possible to run the ScanState tool while the drive remains encrypted by suspending Windows BitLocker Drive Encryption before booting into WinPE. For more information, see [this Microsoft site](http://go.microsoft.com/fwlink/p/?LinkId=190314). + +  + +## User-Group Membership and Profile Control + + +User-group membership is not preserved during offline migrations. You must configure a **<ProfileControl>** section in the Config.xml file to specify the groups that the migrated users should be made members of. The following example places all migrated users into the Users group: + +``` syntax + + + + + + + * + + + + + + +``` + +For information about the format of a Config.xml file, see [Config.xml File](configxml-file-usmt-win7-usmt-win8.md). + +## Command-Line Options + + +An offline migration can either be enabled by using a configuration file on the command line, or by using one of the following command line options: + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
ComponentOptionDescription

ScanState.exe

/offline:<path to offline.xml>

This command-line option enables the offline-migration mode and requires a path to an Offline.xml configuration file.

ScanState.exe

/offlineWinDir:<Windows directory>

This command-line option enables the offline-migration mode and starts the migration from the location specified. It is only for use in WinPE offline scenarios where the migration is occurring from a Windows directory.

ScanState.exe

/OfflineWinOld:<Windows.old directory>

This command-line option enables the offline migration mode and starts the migration from the location specified. It is only intended to be used in Windows.old migration scenarios, where the migration is occurring from a Windows.old directory.

+ +  + +You can use only one of the **/offline**,**/offlineWinDir** , or **/OfflineWinOld** command-line options at a time; USMT does not support using more than one together. + +## Environment Variables + + +The following system environment variables are necessary in the scenarios outlined below. + + +++++ + + + + + + + + + + + + + + + + + + + +
VariableValueScenario

USMT_WORKING_DIR

Full path to a working directory

Required when USMT binaries are located on read-only media, which does not support the creation of log files or temporary storage. To set the system environment variable, at a command prompt type the following:

+
Set USMT_WORKING_DIR=[path to working directory]

MIG_OFFLINE_PLATFORM_ARCH

32 or 64

While operating offline, this environment variable defines the architecture of the offline system, if the system does not match the WinPE and Scanstate.exe architecture. This environment variable enables the 32-bit ScanState application to gather data from a computer with 64-bit architecture, or the 64-bit ScanState application to gather data from a computer with 32-bit architecture. This is required when auto-detection of the offline architecture doesn’t function properly, for example, when the source system is running a 64-bit version of Windows XP. For example, to set this system environment variable for a 32-bit architecture, at a command prompt type the following:

+
Set MIG_OFFLINE_PLATFORM_ARCH=32
+ +  + +## Offline.xml Elements + + +Use an offline.xml file when running the ScanState tool on a computer that has multiple Windows directories. The offline.xml file specifies which directories to scan for windows files. An offline.xml file can be used with the /offline option as an alternative to specifying a single Windows directory path with the /offlineDir option. + +### <offline> + +This element contains other elements that define how an offline migration is to be performed. + +Syntax: <offline> </offline> + +### <winDir> + +This element is a required child of **<offline>** and contains information about how the offline volume can be selected. The migration will be performed from the first element of **<winDir>** that contains a valid Windows system volume. + +Syntax: < winDir > </ winDir > + +### <path> + +This element is a required child of **<winDir>** and contains a file path pointing to a valid Windows directory. Relative paths are interpreted from the ScanState tool’s working directory. + +Syntax: <path> c:\\windows </path> + +-or- + +Syntax, when used with the **<mappings>** element: <path> C:\\, D:\\ </path> + +### <mappings> + +This element is an optional child of **<offline>**. When specified, the **<mappings>** element will override the automatically detected WinPE drive mappings. Each child **<path>** element will provide a mapping from one system volume to another. Additionally, mappings between folders can be provided, since an entire volume can be mounted to a specific folder. + +Syntax: <mappings> </mappings> + +### <failOnMultipleWinDir> + +This element is an optional child of **<offline>**. The **<failOnMultipleWinDir>** element allows the user to specify that the migration should fail when USMT detects that there are multiple instances of Windows installed on the source machine. When the **<failOnMultipleWinDir>** element isn’t present, the default behavior is that the migration does not fail. + +Syntax: <failOnMultipleWinDir>1</failOnMultipleWinDir> or Syntax: <failOnMultipleWinDir>0</failOnMultipleWinDir> + +### Offline .xml Example + +The following XML example illustrates some of the elements discussed earlier in this topic. + +``` syntax + + + C:\Windows + D:\Windows + E:\ + + 1 + +``` + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/perform-kms-activation-vamt-30-win8.md b/windows/deploy/perform-kms-activation-vamt-30-win8.md new file mode 100644 index 0000000000..ff9f1287ce --- /dev/null +++ b/windows/deploy/perform-kms-activation-vamt-30-win8.md @@ -0,0 +1,73 @@ +--- +title: Perform KMS Activation (Windows 10) +description: Perform KMS Activation +ms.assetid: 5a3ae8e6-083e-4153-837e-ab0a225c1d10 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Perform KMS Activation + + +The Volume Activation Management Tool (VAMT) can be used to perform volume activation using the Key Management Service (KMS). You can use VAMT to activate Generic Volume Licensing Keys, or KMS client keys, on products accessible to VAMT. GVLKs are the default product keys used by the volume-license editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft Office 2010. GVLKs are already installed in volume-license editions of these products. + +## Requirements + + +Before configuring KMS activation, ensure that your network and VAMT installation meet the following requirements: + +- KMS host is set up and enabled. + +- KMS clients can access the KMS host. + +- VAMT is installed on a central computer with network access to all client computers. + +- The products to be activated have been added to VAMT. For more information on adding product keys, see [Install a KMS Client Key](install-a-kms-client-key-vamt-30-win8.md). + +- VAMT has administrative permissions on all computers to be activated, and Windows Management Instrumentation (WMI) is accessible through the Windows Firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +## To configure computers for KMS activation + + +1. Open VAMT. + +2. If necessary, set up the KMS activation preferences. If you don’t need to set up the preferences, skip to step 6 in this procedure. Otherwise, continue to step 2. + +3. To set up the preferences, on the menu bar click **View**, then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box. + +4. Under **Key Management Services host selection**, select one of the following options: + + - **Find a KMS host automatically using DNS (default)**. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the Domain Name Service (DNS) to locate a KMS host and attempt activation. + + - **Find a KMS host using DNS in this domain for supported products**. Enter the domain name. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the DNS in the specified domain to locate a KMS host and attempt activation. + + - **Use specific KMS host**. Enter the KMS host name and KMS host port. For environments which do not use DNS for KMS host identification, VAMT sets the specified KMS host name and KMS host port on the target computer, and then instructs the computer to attempt activation with the specific KMS host. + +5. Click **Apply**, and then click **OK** to close the **Volume Activation Management Tool Preferences** dialog box. + +6. Select the products to be activated by selecting individual products in the product list view in the center pane. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +7. Click **Filter**. VAMT displays the filtered list in the center pane. + +8. In the right-side pane, click **Activate** in the **Selected Items** menu, and then click **Volume activate**. + +9. Click a credential option. Choose **Alternate credentials** only if you are activating products that require administrator credentials different from the ones you are currently using. + +10. If you are supplying alternate credentials, at the prompt, type the appropriate user name and password and click **OK**. + +VAMT displays the **Volume Activation** dialog box until it completes the requested action. When the process is finished, the updated activation status of each product appears in the product list view in the center pane. + +  + +  + + + + + diff --git a/windows/deploy/perform-local-reactivation-vamt-30-win8.md b/windows/deploy/perform-local-reactivation-vamt-30-win8.md new file mode 100644 index 0000000000..7e96b9a01d --- /dev/null +++ b/windows/deploy/perform-local-reactivation-vamt-30-win8.md @@ -0,0 +1,66 @@ +--- +title: Perform Local Reactivation (Windows 10) +description: Perform Local Reactivation +ms.assetid: aacd5ded-da11-4d27-a866-3f57332f5dec +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Perform Local Reactivation + + +If you reinstall Windows® or Microsoft® Office 2010 on a computer that was initially activated using proxy activation (MAK, retail, or CSLVK (KMS host)), and have not made significant changes to the hardware, use this local reactivation procedure to reactivate the program on that computer. + +Local reactivation relies upon data that was created during the initial proxy activation and stored in the Volume Activation Management Tool (VAMT) database. The database contains the installation ID (IID) and confirmation ID (Pending CID). Local reactivation uses this data to reapply the CID and reactivate those products. Reapplying the same CID conserves the remaining activations on the key. + +**Note**   +During the initial proxy activation, the CID is bound to a digital “fingerprint”, which is calculated from values assigned to several different hardware components in the computer. If the computer has had significant hardware changes, this fingerprint will no longer match the CID. In this case, you must obtain a new CID for the computer from Microsoft. + +  + +## To Perform a Local Reactivation + + +1. Open VAMT. Make sure that you are connected to the desired database. + +2. In the left-side pane, click the product you want to reactivate to display the products list. + +3. In the product list view in the center pane, select the desired products to be reactivated. You can sort the list by computer name by clicking on the **Computer Name** heading. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. VAMT displays the filtered list in the center pane. + +6. In the right-side pane, click **Activate**, and then click **Apply Confirmation ID**. + +7. Click a credential option. Choose **Alternate credentials** only if you are reactivating products that require administrator credentials different from the ones you are currently using. + +8. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**. + +9. VAMT displays the **Apply Confirmation ID** dialog box. + +10. If you are using a different product key than the product key used for initial activation, you must complete a new activation to obtain a new CID. + +11. If you are activating a product that requires administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** check box. + +12. Click **OK**. + +## Related topics + + +[Manage Activations](manage-activations-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/perform-online-activation-vamt-30-win8.md b/windows/deploy/perform-online-activation-vamt-30-win8.md new file mode 100644 index 0000000000..fe467f9ece --- /dev/null +++ b/windows/deploy/perform-online-activation-vamt-30-win8.md @@ -0,0 +1,78 @@ +--- +title: Perform Online Activation (Windows 10) +description: Perform Online Activation +ms.assetid: 8381792b-a454-4e66-9b4c-e6e4c9303823 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Perform Online Activation + + +You can use the Volume Activation Management Tool (VAMT) to enable client products to be activated over the Internet. You can install the client products with any kind of product key that is eligible for online activation—Multiple Activation Key (MAK), retail, and Windows Key Management Services (KMS) host key. + +## Requirements + + +Before performing online activation, ensure that the network and the VAMT installation meet the following requirements: + +- VAMT is installed on a central computer that has network access to all client computers. + +- Both the VAMT host and client computers have Internet access. + +- The products that you want to activate are added to VAMT. + +- VAMT has administrative permissions on all computers that you intend to activate, and that Windows Management Instrumentation (WMI) can be accessed through the Windows firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs. + +## To Perform an Online Activation + + +1. Open VAMT. + +2. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +4. Click **Filter**. VAMT displays the filtered list in the center pane. + +5. Select the products that you want to activate. You can use the **CTRL** key or the **SHIFT** key to select more than one product. + +6. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane and then point to **Activate**. If the **Actions** pane is not displayed, click the Show/Hide Action Pane button, which is located on the toolbar to the right of the Help button. + +7. Point to **Online activate**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password. + +8. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + +The same status is shown under the **Status of Last Action** column in the products list view in the center pane. + +**Note**   +Online activation does not enable you to save the Confirmation IDs (CIDs). As a result, you cannot perform local reactivation. + +  + +**Note**   +You can use online activation to select products that have different key types and activate the products at the same time. + +  + +## Related topics + + +[Manage Activations](manage-activations-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/perform-proxy-activation-vamt-30-win8.md b/windows/deploy/perform-proxy-activation-vamt-30-win8.md new file mode 100644 index 0000000000..85a42607ce --- /dev/null +++ b/windows/deploy/perform-proxy-activation-vamt-30-win8.md @@ -0,0 +1,81 @@ +--- +title: Perform Proxy Activation (Windows 10) +description: Perform Proxy Activation +ms.assetid: 35a919ed-f1cc-4d10-9c88-9bd634549dc3 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Perform Proxy Activation + + +You can use the Volume Activation Management Tool (VAMT) to perform activation for client computers that do not have Internet access. The client products can be installed with any type of product key that is eligible for proxy activation: Multiple activation Key (MAK), KMS Host key (CSVLK), or retail key. + +In a typical proxy-activation scenario, the VAMT host computer distributes a MAK to one or more client computers and collects the installation ID (IID) from each computer. The VAMT host computer sends the IIDs to Microsoft on behalf of the client computers and obtains the corresponding Confirmation IDs (CIDs). The VAMT host computer then installs the CIDs on the client computer to complete the activation. Using this activation method, only the VAMT host computer needs Internet access. + +**Note**   +For workgroups that are completely isolated from any larger network, you can still perform MAK, KMS Host key (CSVLK), or retail proxy activation. This requires installing a second instance of VAMT on a computer within the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. For more information about this scenario, see [Scenario 2: Proxy Activation](scenario-2-proxy-activation-vamt-30-win8.md). Similarly, you can proxy activate a KMS Host key (CSVLK) located in an isolated network. You can also proxy activate a KMS Host key (CSVLK) in the core network if you do not want the KMS host computer to connect to Microsoft over the Internet. + +  + +## Requirements + + +Before performing proxy activation, ensure that your network and the VAMT installation meet the following requirements: + +- There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you also need to have VAMT installed on one of the computers in the workgroup. + +- The products to be activated have been added to VAMT and are installed with a retail product key, a KMS Host key (CSVLK) or a MAK. If the products have not been installed with a proper product key, refer to the steps in the [Add and Remove a Product Key](add-and-remove-a-product-key-vamt-30-win8.md) section for instructions on how to install a product key. + +- VAMT has administrative permissions on all products to be activated and Windows Management Instrumentation (WMI) is accessible through the Windows firewall. + +- For workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs. + +## To Perform Proxy Activation + + +1. Open VAMT. + +2. If necessary, install product keys. For more information see: + + - [Install a Product Key](install-a-product-key-vamt-30-win8.md) to install retail, MAK, or KMS Host key (CSVLK). + + - [Install a KMS Client Key](install-a-kms-client-key-vamt-30-win8.md) to install GVLK (KMS client) keys. + +3. In the **Products** list in the center pane, select the individual products to be activated. You can use the **Filter** function to narrow your search for products by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. VAMT displays the filtered list in the center pane. + +6. In the right-side pane, click **Activate** and then click **Proxy activate** to open the **Proxy Activate** dialog box. + +7. In the **Proxy Activate** dialog box click **Apply Confirmation ID, apply to selected machine(s) and activate**. + +8. If you are activating products that require administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** checkbox. + +9. Click OK. + +10. VAMT displays the **Activating products** dialog box until it completes the requested action. If you selected the **Alternate Credentials** option, you will be prompted to enter the credentials. + +**Note**   +You can use proxy activation to select products that have different key types and activate the products at the same time. + +  + +  + +  + + + + + diff --git a/windows/deploy/plan-for-volume-activation-client.md b/windows/deploy/plan-for-volume-activation-client.md new file mode 100644 index 0000000000..1fe155ebd5 --- /dev/null +++ b/windows/deploy/plan-for-volume-activation-client.md @@ -0,0 +1,335 @@ +--- +title: Plan for volume activation (Windows 10) +description: Product activation is the process of validating software with the manufacturer after it has been installed on a specific computer. +ms.assetid: f84b005b-c362-4a70-a84e-4287c0d2e4ca +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Plan for volume activation + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +*Product activation* is the process of validating software with the manufacturer after it has been installed on a specific computer. Activation confirms that the product is genuine—not a fraudulent copy—and that the product key or serial number is valid and has not been compromised or revoked. Activation also establishes a link or relationship between the product key and the particular installation. + +During the activation process, information about the specific installation is examined. In the case of online activations, this information is sent to a server at Microsoft. This information may include the software version, the product key, the IP address of the computer, and information about the device. The activation methods that Microsoft uses are designed to help protect user privacy, and they cannot be used to track back to the computer or user. The gathered data confirms that the software is a legally licensed copy, and this data is used for statistical analysis. Microsoft does not use this information to identify or contact the user or the organization. + +**Note**   +The IP address is used only to verify the location of the request, because some editions of Windows (such as “Starter” editions) can only be activated within certain geographical target markets. + +  + +## Distribution channels and activation + + +In general, Microsoft software is obtained through three main channels: retail, original equipment manufacturer (OEM), and volume licensing agreements. Different activations methods are available through each channel. Because organizations are free to obtain software through multiple channels (for example, buying some at retail and others through a volume licensing program) most organizations choose to use a combination of activation methods. + +### Retail activations + +The retail activation method has not changed in several versions of Windows and Windows Server. Each purchased copy comes with one unique product key (often referred to as a retail key). The user enters this key during product installation. The computer uses this retail key to complete the activation after the installation is complete. Most activations are performed online, but telephone activation is also available. + +Recently, retail keys have been expanded into new distribution scenarios. Product key cards are available to activate products that have been preinstalled or downloaded. Programs such as Windows Anytime Upgrade and Get Genuine allow users to acquire legal keys separately from the software. These electronically distributed keys may come with media that contains software, they can come as a software shipment, or they may be provided on a printed card or electronic copy. Products are activated the same way with any of these retail keys. + +### Original equipment manufacturer + +Most original equipment manufacturers (OEMs) sell systems that include a standard build of the Windows operating system. The hardware vendor activates Windows by associating the operating system with the firmware (BIOS) of the computer. This occurs before the computer is sent to the customer, and no additional actions are required. + +OEM activation is valid as long as the customer uses the OEM-provided image on the system. OEM activation is available only for computers that are purchased through OEM channels and have the Windows operating system preinstalled. + +### Volume licensing + +Volume licensing offers customized programs that are tailored to the size and purchasing preference of the organization. To become a volume licensing customer, the organization must set up a volume licensing agreement with Microsoft.There is a common misunderstanding about acquiring licenses for a new computer through volume licensing. There are two legal ways to acquire a full Windows client license for a new computer: + +- Have the license preinstalled through the OEM. + +- Purchase a fully packaged retail product. + +The licenses that are provided through volume licensing programs such as Open License, Select License, and Enterprise Agreements cover upgrades to Windows client operating systems only. An existing retail or OEM operating system license is needed for each computer running Windows 10, Windows 8.1 Pro, Windows 8 Pro, Windows 7 Professional or Ultimate, or Windows XP Professional before the upgrade rights obtained through volume licensing can be exercised. + +Volume licensing is also available through certain subscription or membership programs, such as the Microsoft Partner Network and MSDN. These volume licenses may contain specific restrictions or other changes to the general terms applicable to volume licensing. + +**Note**   +Some editions of the operating system, such as Windows 10 Enterprise, and some editions of application software are available only through volume licensing agreements or subscriptions. + +  + +## Activation models + + +For a user or IT department, there are no significant choices about how to activate products that are acquired through retail or OEM channels. The OEM performs the activation at the factory, and the user or the IT department need take no activation steps. + +With a retail product, the Volume Activation Management Tool (VAMT), which is discussed later in this guide, helps you track and manage keys. For each retail activation, you can choose: + +- Online activation + +- Telephone activation + +- VAMT proxy activation + +Telephone activation is primarily used in situations where a computer is isolated from all networks. VAMT proxy activation (with retail keys) is sometimes used when an IT department wants to centralize retail activations or when a computer with a retail version of the operating system is isolated from the Internet but connected to the LAN. For volume-licensed products, however, you must determine the best method or combination of methods to use in your environment. For Windows 10 Pro and Enterprise, you can choose from three models: + +- MAKs + +- KMS + +- Active Directory-based activation + +**Note**   +A specialized method, Token-based activation, is available for specific situations when approved customers rely on a public key infrastructure in a completely isolated, and usually high-security, environment. For more information, contact your Microsoft Account Team or your service representative. + +  + +### Multiple activation key + +A Multiple Activation Key (MAK) is commonly used in small- or mid-sized organizations that have a volume licensing agreement, but they do not meet the requirements to operate a KMS or they prefer a simpler approach. A MAK also allows permanent activation of computers that are isolated from the KMS or are part of an isolated network that does not have enough computers to use the KMS. + +To use a MAK, the computers to be activated must have a MAK installed. The MAK is used for one-time activation with the Microsoft online hosted activation services, by telephone, or by using VAMT proxy activation. + +In the simplest terms, a MAK acts like a retail key, except that a MAK is valid for activating multiple computers. Each MAK can be used a specific number of times. The VAMT can assist in tracking the number of activations that have been performed with each key and how many remain. + +Organizations can download MAK and KMS keys from the [Volume Licensing Service Center](http://go.microsoft.com/fwlink/p/?LinkId=618213) website. Each MAK has a preset number of activations, which are based on a percentage of the count of licenses the organization purchases; however, you can increase the number of activations that are available with your MAK by calling Microsoft. + +### Key Management Service + +With the Key Management Service (KMS), IT pros can complete activations on their local network, eliminating the need for individual computers to connect to Microsoft for product activation. The KMS is a lightweight service that does not require a dedicated system and can easily be cohosted on a system that provides other services. + +Volume editions of Windows 10 and Windows Server 2012 R2 (in addition to volume editions of operating system editions since Windows Vista and Windows Server 2008) automatically connect to a system that hosts the KMS to request activation. No action is required from the user. + +The KMS requires a minimum number of computers (physical computers or virtual machines) in a network environment. The organization must have at least five computers to activate Windows Server 2012 R2 and at least 25 computers to activate client computers that are running Windows 10. These minimums are referred to as *activation thresholds*. + +Planning to use the KMS includes selecting the best location for the KMS host and how many KMS hosts to have. One KMS host can handle a large number of activations, but organizations will often deploy two KMS hosts to ensure availability. Only rarely would more than two KMS hosts be used. The KMS can be hosted on a client computer or on a server, and it can be run on older versions of the operating system if proper configuration steps are taken. Setting up your KMS is discussed later in this guide. + +### Active Directory-based activation + +Active Directory-based activation is the newest type of volume activation, and it was introduced in Windows 8. In many ways, Active Directory-based activation is similar to activation by using the KMS, but the activated computer does not need to maintain periodic connectivity with the KMS host. Instead, a domain-joined computer running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 queries AD DS for a volume activation object that is stored in the domain. The operating system checks the digital signatures that are contained in the activation object, and then activates the device. + +Active Directory-based activation allows enterprises to activate computers through a connection to their domain. Many companies have computers at remote or branch locations, where it is impractical to connect to a KMS, or would not reach the KMS activation threshold. Rather than use MAKs, Active Directory-based activation provides a way to activate computers running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 as long as the computers can contact the company’s domain. Active Directory-based activation offers the advantage of extending volume activation services everywhere you already have a domain presence. + +## Network and connectivity + + +A modern business network has many nuances and interconnections. This section examines evaluating your network and the connections that are available to determine how volume activations will occur. + +### Core network + +Your core network is that part of your network that enjoys stable, high-speed, reliable connectivity to infrastructure servers. In many cases, the core network is also connected to the Internet, although that is not a requirement to use the KMS or Active Directory-based activation after the KMS server or AD DS is configured and active. Your core network likely consists of many network segments. In many organizations, the core network makes up the vast majority of the business network. + +In the core network, a centralized KMS solution is usually recommended. You can also use Active Directory-based activation, but in many organizations, KMS will still be required to activate older client computers and computers that are not joined to the domain. Some administrators prefer to run both solutions to have the most flexibility, while others prefer to choose only a KMS-based solution for simplicity. Active Directory-based activation as the only solution is workable if all of the clients in your organization are running Windows 10, Windows 8.1, or Windows 8. + +A typical core network that includes a KMS host is shown in Figure 1. + +![core network](images/volumeactivationforwindows81-01.jpg) + +**Figure 1**. Typical core network + +### Isolated networks + +In a large network, it is all but guaranteed that some segments will be isolated, either for security reasons or because of geography or connectivity issues. + +**Isolated for security** + +Sometimes called a *high-security zone*, a particular network segment may be isolated from the core network by a firewall or disconnected from other networks totally. The best solution for activating computers in an isolated network depends on the security policies in place in the organization. + +If the isolated network can access the core network by using outbound requests on TCP port 1688, and it is allowed to receive remote procedure calls (RPCs), you can perform activation by using the KMS in the core network, thereby avoiding the need to reach additional activation thresholds. + +If the isolated network participates fully in the corporate forest, and it can make typical connections to domain controllers, such as using Lightweight Directory Access Protocol (LDAP) for queries and Domain Name Service (DNS) for name resolution, this is a good opportunity to use Active Directory-based activation for Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012 R2. + +If the isolated network cannot communicate with the core network’s KMS server, and it cannot use Active Directory-based activation, you can set up a KMS host in the isolated network. This configuration is shown in Figure 2. However, if the isolated network contains only a few computers, it will not reach the KMS activation threshold. In that case, you can activate by using MAKs. + +If the network is fully isolated, MAK-independent activation would be the recommended choice, perhaps using the telephone option. But VAMT proxy activation may also be possible. You can also use MAKs to activate new computers during setup, before they are placed in the isolated network. + +![kms host isolated network](images/volumeactivationforwindows81-02.jpg) + +**Figure 2**. New KMS host in an isolated network + +**Branch offices and distant networks** + +From mining operations to ships at sea, organizations often have a few computers that are not easily connected to the core network or the Internet. Some organizations have network segments at branch offices that are large and well-connected internally, but have a slow or unreliable WAN link to the rest of the organization. In these situations, you have several options: + +- **Active Directory-based activation**. In any site where the client computers are running Windows 10, Active Directory-based activation is supported, and it can be activated by joining the domain. + +- **Local KMS**. If a site has 25 or more client computers, it can activate against a local KMS server. + +- **Remote (core) KMS**. If the remote site has connectivity to an existing KMS (perhaps through a virtual private network (VPN) to the core network), that KMS can be used. Using the existing KMS means that you only need to meet the activation threshold on that server. + +- **MAK activation**. If the site has only a few computers and no connectivity to an existing KMS host, MAK activation is the best option. + +### Disconnected computers + +Some users may be in remote locations or may travel to many locations. This scenario is common for roaming clients, such as the computers that are used by salespeople or other users who are offsite but not at branch locations. This scenario can also apply to remote branch office locations that have no connection to the core network. You can consider this an “isolated network,” where the number of computers is one. Disconnected computers can use Active Directory-based activation, the KMS, or MAK depending on the client version and how often the computers connect to the core network. + +If the computer is joined to the domain and running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 8, you can use Active Directory-based activation—directly or through a VPN—at least once every 180 days. If the computer connects to a network with a KMS host at least every 180 days, but it does not support Active Directory-based activation, you can use KMS activation. Otherwise for computers that rarely or never connect to the network, use MAK independent activation (by using the telephone or the Internet). + +### Test and development labs + +Lab environments often have large numbers of virtual machines, and physical computers and virtual machines in labs are reconfigured frequently. Therefore, first determine whether the computers in test and development labs require activation. Editions of Windows 10 that include volume licensing will operate normally, even if they cannot activate immediately. + +If you have ensured that your test or development copies of the operating system are within the license agreement, you may not need to activate the lab computers if they will be rebuilt frequently. If you require that the lab computers be activated, treat the lab as an isolated network and use the methods described earlier in this guide. + +In labs that have a high turnover of computers and a small number of KMS clients, you must monitor the KMS activation count. You might need to adjust the time that the KMS caches the activation requests. The default is 30 days. + +## Mapping your network to activation methods + + +Now it’s time to assemble the pieces into a working solution. By evaluating your network connectivity, the numbers of computers you have at each site, and the operating system versions in use in your environment, you have collected the information you need to determine which activation methods will work best for you. You can fill-in information in Table 1 to help you make this determination. + +**Table 1**. Criteria for activation methods + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
CriterionActivation methodNumber of computers

Number of domain-joined computers that support Active Directory-based activation (computers running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2) and will connect to a domain controller at least every 180 days. Computers can be mobile, semi-isolated, or located in a branch office or the core network.

Active Directory-based activation

Number of computers in the core network that will connect (directly or through a VPN) at least every 180 days

+

Note: The core network must meet the KMS activation threshold.

KMS (central)

Number of computers that do not connect to the network at least once every 180 days (or if no network meets the activation threshold)

MAM

Number of computers in semi-isolated networks that have connectivity to the KMS in the core network

KMS (central)

Number of computers in isolated networks where the KMS activation threshold is met

KMS (local)

Number of computers in isolated networks where the KMS activation threshold is not met

MAK

Number of computers in test and development labs that will not be activated

None

Number of computers that do not have a retail volume license

Retail (online or phone)

Number of computers that do not have an OEM volume license

OEM (at factory)

Total number of computer activations

+

Note: This total should match the total number of licensed computers in your organization.

+ +  + +## Choosing and acquiring keys + + +When you know which keys you need, you must obtain them. Generally speaking, volume licensing keys are collected in two ways: + +- Go to the **Product Keys** section of the [Volume Licensing Service Center](http://go.microsoft.com/fwlink/p/?LinkID=618213) for the following agreements: Open, Open Value, Select, Enterprise, and Services Provider License. + +- Contact your [Microsoft Activation Center](http://go.microsoft.com/fwlink/p/?LinkId=618264). + +### KMS host keys + +A KMS host needs a key that activates, or authenticates, the KMS host with Microsoft. This key is usually referred to as the *KMS host key*, but it is formally known as a *Microsoft Customer Support Volume License Key* (CSVLK). Most documentation and Internet references earlier than Windows 8.1 use the term KMS key, but CSVLK is becoming more common in current documentation and management tools. + +A KMS host running Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2 can activate both Windows Server and Windows client operating systems. A KMS host key is also needed to create the activation objects in AD DS, as described later in this guide. You will need a KMS host key for any KMS that you want to set up and if you are going to use Active Directory-based activation. + +### Generic volume licensing keys + +When you create installation media or images for client computers that will be activated by KMS or Active Directory-based activation, install a generic volume license key (GVLK) for the edition of Windows you are creating. GVLKs are also referred to as KMS client setup keys. + +Installation media from Microsoft for Enterprise editions of the Windows operating system may already contain the GVLK. One GVLK is available for each type of installation. Note that the GLVK will not activate the software against Microsoft activation servers, only against a KMS or Active Directory-based activation object. In other words, the GVLK does not work unless a valid KMS host key can be found. GVLKs are the only product keys that do not need to be kept confidential. + +Typically, you will not need to manually enter a GVLK unless a computer has been activated with a MAK or a retail key and it is being converted to a KMS activation or to Active Directory-based activation. If you need to locate the GVLK for a particular client edition, see [Appendix A: KMS Client Setup Keys](http://technet.microsoft.com/library/jj612867.aspx). + +### Multiple activation keys + +You will also need MAK keys with the appropriate number of activations available. You can see how many times a MAK has been used on the Volume Licensing Service Center website or in the VAMT. + +## Selecting a KMS host + + +The KMS does not require a dedicated server. It can be cohosted with other services, such as AD DS domain controllers and read-only domain controllers. + +KMS hosts can run on physical computers or virtual machines that are running any supported Windows operating system. A KMS host that is running Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2 can activate any Windows client or server operating system that supports volume activation. A KMS host that is running Windows 10 can activate only computers running Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista. + +A single KMS host can support unlimited numbers of KMS clients, but Microsoft recommends deploying a minimum of two KMS hosts for failover purposes. However, as more clients are activated through Active Directory-based activation, the KMS and the redundancy of the KMS will become less important. Most organizations can use as few as two KMS hosts for their entire infrastructure. + +The flow of KMS activation is shown in Figure 3, and it follows this sequence: + +1. An administrator uses the VAMT console to configure a KMS host and install a KMS host key. + +2. Microsoft validates the KMS host key, and the KMS host starts to listen for requests. + +3. The KMS host updates resource records in DNS to allow clients to locate the KMS host. (Manually adding DNS records is required if your environment does not support DNS dynamic update protocol.) + +4. A client configured with a GVLK uses DNS to locate the KMS host. + +5. The client sends one packet to the KMS host. + +6. The KMS host records information about the requesting client (by using a client ID). Client IDs are used to maintain the count of clients and detect when the same computer is requesting activation again. The client ID is only used to determine whether the activation thresholds are met. The IDs are not stored permanently or transmitted to Microsoft. If the KMS is restarted, the client ID collection starts again. + +7. If the KMS host has a KMS host key that matches the products in the GVLK, the KMS host sends a single packet back to the client. This packet contains a count of the number of computers that have requested activation from this KMS host. + +8. If the count exceeds the activation threshold for the product that is being activated, the client is activated. If the activation threshold has not yet been met, the client will try again. + +![kms activation flow](images/volumeactivationforwindows81-03.jpg) + +**Figure 3**. KMS activation flow + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/plan-your-migration-usmt-win7-usmt-win8.md b/windows/deploy/plan-your-migration-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..7370237615 --- /dev/null +++ b/windows/deploy/plan-your-migration-usmt-win7-usmt-win8.md @@ -0,0 +1,66 @@ +--- +title: Plan Your Migration (Windows 10) +description: Plan Your Migration +ms.assetid: c951f7df-850e-47ad-b31b-87f902955e3e +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Plan Your Migration + + +Before you use the User State Migration Tool (USMT) 10.0 to perform your migration, we recommend that you plan your migration carefully. Planning can help your migration proceed smoothly and can reduce the risk of migration failure. + +In migration planning, both organizations and individuals must first identify what to migrate, including user settings, applications and application settings, and personal data files and folders. Identifying the applications to migrate is especially important so that you can avoid capturing data about applications that may be phased out. + +One of the most important requirements for migrating settings and data is restoring only the information that the destination computer requires. Although the data that you capture on the source computer may be more comprehensive than the restoration data for backup purposes, restoring data or settings for applications that you will not install on the destination system is redundant. This can also introduce instability in a newly deployed computer. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + +

[Common Migration Scenarios](common-migration-scenarios-usmt-win7-usmt-win8.md)

Determine whether you will perform a refresh migration or a replace migration.

[What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md)

Learn which applications, user data, and operating system components USMT migrates.

[Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md)

Choose an uncompressed, compressed, or hard-link migration store.

[Determine What to Migrate](determine-what-to-migrate-usmt-win7-usmt-win8.md)

Identify user accounts, application settings, operating system settings, and files that you want to migrate inside your organization.

[Test Your Migration](test-your-migration-usmt-win7-usmt-win8.md)

Test your migration before you deploy Windows to all users.

+ +  + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/prepare-for-deployment-with-mdt-2013.md b/windows/deploy/prepare-for-deployment-with-mdt-2013.md new file mode 100644 index 0000000000..1aa988dc0f --- /dev/null +++ b/windows/deploy/prepare-for-deployment-with-mdt-2013.md @@ -0,0 +1,191 @@ +--- +title: Prepare for deployment with MDT 2013 Update 1 (Windows 10) +description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT) 2013 Update 1. +ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226 +keywords: ["deploy, system requirements"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Prepare for deployment with MDT 2013 Update 1 + + +**Applies to** + +- Windows 10 + +**In this article** + +- [System requirements](#sec01) +- [Install Windows ADK for Windows 10](#sec02) +- [Install MDT 2013 Update 1](#sec03) +- [Create the OU structure](#sec04) +- [Create the MDT service account](#sec05) +- [Create and share the logs folder](#sec06) +- [Use CMTrace to read log files (optional)](#sec07) +- [Related topics](#related_topics) + +This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT) 2013 Update 1. It covers the installation of the necessary system prerequisites, the creation of shared folders and service accounts, and the configuration of security permissions in the files system and in Active Directory. + +For the purposes of this topic, we will use two machines: DC01 and MDT01. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. MDT01 is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +## System requirements + + +MDT 2013 Update 1 requires the following components: + +- Any of the following operating systems: + + - Windows 7 + + - Windows 8 + + - Windows 8.1 + + - Windows 10 + + - Windows Server 2008 R2 + + - Windows Server 2012 + + - Windows Server 2012 R2 + +- Windows Assessment and Deployment Kit (ADK) for Windows 10 + +- Windows PowerShell + +- Microsoft .NET Framework + +## Install Windows ADK for Windows 10 + + +These steps assume that you have the MDT01 member server installed and configured and that you have downloaded [Windows ADK for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526803) to the E:\\Downloads\\ADK folder. + +1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**. + +2. Start the **ADK Setup** (E:\\Downloads\\ADK\\adksetup.exe), and on the first wizard page, click **Continue**. + +3. On the **Select the features you want to change** page, select the features below and complete the wizard using the default settings: + + 1. Deployment Tools + + 2. Windows Preinstallation Environment (Windows PE) + + 3. User State Migration Tool (UMST) + +## Install MDT 2013 Update 1 + + +These steps assume that you have downloaded [MDT 2013 Update 1](http://go.microsoft.com/fwlink/p/?LinkId=618117 ) to the E:\\Downloads\\MDT 2013 folder on MDT01. + +1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**. + +2. Install **MDT** (E:\\Downloads\\MDT 2013\\MicrosoftDeploymentToolkit2013\_x64.msi) with the default settings. + +## Create the OU structure + + +If you do not have an organizational unit (OU) structure in your Active Directory, you should create one. In this section, you create an OU structure and a service account for MDT 2013 Update 1. + +1. On DC01, using Active Directory User and Computers, in the contoso.com domain level, create a top-level OU named **Contoso**. + +2. In the **Contoso** OU, create the following OUs: + + 1. Accounts + + 2. Computers + + 3. Groups + +3. In the **Contoso / Accounts** OU, create the following underlying OUs: + + 1. Admins + + 2. Service Accounts + + 3. Users + +4. In the **Contoso / Computers** OU, create the following underlying OUs: + + 1. Servers + + 2. Workstations + +5. In the **Contoso / Groups** OU, create the following OU: + + - Security Groups + +![figure 6](images/mdt-05-fig07.png) + +Figure 6. A sample of how the OU structure will look after all the OUs are created. + +## Create the MDT service account + + +When creating a reference image, you need an account for MDT. The MDT Build Account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01. + +1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**. + +2. Select the **Service Accounts** OU and create the **MDT\_BA** account using the following settings: + + 1. Name: MDT\_BA + + 2. User logon name: MDT\_BA + + 3. Password: P@ssw0rd + + 4. User must change password at next logon: Clear + + 5. User cannot change password: Selected + + 6. Password never expires: Selected + +## Create and share the logs folder + + +By default MDT stores the log files locally on the client. In order to capture a reference image, you will need to enable server-side logging and, to do that, you will need to have a folder in which to store the logs. For more information, see [Create a Windows 10 reference image](create-a-windows-81-reference-image.md). + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create and share the **E:\\Logs** folder by running the following commands in an elevated Windows PowerShell prompt: + + ``` syntax + New-Item -Path E:\Logs -ItemType directory + New-SmbShare ?Name Logs$ ?Path E:\Logs -ChangeAccess EVERYONE + icacls E:\Logs /grant '"MDT_BA":(OI)(CI)(M)' + ``` + +![figure 7](images/mdt-05-fig08.png) + +Figure 7. The Sharing tab of the E:\\Logs folder after sharing it with PowerShell. + +## Use CMTrace to read log files (optional) + + +The log files in MDT Lite Touch are formatted to be read by Configuration Manager Trace (CMTrace), which is available as part [of Microsoft System Center 2012 R2 Configuration Manager Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=734717). You can use Notepad, but CMTrace formatting makes the logs easier to read. + +![figure 8](images/mdt-05-fig09.png) + +Figure 8. An MDT log file opened in Notepad. + +![figure 9](images/mdt-05-fig10.png) + +Figure 9. The same log file, opened in CMTrace, is much easier to read. + +## Related topics + + +[Key features in MDT 2013 Update 1](key-features-in-mdt-2013.md) + +[MDT 2013 Update 1 Lite Touch components](mdt-2013-lite-touch-components.md) + +  + +  + + + + + diff --git a/windows/deploy/prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md b/windows/deploy/prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md new file mode 100644 index 0000000000..d26857d8bb --- /dev/null +++ b/windows/deploy/prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md @@ -0,0 +1,289 @@ +--- +title: Prepare for Zero Touch Installation of Windows 10 with Configuration Manager (Windows 10) +description: This topic will walk you through the process of integrating Microsoft System Center 2012 R2 Configuration Manager SP1 with Microsoft Deployment Toolkit (MDT) 2013 Update 1, as well as the other preparations needed to deploying Windows 10 via Zero Touch Installation. Additional preparations include the installation of hotfixes as well as activities that speed up the Pre-Boot Execution Environment (PXE). +ms.assetid: 06e3a221-31ef-47a5-b4da-3b927cb50d08 +keywords: ["install, configure, deploy, deployment"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Prepare for Zero Touch Installation of Windows 10 with Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Prerequisites](#prerequisites) +- [Create the Configuration Manager service accounts](#sec01) +- [Configure Active Directory permissions](#sec02) +- [Review the Sources folder structure](#sec03) +- [Integrate Configuration Manager with MDT](#sec04) +- [Configure the client settings](#sec06) +- [Configure the Network Access account](#sec07) +- [Enable PXE on the CM01 distribution point](#sec08) +- [Related topics](#related_topics) + +This topic will walk you through the process of integrating Microsoft System Center 2012 R2 Configuration Manager SP1 with Microsoft Deployment Toolkit (MDT) 2013 Update 1, as well as the other preparations needed to deploying Windows 10 via Zero Touch Installation. Additional preparations include the installation of hotfixes as well as activities that speed up the Pre-Boot Execution Environment (PXE). + +## Prerequisites + + +In this topic, you will use an existing Configuration Manager server structure to prepare for operating system deployment. In addition to the base setup, the following configurations should be made in the Configuration Manager environment: + +- Active Directory Schema has been extended and System Management container created. + +- Active Directory Forest Discovery and Active Directory System Discovery have been enabled. + +- IP range boundaries and a boundary group for content and site assignment have been created. + +- The Configuration Manager reporting services point role has been added and configured + +- A file system folder structure for packages has been created. + +- A Configuration Manager console folder structure for packages has been created. + +- System Center 2012 R2 Configuration Manager SP1 and any additional Windows 10 prerequisites are installed. + +For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. DC01 and CM01 are both members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +## Create the Configuration Manager service accounts + + +To configure permissions for the various service accounts needed for operating system deployment in Configuration Manager, you use a role-based model. To create the Configuration Manager Join Domain account as well as the Configuration Manager Network Access account, follow these steps: + +1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**. + +2. Select the Service Accounts OU and create the CM\_JD account using the following settings: + + 1. Name: CM\_JD + + 2. User logon name: CM\_JD + + 3. Password: P@ssw0rd + + 4. User must change password at next logon: Clear + + 5. User cannot change password: Select + + 6. Password never expires: Select + +3. Repeat the step, but for the CM\_NAA account. + +4. After creating the accounts, assign the following descriptions: + + 1. CM\_JD: Configuration Manager Join Domain Account + + 2. CM\_NAA: Configuration Manager Network Access Account + +![figure 6](images/mdt-06-fig06.png) + +Figure 6. The Configuration Manager service accounts used for operating system deployment. + +## Configure Active Directory permissions + + +In order for the Configuration Manager Join Domain Account (CM\_JD) to join machines into the contoso.com domain you need to configure permissions in Active Directory. These steps assume you have downloaded the sample [Set-OUPermissions.ps1 script](http://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to C:\\Setup\\Scripts on DC01. + +1. On DC01, log on as Administrator in the CONTOSO domain using the password **P@ssw0rd**. + +2. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands, pressing **Enter** after each command: + + ``` syntax + Set-ExecutionPolicy -ExecutionPolicy RemoteSigned ?Force + + Set-Location C:\Setup\Scripts + + .\Set-OUPermissions.ps1 -Account CM_JD + -TargetOU "OU=Workstations,OU=Computers,OU=Contoso" + ``` + +3. The Set-OUPermissions.ps1 script allows the CM\_JD user account permissions to manage computer accounts in the Contoso / Computers / Workstations OU. The following is a list of the permissions being granted: + + 1. Scope: This object and all descendant objects + + 2. Create Computer objects + + 3. Delete Computer objects + + 4. Scope: Descendant Computer objects + + 5. Read All Properties + + 6. Write All Properties + + 7. Read Permissions + + 8. Modify Permissions + + 9. Change Password + + 10. Reset Password + + 11. Validated write to DNS host name + + 12. Validated write to service principal name + +## Review the Sources folder structure + + +To support the packages you create in this section, the following folder structure should be created on the Configuration Manager primary site server (CM01): + +**Note**   +In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server. + +  + +- E:\\Sources + +- E:\\Sources\\OSD + +- E:\\Sources\\OSD\\Boot + +- E:\\Sources\\OSD\\DriverPackages + +- E:\\Sources\\OSD\\DriverSources + +- E:\\Sources\\OSD\\MDT + +- E:\\Sources\\OSD\\OS + +- E:\\Sources\\OSD\\Settings + +- E:\\Sources\\Software + +- E:\\Sources\\Software\\Adobe + +- E:\\Sources\\Software\\Microsoft + +![figure 7](images/mdt-06-fig07.png) + +Figure 7. The E:\\Sources\\OSD folder structure. + +## Integrate Configuration Manager with MDT + + +To extend the Configuration Manager console with MDT 2013 Update 1 wizards and templates, you install MDT 2013 Update 1 in the default location and run the integration setup. In these steps, we assume you have downloaded MDT 2013 Update 1 to the C:\\Setup\\MDT2013 folder on CM01. + +1. On CM01, log on as Administrator in the CONTOSO domain using the password **P@ssw0rd**. + +2. Make sure the Configuration Manager Console is closed before continuing. + +3. Using File Explorer, navigate to the **C:\\Setup\\MDT 2013** folder. + +4. Run the MDT 2013 setup (MicrosoftDeploymentToolkit2013\_x64.msi), and use the default options in the setup wizard. + +5. From the Start screen, run Configure ConfigManager Integration with the following settings: + + 1. Site Server Name: CM01.contoso.com + + 2. Site code: PS1 + +![figure 8](images/mdt-06-fig08.png) + +Figure 8. Set up the MDT 2013 Update 1 integration with Configuration Manager. + +## Configure the client settings + + +Most organizations want to display their name during deployment. In this section, you configure the default Configuration Manager client settings with the Contoso organization name. + +1. On CM01, using the Configuration Manager Console, in the Administration workspace, select **Client Settings**. + +2. In the right pane, right-click **Default Client Settings**, and select **Properties**. + +3. In the **Computer Agent** node, in the **Organization name displayed in Software Center** text box, type in **Contoso** and click **OK**. + +![figure 9](images/mdt-06-fig10.png) + +Figure 9. Configure the organization name in client settings. + +![figure 10](images/fig10-contosoinstall.png) + +Figure 10. The Contoso organization name displayed during deployment. + +## Configure the Network Access account + + +Configuration Manager uses the Network Access account during the Windows 10 deployment process to access content on the distribution point(s). In this section, you configure the Network Access account. + +1. Using the Configuration Manager Console, in the Administration workspace, expand **Site Configuration** and select **Sites**. + +2. Right-click **PS1 - Primary Site 1**, select **Configure Site Components**, and then select **Software Distribution**. + +3. In the **Network Access Account** tab, configure the **CONTOSO\\CM\_NAA** user account (select New Account) as the Network Access account. Use the new **Verify** option to verify that the account can connect to the **\\\\DC01\\sysvol** network share. + +![figure 11](images/mdt-06-fig12.png) + +Figure 11. Test the connection for the Network Access account. + +## Enable PXE on the CM01 distribution point + + +Configuration Manager has many options for starting a deployment, but starting via PXE is certainly the most flexible in a large environment. In this section, you enable PXE on the CM01 distribution point. + +1. In the Configuration Manager Console, in the Administration workspace, select **Distribution Points**. + +2. Right-click the **\\\\CM01.CONTOSO.COM distribution point** and select **Properties**. + +3. In the **PXE** tab, select the following settings: + + 1. Enable PXE support for clients + + 2. Allow this distribution point to respond to incoming PXE requests + + 3. Enable unknown computer support + + 4. Require a password when computers use PXE + + 5. Password and Confirm password: Passw0rd! + + ![figure 12](images/mdt-06-fig13.png) + + Figure 12. Configure the CM01 distribution point for PXE. + +4. Using the Configuration Manager Trace Log Tool, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Look for ConfigurePXE and CcmInstallPXE lines. + + ![figure 13](images/mdt-06-fig14.png) + + Figure 13. The distmgr.log displays a successful configuration of PXE on the distribution point. + +5. Verify that you have seven files in each of the folders **E:\\RemoteInstall\\SMSBoot\\x86** and **E:\\RemoteInstall\\SMSBoot\\x64**. + + ![figure 14](images/mdt-06-fig15.png) + + Figure 14. The contents of the E:\\RemoteInstall\\SMSBoot\\x64 folder after you enable PXE. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/recognized-environment-variables-usmt-win7-usmt-win8.md b/windows/deploy/recognized-environment-variables-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..4fab1fa15d --- /dev/null +++ b/windows/deploy/recognized-environment-variables-usmt-win7-usmt-win8.md @@ -0,0 +1,465 @@ +--- +title: Recognized Environment Variables (Windows 10) +description: Recognized Environment Variables +ms.assetid: 2b0ac412-e131-456e-8f0c-c26249b5f3df +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Recognized Environment Variables + + +When using the XML files MigDocs.xml, MigApp.xml, and MigUser.xml, you can use environment variables to identify folders that may be different on different computers. Constant special item ID list (CSIDL) values provide a way to identify folders that applications use frequently but may not have the same name or location on any given computer. For example, the documents folder may be C:\\Users\\<Username>\\My Documents on one computer and C:\\Documents and Settings on another. You can use the asterisk (\*) wildcard character in MigUser.xml, MigApp.xml and MigDoc.xml files. However, you cannot use the asterisk (\*) wildcard characters in the Config.xml file. + +## In This Topic + + +- [Variables that are processed for the operating system and in the context of each user](#BKMK_1) + +- [Variables that are recognized only in the user context](#BKMK_2) + +## Variables that are processed for the operating system and in the context of each user + + +You can use these variables within sections in the .xml files with `context=UserAndSystem`, `context=User`, and `context=System`. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
VariableExplanation

ALLUSERSAPPDATA

Same as CSIDL_COMMON_APPDATA.

ALLUSERSPROFILE

Refers to %PROFILESFOLDER%\Public or %PROFILESFOLDER%\all users.

COMMONPROGRAMFILES

Same as CSIDL_PROGRAM_FILES_COMMON.

COMMONPROGRAMFILES(X86)

Refers to the C:\Program Files (x86)\Common Files folder on 64-bit systems.

CSIDL_COMMON_ADMINTOOLS

Version 10.0. The file-system directory that contains administrative tools for all users of the computer.

CSIDL_COMMON_ALTSTARTUP

The file-system directory that corresponds to the non-localized Startup program group for all users.

CSIDL_COMMON_APPDATA

The file-system directory that contains application data for all users. A typical path Windows is C:\ProgramData.

CSIDL_COMMON_DESKTOPDIRECTORY

The file-system directory that contains files and folders that appear on the desktop for all users. A typical Windows® XP path is C:\Documents and Settings\All Users\Desktop. A typical path is C:\Users\Public\Desktop.

CSIDL_COMMON_DOCUMENTS

The file-system directory that contains documents that are common to all users. A typical path in Windows XP is C:\Documents and Settings\All Users\Documents. A typical path is C:\Users\Public\Documents.

CSIDL_COMMON_FAVORITES

The file-system directory that serves as a common repository for favorites common to all users. A typical path is C:\Users\Public\Favorites.

CSIDL_COMMON_MUSIC

The file-system directory that serves as a repository for music files common to all users. A typical path is C:\Users\Public\Music.

CSIDL_COMMON_PICTURES

The file-system directory that serves as a repository for image files common to all users. A typical path is C:\Users\Public\Pictures.

CSIDL_COMMON_PROGRAMS

The file-system directory that contains the directories for the common program groups that appear on the Start menu for all users. A typical path is C:\ProgramData\Microsoft\Windows\Start Menu\Programs.

CSIDL_COMMON_STARTMENU

The file-system directory that contains the programs and folders which appear on the Start menu for all users. A typical path in Windows is C:\ProgramData\Microsoft\Windows\Start Menu.

CSIDL_COMMON_STARTUP

The file-system directory that contains the programs that appear in the Startup folder for all users. A typical path in Windows XP is C:\Documents and Settings\All Users\Start Menu\Programs\Startup. A typical path is C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup.

CSIDL_COMMON_TEMPLATES

The file-system directory that contains the templates that are available to all users. A typical path is C:\ProgramData\Microsoft\Windows\Templates.

CSIDL_COMMON_VIDEO

The file-system directory that serves as a repository for video files common to all users. A typical path is C:\Users\Public\Videos.

CSIDL_DEFAULT_APPDATA

Refers to the Appdata folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_LOCAL_APPDATA

Refers to the local Appdata folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_COOKIES

Refers to the Cookies folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_CONTACTS

Refers to the Contacts folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_DESKTOP

Refers to the Desktop folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_DOWNLOADS

Refers to the Downloads folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_FAVORITES

Refers to the Favorites folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_HISTORY

Refers to the History folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_INTERNET_CACHE

Refers to the Internet Cache folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_PERSONAL

Refers to the Personal folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_MYDOCUMENTS

Refers to the My Documents folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_MYPICTURES

Refers to the My Pictures folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_MYMUSIC

Refers to the My Music folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_MYVIDEO

Refers to the My Videos folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_RECENT

Refers to the Recent folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_SENDTO

Refers to the Send To folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_STARTMENU

Refers to the Start Menu folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_PROGRAMS

Refers to the Programs folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_STARTUP

Refers to the Startup folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_TEMPLATES

Refers to the Templates folder inside %DEFAULTUSERPROFILE%.

CSIDL_DEFAULT_QUICKLAUNCH

Refers to the Quick Launch folder inside %DEFAULTUSERPROFILE%.

CSIDL_FONTS

A virtual folder containing fonts. A typical path is C:\Windows\Fonts.

CSIDL_PROGRAM_FILESX86

The Program Files folder on 64-bit systems. A typical path is C:\Program Files(86).

CSIDL_PROGRAM_FILES_COMMONX86

A folder for components that are shared across applications on 64-bit systems. A typical path is C:\Program Files(86)\Common.

CSIDL_PROGRAM_FILES

The Program Files folder. A typical path is C:\Program Files.

CSIDL_PROGRAM_FILES_COMMON

A folder for components that are shared across applications. A typical path is C:\Program Files\Common.

CSIDL_RESOURCES

The file-system directory that contains resource data. A typical path is C:\Windows\Resources.

CSIDL_SYSTEM

The Windows System folder. A typical path is C:\Windows\System32.

CSIDL_WINDOWS

The Windows directory or system root. This corresponds to the %WINDIR% or %SYSTEMROOT% environment variables. A typical path is C:\Windows.

DEFAULTUSERPROFILE

Refers to the value in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList [DefaultUserProfile].

PROFILESFOLDER

Refers to the value in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList [ProfilesDirectory].

PROGRAMFILES

Same as CSIDL_PROGRAM_FILES.

PROGRAMFILES(X86)

Refers to the C:\Program Files (x86) folder on 64-bit systems.

SYSTEM

Refers to %WINDIR%\system32.

SYSTEM16

Refers to %WINDIR%\system.

SYSTEM32

Refers to %WINDIR%\system32.

SYSTEMPROFILE

Refers to the value in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18 [ProfileImagePath].

SYSTEMROOT

Refers to the root of the system drive.

WINDIR

Refers to the Windows folder located on the system drive.

+ +  + +## Variables that are recognized only in the user context + + +You can use these variables in the .xml files within sections with `context=User` and `context=UserAndSystem`. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
VariableExplanation

APPDATA

Same as CSIDL_APPDATA.

CSIDL_ADMINTOOLS

The file-system directory that is used to store administrative tools for an individual user. The Microsoft® Management Console (MMC) saves customized consoles to this directory, which roams with the user profile.

CSIDL_ALTSTARTUP

The file-system directory that corresponds to the user's non-localized Startup program group.

CSIDL_APPDATA

The file-system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\username\Application Data or C:\Users\username\AppData\Roaming.

CSIDL_BITBUCKET

The virtual folder that contains the objects in the user's Recycle Bin.

CSIDL_CDBURN_AREA

The file-system directory acting as a staging area for files waiting to be written to CD. A typical path is C:\Users\username\AppData\Local\Microsoft\Windows\MasteredBurning\Disc Burning.

CSIDL_CONNECTIONS

The virtual folder representing Network Connections that contains network and dial-up connections.

CSIDL_CONTACTS

This refers to the Contacts folder in %CSIDL_PROFILE%.

CSIDL_CONTROLS

The virtual folder that contains icons for the Control Panel items.

CSIDL_COOKIES

The file-system directory that serves as a common repository for Internet cookies. A typical path is C:\Users\username\AppData\Roaming\Microsoft\Windows\Cookies.

CSIDL_DESKTOP

The virtual folder representing the Windows desktop.

CSIDL_DESKTOPDIRECTORY

The file-system directory used to physically store file objects on the desktop, which should not be confused with the desktop folder itself. A typical path is C:\Users\username\Desktop.

CSIDL_DRIVES

The virtual folder representing My Computer that contains everything on the local computer: storage devices, printers, and Control Panel. The folder may also contain mapped network drives.

CSIDL_FAVORITES

The file-system directory that serves as a common repository for the user's favorites. A typical path is C:\Users\Username\Favorites.

CSIDL_HISTORY

The file-system directory that serves as a common repository for Internet history items.

CSIDL_INTERNET

A virtual folder for Internet Explorer.

CSIDL_INTERNET_CACHE

The file-system directory that serves as a common repository for temporary Internet files. A typical path is C:\Users\username\AppData\Local\Microsoft\Windows\Temporary Internet Files

CSIDL_LOCAL_APPDATA

The file-system directory that serves as a data repository for local, non-roaming applications. A typical path is C:\Users\username\AppData\Local.

CSIDL_MYDOCUMENTS

The virtual folder representing My Documents.A typical path is C:\Users\Username\Documents.

CSIDL_MYMUSIC

The file-system directory that serves as a common repository for music files. A typical path is C:\Users\Username\Music.

CSIDL_MYPICTURES

The file-system directory that serves as a common repository for image files. A typical path is C:\Users\Username\Pictures.

CSIDL_MYVIDEO

The file-system directory that serves as a common repository for video files. A typical path is C:\Users\Username\Videos.

CSIDL_NETHOOD

A file-system directory that contains the link objects that may exist in the My Network Places virtual folder. It is not the same as CSIDL_NETWORK, which represents the network namespace root. A typical path is C:\Users\Username\AppData\Roaming\Microsoft\Windows\Network Shortcuts.

CSIDL_NETWORK

A virtual folder representing My Network Places, the root of the network namespace hierarchy.

CSIDL_PERSONAL

The virtual folder representing the My Documents desktop item. This is equivalent to CSIDL_MYDOCUMENTS.

+

A typical path is C:\Documents and Settings\username\My Documents.

CSIDL_PLAYLISTS

The virtual folder used to store play albums, typically C:\Users\username\My Music\Playlists.

CSIDL_PRINTERS

The virtual folder that contains installed printers.

CSIDL_PRINTHOOD

The file-system directory that contains the link objects that can exist in the Printers virtual folder. A typical path is C:\Users\username\AppData\Roaming\Microsoft\Windows\Printer Shortcuts.

CSIDL_PROFILE

The user's profile folder. A typical path is C:\Users\Username.

CSIDL_PROGRAMS

The file-system directory that contains the user's program groups, which are themselves file-system directories. A typical path is C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs.

CSIDL_RECENT

The file-system directory that contains shortcuts to the user's most recently used documents. A typical path is C:\Users\Username\AppData\Roaming\Microsoft\Windows\Recent.

CSIDL_SENDTO

The file-system directory that contains Send To menu items. A typical path is C:\Users\username\AppData\Roaming\Microsoft\Windows\SendTo.

CSIDL_STARTMENU

The file-system directory that contains Start menu items. A typical path in Windows XP is C:\Documents and Settings\username\Start Menu. A typical path in Windows Vista, Windows 7, or Windows 8 is C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu.

CSIDL_STARTUP

The file-system directory that corresponds to the user's Startup program group. A typical path is C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup.

CSIDL_TEMPLATES

The file-system directory that serves as a common repository for document templates. A typical path is C:\Users\username\AppData\Roaming\Microsoft\Windows\Templates.

HOMEPATH

Same as the standard environment variable.

TEMP

The temporary folder on the computer. A typical path is %USERPROFILE%\AppData\Local\Temp.

TMP

The temporary folder on the computer. A typical path is %USERPROFILE%\AppData\Local\Temp.

USERPROFILE

Same as CSIDL_PROFILE.

USERSID

Represents the current user-account security identifier (SID). For example,

+

S-1-5-21-1714567821-1326601894-715345443-1026.

+ +  + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/refresh-a-windows-7-computer-with-windows-81.md b/windows/deploy/refresh-a-windows-7-computer-with-windows-81.md new file mode 100644 index 0000000000..cc3e2ebd11 --- /dev/null +++ b/windows/deploy/refresh-a-windows-7-computer-with-windows-81.md @@ -0,0 +1,169 @@ +--- +title: Refresh a Windows 7 computer with Windows 10 (Windows 10) +description: This topic will show you how to use MDT 2013 Update 1 Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process. +ms.assetid: 2866fb3c-4909-4c25-b083-6fc1f7869f6f +keywords: ["reinstallation, customize, template, script, restore"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Refresh a Windows 7 computer with Windows 10 + + +**Applies to** + +- Windows 10 + +**In this article** + +- [The computer refresh process](#sec01) +- [Create a custom User State Migration Tool (USMT) template](#sec02) +- [Refresh a Windows 7 SP1 client](#sec03) +- [Related topics](#related_topics) + +This topic will show you how to use MDT 2013 Update 1 Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process. The refresh scenario, or computer refresh, is a reinstallation of an operating system on the same machine. You can refresh the machine to the same operating system as it is currently running, or to a later version. + +For the purposes of this topic, we will use three machines: DC01, MDT01, and PC0001. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 Standard server. PC0001 is a machine with Windows 7 Service Pack 1 (SP1) that is going to be refreshed into a Windows 10 machine, with data and settings restored. MDT01 and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-04-fig01.png) + +Figure 1. The machines used in this topic. + +## The computer refresh process + + +Even though a computer will appear, to the end user, to be upgraded, a computer refresh is not, technically, an in-place upgrade. A computer refresh also involves taking care of user data and settings from the old installation and making sure to restore those at the end of the installation. + +For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh you will: + +1. Back up data and settings locally, in a backup folder. + +2. Wipe the partition, except for the backup folder. + +3. Apply the new operating system image. + +4. Install other applications. + +5. Restore data and settings. + +During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are simply linked in the file system, which allows for fast migration, even when there is a lot of data. + +**Note**   +In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file will contain the entire volume from the computer, and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire machine is not a supported scenario. + +  + +### Multi-user migration + +By default, ScanState in USMT backs up all profiles on the machine, including local computer profiles. If you have a machine that has been in your environment for a while, it likely has several domain-based profiles on it, including those of former users. You can limit which profiles are backed up by configuring command-line switches to ScanState (added as rules in MDT). + +As an example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: ScanStateArgs=/ue:\*\\\* /ui:CONTOSO\\\* + +**Note**   +You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days. + +  + +### Support for additional settings + +In addition to the command-line switches that control which profiles to migrate, the XML templates control exactly what data is being migrated. You can control data within and outside the user profiles + +## Create a custom User State Migration Tool (USMT) template + + +In this section, you learn to migrate additional data using a custom template. You configure the environment to use a custom USMT XML template that will: + +1. Back up the **C:\\Data** folder (including all files and folders). + +2. Scan the local disk for PDF documents (\*.pdf files) and restore them into the **C:\\Data\\PDF Documents** folder on the destination machine. + +The custom USMT template is named MigContosoData.xml, and you can find it in the sample files for this documentation, which include: + +- [Gather script](http://go.microsoft.com/fwlink/p/?LinkId=619361) + +- [Set-OUPermissions](http://go.microsoft.com/fwlink/p/?LinkId=619362) script + +- [MDT Sample Web Service](http://go.microsoft.com/fwlink/p/?LinkId=619363) + +### Add the custom XML template + +In order to use the custom MigContosoData.xml USMT template, you need to copy it to the MDT Production deployment share and update the CustomSettings.ini file. In these steps, we assume you have downloaded the MigContosoData.xml file. + +1. Using File Explorer, copy the MigContosoData.xml file to the **E:\\MDTProduction\\Tools\\x64\\USMT5** folder. + +2. Using Notepad, edit the E:\\MDTProduction\\Control\\CustomSettings.ini file. After the USMTMigFiles002=MigUser.xml line add the following line: + + ``` syntax + USMTMigFiles003=MigContosoData.xml + ``` + +3. Save the CustomSettings.ini file. + +## Refresh a Windows 7 SP1 client + + +After adding the additional USMT template and configuring the CustomSettings.ini file to use it, you are now ready to refresh a Windows 7 SP1 client to Windows 10. In these steps, we assume you have a Windows 7 SP1 client named PC0001 in your environment that is ready for a refresh to Windows 10. + +**Note**   +MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property in the [MDT resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117). + +  + +### Upgrade (refresh) a Windows 7 SP1 client + +1. On PC0001, log on as **CONTOSO\\Administrator**. Start the Lite Touch Deploy Wizard by executing **\\\\MDT01\\MDTProduction$\\Scripts\\Litetouch.vbs**. Complete the deployment guide using the following settings: + + 1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM + + 2. Computer name: <default> + + 3. Specify where to save a complete computer backup: Do not back up the existing computer + + **Note**   + Skip this optional full WIM backup. The USMT backup will still run. + +   + +2. Select one or more applications to install: Install - Adobe Reader XI - x86 + +3. The setup now starts and does the following: + + 1. Backs up user settings and data using USMT. + + 2. Installs the Windows 10 Enterprise x64 operating system. + + 3. Installs the added application(s). + + 4. Updates the operating system via your local Windows Server Update Services (WSUS) server. + + 5. Restores user settings and data using USMT. + +![figure 2](images/fig2-taskseq.png) + +Figure 2. Starting the computer refresh from the running Windows 7 SP1 client. + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md b/windows/deploy/refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md new file mode 100644 index 0000000000..58ffc53fdb --- /dev/null +++ b/windows/deploy/refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md @@ -0,0 +1,156 @@ +--- +title: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager (Windows 10) +description: This topic will show you how to use a previously created task sequence to refresh a Windows 7 SP1 client with Windows 10 using Microsoft System Center 2012 R2 Configuration Manager and Microsoft Deployment Toolkit (MDT) 2013 Update 1. +ms.assetid: 57c81667-1019-4711-b3de-15ae9c5387c7 +keywords: ["upgrade, install, installation, computer refresh"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Create a device collection and add the PC0003 computer](#sec01) +- [Create a new deployment](#sec02) +- [Initiate a computer refresh](#sec03) +- [Related topics](#related_topics) + +This topic will show you how to use a previously created task sequence to refresh a Windows 7 SP1 client with Windows 10 using Microsoft System Center 2012 R2 Configuration Manager and Microsoft Deployment Toolkit (MDT) 2013 Update 1. When refreshing a machine to a later version, it appears as an upgrade to the end user, but technically it is not an in-place upgrade. A computer refresh also involves taking care of user data and settings from the old installation and making sure to restore those at the end of the installation. For more information, see [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md). + +A computer refresh with System Center 2012 R2 Configuration Manager works the same as it does with MDT Lite Touch installation. Configuration Manager also uses the User State Migration Tool (USMT) from the Windows Assessment and Deployment Kit (Windows ADK) 10 in the background. A computer refresh with Configuration Manager involves the following steps: + +1. Data and settings are backed up locally in a backup folder. + +2. The partition is wiped, except for the backup folder. + +3. The new operating system image is applied. + +4. Other applications are installed. + +5. Data and settings are restored. + +For the purposes of this topic, we will use three machines: DC01, CM01, and PC0003. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. PC0003 is a machine with Windows 7 SP1, on which Windows 10 will be deployed. DC01, CM01, and PC003 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +In this topic, we assume that you have a Windows 7 SP1 client named PC0003 with the Configuration Manager client installed. + +## Create a device collection and add the PC0003 computer + + +1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: + + 1. General + + 2. Name: Install Windows 10 Enterprise x64 + + 3. Limited Collection: All Systems + + 4. Membership rules: + + 5. Direct rule + + 6. Resource Class: System Resource + + 7. Attribute Name: Name + + 8. Value: PC0003 + + 9. Select **Resources** + + 10. Select **PC0003** + +2. Review the Install Windows 10 Enterprise x64 collection. Do not continue until you see the PC0003 machine in the collection. + +**Note**   +It may take a short while for the collection to refresh; you can view progress via the Colleval.log file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership. + +  + +## Create a new deployment + + +Using the Configuration Manager console, in the Software Library workspace, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM**, and then select **Deploy**. Use the following settings: + +- General + + - Collection: Install Windows 10 Enterprise x64 + +- Deployment Settings + + - Purpose: Available + + - Make available to the following: Configuration Manager clients, media and PXE + + **Note**   + It is not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point. + +   + +- Scheduling + + - <default> + +- User Experience + + - <default> + +- Alerts + + - <default> + +- Distribution Points + + - <default> + +## Initiate a computer refresh + + +Now you can start the computer refresh on PC0003. + +1. Using the Configuration Manager console, in the Asset and Compliance workspace, in the Install Windows 10 Enterprise x64 collection, right-click **PC0003** and select **Client Notification / Download Computer Policy**. Click **OK**. + + **Note**   + The Client Notification feature is new in Configuration Manager. + +   + +2. On PC0003, using the Software Center (begin using the Start screen, or click the **New software is available** balloon in the system tray), select the **Windows 10 Enterprise x64 RTM** deployment and click **INSTALL**. + +3. In the **Software Center** warning dialog box, click **INSTALL OPERATING SYSTEM**. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/remove-products-vamt-30-win8.md b/windows/deploy/remove-products-vamt-30-win8.md new file mode 100644 index 0000000000..0d43bdadc0 --- /dev/null +++ b/windows/deploy/remove-products-vamt-30-win8.md @@ -0,0 +1,48 @@ +--- +title: Remove Products (Windows 10) +description: Remove Products +ms.assetid: 4d44379e-dda1-4a8f-8ebf-395b6c0dad8e +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Remove Products + + +To remove one or more products from the Volume Activation Management Tool (VAMT), you can delete them from the product list view in the center pane. + +To delete one or more products: + +1. Click a product node in the left-side pane. + +2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +4. Click **Filter**. VAMT displays the filtered list in the center pane. + +5. Select the products you want to delete. + +6. Click **Delete** in the **Selected Items** menu in the right-side pane. + +7. On the **Confirm Delete Selected Products** dialog box, click **OK**. + +## Related topics + + +[Add and Manage Products](add-and-manage-products-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/replace-a-windows-7-computer-with-a-windows-81-computer.md b/windows/deploy/replace-a-windows-7-computer-with-a-windows-81-computer.md new file mode 100644 index 0000000000..1f8c0ea3d4 --- /dev/null +++ b/windows/deploy/replace-a-windows-7-computer-with-a-windows-81-computer.md @@ -0,0 +1,187 @@ +--- +title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10) +description: A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer. +ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a +keywords: ["deploy, deployment, replace"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Replace a Windows 7 computer with a Windows 10 computer + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Prepare for the computer replace](#sec01) +- [Perform the computer replace](#sec02) +- [Related topics](#related_topics) + +A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it. + +For the purposes of this topic, we will use four machines: DC01, MDT01, PC0002, and PC0007. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. PC0002 is an old machine running Windows 7 SP1. It is going to be replaced by a new Windows 10 machine, PC0007. User State Migration Tool (USMT) will be used to backup and restore data and settings. MDT01, PC0002, and PC0007 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +![figure 1](images/mdt-03-fig01.png) + +Figure 1. The machines used in this topic. + +## Prepare for the computer replace + + +When preparing for the computer replace, you need to create a folder in which to store the backup, and a backup only task sequence that you run on the old computer. + +### Configure the rules on the Microsoft Deployment Toolkit (MDT) Production share + +1. On MDT01, using the Deployment Workbench, update the MDT Production deployment share rules. + +2. Change the **SkipUserData=YES** option to **NO**, and click **OK**. + +### Create and share the MigData folder + +1. On MDT01, log on as **CONTOSO\\Administrator**. + +2. Create and share the **E:\\MigData** folder by running the following three commands in an elevated Windows PowerShell prompt: + + ``` syntax + New-Item -Path E:\MigData -ItemType directory + New-SmbShare ?Name MigData$ ?Path E:\MigData + -ChangeAccess EVERYONE + icacls E:\MigData /grant '"MDT_BA":(OI)(CI)(M)' + ``` + +### Create a backup only (replace) task sequence + +1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node and create a new folder named **Other**. + +2. Right-click the **Other** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: + + 1. Task sequence ID: REPLACE-001 + + 2. Task sequence name: Backup Only Task Sequence + + 3. Task sequence comments: Run USMT to backup user data and settings + + 4. Template: Standard Client Replace Task Sequence + +3. In the **Other** folder, double-click **Backup Only Task Sequence**, and then in the **Task Sequence** tab, review the sequence. Notice that it only contains a subset of the normal client task sequence actions. + + ![figure 2](images/mdt-03-fig02.png) + + Figure 2. The Backup Only Task Sequence action list. + +## Perform the computer replace + + +During a computer replace, these are the high-level steps that occur: + +1. On the computer you are replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Window Imaging (WIM) backup. + +2. On the new machine, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored. + +### Execute the replace task sequence + +1. On PC0002, log on as **CONTOSO\\Administrator**. + +2. Verify that you have write access to the **\\\\MDT01\\MigData$** share. + +3. Execute **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**. + +4. Complete the Windows Deployment Wizard using the following settings: + + 1. Select a task sequence to execute on this computer: Backup Only Task Sequence + + 1. Specify where to save your data and settings: Specify a location + + 2. Location: \\\\MDT01\\MigData$\\PC0002 + + **Note**   + If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead. + +   + + 2. Specify where to save a complete computer backup: Do not back up the existing computer + + 3. Password: P@ssw0rd + + The task sequence will now run USMT (Scanstate.exe) to capture user data and settings of the machine. + + ![figure 3](images/mdt-03-fig03.png) + + Figure 3. The new task sequence running the Capture User State action on PC0002. + +5. On MDT01, verify that you have an USMT.MIG compressed backup file in the **E:\\MigData\\PC0002\\USMT** folder. + + ![figure 4](images/mdt-03-fig04.png) + + Figure 4. The USMT backup of PC0002. + +### Deploy the PC0007 virtual machine + +1. Create a virtual machine with the following settings: + + 1. Name: PC0007 + + 2. Location: C:\\VMs + + 3. Generation: 2 + + 4. Memory: 2048 MB + + 5. Hard disk: 60 GB (dynamic disk) + +2. Start the PC0007 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The machine will now load the Windows PE boot image from the WDS server. + + ![figure 5](images/mdt-03-fig05.png) + + Figure 5. The initial PXE boot process of PC0005. + +3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings: + + 1. Password: P@ssw0rd + + 2. Select a task sequence to execute on this computer: + + 1. Windows 10 Enterprise x64 RTM Custom Image + + 2. Computer Name: PC0007 + + 3. Applications: Select the Install - Adobe Reader XI - x86 application. + +4. The setup now starts and does the following: + + 1. Installs the Windows 10 Enterprise operating system. + + 2. Installs the added application. + + 3. Updates the operating system via your local Windows Server Update Services (WSUS) server. + + 4. Restores the USMT backup from PC0002. + +## Related topics + + +[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit--mdt-.md) + +[Create a Windows 10 reference image](create-a-windows-81-reference-image.md) + +[Deploy a Windows 10 image using MDT 2013 Update 1](deploy-a-windows-81-image-using-mdt-2013.md) + +[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-81-deployment.md) + +[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-81.md) + +[Configure MDT settings](configure-mdt-2013-settings.md) + +  + +  + + + + + diff --git a/windows/deploy/replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md b/windows/deploy/replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md new file mode 100644 index 0000000000..11e3eae045 --- /dev/null +++ b/windows/deploy/replace-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md @@ -0,0 +1,241 @@ +--- +title: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager (Windows 10) +description: In this topic, you will learn how to replacing a Windows 7 SP1 computer using Microsoft System Center 2012 R2 Configuration Manager. +ms.assetid: 3c8a2d53-8f08-475f-923a-bca79ca8ac36 +keywords: ["upgrade, install, installation, replace computer, setup"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Create a replace task sequence](#sec01) +- [Associate the new machine with the old computer](#sec02) +- [Create a device collection and add the PC0004 computer](#sec03) +- [Create a new deployment](#sec04) +- [Verify the backup](#sec05) +- [Deploy the new computer](#sec06) +- [Related topics](#related_topics) + +In this topic, you will learn how to replacing a Windows 7 SP1 computer using Microsoft System Center 2012 R2 Configuration Manager. This process is similar to refreshing a computer, but since you are replacing the machine, you have to run the backup job separately from the deployment of Windows 10. + +For the purposes of this topic, we will use three machines: DC01, CM01, and PC0004. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. PC0004 is a machine with Windows 7 SP1 that will be replaced with a new machine running Windows 10. DC01, CM01, and PC0004 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +In this topic, you will create a backup-only task sequence that you run on PC0004, the machine you are replacing. For more information, see [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-81-computer.md). + +## Create a replace task sequence + + +1. On CM01, using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**. + +2. On the **Choose Template** page, select the **Client Replace Task Sequence** template and click **Next**. + +3. On the **General** page, assign the following settings and click **Next**: + + 1. Task sequence name: Replace Task Sequence + + 2. Task sequence comments: USMT backup only + +4. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then click **Next**. + +5. On the **MDT Package** page, browse and select the **OSD / MDT 2013** package. Then click **Next**. + +6. On the **USMT Package** page, browse and select the O**SD / Microsoft Corporation User State Migration Tool for Windows 8 10.0.10240.16384** package. Then click **Next**. + +7. On the **Settings Package** page, browse and select the **OSD / Windows 10 x64 Settings** package. Then click **Next**. + +8. On the **Summary** page, review the details and then click **Next**. + +9. On the **Confirmation** page, click **Finish**. + +10. Review the Replace Task Sequence. Note: This task sequence has many fewer actions than the normal client task sequence. If it doesn't seem different, make sure you selected the Client Replace Task Sequence template when creating the task sequence. + +![figure 34](images/mdt-06-fig42.png) + +Figure 34. The backup-only task sequence (named Replace Task Sequence). + +## Associate the new machine with the old computer + + +This section walks you through the process of associating a blank machine, PC0006, with an old machine, PC0004, for the purpose of replacing PC0004 with PC0006. PC0006 can be either a physical or virtual machine. + +1. Make a note of the PC0006 machine's MAC Address. (If PC0006 is a virtual machine, you can see the MAC Address in the virtual machine settings.) In our example, the PC0006 MAC Address is 00:15:5D:0A:6A:96. + +2. Using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Devices**, and then select **Import Computer Information**. + +3. On the **Select Source** page, select **Import single computer** and click **Next**. + +4. On the **Single Computer** page, use the following settings and then click **Next**: + + 1. Computer Name: PC0006 + + 2. MAC Address: <the mac address from step 1> + + 3. Source Computer: PC0004 + + ![figure 35](images/mdt-06-fig43.png) + + Figure 35. Creating the computer association between PC0004 and PC0006. + +5. On the **User Accounts** page, select **Capture and restore all user accounts** and click **Next**. + +6. On the **Data Preview** page, click **Next**. + +7. On the **Choose Target Collection** page, select the **Install Windows 10 Enterprise x64** collection and click **Next**. + +8. On the **Summary** page, click **Next**, and then click **Close**. + +9. Select the **User State Migration** node and review the computer association in the right pane. + +10. Right-click the **PC0004/PC0006** association and select **View Recovery Information**. Note that a recovery key has been assigned already, but a user state store location has not. + +11. Review the Install Windows 10 Enterprise x64 collection. Do not continue until you see the PC0006 machine in the collection. You might have to update and refresh the collection again. + +## Create a device collection and add the PC0004 computer + + +1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings. + + 1. General + + 2. Name: USMT Backup (Replace) + + 3. Limited Collection: All Systems + + 4. Membership rules: + + 5. Direct rule + + 6. Resource Class: System Resource + + 7. Attribute Name: Name + + 8. Value: PC0004 + + 9. Select **Resources** + + 10. Select **PC0004** + +2. Review the USMT Backup (Replace) collection. Do not continue until you see the PC0004 machine in the collection. + +## Create a new deployment + + +Using the Configuration Manager console, in the Software Library workspace, select **Task Sequences**, right-click **Replace Task Sequence**, and then select **Deploy**. Use the following settings: + +- General + + - Collection: USMT Backup (Replace) + +- Deployment Settings + + - Purpose: Available + + - Make available to the following: Only Configuration Manager Clients + +- Scheduling + + - <default> + +- User Experience + + - <default> + +- Alerts + + - <default> + +- Distribution Points + + - <default> + +## Verify the backup + + +This section assumes that you have a machine named PC0004 with the Configuration Manager 2012 client installed. + +1. Start the PC0004 machine, and using the Control Panel, start the Configuration Manager applet. + +2. In the **Actions** tab, select the **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and click **OK**. + + **Note**   + You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md). + +   + +3. Using the Software Center, select the **Replace Task Sequence** deployment and click **INSTALL**. + +4. In the **Software Center** dialog box, click **INSTALL OPERATING SYSTEM**. + +5. Allow the Replace Task Sequence to complete. It should only take about five minutes. + +6. On CM01, in the **D:\\MigData** folder, verify that a folder was created containing the USMT backup. + +7. Using the Configuration Manager console, in the Asset and Compliance workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. Note that the object now also has a user state store location. + +**Note**   +It may take a few minutes for the user state store location to be populated. + +  + +## Deploy the new computer + + +1. Start the PC0006 virtual machine, press **F12** to Pre-Boot Execution Environment (PXE) boot when prompted. Allow it to boot Windows Preinstallation Environment (Windows PE), and then complete the deployment wizard using the following settings: + + 1. Password: P@ssw0rd + + 2. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 Custom Image + +2. The setup now starts and does the following: + + 1. Installs the Windows 10 operating system + + 2. Installs the Configuration Manager client + + 3. Joins it to the domain + + 4. Installs the applications + + 5. Restores the PC0004 backup + +When the process is complete, you will have a new Windows 10 machine in your domain with user data and settings restored. + +## Related topics + + +[Integrate Configuration Manager with MDT 2013 Update 1](integrate-configuration-manager-with-mdt-2013.md) + +[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-81-with-configuration-manager.md) + +[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-50-boot-image-with-configuration-manager.md) + +[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-81-operating-system-image-using-configuration-manager.md) + +[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-81-using-configuration-manager.md) + +[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-81-deployment-with-windows-pe-using-configuration-manager.md) + +[Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) + +[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-81-using-pxe-and-configuration-manager.md) + +[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-sp1-client-with-windows-81-using-configuration-manager.md) + +  + +  + + + + + diff --git a/windows/deploy/reroute-files-and-settings-usmt.md b/windows/deploy/reroute-files-and-settings-usmt.md new file mode 100644 index 0000000000..ee4f856139 --- /dev/null +++ b/windows/deploy/reroute-files-and-settings-usmt.md @@ -0,0 +1,124 @@ +--- +title: Reroute Files and Settings (Windows 10) +description: Reroute Files and Settings +ms.assetid: 905e6a24-922c-4549-9732-60fa11862a6c +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Reroute Files and Settings + + +To reroute files and settings, create a custom .xml file and specify this file name on both the ScanState and LoadState commandlines. This enables you to keep your changes separate from the default .xml files, so that it is easier to track your modifications. + +In this topic: + +- [Reroute a Folder](#BKMK_RerouteFolder) + +- [Reroute a Specific File Type](#BKMK_RerouteSpecFileType) + +- [Reroute a Specific File](#BKMK_RerouteSpecificFile) + +## Reroute a Folder + + +The following custom .xml file migrates the directories and files from C:\\EngineeringDrafts into the My Documents folder of every user. %CSIDL\_PERSONAL% is the virtual folder representing the My Documents desktop item, which is equivalent to CSIDL\_MYDOCUMENTS. + +``` syntax + + + Engineering Drafts Documents to Personal Folder + +   + + + + C:\EngineeringDrafts\* [*] + +     + + + + C:\EngineeringDrafts\* [*] + +     +   + + + +``` + +## Reroute a Specific File Type + + +The following custom .xml file reroutes .mp3 files located in the fixed drives on the source computer into the C:\\Music folder on the destination computer. + +``` syntax + + + All .mp3 files to My Documents + + + + + + + + + + + + + + + + + +``` + +## Reroute a Specific File + + +The following custom .xml file migrates the Sample.doc file from C:\\EngineeringDrafts into the My Documents folder of every user. %CSIDL\_PERSONAL% is the virtual folder representing the My Documents desktop item, which is equivalent to CSIDL\_MYDOCUMENTS. + +``` syntax + + +Sample.doc into My Documents + + + + + C:\EngineeringDrafts\ [Sample.doc] + + + + + C:\EngineeringDrafts\ [Sample.doc] + + + + + + +``` + +## Related topics + + +[Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) + +[Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md) + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/return-codes-usmt-win8.md b/windows/deploy/return-codes-usmt-win8.md new file mode 100644 index 0000000000..430a1fd12f --- /dev/null +++ b/windows/deploy/return-codes-usmt-win8.md @@ -0,0 +1,781 @@ +--- +title: Return Codes (Windows 10) +description: Return Codes +ms.assetid: e71bbc6b-d5a6-4e48-ad01-af0012b35f22 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Return Codes + + +This topic describes User State Migration Tool (USMT) 10.0 return codes and error messages. Also included is a table listing the USMT return codes with their associated mitigation steps. In addition, this topic provides tips to help you use the logfiles to determine why you received an error. + +Understanding the requirements for running USMT can help minimize errors in your USMT migrations. For more information, see [USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md). + +## In This Topic + + +[USMT Return Codes](#BKMK_ReturnCodes) + +[USMT Error Messages](#BKMK_ErrorMessages) + +[Troubleshooting Return Codes and Error Messages](#BKMK_TSCodesErrors) + +## USMT Return Codes + + +If you encounter an error in your USMT migration, you can use return codes and the more specific information provided in the associated USMT error messages to troubleshoot the issue and to identify mitigation steps. + +Return codes are grouped into the following broad categories that describe their area of error reporting: + +Success or User Cancel + +Invalid Command Lines + +Setup and Initialization + +Non-fatal Errors + +Fatal Errors + +As a best practice, we recommend that you set verbosity level to 5, **/v***:5*, on the **ScanState**, **LoadState**, and **USMTUtils** command lines so that the most detailed reporting is available in the respective USMT logs. You can use a higher verbosity level if you want the log files output to go to a debugger. + +## USMT Error Messages + + +Error messages provide more detailed information about the migration problem than the associated return code. For example, the **ScanState**, **LoadState**, or **USMTUtils** tool might return a code of "11” (for “USMT\_INVALID\_PARAMETERS") and a related error message that reads "/key and /keyfile both specified". The error message is displayed at the command prompt and is identified in the **ScanState**, **LoadState**, or **USMTUtils** log files to help you determine why the return code was received. + +You can obtain more information about any listed Windows application programming interface (API) system error codes by typing **net helpmsg** on the command line and, then typing the error code number. For more information about System Error Codes, see [this Microsoft Web site](http://go.microsoft.com/fwlink/p/?LinkId=147060). + +## Troubleshooting Return Codes and Error Messages + + +The following table lists each return code by numeric value, along with the associated error messages and suggested troubleshooting actions. + + +++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Return code valueReturn codeError messageTroubleshooting, mitigation, workaroundsCategory

0

USMT_SUCCESS

Successful run

Not applicable

Success or Cancel

1

USMT_DISPLAY_HELP

Command line help requested

Not applicable

Success or Cancel

2

USMT_STATUS_CANCELED

Gather was aborted because of an EFS file

Not applicable

User chose to cancel (such as pressing CTRL+C)

Not applicable

Success or Cancel

3

USMT_WOULD_HAVE_FAILED

At least one error was skipped as a result of /c

Review ScanState, LoadState, or UsmtUtils log for details about command-line errors.

11

USMT_INVALID_PARAMETERS

/all conflicts with /ui, /ue or /uel

Review ScanState log or LoadState log for details about command-line errors.

/auto expects an optional parameter for the script folder

Review ScanState log or LoadState log for details about command-line errors.

/encrypt can't be used with /nocompress

Review ScanState log or LoadState log for details about command-line errors.

/encrypt requires /key or /keyfile

Review ScanState log or LoadState log for details about command-line errors.

/genconfig can't be used with most other options

Review ScanState log or LoadState log for details about command-line errors.

/genmigxml can't be used with most other options

Review ScanState log or LoadState log for details about command-line errors.

/hardlink requires /nocompress

Review ScanState log or LoadState log for details about command-line errors.

/key and /keyfile both specified

Review ScanState log or LoadState log for details about command-line errors.

/key or /keyfile used without enabling encryption

Review ScanState log or LoadState log for details about command-line errors.

/lae is only used with /lac

Review ScanState log or LoadState log for details about command-line errors.

/listfiles cannot be used with /p

Review ScanState log or LoadState log for details about command-line errors.

/offline requires a valid path to an XML file describing offline paths

Review ScanState log or LoadState log for details about command-line errors.

/offlinewindir requires a valid path to offline windows folder

Review ScanState log or LoadState log for details about command-line errors.

/offlinewinold requires a valid path to offline windows folder

Review ScanState log or LoadState log for details about command-line errors.

A command was already specified

Verify that the command-line syntax is correct and that there are no duplicate commands.

An option argument is missing

Review ScanState log or LoadState log for details about command-line errors.

An option is specified more than once and is ambiguous

Review ScanState log or LoadState log for details about command-line errors.

By default /auto selects all users and uses the highest log verbosity level. Switches like /all, /ui, /ue, /v are not allowed.

Review ScanState log or LoadState log for details about command-line errors.

Command line arguments are required. Specify /? for options.

Review ScanState log or LoadState log for details about command-line errors.

Command line option is not valid

Review ScanState log or LoadState log for details about command-line errors.

EFS parameter specified is not valid for /efs

Review ScanState log or LoadState log for details about command-line errors.

File argument is invalid for /genconfig

Review ScanState log or LoadState log for details about command-line errors.

File argument is invalid for /genmigxml

Review ScanState log or LoadState log for details about command-line errors.

Invalid space estimate path. Check the parameters and/or file system permissions

Review ScanState log or LoadState log for details about command-line errors.

List file path argument is invalid for /listfiles

Review ScanState log or LoadState log for details about command-line errors.

Retry argument must be an integer

Review ScanState log or LoadState log for details about command-line errors.

Settings store argument specified is invalid

Review ScanState log or LoadState log for details about command-line errors. Make sure that the store path is accessible and that the proper permission levels are set.

Specified encryption algorithm is not supported

Review ScanState log or LoadState log for details about command-line errors.

The /efs:hardlink requires /hardlink

Review ScanState log or LoadState log for details about command-line errors.

The /targetWindows7 option is only available for Windows XP, Windows Vista, and Windows 7

Review ScanState log or LoadState log for details about command-line errors.

The store parameter is required but not specified

Review ScanState log or LoadState log for details about command-line errors.

The source-to-target domain mapping is invalid for /md

Review ScanState log or LoadState log for details about command-line errors.

The source-to-target user account mapping is invalid for /mu

Review ScanState log or LoadState log for details about command-line errors.

Undefined or incomplete command line option

Review ScanState log or LoadState log for details about command-line errors.

Invalid Command Lines

Use /nocompress, or provide an XML file path with /p"pathtoafile" to get a compressed store size estimate

Review ScanState log or LoadState log for details about command-line errors.

User exclusion argument is invalid

Review ScanState log or LoadState log for details about command-line errors.

Verbosity level must be specified as a sum of the desired log options: Verbose (0x01), Record Objects (0x04), Echo to debug port (0x08)

Review ScanState log or LoadState log for details about command-line errors.

Volume shadow copy feature is not supported with a hardlink store

Review ScanState log or LoadState log for details about command-line errors.

Wait delay argument must be an integer

Review ScanState log or LoadState log for details about command-line errors.

12

USMT_ERROR_OPTION_PARAM_TOO_LARGE

Command line arguments cannot exceed 256 characters

Review ScanState log or LoadState log for details about command-line errors.

Invalid Command Lines

Specified settings store path exceeds the maximum allowed length of 256 characters

Review ScanState log or LoadState log for details about command-line errors.

13

USMT_INIT_LOGFILE_FAILED

Log path argument is invalid for /l

When /l is specified in the ScanState command line, USMT validates the path. Verify that the drive and other information, for example file system characters, are correct.

Invalid Command Lines

14

USMT_ERROR_USE_LAC

Unable to create a local account because /lac was not specified

When creating local accounts, the command-line options /lac and /lae should be used.

Invalid Command Lines

26

USMT_INIT_ERROR

Multiple Windows installations found

Listfiles.txt could not be created. Verify that the location you specified for the creation of this file is valid.

Setup and Initialization

Software malfunction or unknown exception

Check all loaded .xml files for errors, common error when using /I to load the Config.xml file.

Unable to find a valid Windows directory to proceed with requested offline operation; Check if offline input file is present and has valid entries

Verify that the offline input file is present and that it has valid entries. USMT could not find valid offline operating system. Verify your offline directory mapping.

27

USMT_INVALID_STORE_LOCATION

A store path can't be used because an existing store exists; specify /o to overwrite

Specify /o to overwrite an existing intermediate or migration store.

Setup and Initialization

A store path is missing or has incomplete data

Make sure that the store path is accessible and that the proper permission levels are set.

An error occurred during store creation

Make sure that the store path is accessible and that the proper permission levels are set. Specify /o to overwrite an existing intermediate or migration store.

An inappropriate device such as a floppy disk was specified for the store

Make sure that the store path is accessible and that the proper permission levels are set.

Invalid store path; check the store parameter and/or file system permissions

Invalid store path; check the store parameter and/or file system permissions

The file layout and/or file content is not recognized as a valid store

Make sure that the store path is accessible and that the proper permission levels are set. Specify /o to overwrite an existing intermediate or migration store.

The store path holds a store incompatible with the current USMT version

Make sure that the store path is accessible and that the proper permission levels are set.

The store save location is read-only or does not support a requested storage option

Make sure that the store path is accessible and that the proper permission levels are set.

28

USMT_UNABLE_GET_SCRIPTFILES

Script file is invalid for /i

Check all specified migration .xml files for errors. This is a common error when using /i to load the Config.xml file.

Setup and Initialization

Unable to find a script file specified by /i

Verify the location of your script files, and ensure that the command-line options are correct.

29

USMT_FAILED_MIGSTARTUP

A minimum of 250 MB of free space is required for temporary files

Verify that the system meets the minimum temporary disk space requirement of 250 MB. As a workaround, you can set the environment variable USMT_WORKING_DIR=<path> to redirect the temporary files working directory.

Setup and Initialization

Another process is preventing migration; only one migration tool can run at a time

Check the ScanState log file for migration .xml file errors.

Failed to start main processing, look in log for system errors or check the installation

Check the ScanState log file for migration .xml file errors.

Migration failed because of an XML error; look in the log for specific details

Check the ScanState log file for migration .xml file errors.

Unable to automatically map the drive letters to match the online drive letter layout; Use /offline to provide a mapping table

Check the ScanState log file for migration .xml file errors.

31

USMT_UNABLE_FINDMIGUNITS

An error occurred during the discover phase; the log should have more specific information

Check the ScanState log file for migration .xml file errors.

Setup and Initialization

32

USMT_FAILED_SETMIGRATIONTYPE

An error occurred processing the migration system

Check the ScanState log file for migration .xml file errors, or use online Help by typing /? on the command line.

Setup and Initialization

33

USMT_UNABLE_READKEY

Error accessing the file specified by the /keyfile parameter

Check the ScanState log file for migration .xml file errors, or use online Help by typing /? on the command line.

Setup and Initialization

The encryption key must have at least one character

Check the ScanState log file for migration .xml file errors, or use online Help by typing /? on the command line.

34

USMT_ERROR_INSUFFICIENT_RIGHTS

Directory removal requires elevated privileges

Log on as Administrator, and run with elevated privileges.

Setup and Initialization

No rights to create user profiles; log in as Administrator; run with elevated privileges

Log on as Administrator, and run with elevated privileges.

No rights to read or delete user profiles; log in as Administrator, run with elevated privileges

Log on as Administrator, and run with elevated privileges.

35

USMT_UNABLE_DELETE_STORE

A reboot is required to remove the store

Reboot to delete any files that could not be deleted when the command was executed.

Setup and Initialization

A store path can't be used because it contains data that could not be overwritten

A migration store could not be deleted. If you are using a hardlink migration store you might have a locked file in it. You should manually delete the store, or use USMTUtils /rd command to delete the store.

There was an error removing the store

Review ScanState log or LoadState log for details about command-line errors.

36

USMT_ERROR_UNSUPPORTED_PLATFORM

Compliance check failure; please check the logs for details

Investigate whether there is an active temporary profile on the system.

Setup and Initialization

Use of /offline is not supported during apply

The /offline command was not used while running in the Windows Preinstallation Environment (WinPE).

Use /offline to run gather on this platform

The /offline command was not used while running in WinPE.

37

USMT_ERROR_NO_INVALID_KEY

The store holds encrypted data but the correct encryption key was not provided

Verify that you have included the correct encryption /key or /keyfile.

Setup and Initialization

38

USMT_ERROR_CORRUPTED_NOTENCRYPTED_STORE

An error occurred during store access

Review ScanState log or LoadState log for details about command-line errors. Make sure that the store path is accessible and that the proper permission levels are set.

Setup and Initialization

39

USMT_UNABLE_TO_READ_CONFIG_FILE

Error reading Config.xml

Review ScanState log or LoadState log for details about command-line errors in the Config.xml file.

Setup and Initialization

File argument is invalid for /config

Check the command line you used to load the Config.xml file. You can use online Help by typing /? on the command line.

40

USMT_ERROR_UNABLE_CREATE_PROGRESS_LOG

Error writing to the progress log

The Progress log could not be created. Verify that the location is valid and that you have write access.

Setup and Initialization

Progress log argument is invalid for /progress

The Progress log could not be created. Verify that the location is valid and that you have write access.

41

USMT_PREFLIGHT_FILE_CREATION_FAILED

Can't overwrite existing file

The Progress log could not be created. Verify that the location is valid and that you have write access.

Setup and Initialization

Invalid space estimate path. Check the parameters and/or file system permissions

Review ScanState log or LoadState log for details about command-line errors.

42

USMT_ERROR_CORRUPTED_STORE

The store contains one or more corrupted files

Review UsmtUtils log for details about the corrupted files. For information on how to extract the files that are not corrupted, see [Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md).

61

USMT_MIGRATION_STOPPED_NONFATAL

Processing stopped due to an I/O error

USMT exited but can continue with the /c command-line option, with the optional configurable <ErrorControl> section or by using the /vsc command-line option.

Non-fatal Errors

71

USMT_INIT_OPERATING_ENVIRONMENT_FAILED

A Windows Win32 API error occurred

Data transfer has begun, and there was an error during the creation of migration store or during the apply phase. Review the ScanState log or LoadState log for details.

Fatal Errors

An error occurred when attempting to initialize the diagnostic mechanisms such as the log

Data transfer has begun, and there was an error during the creation of migration store or during the apply phase. Review the ScanState log or LoadState log for details.

Failed to record diagnostic information

Data transfer has begun, and there was an error during the creation of migration store or during the apply phase. Review the ScanState log or LoadState log for details.

Unable to start. Make sure you are running USMT with elevated privileges

Exit USMT and log in again with elevated privileges.

72

USMT_UNABLE_DOMIGRATION

An error occurred closing the store

Data transfer has begun, and there was an error during migration-store creation or during the apply phase. Review the ScanState log or LoadState log for details.

Fatal Errors

An error occurred in the apply process

Data transfer has begun, and there was an error during migration-store creation or during the apply phase. Review the ScanState log or LoadState log for details.

An error occurred in the gather process

Data transfer has begun, and there was an error during migration-store creation or during the apply phase. Review the ScanState log or LoadState log for details.

Out of disk space while writing the store

Data transfer has begun, and there was an error during migration-store creation or during the apply phase. Review the ScanState log or LoadState log for details.

Out of temporary disk space on the local system

Data transfer has begun, and there was an error during migration-store creation or during the apply phase. Review the ScanState log or LoadState log for details.

+ +  + +## Related topics + + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +[Log Files](log-files-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/scanstate-syntax-usmt-win7-usmt-win8.md b/windows/deploy/scanstate-syntax-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..3a41410ad7 --- /dev/null +++ b/windows/deploy/scanstate-syntax-usmt-win7-usmt-win8.md @@ -0,0 +1,864 @@ +--- +title: ScanState Syntax (Windows 10) +description: ScanState Syntax +ms.assetid: 004c755f-33db-49e4-8a3b-37beec1480ea +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# ScanState Syntax + + +The ScanState command is used with the User State Migration Tool (USMT) 10.0 to scan the source computer, collect the files and settings, and create a store. + +## In This Topic + + +[Before You Begin](#BKMK_BeforeYouBegin) + +[Syntax](#BKMK_Syntax) + +[Storage Options](#BKMK_StorageOptions) + +[Migration Rule Options](#BKMK_MigrationRuleOptions) + +[Monitoring Options](#BKMK_MonitoringOptions) + +[User Options](#BKMK_UserOptions) + +[Encrypted File Options](#BKMK_efs) + +[Incompatible Command-Line Options](#BKMK_ICLO) + +## Before You Begin + + +Before you run the **ScanState** command, note the following: + +- To ensure that all operating system settings migrate, in most cases you must run the **ScanState** commands in administrator mode from an account with administrative credentials. + +- If you encrypt the migration store, you will be required to enter an encryption key or a path to a file containing the encryption key. Be sure to make note of the key or the key file location, because this information is not kept anywhere in the migration store. You will need this information when you run the LoadState command to decrypt the migration store, or if you need to run the recovery utility. An incorrect or missing key or key file results in an error message. + +- For information about software requirements for running the **ScanState** command, see [USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md). + +- Unless otherwise noted, you can use each option only once when running a tool on the command line. + +- You can gather domain accounts without the source computer having domain controller access. This functionality is available without any additional configuration. + +- The [Incompatible Command-Line Options](#BKMK_ICLO) table lists which options you can use together and which command-line options are incompatible. + +- The directory location where you save the migration store will be excluded from the scan. For example, if you save the migration store to the root of the D drive, the D drive and all of its subdirectories will be excluded from the scan. + +## Syntax + + +This section explains the syntax and usage of the **ScanState** command-line options. The options can be specified in any order. If the option contains a parameter, you can use either a colon or a space separator. + +The **ScanState** command's syntax is: + +scanstate \[*StorePath*\] \[/i:\[*Path*\\\]*FileName*\] \[/o\] \[/v:*VerbosityLevel*\] \[/nocompress\] \[/localonly\] \[/encrypt /key:*KeyString*|/keyfile:\[Path\\\]*FileName*\] \[/l:\[*Path*\\\]*FileName*\] \[/progress:\[*Path*\\\]*FileName*\] \[/r:*TimesToRetry*\] \[/w:*SecondsBeforeRetry*\] \[/c\] \[/p\] \[/all\] \[/ui:\[*DomainName*|*ComputerName*\\\]*UserName*\] \[/ue:\[*DomainName*|*ComputerName*\\\]*UserName*\] \[/uel:*NumberOfDays*|*YYYY/MM/DD*|0\] \[/efs:abort|skip|decryptcopy|copyraw\] \[/genconfig:\[*Path*\\\]*FileName*\[/config:\[*Path*\\\]*FileName*\] \[/?|help\] + +For example: + +To create a Config.xml file in the current directory, use: + +`scanstate /i:migapp.xml /i:migdocs.xml /genconfig:config.xml /v:13` + +To create an encrypted store using the Config.xml file and the default migration .xml files, use: + +`scanstate \\server\share\migration\mystore /i:migapp.xml /i:migdocs.xml /o /config:config.xml /v:13 /encrypt /key:"mykey"` + +## Storage Options + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

StorePath

Indicates a folder where files and settings will be saved. Note that StorePath cannot be c:\. You must specify the StorePath option in the ScanState command, except when using the /genconfig option. You cannot specify more than one StorePath location.

/o

Required to overwrite any existing data in the migration store or Config.xml file. If not specified, the ScanState command will fail if the migration store already contains data. You cannot use this option more than once on a command line.

/vsc

This option enables the volume shadow-copy service to migrate files that are locked or in use. This command-line option eliminates most file-locking errors that are typically encountered by the <ErrorControl> section.

+

This option can be used only with the ScanState executable file and cannot be combined with the /hardlink option.

/hardlink

Enables the creation of a hard-link migration store at the specified location. The /nocompress option must be specified with the /hardlink option.

/encrypt [{/key:<KeyString> | /keyfile:<file>]}

Encrypts the store with the specified key. Encryption is disabled by default. With this option, you will need to specify the encryption key in one of the following ways:

+
    +
  • /key:KeyString specifies the encryption key. If there is a space in KeyString, you will need to surround KeyString with quotation marks.

  • +
  • /keyfile:FilePathAndName specifies a text (.txt) file that contains the encryption key.

  • +
+

We recommend that KeyString be at least eight characters long, but it cannot exceed 256 characters. The /key and /keyfile options cannot be used on the same command line. The /encrypt and /nocompress options cannot be used on the same command line.

+
+Important   +

You should use caution with this option, because anyone who has access to the ScanState command-line script will also have access to the encryption key.

+
+
+  +
+

The following example shows the ScanState command and the /key option:

+

scanstate /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /encrypt /key:mykey

/encrypt:<EncryptionStrength>

The /encrypt option accepts a command-line parameter to define the encryption strength to be used for encryption of the migration store. For more information about supported encryption algorithms, see [Migration Store Encryption](migration-store-encryption-usmt-win8.md).

/nocompress

Disables compression of data and saves the files to a hidden folder named "File" at StorePath\USMT. Compression is enabled by default. Combining the /nocompress option with the /hardlink option generates a hard-link migration store. You can use the uncompressed store to view what USMT stored, troubleshoot a problem, or run an antivirus utility against the files. You should use this option only in testing environments, because we recommend that you use a compressed store during your actual migration, unless you are combining the /nocompress option with the /hardlink option.

+

The /nocompress and /encrypt options cannot be used together in one statement on the command line. However, if you do choose to migrate an uncompressed store, the LoadState command will migrate each file directly from the store to the correct location on the destination computer without a temporary location.

+

For example:

+

scanstate /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /nocompress

+ +  + +## Run the ScanState Command on an Offline Windows System + + +You can run the **ScanState** command in Windows Preinstallation Environment (WinPE). In addition, USMT supports migrations from previous installations of Windows contained in Windows.old directories. The offline directory can be a Windows directory when you run the **ScanState** command in WinPE or a Windows.old directory when you run the **ScanState** command in Windows. + +There are several benefits to running the **ScanState** command on an offline Windows image, including: + +- **Improved Performance.** + + Because WinPE is a thin operating system, there are fewer running services. In this environment, the **ScanState** command has more access to the local hardware resources, enabling **ScanState** to perform migration operations more quickly. + +- **Simplified end to end deployment process.** + + Migrating data from Windows.old simplifies the end-to-end deployment process by enabling the migration process to occur after the new operating system is installed. + +- **Improved success of migration.** + + The migration success rate is increased because files will not be locked for editing while offline, and because WinPE provides administrator access to files in the offline Windows file system, eliminating the need for administrator-level access to the online system. + +- **Ability to recover an unbootable computer.** + + It might be possible to recover and migrate data from an unbootable computer. + +## Offline Migration Options + + + ++++ + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDefinition

/offline:"path to an offline.xml file"

This option is used to define a path to an offline .xml file that might specify other offline migration options, for example, an offline Windows directory or any domain or folder redirection required in your migration.

/offlinewindir:"path to a Windows directory"

This option specifies the offline Windows directory that the ScanState command gathers user state from. The offline directory can be Windows.old when you run the ScanState command in Windows or a Windows directory when you run the ScanState command in WinPE.

/offlinewinold:"Windows.old directory"

This command-line option enables the offline migration mode and starts the migration from the location specified. It is only intended to be used in Windows.old migration scenarios, where the migration is occurring from a Windows.old directory.

+ +  + +## Migration Rule Options + + +USMT provides the following options to specify what files you want to migrate. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/i:[Path\]FileName

(include)

+

Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigDocs.xml, and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory. For more information about which files to specify, see the "XML Files" section of the [Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md) topic.

/genconfig:[Path\]FileName

(Generate Config.xml)

+

Generates the optional Config.xml file, but does not create a migration store. To ensure that this file contains every component, application and setting that can be migrated, you should create this file on a source computer that contains all the components, applications and settings that will be present on the destination computers. In addition, you should specify the other migration .xml files, using the /i option, when you specify this option.

+

After you create this file, you will need to make use of it with the ScanState command using the /config option.

+

The only options that you can specify with this option are the /i, /v, and /l options. You cannot specify StorePath, because the /genconfig option does not create a store. Path can be either a relative or full path. If you do not specify the Path variable, then FileName will be created in the current directory.

+

Examples:

+
    +
  • The following example creates a Config.xml file in the current directory:

    +

    scanstate /i:migapp.xml /i:migdocs.xml /genconfig:config.xml /v:13

  • +

/config:[Path\]FileName

Specifies the Config.xml file that the ScanState command should use to create the store. You cannot use this option more than once on the command line. Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.

+

The following example creates a store using the Config.xml file, MigDocs.xml, and MigApp.xml files:

+

scanstate \\server\share\migration\mystore /config:config.xml /i:migdocs.xml /i:migapp.xml /v:13 /l:scan.log

+

The following example migrates the files and settings to the destination computer using the Config.xml, MigDocs.xml, and MigApp.xml files:

+

loadstate \\server\share\migration\mystore /config:config.xml /i:migdocs.xml /i:migapp.xml /v:13 /l:load.log

/auto:path to script files

This option enables you to specify the location of the default .xml files and then begin the migration. If no path is specified, USMT will reference the directory where the USMT binaries are located. The /auto option has the same effect as using the following options: /i:MigDocs.xml /i:MigApp.xml /v:5.

/genmigxml:path to a file

This option specifies that the ScanState command should use the document finder to create and export an .xml file that defines how to migrate all of the files on the computer on which the ScanState command is running.

/targetwindows8

Optimizes Scanstate.exe when using USMT 10.0 to migrate a user state to Windows 8 or Windows 8.1 instead of Windows 10. You should use this command line option in the following scenarios:

+
    +
  • To create a Config.xml file by using the /genconfig option. Using the /targetwindows8 option optimizes the Config.xml file so that it only contains components that relate to Windows 8 or Windows 8.1.

  • +
  • To create a migration store. Using the /targetwindows8 option ensures that the ScanState tool gathers the correct set of operating system settings. Without the /targetwindows8 command-line option, some settings can be lost during the migration.

  • +

/targetwindows7

Optimizes Scanstate.exe when using USMT 10.0 to migrate a user state to Windows 7 instead of Windows 10. You should use this command line option in the following scenarios:

+
    +
  • To create a Config.xml file by using the /genconfig option. Using the /targetwindows7 option optimizes the Config.xml file so that it only contains components that relate to Windows 7.

  • +
  • To create a migration store. Using the /targetwindows7 option ensures that the ScanState tool gathers the correct set of operating system settings. Without the /targetwindows7 command-line option, some settings can be lost during the migration.

  • +

/localonly

Migrates only files that are stored on the local computer, regardless of the rules in the .xml files that you specify on the command line. You should use this option when you want to exclude the data from removable drives on the source computer, such as USB flash drives (UFDs), some external hard drives, and so on, and when there are network drives mapped on the source computer. If the /localonly option is not specified, then the ScanState command will copy files from these removable or network drives into the store.

+

Anything that is not considered a fixed drive by the OS will be excluded by /localonly. In some cases large external hard drives are considered fixed drives. These drives can be explicitly excluded from migration by using a custom.xml file. For more information about how to exclude all files on a specific drive, see [Exclude Files and Settings](exclude-files-and-settings-usmt.md).

+

The /localonly command-line option includes or excludes data in the migration as identified in the following table:

+ ++++ + + + + + + + + + + + + + + + + + + + + +
Drive typeBehavior with /localonly

Removable drives such as a USB flash drive

Excluded

Network drives

Excluded

Fixed drives

Included

+

 

+ +  + +## Monitoring Options + + +USMT provides several options that you can use to analyze problems that occur during migration. + +**Note**   +The ScanState log is created by default, but you can specify the name and location of the log with the **/l** option. + +  + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/listfiles:<FileName>

You can use the /listfiles command-line option with the ScanState command to generate a text file that lists all of the files included in the migration.

/l:[Path\]FileName

Specifies the location and name of the ScanState log.

+

You cannot store any of the log files in StorePath. Path can be either a relative or full path. If you do not specify the Path variable, then the log will be created in the current directory. You can use the /v option to adjust the amount of output.

+

If you run the ScanState or LoadState commands from a shared network resource, you must specify this option or USMT will fail with the following error: "USMT was unable to create the log file(s)". To fix this issue, use the /l:scan.log command.

/v:<VerbosityLevel>

(Verbosity)

+

Enables verbose output in the ScanState log file. The default value is 0.

+

You can set the VerbosityLevel to one of the following levels:

+ ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
LevelExplanation

0

Only the default errors and warnings are enabled.

1

Enables verbose output.

4

Enables error and status output.

5

Enables verbose and status output.

8

Enables error output to a debugger.

9

Enables verbose output to a debugger.

12

Enables error and status output to a debugger.

13

Enables verbose, status, and debugger output.

+

 

+

For example:

+

scanstate \\server\share\migration\mystore /v:13 /i:migdocs.xml /i:migapp.xml

+

/progress:[Path\]FileName

Creates the optional progress log. You cannot store any of the log files in StorePath. Path can be either a relative or full path. If you do not specify the Path variable, then FileName will be created in the current directory.

+

For example:

+

scanstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /progress:prog.log /l:scanlog.log

/c

When this option is specified, the ScanState command will continue to run, even if non-fatal errors occur. Any files or settings that cause an error are logged in the progress log. For example, if there is a large file that will not fit in the store, the ScanState command will log an error and continue with the migration. In addition, if a file is open or in use by an application, USMT may not be able to migrate the file and will log an error. Without the /c option, the ScanState command will exit on the first error.

+

You can use the new <ErrorControl> section in the Config.xml file to specify which file or registry read/write errors can be safely ignored and which might cause the migration to fail. This enables the /c command-line option to safely skip all input/output (I/O) errors in your environment. In addition, the /genconfig option now generates a sample <ErrorControl> section that is enabled by specifying error messages and desired behaviors in the Config.xml file.

/r:<TimesToRetry>

(Retry)

+

Specifies the number of times to retry when an error occurs while saving the user state to a server. The default is three times. This option is useful in environments where network connectivity is not reliable.

+

While storing the user state, the /r option will not be able to recover data that is lost due to a network-hardware failure, such as a faulty or disconnected network cable, or when a virtual private network (VPN) connection fails. The retry option is intended for large, busy networks where connectivity is satisfactory, but communication latency is a problem.

/w:<SecondsBeforeRetry>

(Wait)

+

Specifies the time to wait, in seconds, before retrying a network file operation. The default is 1 second.

/p:<pathToFile>

When the ScanState command runs, it will create an .xml file in the path specified. This .xml file includes improved space estimations for the migration store. The following example shows how to create this .xml file:

+

Scanstate.exe C:\MigrationLocation [additional parameters]

+

/p:"C:\MigrationStoreSize.xml"

+

For more information, see [Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md).

+

To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, you can use the /p option, without specifying "pathtoafile", in USMT. If you specify only the /p option, the storage space estimations are created in the same manner as with USMT3.x releases.

/? or /help

Displays Help at the command line.

+ +  + +## User Options + + +By default, all users are migrated. The only way to specify which users to include and exclude is by using the following options. You cannot exclude users in the migration .xml files or using the Config.xml file. For more information, see [Identify Users](identify-users-usmt-win7-usmt-win8.md) and [Migrate User Accounts](migrate-user-accounts-usmt.md). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionDescription

/all

Migrates all of the users on the computer.

+

USMT migrates all user accounts on the computer, unless you specifically exclude an account with either the /ue or /uel options. For this reason, you do not need to specify this option on the command line. However, if you choose to specify the /all option, you cannot also use the /ui, /ue or /uel options.

/ui:<DomainName>\<UserName>

+

or

+

/ui:<ComputerName>\<LocalUserName>

(User include)

+

Migrates the specified users. By default, all users are included in the migration. Therefore, this option is helpful only when used with the /ue or /uel options. You can specify multiple /ui options, but you cannot use the /ui option with the /all option. DomainName and UserName can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you will need to surround it with quotation marks.

+
+Note   +

If a user is specified for inclusion with the /ui option, and also is specified to be excluded with either the /ue or /uel options, the user will be included in the migration.

+
+
+  +
+

For example:

+
    +
  • To include only User2 from the Fabrikam domain, type:

    +

    /ue:*\* /ui:fabrikam\user2

  • +
  • To migrate all users from the Fabrikam domain, and only the user accounts from other domains that have been active or otherwise modified in the last 30 days, type:

    +

    /uel:30 /ui:fabrikam\*

    +

    In this example, a user account from the Contoso domain that was last modified 2 months ago will not be migrated.

  • +
+

For more examples, see the descriptions of the /ue and /ui options in this table.

/uel:<NumberOfDays>

+

or

+

/uel:<YYYY/MM/DD>

+

or

+

/uel:0

(User exclude based on last logon)

+

Migrates the users that logged onto the source computer within the specified time period, based on the Last Modified date of the Ntuser.dat file on the source computer. The /uel option acts as an include rule. For example, the /uel:30 option migrates users who logged on, or whose account was modified, within the last 30 days from the date when the ScanState command is run.

+

You can specify a number of days or you can specify a date. You cannot use this option with the /all option. USMT retrieves the last logon information from the local computer, so the computer does not need to be connected to the network when you run this option. In addition, if a domain user has logged onto another computer, that logon instance is not considered by USMT.

+
+Note   +

The /uel option is not valid in offline migrations.

+
+
+  +
+
    +
  • /uel:0 migrates any users who are currently logged on.

  • +
  • /uel:90 migrates users who have logged on, or whose accounts have been otherwise modified, within the last 90 days.

  • +
  • /uel:1 migrates users whose account has been modified within the last 24 hours.

  • +
  • /uel:2002/1/15 migrates users who have logged on or been modified January 15, 2002 or afterwards.

  • +
+

For example:

+

scanstate /i:migapp.xml /i:migdocs.xml \\server\share\migration\mystore /uel:0

/ue:<DomainName>\<UserName>

+

-or-

+

+

/ue:<ComputerName>\<LocalUserName>

(User exclude)

+

Excludes the specified users from the migration. You can specify multiple /ue options. You cannot use this option with the /all option. <DomainName> and <UserName> can contain the asterisk (*) wildcard character. When you specify a user name that contains spaces, you need to surround it with quotation marks.

+

For example:

+

scanstate /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /ue:contoso\user1

+ +  + +## How to Use /ui and /ue + + +The following examples apply to both the /**ui** and /**ue** options. You can replace the /**ue** option with the /**ui** option to include, rather than exclude, the specified users. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
BehaviorCommand

Exclude the user named User One in the Fabrikam domain.

/ue:"fabrikam\user one"

Exclude the user named User1 in the Fabrikam domain.

/ue:fabrikam\user1

Exclude the local user named User1.

/ue:%computername%\user1

Exclude all domain users.

/ue:Domain\*

Exclude all local users.

/ue:%computername%\*

Exclude users in all domains named User1, User2, and so on.

/ue:*\user*

+ +  + +## Using the Options Together + + +You can use the /**uel**, /**ue** and /**ui** options together to migrate only the users that you want migrated. + +The /**ui** option has precedence over the /**ue** and /**uel** options. If a user is specified to be included using the /**ui** option, and also specified to be excluded using either the /**ue** or /**uel** options, the user will be included in the migration. For example, if you specify `/ui:contoso\* /ue:contoso\user1`, then User1 will be migrated, because the /**ui** option takes precedence over the /**ue** option. + +The /**uel** option takes precedence over the /**ue** option. If a user has logged on within the specified time period set by the /**uel** option, that user’s profile will be migrated even if they are excluded by using the /**ue** option. For example, if you specify `/ue:fixed\user1 /uel:14`, the User1 will be migrated if they have logged on to the computer within the last 14 days. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
BehaviorCommand

Include only User2 from the Fabrikam domain and exclude all other users.

/ue:*\* /ui:fabrikam\user2

Include only the local user named User1 and exclude all other users.

/ue:*\* /ui:user1

Include only the domain users from Contoso, except Contoso\User1.

This behavior cannot be completed using a single command. Instead, to migrate this set of users, you will need to specify the following:

+
    +
  • On the ScanState command line, type: /ue:*\* /ui:contoso\*

  • +
  • On the LoadState command line, type: /ue:contoso\user1

  • +

Include only local (non-domain) users.

/ue:*\* /ui:%computername%\*

+ +  + +## Encrypted File Options + + +You can use the following options to migrate encrypted files. In all cases, by default, USMT fails if an encrypted file is found unless you specify an /**efs** option. To migrate encrypted files, you must change the default behavior. + +For more information, see [Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md). + +**Note**   +EFS certificates will be migrated automatically when migrating to Windows 7, Windows 8 or Windows 10. Therefore, you should specify the /**efs:copyraw** option with the **ScanState** command to migrate the encrypted files + +  + +**Caution**   +Take caution when migrating encrypted files. If you migrate an encrypted file without also migrating the certificate, end users will not be able to access the file after the migration. + +  + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line OptionExplanation

/efs:hardlink

Creates a hard link to the EFS file instead of copying it. Use only with the /hardlink and the /nocompress options.

/efs:abort

Causes the ScanState command to fail with an error code, if an Encrypting File System (EFS) file is found on the source computer. Enabled by default.

/efs:skip

Causes the ScanState command to ignore EFS files.

/efs:decryptcopy

Causes the ScanState command to decrypt the file, if possible, before saving it to the migration store, and to fail if the file cannot be decrypted. If the ScanState command succeeds, the file will be unencrypted in the migration store, and once you run the LoadState command, the file will be copied to the destination computer.

/efs:copyraw

Causes the ScanState command to copy the files in the encrypted format. The files will be inaccessible on the destination computer until the EFS certificates are migrated. EFS certificates will be automatically migrated; however, by default USMT fails if an encrypted file is found, unless you specify an /efs option. Therefore you should specify the /efs:copyraw option with the ScanState command to migrate the encrypted file. Then, when you run the LoadState command, the encrypted file and the EFS certificate will be automatically migrated.

+

For example:

+

ScanState /i:migdocs.xml /i:migapp.xml \\server\share\migration\mystore /efs:copyraw

+
+Important   +

All files must be encrypted if the parent folder is encrypted. If the encryption attribute on a file inside an encrypted folder has been removed, the file will be encrypted during the migration using the credentials of the account used to run the LoadState tool. For more information, see [Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md).

+
+
+  +
+ +  + +## Incompatible Command-Line Options + + +The following table indicates which command-line options are not compatible with the **ScanState** command. If the table entry for a particular combination is blank, the options are compatible and you can use them together. The X symbol means that the options are not compatible. For example, you cannot use the **/nocompress** option with the **/encrypt** option. + + +++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-Line Option/keyfile/nocompress/genconfig/all

/i

/o

/v

/nocompress

X

N/A

/localonly

X

/key

X

X

/encrypt

Required*

X

X

/keyfile

N/A

X

/l

/progress

X

/r

X

/w

X

/c

X

/p

X

N/A

/all

X

/ui

X

X

/ue

X

X

/uel

X

X

/efs:<option>

X

/genconfig

N/A

/config

X

<StorePath>

X

+ +  + +**Note**   +You must specify either the /**key** or /**keyfile** option with the /**encrypt** option. + +  + +## Related topics + + +[XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/scenario-1-online-activation-vamt-30-win8.md b/windows/deploy/scenario-1-online-activation-vamt-30-win8.md new file mode 100644 index 0000000000..883dac609e --- /dev/null +++ b/windows/deploy/scenario-1-online-activation-vamt-30-win8.md @@ -0,0 +1,207 @@ +--- +title: Scenario 1-- Online Activation (Windows 10) +description: Scenario 1-- Online Activation +ms.assetid: 94dba40e-383a-41e4-b74b-9e884facdfd3 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Scenario 1: Online Activation + + +In this scenario, the Volume Activation Management Tool (VAMT) is deployed in the Core Network environment. VAMT is installed on a central computer that has network access to all of the client computers. Both the VAMT host and the client computers have Internet access. The following illustration shows a diagram of an online activation scenario for Multiple Activation Keys (MAKs). You can use this scenario for online activation of the following key types: + +- Multiple Activation Key (MAK) + +- Windows Key Management Service (KMS) keys: + + - KMS Host key (CSVLK) + + - Generic Volume License Key (GVLK), or KMS client key + +- Retail + +The Secure Zone represents higher-security Core Network computers that have additional firewall protection. + +![vamt firewall configuration for multiple subnets](images/dep-win8-l-vamt-makindependentactivationscenario.jpg) + +## In This Topic + + +- [Install and start VAMT on a networked host computer](#BKMK_PartOne) + +- [Configure the Windows Management Instrumentation firewall exception on target computers](#BKMK_PartTwo) + +- [Connect to VAMT database](#BKMK_PartThree) + +- [Discover products](#BKMK_PartFour) + +- [Sort and filter the list of computers](#BKMK_PartFive) + +- [Collect status information from the computers in the list](#BKMK_PartSix) + +- [Add product keys and determine the remaining activation count](#BKMK_PartSeven) + +- [Install the product keys](#BKMK_PartEight) + +- [Activate the client products](#BKMK_PartNine) + +## Part 1: Install and Start VAMT on a Networked Host Computer + + +1. Install VAMT on the host computer. + +2. Click the VAMT icon in the **Start** menu to open VAMT. + +## Part 2: Configure the Windows Management Instrumentation Firewall Exception on Target Computers + + +- Ensure that the Windows Management Instrumentation (WMI) firewall exception has been enabled for all target computers. For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +**Note**   +To retrieve product license status, VAMT must have administrative permissions on the remote computers and WMI must be available through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +  + +## Part 3: Connect to a VAMT Database + + +1. If you are not already connected to a database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database where the keys that must be activated are located. + +2. Click **Connect**. + +3. If you are already connected to a database, VAMT displays an inventory of the products and product keys in the center pane, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to Server** to open **the Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data](manage-vamt-data-vamt-30-win8.md) + +## Part 4: Discover + + +1. In the left-side pane, in the **Products** node Products, click the product that you want to activate. + +2. To open the **Discover Products** dialog box, click **Discover products** in the **Actions** menu in the right-side pane. + +3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general Lightweight Directory Access Protocol (LDAP) query: + + - To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a". + + - To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing. + + - To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a". + + - To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks. + +4. Click **Search**. + +When the search is complete, the products that VAMT discovers appear in the product list view in the center pane. + +## Part 5: Sort and Filter the List of Computers + + +You can sort the list of products so that it is easier to find the computers that require product keys to be activated: + +1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**. + +2. To sort the list further, you can click one of the column headings to sort by that column. + +3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane. + +## Part 6: Collect Status Information from the Computers in the List + + +To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods: + +- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key. + +- To select computers which are not listed consecutively, hold down the **Ctrl** key and select each computer for which you want to collect the status information. + +To collect status information from the selected computers: + +1. In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box, type the appropriate user name and password and then click **OK**. + +2. VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane. + +**Note**   +If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading. + +  + +## Part 7: Add Product Keys and Determine the Remaining Activation Count + + +1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box. + +2. In the **Add Product Key** dialog box, you can select from one of the following methods to add product keys: + + - To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add Key(s)**. + + - To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**. + + The keys that you have added appear in the **Product Keys** list view in the center pane. + +**Important**   +If you are activating many products with a MAK, refresh the activation count of the MAK to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and then click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs. + +  + +## Part 8: Install the Product Keys + + +1. In the left-side pane, click the product that you want to install keys on to. + +2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Part 5: Sort and filter the list of computers](#BKMK_PartFive). + +3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product. + +4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box. + +5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you want to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time. + +6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + + The same status appears under the **Status of Last Action** column in the product list view in the center pane. + +**Note**   +Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct product key, see [How to Choose the Right Volume License Key for Windows.](http://go.microsoft.com/fwlink/p/?linkid=238382) + +  + +## Part 9: Activate the Client Products + + +1. Select the individual products that you want to activate in the list-view pane. + +2. On the menu bar, click **Action**, point to **Activate** and point to **Online activate**. You can also right-click the selected computers(s) to display the **Action** menu, point to **Activate** and point to **Online activate**. You can also click **Activate** in the **Selected Items** menu in the right-hand pane to access the **Activate** option. + +3. If you are activating product keys using your current credential, click **Current credential** and continue to step 5. If you are activating products that require an administrator credential that is different from the one you are currently using, click the **Alternate credential** option. + +4. Enter your alternate user name and password and click **OK**. + +5. The **Activate** option contacts the Microsoft product-activation server over the Internet and requests activation for the selected products. VAMT displays the **Activating products** dialog box until the requested actions are completed. + +**Note**   +Installing a MAK and overwriting the GVLK on client products must be done with care. If the RTM version of Windows Vista has been installed on the computer for more than 30 days, then its initial grace period has expired. As a result, it will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are available on the network. RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and volume editions of Office 2010 will not enter RFM. + +  + +## Related topics + + +[VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/scenario-2-proxy-activation-vamt-30-win8.md b/windows/deploy/scenario-2-proxy-activation-vamt-30-win8.md new file mode 100644 index 0000000000..addc1441b5 --- /dev/null +++ b/windows/deploy/scenario-2-proxy-activation-vamt-30-win8.md @@ -0,0 +1,252 @@ +--- +title: Scenario 2-- Proxy Activation (Windows 10) +description: Scenario 2-- Proxy Activation +ms.assetid: ed5a8a56-d9aa-4895-918f-dd1898cb2c1a +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Scenario 2: Proxy Activation + + +In this scenario, the Volume Activation Management Tool (VAMT) is used to activate products that are installed on workgroup computers in an isolated lab environment. For workgroups which are isolated from the larger network, you can perform proxy activation of Multiple Activation Keys (MAKs), KMS Host keys (CSVLKs), Generic Volume License Keys (GVLKs) (or KMS client keys), or retail keys. Proxy activation is performed by installing a second instance of VAMT on a computer in the isolated workgroup. You can then use removable media to transfer VAMT Computer Information Lists (CILXs) between the instance of VAMT in the isolated workgroup and another VAMT host that has Internet access. The following diagram shows a Multiple Activation Key (MAK) proxy activation scenario: + +![vamt mak proxy activation scenario](images/dep-win8-l-vamt-makproxyactivationscenario.jpg) + +## Part 1: Install VAMT on a Workgroup Computer in the Isolated Lab + + +1. Install VAMT on a host computer in the isolated lab workgroup. This computer can be running Windows 7, Windows 8, Windows 10, Windows Server 2008 R2, or Windows Server® 2012. + +2. Click the VAMT icon in the **Start** menu to open VAMT. + +## Part 2: Configure the Windows Management Instrumentation Firewall Exception on Target Computers + + +- Ensure that the Windows Management Instrumentation (WMI) firewall exception has been enabled for all target computers. For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +**Note**   +To retrieve the license status on the selected computers, VAMT must have administrative permissions on the remote computers and WMI must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +  + +## Part 3: Connect to a VAMT Database + + +1. If the host computer in the isolated lab workgroup is not already connected to the database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database that contains the computers in the workgroup. + +2. Click **Connect**. + +3. If you are already connected to a database, in the center pane VAMT displays an inventory of the products and product keys, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to the Server** to open the **Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data.](manage-vamt-data-vamt-30-win8.md) + +## Part 4: Discover Products + + +1. In the left-side pane, in the **Products** node, click the product that you want to activate. + +2. To open the **Discover Products** dialog box, click **Discover products** in the right-side pane. + +3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query: + + - To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names, click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a". + + - To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that both IPv4 and IPv6addressing are supported. + + - To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a". + + - To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks. + +4. Click **Search**. + +The **Finding Computers** window appears and displays the search progress as the computers are located. + +When the search is complete, the products that VAMT discovers appear in the list view in the center pane. + +## Part 5: Sort and Filter the List of Computers + + +You can sort the list of products so that it is easier to find the computers that require product keys to be activated: + +1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**. + +2. To sort the list further, you can click one of the column headings to sort by that column. + +3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane. + +## Part 6: Collect Status Information from the Computers in the Isolated Lab + + +To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods: + +- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key. + +- To select computers which are not listed consecutively, hold down the **Ctrl** ley and select each computer for which you want to collect the status information. + +To collect status information from the selected computers: + +1. In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and then click **OK**. + +2. VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane. + +**Note**   +If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading. + +  + +## Part 7: Add Product Keys + + +1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box. + +2. In the **Add Product Keys** dialog box, you can select from one of the following methods to add product keys: + + - To add a single product key, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add key(s)**. + + - To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**. + + The keys that you have added appear in the **Product Keys** list view in the center pane. + +## Part 8: Install the Product Keys on the Isolated Lab Computers + + +1. In the left-side pane, in the **Products** node click the product that you want to install keys onto. + +2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Step 5: Sort the list of computers](#BKMK_Step5). + +3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product. + +4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box. + +5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time. + +6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + + The same status appears under the **Status of Last Action** column in the product list view in the center pane. + +**Note**   +Product key installation will fail if VAMT finds mismatched key types or editions. VAMT displays the failure status and continues the installation for the next product in the list. For more information on choosing the correct product key, see [How to Choose the Right Volume License Key for Windows.](http://go.microsoft.com/fwlink/p/?linkid=238382) + +  + +**Note**   +Installing a MAK and overwriting the GVLK on client products must be done with care. If the RTM version of Windows Vista has been installed on the computer for more than 30 days, then its initial grace period has expired. As a result, it will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are available on the network. RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012, and volume editions of Office 2010 will not enter RFM. + +  + +## Part 9: Export VAMT Data to a .cilx File + + +In this step, you export VAMT from the workgroup’s host computer and save it in a .cilx file. Then you copy the .cilx file to removable media so that you can take it to a VAMT host computer that is connected to the Internet. In MAK proxy activation, it is critical to retain this file, because VAMT uses it to apply the Confirmation IDs (CIDs) to the proper products. + +1. Select the individual products that successfully received a product key in Part 8. If needed, sort and filter the list to find the products. + +2. In the right-side **Actions** pane, click **Export list** to open the **Export List** dialog box. + +3. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file, or enter the name of the .cilx file to which you want to export the data. + +4. Under **Export options**, select one of the following data-type options: + + - Export products and product keys. + + - Export products only. + + - Export proxy activation data only. Selecting this option ensures that the export contains only the license information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is selected. This option should be used when an enterprise’s security policy states that no information that could identify a specific computer or user may be transferred out of the isolated lab and, therefore, this type of data must be excluded from the .cilx file that is transferred to the Core Network VAMT host. + +5. If you have selected products to export, and not the entire set of data from the database, select the **Export selected product rows only** check box. + +6. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully. + +7. If you exported the list to a file on the host computer’s hard drive, copy the file to removable media, such as a disk drive, CD/DVD, or USB storage device. + +**Important**   +Choosing the **Export proxy activation data only** option excludes Personally Identifiable Information (PII) from being saved in the .cilx file. Therefore, the .cilx file must be re-imported into the SQL Server database on the isolated lab workgroup’s VAMT host computer, so that the CIDs that are requested from Microsoft (discussed in Part 10) can be correctly assigned to the computers in the isolated lab group. + +  + +## Part 10: Acquire Confirmation IDs from Microsoft on the Internet-Connected Host Computer + + +1. Insert the removable media into the VAMT host that has Internet access. + +2. Open VAMT. Make sure you are on the root node, and that the **Volume Activation Management Tool** view is displayed in the center pane. + +3. In the right-side **Actions** pane, click **Acquire confirmation IDs for CILX** to open the **Acquire confirmation IDs for file** dialog box. + +4. In the **Acquire confirmation IDs for file** dialog box, browse to the location of the .cilx file that you exported from the isolated lab host computer, select the file, and then click **Open**. VAMT displays an **Acquiring Confirmation IDs** message while it contacts Microsoft and collects the CIDs. + +5. When the CID collection process is complete, VAMT displays a **Volume Activation Management Tool** message that shows the number of confirmation IDs that were successfully acquired, and the name of the file where the IDs were saved. Click **OK** to close the message. + +## Part 11: Import the .cilx File onto the VAMT Host within the Isolated Lab Workgroup + + +1. Remove the storage device that contains the .cilx file from the Internet-connected VAMT host computer and insert it into the VAMT host computer in the isolated lab. + +2. Open VAMT and verify that you are connected to the database that contains the computer with the product keys that you are activating. + +3. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box. + +4. In the **Import list** dialog box, browse to the location of the .cilx file that contains the CIDs, select the file, and then click **Open**. + +5. Click **OK** to import the file and to overwrite any conflicting data in the database with data from the file. + +6. VAMT displays a progress message while the data is being imported. Click **OK** when a message appears and confirms that the data has been successfully imported. + +## Part 12: Apply the CIDs and Activate the Isolated Lab Computers + + +1. Select the products to which you want to apply CIDs. If needed, sort and filter the list to find the products. + +2. In the right-side **Selected Items** menu, click **Activate**, click **Apply Confirmation ID**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password. + +VAMT displays the **Applying Confirmation Id** dialog box while it installs the CIDs on the selected products. When VAMT finishes installing the CIDs, the status appears in the **Action Sataus** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + +The same status appears under the **Status of Last Action** column in the product list view in the center pane. + +## Part 13: (Optional) Reactivating Reimaged Computers in the Isolated Lab + + +If you have captured new images of the computers in the isolated lab, but the underlying hardware of those computers has not changed, VAMT can reactivate those computers using the CIDs that are stored in the database. + +1. Redeploy products to each computer, using the same computer names as before. + +2. Open VAMT. + +3. In the right-side **Selected Items** menu, click **Activate**, click **Apply Confirmation ID**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password. + +VAMT displays the **Applying Confirmation Id** dialog box while it installs the CIDs on the selected products. When VAMT finishes installing the CIDs, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + +The same status appears under the **Status of Last Action** column in the product list view in the center pane. + +**Note**   +Installing a MAK and overwriting the GVLK on the client products must be done with care. If the Windows activation initial grace period has expired, Windows will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are accessible on the network. RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012, and volume editions of Office 2010 will not enter RFM. + +  + +**Note**   +Reapplying the same CID conserves the remaining activations on the MAK. + +  + +## Related topics + + +[VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/scenario-3-kms-client-activation-vamt-30-win8.md b/windows/deploy/scenario-3-kms-client-activation-vamt-30-win8.md new file mode 100644 index 0000000000..c14fe8133c --- /dev/null +++ b/windows/deploy/scenario-3-kms-client-activation-vamt-30-win8.md @@ -0,0 +1,69 @@ +--- +title: Scenario 3-- KMS Client Activation (Windows 10) +description: Scenario 3-- KMS Client Activation +ms.assetid: 72b04e8f-cd35-490c-91ab-27ea799b05d0 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Scenario 3: KMS Client Activation + + +In this scenario, you use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs). This can be performed on either Core Network or Isolated Lab computers. By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products. You do not have to enter a key to activate a product as a GVLK, unless you are converting a MAK-activated product to a KMS activation. For more information, see [Install a KMS Client Key](install-a-kms-client-key-vamt-30-win8.md). + +The procedure that is described below assumes the following: + +- The KMS Service is enabled and available to all KMS clients. + +- VAMT has been installed and computers have been added to the VAMT database. See Parts 1 through 4 in either [Scenario 1: Online Activation](scenario-1-online-activation-vamt-30-win8.md) or [Scenario 2: Proxy Activation](scenario-2-proxy-activation-vamt-30-win8.md) for more information. + +## Activate KMS Clients + + +1. Open VAMT. + +2. To set the KMS activation options, on the menu bar click **View**. Then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box. + +3. In the **Volume Activation Management Tool Preferences** dialog box, under **KMS Management Services host selection** select from the following options: + + - **Find a KMS host automatically using DNS**. This is the default setting. VAMT will instruct the computer to query the Domain Name Service (DNS) to locate a KMS host and perform activation. If the client contains a registry key with a valid KMS host, that value will be used instead. + + - **Find a KMS host using DNS in this domain for supported products**. Select this option if you use a specific domain, and enter the name of the domain. + + - **Use specific KMS host**. Select this option for environments which do not use DNS for KMS host identification, and manually enter the KMS host name and select the KMS host port. VAMT will set the specified KMS host name and KMS host port on the target computer, and then instruct the computer to perform activation with the specific KMS host. + +4. In the left-side pane, in the **Products** node, click the product that you want to activate. + +5. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box. + +6. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options. + + - To filter the list by computer name, enter a name in the **Computer Name** box. + + - To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter. + +7. Click **Filter**. VAMT displays the filtered list in the center pane. + +8. Select the products that you want to activate. + +9. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane, click **Activate**, point to **Volume activate**, and then click the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password. + +10. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears. + +The same status is shown under the **Status of Last Action** column in the products list view in the center pane. + +## Related topics + + +[VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/set-up-mdt-2013-for-bitlocker.md b/windows/deploy/set-up-mdt-2013-for-bitlocker.md new file mode 100644 index 0000000000..c3c35f44b5 --- /dev/null +++ b/windows/deploy/set-up-mdt-2013-for-bitlocker.md @@ -0,0 +1,225 @@ +--- +title: Set up MDT for BitLocker (Windows 10) +ms.assetid: 386e6713-5c20-4d2a-a220-a38d94671a38 +description: +keywords: ["disk, encryption, TPM, configure, secure, script"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Set up MDT for BitLocker + + +**In this article** + +- [Configure Active Directory for BitLocker](#sec01) +- [Add BIOS configuration tools from Dell, HP, and Lenovo](#sec02) +- [Configure the Windows 10 task sequence to enable BitLocker](#sec03) +- [Related topics](#related_topics) + +This topic will show you how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT. BitLocker in Windows 10 has two requirements in regard to an operating system deployment: + +- A protector, which can either be stored in the Trusted Platform Module (TPM) chip, or stored as a password. Technically, you also can use a USB stick to store the protector, but it's not a practical approach as the USB stick can be lost or stolen. We, therefore, recommend that you instead use a TPM chip and/or a password. + +- Multiple partitions on the hard drive. + +To configure your environment for BitLocker, you will need to do the following: + +1. Configure Active Directory for BitLocker. + +2. Download the various BitLocker scripts and tools. + +3. Configure the operating system deployment task sequence for BitLocker. + +4. Configure the rules (CustomSettings.ini) for BitLocker. + +**Note**   +Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](http://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker. + +  + +For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md#proof). + +## Configure Active Directory for BitLocker + + +To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory. + +**Note**   +Depending on the Active Directory Schema version, you might need to update the Schema before you can store BitLocker information in Active Directory. + +  + +In Windows Server 2012 R2 (as well as in Windows Server 2008 R2 and Windows Server 2012), you have access to the BitLocker Drive Encryption Administration Utilities features, which will help you manage BitLocker. When you install the features, the BitLocker Active Directory Recovery Password Viewer is included, and it extends Active Directory Users and Computers with BitLocker Recovery information. + +![figure 2](images/mdt-09-fig02.png) + +Figure 2. The BitLocker Recovery information on a computer object in the contoso.com domain. + +### Add the BitLocker Drive Encryption Administration Utilities + +The BitLocker Drive Encryption Administration Utilities are added as features via Server Manager (or Windows PowerShell): + +1. On DC01, log on as **CONTOSO\\Administrator**, and, using Server Manager, click **Add roles and features**. + +2. On the **Before you begin** page, click **Next**. + +3. On the **Select installation type** page, select **Role-based or feature-based installation**, and click **Next**. + +4. On the **Select destination server** page, select **DC01.contoso.com** and click **Next**. + +5. On the **Select server roles** page, click **Next**. + +6. On the **Select features** page, expand **Remote Server Administration Tools**, expand **Feature Administration Tools**, select the following features, and then click **Next**: + + 1. BitLocker Drive Encryption Administration Utilities + + 2. BitLocker Drive Encryption Tools + + 3. BitLocker Recovery Password Viewer + +7. On the **Confirm installation selections** page, click **Install** and then click **Close**. + +![figure 3](images/mdt-09-fig03.png) + +Figure 3. Selecting the BitLocker Drive Encryption Administration Utilities. + +### Create the BitLocker Group Policy + +Following these steps, you enable the backup of BitLocker and TPM recovery information to Active Directory. You also enable the policy for the TPM validation profile. + +1. On DC01, using Group Policy Management, right-click the **Contoso** organizational unit (OU), and select **Create a GPO in this domain, and Link it here**. + +2. Assign the name **BitLocker Policy** to the new Group Policy. + +3. Expand the **Contoso** OU, right-click the **BitLocker Policy**, and select **Edit**. Configure the following policy settings: + + Computer Configuration / Policies / Administrative Templates / Windows Components / BitLocker Drive Encryption / Operating System Drives + + 1. Enable the **Choose how BitLocker-protected operating system drives can be recovered** policy, and configure the following settings: + + 1. Allow data recovery agent (default) + + 2. Save BitLocker recovery information to Active Directory Domain Services (default) + + 3. Do not enable BitLocker until recovery information is stored in AD DS for operating system drives + + 2. Enable the **Configure TPM platform validation profile for BIOS-based firmware configurations** policy. + + 3. Enable the **Configure TPM platform validation profile for native UEFI firmware configurations** policy. + + Computer Configuration / Policies / Administrative Templates / System / Trusted Platform Module Services + + 4. Enable the **Turn on TPM backup to Active Directory Domain Services** policy. + +**Note**   +If you consistently get the error "Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system." after encrypting a computer with BitLocker, you might have to change the various "Configure TPM platform validation profile" Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using. + +  + +### Set permissions in Active Directory for BitLocker + +In addition to the Group Policy created previously, you need to configure permissions in Active Directory to be able to store the TPM recovery information. In these steps, we assume you have downloaded the [Add-TPMSelfWriteACE.vbs script](http://go.microsoft.com/fwlink/p/?LinkId=167133) from Microsoft to C:\\Setup\\Scripts on DC01. + +1. On DC01, start an elevated PowerShell prompt (run as Administrator). + +2. Configure the permissions by running the following command: + + ``` syntax + cscript C:\Setup\Scripts\Add-TPMSelfWriteACE.vbs + ``` + +![figure 4](images/mdt-09-fig04.png) + +Figure 4. Running the Add-TPMSelfWriteACE.vbs script on DC01. + +## Add BIOS configuration tools from Dell, HP, and Lenovo + + +If you want to automate enabling the TPM chip as part of the deployment process, you need to download the vendor tools and add them to your task sequences, either directly or in a script wrapper. + +### Add tools from Dell + +The Dell tools are available via the Dell Client Configuration Toolkit (CCTK). The executable file from Dell is named cctk.exe. Here is a sample command to enable TPM and set a BIOS password using the cctk.exe tool: + +``` syntax +cctk.exe --tpm=on --valsetuppwd=Password1234 +``` + +### Add tools from HP + +The HP tools are part of HP System Software Manager. The executable file from HP is named BiosConfigUtility.exe. This utility uses a configuration file for the BIOS settings. Here is a sample command to enable TPM and set a BIOS password using the BiosConfigUtility.exe tool: + +``` syntax +BIOSConfigUtility.EXE /SetConfig:TPMEnable.REPSET /NewAdminPassword:Password1234 +``` + +And the sample content of the TPMEnable.REPSET file: + +``` syntax +English +Activate Embedded Security On Next Boot +*Enable +Embedded Security Activation Policy +*No prompts +F1 to Boot +Allow user to reject +Embedded Security Device Availability +*Available +``` + +### Add tools from Lenovo + +The Lenovo tools are a set of VBScripts available as part of the Lenovo BIOS Setup using Windows Management Instrumentation Deployment Guide. Lenovo also provides a separate download of the scripts. Here is a sample command to enable TPM using the Lenovo tools: + +``` syntax +cscript.exe SetConfig.vbs SecurityChip Active +``` + +## Configure the Windows 10 task sequence to enable BitLocker + + +When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it is helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In this task sequence, we are using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](http://go.microsoft.com/fwlink/p/?LinkId=619549). In the following task sequence, we have added five actions: + +- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script to determine if TPM is enabled. Depending on the status, the script will set the TPMEnabled and TPMActivated properties to either true or false. + +- **Configure BIOS for TPM.** Runs the vendor tools (in this case, HP, Dell, and Lenovo). To ensure this action is run only when necessary, add a condition so the action is run only when the TPM chip is not already activated. Use the properties from the ZTICheckforTPM.wsf. + + **Note**   + It is common for organizations wrapping these tools in scripts to get additional logging and error handling. + +   + +- **Restart computer.** Self-explanatory, reboots the computer. + +- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script one more time. + +- **Enable BitLocker.** Runs the built-in action to activate BitLocker. + +## Related topics + + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/sideload-apps-in-windows-10.md b/windows/deploy/sideload-apps-in-windows-10.md new file mode 100644 index 0000000000..e77c3c71c3 --- /dev/null +++ b/windows/deploy/sideload-apps-in-windows-10.md @@ -0,0 +1,135 @@ +--- +title: Sideload LOB apps in Windows 10 (Windows 10) +description: Sideload line-of-business apps in Windows 10. +ms.assetid: C46B27D0-375B-4F7A-800E-21595CF1D53D +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Sideload LOB apps in Windows 10 + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [Requirements](#requirements) +- [How do I sideload an app on desktop](#how_do_i_sideload_an_app_on_desktop) +- [How do I sideload an app on mobile](#how_do_i_sideload_an_app_on_mobile) + +Sideload line-of-business apps in Windows 10. + +"Line-of-Business" (LOB) apps are present in a wide range of businesses and organizations. Organizations value these apps because they solve problems unique to each business. + +When you sideload an app, you deploy a signed app package to a device. You maintain the signing, hosting, and deployment of these apps. Sideloading was also available with Windows 8 and Windows 8.1 + +In Windows 10, sideloading is different than in earlier versions of Windows: + +- You can unlock a device for sideloading using an enterprise policy, or through **Settings** + +- License keys are not required + +- Devices do not have to be joined to a domain + +## Requirements + + +Here's what you'll need to have: + +- Devices need to be unlocked for sideloading (unlock policy enabled) + +- Certificate assigned to app + +- Signed app package + +And here's what you'll need to do: + +- Turn on sideloading - you can push a policy with an MDM provider, or you can use **Settings**. + +- Trust the app - import the security certificate to the local device. + +- Install the app - use PowerShell to install the app package. + +## How do I sideload an app on desktop + + +You can sideload apps on managed or unmanaged devices. + +**To turn on sideloading for managed devices** + +- Deploy an enterprise policy. + +**To turn on sideloading for unmanaged devices** + +1. Open **Settings**. + +2. Click **Update & Security** > **For developers**. + +3. On **Use developer features**, select **Sideload apps**. + +**To import the security certificate** + +1. Open the security certificate for the appx package, and select **Install Certificate**. + +2. On the **Certificate Import Wizard**, select **Local Machine**. + +3. Import the certificate to the **Trusted Root Certification Authorities** folder. + +-Or- + +You can use a runtime provisioning package to import a security certificate. For information about applying a provisioning package to a Windows 10 device, see runtime instructions on [Build and apply a provisioning package]( http://go.microsoft.com/fwlink/p/?LinkId=619162). + +**To install the app** + +- From the folder with the appx package, run the PowerShell `Add-AppxPackage` command to install the appx package. + +## How do I sideload an app on mobile + + +You can sideload apps on managed or unmanaged devices. + +**To turn on sideloading for a managed device** + +- Deploy an enterprise policy. + +**To turn on sideloading for unmanaged devices** + +1. Open **Settings**. + +2. Click **Update & Security** > **For developers**. + +3. On **Use developer features**, select **Sideload apps**. + +**To import the security certificate for managed devices** + +1. Open the security certificate for the appx package, and select **Install Certificate**. + +2. On the **Certificate Import Wizard**, select **Local Machine**. + +3. Import the certificate to the **Trusted Root Certification Authorities** folder. + +**To import the security certificate for unmanaged devices** + +- You can use a runtime provisioning package to import a security certificate. For information about applying a provisioning package to a Windows 10 mobile device, see runtime instructions on [Build and apply a provisioning package]( http://go.microsoft.com/fwlink/p/?LinkId=619164). + +**To install the app** + +- From an email, tap a xap, appx, or appx bundle package. + + -Or- + + With your mobile device tethered to a desktop, click a xap, appx, or appx bundle package from the files system to install the app. + +  + +  + + + + + diff --git a/windows/deploy/simulate-a-windows-81-deployment-in-a-test-environment.md b/windows/deploy/simulate-a-windows-81-deployment-in-a-test-environment.md new file mode 100644 index 0000000000..8ef986a29c --- /dev/null +++ b/windows/deploy/simulate-a-windows-81-deployment-in-a-test-environment.md @@ -0,0 +1,91 @@ +--- +title: Simulate a Windows 10 deployment in a test environment (Windows 10) +description: This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT. +ms.assetid: 2de86c55-ced9-4078-b280-35e0329aea9c +keywords: ["deploy, script,"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Simulate a Windows 10 deployment in a test environment + + +This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT. When working with advanced settings and rules, especially those like database calls, it is most efficient to be able to test the settings without having to run through a complete deployment. Luckily, MDT enables you to perform a simulated deployment by running the Gather process by itself. The simulation works best when you are using a domain-joined machine (client or server). In the following example, you use the PC0001 Windows 10 client. + +For the purposes of this topic, you already will have either downloaded and installed the free Microsoft System Center 2012 R2 Configuration Manager Toolkit, or copied Configuration Manager Trace (CMTrace) if you have access to the System Center 2012 R2 Configuration Manager media. We also assume that you have downloaded the [sample Gather.ps1 script](http://go.microsoft.com/fwlink/p/?LinkId=619361) from the TechNet gallery. + +1. On PC0001, log on as **CONTOSO\\Administrator** using the password **P@ssw0rd**. + +2. Using Computer Management, add the **CONTOSO\\MDT\_BA** user account to the local **Administrators** group. + +3. Log off, and then log on to PC0001 as **CONTOSO\\MDT\_BA**. + +4. Using File Explorer, create a folder named **C:\\MDT**. + +5. Copy the downloaded Gather.ps1 script to the **C:\\MDT** folder. + +6. From the **\\\\MDT01\\MDTProduction$\\Scripts** folder, copy the following files to **C:\\MDT**: + + 1. ZTIDataAccess.vbs + + 2. ZTIGather.wsf + + 3. ZTIGather.xml + + 4. ZTIUtility.vbs + +7. From the **\\\\MDT01\\MDTProduction$\\Control** folder, copy the CustomSettings.ini file to **C:\\MDT**. + +8. In the **C:\\MDT** folder, create a subfolder named **X64**. + +9. From the **\\\\MDT01\\MDTProduction$\\Tools\\X64** folder, copy the Microsoft.BDD.Utility.dll file to **C:\\MDT\\X64**. + + ![figure 6](images/mdt-09-fig06.png) + + Figure 6. The C:\\MDT folder with the files added for the simulation environment. + +10. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press Enter after each command: + + ``` syntax + Set-Location C:\MDT + .\Gather.ps1 + ``` + +11. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder. + +**Note**   +Warnings or errors with regard to the Wizard.hta are expected. If the log file looks okay, you are ready to try a real deployment. + +  + +![figure 7](images/mdt-09-fig07.png) + +Figure 7. The ZTIGather.log file from PC0001, displaying some of its hardware capabilities. + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/test-your-migration-usmt-win7-usmt-win8.md b/windows/deploy/test-your-migration-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..d9870e8dda --- /dev/null +++ b/windows/deploy/test-your-migration-usmt-win7-usmt-win8.md @@ -0,0 +1,48 @@ +--- +title: Test Your Migration (Windows 10) +description: Test Your Migration +ms.assetid: 754af276-8386-4eac-8079-3d1e45964a0d +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Test Your Migration + + +Always test your migration plan in a controlled laboratory setting before you deploy it to your entire organization. In your test environment, you need at least one computer for each type of operating system from which you are migrating data. + +After you have thoroughly tested the entire migration process on a single computer running each of your source operating systems, conduct a pilot migration with a small group of users. After migrating a few typical user states to the intermediate store, note the space required and adjust your initial calculations accordingly. For details about estimating the space needed for your migration, see [Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md). You might also need to adjust the registry-setting and file-location information in your migration-rule files. If you make changes, test the migration again. Then verify that all data and settings have migrated as expected. A pilot migration also gives you an opportunity to test your space estimates for the intermediate store. + +If your test migration encounters any errors, examine the ScanState and LoadState logs to obtain the exact User State Migration Tool (USMT) 10.0 return code and associated error messages or Windows application programming interface (API) error message. For more information about USMT return codes and error messages, see [Return Codes](return-codes-usmt-win8.md). You can also obtain more information about a Windows API error message by typing **net helpmsg** and the error message number on the command line. + +In most cases, the ScanState and LoadState logs indicate why a USMT migration is failing. We recommend that you use the **/v***:5* option when testing your migration. This verbosity level can be adjusted in a production migration. Reducing the verbosity level might make it more difficult to diagnose failures that are encountered during production migrations. You can use a higher verbosity level if you want the log files output to go to a debugger. + +**Note**   +Running the ScanState and LoadState tools with the **/v***:5* option creates a detailed log file. Although this option makes the log file large, it is helpful in determining where migration errors occurred. + +  + +After you have determined that the pilot migration successfully migrated the specified files and settings, you are ready to add USMT to the server that is running Microsoft® System Center Configuration Manager (SCCM), or a non-Microsoft management technology. For more information, see [Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=140246). + +**Note**   +For testing purposes, you can create an uncompressed store using the **/hardlink /nocompress** option. When compression is disabled, the ScanState tool saves the files and settings to a hidden folder named "File" at *StorePath*\\USMT. You can use the uncompressed store to view what USMT has stored or to troubleshoot a problem, or you can run an antivirus utility against the files. Additionally, you can also use the **/listfiles** command-line option and the diagnostic log to list the files that were gathered and to troubleshoot problems with your migration. + +  + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +[Log Files](log-files-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/understanding-migration-xml-files.md b/windows/deploy/understanding-migration-xml-files.md new file mode 100644 index 0000000000..867f949736 --- /dev/null +++ b/windows/deploy/understanding-migration-xml-files.md @@ -0,0 +1,536 @@ +--- +title: Understanding Migration XML Files (Windows 10) +description: Understanding Migration XML Files +ms.assetid: d3d1fe89-085c-4da8-9657-fd54b8bfc4b7 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Understanding Migration XML Files + + +You can modify the behavior of a basic User State Migration Tool (USMT)10.0 migration by using XML files; these files provide instructions on where and how the USMT tools should gather and apply files and settings. USMT includes three XML files that you can use to customize a basic migration: the MigDocs.xml and MigUser.xml files, which modify how files are discovered on the source computer, and the MigApps.xml file, which is required in order to migrate supported application settings. You can also create and edit custom XML files and a Config.xml file to further customize your migration. + +This topic provides an overview of the default and custom migration XML files and includes guidelines for creating and editing a customized version of the MigDocs.xml file. The MigDocs.xml file uses the new **GenerateDocPatterns** function available in USMT to automatically find user documents on a source computer. + +## In This Topic + + +[Overview of the Config.xml file](#BKMK_Config) + +[Overview of the MigApp.xml file](#BKMK_MigApp) + +[Overview of the MigDocs.xml file](#BKMK_MigDocs) + +[Overview of the MigUser.xml file](#BKMK_MigUser) + +[Using multiple XML files](#BKMK_Multiple) + +[XML rules for migrating user files](#BKMK_UserFiles) + +[The GenerateDocPatterns function](#BKMK_Generate) + +[Understanding the system and user context](#BKMK_Context) + +[Sample migration rules for customized versions of XML files](#BKMK_Samples) + +[Exclude rules usage examples](#BKMK_Exclude) + +[Include rules usage examples](#BKMK_Include) + +[Next Steps](#BKMK_Next) + +## Overview of the Config.xml file + + +The Config.xml file is the configuration file created by the `/genconfig` option of the ScanState tool; it can be used to modify which operating-system components are migrated by USMT. The Config.xml file can be used in conjunction with other XML files, such as in the following example: `scanstate /i:migapps.xml /i:migdocs.xml /genconfig:c:\myFolder\config.xml`. When used this way, the Config.xml file tightly controls aspects of the migration, including user profiles, data, and settings, without modifying or creating other XML files. For more information about the Config.xml file, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) and [Config.xml File](configxml-file-usmt-win7-usmt-win8.md). + +**Note**   +When modifying the XML elements in the Config.xml file, you should edit an element and set the **migrate** property to **no**, rather than deleting the element from the file. If you delete the element instead of setting the property, the component may still be migrated by rules in other XML files. + +  + +## Overview of the MigApp.xml file + + +The MigApp.xml file installed with USMT includes instructions to migrate the settings for the applications listed in [What Does USMT Migrate?](what-does-usmt-migrate-usmt-win7-usmt-win8.md). You must include the MigApp.xml file when using the ScanState and LoadState tools, by using the `/i` option in order to migrate application settings. The MigDocs.xml and MigUser.xml files do not migrate application settings. You can create a custom XML file to include additional applications. For more information, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md). + +**Important**   +The MigApps.xml file will only detect and migrate .pst files that are linked to Microsoft Office Outlook. See the [Sample migration rules for customized versions of XML files](#BKMK_Samples) section of this document for more information about migrating .pst files that are not linked to Outlook. + +  + +## Overview of the MigDocs.xml file + + +The MigDocs.xml file uses the new **GenerateDocPatterns** helper function to create instructions for USMT to migrate files from the source computer, based on the location of the files. You can use the MigDocs.xml file with the ScanState and LoadState tools to perform a more targeted migration than using USMT without XML instructions. + +The default MigDocs.xml file migrates the following: + +- All files on the root of the drive except %WINDIR%, %PROGRAMFILES%, %PROGRAMDATA%, or %USERS%. + +- All folders in the root directory of all fixed drives. For example: c:\\data\_mail\\\*\[\*\] + +- All files from the root of the Profiles folder, except for files in the system profile. For example: c:\\users\\name\[mail.pst\] + +- All folders from the root of the Profiles folder, except for the system-profile folders. For example: c:\\users\\name\\new folder\\\*\[\*\] + +- Standard shared folders: + + - CSIDL\_COMMON\_DESKTOPDIRECTORY + + - CSIDL\_COMMON\_FAVORITES + + - CSIDL\_COMMON\_DOCUMENTS + + - CSIDL\_COMMON\_MUSIC + + - CSIDL\_COMMON\_PICTURES + + - CSIDL\_COMMON\_VIDEO + + - FOLDERID\_PublicDownloads + +- Standard user-profile folders for each user: + + - CSIDL\_MYDOCUMENTS + + - CSIDL\_MYPICTURES + + - FOLDERID\_OriginalImages + + - CSIDL\_MYMUSIC + + - CSIDL\_MYVIDEO + + - CSIDL\_FAVORITES + + - CSIDL\_DESKTOP + + - CSIDL\_QUICKLAUNCH + + - FOLDERID\_Contacts + + - FOLDERID\_Libraries + + - FOLDERID\_Downloads + + - FOLDERID\_SavedGames + + - FOLDERID\_RecordedTV + +The default MigDocs.xml file will not migrate the following: + +- Files tagged with both the **hidden** and **system** attributes. + +- Files and folders on removable drives. + +- Data from the %WINDIR%, %PROGRAMDATA%, and %PROGRAMFILES% folders. + +- Folders that contain installed applications. + +You can also use the **/genmigxml** option with the ScanState tool to review and modify what files will be migrated. + +## Overview of the MigUser.xml file + + +The MigUser.xml file includes instructions for USMT to migrate user files based on file name extensions. You can use the MigUser.xml file with the ScanState and LoadState tools to perform a more targeted migration than using USMT without XML instructions. The MigUser.xml file will gather all files from the standard user-profile folders, as well as any files on the computer with the specified file name extensions. + +The default MigUser.xml file migrates the following: + +- All files from the standard user-profile folders which are described as: + + - CSIDL\_MYVIDEO + + - CSIDL\_MYMUSIC + + - CSIDL\_DESKTOP + + - CSIDL\_STARTMENU + + - CSIDL\_PERSONAL + + - CSIDL\_MYPICTURES + + - CSIDL\_FAVORITES + + - CSIDL\_QUICK LAUNCH + +- Files with the following extensions: + + .qdf, .qsd, .qel, .qph, .doc\*, .dot\*, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl\*, .csv, .iqy, .dqy, .oqy, .rqy, .wk\*, .wq1, .slk, .dif, .ppt\*, .pps\*, .pot\*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one\*, .vl\*, .vsd, .mpp, .or6, .accdb, .mdb, .pub + +The default MigUser.xml file does not migrate the following: + +- Files tagged with both the **hidden** and **system** attributes. + +- Files and folders on removable drives, + +- Data from the %WINDIR%, %PROGRAMFILES%, %PROGRAMDATA% folders. + +- ACLS for files in folders outside the user profile. + +You can make a copy of the MigUser.xml file and modify it to include or exclude standard user-profile folders and file name extensions. If you know all of the extensions for the files you want to migrate from the source computer, use the MigUser.xml file to move all of your relevant data, regardless of the location of the files. However, this may result in a migration that contains more files than intended. For example, if you choose to migrate all .jpg files, you may migrate image files such as thumbnails and logos from legacy applications that are installed on the source computer. + +**Note**   +Each file name extension you include in the rules within the MigUser.xml file increases the amount of time needed for the ScanState tool to gather the files for the migration. If you are migrating more than three hundred file types, you may experience a slow migration. For more information about other ways to organize the migration of your data, see the [Using multiple XML files](#BKMK_Multiple) section of this document. + +  + +## Using multiple XML files + + +You can use multiple XML files with the ScanState and LoadState tools. Each of the default XML files included with or generated by USMT is configured for a specific component of the migration. You can also use custom XML files to supplement these default files with additional migration rules. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
XML migration fileModifies the following components:

Config.xml file

Operating-system components such as desktop wallpaper and background theme.

+

You can also overload config.xml to include some application and document settings by generating the config.xml file with the other default XML files. For more information, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) and [Config.xml File](configxml-file-usmt-win7-usmt-win8.md).

MigApps.xml file

Applications settings.

MigUser.xml or MigDocs.xml files

User files and profile settings.

Custom XML files

Application settings, user profile settings, or user files, beyond the rules contained in the other XML files.

+ +  + +For example, you can use all of the XML migration file types for a single migration, as in the following example: + +``` syntax +Scanstate /config:c:\myFolder\config.xml /i:migapps.xml /i:migdocs.xml /i:customrules.xml +``` + +### XML rules for migrating user files + +**Important**   +You should not use the MigUser.xml and MigDocs.xml files together in the same command. Using both XML files can result in duplication of some migrated files. This occurs when conflicting target-location instructions are given in each XML file. The target file will be stored once during the migration, but will be applied by each XML file to a different location on the destination computer. + +  + +If your data set is unknown or if many files are stored outside of the standard user-profile folders, the MigDocs.xml is a better choice than the MigUser.xml file, because the MigDocs.xml file will gather a broader scope of data. The MigDocs.xml file migrates folders of data based on location. The MigUser.xml file migrates only the files with the specified file name extensions. + +If you want more control over the migration, you can create custom XML files. See the [Creating and editing a custom ,xml file](#BKMK_CreateXML) section of this document. + +## Creating and editing a custom XML file + + +You can use the **/genmigxml** command-line option to determine which files will be included in your migration. The **/genmigxml** option creates a file in a location you specify, so that you can review the XML rules and make modifications as necessary. + +**Note**   +If you reinstall USMT, the default migration XML files will be overwritten and any customizations you make directly to these files will be lost. Consider creating separate XML files for your custom migration rules and saving them in a secure location. + +  + +To generate the XML migration rules file for a source computer: + +1. Click **Start**, click **All Programs**, click **Accessories**, right-click **Command Prompt**, and then click **Run as**. + +2. Select an account with administrator privileges, supply a password, and then click **OK**. + +3. At the command prompt, type: + + ``` syntax + cd /d + scanstate.exe /genmigxml: + ``` + + Where *<USMTpath>* is the location on your source computer where you have saved the USMT files and tools, and *<filepath.xml>* is the full path to a file where you can save the report. For example, type: + + ``` syntax + cd /d c:\USMT + scanstate.exe /genmigxml:"C:\Documents and Settings\USMT Tester\Desktop\genMig.xml" + ``` + +### The GenerateDocPatterns function + +The MigDocs.xml file calls the **GenerateDocPatterns** function, which takes three Boolean values. You can change the settings to modify the way the MigDocs.xml file generates the XML rules for migration. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
SettingValueDefault Value

ScanProgramFiles

The ScanProgramFiles argument is valid only when the GenerateDocPatterns function is called in a system context. This argument determines whether or not to scan the Program Files directory to gather registered file name extensions for known applications.

+

For example, when set to TRUE, the function discovers and migrates .doc files under the Microsoft Office directory, because .doc is a file name extension registered to a Microsoft Office application. The GenerateDocPatterns function generates this inclusion pattern for .doc files:

+
<pattern type="File">C:\Program Files\Microsoft Office\*[*.doc]</pattern>
+

If a child folder of an included folder contains an installed application, ScanProgramFiles will also create an exclusion rule for the child folder. All folders under the application folder will be scanned recursively for registered file name extensions.

False

IncludePatterns

The IncludePatterns argument determines whether to generate exclude or include patterns in the XML. When this argument is set to TRUE, the GenerateDocPatterns function generates include patterns and the function must be added under the <include> element. Changing this argument to FALSE generates exclude patterns and the function must be added under the <exclude> element.

True

SystemDrive

The SystemDrive argument determines whether to generate patterns for all fixed drives or only for the system drive. Changing this argument to TRUE restricts all patterns to the system drive.

False

+ +  + +**Usage:** + +``` syntax +MigXmlHelper.GenerateDocPatterns ("", "", "") +``` + +To create include data patterns for only the system drive: + +``` syntax + +      +         +      + +``` + +To create an include rule to gather files for registered extensions from the %PROGRAMFILES% directory: + +``` syntax + +      +         +      + +``` + +To create exclude data patterns: + +``` syntax + +      +         +      + +``` + +### Understanding the system and user context + +The migration XML files contain two <component> elements with different **context** settings. The system context applies to files on the computer that are not stored in the User Profiles directory, while the user context applies to files that are particular to an individual user. + +**System context** + +The system context includes rules for data outside of the User Profiles directory. For example, when called in a system context in the MigDocs.xml file, the **GenerateDocPatterns** function creates patterns for all common shell folders, files in the root directory of hard drives, and folders located at the root of hard drives. The following folders are included: + +- CSIDL\_COMMON\_DESKTOPDIRECTORY + +- CSIDL\_COMMON\_FAVORITES + +- CSIDL\_COMMON\_DOCUMENTS + +- CSIDL\_COMMON\_MUSIC + +- CSIDL\_COMMON\_PICTURES + +- CSIDL\_COMMON\_VIDEO + +- FOLDERID\_PublicDownloads + +**User context** + +The user context includes rules for data in the User Profiles directory. When called in a user context in the MigDocs.xml file, the **GenerateDocPatterns** function creates patterns for all user shell folders, files located at the root of the profile, and folders located at the root of the profile. The following folders are included: + +- CSIDL\_MYDOCUMENTS + +- CSIDL\_MYPICTURES + +- FOLDERID\_OriginalImages + +- CSIDL\_MYMUSIC + +- CSIDL\_MYVIDEO + +- CSIDL\_FAVORITES + +- CSIDL\_DESKTOP + +- CSIDL\_QUICKLAUNCH + +- FOLDERID\_Contacts + +- FOLDERID\_Libraries + +- FOLDERID\_Downloads + +- FOLDERID\_SavedGames + +- FOLDERID\_RecordedTV + +**Note**   +Rules contained in a component that is assigned the user context will be run for each user profile on the computer. Files that are scanned multiple times by the MigDocs.xml files will only be copied to the migration store once; however, a large number of rules in the user context can slow down the migration. Use the system context when it is applicable. + +  + +### Sample migration rules for customized versions of XML files + +**Note**   +For best practices and requirements for customized XML files in USMT, see [Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md) and [General Conventions](general-conventions-usmt-win7-usmt-win8.md). + +  + +### Exclude rules usage examples + +In the examples below, the source computer has a .txt file called "new text document" in a directory called "new folder". The default MigDocs.xml behavior migrates the new text document.txt file and all files contained in the "new folder" directory. The rules generated by the function are: + + ++++ + + + + + + + + + + +

Rule 1

<pattern type="File">d:\new folder\[new text document.txt]</pattern>

Rule 2

<pattern type="File">d:\new folder\*[*]</pattern>
+ +  + +To exclude the new text document.txt file as well as any .txt files in “new folder”, you can do the following: + +**Example 1: Exclude all .txt files in a folder** + +To exclude Rule 1, there needs to be an exact match of the file name. However, for Rule 2, you can create a pattern to exclude files by using the file name extension. + +``` syntax + +      +        D:\Newfolder\[new text document.txt] +         D:\New folder\*[*.txt] +      + +``` + +**Example 2: Use the UnconditionalExclude element to give a rule precedence over include rules** + +If you do not know the file name or location of the file, but you do know the file name extension, you can use the **GenerateDrivePatterns** function. However, the rule will be less specific than the default include rule generated by the MigDocs.xml file, so it will not have precedence. You must use the <UnconditionalExclude> element to give this rule precedence over the default include rule. For more information about the order of precedence for XML migration rules, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +``` syntax + +      +         +      + +``` + +**Example 3 : Use a UserandSystem context component to run rules in both contexts** + +If you want the <UnconditionalExclude> element to apply to both the system and user context, you can create a third component using the **UserandSystem** context. Rules in this component will be run in both contexts. + +``` syntax + +   MigDocExcludes +    +      +        +          +                 +          +        +      +    + +``` + +For more examples of exclude rules that you can use in custom migration XML files, see [Exclude Files and Settings](exclude-files-and-settings-usmt.md). + +### Include rules usage examples + +The application data directory is the most common location that you would need to add an include rule for. The **GenerateDocPatterns** function excludes this location by default. If your company uses an application that saves important data to this location, you can create include rules to migrate the data. For example, the default location for .pst files is: `%CSIDL_LOCAL_APPDATA%\Microsoft\Outlook`. The Migapp.xml file contains migration rules to move only those .pst files that are linked to Microsoft Outlook. To include .pst files that are not linked, you can do the following: + +**Example 1: Include a file name extension in a known user folder** + +This rule will include .pst files that are located in the default location, but are not linked to Microsoft Outlook. Use the user context to run this rule for each user on the computer. + +``` syntax + +      +        %CSIDL_LOCAL_APPDATA%\Microsoft\Outlook\*[*.pst] +      + +``` + +**Example 2: Include a file name extension in Program Files** + +For locations outside the user profile, such as the Program Files folder, you can add the rule to the system context component. + +``` syntax + +      +        %CSIDL_PROGRAM_FILES%\*[*.pst] +      + +``` + +For more examples of include rules that you can use in custom migration XML files, see [Include Files and Settings](include-files-and-settings-usmt.md). + +**Note**   +For more information about the order of precedence for XML migration rules, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +  + +## Next steps + + +You can include additional rules for the migration in the MigDocs.xml file or other XML migration files. For example, you can use the <locationModify> element to move files from the folder where they were gathered to a different folder, when they are applied to the destination computer. + +You can use an XML schema (MigXML.xsd) file to validate the syntax of your customized XML files. For more information, see [USMT Resources](usmt-resources-usmt-win8.md). + +## Related topics + + +[Exclude Files and Settings](exclude-files-and-settings-usmt.md) + +[Include Files and Settings](include-files-and-settings-usmt.md) + +  + +  + + + + + diff --git a/windows/deploy/update-product-status-vamt-30-win8.md b/windows/deploy/update-product-status-vamt-30-win8.md new file mode 100644 index 0000000000..b5873250fe --- /dev/null +++ b/windows/deploy/update-product-status-vamt-30-win8.md @@ -0,0 +1,53 @@ +--- +title: Update Product Status (Windows 10) +description: Update Product Status +ms.assetid: 39d4abd4-801a-4e8f-9b8c-425a24a96764 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Update Product Status + + +After you add computers to the VAMT database, you need to use the **Update license status** function to add the products that are installed on the computers. You can also use the **Update license status** at any time to retrieve the most current license status for any products in the VAMT database. + +To retrieve license status, VAMT must have administrative permissions on all selected computers and Windows Management Instrumentation (WMI) must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt-30-win8.md). + +**Note**   +The license-status query requires a valid computer name for each system queried. If the VAMT database contains computers that were added without Personally Identifiable Information, computer names will not be available for those computers, and the status for these computers will not be updated. + +  + +## Update the license status of a product + + +1. Open VAMT. + +2. In the **Products** list, select one or more products that need to have their status updated. + +3. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer. + +4. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**. + +VAMT displays the **Collecting product information** dialog box while it collects the status of all selected products. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane. + +**Note**   +If a previously discovered Microsoft Office 2010 product has been uninstalled from the remote computer, updating its licensing status will cause the entry to be deleted from the **Office** product list view, and, consequently, the total number of discovered products will be smaller. However, the Windows installation of the same computer will not be deleted and will always be shown in the **Windows** products list view. + +  + +## Related topics + + +[Add and Manage Products](add-and-manage-products-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/update-windows-10-images-with-provisioning-packages.md b/windows/deploy/update-windows-10-images-with-provisioning-packages.md new file mode 100644 index 0000000000..de69bc130a --- /dev/null +++ b/windows/deploy/update-windows-10-images-with-provisioning-packages.md @@ -0,0 +1,159 @@ +--- +title: Update Windows 10 images with provisioning packages (Windows 10) +description: Use a provisioning package to apply settings, profiles, and file assets to a Windows 10 image. +ms.assetid: 3CA345D2-B60A-4860-A3BF-174713C3D3A6 +keywords: ["provisioning", "bulk deployment", "image"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Update Windows 10 images with provisioning packages + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [Advantages](#advantages) +- [Create package](#create_package) +- [Add package to image](#add_package_to_image) +- [Learn more](#learn_more) +- [Related topics](#related_topics) + +Use a provisioning package to apply settings, profiles, and file assets to a Windows 10 image. + +In Windows 10, you can apply a provisioning package at any time. A provisioning package can include management instructions and policies, installation of specific apps, customization of network connections and policies, and more. + +You can include provisioning packages when you build a Windows image. This way, you can create a single provisioning package that you can add to different hardware-specific images. + +You can also put a provisioning package on a USB drive or SD card to apply to off-the-shelf devices. You can even send the provisioning package to someone in email. + +Rather than wiping a device and applying a new system image when you need to change configuration, you can reset the device to its original state and then apply a new provisioning package. + +For details about the settings you can customize in provisioning packages, see [Windows Provisioning settings reference]( http://go.microsoft.com/fwlink/p/?LinkId=619012). + +## Advantages + + +- You can configure new devices without reimaging. + +- Works on both mobile and desktop devices. + +- No network connectivity required. + +- Simple for people to apply. + +- Ensure compliance and security before a device is enrolled in MDM. + +## Create package + + +Use the Windows Imaging and Configuration Designer (ICD) tool included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a runtime provisioning package. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +1. Open Windows ICD (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +2. Choose **New provisioning package**. + +3. Name your project, and click **Next**. + +4. Choose **Common to all Windows editions** and click **Next**. + +5. On **New project**, click **Finish**. The workspace for your package opens. + +6. Configure settings. [Learn more about specific settings in provisioning packages.]( http://go.microsoft.com/fwlink/p/?LinkId=615916) + +7. On the **File** menu, select **Save.** + +8. On the **Export** menu, select **Provisioning package**. + +9. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +10. Set a value for **Package Version**. + + **Tip**   + You can make changes to existing packages and change the version number to update previously applied packages. + +   + +11. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select...** and choosing the certificate you want to use to sign the package. + + **Important**   + We recommend that you include a trusted provisioning certificate in your provisioning package. When the package is applied to a device, the certificate is added to the system store and any package signed with that certificate thereafter can be applied silently. + +   + +12. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +13. Click **Next**. + +14. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +15. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +16. Select the **output location** link to go to the location of the package. You can provide that .ppkg to others through any of the following methods: + + - Shared network folder + + - SharePoint site + + - Removable media (USB/SD) + + - Email + + - USB tether (mobile only) + + - NFC (mobile only) + +## Add package to image + + +**To add a provisioning package to Windows 10 for desktop editions (Home, Pro, Enterprise, and Education)** + +- Follow the steps in the "To build an image for Windows 10 for desktop editions" section in [Use the Windows ICD command-line interface]( http://go.microsoft.com/fwlink/p/?LinkId=617371). + +**To add a provisioning package to a Windows 10 Mobile image** + +- Follow the steps in the "To build an image for Windows 10 Mobile or Windows 10 IoT Core (IoT Core)" section in [Use the Windows ICD command-line interface]( http://go.microsoft.com/fwlink/p/?LinkId=617371). + + The provisioning package is placed in the FFU image and is flashed or sector written to the device. During device setup time, the provisioning engine starts and consumes the packages. + +## Learn more + + +- [Build and apply a provisioning package]( http://go.microsoft.com/fwlink/p/?LinkId=629651) + +- [Provisioning Windows 10 Devices with New Tools](http://go.microsoft.com/fwlink/p/?LinkId=615921) + +- [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](http://go.microsoft.com/fwlink/p/?LinkId=615922) + +## Related topics + + +[Configure devices without MDM](../manage/configure-devices-without-mdm.md) + +  + +  + + + + + diff --git a/windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md b/windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md new file mode 100644 index 0000000000..114d743c01 --- /dev/null +++ b/windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md @@ -0,0 +1,222 @@ +--- +title: Upgrade to Windows 10 with System Center Configuration Manager (Windows 10) +description: The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a System Center Configuration Manager task sequence to completely automate the process. +ms.assetid: F8DF6191-0DB0-4EF5-A9B1-6A11D5DE4878 +keywords: ["upgrade, update, task sequence, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +author: brianlic-msft +--- + +# Upgrade to Windows 10 with System Center Configuration Manager + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Proof-of-concept environment](#proof-of-concept_environment) +- [Upgrade to Windows 10 with System Center 2012 R2 Configuration Manager](#upgrade_to_windows_10_with_system_center_2012_r2_configuration_manager) +- [Create the task sequence](#create_the_task_sequence) +- [Create a device collection](#create_a_device_collection) +- [Deploy the Windows 10 upgrade](#deploy_the_windows_10_upgrade) +- [Start the Windows 10 upgrade](#start_the_windows_10_upgrade) +- [Upgrade to Windows 10 with the next version of System Center Configuration Manager](#upgrade_to_windows_10_with_the_next_version_of_system_center_configuration_manager) +- [Related topics](#related_topics) + +The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a System Center Configuration Manager task sequence to completely automate the process. + +## Proof-of-concept environment + + +For the purposes of this topic, we will use four machines: DC01, CM01, and PC0003. DC01 is a domain controller and CM01 is a Windows Server 2012 R2 standard machine, fully patched with the latest security updates, and configured as a member server in the fictional contoso.com domain. PC0003 is a machine with Windows 7 SP1, targeted for the Windows 10 upgrade. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +![figure 1](images/upgrademdt-fig1-machines.png) + +Figure 1. The machines used in this topic. + +## Upgrade to Windows 10 with System Center 2012 R2 Configuration Manager + + +System Center 2012 R2 Configuration Manager SP1 adds support to manage and deploy Windows 10. Although it does not include built-in support to perform an in-place upgrade from Windows 7, Windows 8, or Windows 8.1 to Windows 10, you can build a custom task sequence to perform the necessary tasks. + +## Create the task sequence + + +To help with this process, the Configuration Manager team has published [a blog](http://go.microsoft.com/fwlink/p/?LinkId=620179) that provides a sample task sequence, as well as the [original blog that includes the instructions for setting up the task sequence](http://go.microsoft.com/fwlink/p/?LinkId=620180). To summarize, here are the tasks you need to perform: + +1. Download the [Windows10Upgrade1506.zip](http://go.microsoft.com/fwlink/p/?LinkId=620182) file that contains the sample task sequence and related scripts. Extract the contents onto a network share. +2. Copy the Windows 10 Enterprise RTM x64 media into the extracted but empty **Windows vNext Upgrade Media** folder. +3. Using the Configuration Manager Console, right-click the **Task Sequences** node, and then choose **Import Task Sequence**. Select the **Windows-vNextUpgradeExport.zip** file that you extracted in Step 1. +4. Distribute the two created packages (one contains the Windows 10 Enterprise x64 media, the other contains the related scripts) to the Configuration Manager distribution point. + +For full details and an explanation of the task sequence steps, review the full details of the two blogs that are referenced above. + +## Create a device collection + + +After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0003 machine running Windows 7 SP1, with the Configuration Manager client installed. + +1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: + - General + + - Name: Windows 10 Enterprise x64 Upgrade + + - Limited Collection: All Systems + + - Membership rules: + + - Direct rule + + - Resource Class: System Resource + + - Attribute Name: Name + + - Value: PC0003 + + - Select Resources + + - Select PC0003 + +2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0003 machine in the collection. + +## Deploy the Windows 10 upgrade + + +In this section, you create a deployment for the Windows 10 Enterprise x64 Update application. + +1. On CM01, using the Configuration Manager console, in the Software Library workspace, right-click the **Windows vNext Upgrade** task sequence, and then select **Deploy**. +2. On the **General** page, select the **Windows 10 Enterprise x64 Upgrade** collection, and then click **Next**. +3. On the **Content** page, click **Next**. +4. On the **Deployment Settings** page, select the following settings, and then click **Next**: + - Action: Install + + - Purpose: Available + +5. On the **Scheduling** page, accept the default settings, and then click **Next**. +6. On the **User Experience** page, accept the default settings, and then click **Next**. +7. On the **Alerts** page, accept the default settings, and then click **Next**. +8. On the **Summary** page, click **Next**, and then click **Close**. + +## Start the Windows 10 upgrade + + +In this section, you start the Windows 10 Upgrade task sequence on PC0003 (currently running Windows 7 SP1). + +1. On PC0003, start the **Software Center**. +2. Select the **Windows vNext Upgrade** task sequence, and then click **Install**. + +When the task sequence begins, it will automatically initiate the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers. + +![figure 2](images/upgradecfg-fig2-upgrading.png) + +Figure 2. Upgrade from Windows 7 to Windows 10 Enterprise x64 with a task sequence. + +After the task sequence finishes, the computer will be fully upgraded to Windows 10. + +## Upgrade to Windows 10 with the next version of System Center Configuration Manager + + +With the next release of System Center Configuration Manager (currently planned for Q4 of 2015), new built-in functionality will be provided to make it even easier to upgrade existing Windows 7, Windows 8, and Windows 8.1 PCs to Windows 10. + +**Note**   +For more details about the next version of Configuration Manager, see the [Configuration Manager Team blog](http://go.microsoft.com/fwlink/p/?LinkId=620205). An [evaluation version is currently available](http://go.microsoft.com/fwlink/p/?LinkId=620206) for you to try. The instructions below are specific to the Technical Preview 2 release and may change after the next version of Configuration Manager is released. + +  + +### Create the OS upgrade package + +First, you need to create an operating system upgrade package that contains the full Windows 10 Enterprise x64 installation media. + +1. On CM01, using the Configuration Manager console, in the Software Library workspace, right-click the **Operating System Upgrade Packages** node, then select **Add Operating System Upgrade Package**. +2. On the **Data Source** page, specify the UNC path to the Windows 10 Enterprise x64 media, and then click **Next**. +3. On the **General** page, specify Windows 10 Enterprise x64 Upgrade, and then click **Next**. +4. On the **Summary** page, click **Next**, and then click **Close**. +5. Right-click the created **Windows 10 Enterprise x64 Update** package, and then select **Distribute Content**. Choose the CM01 distribution point. + +### Create the task sequence + +To create an upgrade task sequence, perform the following steps: + +1. On CM01, using the Configuration Manager console, in the Software Library workspace, right-click the **Task Sequences** node, and then select **Create Task Sequence**. +2. On the **Create a new task sequence** page, select **Upgrade an operating system from upgrade package**, and then click **Next**. +3. On the **Task Sequence Information** page, specify **Windows 10 Enterprise x64 Upgrade**, and then click **Next**. +4. On the **Upgrade the Windows operating system** page, select the **Windows 10 Enterprise x64 Upgrade operating system upgrade** package, and then click **Next**. +5. Click **Next** through the remaining wizard pages, and then click **Close**. + +![figure 3](images/upgradecfg-fig3-upgrade.png) + +Figure 3. The Configuration Manager vNext upgrade task sequence. + +### Create a device collection + +After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0003 machine running Windows 7 SP1, with the next version of System Center Configuration Manager client installed. + +1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: + - General + + - Name: Windows 10 Enterprise x64 Upgrade + + - Limited Collection: All Systems + + - Membership rules: + + - Direct rule + + - Resource Class: System Resource + + - Attribute Name: Name + + - Value: PC0003 + + - Select Resources + + - Select PC0003 + +2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0003 machine in the collection. + +### Deploy the Windows 10 upgrade + +In this section, you create a deployment for the Windows 10 Enterprise x64 Update application. + +1. On CM01, using the Configuration Manager console, in the Software Library workspace, right-click the **Windows vNext Upgrade** task sequence, and then select **Deploy**. +2. On the **General** page, select the **Windows 10 Enterprise x64 Upgrade** collection, and then click **Next**. +3. On the **Content** page, click **Next**. +4. On the **Deployment Settings** page, select the following settings and click **Next**: + - Action: Install + + - Purpose: Available + +5. On the **Scheduling** page, accept the default settings, and then click **Next**. +6. On the **User Experience** page, accept the default settings, and then click **Next**. +7. On the **Alerts** page, accept the default settings, and then click **Next**. +8. On the **Summary** page, click **Next**, and then click **Close**. + +### Start the Windows 10 upgrade + +In this section, you start the Windows 10 Upgrade task sequence on PC0003 (currently running Windows 7 SP1). + +1. On PC0003, start the **Software Center**. +2. Select the **Windows vNext Upgrade** task sequence, and then click **Install.** + +When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers. + +After the task sequence completes, the computer will be fully upgraded to Windows 10. + +## Related topics + + +[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) + +[Configuration Manager Team blog](http://go.microsoft.com/fwlink/p/?LinkId=620109) + +  + +  + + + + + diff --git a/windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md b/windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md new file mode 100644 index 0000000000..588794fa97 --- /dev/null +++ b/windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md @@ -0,0 +1,140 @@ +--- +title: Upgrade to Windows 10 with the Microsoft Deployment Toolkit (Windows 10) +description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. +ms.assetid: B8993151-3C1E-4F22-93F4-2C5F2771A460 +keywords: ["upgrade, update, task sequence, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Upgrade to Windows 10 with the Microsoft Deployment Toolkit + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Proof-of-concept environment](#proof-of-concept_environment) +- [Set up the upgrade task sequence](#set_up_the_upgrade_task_sequence) +- [Create the MDT production deployment share](#create_the_mdt_production_deployment_share) +- [Add Windows 10 Enterprise x64 (full source)](#add_windows_10_enterprise_x64__full_source_) +- [Create a task sequence to upgrade to Windows 10 Enterprise](#create_a_task_sequence_to_upgrade_to_windows_10_enterprise) +- [Perform the Windows 10 upgrade](#perform_the_windows_10_upgrade) +- [Related topics](#related_topics) + +The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Deployment Toolkit (MDT) 2013 Update 1 task sequence to completely automate the process. + +## Proof-of-concept environment + + +For the purposes of this topic, we will use four machines: DC01, MDT01, and PC0001. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard machine, fully patched with the latest security updates, and configured as a member server in the fictional contoso.com domain. PC0001 is a machine with Windows 7 SP1, targeted for the Windows 10 upgrade. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md). + +![fig 1](images/upgrademdt-fig1-machines.png) + +Figure 1. The machines used in this topic. + +## Set up the upgrade task sequence + + +MDT 2013 Update 1 adds support for Windows 10 deployment, including a new in-place upgrade task sequence template that makes the process really simple. + +## Create the MDT production deployment share + + +The steps to create the deployment share for production are the same as when you created the deployment share to create the custom reference image: + +1. On MDT01, log on as Administrator in the CONTOSO domain with a password of **P@ssw0rd**. +2. Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. +3. On the **Path** page, in the **Deployment share path** text box, type **E:\\MDTProduction**, and then click **Next**. +4. On the **Share** page, in the **Share name** text box, type **MDTProduction$**, and then click **Next**. +5. On the **Descriptive Name** page, in the **Deployment share** description text box, type **MDT Production**, and then click **Next**. +6. On the **Options** page, accept the default settings and click **Next** twice, and then click **Finish**. +7. Using File Explorer, verify that you can access the **\\\\MDT01\\MDTProduction$** share. + +## Add Windows 10 Enterprise x64 (full source) + + +In these steps we assume that you have copied the content of a Windows 10 Enterprise x64 ISO to the E:\\Downloads\\Windows 10 Enterprise x64 folder. + +1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**. +2. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**. +3. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard: + - Full set of source files + + - Source directory: E:\\Downloads\\Windows 10 Enterprise x64 + + - Destination directory name: W10EX64RTM + +4. After you add the operating system, in the **Operating Systems / Windows 10** folder, double-click the added operating system name in the **Operating System** node and change the name to the following: **Windows 10 Enterprise x64 RTM Default Image** + +![figure 2](images/upgrademdt-fig2-importedos.png) + +Figure 2. The imported Windows 10 operating system after you rename it. + +## Create a task sequence to upgrade to Windows 10 Enterprise + + +1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, and create a folder named **Windows 10**. +2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: + - Task sequence ID: W10-X64-UPG + + - Task sequence name: Windows 10 Enterprise x64 RTM Upgrade + + - Template: Standard Client Upgrade Task Sequence + + - Select OS: Windows 10 Enterprise x64 RTM RTM Default Image + + - Specify Product Key: Do not specify a product key at this time + + - Full Name: Contoso + + - Organization: Contoso + + - Internet Explorer home page: about:blank + + - Admin Password: Do not specify an Administrator Password at this time + +![figure 3](images/upgrademdt-fig3-tasksequence.png) + +Figure 3. The task sequence to upgrade to Windows 10. + +## Perform the Windows 10 upgrade + + +To initiate the in-place upgrade, perform the following steps on PC0003 (currently running Windows 7 SP1). + +1. Start the MDT deployment wizard by running the following command: **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs** +2. Select the **Windows 10 Enterprise x64 RTM Upgrade** task sequence, and then click **Next**.![figure 4](images/upgrademdt-fig4-selecttask.png) + + Figure 4. Upgrade task sequence. + +3. On the **Credentials** tab, specify the **MDT\_BA** account, **P@ssw0rd** password, and **CONTOSO** for the domain. (Some or all of these values can be specified in Bootstrap.ini so they are automatically populated.) +4. On the **Ready** tab, click **Begin** to start the task sequence. + +When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers. + +![figure 5](images/upgrademdt-fig5-winupgrade.png) + +Figure 5. Upgrade from Windows 7 to Windows 10 Enterprise x64 with a task sequence. + +After the task sequence completes, the computer will be fully upgraded to Windows 10. + +## Related topics + + +[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) + +[Microsoft Deployment Toolkit downloads and resources](http://go.microsoft.com/fwlink/p/?LinkId=618117) + +  + +  + + + + + diff --git a/windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md b/windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md new file mode 100644 index 0000000000..ef4fb52b93 --- /dev/null +++ b/windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md @@ -0,0 +1,259 @@ +--- +title: Use Orchestrator runbooks with MDT (Windows 10) +description: This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions. +ms.assetid: 68302780-1f6f-4a9c-9407-b14371fdce3f +keywords: ["web services, database"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Use Orchestrator runbooks with MDT + + +**In this article** + +- [Orchestrator terminology](#sec01) +- [Create a sample runbook](#sec02) +- [Test the demo MDT runbook](#sec03) +- [Use the MDT demo runbook from MDT](#use_the_mdt_demo_runbook_from_mdt) +- [Run the orchestrator sample task sequence](#run_the_orchestrator_sample_task_sequence) +- [Related topics](#related_topics) + +This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions. + +MDT can integrate with System Center 2012 R2 Orchestrator, which is a component that ties the Microsoft System Center products together, as well as other products from both Microsoft and third-party vendors. The difference between using Orchestrator and "normal" web services, is that with Orchestrator you have a rich drag-and-drop style interface when building the solution, and little or no coding is required. + +**Note**   +If you are licensed to use Orchestrator, we highly recommend that you start using it. To find out more about licensing options for System Center 2012 R2 and Orchestrator, visit the [System Center 2012 R2](http://go.microsoft.com/fwlink/p/?LinkId=619553) website. + +  + +## Orchestrator terminology + + +Before diving into the core details, here is a quick course in Orchestrator terminology: + +- **Orchestrator Server.** This is a server that executes runbooks. + +- **Runbooks.** A runbook is similar to a task sequence; it is a series of instructions based on conditions. Runbooks consist of workflow activities; an activity could be Copy File, Get User from Active Directory, or even Write to Database. + +- **Orchestrator Designer.** This is where you build the runbooks. In brief, you do that by creating an empty runbook, dragging in the activities you need, and then connecting them in a workflow with conditions and subscriptions. + +- **Subscriptions.** These are variables that come from an earlier activity in the runbook. So if you first execute an activity in which you type in a computer name, you can then subscribe to that value in the next activity. All these variables are accumulated during the execution of the runbook. + +- **Orchestrator Console.** This is the Microsoft Silverlight-based web page you can use interactively to execute runbooks. The console listens to TCP port 81 by default. + +- **Orchestrator web services.** These are the web services you use in the Microsoft Deployment Toolkit to execute runbooks during deployment. The web services listen to TCP port 82 by default. + +- **Integration packs.** These provide additional workflow activities you can import to integrate with other products or solutions, like the rest of Active Directory, other System Center 2012 R2 products, or Microsoft Exchange Server, to name a few. + +**Note**   +To find and download additional integration packs, see [Integration Packs for System Center 2012 - Orchestrator](http://go.microsoft.com/fwlink/p/?LinkId=619554). + +  + +## Create a sample runbook + + +This section assumes you have Orchestrator 2012 R2 installed on a server named OR01. In this section, you create a sample runbook, which is used to log some of the MDT deployment information into a text file on OR01. + +1. On OR01, using File Explorer, create the **E:\\Logfile** folder, and grant Users modify permissions (NTFS). + +2. In the **E:\\Logfile** folder, create the DeployLog.txt file. + + **Note**   + Make sure File Explorer is configured to show known file extensions so the file is not named DeployLog.txt.txt. + +   + + ![figure 23](images/mdt-09-fig23.png) + + Figure 23. The DeployLog.txt file. + +3. Using System Center 2012 R2 Orchestrator Runbook Designer, in the **Runbooks** node, create the **1.0 MDT** folder. + + ![figure 24](images/mdt-09-fig24.png) + + Figure 24. Folder created in the Runbooks node. + +4. In the **Runbooks** node, right-click the **1.0 MDT** folder, and select **New / Runbook**. + +5. On the ribbon bar, click **Check Out**. + +6. Right-click the **New Runbook** label, select **Rename**, and assign the name **MDT Sample**. + +7. Add (using a drag-and-drop operation) the following items from the **Activities** list to the middle pane: + + 1. Runbook Control / Initialize Data + + 2. Text File Management / Append Line + +8. Connect **Initialize Data** to **Append Line**. + + ![figure 25](images/mdt-09-fig25.png) + + Figure 25. Activities added and connected. + +9. Right-click the **Initialize Data** activity, and select **Properties** + +10. On **the Initialize Data Properties** page, click **Add**, change **Parameter 1** to **OSDComputerName**, and then click **Finish**. + + ![figure 26](images/mdt-09-fig26.png) + + Figure 26. The Initialize Data Properties window. + +11. Right-click the **Append Line** activity, and select **Properties**. + +12. On the **Append Line Properties** page, in the **File** text box, type **E:\\Logfile\\DeployLog.txt**. + +13. In the **File** encoding drop-down list, select **ASCII**. + +14. In the **Append** area, right-click inside the **Text** text box and select **Expand**. + + ![figure 27](images/mdt-09-fig27.png) + + Figure 27. Expanding the Text area. + +15. In the blank text box, right-click and select **Subscribe / Published Data**. + + ![figure 28](images/mdt-09-fig28.png) + + Figure 28. Subscribing to data. + +16. In the **Published Data** window, select the **OSDComputerName** item, and click **OK**. + +17. After the **{OSDComputerName from "Initialize Data"}** text, type in **has been deployed at** and, once again, right-click and select **Subscribe / Published Data**. + +18. In the **Published Data** window, select the **Show common Published Data** check box, select the **Activity end time** item, and click **OK**. + + ![figure 29](images/mdt-09-fig29.png) + + Figure 29. The expanded text box after all subscriptions have been added. + +19. On the **Append Line Properties** page, click **Finish**. + +## Test the demo MDT runbook + + +After the runbook is created, you are ready to test it. + +1. On the ribbon bar, click **Runbook Tester**. + +2. Click **Run**, and in the **Initialize Data Parameters** dialog box, use the following setting and then click **OK**: + + - OSDComputerName: PC0010 + +3. Verify that all activities are green (for additional information, see each target). + +4. Close the **Runbook Tester**. + +5. On the ribbon bar, click **Check In**. + +![figure 30](images/mdt-09-fig30.png) + +Figure 30. All tests completed. + +## Use the MDT demo runbook from MDT + + +1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node, and create a folder named **Orchestrator**. + +2. Right-click the **Orchestrator** node, and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: + + 1. Task sequence ID: OR001 + + 2. Task sequence name: Orchestrator Sample + + 3. Task sequence comments: <blank> + + 4. Template: Custom Task Sequence + +3. In the **Orchestrator** node, double-click the **Orchestrator Sample** task sequence, and then select the **Task Sequence** tab. + +4. Remove the default **Application Install** action. + +5. Add a **Gather** action and select the **Gather only local data (do not process rules)** option. + +6. After the **Gather** action, add a **Set Task Sequence Variable** action with the following settings: + + 1. Name: Set Task Sequence Variable + + 2. Task Sequence Variable: OSDComputerName + + 3. Value: %hostname% + +7. After the **Set Task Sequence Variable** action, add a new **Execute Orchestrator Runbook** action with the following settings: + + 1. Orchestrator Server: OR01.contoso.com + + 2. Use Browse to select **1.0 MDT / MDT Sample**. + +8. Click **OK**. + +![figure 31](images/mdt-09-fig31.png) + +Figure 31. The ready-made task sequence. + +## Run the orchestrator sample task sequence + + +Since this task sequence just starts a runbook, you can test this on the PC0001 client that you used for the MDT simulation environment. + +**Note**   +Make sure the account you are using has permissions to run runbooks on the Orchestrator server. For more information about runbook permissions, see [Runbook Permissions](http://go.microsoft.com/fwlink/p/?LinkId=619555). + +  + +1. On PC0001, log on as **CONTOSO\\MDT\_BA**. + +2. Using an elevated command prompt (run as Administrator), type the following command: + + ``` syntax + cscript \\MDT01\MDTProduction$\Scripts\Litetouch.vbs + ``` + +3. Complete the Windows Deployment Wizard using the following information: + + 1. Task Sequence: Orchestrator Sample + + 2. Credentials: + + 1. User Name: MDT\_BA + + 2. Password: P@ssw0rd + + 3. Domain: CONTOSO + +4. Wait until the task sequence is completed and then verify that the DeployLog.txt file in the E:\\Logfile folder on OR01 was updated. + +![figure 32](images/mdt-09-fig32.png) + +Figure 32. The ready-made task sequence. + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/use-the-mdt-database-to-stage-windows-81-deployment-information.md b/windows/deploy/use-the-mdt-database-to-stage-windows-81-deployment-information.md new file mode 100644 index 0000000000..275977e89e --- /dev/null +++ b/windows/deploy/use-the-mdt-database-to-stage-windows-81-deployment-information.md @@ -0,0 +1,135 @@ +--- +title: Use the MDT database to stage Windows 10 deployment information (Windows 10) +description: This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini). +ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46 +keywords: ["database, permissions, settings, configure, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Use the MDT database to stage Windows 10 deployment information + + +**In this article** + +- [Database prerequisites](#sec01) +- [Create the deployment database](#sec02) +- [Configure database permissions](#sec03) +- [Create an entry in the database](#sec04) +- [Related topics](#related_topics) + +This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini). You can use this process, for example, to add the client machines you want to deploy, specify their computer names and IP addresses, indicate applications to be deployed, and determine many additional settings for the machines. + +## Database prerequisites + + +MDT can use either SQL Server Express or full SQL Server, but since the deployment database isn't big, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment. + +**Note**   +Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database. + +  + +## Create the deployment database + + +The MDT database is by default created and managed from the Deployment Workbench. In these steps, we assume you have installed SQL Server 2012 SP1 Express on MDT01. + +**Note**   +Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01. + +  + +1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**. + +2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and click **Next**: + + 1. SQL Server Name: MDT01 + + 2. Instance: SQLEXPRESS + + 3. Port: <blank> + + 4. Network Library: Named Pipes + +3. On the **Database** page, select **Create a new database**; in the **Database** field, type **MDT** and click **Next**. + +4. On the **SQL Share** page, in the **SQL Share** field, type **Logs$** and click **Next**. Click **Next** again and then click **Finish**. + +![figure 8](images/mdt-09-fig08.png) + +Figure 8. The MDT database added to MDT01. + +## Configure database permissions + + +After creating the database, you need to assign permissions to it. In MDT, the account you used to run the deployment is used to access the database. In this environment, the network access account is MDT\_BA. + +1. On MDT01, start SQL Server Management Studio. + +2. In the **Connect to Server** dialog box, in the **Server name** list, select **MDT01\\SQLEXPRESS** and click **Connect**. + +3. In the **Object Explorer** pane, expand the top-level **Security** node, right-click **Logins**, and select **New Login**. + + ![figure 9](images/mdt-09-fig09.png) + + Figure 9. The top-level Security node. + +4. On the **Login - New** page, next to the **Login** name field, click **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles: + + 1. db\_datareader + + 2. public (default) + +5. Click **OK**, and close SQL Server Management Studio. + +![figure 10](images/mdt-09-fig10.png) + +Figure 10. Creating the login and settings permissions to the MDT database. + +## Create an entry in the database + + +To start using the database, you add a computer entry and assign a description and computer name. Use the computer's MAC Address as the identifier. + +1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration**, and expand **Database**. + +2. Right-click **Computers**, select **New**, and add a computer entry with the following settings: + + 1. Description: New York Site - PC00075 + + 2. MacAddress: <PC00075 MAC Address in the 00:00:00:00:00:00 format> + + 3. Details Tab / OSDComputerName: PC00075 + +![figure 11](images/mdt-09-fig11.png) + +Figure 11. Adding the PC00075 computer to the database. + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use web services in MDT](use-web-services-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/use-the-volume-activation-management-tool-client.md b/windows/deploy/use-the-volume-activation-management-tool-client.md new file mode 100644 index 0000000000..3c609e5618 --- /dev/null +++ b/windows/deploy/use-the-volume-activation-management-tool-client.md @@ -0,0 +1,95 @@ +--- +title: Use the Volume Activation Management Tool (Windows 10) +description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys. +ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47 +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Use the Volume Activation Management Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys. + +By using the VAMT, you can automate and centrally manage the volume, retail, and MAK activation process for Windows, Office, and select other Microsoft products. The VAMT can manage volume activation by using MAKs or KMS. It is a standard Microsoft Management Console snap-in, and it can be installed on any computer running Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. + +The VAMT is distributed as part of the Windows Assessment and Deployment Kit (Windows ADK), which is a free download available from Microsoft Download Center. For more information, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526740). + +In Windows Server 2012 R2, you can install the VAMT directly from Server Manager without downloading the Windows ADK by selecting the Volume Activation Services role or the Remote Server Administration Tools/Role Administration Tools/Volume Activation Tools feature. + +## Activating with the Volume Activation Management Tool + + +You can use the VAMT to complete the activation process in products by using MAK and retail keys, and you can work with computers individually or in groups. The VAMT enables two activation scenarios: + +- **Online activation**. Online activation enables you to activate over the Internet any products that are installed with MAK, KMS host, or retail product keys. You can activate one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft. + +- **Proxy activation**. This activation method enables you to perform volume activation for products that are installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS host key, or retail product key to one or more client products and collects the installation ID from each client product. The VAMT host sends the installation IDs to Microsoft on behalf of the client products and obtains the corresponding confirmation IDs. The VAMT host then installs the confirmation IDs on the client products to complete their activation. + + By using this method, only the VAMT host computer requires Internet access. Proxy activation by using the VAMT is beneficial for isolated network segments and for cases where your organization has a mix of retail, MAK, and KMS-based activations. + +## Tracking products and computers with the Volume Activation Management Tool + + +The VAMT provides an overview of the activation and licensing status of computers across your network, as shown in Figure 18. Several prebuilt reports are also available to help you proactively manage licensing. + +![image of menu](images/volumeactivationforwindows81-18.jpg) + +**Figure 18**. The VAMT showing the licensing status of multiple computers + +## Tracking key usage with the Volume Activation Management Tool + + +The VAMT makes it easier to track the various keys that are issued to your organization. You can enter each key into VAMT, and then the VAMT can use those keys for online or proxy activation of clients. The tool can also describe what type of key it is and to which product group it belongs. The VAMT is the most convenient way to quickly determine how many activations remain on a MAK. Figure 19 shows an example of key types and usage. + +![image of menu](images/volumeactivationforwindows81-19.jpg) + +**Figure 19**. The VAMT showing key types and usage + +## Other Volume Activation Management Tool features + + +The VAMT stores information in a Microsoft SQL Server database for performance and flexibility, and it provides a single graphical user interface for managing activations and performing other activation-related tasks, such as: + +- **Adding and removing computers**. You can use the VAMT to discover computers in the local environment. The VAMT can discover computers by querying AD DS, workgroups, or individual computer names or IP addresses, or through a general LDAP query. + +- **Discovering products**. You can use the VAMT to discover Windows, Windows Server, Office, and select other products that are installed on the client computers. + +- **Managing activation data**. The VAMT stores activation data in a SQL Server database. The tool can export this data in XML format to other VAMT hosts or to an archive. + +For more information, see: + +- [Volume Activation Management Tool (VAMT) Overview](http://go.microsoft.com/fwlink/p/?LinkId=618266) + +- [VAMT Step-by-Step Scenarios](http://go.microsoft.com/fwlink/p/?LinkId=618267) + +## See also + + +- [Volume Activation for Windows 10](volume-activation-for-windows-81-client.md) + +  + +  + + + + + diff --git a/windows/deploy/use-vamt-in-windows-powershell.md b/windows/deploy/use-vamt-in-windows-powershell.md new file mode 100644 index 0000000000..8bb35f3b0c --- /dev/null +++ b/windows/deploy/use-vamt-in-windows-powershell.md @@ -0,0 +1,104 @@ +--- +title: Use VAMT in Windows PowerShell (Windows 10) +description: Use VAMT in Windows PowerShell +ms.assetid: 13e0ceec-d827-4681-a5c3-8704349e3ba9 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Use VAMT in Windows PowerShell + + +The Volume Activation Management Tool (VAMT) PowerShell cmdlets can be used to perform the same functions as the Vamt.exe command-line tool. + +**To Install PowerShell 3.0** + +- VAMT PowerShell cmdlets require Windows PowerShell, which is included in Windows 10, Windows 8 and Windows Server® 2012. You can download PowerShell for Windows 7 or other operating systems from the [Microsoft Download Center](http://go.microsoft.com/fwlink/p/?LinkId=218356). + +**To Install the Windows Assessment and Deployment Kit** + +- In addition to PowerShell, you must import the VAMT PowerShell module. The module is included in the VAMT 3.0 folder after you install the Windows Assessment and Deployment Kit (Windows ADK). + +**To Prepare the VAMT PowerShell Environment** + +1. To open PowerShell with administrative credentials, click **Start** and type “PowerShell” to locate the program. Right-click **Windows PowerShell**, and then click **Run as administrator**. To open PowerShell in Windows 7, click **Start**, click **All Programs**, click **Accessories**, click **Windows PowerShell**, right-click **Windows PowerShell**, and then click **Run as administrator**. + + **Important**   + If you are using a computer that has an 64-bit processor, select **Windows PowerShell (x86)**. VAMT PowerShell cmdlets are supported for the x86 architecture only. You must use an x86 version of Windows PowerShell to import the VAMT module, which are available in these directories: + + - The x86 version of PowerShell is available in C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe + + - The x86 version of the PowerShell ISE is available in C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell\_ise.exe + +   + +2. For all supported operating systems you can use the VAMT PowerShell module included with the Windows ADK. By default, the module is installed with the Windows ADK in the VAMT folder. Change directories to the directory where VAMT is located. For example, if the Windows ADK is installed in the default location of C:\\Program Files(x86)\\Windows Kits\\10, type + + ``` syntax + cd “C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\VAMT 3.0” + ``` + +3. Import the VAMT PowerShell module. To import the module, type the following at a command prompt: + + ``` syntax + Import-Module .\VAMT.psd1 + ``` + + **Import-Module** imports a module only into the current session. To import the module into all sessions, add an **Import-Module** command to a Windows PowerShell profile. For more information about profiles, type `get-help about_profiles`. + +## To Get Help for VAMT PowerShell cmdlets + + +You can view all of the help sections for a VAMT PowerShell cmdlet, or you can view only the section that you are interested in. To view all of the Help content for a VAMT cmdlet, type: + +``` syntax +get-help -all +``` + +For example, type: + +``` syntax +get-help get-VamtProduct -all +``` + +**Warning**   +The update-help cmdlet is not supported for VAMT PowerShell cmdlets. To view online help for VAMT cmdlets, you can use the -online option with the get-help cmdlet. For more information, see [Volume Activation Management Tool (VAMT) Cmdlets in Windows PowerShell](http://go.microsoft.com/fwlink/p/?LinkId=242278). + +  + +**To View VAMT PowerShell Help Sections** + +1. To get the syntax to use with a cmdlet, type the following at a command prompt: + + ``` syntax + get-help + ``` + + For example, type: + + ``` syntax + get-help get-VamtProduct + ``` + +2. To see examples using a cmdlet, type: + + ``` syntax + get-help -examples + ``` + + For example, type: + + ``` syntax + get-help get-VamtProduct -examples + ``` + +  + +  + + + + + diff --git a/windows/deploy/use-web-services-in-mdt-2013.md b/windows/deploy/use-web-services-in-mdt-2013.md new file mode 100644 index 0000000000..942b5df36e --- /dev/null +++ b/windows/deploy/use-web-services-in-mdt-2013.md @@ -0,0 +1,187 @@ +--- +title: Use web services in MDT (Windows 10) +description: In this topic, you will learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment. +ms.assetid: 8f47535e-0551-4ccb-8f02-bb97539c6522 +keywords: ["deploy, web apps"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Use web services in MDT + + +**In this article** + +- [Create a sample web service](#sec01) +- [Create an application pool for the web service](#sec02) +- [Install the web service](#sec03) +- [Test the web service in Internet Explorer](#sec04) +- [Test the web service in the MDT simulation environment](#sec05) +- [Related topics](#related_topics) + +In this topic, you will learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment. Web services provide a powerful way to assign settings during a deployment. Simply put, web services are web applications that run code on the server side, and MDT has built-in functions to call these web services. + +Using a web service in MDT is straightforward, but it does require that you have enabled the Web Server (IIS) role on the server. Developing web services involves a little bit of coding, but for most web services used with MDT, you can use the free Microsoft Visual Studio Express 2013 for Web. + +## Create a sample web service + + +In these steps we assume you have installed Microsoft Visual Studio Express 2013 for Web on PC0001 (the Windows 10 client) and downloaded the [MDT Sample Web Service](http://go.microsoft.com/fwlink/p/?LinkId=619363) from the Microsoft Download Center and extracted it to C:\\Projects. + +1. On PC0001, using Visual Studio Express 2013 for Web, open the C:\\Projects\\MDTSample\\ MDTSample.sln solution file. + +2. On the ribbon bar, verify that Release is selected. + +3. In the **Debug** menu, select the **Build MDTSample** action. + +4. On MDT01, create a folder structure for **E:\\MDTSample\\bin**. + +5. From PC0001, copy the C:\\Projects\\MDTSample\\obj\\Release\\MDTSample.dll file to the **E:\\MDTSample\\bin** folder on MDT01. + +6. From PC0001, copy the following files from C:\\Projects\\MDTSample file to the **E:\\MDTSample** folder on MDT01: + + 1. Web.config + + 2. mdtsample.asmx + +![figure 15](images/mdt-09-fig15.png) + +Figure 15. The sample project in Microsoft Visual Studio Express 2013 for Web. + +## Create an application pool for the web service + + +This section assumes that you have enabled the Web Server (IIS) role on MDT01. + +1. On MDT01, using Server Manager, install the **IIS Management Console** role (available under Web Server (IIS) / Management Tools). + +2. Using Internet Information Services (IIS) Manager, expand the **MDT01 (CONTOSO\\Administrator)** node. If prompted with the "Do you want to get started with Microsoft Web Platform?" question, select the **Do not show this message** check box and then click **No**. + +3. Right-click **Application Pools**, select **Add Application Pool**, and configure the new application pool with the following settings: + + 1. Name: MDTSample + + 2. .NET Framework version: .NET Framework 4.0.30319 + + 3. Manage pipeline mode: Integrated + + 4. Select the **Start application pool immediately** check box. + + 5. Click **OK**. + +![figure 16](images/mdt-09-fig16.png) + +Figure 16. The new MDTSample application. + +## Install the web service + + +1. On MDT01, using Internet Information Services (IIS) Manager, expand **Sites**, right-click **Default Web Site**, and select **Add Application**. Use the following settings for the application: + + 1. Alias: MDTSample + + 2. Application pool: MDTSample + + 3. Physical Path: E:\\MDTSample + + ![figure 17](images/mdt-09-fig17.png) + + Figure 17. Adding the MDTSample web application. + +2. In the **Default Web Site** node, select the MDTSample web application, and in the right pane, double-click **Authentication**. Use the following settings for the **Authentication** dialog box: + + 1. Anonymous Authentication: Enabled + + 2. ASP.NET Impersonation: Disabled + +![figure 18](images/mdt-09-fig18.png) + +Figure 18. Configuring Authentication for the MDTSample web service. + +## Test the web service in Internet Explorer + + +1. On PC0001, using Internet Explorer, navigate to: **http://MDT01/MDTSample/mdtsample.asmx**. + +2. Click the **GetComputerName** link. + + ![figure 19](images/mdt-09-fig19.png) + + Figure 19. The MDT Sample web service. + +3. On the **GetComputerName** page, type in the following settings, and click **Invoke**: + + 1. Model: Hewlett-Packard + + 2. SerialNumber: 123456789 + +![figure 20](images/mdt-09-fig20.png) + +Figure 20. The result from the MDT Sample web service. + +## Test the web service in the MDT simulation environment + + +After verifying the web service using Internet Explorer, you are ready to do the same test in the MDT simulation environment. + +1. On PC0001, edit the CustomSettings.ini file in the **C:\\MDT** folder to look like the following: + + ``` syntax + [Settings] + Priority=Default, GetComputerName + + [Default] + OSInstall=YES + + [GetComputerName] + WebService=http://mdt01/MDTSample/mdtsample.asmx/GetComputerName + Parameters=Model,SerialNumber + OSDComputerName=string + ``` + + ![figure 21](images/mdt-09-fig21.png) + + Figure 21. The updated CustomSettings.ini file. + +2. Save the CustomSettings.ini file. + +3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command: + + ``` syntax + Set-Location C:\MDT + .\Gather.ps1 + ``` + +4. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder. + +![figure 22](images/mdt-09-fig22.png) + +Figure 22. The OSDCOMPUTERNAME value obtained from the web service. + +## Related topics + + +[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md) + +[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md) + +[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md) + +[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-81-deployment-in-a-test-environment.md) + +[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-81-deployment-information.md) + +[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md) + +[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--command-line-syntax.md b/windows/deploy/user-state-migration-tool--usmt--command-line-syntax.md new file mode 100644 index 0000000000..3104cd8f51 --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--command-line-syntax.md @@ -0,0 +1,49 @@ +--- +title: User State Migration Tool (USMT) Command-line Syntax (Windows 10) +description: User State Migration Tool (USMT) Command-line Syntax +ms.assetid: f9d205c9-e824-46c7-8d8b-d7e4b52fd514 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) Command-line Syntax + + +The User State Migration Tool (USMT) 10.0 migrates user files and settings during large deployments of Windows. To improve and simplify the migration process, USMT captures desktop, network, and application settings in addition to a user's files. USMT then migrates these items to a new Windows installation. + +## In This Section + + + ++++ + + + + + + + + + + + + + + +

[ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md)

Lists the command-line options for using the ScanState tool.

[LoadState Syntax](loadstate-syntax-usmt-win7-usmt-win8.md)

Lists the command-line options for using the LoadState tool.

[UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md)

Lists the command-line options for using the UsmtUtils tool.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--how-to-topics.md b/windows/deploy/user-state-migration-tool--usmt--how-to-topics.md new file mode 100644 index 0000000000..043ea0bc83 --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--how-to-topics.md @@ -0,0 +1,78 @@ +--- +title: User State Migration Tool (USMT) How-to topics (Windows 10) +description: User State Migration Tool (USMT) How-to topics +ms.assetid: 7b9a2f2a-a43a-4984-9746-a767f9f1c7e3 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) How-to topics + + +The following table lists topics that describe how to use User State Migration Tool (USMT) 10.0 to perform specific tasks. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

[Exclude Files and Settings](exclude-files-and-settings-usmt.md)

Create a custom .xml file to exclude files, file types, folders, or registry settings from your migration.

[Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md)

Recover files from a compressed migration store after installing the operating system.

[Include Files and Settings](include-files-and-settings-usmt.md)

Create a custom .xml file to include files, file types, folders, or registry settings in your migration.

[Migrate Application Settings](migrate-application-settings.md)

Migrate the settings of an application that the MigApp.xml file does not include by default.

[Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md)

Migrate Encrypting File System (EFS) certificates by using USMT.

[Migrate User Accounts](migrate-user-accounts-usmt.md)

Specify the users to include and exclude in your migration.

[Reroute Files and Settings](reroute-files-and-settings-usmt.md)

Create a custom .xml file to reroute files and settings during a migration.

[Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md)

Determine whether a compressed migration store is intact, or whether it contains corrupt files or a corrupt catalog.

+ +  + +## Related topics + + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +[User State Migration Toolkit (USMT) Reference](user-state-migration-toolkit--usmt--reference.md) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--overview-topics.md b/windows/deploy/user-state-migration-tool--usmt--overview-topics.md new file mode 100644 index 0000000000..9c4fce8580 --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--overview-topics.md @@ -0,0 +1,58 @@ +--- +title: User State Migration Tool (USMT) Overview Topics (Windows 10) +description: User State Migration Tool (USMT) Overview Topics +ms.assetid: 23170271-130b-416f-a7a7-c2f6adc32eee +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) Overview Topics + + +The User State Migration Tool (USMT) 10.0 provides a highly customizable user-profile migration experience for IT professionals. USMT includes three command-line tools: ScanState.exe, LoadState.exe, and UsmtUtils.exe. USMT also includes a set of three modifiable .xml files: MigApp.xml, MigDocs.xml, and MigUser.xml. Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration. + +## In This Section + + + ++++ + + + + + + + + + + + + + + +

[User State Migration Tool (USMT) Overview](user-state-migration-tool--usmt--overview.md)

Describes the benefits and limitations of using USMT.

[Getting Started with the User State Migration Tool (USMT)](getting-started-with-the-user-state-migration-tool--usmt-.md)

Describes the general process to follow to migrate files and settings, and provides links to more information.

[Windows Upgrade and Migration Considerations](windows-upgrade-and-migration-considerations-win8.md)

Discusses the Microsoft® tools you can use to move files and settings between installations, as well as special considerations for performing an upgrade or migration.

+ +  + +## Related topics + + +[User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md) + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +[User State Migration Toolkit (USMT) Reference](user-state-migration-toolkit--usmt--reference.md) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--overview.md b/windows/deploy/user-state-migration-tool--usmt--overview.md new file mode 100644 index 0000000000..23ec179e3d --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--overview.md @@ -0,0 +1,64 @@ +--- +title: User State Migration Tool (USMT) Overview (Windows 10) +description: User State Migration Tool (USMT) Overview +ms.assetid: 3b649431-ad09-4b17-895a-3fec7ac0a81f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) Overview + + +You can use User State Migration Tool (USMT) 10.0 to streamline and simplify user state migration during large deployments of Windows operating systems. USMT captures user accounts, user files, operating system settings, and application settings, and then migrates them to a new Windows installation. You can use USMT for both PC replacement and PC refresh migrations. For more information, see [Common Migration Scenarios](common-migration-scenarios-usmt-win7-usmt-win8.md). + +USMT enables you to do the following: + +- Configure your migration according to your business needs by using the migration rule (.xml) files to control exactly which files and settings are migrated and how they are migrated. For more information about how to modify these files, see [USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md). + +- Fit your customized migration into your automated deployment process by using the ScanState and LoadState tools, which control collecting and restoring the user files and settings. For more information, see [User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md). + +- Perform offline migrations. You can run migrations offline by using the ScanState command in Windows Preinstallation Environment (WinPE) or you can perform migrations from previous installations of Windows contained in Windows.old directories. For more information about migration types, see [Choose a Migration Store Type](choose-a-migration-store-type-usmt-win7-usmt-win8.md) and [Offline Migration Reference](offline-migration-reference.md). + +## Benefits + + +USMT provides the following benefits to businesses that are deploying Windows operating systems: + +- Safely migrates user accounts, operating system and application settings. + +- Lowers the cost of deploying Windows by preserving user state. + +- Reduces end-user downtime required to customize desktops and find missing files. + +- Reduces help-desk calls. + +- Reduces the time needed for the user to become familiar with the new operating system. + +- Increases employee satisfaction with the migration experience. + +## Limitations + + +USMT is intended for administrators who are performing large-scale automated deployments. If you are only migrating the user states of a few computers, you can use [Windows Easy Transfer](http://go.microsoft.com/fwlink/p/?LinkId=140248). + +There are some scenarios in which the use of USMT is not recommended. These include: + +- Migrations that require end-user interaction. + +- Migrations that require customization on a machine-by-machine basis. + +## Related topics + + +[User State Migration Tool (USMT) Technical Reference](user-state-migration-tool--usmt--technical-reference.md) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--technical-reference.md b/windows/deploy/user-state-migration-tool--usmt--technical-reference.md new file mode 100644 index 0000000000..8ebdc5a931 --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--technical-reference.md @@ -0,0 +1,80 @@ +--- +title: User State Migration Tool (USMT) Technical Reference (Windows 10) +description: The User State Migration Tool (USMT) 10.0 is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals. +ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) Technical Reference + + +The User State Migration Tool (USMT) 10.0 is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals. + +Download the Windows ADK [from this website](http://go.microsoft.com/fwlink/p/?LinkID=526803). + +USMT 10.0 includes three command-line tools: + +- ScanState.exe + +- LoadState.exe + +- UsmtUtils.exe + +USMT 10.0 also includes a set of three modifiable .xml files: + +- MigApp.xml + +- MigDocs.xml + +- MigUser.xml + +Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration. + +USMT 10.0 tools can be used on several versions of Windows operating systems, for more information, see [USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md). For more information about previous releases of the USMT tools, see [User State Migration Tool (USMT) 4.0 User’s Guide](http://go.microsoft.com/fwlink/p/?LinkId=246564). + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + +

[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md)

Describes what’s new in USMT, how to get started with USMT, and the benefits and limitations of using USMT.

[User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md)

Includes step-by-step instructions for using USMT, as well as how-to topics for conducting tasks in USMT.

[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md)

Provides answers to frequently asked questions and common issues in USMT, as well as a reference for return codes used in USMT.

[User State Migration Toolkit (USMT) Reference](user-state-migration-toolkit--usmt--reference.md)

Includes reference information for migration planning, migration best practices, command-line syntax, using XML, and requirements for using USMT.

+ +  + +## Related topics + + +[Windows Assessment and Deployment Kit](https://msdn.microsoft.com/library/windows/hardware/dn247001.aspx) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-tool--usmt--troubleshooting.md b/windows/deploy/user-state-migration-tool--usmt--troubleshooting.md new file mode 100644 index 0000000000..a5c6aa5cac --- /dev/null +++ b/windows/deploy/user-state-migration-tool--usmt--troubleshooting.md @@ -0,0 +1,68 @@ +--- +title: User State Migration Tool (USMT) Troubleshooting (Windows 10) +description: User State Migration Tool (USMT) Troubleshooting +ms.assetid: 770f45bb-2284-463f-a29c-69c04f437533 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Tool (USMT) Troubleshooting + + +The following table describes topics that address common User State Migration Tool (USMT) 10.0 issues and questions. These topics describe tools that you can use to troubleshoot issues that arise during your migration. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + +

[Common Issues](common-issues-usmt-win8.md)

Find troubleshooting solutions for common problems in USMT.

[Frequently Asked Questions](frequently-asked-questions-usmt-win7-usmt-win8.md)

Find answers to questions about how to use USMT.

[Log Files](log-files-usmt-win7-usmt-win8.md)

Learn how to enable logging to help you troubleshoot issues in USMT.

[Return Codes](return-codes-usmt-win8.md)

Learn how to use return codes to identify problems in USMT.

[USMT Resources](usmt-resources-usmt-win8.md)

Find more information and support for using USMT.

+ +  + +## Related topics + + +[USMT Best Practices](usmt-best-practices-usmt-win7-usmt-win8.md) + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +[User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md) + +[User State Migration Toolkit (USMT) Reference](user-state-migration-toolkit--usmt--reference.md) + +  + +  + + + + + diff --git a/windows/deploy/user-state-migration-toolkit--usmt--reference.md b/windows/deploy/user-state-migration-toolkit--usmt--reference.md new file mode 100644 index 0000000000..295f145c4f --- /dev/null +++ b/windows/deploy/user-state-migration-toolkit--usmt--reference.md @@ -0,0 +1,72 @@ +--- +title: User State Migration Toolkit (USMT) Reference (Windows 10) +description: User State Migration Toolkit (USMT) Reference +ms.assetid: 2135dbcf-de49-4cea-b2fb-97dd016e1a1a +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# User State Migration Toolkit (USMT) Reference + + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

[USMT Requirements](usmt-requirements-usmt-win7-usmt-win8.md)

Describes operating system, hardware, and software requirements, and user prerequisites.

[USMT Best Practices](usmt-best-practices-usmt-win7-usmt-win8.md)

Discusses general and security-related best practices when using USMT.

[How USMT Works](how-usmt-works-usmt-win7-usmt-win8.md)

Learn about the processes behind the ScanState and LoadState tools.

[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md)

Choose what to migrate and the best migration scenario for your enterprise.

[User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md)

Explore command-line options for the ScanState, LoadState, and UsmtUtils tools.

[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md)

Learn about customizing a migration with XML files.

[Offline Migration Reference](offline-migration-reference.md)

Find requirements, best practices, and other considerations for performing a migration offline.

+ +  + +## Related topics + + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +[User State Migration Tool (USMT) How-to topics](user-state-migration-tool--usmt--how-to-topics.md) + +[User State Migration Tool (USMT) Troubleshooting](user-state-migration-tool--usmt--troubleshooting.md) + +  + +  + + + + + diff --git a/windows/deploy/usmt-best-practices-usmt-win7-usmt-win8.md b/windows/deploy/usmt-best-practices-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..e2a3bf8729 --- /dev/null +++ b/windows/deploy/usmt-best-practices-usmt-win7-usmt-win8.md @@ -0,0 +1,153 @@ +--- +title: USMT Best Practices (Windows 10) +description: USMT Best Practices +ms.assetid: e3cb1e78-4230-4eae-b179-e6e9160542d2 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# USMT Best Practices + + +This topic discusses general and security-related best practices when using User State Migration Tool (USMT) 10.0. + +## General Best Practices + + +- **Install applications before running the LoadState tool** + + Though it is not always essential, it is best practice to install all applications on the destination computer before restoring the user state. This helps ensure that migrated settings are preserved. + +- **Do not use MigUser.xml and MigDocs.xml together** + + If you use both .xml files, some migrated files may be duplicated if conflicting instructions are given about target locations. You can use the **/genmigxml** command-line option to determine which files will be included in your migration, and to determine if any modifications are necessary. For more information, see [Identify File Types, Files, and Folders](identify-file-types-files-and-folders-usmt-win8.md). + +- **Use MigDocs.xml for a better migration experience** + + If your data set is unknown or if many files are stored outside of the standard user-profile folders, the MigDocs.xml file is a better choice than the MigUser.xml file, because the MigDocs.xml file will gather a broader scope of data. The MigDocs.xml file migrates folders of data based on location, and on registered file type by querying the registry for registered application extensions. The MigUser.xml file migrates only the files with the specified file extensions. + +- **Close all applications before running either the ScanState or LoadState tools** + + Although using the **/vsc** switch can allow the migration of many files that are open with another application it is a best practice to close all applications in order to ensure all files and settings migrate. Without the **/vsc** or **/c** switch USMT will fail when it cannot migrate a file or setting. When you use the **/c** option USMT will ignore any files or settings that it cannot migrate and log an error each time. + +- **Log off after you run the LoadState** + + Some settings, such as fonts, wallpaper, and screensaver settings, will not take effect until the next time the user logs on. For this reason, you should log off after you run the LoadState tool. + +- **Managed environment** + + To create a managed environment, you can move all of the end user’s documents into My Documents (%CSIDL\_PERSONAL%). We recommend that you migrate files into the smallest-possible number of folders on the destination computer. This will help you to clean up files on the destination computer, if the LoadState command fails before completion. + +- **Chkdsk.exe** + + We recommend that you run Chkdsk.exe before running the ScanState and LoadState tools. Chkdsk.exe creates a status report for a hard disk drive and lists and corrects common errors. For more information about the Chkdsk.exe tool, see [Chkdsk](http://go.microsoft.com/fwlink/p/?LinkId=140244). + +- **Migrate in groups** + + If you decide to perform the migration while users are using the network, it is best to migrate user accounts in groups. To minimize the impact on network performance, determine the size of the groups based on the size of each user account. Migrating in phases also allows you to make sure each phase is successful before starting the next phase. Using this method, you can make any necessary modifications to your plan between groups. + +## Security Best Practices + + +As the authorized administrator, it is your responsibility to protect the privacy of the users and maintain security during and after the migration. In particular, you must consider the following issues: + +- **Encrypting File System (EFS)** + + Take extreme caution when migrating encrypted files, because the end user does not need to be logged on to capture the user state. By default, USMT fails if an encrypted file is found. For more information about EFS best practices, see this article in the [Microsoft Knowledge Base](http://go.microsoft.com/fwlink/p/?linkid=163). For specific instructions about EFS best practices, see [Migrate EFS Files and Certificates](migrate-efs-files-and-certificates-umst.md). + + **Important**   + If you migrate an encrypted file without also migrating the certificate, end users will not be able to access the file after the migration. + +   + +- **Encrypt the store** + + Consider using the **/encrypt** option with the ScanState command and the **/decrypt** option with the LoadState command. However, use extreme caution with this set of options, because anyone who has access to the ScanState command-line script also has access to the encryption key. + +- **Virus Scan** + + We recommend that you scan both the source and destination computers for viruses before running USMT. In addition, you should scan the destination computer image. To help protect data from viruses, we strongly recommend running an antivirus utility before migration. + +- **Maintain security of the file server and the deployment server** + + We recommend that you manage the security of the file and deployment servers. It is important to make sure that the file server where you save the store is secure. You must also secure the deployment server, to ensure that the user data that is in the log files is not exposed. We also recommend that you only transmit data over a secure Internet connection, such as a virtual private network. For more information about network security, see [Microsoft Security Compliance Manager](http://go.microsoft.com/fwlink/p/?LinkId=215657). + +- **Password Migration** + + To ensure the privacy of the end users, USMT does not migrate passwords, including those for applications such as Windows Live™ Mail, Microsoft Internet Explorer®, as well as Remote Access Service (RAS) connections and mapped network drives. It is important to make sure that end users know their passwords. + +- **Local Account Creation** + + Before you migrate local accounts, see the Migrating Local Accounts section in the [Identify Users](identify-users-usmt-win7-usmt-win8.md) topic. + +## XML File Best Practices + + +- **Specify the same set of mig\*.xml files in both the ScanState and the LoadState tools** + + If you used a particular set of mig\*.xml files in the ScanState tool, either called through the "/auto" option, or individually through the "/i" option, then you should use same option to call the exact same mig\*.xml files in the LoadState tool. + +- **The <CustomFileName> in the migration urlid should match the name of the file** + + Although it is not a requirement, it is good practice for <CustomFileName> to match the name of the file. For example, the following is from the MigApp.xml file: + + ``` syntax + + + ``` + +- **TUse the XML Schema (MigXML.xsd) when authoring .xml files to validate synta** + + The MigXML.xsd schema file should not be included on the command line or in any of the .xml files. + +- **Use the default migration XML files as models** + + To create a custom .xml file, you can use the migration .xml files as models to create your own. If you need to migrate user data files, model your custom .xml file on MigUser.xml. To migrate application settings, model your custom .xml file on the MigApp.xml file. + +- **Consider the impact on performance when using the <context> parameter** + + Your migration performance can be affected when you use the <context> element with the <component> element; for example, as in when you want to encapsulate logical units of file- or path-based <include> and <exclude> rules. + + In the **User** context, a rule is processed one time for each user on the system. + + In the **System** context, a rule is processed one time for the system. + + In the **UserAndSystem** context, a rule is processed one time for each user on the system and one time for the system. + + **Note**   + The number of times a rule is processed does not affect the number of times a file is migrated. The USMT migration engine ensures that each file migrates only once. + +   + +- **We recommend that you create a separate .xml file instead of adding your .xml code to one of the existing migration .xml files** + + For example, if you have code that migrates the settings for an application, you should not just add the code to the MigApp.xml file. + +- **You should not create custom .xml files to alter the operating system settings that are migrated** + + These settings are migrated by manifests and you cannot modify those files. If you want to exclude certain operating system settings from the migration, you should create and modify a Config.xml file. + +- **You can use the asterisk (\*) wildcard character in any migration XML file that you create** + + **Note**   + The question mark is not valid as a wildcard character in USMT .xml files. + +   + +## Related topics + + +[Migration Store Encryption](migration-store-encryption-usmt-win8.md) + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/usmt-requirements-usmt-win7-usmt-win8.md b/windows/deploy/usmt-requirements-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..a53bc4a392 --- /dev/null +++ b/windows/deploy/usmt-requirements-usmt-win7-usmt-win8.md @@ -0,0 +1,182 @@ +--- +title: USMT Requirements (Windows 10) +description: USMT Requirements +ms.assetid: 2b0cf3a3-9032-433f-9622-1f9df59d6806 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# USMT Requirements + + +## In This Topic + + +- [Supported Operating Systems](#BKMK_1) + +- [Software Requirements](#BKMK_2) + +- [Hard Disk Requirements](#BKMK_3) + +- [User Prerequisites](#BKMK_UserPrereqs) + +## Supported Operating Systems + + +The User State Migration Tool (USMT) 10.0 does not have any explicit RAM or CPU speed requirements for either the source or destination computers. If your computer complies with the system requirements of the operating system, it also complies with the requirements for USMT. You need an intermediate store location large enough to hold all of the migrated data and settings, and the same amount of hard disk space on the destination computer for the migrated files and settings. + +The following table lists the operating systems supported in USMT. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Operating SystemsScanState (source computer)LoadState (destination computer)

Windows® XP Professional

X

Windows XP Professional x64 Edition

X

32-bit versions of Windows Vista

X

X

64-bit versions of Windows Vista

X

X

32-bit versions of Windows 7

X

X

64-bit versions of Windows 7

X

X

32-bit versions of Windows 8

X

X

64-bit versions of Windows 8

X

X

32-bit versions of Windows 10

X

X

64-bit versions of Windows 10

X

X

+ +  + +**Note**   +You can migrate a 32-bit operating system to a 64-bit operating system. However, you cannot migrate a 64-bit operating system to a 32-bit operating system. + +USMT does not support any of the Windows Server® operating systems, Windows 2000, or any of the starter editions for Windows XP, Windows Vista, or Windows 7. In addition, USMT only supports migration from Windows XP with Service Pack 3. + +  + +## Software Requirements + + +- **Must use latest version of Window PE.** For example, to migrate to Windows 10, you'll need Windows PE 5.1. For more info, see [What's New in Windows PE](../p_adk_online/whats-new-in-windows-pe-s14.md). + +- **Must run in Administrator Mode** When manually running the **ScanState** and **LoadState** tools on Windows 7, Windows 8 or Windows 10 you must run them in Administrator mode from an account with administrative credentials to ensure that all specified users are migrated. This is because User Access Control (UAC) is enabled by default. If you do not run USMT in Administrator mode, only the user profile that is logged on will be included in the migration. + + To run in Administrator mode: + + 1. Click **Start**. + + 2. Click **All Programs**. + + 3. Click **Accessories**. + + 4. Right-click **Command Prompt**. + + 5. Click **Run as administrator**. + + 6. At the command prompt, type the `ScanState` or `LoadState` command. + + **Important**   + You must run USMT in Administrator mode from an account with full administrative permissions, including the following privileges: + + - SeBackupPrivilege (Back up files and directories) + + - SeDebugPrivilege (Debug programs) + + - SeRestorePrivilege (Restore files and directories) + + - SeSecurityPrivilege (Manage auditing and security log) + + - SeTakeOwnership Privilege (Take ownership of files or other objects) + +   + +- **Specify the /c option and <ErrorControl> settings in the Config.xml file.** USMT will fail if it cannot migrate a file or setting, unless you specify the **/c** option. When you specify the **/c** option, USMT logs an error each time it encounters a file that is in use that did not migrate, but the migration will not be interrupted. In USMT, you can specify in the Config.xml file which types of errors should allow the migration to continue, and which should cause the migration to fail. For more information about error reporting, and the **<ErrorControl>** element, see [Config.xml File](configxml-file-usmt-win7-usmt-win8.md), [Log Files](log-files-usmt-win7-usmt-win8.md), and [XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md). + +- **Install applications before running the LoadState command.** Install all applications on the destination computer before restoring the user state. This ensures that migrated settings are preserved. + +## Hard-Disk Requirements + + +Ensure that there is enough available space in the migration-store location and on the source and destination computers. For more information, see [Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md). + +## User Prerequisites + + +This documentation assumes that IT professionals using USMT understand command-line tools. The documentation also assumes that IT professionals using USMT to author MigXML rules understand the following: + +- The navigation and hierarchy of the Windows registry. + +- The files and file types that applications use. + +- The methods to extract application and setting information manually from applications created by internal software-development groups and non-Microsoft software vendors. + +- XML-authoring basics. + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +[Estimate Migration Store Size](estimate-migration-store-size-usmt-win7-usmt-win8.md) + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +  + +  + + + + + diff --git a/windows/deploy/usmt-resources-usmt-win8.md b/windows/deploy/usmt-resources-usmt-win8.md new file mode 100644 index 0000000000..e830cc2335 --- /dev/null +++ b/windows/deploy/usmt-resources-usmt-win8.md @@ -0,0 +1,45 @@ +--- +title: USMT Resources (Windows 10) +description: USMT Resources +ms.assetid: a0b266c7-4bcb-49f1-b63c-48c6ace86b43 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# USMT Resources + + +## USMT Online Resources + + +- [ADK Release Notes](https://msdn.microsoft.com/library/windows/hardware/dn927348.aspx) + +- Microsoft Visual Studio + + - You can use the User State Migration Tool (USMT) XML schema (the MigXML.xsd file) to validate the migration .xml files using an XML authoring tool such as Microsoft® Visual Studio®. + + For more information about how to use the schema with your XML authoring environment, see the environment’s documentation. + +- [Ask the Directory Services Team blog](http://go.microsoft.com/fwlink/p/?LinkId=226365) + +- Forums: + + - [Microsoft Deployment Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=226386) + + - [Configuration Manager Operating System Deployment](http://go.microsoft.com/fwlink/p/?LinkId=226388) + +## Related topics + + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +  + +  + + + + + diff --git a/windows/deploy/usmt-xml-reference-usmt-win7-usmt-win8.md b/windows/deploy/usmt-xml-reference-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..a0f4c4622f --- /dev/null +++ b/windows/deploy/usmt-xml-reference-usmt-win7-usmt-win8.md @@ -0,0 +1,73 @@ +--- +title: USMT XML Reference (Windows 10) +description: USMT XML Reference +ms.assetid: fb946975-0fee-4ec0-b3ef-7c34945ee96f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# USMT XML Reference + + +This section contains topics that you can use to work with and to customize the migration XML files. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

[Understanding Migration XML Files](understanding-migration-xml-files.md)

Provides an overview of the default and custom migration XML files and includes guidelines for creating and editing a customized version of the MigDocs.xml file.

[Config.xml File](configxml-file-usmt-win7-usmt-win8.md)

Describes the Config.xml file and policies concerning its configuration.

[Customize USMT XML Files](customize-usmt-xml-files-usmt-win7-usmt-win8.md)

Describes how to customize USMT XML files.

[Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md)

Gives examples of XML files for various migration scenarios.

[Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md)

Describes the precedence of migration rules and how conflicts are handled.

[General Conventions](general-conventions-usmt-win7-usmt-win8.md)

Describes the XML helper functions.

[XML File Requirements](xml-file-requirements.md)

Describes the requirements for custom XML files.

[Recognized Environment Variables](recognized-environment-variables-usmt-win7-usmt-win8.md)

Describes environment variables recognized by USMT.

[XML Elements Library](xml-elements-library-usmt-win7-usmt-win8.md)

Describes the XML elements and helper functions for authoring migration XML files to use with USMT.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/usmtutils-syntax-usmt-win8.md b/windows/deploy/usmtutils-syntax-usmt-win8.md new file mode 100644 index 0000000000..347e171410 --- /dev/null +++ b/windows/deploy/usmtutils-syntax-usmt-win8.md @@ -0,0 +1,346 @@ +--- +title: UsmtUtils Syntax (Windows 10) +description: UsmtUtils Syntax +ms.assetid: cdab7f2d-dd68-4016-b9ed-41ffa743b65c +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# UsmtUtils Syntax + + +This topic describes the syntax for the utilities available in User State Migration Tool (USMT) 10.0 through the command-line interface. These utilities: + +- Improve your ability to determine cryptographic options for your migration. + +- Assist in removing hard-link stores that cannot otherwise be deleted due to a sharing lock. + +- Verify whether the catalog file or any of the other files in the compressed migration store have become corrupted. + +- Extract files from the compressed migration store when you migrate files and settings to the destination computer. + +## In This Topic + + +[Usmtutils.exe](#BKMK_Usmtutils_exe) + +[Verify Options](#BKMK_VerifyOptions) + +[Extract Options](#BKMK_ExtractOptions) + +## Usmtutils.exe + + +The following table lists command-line options for USMTutils.exe. The sections that follow provide further command-line options for the **/verify** and the **/extract** options. + +The syntax for UsmtUtils.exe is: + +usmtutils \[/ec | /rd *<storeDir>* | /verify *<filepath>* \[options\] | /extract *<filepath>* *<destinationPath>* \[options\]\] + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-line OptionDescription

/ec

Returns a list of supported cryptographic algorithms (AlgIDs) on the current system. You can use this on a destination computer to determine which algorithm to use with the /encrypt command before you run the ScanState tool on the source computer.

/rd<storeDir>

Removes the directory path specified by the <storeDir> argument on the computer. You can use this command to delete hard-link migration stores that cannot otherwise be deleted at a command prompt due to a sharing lock. If the migration store spans multiple volumes on a given drive, it will be deleted from all of these volumes.

+

For example:

+

usmtutils /rd D:\MyHardLinkStore

/y

Overrides the accept deletions prompt when used with the /rd option. When you use the /y option with the /rd option, you will not be prompted to accept the deletions before USMT deletes the directories.

/verify

Returns information on whether the compressed migration store is intact or whether it contains corrupted files or a corrupted catalog.

+

See [Verify Options](#BKMK_VerifyOptions) for syntax and options to use with /verify.

/extract

Recovers files from a compressed USMT migration store.

+

See [Extract Options](#BKMK_ExtractOptions) for syntax and options to use with /extract.

+ +  + +## Verify Options + + +Use the **/verify** option when you want to determine whether a compressed migration store is intact or whether it contains corrupted files or a corrupted catalog. For more information on how to use the **/verify** option, see [Verify the Condition of a Compressed Migration Store](verify-the-condition-of-a-compressed-migration-store.md). + +The syntax for **/verify** is: + +usmtutils /verify\[:*<reportType>*\] *<filePath>* \[/l:*<logfile>*\] \[/v:*VerbosityLevel*\] \[/decrypt \[:*<AlgID>*\] {/key:*<keystring>* | /keyfile:*<filename>*}\] + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
Command-line OptionDescription

<reportType>

Specifies whether to report on all files, corrupted files only, or the status of the catalog.

+
    +
  • Summary. Returns both the number of files that are intact and the number of files that are corrupted in the migration store. If no algorithm is specified, the summary report is displayed as a default.

  • +
  • all. Returns a tab-delimited list of all of the files in the compressed migration store and the status for each file. Each line contains the file name followed by a tab spacing, and either “CORRUPTED” or “OK” depending on the status of the file. The last entry reports the corruption status of the "CATALOG" of the store. A catalog file contains metadata for all files in a migration store. The LoadState tool requires a valid catalog file in order to open the migration store. Returns "OK" if the catalog file is intact and LoadState can open the migration store and "CORRUPTED" if the migration store is corrupted.

  • +
  • failureonly. Returns a tab-delimited list of only the files that are corrupted in the compressed migration store.

  • +
  • Catalog. Returns only the status of the catalog file.

  • +
/l: +

<logfilePath>

Specifies the location and name of the log file.

/v:<VerbosityLevel>

(Verbosity)

+

Enables verbose output in the UsmtUtils log file. The default value is 0.

+

You can set the VerbosityLevel to one of the following levels:

+ ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
LevelExplanation

0

Only the default errors and warnings are enabled.

1

Enables verbose output.

4

Enables error and status output.

5

Enables verbose and status output.

8

Enables error output to a debugger.

9

Enables verbose output to a debugger.

12

Enables error and status output to a debugger.

13

Enables verbose, status, and debugger output.

+

 

/decrypt<AlgID>/:<KeyString>

+

or

+

/decrypt<AlgID>/:<“Key String”>

+

or

+

/decrypt:<AlgID>/keyfile:<FileName>

Specifies that the /encrypt option was used to create the migration store with the ScanState tool. To decrypt the migration store, specify a /key or /keyfile option as follows:

+
    +
  • <AlgID> specifies the cryptographic algorithm that was used to create the migration store on the ScanState command line. If no algorithm is specified, ScanState and UsmtUtils use the 3DES algorithm as a default.

    +

    <AlgID> valid values include: AES_128, AES_192, AES_256, 3DES, or 3DES_112.

  • +
  • /key:<KeyString> specifies the encryption key. If there is a space in <KeyString>, you must surround the argument with quotation marks.

  • +
  • /keyfile: <FileName> specifies the location and name of a text (.txt) file that contains the encryption key.

  • +
+

For more information about supported encryption algorithms, see [Migration Store Encryption](migration-store-encryption-usmt-win8.md)

+ +  + +Some examples of **/verify** commands: + +- `usmtutils /verify D:\MyMigrationStore\store.mig` + +- `usmtutils /verify:catalog D:\MyMigrationStore\store.mig` + +- `usmtutils /verify:all D:\MyMigrationStore\store.mig /decrypt /l:D:\UsmtUtilsLog.txt` + +- `usmtutils /verify:failureonly D:\MyMigrationStore\store.mig /decrypt:AES_192 /keyfile:D:\encryptionKey.txt` + +## Extract Options + + +Use the **/extract** option to recover files from a compressed USMT migration store if it will not restore normally with loadstate. For more information on how to use the **/extract** option, see [Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md). + +The syntax for **/extract** is: + +/extract *<filePath>* *<destinationPath>* \[/i:*<includePattern>*\] \[/e: *<excludePattern>*\] \[/l: *<logfile>*\] \[/v: *VerbosityLevel>*\] \[/decrypt\[:*<AlgID>*\] {key: *<keystring>* | /keyfile: *<filename>*}\] \[/o\] + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Command-line OptionDescription

<filePath>

Path to the USMT migration store.

+

For example:

+

D:\MyMigrationStore\USMT\store.mig

<destinationPath>

Path to the folder where the tool puts the individual files.

/i:<includePattern>

Specifies a pattern for files to include in the extraction. You can specify more than one pattern. Separate patterns with a comma or a semicolon. You can use /i: <includePattern> and /e: <excludePattern> options in the same command. When both include and exclude patterns are used on the command line, include patterns take precedence over exclude patterns.

/e:<excludePattern>

Specifies a pattern for files to omit from the extraction. You can specify more than one pattern. Separate patterns with a comma or a semicolon. You can use /i: <includePattern> and /e: <excludePattern> options in the same command. When both include and exclude patterns are used on the command line, include patterns take precedence over exclude patterns.

/l:<logfilePath>

Specifies the location and name of the log file.

/v:<VerbosityLevel>

(Verbosity)

+

Enables verbose output in the UsmtUtils log file. The default value is 0.

+

You can set the VerbosityLevel to one of the following levels:

+ ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
LevelExplanation

0

Only the default errors and warnings are enabled.

1

Enables verbose output.

4

Enables error and status output.

5

Enables verbose and status output.

8

Enables error output to a debugger.

9

Enables verbose output to a debugger.

12

Enables error and status output to a debugger.

13

Enables verbose, status, and debugger output.

+

 

/decrypt<AlgID>/key:<KeyString>

+

or

+

/decrypt<AlgID>/:<“Key String”>

+

or

+

/decrypt:<AlgID>/keyfile:<FileName>

Specifies that the /encrypt option was used to create the migration store with the ScanState tool. To decrypt the migration store, you must also specify a /key or /keyfile option as follows:

+
    +
  • <AlgID> specifies the cryptographic algorithm that was used to create the migration store on the ScanState command line. If no algorithm is specified, ScanState and UsmtUtils use the 3DES algorithm as a default.

    +

    <AlgID> valid values include: AES_128, AES_192, AES_256, 3DES, or 3DES_112.

  • +
  • /key: <KeyString> specifies the encryption key. If there is a space in <KeyString>, you must surround the argument with quotation marks.

  • +
  • /keyfile:<FileName> specifies a text (.txt) file that contains the encryption key

  • +
+

For more information about supported encryption algorithms, see [Migration Store Encryption](migration-store-encryption-usmt-win8.md).

/o

Overwrites existing output files.

+ +  + +Some examples of **/extract** commands: + +- `usmtutils /extract D:\MyMigrationStore\USMT\store.mig C:\ExtractedStore` + +- `usmtutils /extract D:\MyMigrationStore\USMT\store.mig /i:"*.txt, *.pdf" C:\ExtractedStore /decrypt /keyfile:D:\encryptionKey.txt` + +- `usmtutils /extract D:\MyMigrationStore\USMT\store.mig /e:*.exe C:\ExtractedStore /decrypt:AES_128 /key:password /l:C:\usmtlog.txt` + +- `usmtutils /extract D:\MyMigrationStore\USMT\store.mig /i:myProject.* /e:*.exe C:\ExtractedStore /o` + +## Related topics + + +[User State Migration Tool (USMT) Command-line Syntax](user-state-migration-tool--usmt--command-line-syntax.md) + +[Return Codes](return-codes-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/vamt-known-issues-vamt-30-win8.md b/windows/deploy/vamt-known-issues-vamt-30-win8.md new file mode 100644 index 0000000000..78cd0317c6 --- /dev/null +++ b/windows/deploy/vamt-known-issues-vamt-30-win8.md @@ -0,0 +1,31 @@ +--- +title: VAMT Known Issues (Windows 10) +description: VAMT Known Issues +ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# VAMT Known Issues + + +The following list contains the current known issues with the Volume Activation Management Tool (VAMT) 3.0. + +- The VAMT Windows Management Infrastructure (WMI) remote operations may take longer to execute if the target computer is in a sleep or standby state. + +- Recovery of Non-Genuine computers is a two-step process. VAMT can be used to install a new product key and activate the computer. However, the computer itself must visit the [Windows Genuine Advantage](http://go.microsoft.com/fwlink/p/?linkid=182914) Web site to revalidate the computer's Genuine status. Upon successfully completing this step, the computer will be restored to full functionality. For more information on recovering Non-Genuine Windows computers, go to [Windows Volume Activation](http://go.microsoft.com/fwlink/p/?linkid=184668). + +- When opening a Computer Information List (.cil file) saved in a previous version of VAMT, the edition information is not shown for each product in the center pane. Users must update the product status again to obtain the edition information. + +- The remaining activation count can only be retrieved for MAKs. + +  + +  + + + + + diff --git a/windows/deploy/vamt-requirements-vamt-30-win8.md b/windows/deploy/vamt-requirements-vamt-30-win8.md new file mode 100644 index 0000000000..3f4aedac5d --- /dev/null +++ b/windows/deploy/vamt-requirements-vamt-30-win8.md @@ -0,0 +1,112 @@ +--- +title: VAMT Requirements (Windows 10) +description: VAMT Requirements +ms.assetid: d14d152b-ab8a-43cb-a8fd-2279364007b9 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# VAMT Requirements + + +## Product Key Requirements + + +The Volume Activation Management Tool (VAMT) can be used to perform activations using any of the following types of product keys. + + ++++ + + + + + + + + + + + + + + + + +
Product Key TypeWhere to Obtain
    +
  • Multiple Activation Key (MAK)

  • +
  • Key Management Service (KMS) host key (CSVLK)

  • +
  • KMS client setup keys (GVLK)

  • +

Volume licensing keys can only be obtained with a signed contract from Microsoft. For more info, see the [Microsoft Volume Licensing portal](http://go.microsoft.com/fwlink/p/?LinkId=227282).

Retail product keys

Obtained at time of product purchase.

+ +  + +## System Requirements + + +The following table lists the system requirements for the VAMT host computer. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Computer and Processor

1 GHz x86 or x64 processor

Memory

1 GB RAM for x86 or 2 GB RAM for x64

Hard Disk

16 GB available hard disk space for x86 or 20 GB for x64

External Drive

Removable media (Optional)

Display

1024x768 or higher resolution monitor

Network

Connectivity to remote computers via Windows® Management Instrumentation (TCP/IP) and Microsoft® Activation Web Service on the Internet via HTTPS

Operating System

Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, or Windows Server 2012.

Additional Requirements

    +
  • Connection to a SQL Server database. For more info, see [Install VAMT](install-vamt-vamt-30-win8.md).

  • +
  • PowerShell 3.0: For Windows 8, Windows 8.1, Windows 10, and Windows Server® 2012, PowerShell is included in the installation. For previous versions of Windows and Windows Server, you must download PowerShell 3.0. To download PowerShell, go to [Download Windows PowerShell 3.0](http://go.microsoft.com/fwlink/p/?LinkId=218356).

  • +
  • If installing on Windows Server 2008 R2, you must also install .NET Framework 3.51.

  • +
+ +  + +## Related topics + + +[Install and Configure VAMT](install-and-configure-vamt-vamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/vamt-step-by-step-scenarios-vamt-30-win8.md b/windows/deploy/vamt-step-by-step-scenarios-vamt-30-win8.md new file mode 100644 index 0000000000..38f166c91f --- /dev/null +++ b/windows/deploy/vamt-step-by-step-scenarios-vamt-30-win8.md @@ -0,0 +1,54 @@ +--- +title: VAMT Step-by-Step Scenarios (Windows 10) +description: VAMT Step-by-Step Scenarios +ms.assetid: 455c542c-4860-4b57-a1f0-7e2d28e11a10 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# VAMT Step-by-Step Scenarios + + +This section provides step-by-step instructions on implementing the Volume Activation Management Tool (VAMT) in typical environments. VAMT supports many common scenarios; the scenarios in this section describe some of the most common to get you started. + +## In this Section + + + ++++ + + + + + + + + + + + + + + +

[Scenario 1: Online Activation](scenario-1-online-activation-vamt-30-win8.md)

Describes how to distribute Multiple Activation Keys (MAKs) to products installed on one or more connected computers within a network, and how to instruct these products to contact Microsoft over the Internet for activation.

[Scenario 2: Proxy Activation](scenario-2-proxy-activation-vamt-30-win8.md)

Describes how to use two VAMT host computers — the first one with Internet access and a second computer within an isolated workgroup — as proxies to perform MAK volume activation for workgroup computers that do not have Internet access.

[Scenario 3: KMS Client Activation](scenario-3-kms-client-activation-vamt-30-win8.md)

Describes how to use VAMT to configure client products for Key Management Service (KMS) activation. By default, volume license editions of Windows 10, Windows Vista, Windows® 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, or Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation.

+ +  + +## Related topics + + +[Introduction to VAMT](introduction-to-vamtvamt-30-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/verify-the-condition-of-a-compressed-migration-store.md b/windows/deploy/verify-the-condition-of-a-compressed-migration-store.md new file mode 100644 index 0000000000..db3a681352 --- /dev/null +++ b/windows/deploy/verify-the-condition-of-a-compressed-migration-store.md @@ -0,0 +1,123 @@ +--- +title: Verify the Condition of a Compressed Migration Store (Windows 10) +description: Verify the Condition of a Compressed Migration Store +ms.assetid: 4a3fda96-5f7d-494a-955f-6b865ec9fcae +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Verify the Condition of a Compressed Migration Store + + +When you migrate files and settings during a typical PC-refresh migration, the user state is usually stored in a compressed folder on the intermediate store. This compressed folder, also called the compressed migration store, is a single image file that contains: + +- All of the files being migrated. + +- The user’s settings. + +- A catalog file that contains metadata for all files in the migration store. + +When you run the **LoadState** command to load the data from these files to the destination computer, LoadState requires a valid catalog file in order to open the migration store. You can run the **UsmtUtils** command with the **/verify** option to determine whether the compressed migration store is intact, or whether it contains corrupted files or a corrupted catalog. You should run the **/verify** option on the migration store before you overwrite the original user-state files and settings. + +When you use the **/verify** option, you can specify what type of information to report in the UsmtUtils log file. These report types are: + +- **Catalog**: Displays the status of only the catalog file. + +- **All**: Displays the status of all files, including the catalog file. + +- **Failure only**: Displays only the files that are corrupted. + +## In This Topic + + +The following sections demonstrate how to run the **UsmtUtils** command with the **/verify** option, and how to specify the information to display in the UsmtUtils log file. + +- [The UsmtUtils syntax for the /verify option](#BKMK_verifySyntax) + +- [To verify that the migration store is intact](#BKMK_verifyIntactStore) + +- [To verify the status of only the catalog file](#BKMK_verifyCatalog) + +- [To verify the status of all files](#BKMK_verifyAllFiles) + +- [To verify the status of the files and return only the corrupted files](#BKMK_returnCorrupted) + +### The UsmtUtils Syntax for the /verify Option + +To verify the condition of a compressed migration store, use the following UsmtUtils syntax: + +cd /d<USMTpath>usmtutils /verify\[:<reportType>\] <filePath> \[/l:<logfile>\] \[/decrypt \[:<AlgID>\] {/key:<keystring> | /keyfile:<filename>}\] + +Where the placeholders have the following values: + +- *<USMTpath>* is the location where you have saved the USMT files and tools. + +- *<reportType>* specifies whether to report on all files, corrupted files only, or the status of the catalog. + +- *<filePath>* is the location of the compressed migration store. + +- *<logfile>* is the location and name of the log file. + +- *<AlgID>* is the cryptographic algorithm that was used to create the migration store on the **ScanState** command line. + +- *<keystring>* is the encryption key that was used to encrypt the migration store. + +- *<filename>* is the location and name of the text file that contains the encryption key. + +### To Verify that the Migration Store is Intact + +To verify whether the migration store is intact or whether it contains corrupted files or a corrupted catalog, type: + +``` syntax +usmtutils /verify D:\MyMigrationStore\store.mig +``` + +Because no report type is specified, UsmtUtils displays the default summary report. + +### To Verify the Status of Only the Catalog File + +To verify whether the catalog file is corrupted or intact, type: + +``` syntax +usmtutils /verify:catalog D:\MyMigrationStore\store.mig +``` + +### To Verify the Status of all Files + +To verify whether there are any corrupted files in the compressed migration store, and to specify the name and location of the log file, type: + +`usmtutils /verify:all D:\MyMigrationStore\store.mig /decrypt /l:D:\UsmtUtilsLog.txt` + +In addition to verifying the status of all files, this example decrypts the files. Because no encryption algorithm is specified, UsmtUtils uses the default 3DES cryptographic algorithm. + +### To Verify the Status of the Files and Return Only the Corrupted Files + +In this example, the log file will only list the files that became corrupted during the ScanState process. This list will include the catalog file if it is also corrupted. + +``` syntax +usmtutils /verify:failureonly D:\MyMigrationStore\USMT\store.mig /decrypt:AES_192 /keyfile:D:\encryptionKey.txt +``` + +This example also decrypts the files by specifying the cryptographic algorithm and the location of the file that contains the encryption key. + +### Next Steps + +If the **/verify** option indicates that there are corrupted files in the migration store, you can use the **/extract** option in the UsmtUtils tool to recover data from some corrupted stores. For more information, see [Extract Files from a Compressed USMT Migration Store](extract-files-from-a-compressed-usmt-migration-store.md). + +## Related topics + + +[UsmtUtils Syntax](usmtutils-syntax-usmt-win8.md) + +[Return Codes](return-codes-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/volume-activation-for-windows-81-client.md b/windows/deploy/volume-activation-for-windows-81-client.md new file mode 100644 index 0000000000..2b011853d4 --- /dev/null +++ b/windows/deploy/volume-activation-for-windows-81-client.md @@ -0,0 +1,88 @@ +--- +title: Volume Activation for Windows 10 (Windows 10) +description: This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows. +ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2 +keywords: ["vamt", "volume activation", "activation", "windows activation"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Volume Activation for Windows 10 + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2012 +- Windows Server 2008 R2 + +**Looking for volume licensing information?** + +- [Download the Volume Licensing Reference Guide for Windows 10 Desktop Operating System](http://go.microsoft.com/fwlink/p/?LinkId=620104) + +**Looking for retail activation?** + +- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644) + +This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows. + +*Volume activation* is the process that Microsoft volume licensing customers use to automate and manage the activation of Windows operating systems, Microsoft Office, and other Microsoft products across large organizations. Volume licensing is available to customers who purchase software under various volume programs (such as Open and Select) and to participants in programs such as the Microsoft Partner Program and MSDN Subscriptions. + +Volume activation is a configurable solution that helps automate and manage the product activation process on computers running Windows operating systems that have been licensed under a volume licensing program. Volume activation is also used with other software from Microsoft (most notably the Office suites) that are sold under volume licensing agreements and that support volume activation. + +This guide provides information and step-by-step guidance to help you choose a volume activation method that suits your environment, and then to configure that solution successfully. This guide describes the volume activation features that are available in Windows 10 and Windows Server 2012 R2 and the tools that are provided in these versions of Windows and Windows Server to manage volume activation. + +Because most organizations will not immediately switch all computers to Windows 10, practical volume activation strategies must also take in to account how to work with the Windows 8, Windows 7, Windows Server 2012, and Windows Server 2008 R2Windows Server 2008 R2 operating systems. This guide discusses how the new volume activation tools can support earlier operating systems, but it does not discuss the tools that are provided with earlier operating system versions. + +Volume activation—and the need for activation itself—is not new, and this guide does not review all of its concepts and history. You can find additional background in the appendices of this guide. For more information, see [Volume Activation Overview](http://go.microsoft.com/fwlink/p/?LinkId=618209) in the TechNet Library. + +If you would like additional information about planning a volume activation deployment specifically for Windows 7 and Windows Server 2008 R2, please see the [Volume Activation Planning Guide for Windows 7](http://go.microsoft.com/fwlink/p/?LinkId=618210). + +To successfully plan and implement a volume activation strategy, you must: + +- Learn about and understand product activation. + +- Review and evaluate the available activation types or models. + +- Consider the connectivity of the clients to be activated. + +- Choose the method or methods to be used with each type of client. + +- Determine the types and number of product keys you will need. + +- Determine the monitoring and reporting needs in your organization. + +- Install and configure the tools required to support the methods selected. + +Keep in mind that the method of activation does not change an organization’s responsibility to the licensing requirements. You must ensure that all software used in your organization is properly licensed and activated in accordance with the terms of the licensing agreements in place. + +**In this guide:** + +- [Plan for volume activation](plan-for-volume-activation-client.md) + +- [Activate using Key Management Service](activate-using-key-management-service-client.md) + +- [Activate using Active Directory-based activation](activate-using-active-directory-based-activation-client.md) + +- [Activate clients running Windows 10](activate-clients-running-windows-81-client.md) + +- [Monitor activation](monitor-activation-client.md) + +- [Use the Volume Activation Management Tool](use-the-volume-activation-management-tool-client.md) + +- [Appendix: Information sent to Microsoft during activation](appendix-information-sent-to-microsoft-during-activation-client.md) + +  + +  + + + + + diff --git a/windows/deploy/volume-activation-management-tool--vamt--overview-vamt-30-win8.md b/windows/deploy/volume-activation-management-tool--vamt--overview-vamt-30-win8.md new file mode 100644 index 0000000000..4768f5677c --- /dev/null +++ b/windows/deploy/volume-activation-management-tool--vamt--overview-vamt-30-win8.md @@ -0,0 +1,97 @@ +--- +title: Volume Activation Management Tool (VAMT) Technical Reference (Windows 10) +description: The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process. +ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Volume Activation Management Tool (VAMT) Technical Reference + + +The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process. + +VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems: + +- Windows® 7 + +- Windows 8 + +- Windows 8.1 + +- Windows 10 + +- Windows Server 2008 R2 + +- Windows Server® 2012 + +- Windows Server 2012 R2 + +**Important**   +VAMT is designed to manage volume activation for: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Microsoft Office 2010, and Microsoft Office 2013. Computers installed with volume editions of **Windows XP** or **Windows Server 2003** cannot be managed using VAMT. However, Office 2010 and Office 2013 products installed on these two operating systems can still be managed. + +  + +VAMT is only available in an EN-US (x86) package. + +## In this Section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

[Introduction to VAMT](introduction-to-vamtvamt-30-win8.md)

Provides a description of VAMT and common usages.

[Active Directory-Based Activation Overview](active-directory-based-activation-overview.md)

Describes Active Directory-Based Activation scenarios.

[Install and Configure VAMT](install-and-configure-vamt-vamt-30-win8.md)

Describes how to install VAMT and use it to configure client computers on your network.

[Add and Manage Products](add-and-manage-products-vamt-30-win8.md)

Describes how to add client computers into VAMT.

+

[Manage Product Keys](manage-product-keys-vamt-30-win8.md)

Describes how to add and remove a product key from VAMT.

[Manage Activations](manage-activations-vamt-30-win8.md)

Describes how to activate a client computer by using a variety of activation methods.

[Manage VAMT Data](manage-vamt-data-vamt-30-win8.md)

Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT.

[VAMT Step-by-Step Scenarios](vamt-step-by-step-scenarios-vamt-30-win8.md)

Provides step-by-step instructions for using VAMT in typical environments.

[VAMT Known Issues](vamt-known-issues-vamt-30-win8.md)

Lists known issues in VAMT.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/what-does-usmt-migrate-usmt-win7-usmt-win8.md b/windows/deploy/what-does-usmt-migrate-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..f76cd13706 --- /dev/null +++ b/windows/deploy/what-does-usmt-migrate-usmt-win7-usmt-win8.md @@ -0,0 +1,417 @@ +--- +title: What Does USMT Migrate? (Windows 10) +description: What Does USMT Migrate? +ms.assetid: f613987d-0f17-43fe-9717-6465865ceda7 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# What Does USMT Migrate? + + +## In This Topic + + +- [Default Migration Scripts](#BKMK_DefaultMigScripts) + +- [User Data](#BKMK_3) + +- [Operating-System Components](#BKMK_4) + +- [Supported Applications](#BKMK_2) + +- [What USMT Does Not Migrate](#no) + +## Default Migration Scripts + + +The User State Migration Tool (USMT) 10.0 is designed so that an IT engineer can precisely define migrations using the USMT .xml scripting language. USMT provides the following sample scripts: + +- **MigApp.XML.** Rules to migrate application settings. + +- **MigDocs.XML.** Rules that use the **MigXmlHelper.GenerateDocPatterns** helper function, which can be used to automatically find user documents on a computer without the need to author extensive custom migration .xml files. + +- **MigUser.XML.** Rules to migrate user profiles and user data. + + MigUser.xml gathers everything in a user’s profile and then does a file extension- based search of most of the system for other user data. If data doesn’t match either of these criteria, the data won’t be migrated. For the most part, this file describes a "core" migration. + + The following data does not migrate with MigUser.xml: + + - Files outside the user profile that don’t match one of the file extensions in MigUser.xml. + + - Access control lists (ACLs) for folders outside the user profile. + +## User Data + + +This section describes the user data that USMT migrates by default, using the MigUser.xml file. It also defines how to migrate ACLs. + +- **Folders from each user profile.** When you specify the MigUser.xml file, USMT migrates everything in a user’s profiles including the following: + + My Documents, My Video, My Music, My Pictures, desktop files, Start menu, Quick Launch settings, and Favorites. + +- **Folders from the All Users and Public profiles.** When you specify the MigUser.xml file, USMT also migrates the following from the **All Users** profile in Windows® XP, or the **Public** profile in Windows Vista, Windows 7, or Windows 8: + + - Shared Documents + + - Shared Video + + - Shared Music + + - Shared desktop files + + - Shared Pictures + + - Shared Start menu + + - Shared Favorites + +- **File types.** When you specify the MigUser.xml file, the ScanState tool searches the fixed drives, collects and then migrates files with any of the following file extensions: + + **.accdb, .ch3, .csv, .dif, .doc\*, .dot\*, .dqy, .iqy, .mcw, .mdb\*, .mpp, .one\*, .oqy, .or6, .pot\*, .ppa, .pps\*, .ppt\*, .pre, .pst, .pub, .qdf, .qel, .qph, .qsd, .rqy, .rtf, .scd, .sh3, .slk, .txt, .vl\*, .vsd, .wk\*, .wpd, .wps, .wq1, .wri, .xl\*, .xla, .xlb, .xls\*.** + + **Note**   + The asterisk (\*) stands for zero or more characters. + +   + +- **Access control lists.** USMT migrates ACLs for specified files and folders from computers running both Windows® XP and Windows Vista. For example, if you migrate a file named File1.txt that is read-only for User1 and read/write for User2, these settings will still apply on the destination computer after the migration. + +**Important**   +To migrate ACLs, you must specify the directory to migrate in the MigUser.xml file. Using file patterns like \*.doc will not migrate a directory. The source ACL information is migrated only when you explicitly specify the directory. For example, `c:\test docs`. + +  + +## Operating-System Components + + +USMT migrates operating-system components to a destination computer from computers running Windows 7 and Windows 8 + +The following components are migrated by default using the manifest files: + +- Accessibility settings + +- Address book + +- Command-prompt settings + +- \*Desktop wallpaper + +- EFS files + +- Favorites + +- Folder options + +- Fonts + +- Group membership. USMT migrates users’ group settings. The groups to which a user belongs can be found by right-clicking **My Computer** on the Start menu and then clicking **Manage**. + +- \*Windows Internet Explorer® settings + +- Microsoft® Open Database Connectivity (ODBC) settings + +- Mouse and keyboard settings + +- Network drive mapping + +- \*Network printer mapping + +- \*Offline files + +- \*Phone and modem options + +- RAS connection and phone book (.pbk) files + +- \*Regional settings + +- Remote Access + +- \*Taskbar settings + +- User personal certificates (all) + +- Windows Mail. + +- \*Windows Media Player + +- Windows Rights Management + +\* These settings are not available for an offline migration. For more information, see [Offline Migration Reference](offline-migration-reference.md). + +**Important**   +This list may not be complete. There may be additional components that are migrated. + +  + +**Note**   +Some settings, such as fonts, are not applied by the LoadState tool until after the destination computer has been restarted. For this reason, restart the destination computer after you run the LoadState tool. + +  + +## Supported Applications + + +Although it is not required for all applications, it is good practice to install all applications on the destination computer before restoring the user state. Installing applications before migrating settings helps to ensure that the migrated settings are not overwritten by the application installers. + +**Note**   +The versions of installed applications must match on the source and destination computers. USMT does not support migrating the settings of an earlier version of an application to a later version, except for Microsoft Office. + +  + +**Note**   +USMT migrates only the settings that have been used or modified by the user. If there is an application setting on the source computer that was not touched by the user, the setting may not migrate. + +  + +When you specify the MigApp.xml file, USMT migrates the settings for the following applications: + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ProductVersion

Adobe Acrobat Reader

9

AOL Instant Messenger

6.8

Adobe Creative Suite

2

Adobe Photoshop CS

8, 9

Adobe ImageReady CS

Apple iTunes

6, 7, 8

Apple QuickTime Player

5, 6, 7

Apple Safari

3.1.2

Google Chrome

beta

Google Picasa

3

Google Talk

beta

IBM Lotus 1-2-3

9

IBM Lotus Notes

6,7, 8

IBM Lotus Organizer

5

IBM Lotus WordPro

9.9

Intuit Quicken Deluxe

2009

Money Plus Business

2008

Money Plus Home

2008

Mozilla Firefox

3

Microsoft Office

2003, 2007, 2010

Microsoft Office Access®

2003, 2007, 2010

Microsoft Office Excel®

2003, 2007, 2010

Microsoft Office FrontPage®

2003, 2007, 2010

Microsoft Office OneNote®

2003, 2007, 2010

Microsoft Office Outlook®

2003, 2007, 2010

Microsoft Office PowerPoint®

2003, 2007, 2010

Microsoft Office Publisher

2003, 2007, 2010

Microsoft Office Word

2003, 2007, 2010

Opera Software Opera

9.5

Microsoft Outlook Express

(only mailbox file)

Microsoft Project

2003, 2007

Microsoft Office Visio®

2003, 2007

RealPlayer Basic

11

Sage Peachtree

2009

Skype

3.8

Windows Live Mail

12, 14

Windows Live Messenger

8.5, 14

Windows Live MovieMaker

14

Windows Live Photo Gallery

12, 14

Windows Live Writer

12, 14

Windows Mail

(Windows 7 and 8)

Microsoft Works

9

Yahoo Messenger

9

Microsoft Zune™ Software

3

+ +  + +## What USMT Does Not Migrate + + +The following is a list of the settings that USMT does not migrate. If you are having a problem that is not listed here, see [Common Issues](common-issues-usmt-win8.md). + +### Application Settings + +USMT does not migrate the following application settings: + +- Settings from earlier versions of an application. The versions of each application must match on the source and destination computers. USMT does not support migrating the settings of an earlier version of an application to a later version, except for Microsoft Office. USMT can migrate from an earlier version of Microsoft Office to a later version. + +- Application settings and some operating-system settings when a local account is created. For example, if you run /lac to create a local account on the destination computer, USMT will migrate the user data, but only some of the operating-system settings, such as wallpaper and screensaver settings, and no application settings will migrate. + +- Microsoft Project settings, when migrating from Office 2003 to Office 2007 system. + +- ICQ Pro settings, if ICQ Pro is installed in a different location on the destination computer. To successfully migrate the settings of ICQ Pro, you must install ICQ Pro in the same location on the destination computer as it was on the source computer. Otherwise, after you run the LoadState tool, the application will not start. You may encounter problems when: + + - You change the default installation location on 32-bit destination computers. + + - You attempt to migrate from a 32-bit computer to a 64-bit computer. This is because the ICQ Pro default installation directory is different on the two types of computers. When you install ICQ Pro on a 32-bit computer, the default location is "C:\\Program Files\\...". The ICQ Pro default installation directory on an x64-based computer, however, is “C:\\Program Files (x86)\\...”. + +### Operating-System Settings + +USMT does not migrate the following operating-system settings. + +- Local printers, hardware-related settings, drivers, passwords, application binary files, synchronization files, DLL files, or other executable files. + +- Permissions for shared folders. After migration, you must manually re-share any folders that were shared on the source computer. + +- Files and settings migrating between operating systems with different languages. The operating system of the source computer must match the language of the operating system on the destination computer. + +- Customized icons for shortcuts may not migrate. + +- Taskbar settings, when the source computer is running Windows XP. + +You should also note the following: + +- You should run USMT from an account with administrative credentials. Otherwise, some data will not migrate. When running the ScanState and LoadState tools you must run the tools in Administrator mode from an account with administrative credentials. If you do not run USMT in Administrator mode, only the user profile that is logged on will be included in the migration. In addition, you must run the ScanState tool on Windows XP from an account with administrative credentials. Otherwise, some operating-system settings will not migrate. To run in Administrator mode, click **Start**, click **All Programs**, click **Accessories**, right-click **Command Prompt**, and then click **Run as administrator**. + +- You can use the /**localonly** option to exclude the data from removable drives and network drives mapped on the source computer. For more information about what is excluded when you specify /**localonly**, see [ScanState Syntax](scanstate-syntax-usmt-win7-usmt-win8.md). + +## Related topics + + +[Plan Your Migration](plan-your-migration-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/windows-10-deployment-scenarios.md b/windows/deploy/windows-10-deployment-scenarios.md new file mode 100644 index 0000000000..40e33316b1 --- /dev/null +++ b/windows/deploy/windows-10-deployment-scenarios.md @@ -0,0 +1,152 @@ +--- +title: Windows 10 deployment scenarios (Windows 10) +description: To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. +ms.assetid: 7A29D546-52CC-482C-8870-8123C7DC04B5 +keywords: ["upgrade, in-place, configuration, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows 10 deployment scenarios + + +**Applies to** + +- Windows 10 + +**In this article** + +- [In-place upgrade](#in_place_upgrade) +- [Dynamic provisioning](#dynamic_provisioning) +- [Traditional deployment](#traditional_deployment) +- [Related topics](#related_topics) + +To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. + +## In-place upgrade + + +For existing computers running Windows 7, Windows 8, or Windows 8.1, the recommended path for organizations deploying Windows 10 leverages the Windows installation program (Setup.exe) to perform an in-place upgrade, which automatically preserves all data, settings, applications, and drivers from the existing operating system version. This requires the least IT effort, because there is no need for any complex deployment infrastructure. + +Although consumer PCs will be upgraded using Windows Update, organizations want more control over the process. This is accomplished by leveraging tools like System Center Configuration Manager or the Microsoft Deployment Toolkit to completely automate the upgrade process through simple task sequences. + +The in-place upgrade process is designed to be extremely reliable, with the ability to automatically roll back to the previous operating system if any issues are encountered during the deployment process, without any IT staff involvement. Rolling back manually can also be done by leveraging the automatically-created recovery information (stored in the Windows.old folder), in case any issues are encountered after the upgrade is finished. The upgrade process is also typically faster than traditional deployments, because applications do not need to be reinstalled as part of the process. + +Because existing applications are preserved through the process, the upgrade process uses the standard Windows installation media image (Install.wim); custom images are not needed and cannot be used because the upgrade process is unable to deal with conflicts between apps in the old and new operating system. (For example, Contoso Timecard 1.0 in Windows 7 and Contoso Timecard 3.0 in the Windows 10 image.) + +There are some situations where you cannot use in-place upgrade; in these situations, you can use traditional deployment (wipe-and-load) instead. Examples of these situations include: + +- Changing from Windows 7, Windows 8, or Windows 8.1 x86 to Windows 10 x64. The upgrade process cannot change from a 32-bit operating system to a 64-bit operating system, because of possible complications with installed applications and drivers. +- Changing from legacy BIOS to UEFI booting. Some organizations deployed earlier versions of Windows on UEFI-enabled systems, leveraging the legacy BIOS capabilities of these systems. Because changing from legacy BIOS to UEFI requires changing the hardware configuration, disk configuration, and OS configuration, this is not possible using in-place upgrade. + **Note**  Windows 10 does not require UEFI, so it would work fine to upgrade a system using legacy BIOS emulation. Some Windows 10 features, such as Secure Boot, would not be available after doing this. + +   + +- Windows To Go and Boot from VHD installations. The upgrade process is unable to upgrade these installations. Instead, new installations would need to be performed. +- Devices that use third-party disk encryption software. While devices encrypted with BitLocker can easily be upgraded, more work is necessary for third-party disk encryption tools. Some ISVs will provide instructions on how to integrate their software into the in-place upgrade process (check with your ISV to see if they have instructions), but if not available a traditional deployment would be needed. +- Updating existing images. While it might be tempting to try to upgrade existing Windows 7, Windows 8, or Windows 8.1 images to Windows 10 by installing the old image, upgrading it, and then recapturing the new Windows 10 image, this is not supported – preparing an upgraded OS for imaging (using Sysprep.exe) is not supported and will not work when it detects the upgraded OS. +- Dual-boot and multi-boot systems. The upgrade process is designed for devices running a single OS; if using dual-boot or multi-boot systems with multiple operating systems (not leveraging virtual machines for the second and subsequent operating systems), additional care should be taken. + +## Dynamic provisioning + + +For new PCs, organizations have historically replaced the version of Windows included on the device with their own custom Windows image, because this was often faster and easier than leveraging the preinstalled version. But this is an added expense due to the time and effort required. With the new dynamic provisioning capabilities and tools provided with Windows 10, it is now possible to avoid this. + +The goal of dynamic provisioning is to take a new PC out of the box, turn it on, and transform it into a productive organization device, with minimal time and effort. The types of transformations that are available include: + +- Changing the Windows edition with a single reboot. For organizations that have Software Assurance for Windows, it is easy to change a device from Windows 10 Pro to Windows 10 Enterprise, just by specifying an appropriate product or setup key. When the device restarts, all of the Windows 10 Enterprise features will be enabled. +- Configuring the device with VPN and Wi-Fi connections that may be needed to gain access to organization resources. +- Installation of additional apps needed for organization functions. +- Configuration of common Windows settings to ensure compliance with organization policies. +- Enrollment of the device in a mobile device management (MDM) solution, such as Microsoft Intune. + +There are two primary dynamic provisioning scenarios: + +- **Azure Active Directory (Azure AD) Join with automatic mobile device management (MDM) enrollment.** In this scenario, the organization member just needs to provide their work or school user ID and password; the device can then be automatically joined to Azure Active Directory and enrolled in a mobile device management (MDM) solution with no additional user interaction. Once done, the MDM solution can finish configuring the device as needed. +- **Provisioning package configuration.** Using the [Windows Imaging and Configuration Designer (ICD)](http://go.microsoft.com/fwlink/p/?LinkId=619358), IT administrators can create a self-contained package that contains all of the configuration, settings, and apps that need to be applied to a machine. These packages can then be deployed to new PCs through a variety of means, typically by IT professionals. For more information, see [Configure devices without MDM](../manage/configure-devices-without-mdm.md). + +Either way, these scenarios can be used to enable “choose your own device” (CYOD) programs where the organization’s users can pick their own PC and not be restricted to a small list of approved or certified models (programs that are difficult to implement using traditional deployment scenarios). + +While the initial Windows 10 release includes a variety of provisioning settings and deployment mechanisms, these will continue to be enhanced and extended based on feedback from organizations. As with all Windows features, organizations can submit suggestions for additional features through the Windows Feedback app or through their Microsoft Support contacts. + +## Traditional deployment + + +New versions of Windows have typically been deployed by organizations using an image-based process built on top of tools provided in the [Windows Assessment and Deployment Kit](windows-adk-scenarios-for-it-pros.md), Windows Deployment Services, the [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md), and [System Center Configuration Manager](deploy-windows-81-with-system-center-2012-r2-configuration-manager.md). + +With the release of Windows 10, all of these tools are being updated to fully support Windows 10. Although newer scenarios such as in-place upgrade and dynamic provisioning may reduce the need for traditional deployment capabilities in some organizations, these traditional methods remain important and will continue to be available to organizations that need them. + +The traditional deployment scenario can be divided into different sub-scenarios. These are explained in detail in the following sections, but the following provides a brief summary: + +- **New computer.** A bare-metal deployment of a new machine. +- **Computer refresh.** A reinstall of the same machine (with user-state migration and an optional full Windows Imaging (WIM) image backup). +- **Computer replace.** A replacement of the old machine with a new machine (with user-state migration and an optional full WIM image backup). + +**New computer** + +This scenario occurs when you have a blank machine you need to deploy, or an existing machine you want to wipe and redeploy without needing to preserve any existing data. The setup starts from a boot media, using CD, USB, ISO, or Pre-Boot Execution Environment (PXE). You can also generate a full offline media that includes all the files needed for a client deployment, allowing you to deploy without having to connect to a central deployment share. The target can be a physical computer, a virtual machine, or a Virtual Hard Disk (VHD) running on a physical computer (boot from VHD). + +The deployment process for the new machine scenario is as follows: + +1. Start the setup from boot media (CD, USB, ISO, or PXE). +2. Wipe the hard disk clean and create new volume(s). +3. Install the operating system image. +4. Install other applications (as part of the task sequence). + +After taking these steps, the computer is ready for use. + +**Computer refresh** + +A refresh is sometimes called wipe-and-load. The process is normally initiated in the running operating system. User data and settings are backed up and restored later as part of the deployment process. The target can be the same as for the new computer scenario. + +The deployment process for the wipe-and-load scenario is as follows: + +1. Start the setup on a running operating system. +2. Save the user state locally. +3. Wipe the hard disk clean (except for the folder containing the backup). +4. Install the operating system image. +5. Install other applications. +6. Restore the user state. + +After taking these steps, the machine is ready for use. + +**Computer replace** + +A computer replace is similar to the refresh scenario. However, since we are replacing the machine, we divide this scenario into two main tasks: backup of the old client and bare-metal deployment of the new client. As with the refresh scenario, user data and settings are backed up and restored. + +The deployment process for the replace scenario is as follows: + +1. Save the user state (data and settings) on the server through a backup job on the running operating system. +2. Deploy the new computer as a bare-metal deployment. + +**Note**  In some situations, you can use the replace scenario even if the target is the same machine. For example, you can use replace if you want to modify the disk layout from the master boot record (MBR) to the GUID partition table (GPT), which will allow you to take advantage of the Unified Extensible Firmware Interface (UEFI) functionality. You can also use replace if the disk needs to be repartitioned since user data needs to be transferred off the disk. + +  + +## Related topics + + +[Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) + +[Upgrade to Windows 10 with System Center Configuration Manager](upgrade-to-windows-10-with-system-center-configuraton-manager.md) + +[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=620230) + +[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-81-with-the-microsoft-deployment-toolkit.md) + +[Windows setup technical reference](http://go.microsoft.com/fwlink/p/?LinkId=619357) + +[Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=619358) + +[UEFI firmware](http://go.microsoft.com/fwlink/p/?LinkId=619359) + +  + +  + + + + + diff --git a/windows/deploy/windows-10-deployment-tools-reference.md b/windows/deploy/windows-10-deployment-tools-reference.md new file mode 100644 index 0000000000..d91d4f7f5e --- /dev/null +++ b/windows/deploy/windows-10-deployment-tools-reference.md @@ -0,0 +1,59 @@ +--- +title: Windows 10 deployment tools reference (Windows 10) +description: Learn about the tools available to deploy Windows 10. +ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows 10 deployment tools reference + + +Learn about the tools available to deploy Windows 10. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md)

To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process. In this topic, you will learn about the most commonly used tools for Windows 10 deployment.

[Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md)

The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows.

[Volume Activation Management Tool (VAMT) Technical Reference](volume-activation-management-tool--vamt--overview-vamt-30-win8.md)

The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.

[User State Migration Tool (USMT) Technical Reference](user-state-migration-tool--usmt--technical-reference.md)

The User State Migration Tool (USMT) 10.0 is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.

+ +  + +  + +  + + + + + diff --git a/windows/deploy/windows-10-edition-upgrades.md b/windows/deploy/windows-10-edition-upgrades.md new file mode 100644 index 0000000000..6efadc4e49 --- /dev/null +++ b/windows/deploy/windows-10-edition-upgrades.md @@ -0,0 +1,102 @@ +--- +title: Windows 10 edition upgrade (Windows 10) +description: With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. +ms.assetid: A7642E90-A3E7-4A25-8044-C4E402DC462A +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows 10 edition upgrade + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. For information on what edition of Windows 10 is right for you, see [Compare Windows 10 Editions](http://go.microsoft.com/fwlink/p/?LinkID=690882). + +The following table shows the methods you can use to upgrade editions of Windows 10. + +| | | | | | | | +|---------------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------| +| Method | Home > Pro | Home > Education | Pro > Education | Pro > Enterprise | Ent > Education | Mobile > Mobile Enterprise | +| Using mobile device management (MDM) | ![unsupported](images/crossmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | +| Using a provisioning package | ![unsupported](images/crossmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | +| Using a command-line tool | ![unsupported](images/crossmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | +| Entering a product key manually | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | +| Purchasing a license from the Windows Store | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | ![unsupported](images/crossmark.png) | ![unsupported](images/crossmark.png) | ![unsupported](images/crossmark.png) | ![unsupported](images/crossmark.png) | + +  + +**Note**  Each desktop edition in the table also has an N and KN edition. These editions have had media-related functionality removed. Devices with N or KN editions installed can be upgraded to corresponding N or KN editions using the same methods. + +  + +## Upgrade using mobile device management (MDM) + + +To upgrade desktop editions of Windows 10 using MDM, you'll need to enter the product key for the upgraded edition in the **UpgradeEditionWithProductKey** policy setting of the **WindowsLicensing** CSP. For more info, see [WindowsLicensing CSP](http://go.microsoft.com/fwlink/p/?LinkID=690907). + +To upgrade mobile editions of Windows 10 using MDM, you'll need to enter the product key for the upgraded edition in the **UpgradeEditionWithLicense** policy setting of the **WindowsLicensing** CSP. For more info, see [WindowsLicensing CSP](http://go.microsoft.com/fwlink/p/?LinkID=690907). + +## Upgrade using a provisioning package + + +The Windows Imaging and Configuration Designer (ICD) tool is included in the Windows Assessment and Deployment Kit (ADK) for Windows 10. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +To use Windows ICD to create a provisioning package for upgrading desktop editions of Windows 10, go to **Runtime settings > EditionUpgrade > UpgradeEditionWithProductKey** in the **Available customizations** panel in Windows ICD and enter the product key for the upgraded edition. + +To use Windows ICD to create a provisioning package for upgrading mobile editions of Windows 10, go to **Runtime settings > EditionUpgrade > UpgradeEditionWithLicense** in the **Available customizations** panel in Windows ICD and enter the product key for the upgraded edition. + +For more info on creating and applying a provisioning package using Windows ICD, see [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkID=533700). + +## Upgrade using a command-line tool + + +You can run the changepk.exe command-line tool to upgrade devices to a supported edition of Windows 10: + +`changepk.exe /ProductKey ` + +## Upgrade by manually entering a product key + + +If you are upgrading only a few devices, you may want to enter a product key for the upgraded edition manually. + +**To manually enter a product key** + +1. From either the Start menu or the Start screen, type 'Activation' and click on the Activation shortcut. + +2. Click **Change product key**. + +3. Enter your product key. + +4. Follow the on-screen instructions. + +## Upgrade by purchasing a license from the Windows Store + + +If you do not have a product key, you can upgrade your edition of Windows 10 through the Windows Store. + +**To upgrade through the Windows Store** + +1. From either the Start menu or the Start screen, type 'Activation' and click on the Activation shortcut. + +2. Click **Go to Store**. + +3. Follow the on-screen instructions. + +**Note**  If you are a Windows 10 Home N or Windows 10 Home KN user and have trouble finding your applicable upgrade in the Windows Store, click [here](ms-windows-store://windowsupgrade/). + +  + +  + +  + + + + + diff --git a/windows/deploy/windows-adk-scenarios-for-it-pros.md b/windows/deploy/windows-adk-scenarios-for-it-pros.md new file mode 100644 index 0000000000..8d0fc59ed0 --- /dev/null +++ b/windows/deploy/windows-adk-scenarios-for-it-pros.md @@ -0,0 +1,91 @@ +--- +title: Windows ADK for Windows 10 scenarios for IT Pros (Windows 10) +description: The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. +ms.assetid: FC4EB39B-29BA-4920-87C2-A00D711AE48B +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows ADK for Windows 10 scenarios for IT Pros + + +The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. For an overview of what's new in the Windows ADK for Windows 10, see [What's new in kits and tools](http://msdn.microsoft.com/library/windows/hardware/dn927348.aspx). + +In previous releases of Windows, the Windows ADK docs were published on both TechNet and the MSDN Hardware Dev Center. Starting with the Windows 10 release, Windows ADK documentation is available on the MSDN Hardware Dev Center. For the Windows 10 ADK reference content, see [Desktop manufacturing](http://msdn.microsoft.com/library/windows/hardware/dn938361.aspx). + +Here are some key scenarios that will help you find the content on the MSDN Hardware Dev Center. + +### Create a Windows image using command-line tools + +[DISM](http://msdn.microsoft.com/library/windows/hardware/dn898558.aspx) is used to mount and service Windows images. + +Here are some things you can do with DISM: + +- [Mount an offline image](http://msdn.microsoft.com/library/windows/hardware/dn938321.aspx) +- [Add drivers to an offline image](http://msdn.microsoft.com/library/windows/hardware/dn898469.aspx) +- [Enable or disable Windows features](http://msdn.microsoft.com/library/windows/hardware/dn898567.aspx) +- [Add or remove packages](http://msdn.microsoft.com/library/windows/hardware/dn898481.aspx) +- [Add language packs](http://msdn.microsoft.com/library/windows/hardware/dn898470.aspx) +- [Add Universal Windows apps](http://msdn.microsoft.com/library/windows/hardware/dn898600.aspx) +- [Upgrade the Windows edition](http://msdn.microsoft.com/library/windows/hardware/dn898500.aspx) + +[Sysprep](http://msdn.microsoft.com/library/windows/hardware/dn938335.aspx) prepares a Windows installation for imaging and allows you to capture a customized installation. + +Here are some things you can do with Sysprep: + +- [Generalize a Windows installation](http://msdn.microsoft.com/library/windows/hardware/dn938334.aspx) +- [Customize the default user profile](http://msdn.microsoft.com/library/windows/hardware/dn898521.aspx) +- [Use answer files](http://msdn.microsoft.com/library/windows/hardware/dn938346.aspx) + +[Windows PE (WinPE)](http://msdn.microsoft.com/library/windows/hardware/dn938389.aspx) is a small operating system used to boot a computer that does not have an operating system. You can boot to Windows PE and then install a new operating system, recover data, or repair an existing operating system. + +Here are ways you can create a WinPE image: + +- [Create a bootable USB drive](http://msdn.microsoft.com/library/windows/hardware/dn938386.aspx) +- [Create a Boot CD, DVD, ISO, or VHD](http://msdn.microsoft.com/library/windows/hardware/dn938385.aspx) + +[Windows Recovery Environment (Windows RE)](http://msdn.microsoft.com/library/windows/hardware/dn938364.aspx) is a recovery environment that can repair common operating system problems. + +Here are some things you can do with Windows RE: + +- [Customize Windows RE](http://msdn.microsoft.com/library/windows/hardware/dn898523.aspx) +- [Push-button reset](http://msdn.microsoft.com/library/windows/hardware/dn938307.aspx) + +[Windows System Image Manager (Windows SIM)](http://msdn.microsoft.com/library/windows/hardware/dn922445.aspx) helps you create answer files that change Windows settings and run scripts during installation. + +Here are some things you can do with Windows SIM: + +- [Create answer file](http://msdn.microsoft.com/library/windows/hardware/dn915085.aspx) +- [Add a driver path to an answer file](http://msdn.microsoft.com/library/windows/hardware/dn915062.aspx) +- [Add a package to an answer file](http://msdn.microsoft.com/library/windows/hardware/dn915066.aspx) +- [Add a custom command to an answer file](http://msdn.microsoft.com/library/windows/hardware/dn915058.aspx) + +For a list of settings you can change, see [Unattended Windows Setup Reference](http://msdn.microsoft.com/library/windows/hardware/dn923277.aspx) on the MSDN Hardware Dev Center. + +### Create a Windows image using Windows ICD + +Introduced in Windows 10, [Windows Imaging and Configuration Designer (ICD)](http://msdn.microsoft.com/library/windows/hardware/dn916113.aspx) streamlines the customizing and provisioning of a Windows 10 for desktop editions (Home, Pro, Enterprise, and Education), Windows 10 Mobile, or Windows 10 IoT Core (IoT Core) image. + +Here are some things you can do with Windows ICD: + +- [Build and apply a provisioning package](http://msdn.microsoft.com/library/windows/hardware/dn916107.aspx) +- [Export a provisioning package](http://msdn.microsoft.com/library/windows/hardware/dn916110.aspx) +- [Build and deploy an image for Windows 10 for desktop editions](http://msdn.microsoft.com/library/windows/hardware/dn916105.aspx) + +### IT Pro Windows deployment tools + +There are also a few tools included in the Windows ADK that are specific to IT Pros and this documentation is available on TechNet: + +- [Volume Activation Management Tool (VAMT) Technical Reference](volume-activation-management-tool--vamt--overview-vamt-30-win8.md) +- [User State Migration Tool (USMT) Technical Reference](user-state-migration-tool--usmt--technical-reference.md) + +  + +  + + + + + diff --git a/windows/deploy/windows-deployment-scenarios-and-tools.md b/windows/deploy/windows-deployment-scenarios-and-tools.md new file mode 100644 index 0000000000..5870f6cc45 --- /dev/null +++ b/windows/deploy/windows-deployment-scenarios-and-tools.md @@ -0,0 +1,359 @@ +--- +title: Windows 10 deployment tools (Windows 10) +description: To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process. +ms.assetid: 0d6cee1f-14c4-4b69-b29a-43b0b327b877 +keywords: ["deploy, volume activation, BitLocker, recovery, install, installation, VAMT, MDT, USMT, WDS"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows 10 deployment tools + + +**In this article** + +- [Windows Assessment and Deployment Kit](#sec06) +- [Windows Recovery Environment](#sec07) +- [Windows Deployment Services](#sec08) +- [Microsoft Deployment Toolkit 2013 Update 1](#sec09) +- [Microsoft Security Compliance Manager 2013](#sec10) +- [Microsoft Desktop Optimization Pack](#sec11) +- [Internet Explorer Administration Kit 11](#sec12) +- [Windows Server Update Services](#sec13) +- [Unified Extensible Firmware Interface](#sec14) +- [Related topics](#related_topics) + +To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process. In this topic, you will learn about the most commonly used tools for Windows 10 deployment. + +Microsoft provides many tools, services, and solutions. These tools include Windows Deployment Services (WDS), the Volume Activation Management Tool (VAMT), the User State Migration Tool (USMT), Windows System Image Manager (Windows SIM), Windows Preinstallation Environment (Windows PE), and Windows Recovery Environment (Windows RE). Keep in mind that these are just tools and not a complete solution on their own. It’s when you combine these tools with solutions like [Microsoft Deployment Toolkit (MDT) 2013 Update 1](deploy-windows-81-with-the-microsoft-deployment-toolkit.md) or [Microsoft System Center 2012 R2 Configuration Manager](deploy-windows-81-with-system-center-2012-r2-configuration-manager.md) that you get the complete deployment solution. + +In this topic, you also learn about different types of reference images that you can build, and why reference images are beneficial for most organizations + +## Windows Assessment and Deployment Kit + + +Windows ADK contains core assessment and deployment tools and technologies, including Deployment Image Servicing and Management (DISM), Windows Imaging and Configuration Designer (Windows ICD), Windows System Image Manager (Windows SIM), User State Migration Tool (USMT), Volume Activation Management Tool (VAMT), Windows Preinstallation Environment (Windows PE), Windows Assessment Services, Windows Performance Toolkit (WPT), Application Compatibility Toolkit (ACT), and Microsoft SQL Server 2012 Express. For more details, see [Windows ADK for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526803 ) or [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md). + +![figure 1](images/win-10-adk-select.png) + +Figure 1. The Windows 10 ADK feature selection page. + +### Deployment Image Servicing and Management (DISM) + +DISM is one of the deployment tools included in the Windows ADK and is used for capturing, servicing, and deploying boot images and operating system images. + +DISM services online and offline images. For example, with DISM you can install the Microsoft .NET Framework 3.5.1 in Windows 10 online, which means that you can start the installation in the running operating system, not that you get the software online. The /LimitAccess switch configures DISM to get the files only from a local source: + +``` syntax +Dism.exe /Online /Enable-Feature /FeatureName:NetFX3 /All /Source:D:\Sources\SxS /LimitAccess +``` + +In Windows 10, you can use Windows PowerShell for many of the functions performed by DISM.exe. The equivalent command in Windows 10 using PowerShell is: + +``` syntax +Enable-WindowsOptionalFeature -Online -FeatureName NetFx3 -All +-Source D:\Sources\SxS -LimitAccess +``` + +![figure 2](images/mdt-11-fig05.png) + +Figure 2. Using DISM functions in PowerShell. + +For more information on DISM, see [DISM technical reference](http://go.microsoft.com/fwlink/p/?LinkId=619161). + +### User State Migration Tool (USMT) + +USMT is a backup and restore tool that allows you to migrate user state, data, and settings from one installation to another. Microsoft Deployment Toolkit (MDT) and System Center 2012 R2 Configuration Manager use USMT as part of the operating system deployment process. + +**Note**   +Occasionally, we find that customers are wary of USMT because they believe it requires significant configuration, but, as you will learn below, using USMT is not difficult. If you use MDT and Lite Touch to deploy your machines, the USMT feature is automatically configured and extended so that it is easy to use. With MDT, you do nothing at all and USMT just works. + +  + +USMT includes several command-line tools, the most important of which are ScanState and LoadState: + +- **ScanState.exe.** This performs the user-state backup. + +- **LoadState.exe.** This performs the user-state restore. + +- **UsmtUtils.exe.** This supplements the functionality in ScanState.exe and LoadState.exe. + +In addition to these tools, there are also XML templates that manage which data is migrated. You can customize the templates, or create new ones, to manage the backup process at a high level of detail. USMT uses the following terms for its templates: + +- **Migration templates.** The default templates in USMT. + +- **Custom templates.** Custom templates that you create. + +- **Config template.** An optional template, called Config.xml, which you can use to exclude or include components in a migration without modifying the other standard XML templates. + +![figure 3](images/mdt-11-fig06.png) + +Figure 3. A sample USMT migration file that will exclude .MP3 files on all local drives and include the folder C:\\Data and all its files, including its subdirectories and their files. + +USMT supports capturing data and settings from Windows Vista and later, and restoring the data and settings to Windows 7 and later (including Windows 10 in both cases). It also supports migrating from a 32-bit operating system to a 64-bit operating system, but not the other way around. For example, you can use USMT to migrate from Windows 7 x86 to Windows 10 x64. + +By default USMT migrates many settings, most of which are related to the user profile but also to Control Panel configurations, file types, and more. The default templates that are used in Windows 10 deployments are MigUser.xml and MigApp.xml. These two default templates migrate the following data and settings: + +- Folders from each profile, including those from user profiles as well as shared and public profiles. For example, the My Documents, My Video, My Music, My Pictures, desktop files, Start menu, Quick Launch settings, and Favorites folders are migrated. + +- Specific file types. USMT templates migrate the following file types: .accdb, .ch3, .csv, .dif, .doc\*, .dot\*, .dqy, .iqy, .mcw, .mdb\*, .mpp, .one\*, .oqy, .or6, .pot\*, .ppa, .pps\*, .ppt\*, .pre, .pst, .pub, .qdf, .qel, .qph, .qsd, .rqy, .rtf, .scd, .sh3, .slk, .txt, .vl\*, .vsd, .wk\*, .wpd, .wps, .wq1, .wri, .xl\*, .xla, .xlb, .xls\*. + + **Note**   + The OpenDocument extensions (\*.odt, \*.odp, \*.ods, etc.) that Microsoft Office applications can use are not migrated by default. + +   + +- Operating system component settings + +- Application settings + +These are the settings migrated by the default MigUser.xml and MigApp.xml templates. For more details on what USMT migrates, see [What does USMT migrate?](http://go.microsoft.com/fwlink/p/?LinkId=619227) For more information on the USMT overall, see the [USMT technical reference](http://go.microsoft.com/fwlink/p/?LinkId=619228). + +### Windows Imaging and Configuration Designer + +Windows Imaging and Configuration Designer (Windows ICD) is a tool designed to assist with the creation of provisioning packages that can be used to dynamically configure a Windows device (PCs, tablets, and phones). This is particularly useful for setting up new devices, without the need for re-imaging the device with a custom image. + +![figure 4](images/windows-icd.png) + +Figure 4. Windows Imaging and Configuration Designer. + +For more information, see [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkID=525483). + +### Windows System Image Manager (Windows SIM) + +Windows SIM is an authoring tool for Unattend.xml files. When using MDT and/or Configuration Manager, you don’t need Windows SIM very often because those systems automatically update the Unattend.xml file during the deployment, greatly simplifying the process overall. + +![figure 7](images/mdt-11-fig07.png) + +Figure 5. Windows answer file opened in Windows SIM. + +For more information, see [Windows System Image Manager Technical Reference]( http://go.microsoft.com/fwlink/p/?LinkId=619906). + +### Volume Activation Management Tool (VAMT) + +If you don’t use KMS, you can still manage your MAKs centrally with the Volume Activation Management Tool (VAMT). With this tool, you can install and manage product keys throughout the organization. VAMT also can activate on behalf of clients without Internet access, acting as a MAK proxy. + +![figure 6](images/mdt-11-fig08.png) + +Figure 6. The updated Volume Activation Management Tool. + +VAMT also can be used to create reports, switch from MAK to KMS, manage Active Directory-based activation, and manage Office 2010 and Office 2013 volume activation. VAMT also supports PowerShell (instead of the old command-line tool). For example, if you want to get information from the VAMT database, you can type: + +``` syntax +Get-VamtProduct +``` + +For more information on the VAMT, see [VAMT technical reference](http://go.microsoft.com/fwlink/p/?LinkId=619230). + +### Windows Preinstallation Environment (Windows PE) + +Windows PE is a “Lite” version of Windows 10 and was created to act as a deployment platform. Windows PE replaces the DOS or Linux boot disks that ruled the deployment solutions of the last decade. + +The key thing to know about Windows PE is that, like the operating system, it needs drivers for at least network and storage devices in each PC. Luckily Windows PE includes the same drivers as the full Windows 10 operating system, which means much of your hardware will work out of the box. + +![figure 7](images/mdt-11-fig09.png) + +Figure 7. A machine booted with the Windows ADK default Windows PE boot image. + +For more details on Windows PE, see [Windows PE (WinPE)](http://go.microsoft.com/fwlink/p/?LinkId=619233). + +## Windows Recovery Environment + + +Windows Recovery Environment (Windows RE) is a diagnostics and recovery toolset included in Windows Vista and later operating systems. The latest version of Windows RE is based on Windows PE. You can also extend Windows RE and add your own tools if needed. If a Windows installation fails to start and Windows RE is installed, you will see an automatic failover into Windows RE. + +![figure 8](images/mdt-11-fig10.png) + +Figure 8. A Windows 10 client booted into Windows RE, showing Advanced options. + +For more information on Windows RE, see [Windows Recovery Environment](http://go.microsoft.com/fwlink/p/?LinkId=619236). + +## Windows Deployment Services + + +Windows Deployment Services (WDS) has been updated and improved in several ways starting with Windows 8. Remember that the two main functions you will use are the PXE boot support and multicast. Most of the changes are related to management and increased performance. In Windows Server 2012 R2, WDS also can be used for the Network Unlock feature in BitLocker. + +![figure 9](images/mdt-11-fig11.png) + +Figure 9. Windows Deployment Services using multicast to deploy three machines. + +In Windows Server 2012 R2, [Windows Deployment Services](http://go.microsoft.com/fwlink/p/?LinkId=619245) can be configured for stand-alone mode or for Active Directory integration. In most scenarios, the Active Directory integration mode is the best option. WDS also has the capability to manage drivers; however, driver management through MDT and Configuration Manager is more suitable for deployment due to the flexibility offered by both solutions, so you will use them instead. In WDS, it is possible to pre-stage devices in Active Directory, but here, too, Configuration Manager has that capability built in, and MDT has the ability to use a SQL Server database for pre-staging. In most scenarios, those solutions are better than the built-in pre-staging function as they allow greater control and management. + +### Trivial File Transfer Protocol (TFTP) configuration + +In some cases, you need to modify TFTP Maximum Block Size settings for performance tuning reasons, especially when PXE traffic travels through routers and such. In the previous version of WDS, it was possible to change that, but the method of do so—editing the registry—was not user friendly. In Windows Server 2012, this has become much easier to do as it can be configured as a setting. + +Also, there are a few new features related to TFTP performance: + +- **Scalable buffer management.** Allows buffering an entire file instead of a fixed-size buffer for each client, enabling different sessions to read from the same shared buffer. + +- **Scalable port management.** Provides the capability to service clients with shared UDP port allocation, increasing scalability. + +- **Variable-size transmission window (Variable Windows Extension).** Improves TFTP performance by allowing the client and server to determine the largest workable window size. + +![figure 10](images/mdt-11-fig12.png) + +Figure 10. TFTP changes are now easy to perform. + +## Microsoft Deployment Toolkit 2013 Update 1 + + +MDT 2013 Update 1 is a free deployment solution from Microsoft. It provides end-to-end guidance, best practices, and tools for planning, building, and deploying Windows operating systems. MDT builds on top of the core deployment tools in the Windows ADK by contributing guidance, reducing complexity, and adding critical features for an enterprise-ready deployment solution. + +MDT 2013 Update 1 has two main parts: the first is Lite Touch, which is a stand-alone deployment solution; the second is Zero Touch, which is an extension to System Center 2012 R2 Configuration Manager. + +**Note**   +Lite Touch and Zero Touch are marketing names for the two solutions that MDT 2013 supports, and the naming has nothing to do with automation. You can fully automate the stand-alone MDT 2013 Update 1 solution (Lite Touch), and you can configure the solution integration with Configuration Manager to prompt for information. + +  + +![figure 11](images/mdt-11-fig13.png) + +Figure 11. The Deployment Workbench in MDT 2013, showing a task sequence. + +For more information on MDT 2013 Update 1, see the [Microsoft Deployment Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=618117) resource center. + +## Microsoft Security Compliance Manager 2013 + + +[Microsoft SCM](http://go.microsoft.com/fwlink/p/?LinkId=619246) is a free utility used to create baseline security settings for the Windows client and server environment. The baselines can be exported and then deployed via Group Policy, local policies, MDT, or Configuration Manager. The current version of Security Compliance Manager includes baselines for Windows 8.1 and several earlier versions of Windows, Windows Server, and Internet Explorer. + +![figure 12](images/mdt-11-fig14.png) + +Figure 12. The SCM console showing a baseline configuration for a fictional client's computer security compliance. + +## Microsoft Desktop Optimization Pack + + +MDOP is a suite of technologies available to Software Assurance customers through an additional subscription. + +The following components are included in the MDOP suite: + +- **Microsoft Application Virtualization (App-V).** App-V 5.0 provides an integrated platform, more flexible virtualization, and powerful management for virtualized applications. With the release of App-V 5.0 SP3, you have support to run virtual applications on Windows 10. + +- **Microsoft User Experience Virtualization (UE-V).** UE-V monitors the changes that are made by users to application settings and Windows operating system settings. The user settings are captured and centralized to a settings storage location. These settings can then be applied to the different computers that are accessed by the user, including desktop computers, laptop computers, and virtual desktop infrastructure (VDI) sessions. + +- **Microsoft Advanced Group Policy Management (AGPM).** AGPM enables advanced management of Group Policy objects by providing change control, offline editing, and role-based delegation. + +- **Microsoft Diagnostics and Recovery Toolset (DaRT).** DaRT provides additional tools that extend Windows RE to help you troubleshoot and repair your machines. + +- **Microsoft BitLocker Administration and Monitoring (MBAM).** MBAM is an administrator interface used to manage BitLocker drive encryption. It allows you to configure your enterprise with the correct BitLocker encryption policy options, as well as monitor compliance with these policies. + +For more information on the benefits of an MDOP subscription, see [Microsoft Desktop Optimization Pack](http://go.microsoft.com/fwlink/p/?LinkId=619247). + +## Internet Explorer Administration Kit 11 + + +There has been a version of IEAK for every version of Internet Explorer since 3.0. It gives you the capability to customize Internet Explorer as you would like. The end result of using IEAK is an Internet Explorer package that can be deployed unattended. The wizard creates one .exe file and one .msi file. + +![figure 13](images/mdt-11-fig15.png) + +Figure 13. The User Experience selection screen in IEAK 11. + +To download IEAK 11, see the [Internet Explorer Administration Kit (IEAK) Information and Downloads](http://go.microsoft.com/fwlink/p/?LinkId=619248) page. + +## Windows Server Update Services + + +WSUS is a server role in Windows Server 2012 R2 that enables you to maintain a local repository of Microsoft updates and then distribute them to machines on your network. WSUS offers approval control and reporting of update status in your environment. + +![figure 14](images/mdt-11-fig16.png) + +Figure 14. The Windows Server Update Services console. + +For more information on WSUS, see the [Windows Server Update Services Overview](http://go.microsoft.com/fwlink/p/?LinkId=619249). + +## Unified Extensible Firmware Interface + + +For many years BIOS has been the industry standard for booting a PC. BIOS has served us well, but it is time to replace it with something better. **UEFI** is the replacement for BIOS, so it is important to understand the differences between BIOS and UEFI. In this section, you learn the major differences between the two and how they affect operating system deployment. + +### Introduction to UEFI + +BIOS has been in use for approximately 30 years. Even though it clearly has proven to work, it has some limitations, including: + +- 16-bit code + +- 1 MB address space + +- Poor performance on ROM initialization + +- MBR maximum bootable disk size of 2.2 TB + +As the replacement to BIOS, UEFI has many features that Windows can and will use. + +With UEFI, you can benefit from: + +- **Support for large disks.** UEFI requires a GUID Partition Table (GPT) based disk, which means a limitation of roughly 16.8 million TB in disk size and more than 100 primary disks. + +- **Faster boot time.** UEFI does not use INT 13, and that improves boot time, especially when it comes to resuming from hibernate. + +- **Multicast deployment.** UEFI firmware can use multicast directly when it boots up. In WDS, MDT, and Configuration Manager scenarios, you need to first boot up a normal Windows PE in unicast and then switch into multicast. With UEFI, you can run multicast from the start. + +- **Compatibility with earlier BIOS.** Most of the UEFI implementations include a compatibility support module (CSM) that emulates BIOS. + +- **CPU-independent architecture.** Even if BIOS can run both 32- and 64-bit versions of firmware, all firmware device drivers on BIOS systems must also be 16-bit, and this affects performance. One of the reasons is the limitation in addressable memory, which is only 64 KB with BIOS. + +- **CPU-independent drivers.** On BIOS systems, PCI add-on cards must include a ROM that contains a separate driver for all supported CPU architectures. That is not needed for UEFI because UEFI has the ability to use EFI Byte Code (EBC) images, which allow for a processor-independent device driver environment. + +- **Flexible pre-operating system environment.** UEFI can perform many functions for you. You just need an UEFI application, and you can perform diagnostics and automatic repairs, and call home to report errors. + +- **Secure boot.** Windows 8 and later can use the UEFI firmware validation process, called secure boot, which is defined in UEFI 2.3.1. Using this process, you can ensure that UEFI launches only a verified operating system loader and that malware cannot switch the boot loader. + +### Versions + +UEFI Version 2.3.1B is the version required for Windows 8 and later logo compliance. Later versions have been released to address issues; a small number of machines may need to upgrade their firmware to fully support the UEFI implementation in Windows 8 and later. + +### Hardware support for UEFI + +In regard to UEFI, hardware is divided into four device classes: + +- **Class 0 devices.** This is the UEFI definition for a BIOS, or non-UEFI, device. + +- **Class 1 devices.** These devices behave like a standard BIOS machine, but they run EFI internally. They should be treated as normal BIOS-based machines. Class 1 devices use a CSM to emulate BIOS. These older devices are no longer manufactured. + +- **Class 2 devices.** These devices have the capability to behave as a BIOS- or a UEFI-based machine, and the boot process or the configuration in the firmware/BIOS determines the mode. Class 2 devices use a CSM to emulate BIOS. These are the most common type of devices currently available. + +- **Class 3 devices.** These are UEFI-only devices, which means you must run an operating system that supports only UEFI. Those operating systems include Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Windows 7 is not supported on these class 3 devices. Class 3 devices do not have a CSM to emulate BIOS. + +### Windows support for UEFI + +Microsoft started with support for EFI 1.10 on servers and then added support for UEFI on both clients and servers. + +With UEFI 2.3.1, there are both x86 and x64 versions of UEFI. Windows 10 supports both. However, UEFI does not support cross-platform boot. This means that a computer that has UEFI x64 can run only a 64-bit operating system, and a computer that has UEFI x86 can run only a 32-bit operating system. + +### How UEFI is changing operating system deployment + +There are many things that affect operating system deployment as soon as you run on UEFI/EFI-based hardware. Here are considerations to keep in mind when working with UEFI devices: + +- Switching from BIOS to UEFI in the hardware is easy, but you also need to reinstall the operating system because you need to switch from MBR/NTFS to GPT/FAT32 and NTFS. + +- When you deploy to a Class 2 device, make sure the boot option you select matches the setting you want to have. It is common for old machines to have several boot options for BIOS but only a few for UEFI, or vice versa. + +- When deploying from media, remember the media has to be FAT32 for UEFI, and FAT32 has a file-size limitation of 4GB. + +- UEFI does not support cross-platform booting; therefore, you need to have the correct boot media (32- or 64-bit). + +For more information on UEFI, see the [UEFI firmware](http://go.microsoft.com/fwlink/p/?LinkId=619251) overview and related resources. + +## Related topics + + +[Update Windows 10 images with provisioning packages](update-windows-10-images-with-provisioning-packages.md) + +[Deploy Windows To Go](deploy-windows-to-go-in-your-organization-small-scenario.md) + +[Sideload apps in Windows 10](sideload-apps-in-windows-10.md) + +[Windows ADK for Windows 10 scenarios for IT pros](windows-adk-scenarios-for-it-pros.md) + +  + +  + + + + + diff --git a/windows/deploy/windows-upgrade-and-migration-considerations-win8.md b/windows/deploy/windows-upgrade-and-migration-considerations-win8.md new file mode 100644 index 0000000000..c45599afca --- /dev/null +++ b/windows/deploy/windows-upgrade-and-migration-considerations-win8.md @@ -0,0 +1,85 @@ +--- +title: Windows Upgrade and Migration Considerations (Windows 10) +description: Windows Upgrade and Migration Considerations +ms.assetid: 7f85095c-5922-45e9-b28e-91b1263c7281 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# Windows Upgrade and Migration Considerations + + +Files and application settings can be migrated to new hardware running the Windows® operating system, or they can be maintained during an operating system upgrade on the same computer. This topic summarizes the Microsoft® tools you can use to move files and settings between installations in addition to special considerations for performing an upgrade or migration. + +## Upgrade from a Previous Version of Windows + + +You can upgrade from an earlier version of Windows, which means you can install the new version of Windows and retain your applications, files, and settings as they were in your previous version of Windows. If you decide to perform a custom installation of Windows instead of an upgrade, your applications and settings will not be maintained. Your personal files, and all Windows files and directories, will be moved to a Windows.old folder. You can access your data in the Windows.old folder after Windows Setup is complete. + +## Migrate Files and Settings + + +Migration tools are available to transfer settings from one computer that is running Windows to another. These tools transfer only the program settings, not the programs themselves. + +For more information about application compatibility, see the [Application Compatibility Toolkit (ACT)](http://go.microsoft.com/fwlink/p/?LinkId=131349). + +The User State Migration Tool (USMT) 10.0 is an application intended for administrators who are performing large-scale automated deployments. For deployment to a small number of computers or for individually customized deployments, you can use Windows Easy Transfer. + +### Migrate with Windows Easy Transfer + +Windows Easy Transfer is a software wizard for transferring files and settings from one computer that is running Windows to another. It helps you select what to move to your new computer, enables you to set which migration method to use, and then performs the transfer. When the transfer has completed, Windows Easy Transfer Reports shows you what was transferred and provides a list of programs you might want to install on your new computer, in addition to links to other programs you might want to download. + +With Windows Easy Transfer, files and settings can be transferred using a network share, a USB flash drive (UFD), or the Easy Transfer cable. However, you cannot use a regular universal serial bus (USB) cable to transfer files and settings with Windows Easy Transfer. An Easy Transfer cable can be purchased on the Web, from your computer manufacturer, or at an electronics store. + +### Migrate with the User State Migration Tool + +You can use USMT to automate migration during large deployments of the Windows operating system. USMT uses configurable migration rule (.xml) files to control exactly which user accounts, user files, operating system settings, and application settings are migrated and how they are migrated. You can use USMT for both *side-by-side* migrations, where one piece of hardware is being replaced, or *wipe-and-load* (or *refresh*) migrations, when only the operating system is being upgraded. + +## Upgrade and Migration Considerations + + +Whether you are upgrading or migrating to a new version of Windows, you must be aware of the following issues and considerations: + +### Application Compatibility + +For more information about application compatibility in Windows, see the [Application Compatibility Toolkit (ACT)](http://go.microsoft.com/fwlink/p/?LinkId=131349). + +### Multilingual Windows Image Upgrades + +When performing multilingual Windows upgrades, cross-language upgrades are not supported by USMT. If you are upgrading or migrating an operating system with multiple language packs installed, you can upgrade or migrate only to the system default user interface (UI) language. For example, if English is the default but you have a Spanish language pack installed, you can upgrade or migrate only to English. + +If you are using a single-language Windows image that matches the system default UI language of your multilingual operating system, the migration will work. However, all of the language packs will be removed, and you will have to reinstall them after the upgrade is completed. + +### Errorhandler.cmd + +When upgrading from an earlier version of Windows, if you intend to use Errorhandler.cmd, you must copy this file into the %WINDIR%\\Setup\\Scripts directory on the old installation. This makes sure that if there are errors during the down-level phase of Windows Setup, the commands in Errorhandler.cmd will run. + +### Data Drive ACL Migration + +During the configuration pass of Windows Setup, the root access control list (ACL) on drives formatted for NTFS that do not appear to have an operating system will be changed to the default Windows XP ACL format. The ACLs on these drives are changed to enable authenticated users to modify access on folders and files. + +Changing the ACLs may affect the performance of Windows Setup if the default Windows XP ACLs are applied to a partition with a large amount of data. Because of these performance concerns, you can change the following registry value to disable this feature: + +``` syntax +Key: HKLM\System\Setup +Type: REG_DWORD +Value: "DDACLSys_Disabled" = 1 +``` + +This feature is disabled if this registry key value exists and is configured to 1. + +## Related topics + + +[User State Migration Tool (USMT) Overview Topics](user-state-migration-tool--usmt--overview-topics.md) + +  + +  + + + + + diff --git a/windows/deploy/xml-elements-library-usmt-win7-usmt-win8.md b/windows/deploy/xml-elements-library-usmt-win7-usmt-win8.md new file mode 100644 index 0000000000..2efa36ae87 --- /dev/null +++ b/windows/deploy/xml-elements-library-usmt-win7-usmt-win8.md @@ -0,0 +1,4232 @@ +--- +title: XML Elements Library (Windows 10) +description: XML Elements Library +ms.assetid: f5af0f6d-c3bf-4a4c-a0ca-9db7985f954f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# XML Elements Library + + +## Overview + + +This topic describes the XML elements and helper functions that you can employ to author migration .xml files to use with User State Migration Tool (USMT). It is assumed that you understand the basics of XML. . + +## In This Topic + + +In addition to XML elements and helper functions, this topic describes how to specify encoded locations and locations patterns, functions that are for internal USMT use only, and the version tags that you can use with helper functions. + +- [Elements and helper functions](#Elements) + +- [Appendix](#Appendix) + + - [Specifying locations](#locations) + + - [Internal USMT functions](#InternalUSMTFunctions) + + - [Valid version tags](#Allowed) + +## Elements and Helper Functions + + +The following table describes the XML elements and helper functions you can use with USMT. + + +++++ + + + + + + + + + + + + + + +
Elements A-KElements L-ZHelper functions

[<addObjects>](#addObjects)

+

[<attributes>](#attribute)

+

[<bytes>](#bytes)

+

[<commandLine>](#commandLine)

+

[<component>](#component)

+

[<condition>](#condition)

+

[<conditions>](#conditions)

+

[<content>](#content)

+

[<contentModify>](#contentModify)

+

[<description>](#description)

+

[<destinationCleanup>](#destinationCleanup)

+

[<detect>](#detect)

+

[<detects>](#detects)

+

[<detection>](#detection)

+

[<displayName>](#displayName)

+

[<environment>](#BKMK_environment)

+

[<exclude>](#exclude)

+

[<excludeAttributes>](#excludeAttributes)

+

[<extensions>](#extensions)

+

[<extension>](#extension)

+

[<externalProcess>](#externalProcess)

+

[<icon>](#icon)

+

[<include>](#include)

+

[<includeAttribute>](#includeAttributes)

[<library>](#library)

+

[<location>](#location)

+

[<locationModify>](#locationModify)

+

[<_locDefinition>](#locDefinition)

+

[<manufacturer>](#manufacturer)

+

[<merge>](#merge)

+

[<migration>](#migration)

+

[<namedElements>](#namedElements)

+

[<object>](#object)

+

[<objectSet>](#objectSet)

+

[<path>](#path)

+

[<paths>](#paths)

+

[<pattern>](#pattern)

+

[<processing>](#processing)

+

[<plugin>](#plugin)

+

[<role>](#role)

+

[<rules>](#rules)

+

[<script>](#script)

+

[<text>](#text)

+

[<unconditionalExclude>](#unconditionalExclude)

+

[<variable>](#variable)

+

[<version>](#version)

+

[<windowsObjects>](#windowsObjects)

[<condition> functions](#ConditionFunctions)

+

[<content> functions](#ContentFunctions)

+

[<contentModify> functions](#ContentModifyFunctions)

+

[<include> and <exclude> filter functions](#PersistFilterFunctions)

+

[<locationModify> functions](#LocationModifyFunctions)

+

[<merge> functions](#MergeFunctions)

+

[<script> functions](#ScriptFunctions)

+

[Internal USMT functions](#InternalUSMTFunctions)

+ +  + +## <addObjects> + + +The <addObjects> element emulates the existence of one or more objects on the source computer. The child <object> elements provide the details of the emulated objects. If the content is a <script> element, the result of the invocation will be an array of objects. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child elements:** [<object>](#object) In addition, you must specify [<location>](#location) and [<attribute>](#attribute) as child elements of this <object> element. + +- **Optional child elements:**[<conditions>](#conditions), <condition>, [<script>](#script) + +Syntax: + +<addObjects> + +</addObjects> + +The following example is from the MigApp.xml file: + +``` syntax + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [UpgradeVersion] + DWORD + 0B000000 + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [Lang] + DWORD + 00000000 + + +``` + +## <attributes> + + +The <attributes> element defines the attributes for a registry key or file. + +- **Number of occurrences:** once for each <object> + +- **Parent elements:**[<object>](#object) + +- **Child elements:** none + +Syntax: + +<attributes>*Content*</attributes> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

Content

Yes

The content depends on the type of object specified.

+
    +
  • For files, the content can be a string containing any of the following attributes separated by commas:

    +
      +
    • Archive

    • +
    • Read-only

    • +
    • System

    • +
    • Hidden

    • +
  • +
  • For registry keys, the content can be one of the following types:

    +
      +
    • None

    • +
    • String

    • +
    • ExpandString

    • +
    • Binary

    • +
    • Dword

    • +
    • REG_SZ

    • +
  • +
+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [Lang] + DWORD + 00000000 + +``` + +## <bytes> + + +You must specify the <bytes> element only for files because, if <location> corresponds to a registry key or a directory, then <bytes> will be ignored. + +- **Number of occurrences:** zero or one + +- **Parent elements:**[<object>](#object) + +- **Child elements:** none + +Syntax: + +<bytes string="Yes|No" expand="Yes|No">*Content*</bytes> + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

string

No, default is No

Determines whether Content should be interpreted as a string or as bytes.

expand

No (default = Yes

When the expand parameter is Yes, the content of the <bytes> element is first expanded in the context of the source computer and then interpreted.

Content

Yes

Depends on the value of the string.

+
    +
  • When the string is Yes: the content of the <bytes> element is interpreted as a string.

  • +
  • When the string is No: the content of the <bytes> element is interpreted as bytes. Each two characters represent the hexadecimal value of a byte. For example, "616263" is the representation for the "abc" ANSI string. A complete representation of the UNICODE string "abc" including the string terminator would be: "6100620063000000".

  • +
+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [Lang] + DWORD + 00000000 + +``` + +## <commandLine> + + +You might want to use the <commandLine> element if you want to start or stop a service or application before or after you run the ScanState and LoadState tools. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<externalProcess>](#externalProcess) + +- **Child elements:** none**** + +Syntax: + +<commandLine>*CommandLineString*</commandLine> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

CommandLineString

Yes

A valid command line.

+ +  + +## <component> + + +The <component> element is required in a custom .xml file. This element defines the most basic construct of a migration .xml file. For example, in the MigApp.xml file, "Microsoft® Office 2003" is a component that contains another component, "Microsoft Office Access® 2003". You can use the child elements to define the component. + +A component can be nested inside another component; that is, the <component> element can be a child of the <role> element within the <component> element in two cases: 1) when the parent <component> element is a container or 2) if the child <component> element has the same role as the parent <component> element. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<migration>](#migration), [<role>](#role) + +- **Required child elements:**[<role>](#role), [<displayName>](#displayName) + +- **Optional child elements:**[<manufacturer>](#manufacturer), [<version>](#version), [<description>](#description), [<paths>](#paths), [<icon>](#icon), [<environment>](#BKMK_environment), [<extensions>](#extensions) + +Syntax: + +<component type="System|Application|Device|Documents" context="User|System|UserAndSystem" defaultSupported="TRUE|FALSE|YES|NO" + +hidden="Yes|No"> + +</component> + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

type

Yes

You can use the following to group settings, and define the type of the component.

+
    +
  • System: Operating system settings. All Windows® components are defined by this type.

    +

    When type="System" and defaultSupported="FALSE" the settings will not migrate unless there is an equivalent component in the .xml files that is specified on the LoadState command line. For example, the default MigSys.xml file contains components with type="System" and defaultSupported="FALSE". If you specify this file on the ScanState command line, you must also specify the file on the LoadState command line for the settings to migrate. This is because the LoadState tool must detect an equivalent component. That is, the component must have the same migration urlid of the .xml file and an identical display name. Otherwise, the LoadState tool will not migrate those settings from the store. This is helpful when the source computer is running Windows XP, and you are migrating to both Windows Vista and Windows XP because you can use the same store for both destination computers.

  • +
  • Application: Settings for an application.

  • +
  • Device: Settings for a device.

  • +
  • Documents: Specifies files.

  • +

context

No

+

Default = UserAndSystem

Defines the scope of this parameter; that is, whether to process this component in the context of the specific user, across the entire operating system, or both.

+

The largest possible scope is set by the <component> element. For example, if a <component> element has a context of User and a <rules> element had a context of UserAndSystem, then the <rules> element would act as though it has a context of User. If a <rules> element has a context of System, it would act as though the <rules> element is not there.

+
    +
  • User. Evaluates the component for each user.

  • +
  • System. Evaluates the component only once for the system.

  • +
  • UserAndSystem. Evaluates the component for the entire operating system and each user.

  • +

defaultSupported

No

+

(default = TRUE)

Can be any of TRUE, FALSE, YES or NO. If this parameter is FALSE (or NO), the component will not be migrated unless there is an equivalent component on the destination computer.

+

When type="System" and defaultSupported="FALSE" the settings will not migrate unless there is an equivalent component in the .xml files that are specified on the LoadState command line. For example, the default MigSys.xml file contains components with type="System" and defaultSupported="FALSE". If you specify this file on the ScanState command line, you must also specify the file on the LoadState command line for the settings to migrate. This is because the LoadState tool must detect an equivalent component. That is, the component must have the same migration urlid of the .xml file and an identical display name or the LoadState tool will not migrate those settings from the store. This is helpful when the source computer is running Windows XP, and you are migrating to both Windows Vista and Windows XP because you can use the same store for both destination computers.

hidden

 

This parameter is for internal USMT use only.

+ +  + +For an example, see any of the default migration .xml files. + +## <condition> + + +Although the <condition> element under the <detect>, <objectSet>, and <addObjects> elements is supported, we recommend that you do not use it. This element might be deprecated in future versions of USMT, requiring you to rewrite your scripts. We recommend that, if you need to use a condition within the <objectSet> and <addObjects> elements, you use the more powerful [<conditions>](f#conditions) element, which allows you to formulate complex Boolean statements. + +The <condition> element has a Boolean result. You can use this element to specify the conditions in which the parent element will be evaluated. If any of the present conditions return FALSE, the parent element will not be evaluated. + +- **Number of occurrences:** unlimited. + +- **Parent elements:**[<conditions>](#conditions), <detect>, <objectSet>, <addObjects> + +- **Child elements:** none + +- **Helper functions:** You can use the following [<condition> functions](#ConditionFunctions) with this element: DoesOSMatch, IsNative64Bit(), IsOSLaterThan, IsOSEarlierThan, DoesObjectExist, DoesFileVersionMatch, IsFileVersionAbove, IsFileVersionBelow, IsSystemContext, DoesStringContentEqual, DoesStringContentContain, IsSameObject, IsSameContent, and IsSameStringContent. + +Syntax: + +<condition negation="Yes|No">*ScriptName*</condition> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

negation

No

+

Default = No

"Yes" reverses the True/False value of the condition.

ScriptName

Yes

A script that has been defined within this migration section.

+ +  + +For example, + +In the code sample below, the <condition> elements, A and B, are joined together by the AND operator because they are in separate <conditions> sections. For example: + +``` syntax + + + A + + + B + + +``` + +However, in the code sample below, the <condition> elements, A and B, are joined together by the OR operator because they are in the same <conditions> section. + +``` syntax + + + A + B + + +``` + +### <condition> functions + +The <condition> functions return a Boolean value. You can use these elements in <addObjects> conditions. + +- [Operating system version functions](#OperatingSystemFunctions) + +- [Object content functions](#ObjectContentFunctions) + +### Operating system version functions + +- **DoesOSMatch** + + All matches are case insensitive. + + Syntax: DoesOSMatch("*OSType*","*OSVersion*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

OSType

Yes

The only valid value for this setting is NT. Note, however, that you must set this setting for the <condition> functions to work correctly.

OSVersion

Yes

The major version, minor version, build number and corrected service diskette version separated by periods. For example, 5.0.2600.Service Pack 1. You can also specify partial specification of the version with a pattern. For example, 5.0.*.

+ +   + + For example: + + <condition>MigXmlHelper.DoesOSMatch("NT","\*")</condition> + +- **IsNative64Bit** + + The IsNative64Bit function returns TRUE if the migration process is running as a native 64-bit process; that is, a process running on a 64-bit system without Windows on Windows (WOW). Otherwise, it returns FALSE. + +- **IsOSLaterThan** + + All comparisons are case insensitive. + + Syntax: IsOSLaterThan("*OSType*","*OSVersion*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

OSType

Yes

Can be 9x or NT. If OSType does not match the type of the current operating system, then it returns FALSE. For example, if the current operating system is Windows NT-based and OSType is “9x”, the result will be FALSE.

OSVersion

Yes

The major version, minor version, build number, and corrected service diskette version separated by periods. For example, 5.0.2600.Service Pack 1. You can also specify partial specification of the version but no pattern is allowed. For example, 5.0.

+

The IsOSLaterThan function returns TRUE if the current operating system is later than or equal to OSVersion.

+ +   + + For example: + + <condition negation="Yes">MigXmlHelper.IsOSLaterThan("NT","6.0")</condition> + +- **IsOSEarlierThan** + + All comparisons are case insensitive. + + Syntax: IsOSEarlierThan("*OSType*","*OSVersion*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

OSType

Yes

Can be 9x or NT. If OSType does not match the type of the current operating system, then it returns FALSE. For example, if the current operating system is Windows NT-based and OSType is “9x” the result will be FALSE.

OSVersion

Yes

The major version, minor version, build number, and corrected service diskette version separated by periods. For example, 5.0.2600.Service Pack 1. You can also specify partial specification of the version but no pattern is allowed. For example, 5.0.

+

The IsOSEarlierThan function returns TRUE if the current operating system is earlier than OSVersion.

+ +   + +### Object content functions + +- **DoesObjectExist** + + The DoesObjectExist function returns TRUE if any object exists that matches the location pattern. Otherwise, it returns FALSE. The location pattern is expanded before attempting the enumeration. + + Syntax: DoesObjectExist("*ObjectType*","*EncodedLocationPattern*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

Defines the object type. Can be File or Registry.

EncodedLocationPattern

Yes

The [location pattern](#locations). Environment variables are allowed.

+ +   + + For an example of this element, see the MigApp.xml file. + +- **DoesFileVersionMatch** + + The pattern check is case insensitive. + + Syntax: DoesFileVersionMatch("*EncodedFileLocation*","*VersionTag*","*VersionValue*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

EncodedFileLocation

Yes

The [location pattern](#locations) for the file that will be checked. Environment variables are allowed.

VersionTag

Yes

The [version tag](#Allowed) value that will be checked.

VersionValue

Yes

A string pattern. For example, "Microsoft*".

+ +   + + For example: + + <condition>MigXmlHelper.DoesFileVersionMatch("%MSNMessengerInstPath%\\msnmsgr.exe","ProductVersion","6.\*")</condition> + + <condition>MigXmlHelper.DoesFileVersionMatch("%MSNMessengerInstPath%\\msnmsgr.exe","ProductVersion","7.\*")</condition> + +- **IsFileVersionAbove** + + The IsFileVersionAbove function returns TRUE if the version of the file is higher than *VersionValue*. + + Syntax: IsFileVersionAbove("*EncodedFileLocation*","*VersionTag*","*VersionValue*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

EncodedFileLocation

Yes

The [location pattern](#locations) for the file that will be checked. Environment variables are allowed.

VersionTag

Yes

The [version tag](#Allowed) value that will be checked.

VersionValue

Yes

The value to compare to. You cannot specify a pattern.

+ +   + +- **IsFileVersionBelow** + + Syntax: IsFileVersionBelow("*EncodedFileLocation*","*VersionTag*","*VersionValue*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

EncodedFileLocation

Yes

The [location pattern](#locations) for the file that will be checked. Environment variables are allowed.

VersionTag

Yes

The [version tag](#Allowed) value that will be checked.

VersionValue

Yes

The value to compare to. You cannot specify a pattern.

+ +   + +- **IsSystemContext** + + The IsSystemContext function returns TRUE if the current context is "System". Otherwise, it returns FALSE. + + Syntax: IsSystemContext() + +- **DoesStringContentEqual** + + The DoesStringContentEqual function returns TRUE if the string representation of the given object is identical to `StringContent`. + + Syntax: DoesStringContentEqual("*ObjectType*","*EncodedLocation*","*StringContent*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

Defines the type of object. Can be File or Registry.

EncodedLocationPattern

Yes

The [encoded location](#locations) for the object that will be examined. You can specify environment variables.

StringContent

Yes

The string that will be checked against.

+ +   + + For example: + + ``` syntax + MigXmlHelper.DoesStringContentEqual("File","%USERNAME%","") + ``` + +- **DoesStringContentContain** + + The DoesStringContentContain function returns TRUE if there is at least one occurrence of *StrToFind* in the string representation of the object. + + Syntax: DoesStringContentContain("*ObjectType*","*EncodedLocation*","*StrToFind*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

Defines the type of object. Can be File or Registry.

EncodedLocationPattern

Yes

The [encoded location](#locations) for the object that will be examined. You can specify environment variables.

StrToFind

Yes

A string that will be searched inside the content of the given object.

+ +   + +- **IsSameObject** + + The IsSameObject function returns TRUE if the given encoded locations resolve to the same physical object. Otherwise, it returns FALSE. + + Syntax: IsSameObject("*ObjectType*","*EncodedLocation1*","*EncodedLocation2*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

Defines the type of object. Can be File or Registry.

EncodedLocation1

Yes

The [encoded location](#locations) for the first object. You can specify environment variables.

EncodedLocation2

Yes

The [encoded location](#locations) for the second object. You can specify environment variables.

+ +   + + For example: + + ``` syntax + + MigXmlHelper.IsSameObject("File","%CSIDL_FAVORITES%","%CSIDL_COMMON_FAVORITES%") + %CSIDL_FAVORITES%\* [*] + + ``` + +- **IsSameContent** + + The IsSameContent function returns TRUE if the given objects have the same content. Otherwise, it returns FALSE. The content will be compared byte by byte. + + Syntax: IsSameContent("*ObjectType1*","*EncodedLocation1*","*ObjectType2*","*EncodedLocation2*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType1

Yes

Defines the type of the first object. Can be File or Registry.

EncodedLocation1

Yes

The [encoded location](#locations) for the first object. You can specify environment variables.

ObjectType2

Yes

Defines the type of the second object. Can be File or Registry.

EncodedLocation2

Yes

The [encoded location](#locations) for the second object. You can specify environment variables.

+ +   + +- **IsSameStringContent** + + The IsSameStringContent function returns TRUE if the given objects have the same content. Otherwise, it returns FALSE. The content will be interpreted as a string. + + Syntax: IsSameStringContent("*ObjectType1*","*EncodedLocation1*","*ObjectType2*","*EncodedLocation2*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType1

Yes

Defines the type of the first object. Can be File or Registry.

EncodedLocation1

Yes

The [encoded location](#locations) for the first object. You can specify environment variables.

ObjectType2

Yes

Defines the type of the second object. Can be File or Registry.

EncodedLocation2

Yes

The [encoded location](#locations) for the second object. You can specify environment variables.

+ +   + +## <conditions> + + +The <conditions> element returns a Boolean result that is used to specify the conditions in which the parent element is evaluated. USMT evaluates the child elements, and then joins their results using the operators AND or OR according to the **operation** parameter. + +- **Number of occurrences:** Unlimited inside another <conditions> element. Limited to one occurrence in [<detection>](#detection), [<rules>](#rules), [<addObjects>](#addObjects), and [<objectSet>](#objectSet) + +- **Parent elements:**[<conditions>](#conditions), [<detection>](#detection), [<environment>](#BKMK_environment), [<rules>](#rules), [<addObjects>](#addObjects), and [<objectSet>](#objectSet) + +- **Child elements:**[<conditions>](#conditions), [<condition>](#condition) + +Syntax: + +<conditions operation="AND|OR"> + +</conditions> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

operation

No, default = AND

Defines the Boolean operation that is performed on the results that are obtained from the child elements.

+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + + MigXmlHelper.IsNative64Bit() + + + HKLM\Software + + +``` + +## <content> + + +You can use the <content> element to specify a list of object patterns to obtain an object set from the source computer. Each <objectSet> within a <content> element is evaluated. For each resulting object pattern list, the objects that match it are enumerated and their content is filtered by the filter parameter. The resulting string array is the output for the <content> element. The filter script returns an array of locations. The parent <objectSet> element can contain multiple child <content> elements. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<objectSet>](#objectSet) + +- **Child elements:**[<objectSet>](#objectSet) + +- **Helper functions:** You can use the following [<content> functions](#ContentFunctions) with this element: ExtractSingleFile, ExtractMultipleFiles, and ExtractDirectory. + +Syntax: + +<content filter="*ScriptInvocation*"> + +</content> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

filter

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script is called for each object that is enumerated by the object sets in the <include> rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +### <content> functions + +The following functions generate patterns out of the content of an object. These functions are called for every object that the parent <ObjectSet> element is enumerating. + +- **ExtractSingleFile** + + If the registry value is a MULTI-SZ, only the first segment is processed. The returned pattern is the encoded location for a file that must exist on the system. If the specification is correct in the registry value, but the file does not exist, this function returns NULL. + + Syntax: ExtractSingleFile(*Separators*,*PathHints*) + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Separators

Yes

A list of possible separators that might follow the file specification in this registry value name. For example, if the content is "C:\Windows\Notepad.exe,-2", the separator is a comma. You can specify NULL.

PathHints

Yes

A list of extra paths, separated by colons (;), where the function will look for a file matching the current content. For example, if the content is "Notepad.exe" and the path is the %Path% environment variable, the function will find Notepad.exe in %windir% and returns "c:\Windows [Notepad.exe]". You can specify NULL.

+ +   + + For example: + + ``` syntax + + ``` + + and + + ``` syntax + + ``` + +- **ExtractMultipleFiles** + + The ExtractMultipleFiles function returns multiple patterns, one for each file that is found in the content of the given registry value. If the registry value is a MULTI-SZ, the MULTI-SZ separator is considered a separator by default. therefore, for MULTI-SZ, the <Separators> argument must be NULL. + + The returned patterns are the encoded locations for files that must exist on the source computer. If the specification is correct in the registry value but the file does not exist, it will not be included in the resulting list. + + Syntax: ExtractMultipleFiles(*Separators*,*PathHints*) + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Separators

Yes

A list of possible separators that might follow the file specification in this registry value name. For example, if the content is "C:\Windows\Notepad.exe,-2", the separator is a comma. This parameter must be NULL when processing MULTI-SZ registry values.

PathHints

Yes

A list of extra paths, separated by colons (;), where the function will look for a file matching the current content. For example, if the content is "Notepad.exe" and the path is the %Path% environment variable, the function will find Notepad.exe in %windir% and returns "c:\Windows [Notepad.exe]". You can specify NULL.

+ +   + +- **ExtractDirectory** + + The ExtractDirectory function returns a pattern that is the encoded location for a directory that must exist on the source computer. If the specification is correct in the registry value, but the directory does not exist, this function returns NULL. If it is processing a registry value that is a MULTI-SZ, only the first segment will be processed. + + Syntax: ExtractDirectory(*Separators*,*LevelsToTrim*,*PatternSuffix*) + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Separators

No

A list of possible separators that might follow the file specification in this registry value name. For example, if the content is "C:\Windows\Notepad.exe,-2", the separator is a comma. You must specify NULL when processing MULTI-SZ registry values.

LevelsToTrim

Yes

The number of levels to delete from the end of the directory specification. Use this function to extract a root directory when you have a registry value that points inside that root directory in a known location.

PatternSuffix

Yes

The pattern to add to the directory specification. For example, * [*].

+ +   + + For example: + + ``` syntax + + + + %HklmWowSoftware%\Classes\Software\RealNetworks\Preferences\DT_Common [] + + + + ``` + +## <contentModify> + + +The <contentModify> element modifies the content of an object before it is written to the destination computer. For each <contentModify> element there can be multiple <objectSet> elements. This element returns the new content of the object that is being processed. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child elements:**[<objectSet>](#objectSet) + +- **Helper functions**: You can use the following [<contentModify> functions](#ContentModifyFunctions) with this element: ConvertToDWORD, ConvertToString, ConvertToBinary, KeepExisting, OffsetValue, SetValueByTable, MergeMultiSzContent, and MergeDelimitedContent. + +Syntax: + +<contentModify script="*ScriptInvocation*"> + +</contentModify> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

script

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the include rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +### <contentModify> functions + +The following functions change the content of objects as they are migrated. These functions are called for every object that the parent <ObjectSet> element is enumerating. + +- **ConvertToDWORD** + + The ConvertToDWORD function converts the content of registry values that are enumerated by the parent <ObjectSet> element to a DWORD. For example, ConvertToDWORD will convert the string "1" to the DWORD 0x00000001. If the conversion fails, then the value of DefaultValueOnError will be applied. + + Syntax: ConvertToDWORD(*DefaultValueOnError*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

DefaultValueOnError

No

The value that will be written into the value name if the conversion fails. You can specify NULL, and 0 will be written if the conversion fails.

+ +   + +- **ConvertToString** + + The ConvertToString function converts the content of registry values that match the parent <ObjectSet> element to a string. For example, it will convert the DWORD 0x00000001 to the string "1". If the conversion fails, then the value of DefaultValueOnError will be applied. + + Syntax: ConvertToString(*DefaultValueOnError*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

DefaultValueOnError

No

The value that will be written into the value name if the conversion fails. You can specify NULL, and 0 will be written if the conversion fails.

+ +   + + For example: + + ``` syntax + + + HKCU\Control Panel\Desktop [ScreenSaveUsePassword] + + + ``` + +- **ConvertToBinary** + + The ConvertToBinary function converts the content of registry values that match the parent <ObjectSet> element to a binary type. + + Syntax: ConvertToBinary () + +- **OffsetValue** + + The OffsetValue function adds or subtracts *Value* from the value of the migrated object, and then writes the result back into the registry value on the destination computer. For example, if the migrated object is a DWORD with a value of 14, and the *Value* is "-2", the registry value will be 12 on the destination computer. + + Syntax: OffsetValue(*Value*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Value

Yes

The string representation of a numeric value. It can be positive or negative. For example, OffsetValue(2).

+ +   + +- **SetValueByTable** + + The SetValueByTable function matches the value from the source computer to the source table. If the value is there, the equivalent value in the destination table will be applied. If the value is not there, or if the destination table has no equivalent value, the *DefaultValueOnError* will be applied. + + Syntax: SetValueByTable(*SourceTable*,*DestinationTable*,*DefaultValueOnError*) + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

SourceTable

Yes

A list of values separated by commas that are possible for the source registry values.

DestinationTable

No

A list of translated values separated by commas.

DefaultValueOnError

No

The value that will be applied to the destination computer if either 1) the value for the source computer does not match SourceTable, or 2) DestinationTable has no equivalent value.

+

If DefaultValueOnError is NULL, the value will not be changed on the destination computer.

+ +   + +- **KeepExisting** + + You can use the KeepExisting function when there are conflicts on the destination computer. This function will keep (not overwrite) the specified attributes for the object that is on the destination computer. + + Syntax: KeepExisting("*OptionString*","*OptionString*","*OptionString*",…) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

OptionString

Yes

OptionString can be Security, TimeFields, or FileAttrib:Letter. You can specify one of each type of OptionStrings. Do not specify multiple OptionStrings with the same value. If you do, the right-most option of that type will be kept. For example, do not specify ("FileAttrib:H", "FileAttrib:R") because only Read-only will be evaluated. Instead specify ("FileAttrib:HR") and both Hidden and Read-only attributes will be kept on the destination computer.

+
    +
  • Security. Keeps the destination object's security descriptor if it exists.

  • +
  • TimeFields. Keeps the destination object's time stamps. This parameter is for files only.

  • +
  • FileAttrib:Letter. Keeps the destination object's attribute value, either On or OFF, for the specified set of file attributes. This parameter is for files only. The following are case-insensitive, but USMT will ignore any values that are invalid, repeated, or if there is a space after "FileAttrib:". You can specify any combination of the following attributes:

    +
      +
    • A = Archive

    • +
    • C = Compressed

    • +
    • E = Encrypted

    • +
    • H = Hidden

    • +
    • I = Not Content Indexed

    • +
    • O = Offline

    • +
    • R = Read-Only

    • +
    • S = System

    • +
    • T = Temporary

    • +
  • +
+ +   + +- **MergeMultiSzContent** + + The MergeMultiSzContent function merges the MULTI-SZ content of the registry values that are enumerated by the parent <ObjectSet> element with the content of the equivalent registry values that already exist on the destination computer. `Instruction` and` String` either remove or add content to the resulting MULTI-SZ. Duplicate elements will be removed. + + Syntax: MergeMultiSzContent (*Instruction*,*String*,*Instruction*,*String*,…) + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Instruction

Yes

Can be one of the following:

+
    +
  • Add. Adds the corresponding String to the resulting MULTI-SZ if it is not already there.

  • +
  • Remove. Removes the corresponding String from the resulting MULTI-SZ.

  • +

String

Yes

The string to be added or removed.

+ +   + +- **MergeDelimitedContent** + + The MergeDelimitedContent function merges the content of the registry values that are enumerated by the parent <ObjectSet> element with the content of the equivalent registry values that already exist on the destination computer. The content is considered a list of elements separated by one of the characters in the Delimiters parameter. Duplicate elements will be removed. + + Syntax: MergeDelimitedContent(*Delimiters*,*Instruction*,*String*,…) + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

Delimiters

Yes

A single character that will be used to separate the content of the object that is being processed. The content will be considered as a list of elements that is separated by the Delimiters.

+

For example, "." will separate the string based on a period.

Instruction

Yes

Can one of the following:

+
    +
  • Add. Adds String to the resulting MULTI-SZ if it is not already there.

  • +
  • Remove. Removes String from the resulting MULTI-SZ.

  • +

String

Yes

The string to be added or removed.

+ +   + +## <description> + + +The <description> element defines a description for the component but does not affect the migration. + +- **Number of occurrences:** zero or one + +- **Parent elements:**[<component>](#component) + +- **Child elements:** none + +Syntax: + +<description>*ComponentDescription*</description> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

ComponentDescription

Yes

The description of the component.

+ +  + +The following code sample shows how the <description> element defines the "My custom component" description.: + +``` syntax +My custom component +``` + +## <destinationCleanup> + + +The <destinationCleanup> element deletes objects, such as files and registry keys, from the destination computer before applying the objects from the source computer. This element is evaluated only when the LoadState tool is run on the destination computer. That is, this element is ignored by the ScanState tool. + +**Important**   +Use this option with extreme caution because it will delete objects from the destination computer. + +  + +For each <destinationCleanup> element there can be multiple <objectSet> elements. A common use for this element is if there is a missing registry key on the source computer and you want to ensure that a component is migrated. In this case, you can delete all of the component's registry keys before migrating the source registry keys. This will ensure that if there is a missing key on the source computer, it will also be missing on the destination computer. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Child elements:**[<objectSet>](#objectSet) (Note that the destination computer will delete all child elements.) + +Syntax: + +<destinationCleanup filter=*ScriptInvocation*> + +</destinationCleanup> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

filter

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the include rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +For example: + +``` syntax + + + HKCU\Software\Lotus\123\99.0\DDE Preferences\* [*] + HKCU\Software\Lotus\123\99.0\Find Preferences\* [*] + + +``` + +## <detect> + + +Although the <detect> element is still supported, we do not recommend using it because it may be deprecated in future versions of USMT. In that case, you would have to rewrite your scripts. Instead, we recommend that you use the [<detection>](#detection)**element.** + +You use the <detect> element to determine if the component is present on a system. If all child <detect> elements within a <detect> element resolve to TRUE, then the <detect> element resolves to TRUE. If any child <detect> elements resolve to FALSE, then their parent <detect> element resolves to FALSE. If there is no <detect> element section, then USMT will assume that the component is present. + +For each <detect> element there can be multiple child <condition> or <objectSet> elements, which will be logically joined by an OR operator. If at least one <condition> or <objectSet> element evaluates to TRUE, then the <detect> element evaluates to TRUE. + +- **Number of occurrences:** unlimited + +- **Parent elements:** <detects>, [<namedElements>](#namedElements) + +- **Required child elements:**[<condition>](#condition) + +- **Optional child elements:**[<objectSet>](#objectSet) + +Syntax: + +<detect name="*ID*" context="User|System|UserAndSystem"> + +</detect> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

Yes, when <detect> is a child to <namedElements>

+

No, when <detect> is a child to <detects>

When ID is specified, any child elements are not processed. Instead, any other <detect> elements with the same name that are declared within the <namedElements> element are processed.

context

No

+

(default = UserAndSystem)

Defines the scope of this parameter: whether to process this component in the context of the specific user, across the entire operating system, or both.

+

The largest possible scope is set by the component element. For example, if a <component> element has a context of User, and a <rules> element had a context of UserAndSystem, then the <rules> element would act as though it had a context of User. If the <rules> element had a context of System, it would act as though the <rules> element were not there.

+
    +
  • User. Evaluates the variables for each user.

  • +
  • System. Evaluates the variables only once for the system.

  • +
  • UserAndSystem. Evaluates the variables for the entire operating system and each user.

  • +
+ +  + +For examples, see the examples for [<detection>](#detection). + +## <detects> + + +Although the <detects> element is still supported, we recommend that you do not use it because it may be deprecated in future versions of USMT, which would require you to rewrite your scripts. Instead, we recommend that you use the [<detection>](#detection) element if the parent element is <role> or <namedElements>, and we recommend that you use the <conditions> element if the parent element is <rules>. Using <detection> allows you to more clearly formulate complex Boolean statements. + +The <detects> element is a container for one or more <detect> elements. If all of the child <detect> elements within a <detects> element resolve to TRUE, then <detects> resolves to TRUE. If any of the child <detect> elements resolve to FALSE, then <detects> resolves to FALSE. If you do not want to write the <detects> elements within a component, then you can create the <detects> element under the <namedElements> element, and then refer to it. If there is no <detects> element section, then USMT will assume that the component is present. The results from each <detects> element are joined together by the OR operator to form the rule used to detect the parent element. + +Syntax: + +<detects name="*ID*" context="User|System|UserAndSystem"> + +</detects> + +- **Number of occurrences:** Unlimited. + +- **Parent elements:**[<role>](#role), [<rules>](#rules), [<namedElements>](#namedElements) + +- **Required child elements:** <detect> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

Yes, when <detects> is a child to <namedElements>

+

No, when <detects> is a child to <role> or <rules>

When ID is specified, no child <detect> elements are processed. Instead, any other <detects> elements with the same name that are declared within the <namedElements> element are processed.

context

No

+

(default = UserAndSystem)

Defines the scope of this parameter: whether to process this component in the context of the specific user, across the entire operating system, or both.

+

The largest possible scope is set by the <component element>. For example, if a <component> element has a context of User and a <rules> element had a context of UserAndSystem, then the <rules> element would act as though it had a context of User. If the <rules> element had a context of System, it would act as though the <rules> element were not there.

+
    +
  • User. Evaluates the variables for each user.

  • +
  • System. Evaluates the variables only once for the system.

  • +
  • UserAndSystem. Evaluates the variables for the entire operating system and each user.

  • +
+

The context parameter is ignored for <detects> elements that are inside <rules> elements.

+ +  + +The following example is from the MigApp.xml file. + +``` syntax + + + MigXmlHelper.DoesFileVersionMatch("%Lotus123InstPath%\123w.exe","ProductVersion","9.*") + + + MigXmlHelper.DoesFileVersionMatch("%SmartSuiteInstPath%\smartctr.exe","ProductVersion","99.*") + + +``` + +## <detection> + + +The <detection> element is a container for one <conditions> element. The result of the child <condition> elements, located underneath the <conditions> element, determines the result of this element. For example, if all of the child <conditions> elements within the <detection> element resolve to TRUE, then the <detection> element resolves to TRUE. If any of the child <conditions> elements resolve to FALSE, then the <detection> element resolves to FALSE. + +In addition, the results from each <detection> section within the <role> element are joined together by the OR operator to form the detection rule of the parent element. That is, if one of the <detection> sections resolves to TRUE, then the <role> element will be processed. Otherwise, the <role> element will not be processed. + +Use the <detection> element under the <namedElements> element if you do not want to write it within a component. Then include a matching <detection> section under the <role> element to control whether the component is migrated. If there is not a <detection> section for a component, then USMT will assume that the component is present. + +- **Number of occurrences:** Unlimited. + +- **Parent elements:**[<role>](#role), [<namedElements>](#namedElements) + +- **Child elements:**[<conditions>](#conditions) + +Syntax: + +<detection name="*ID*" context="User|System|UserAndSystem"> + +</detection> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

    +
  • Yes, when <detection> is declared under <namedElements>

  • +
  • Optional, when declared under <role>

  • +

If declared, the content of the <detection> element is ignored and the content of the <detection> element with the same name that is declared in the <namedElements> element will be evaluated.

context

No, default = UserAndSystem

Defines the scope of this parameter: whether to process this component in the context of the specific user, across the entire operating system, or both.

+
    +
  • User. Evaluates the component for each user.

  • +
  • System. Evaluates the component only once for the system.

  • +
  • UserAndSystem. Evaluates the component for the entire operating system and each user.

  • +
+ +  + +For example: + +``` syntax + + + MigXmlHelper.DoesObjectExist("Registry","HKCU\Software\Adobe\Photoshop\8.0") + MigXmlHelper.DoesFileVersionMatch("%PhotoshopSuite8Path%\Photoshop.exe","FileVersion","8.*") + + +``` + +and + +``` syntax + + + + MigXmlHelper.DoesFileVersionMatch("%QuickTime5Exe%","ProductVersion","QuickTime 5.*") + MigXmlHelper.DoesFileVersionMatch("%QuickTime5Exe%","ProductVersion","QuickTime 6.*") + + +``` + +## <displayName> + + +The <displayName> element is a required field within each <component> element. + +- **Number of occurrences:** once for each component + +- **Parent elements:**[<component>](#component) + +- **Child elements:** none + +Syntax: + +<displayName \_locID="*ID*">*ComponentName*</displayName> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

locID

No

This parameter is for internal USMT use. Do not use this parameter.

ComponentName

Yes

The name for the component.

+ +  + +For example: + +``` syntax +Command Prompt settings +``` + +## <environment> + + +The <environment> element is a container for <variable> elements in which you can define variables to use in your .xml file. All environment variables defined this way will be private. That is, they will be available only for their child components and the component in which they were defined. For two example scenarios, see [Examples](#EnvEx). + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<role>](#role), [<component>](#component), [<namedElements>](#namedElements) + +- **Required child elements:**[<variable>](#variable) + +- **Optional child elements:**[conditions](#conditions) + +Syntax: + +<environment name="ID" context="User|System|UserAndSystem"> + +</environment> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

Yes, when <environment> is a child of <namedElements>

+

No, when <environment> is a child of <role> or <component>

When declared as a child of the <role> or <component> elements, if ID is declared, USMT ignores the content of the <environment> element and the content of the <environment> element with the same name declared in the <namedElements> element is processed.

context

No

+

(default = UserAndSystem)

Defines the scope of this parameter: whether to process this component in the context of the specific user, across the entire operating system, or both.

+

The largest possible scope is set by the <component> element. For example, if a <component> element has a context of User and a <rules> element had a context of UserAndSystem, then the <rules> element would act as though it had a context of User. If the <rules> element had a context of System, it would act as though <rules> were not there.

+
    +
  • User. Evaluates the variables for each user.

  • +
  • System. Evaluates the variables only once for the system.

  • +
  • UserAndSystem. Evaluates the variables for the entire operating system and each user.

  • +
+ +  + +## + + +### Example scenario 1 + +In this scenario, you want to generate the location of objects at run time depending on the configuration of the destination computer. For example, you must do this if an application writes data in the directory where it is installed, and users can install the application anywhere on the computer. If the application writes a registry value hklm\\software\\companyname\\install \[path\] and then updates this value with the location where the application is installed, then the only way for you to migrate the required data correctly is to define an environment variable. For example: + +``` syntax + + + + + +``` + +Then you can use an include rule as follows. You can use any of the [<script> functions](#ScriptFunctions) to perform similar tasks. + +``` syntax + + + %INSTALLPATH%\ [*.xyz] + + +``` + +Second, you can also filter registry values that contain data that you need. The following example extracts the first string (before the separator ",") in the value of the registry Hklm\\software\\companyname\\application\\ \[Path\]. + +``` syntax + + + + + + Hklm\software\companyname\application\ [Path] + + + + + +``` + +### Example scenario 2: + +In this scenario, you want to migrate five files named File1.txt, File2.txt, and so on, from %SYSTEMDRIVE%\\data\\userdata\\dir1\\dir2\\. To do this you must have the following <include> rule in an .xml file: + +``` syntax + + + %SYSTEMDRIVE%\data\userdata\dir1\dir2 [File1.txt] + %SYSTEMDRIVE%\data\userdata\dir1\dir2 [File2.txt] + %SYSTEMDRIVE%\data\userdata\dir1\dir2 [File3.txt] + %SYSTEMDRIVE%\data\userdata\dir1\dir2 [File4.txt] + %SYSTEMDRIVE%\data\userdata\dir1\dir2 [File5.txt] + + +``` + +Instead of typing the path five times, you can create a variable for the location as follows: + +``` syntax + + + %SYSTEMDRIVE%\data\userdata\dir1\dir2 + + +``` + +Then, you can specify the variable in an <include> rule as follows: + +``` syntax + + + %DATAPATH% [File1.txt] + %DATAPATH% [File2.txt] + %DATAPATH% [File3.txt] + %DATAPATH% [File4.txt] + %DATAPATH% [File5.txt] + + +``` + +## <exclude> + + +The <exclude> element determines what objects will not be migrated, unless there is a more specific <include> element that migrates an object. If there is an <include> and <exclude> element for the same object, the object will be included. For each <exclude> element there can be multiple child <objectSet> elements. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Child elements:**[<objectSet>](#objectSet) + +- **Helper functions:** You can use the following [<exclude> filter functions](#PersistFilterFunctions) with this element: CompareStringContent, IgnoreIrrelevantLinks, AnswerNo, NeverRestore, and SameRegContent. + +Syntax: + +<exclude filter="*ScriptInvocation*"> + +</exclude> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

filter

No

+

(default = No)

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the include rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +For example, from the MigUser.xml file: + +``` syntax + + + %CSIDL_MYMUSIC%\* [*] + %CSIDL_MYPICTURES%\* [*] + %CSIDL_MYVIDEO%\* [*] + + +``` + +## <excludeAttributes> + + +You can use the <excludeAttributes> element to determine which parameters associated with an object will not be migrated. If there are conflicts between the <includeAttributes> and <excludeAttributes> elements, the most specific pattern determines the patterns that will not be migrated. If an object does not have an <includeAttributes> or <excludeAttributes> element, then all of its parameters will be migrated. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Child elements:**[<objectSet>](#objectSet) + +Syntax: + +<excludeAttributes attributes="Security|TimeFields|Security,TimeFields"> + +</excludeAttributes> + + +++++ + + + + + + + + + + + + + + +
ParameterRequired?Value

attributes

Yes

Specifies the attributes to be excluded. You can specify one of the following, or both separated by quotes; for example, "Security","TimeFields":

+
    +
  • Security can be one of Owner, Group, DACL, or SACL.

  • +
  • TimeFields can be one of CreationTime, LastAccessTime and LastWrittenTime

  • +
+ +  + +Example: + +``` syntax + + + + System Data + + + + + + %SYSTEMDRIVE%\ [*.txt] + + + + + + %SYSTEMDRIVE%\ [a*.txt] + + + + + + %SYSTEMDRIVE%\ [aa.txt] + + + + + + logoff + + + + + + + DOC + PPT + VXD + PST + CPP + + + +``` + +## <extensions> + + +The <extensions> element is a container for one or more <extension> elements. + +- **Number of occurrences:** zero or one + +- **Parent elements:**[<component>](#component) + +- **Required child elements:**[<extension>](#extension) + +Syntax: + +<extensions> + +</extensions> + +## <extension> + + +You can use the <extension> element to specify documents of a specific extension. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<extensions>](#extensions) + +- **Child elements:** none + +Syntax: + +<extension>*FilenameExtension*</extension> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

FilenameExtension

Yes

A file name extension.

+ +  + +For example, if you want to migrate all \*.doc files from the source computer, specifying the following code under the <component> element: + +``` syntax + + doc + +``` + +is the same as specifying the following code below the <rules> element: + +``` syntax + + + + + +``` + +For another example of how to use the <extension> element, see the example for [<excludeAttributes>](#excludeAttributes). + +## <externalProcess> + + +You can use the <externalProcess> element to run a command line during the migration process. For example, you may want to run a command after the LoadState process completes. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child elements:**[<commandLine>](#commandLine) + +Syntax: + +<externalProcess when="pre-scan|scan-success|post-scan|pre-apply|apply-success|post-apply"> + +</externalProcess> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

when

Yes

Indicates when the command line should be run. This value can be one of the following:

+
    +
  • pre-scan before the scanning process begins.

  • +
  • scan-success after the scanning process has finished successfully.

  • +
  • post-scan after the scanning process has finished, whether it was successful or not.

  • +
  • pre-apply before the apply process begins.

  • +
  • apply-success after the apply process has finished successfully.

  • +
  • post-apply after the apply process has finished, whether it was successful or not.

  • +
+ +  + +For an example of how to use the <externalProcess> element, see the example for [<excludeAttributes>](#excludeAttributes). + +## <icon> + + +This is an internal USMT element. Do not use this element. + +## <include> + + +The <include> element determines what to migrate, unless there is a more specific [<exclude>](#exclude) rule. You can specify a script to be more specific to extend the definition of what you want to collect. For each <include> element there can be multiple <objectSet> elements. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child element:**[<objectSet>](#objectSet) + +- **Helper functions:** You can use the following [<include> filter functions](#PersistFilterFunctions) with this element: CompareStringContent, IgnoreIrrelevantLinks, AnswerNo, and NeverRestore. + +Syntax: + +<include filter="*ScriptInvocation*"> + +</include> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

filter

No.

+

If this parameter is not specified, then all patterns that are inside the child <ObjectSet> element will be processed.

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the <include> rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +The following example is from the MigUser.xml file: + +``` syntax + + My Video + + %CSIDL_MYVIDEO% + + + + + MigXmlHelper.DoesObjectExist("File","%CSIDL_MYVIDEO%") + + + + + + %CSIDL_MYVIDEO%\* [*] + + + + + %CSIDL_MYVIDEO% [desktop.ini] + + + + + +``` + +### <include> and <exclude> filter functions + +The following functions return a Boolean value. You can use them to migrate certain objects based on when certain conditions are met. + +- **AnswerNo** + + This filter always returns FALSE. + + Syntax: AnswerNo () + +- **CompareStringContent** + + Syntax: CompareStringContent("*StringContent*","*CompareType*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

StringContent

Yes

The string to check against.

CompareType

Yes

A string. Use one of the following values:

+
    +
  • Equal (case insensitive). The function returns TRUE if the string representation of the current object that is processed by the migration engine is identical to StringContent.

  • +
  • NULL or any other value. The function returns TRUE if the string representation of the current object that is processed by the migration engine does not match StringContent.

  • +
+ +   + +- **IgnoreIrrelevantLinks** + + This filter screens out the .lnk files that point to an object that is not valid on the destination computer. Note that the screening takes place on the destination computer, so all .lnk files will be saved to the store during ScanState. Then they will be screened out when you run the LoadState tool. + + Syntax: IgnoreIrrelevantLinks () + + For example: + + ``` syntax + + + %CSIDL_COMMON_VIDEO%\* [*] + + + ``` + +- **NeverRestore** + + You can use this function to collect the specified objects from the source computer but then not migrate the objects to the destination computer. When run with the ScanState tool, this function evaluates to TRUE. When run with the LoadState tool, this function evaluates to FALSE. You may want to use this function when you want to check an object's value on the destination computer but do not intend to migrate the object to the destination. + + Syntax: NeverRestore() + + In the following example, HKCU\\Control Panel\\International \[Locale\] will be included in the store, but it will not be migrated to the destination computer: + + ``` syntax + + + HKCU\Control Panel\International [Locale] + + + ``` + +## <includeAttributes> + + +You can use the <includeAttributes> element to determine whether certain parameters associated with an object will be migrated along with the object itself. If there are conflicts between the <includeAttributes> and <excludeAttributes> elements, the most specific pattern will determine which parameters will be migrated. If an object does not have an <includeAttributes> or <excludeAttributes> element, then all of its parameters will be migrated. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Child elements:**[<objectSet>](#objectSet) + +Syntax: + +<includeAttributes attributes="Security|TimeFields|Security,TimeFields"> + +</includeAttributes> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

attributes

Yes

Specifies the attributes to be included with a migrated object. You can specify one of the following, or both separated by quotes; for example, "Security","TimeFields":

+
    +
  • Security can be one of the following values:

    +
      +
    • Owner. The owner of the object (SID).

    • +
    • Group. The primary group for the object (SID).

    • +
    • DACL (discretionary access control list). An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object.

    • +
    • SACL (system access control list). An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators.

    • +
  • +
  • TimeFields can be one of the following:

    +
      +
    • CreationTime. Specifies when the file or directory was created.

    • +
    • LastAccessTime. Specifies when the file is last read from, written to, or, in the case of executable files, run.

    • +
    • LastWrittenTime. Specifies when the file is last written to, truncated, or overwritten.

    • +
  • +
+ +  + +For an example of how to use the <includeAttributes> element, see the example for [<excludeAttributes>](#excludeAttributes). + +## <library> + + +This is an internal USMT element. Do not use this element. + +## <location> + + +The <location> element defines the location of the <object> element. + +- **Number of occurrences:** once for each <object> + +- **Parent elements:**[<object>](#object) + +- **Child elements:**[<script>](#script) + +Syntax: + +<location type="*typeID*">*ObjectLocation*</location> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

type

Yes

typeID can be Registry or File.

ObjectLocation

Yes

The location of the object.

+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [UpgradeVersion] + DWORD + 0B000000 + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [Lang] + DWORD + 00000000 + + +``` + +## <locationModify> + + +You can use the <locationModify> element to change the location and name of an object before it is migrated to the destination computer. The <locationModify> element is processed only when the LoadState tool is run on the destination computer. In other words, this element is ignored by the ScanState tool. The <locationModify> element will create the appropriate folder on the destination computer if it does not already exist. + +**Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child element:**[<objectSet>](#objectSet) + +- **Helper functions:** You can use the following [<locationModify> functions](#LocationModifyFunctions) with this element: ExactMove, RelativeMove, and Move. + +Syntax: + +<locationModify script="*ScriptInvocation*"> + +</locationModify> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

script

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the include rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + + %CSIDL_APPDATA%\Microsoft\Office\ [Access10.pip] + + +``` + +### <locationModify> functions + +The following functions change the location of objects as they are migrated when using the <locationModify> element. These functions are called for every object that the parent <ObjectSet> element is enumerating. The <locationModify> element will create the appropriate folder on the destination computer if it does not already exist. + +- **ExactMove** + + The ExactMove function moves all of the objects that are matched by the parent <ObjectSet> element into the given *ObjectEncodedLocation*. You can use this function when you want to move a single file to a different location on the destination computer. If the destination location is a node, all of the matching source objects will be written to the node without any subdirectories. If the destination location is a leaf, the migration engine will migrate all of the matching source objects to the same location. If a collision occurs, the normal collision algorithms will apply. + + Syntax: ExactMove(*ObjectEncodedLocation*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectEncodedLocation

Yes

The destination [location](#locations) for all of the source objects.

+ +   + + For example: + + ``` syntax + + + HKCU\Keyboard Layout\Toggle [] + + + ``` + +- **Move** + + The Move function moves objects to a different location on the destination computer. In addition, this function creates subdirectories that were above the longest CSIDL in the source object name. + + Syntax: Move(*DestinationRoot*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

DestinationRoot

Yes

The location where the source objects will be moved. If needed, this function will create any subdirectories that were above the longest CSIDL in the source object name.

+ +   + +- **RelativeMove** + + You can use the RelativeMove function to collect and move data. Note that you can use environment variables in source and destination roots, but they may be defined differently on the source and destination computers. + + Syntax: RelativeMove(*SourceRoot*,*DestinationRoot*) + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

SourceRoot

Yes

The location from where the objects will be moved. Any source objects that are enumerated by the parent <ObjectSet> element that are not in this location will not be moved.

DestinationRoot

Yes

The location where the source objects will be moved to on the destination computer. If needed, this function will create any subdirectories that were above SourceRoot.

+ +   + + For example: + + ``` syntax + + + %CSIDL_COMMON_FAVORITES%\* [*] + + + + + %CSIDL_COMMON_FAVORITES%\* [*] + + + ``` + +## <\_locDefinition> + + +This is an internal USMT element. Do not use this element. + +## <manufacturer> + + +The <manufacturer> element defines the manufacturer for the component, but does not affect the migration. + +- **Number of occurrences:** zero or one + +- **Parent elements:**[<component>](#component) + +- **Child elements:** none + +Syntax: + +<manufacturer>*Name*</manufacturer> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

Name

Yes

The name of the manufacturer for the component.

+ +  + +## <merge> + + +The <merge> element determines what will happen when a collision occurs. A collision is when an object that is migrated is already present on the destination computer. If you do not specify this element, the default behavior for the registry is for the source object to overwrite the destination object. The default behavior for files is for the source file to be renamed to "OriginalFileName(1).OriginalExtension". This element specifies only what should be done when a collision occurs. It does not include objects. Therefore, for your objects to migrate, you must specify <include> rules along with the <merge> element. When an object is processed and a collision is detected, USMT will select the most specific merge rule and apply it to resolve the conflict. For example, if you have a <merge> rule C:\\\* \[\*\] set to <sourcePriority> and a <merge> rule C:\\subfolder\\\* \[\*\] set to <destinationPriority>, then USMT would use the <destinationPriority> rule because it is the more specific. + +For an example of this element, see [Conflicts and Precedence](conflicts-and-precedence-usmt-win7-usmt-win8.md). + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child element:**[<objectSet>](#objectSet) + +- **Helper functions:** You can use the following [<merge> functions](#MergeFunctions) with this element: SourcePriority, DestinationPriority, FindFilePlaceByPattern, LeafPattern, NewestVersion, HigherValue(), and LowerValue(). + +Syntax: + +<merge script="*ScriptInvocation*"> + +</merge> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

script

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the <include> rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+ +  + +The following example is from the MigUser.xml file: + +``` syntax + + + + %CSIDL_MYVIDEO%\* [*] + + + + + %CSIDL_MYVIDEO% [desktop.ini] + + + +``` + +### <merge> functions + +These functions control how collisions are resolved. + +- **DestinationPriority** + + Specifies to keep the object that is on the destination computer and not migrate the object from the source computer. + + For example: + + ``` syntax + + + HKCU\Software\Microsoft\Office\9.0\PhotoDraw\ [MyPictures] + HKCU\Software\Microsoft\Office\9.0\PhotoDraw\Settings\ [PicturesPath] + HKCU\Software\Microsoft\Office\9.0\PhotoDraw\Settings\ [AdditionalPlugInPath] + + + ``` + +- **FindFilePlaceByPattern** + + The FindFilePlaceByPattern function saves files with an incrementing counter when a collision occurs. It is a string that contains one of each constructs: <F>, <E>, <N> in any order. + + Syntax: FindFilePlaceByPattern(*FilePattern*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

FilePattern

Yes

    +
  • <F> will be replaced by the original file name.

  • +
  • <N> will be replaced by an incrementing counter until there is no collision with the objects on the destination computer.

  • +
  • <E> will be replaced by the original file name extension.

  • +
+

For example, <F> (<N>).<E> will change the source file MyDocument.doc into MyDocument (1).doc on the destination computer.

+ +   + +- **NewestVersion** + + The NewestVersion function will resolve conflicts on the destination computer based on the version of the file. + + Syntax: NewestVersion(*VersionTag*) + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

VersionTag

Yes

The version field that will be checked. This can be "FileVersion" or "ProductVersion". The file with the highest VersionTag version determines which conflicts will be resolved based on the file's version. For example, if Myfile.txt contains FileVersion 1 and the same file on the destination computer contains FileVersion 2, the file on destination will remain.

+ +   + +- **HigherValue()** + + You can use this function for merging registry values. The registry values will be evaluated as numeric values, and the one with the higher value will determine which registry values will be merged. + +- **LowerValue()** + + You can use this function for merging registry values. The registry values will be evaluated as numeric values and the one with the lower value will determine which registry values will be merged. + +- **SourcePriority** + + Specifies to migrate the object from the source computer, and to delete the object that is on the destination computer. + + For example: + + ``` syntax + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Publisher [UpgradeVersion] + %HklmWowSoftware%\Microsoft\Office\11.0\Common\Migration\Publisher [UpgradeVersion] + %HklmWowSoftware%\Microsoft\Office\10.0\Common\Migration\Publisher [UpgradeVersion] + + + ``` + +## <migration> + + +The <migration> element is the single root element of a migration .xml file and is required. Each .xml file must have a unique migration urlid. The urlid of each file that you specify on the command line must be unique. This is because USMT uses the urlid to define the components within the file. For example, you must specify the following at the beginning of each file: <CustomFileName> is the name of the file; for example, "CustomApp". + +- **Number of occurrences:** one + +- **Parent elements:** none + +- **Required child elements:**[<component>](#component) + +- **Optional child elements:**[<library>](#library), [<namedElements>](#namedElements) + +Syntax: + +<migration urlid="*UrlID/*Name"> + +</migration> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

urlid

Yes

UrlID is a string identifier that uniquely identifies this .xml file. This parameter must be a no-colon-name as defined by the XML Namespaces specification. Each migration .xml file must have a unique urlid. If two migration .xml files have the same urlid, the second .xml file that is specified on the command line will not be processed. For more information about XML Namespaces, see [Use XML Namespaces](http://go.microsoft.com/fwlink/p/?LinkId=220938).

Name

No

Although not required, it is good practice to use the name of the .xml file.

+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + +``` + +## MigXMLHelper.FileProperties + + +This filter helper function can be used to filter the migration of files based on file size and date attributes. + + ++++ + + + + + + + + + + + + + + + + + + + + +
Helper FunctionMigXMLHelper.FileProperties (property, operator, valueToCompare)

Property

filesize, dateCreated, dateModified, dateAccessed

Operator

range, neq, lte, lt, eq, gte, gt

valueToCompare

The value we are comparing. For example:

+

Date: “2008/05/15-2005/05/17”, “2008/05/15”

+

Size: A numeral with B, KB, MB, or GB at the end. “5GB”, “1KB-1MB”

+ +  + +``` syntax + +File_size + + + + + + %SYSTEMDRIVE%\DOCS\* [*] + + + + + +``` + +## <namedElements> + + +You can use the **<namedElements>** element to define named elements. You can use these elements in any component throughout your .xml file. For an example of how to use this element, see the MigApp.xml file. + +Syntax: + +<namedElements> + +</namedElements> + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<migration>](#migration) + +- **Child elements:**[<environment>](#BKMK_environment), [<rules>](#rules), [<conditions>](#conditions), [<detection>](#detection), <detects>, <detect> + +For an example of this element, see the MigApp.xml file. + +## <object> + + +The <object> element represents a file or registry key. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<addObjects>](#addObjects) + +- **Required child elements:**[<location>](#location), [<attributes>](#attribute) + +- **Optional child elements:**[<bytes>](#bytes) + +Syntax: + +<object> + +</object> + +The following example is from the MigApp.xml file: + +``` syntax + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [UpgradeVersion] + DWORD + 0B000000 + + + %HklmWowSoftware%\Microsoft\Office\12.0\Common\Migration\Office [Lang] + DWORD + 00000000 + + +``` + +## <objectSet> + + +The <objectSet> element contains a list of object patterns ; for example, file paths, registry locations, and so on. Any child <conditions> elements will be evaluated first. If all child <conditions> elements return FALSE, the <objectSet> element will evaluate to an empty set. For each parent element, there can be only multiple <objectSet> elements. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<variable>](#variable), [<content>](#content), [<include>](#include), [<exclude>](#exclude), [<merge>](#merge), [<contentModify>](#contentModify), [<locationModify>](#locationModify), [<destinationCleanup>](#destinationCleanup), [<includeAttributes>](#includeAttributes), [<excludeAttributes>](#excludeAttributes), [<unconditionalExclude>](#unconditionalExclude), <detect> + +- **Required child elements:** either [<script>](#script) or [<pattern>](#pattern) + +- **Optional child elements:**[<content>](#content), [conditions](#conditions), <condition> + +Syntax: + +<objectSet> + +</objectSet> + +The following example is from the MigUser.xml file: + +``` syntax + + My Music + + %CSIDL_MYMUSIC% + + + + + MigXmlHelper.DoesObjectExist("File","%CSIDL_MYMUSIC%") + + + + + + %CSIDL_MYMUSIC%\* [*] + + + + + %CSIDL_MYMUSIC%\ [desktop.ini] + + + + + +``` + +## <path> + + +This is an internal USMT element. Do not use this element. + +## <paths> + + +This is an internal USMT element. Do not use this element. + +## <pattern> + + +You can use this element to specify multiple objects. You can specify multiple <pattern> elements for each <objectSet> element and they will be combined. If you are specifying files, you may want to use GenerateDrivePatterns with <script> instead. GenerateDrivePatterns is basically the same as a <pattern> rule, without the drive letter specification. For example, the following two lines of code are similar: + +``` syntax +C:\Folder\* [Sample.doc] + +``` + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<objectSet>](#objectSet) + +- **Child elements:** none but *Path* \[*object*\] must be valid. + +Syntax: + +<pattern type="*typeID*">*Path* \[*object*\]</pattern> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

type

Yes

typeID can be Registry, File, or Ini. If typeId is Ini, then you cannot have a space between Path and object. For example, the following is correct when type="Ini":

+

<pattern type="Ini">%WinAmp5InstPath%\Winamp.ini|WinAmp[keeponscreen]</pattern>

Path [object]

Yes

A valid registry or file path pattern, followed by at least one space, followed by brackets [] that contain the object to be migrated.

+
    +
  • Path can contain the asterisk (*) wildcard character or can be an [Recognized Environment Variables](recognized-environment-variables-usmt-win7-usmt-win8.md). You cannot use the question mark as a wildcard character.You can use HKCU and HKLM to refer to HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE respectively.

  • +
  • Object can contain the asterisk (*) wildcard character. However, you cannot use the question mark as a wildcard character. For example:

    +

    C:\Folder\ [*] enumerates all files in C:\Path but no subfolders of C:\Folder.

    +

    C:\Folder\* [*] enumerates all files and subfolders of C:\Folder.

    +

    C:\Folder\ [*.mp3] enumerates all .mp3 files in C:\Folder.

    +

    C:\Folder\ [Sample.doc] enumerates only the Sample.doc file located in C:\Folder.

    +
    +Note   +

    If you are migrating a file that has a square bracket character ([ or ]) in the file name, you must insert the carrot (^) character directly before the bracket for it to be valid. For example, if there is a file named "file].txt", you must specify <pattern type="File">c:\documents\mydocs [file^].txt]</pattern> instead of <pattern type="File">c:\documents\mydocs [file].txt]</pattern>.

    +
    +
    +  +
  • +
+ +  + +For example: + +- To migrate a single registry key: + + ``` syntax + HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Cache [Persistent] + ``` + +- To migrate the EngineeringDrafts folder and any subfolders from the C: drive: + + ``` syntax + C:\EngineeringDrafts\* [*] + ``` + +- To migrate only the EngineeringDrafts folder, excluding any subfolders, from the C: drive: + + [Reroute Files and Settings](reroute-files-and-settings-usmt.md) + +- To migrate the Sample.doc file from C:\\EngineeringDrafts: + + ``` syntax + C:\EngineeringDrafts\ [Sample.doc] + ``` + +- To migrate the Sample.doc file from where ever it exists on the C: drive use pattern in the following way. If multiple files exist with the same name on the C: drive, then all of these files will be migrated. + + ``` syntax + C:\* [Sample.doc] + ``` + +- For more examples of how to use this element, see [Exclude Files and Settings](exclude-files-and-settings-usmt.md), [Reroute Files and Settings](reroute-files-and-settings-usmt.md), [Include Files and Settings](include-files-and-settings-usmt.md), and [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md). + +## <processing> + + +You can use this element to run a script during a specific point within the migration process. Return values are not expected from the scripts that you specify, and if there are return values, they will be ignored. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<rules>](#rules) + +- **Required child element:**[<script>](#script) + +Syntax: + +<processing when="pre-scan|scan-success|post-scan|pre-apply|apply-success|post-apply"> + +</processing> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

when

Yes

Indicates when the script should be run. This value can be one of the following:

+
    +
  • pre-scan means before the scanning process begins.

  • +
  • scan-success means after the scanning process has finished successfully.

  • +
  • post-scan means after the scanning process has finished, whether it was successful or not.

  • +
  • pre-apply means before the apply process begins.

  • +
  • apply-success means after the apply process has finished successfully.

  • +
  • post-apply means after the apply process has finished, whether it was successful or not.

  • +
+ +  + +## <plugin> + + +This is an internal USMT element. Do not use this element. + +## <role> + + +The <role> element is required in a custom .xml file. By specifying the <role> element, you can create a concrete component. The component will be defined by the parameters specified at the <component> level, and with the role that you specify here. + +- **Number of occurrences:** Each <component> can have one, two or three child <role> elements. + +- **Parent elements:**[<component>](#component), [<role>](#role) + +- **Required child elements:**[<rules>](#rules) + +- **Optional child elements:**[<environment>](#BKMK_environment), [<detection>](#detection), [<component>](#component), [<role>](#role), <detects>, <plugin>, + +Syntax: + +<role role="Container|Binaries|Settings|Data"> + +</role> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

role

Yes

Defines the role for the component. Role can be one of:

+
    +
  • Container

  • +
  • Binaries

  • +
  • Settings

  • +
  • Data

  • +
+

You can either:

+
    +
  1. Specify up to three <role> elements within a <component> — one “Binaries” role element, one “Settings” role element and one “Data” role element. These parameters do not change the migration behavior — their only purpose is to help you categorize the settings that you are migrating. You can nest these <role> elements, but each nested element must be of the same role parameter.

  2. +
  3. Specify one “Container” <role> element within a <component> element. In this case, you cannot specify any child <rules> elements, only other <component> elements. And each child <component> element must have the same type as that of parent <component> element. For example:

  4. +
+
<component context="UserAndSystem" type="Application">
+  <displayName _locID="migapp.msoffice2003">Microsoft Office 2003</displayName> 
+  <environment name="GlobalEnv" /> 
+  <role role="Container">
+    <detection name="AnyOffice2003Version" /> 
+    <detection name="FrontPage2003" /> 
+    <!-- 
+ Office 2003 Common Settings 
+  --> 
+    <component context="UserAndSystem" type="Application">
+ +  + +The following example is from the MigUser.xml file. For more examples, see the MigApp.xml file: + +``` syntax + + Start Menu + + %CSIDL_STARTMENU% + + + + + MigXmlHelper.DoesObjectExist("File","%CSIDL_STARTMENU%") + + + + + + %CSIDL_STARTMENU%\* [*] + + + + + %CSIDL_STARTMENU% [desktop.ini] + %CSIDL_STARTMENU%\* [*] + + + + + +``` + +## <rules> + + +The <rules> element is required in a custom .xml file. This element contains rules that will run during the migration if the parent <component> element is selected, unless the child <conditions> element, if present, evaluates to FALSE. For each <rules> element there can be multiple child <rules> elements. + +- **Number of occurrences:** unlimited + +- **Parent elements:**[<role>](#role), [<rules>](#rules), [<namedElements>](#namedElements) + +- **Required child elements:**[<include>](#include) + +- **Optional child elements:**[<rules>](#rules), [<exclude>](#exclude), [<unconditionalExclude>](#unconditionalExclude),[<merge>](#merge), [<contentModify>](#contentModify), [<locationModify>](#locationModify), [<destinationCleanup>](#destinationCleanup), [<addObjects>](#addObjects), [<externalProcess>](#externalProcess), [<processing>](#processing), [<includeAttributes>](#includeAttributes), [<excludeAttributes>](#excludeAttributes), [conditions](#conditions), <detects> + +Syntax: + +<rules name="*ID*" context="User|System|UserAndSystem"> + +</rules> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

Yes, when <rules> is a child to <namedElements>

+

No, when <rules> is a child to any other element

When ID is specified, any child elements are not processed. Instead, any other <rules> elements with the same name that are declared within <namedElements> are processed.

context

No

+

(default = UserAndSystem)

Defines the scope of this parameter — whether to process this component in the context of the specific user, across the entire operating system, or both.

+

The largest possible scope is set by the component element. For example, if a <component> element has a context of User and a <rules> element had a context of UserAndSystem, then the <rules> element would act as though it has a context of User. If <rules> had a context of System, it would act as though <rules> was not there.

+
    +
  • User. Evaluates the variables for each user.

  • +
  • System. Evaluates the variables only once for the system.

  • +
  • UserAndSystem. Evaluates the variables for the entire operating system and each user.

  • +
+ +  + +The following example is from the MigUser.xml file: + +``` syntax + + My Music + + %CSIDL_MYMUSIC% + + + + + MigXmlHelper.DoesObjectExist("File","%CSIDL_MYMUSIC%") + + + + + + %CSIDL_MYMUSIC%\* [*] + + + + + %CSIDL_MYMUSIC%\ [desktop.ini] + + + + + +``` + +## <script> + + +The return value that is required by <script> depends on the parent element. + +**Number of occurrences:** Once for [<variable>](#variable), unlimited for [<objectSet>](#objectSet) and [<processing>](#processing) + +**Parent elements:**[<objectSet>](#objectSet), [<variable>](#variable), [<processing>](#processing) + +**Child elements:** none + +**Syntax and helper functions:** + +- General Syntax: <script>*ScriptWithArguments*</script> + +- You can use [GetStringContent](#ScriptFunctions) when <script> is within <variable>. + + Syntax: <script>MigXmlHelper.GetStringContent("*ObjectType*","*EncodedLocationPattern*", "*ExpandContent*")</script> + + Example:` ` + +- You can use [GenerateUserPatterns](#ScriptFunctions) when <script> is within <objectSet>. + + Syntax: <script>MigXmlHelper.GenerateUserPatterns("*ObjectType*","*EncodedLocationPattern*","*ProcessCurrentUser*")</script> + + Example: `` + +- You can use [GenerateDrivePatterns](#ScriptFunctions) when <script> is within <objectSet>. + + Syntax: <script>MigXmlHelper.GenerateDrivePatterns("*PatternSegment*","*DriveType*")</script> + + Example: `` + +- You can use the [Simple executing scripts](#ScriptFunctions) with <script> elements that are within <processing> elements: AskForLogoff, ConvertToShortFileName, KillExplorer, RemoveEmptyDirectories, RestartExplorer, RegisterFonts, StartService, StopService, SyncSCM. + + Syntax: <script>MigXmlHelper.*ExecutingScript*</script> + + Example: `` + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

ScriptWithArguments

Yes

A script followed by any number of string arguments that are separated by a comma and enclosed in parenthesis. For example, MyScripts.AScript ("Arg1","Arg2").

+

The script will be called for each object that is enumerated by the object sets in the <include> rule. The filter script returns a Boolean value. If the return value is TRUE, the object will be migrated. If it is FALSE, it will not be migrated.

+

The return value that is required by <script> depends on the parent element.

+
    +
  • When used within <variable>, the return value must be a string.

  • +
  • When used within <objectSet>, the return value must be a two-dimensional array of strings.

  • +
  • When used within <location>, the return value must be a valid location that aligns with the type attribute of <location>. For example, if <location type="File">, the child script element, if specified, must be a valid file location.

    +
    +Note   +

    If you are migrating a file that has a bracket character ([ or ]) in the file name, insert the carrot (^) character directly before the bracket for it to be valid. For example, if there is a file named "file].txt", specify <pattern type="File">c:\documents\mydocs [file^].txt]</pattern> instead of <pattern type="File">c:\documents\mydocs [file].txt]</pattern>.

    +
    +
    +  +
  • +
+ +  + +Examples: + +To migrate the Sample.doc file from any drive on the source computer, use <script> as follows. If multiple files exist with the same name, all such files will get migrated. + +``` syntax + +``` + +For more examples of how to use this element, see [Exclude Files and Settings](exclude-files-and-settings-usmt.md), [Reroute Files and Settings](reroute-files-and-settings-usmt.md), and [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md). + +### <script> functions + +You can use the following functions with the <script> element + +- [String and pattern generating functions](#StringGeneratingFunctions) + +- [Simple executing scripts](#Simple) + +### String and pattern generating functions + +These functions return either a string or a pattern. + +- **GetStringContent** + + You can use GetStringContent with <script> elements that are within <variable> elements. If possible, this function returns the string representation of the given object. Otherwise, it returns NULL. For file objects this function always returns NULL. + + Syntax: GetStringContent("*ObjectType*","*EncodedLocationPattern*", "*ExpandContent*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

The type of object. Can be Registry or Ini (for an .ini file).

EncodedLocationPattern

Yes

    +
  • If type of object is Registry, EncodedLocationPattern must be a valid registry path. For example, HKLM\SOFTWARE\MyKey[].

  • +
  • If the type of object is Ini, then EncodedLocationPattern must be in the following format:

    +

    IniFilePath|SectionName[SettingName]

  • +

ExpandContent

No (default=TRUE)

Can be TRUE or FALSE. If FALSE, then the given location will not be expanded before it is returned.

+ +   + + For example: + + ``` syntax + + + + ``` + +- **GenerateDrivePatterns** + + The GenerateDrivePatterns function will iterate all of the available drives and select the ones that match the requested drive type. It will then concatenate the selected drives with the end part of *PatternSegment* to form a full encoded file pattern. For example, if *PatternSegment* is `Path [file.txt]` and DriveType is `Fixed`, then the function will generate `C:\Path [file.txt]`, and other patterns if there are fixed drives other than C:. You cannot specify environment variables with this function. You can use GenerateDrivePatterns with <script> elements that are within [<objectSet>](#objectSet) that are within <include>/<exclude>. + + Syntax: GenerateDrivePatterns("*PatternSegment*","*DriveType*") + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

PatternSegment

Yes

The suffix of an encoded pattern. It will be concatenated with a drive specification, such as "c:\", to form a complete [encoded file pattern](#locations). For example, "* [*.doc]". PatternSegment cannot be an environment variable.

DriveType

Yes

The drive type for which the patterns are to be generated. You can specify one of:

+
    +
  • Fixed

  • +
  • CDROM

  • +
  • Removable

  • +
  • Remote

  • +
+ +   + + See the last component in the MigUser.xml file for an example of this element. + +- **GenerateUserPatterns** + + The function will iterate through all users that are being migrated, excluding the currently processed user if <ProcessCurrentUser> is FALSE, and will expand the specified pattern in the context of each user. For example, if users A, B and C have profiles in C:\\Documents and Settings), by calling `GenerateUserPattens('File','%userprofile% [*.doc]','TRUE')`, the helper function will generate the following three patterns: + + - "C:\\Documents and Settings\\A\\\* \[\*.doc\]" + + - "C:\\Documents and Settings\\B\\\* \[\*.doc\]" + + - "C:\\Documents and Settings\\C\\\* \[\*.doc\]" + + Syntax:GenerateUserPatterns("*ObjectType*","*EncodedLocationPattern*","*ProcessCurrentUser*") + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ObjectType

Yes

Defines the object type. Can be File or Registry.

EncodedLocationPattern

Yes

The [location pattern](#locations). Environment variables are allowed.

ProcessCurrentUser

Yes

Can be TRUE or FALSE. Indicates if the patterns should be generated for the current user.

+ +   + + **Example:** + + If GenerateUserPattens('File','%userprofile% \[\*.doc\]','FALSE') is called while USMT is processing user A, then this function will only generate patterns for users B and C. You can use this helper function to build complex rules. For example, to migrate all .doc files from the source computer — but if user X is not migrated, then do not migrate any of the .doc files from user X’s profile. + + The following is example code for this scenario. The first <rules> element migrates all.doc files on the source computer with the exception of those inside C:\\Documents and Settings. The second <rules> elements will migrate all .doc files from C:\\Documents and Settings with the exception of the .doc files in the profiles of the other users. Because the second <rules> element will be processed in each migrated user context, the end result will be the desired behavior. The end result is the one we expected. + + ``` syntax + + + + + + + + + %ProfilesFolder%\* [*.doc] + + + + + + + %ProfilesFolder%\* [*.doc] + + + + + + + + + ``` + +### MigXmlHelper.GenerateDocPatterns + +This helper function invokes the document finder to scan the system for all files that can be migrated. It can be invoked in either System or User context to focus the scan. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

ScanProgramFiles

No (default = FALSE)

Can be TRUE or FALSE. The ScanProgramFiles parameter determines whether or not the document finder scans the Program Files directory to gather registered file extensions for known applications. For example, when set to TRUE it will discover and migrate .jpg files under the Photoshop directory, if .jpg is a file extension registered to Photoshop.

IncludePatterns

No (default = TRUE)

Can be TRUE or FALSE. TRUE will generate include patterns and can be added under the <include> element. FALSE will generate exclude patterns and can be added under the <exclude> element.

SystemDrive

No (default = FALSE)

Can be TRUE or FALSE. If TRUE, restricts all patterns to the system drive.

+ +  + +``` syntax +  +    MigDocUser +    +      +        +          +            +          +        +        +          +            +          +        +      +    +``` + +### Simple executing scripts + +The following scripts have no return value. You can use the following errors with <script> elements that are within <processing> elements + +- **AskForLogoff()**. Prompts the user to log off at the end of the migration. For example: + + ``` syntax + + + + ``` + +- **ConvertToShortFileName(RegistryEncodedLocation)**. If *RegistryEncodedLocation* is the full path of an existing file, this function will convert the file to its short file name and then it will update the registry value. + +- **KillExplorer()**. Stops Explorer.exe for the current user context. This allows access to certain keys and files that are kept open when Explorer.exe is running. For example: + + ``` syntax + + + + ``` + +- **RegisterFonts(FileEncodedLocation)**. Registers the given font or all of the fonts in the given directory. For example: + + ``` syntax + + + + ``` + +- **RemoveEmptyDirectories (DirectoryEncodedPattern).** Deletes any empty directories that match *DirectoryEncodedPattern* on the destination computer. + +- **RestartExplorer().** Restarts Explorer.exe at the end of the migration. For example: + + ``` syntax + + + + ``` + +- **StartService (ServiceName, OptionalParam1, OptionalParam2,…).** Starts the service identified by *ServiceName. ServiceName* is the subkey in HKLM\\System\\CurrentControlSet\\Services that holds the data for the given service. The optional parameters, if any, will be passed to the StartService API. For more information, see [this Microsoft Web site](http://go.microsoft.com/fwlink/p/?LinkId=267898). + +- **StopService (ServiceName)**. Stops the service that is identified by *ServiceName. ServiceName* is the subkey in HKLM\\System\\CurrentControlSet\\Services that holds the data for the given service. + +- **SyncSCM(ServiceShortName).** Reads the Start type value from the registry (HKLM\\System\\CurrentControlSet\\Services\\ServiceShortName \[Start\]) after it is changed by the migration engine, and then synchronizes Service Control Manager (SCM) with the new value. + +## <text> + + +You can use the <text> element to set a value for any environment variables that are inside one of the migration .xml files. + +- **Number of occurrences:** Once in each [<variable>](#variable) element. + +- **Parent elements:**[<variable>](#variable) + +- **Child elements:** None. + +Syntax: + +<text>*NormalText*</text> + + ++++ + + + + + + + + + + + + +
SettingValue

NormalText

This is interpreted as normal text.

+ +  + +For example: + +``` syntax + + %CSIDL_COMMON_APPDATA%\QuickTime + +``` + +## <unconditionalExclude> + + +The <unconditionalExclude> element excludes the specified files and registry values from the migration, regardless of the other include rules in any of the migration .xml files or in the Config.xml file. The objects declared here will not be migrated because this element takes precedence over all other rules. For example, even if there are explicit <include> rules to include .mp3 files, if you specify to exclude them with this option, then they will not be migrated. + +Use this element if you want to exclude all .mp3 files from the source computer. Or, if you are backing up C:\\UserData using another method, you can exclude the entire folder from the migration. Use this element with caution, however, because if an application needs a file that you exclude, the application may not function properly on the destination computer. + +- **Number of occurrences:** Unlimited. + +- **Parent elements:**[<rules>](#rules) + +- **Child elements:**[<objectSet>](#objectSet) + +Syntax: + +<unconditionalExclude></unconditionalExclude> + +The following .xml file excludes all .mp3 files from migration. For additional examples of how to use this element, see the [Exclude Files and Settings](exclude-files-and-settings-usmt.md). + +``` syntax + + + Test + + + + + + + + + + + +``` + +## <variable> + + +The <variable> element is required in an <environment> element. For each <variable> element there must be one <objectSet>, <script>, or <text> element. The content of the <variable> element assigns a text value to the environment variable. This element has the following three options: + +1. If the <variable> element contains a <text> element, then the value of the variable element will be the value of the <text> element. + +2. If the <variable> element contains a <script> element and the invocation of the script produces a non-null string, then the value of the <variable> element will be the result of the script invocation. + +3. If the <variable> element contains an <objectSet> element and the evaluation of the <objectSet> element produces at least one object pattern, then the value of the first object to match the resulting object pattern will be the value of the variable element. + +- **Number of occurrences:** Unlimited + +- **Parent elements:**[<environment>](#BKMK_environment) + +- **Required child elements:** either [<text>](#text), or [<script>](#script), or [<objectSet>](#objectSet) + +Syntax: + +<variable name="*ID*" remap=TRUE|FALSE> + +</variable> + + +++++ + + + + + + + + + + + + + + + + + + + +
SettingRequired?Value

name

Yes

ID is a string value that is the name used to reference the environment variable. We recommend that ID start with the component’s name to avoid namespace collisions. For example, if your component’s name is MyComponent, and you want a variable that is your component’s install path, you could specify MyComponent.InstallPath.

remap

No, default = FALSE

Specifies whether to evaluate this environment variable as a remapping environment variable. Objects that are located in a path that is underneath this environment variable’s value are automatically moved to where the environment variable points on the destination computer.

+ +  + +The following example is from the MigApp.xml file: + +``` syntax + + + HKLM\Software + + + + + +``` + +## <version> + + +The <version> element defines the version for the component, but does not affect the migration. + +- **Number of occurrences:** zero or one + +- **Parent elements:**[<component>](#component) + +- **Child elements:** none + +Syntax: + +<version>*ComponentVersion*</version> + + +++++ + + + + + + + + + + + + + + +
SettingRequired?Value

ComponentVersion

Yes

The version of the component, which can contain patterns.

+ +  + +For example: + +``` syntax +4.* +``` + +## <windowsObjects> + + +The <windowsObjects> element is for USMT internal use only. Do not use this element. + +## Appendix + + +### Specifying locations + +- **Specifying encoded locations**. The encoded location used in all of the helper functions is an unambiguous string representation for the name of an object. It is composed of the node part, optionally followed by the leaf enclosed in square brackets. This makes a clear distinction between nodes and leaves. + + For example, specify the file C:\\Windows\\Notepad.exe like this: `c:\Windows[Notepad.exe]`. Similarly, specify the directory C:\\Windows\\System32 like this: `c:\Windows\System32`. (Notice the absence of the \[\] construct.) + + Representing the registry is very similar. The default value of a registry key is represented as an empty \[\] construct. For example, the default value for the HKLM\\SOFTWARE\\MyKey registry key will be `HKLM\SOFTWARE\MyKey[]`. + +- **Specifying location patterns**. You specify a location pattern in a way that is similar to how you specify an actual location. The exception is that both the node and leaf part accept patterns. However, a pattern from the node does not extend to the leaf. + + For example, the pattern `c:\Windows\*` will match the Windows directory and all subdirectories. But it will not match any of the files in those directories. To match the files as well, you must specify `c:\Windows\*[*]`. + +### Internal USMT functions + +The following functions are for internal USMT use only. Do not use them in an .xml file. + +- AntiAlias + +- ConvertScreenSaver + +- ConvertShowIEOnDesktop + +- ConvertToOfficeLangID + +- MigrateActiveDesktop + +- MigrateAppearanceUPM + +- MigrateDisplayCS + +- MigrateDisplaySS + +- MigrateIEAutoSearch + +- MigrateMouseUPM + +- MigrateSoundSysTray + +- MigrateTaskBarSS + +- SetPstPathInMapiStruc + +### Valid version tags + +You can use the following version tags with various helper functions: + +- “CompanyName” + +- “FileDescription” + +- “FileVersion” + +- “InternalName” + +- “LegalCopyright” + +- “OriginalFilename” + +- “ProductName” + +- “ProductVersion” + +The following version tags contain values that can be compared: + +- “FileVersion” + +- “ProductVersion” + +## Related topics + + +[USMT XML Reference](usmt-xml-reference-usmt-win7-usmt-win8.md) + +  + +  + + + + + diff --git a/windows/deploy/xml-file-requirements.md b/windows/deploy/xml-file-requirements.md new file mode 100644 index 0000000000..56eea2ef32 --- /dev/null +++ b/windows/deploy/xml-file-requirements.md @@ -0,0 +1,44 @@ +--- +title: XML File Requirements (Windows 10) +description: XML File Requirements +ms.assetid: 4b567b50-c50a-4a4f-8684-151fe3f8275f +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: brianlic-msft +--- + +# XML File Requirements + + +When creating custom .xml files, note the following requirements: + +- **The file must be in Unicode Transformation Format-8 (UTF-8).** You must save the file in this format, and you must specify the following syntax at the beginning of each .xml file: + + ``` syntax + + ``` + +- **The file must have a unique migration urlid**. The urlid of each file that you specify on the command line must be different. If two migration .xml files have the same urlid, the second .xml file that is specified on the command line will not be processed. This is because USMT uses the urlid to define the components within the file. For example, you must specify the following syntax at the beginning of each file: + + ``` syntax + + + ``` + +- **Each component in the file must have a display name in order for it to appear in the Config.xml file.** This is because the Config.xml file defines the components by the display name and the migration urlid. For example, specify the following syntax: + + ``` syntax + My Application + ``` + +For examples of custom .xml files, see [Custom XML Examples](custom-xml-examples-usmt-win7-usmt-win8.md). + +  + +  + + + + + diff --git a/windows/keep-secure/applocker-overview-server.md b/windows/keep-secure/applocker-overview-server.md index f5ac267e88..1e78269e28 100644 --- a/windows/keep-secure/applocker-overview-server.md +++ b/windows/keep-secure/applocker-overview-server.md @@ -56,7 +56,7 @@ AppLocker helps reduce administrative overhead and helps reduce the organization ## New and changed functionality -To find out what's new in AppLocker for Windows 10, see [What's new in AppLocker?](/windows/whats-new/applocker.md) +To find out what's new in AppLocker for Windows 10, see [What's new in AppLocker?](../whats-new/applocker.md) ## When to use AppLocker diff --git a/windows/keep-secure/bitlocker-overview-roletech-overview.md b/windows/keep-secure/bitlocker-overview-roletech-overview.md index 443bf9e1fd..8a317f3e7e 100644 --- a/windows/keep-secure/bitlocker-overview-roletech-overview.md +++ b/windows/keep-secure/bitlocker-overview-roletech-overview.md @@ -44,7 +44,7 @@ There are two additional tools in the Remote Server Administration Tools, which ## New and changed functionality -To find out what's new in BitLocker for Windows 10, see [What's new in BitLocker?](/windows/whats-new/bitlocker.md) +To find out what's new in BitLocker for Windows 10, see [What's new in BitLocker?](../whats-new/bitlocker.md)   diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index c0854da8d7..0daf1333c4 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -11,7 +11,7 @@ author: brianlic-msft # Change history for Keep Windows 10 secure -Updated at 4:24 PM. This topic lists new and updated topics in the [Keep Windows 10 secure](keep-windows-secure.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). +This topic lists new and updated topics in the [Keep Windows 10 secure](keep-windows-secure.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). ## February 2016 diff --git a/windows/keep-secure/credential-guard.md b/windows/keep-secure/credential-guard.md index a10b850fda..fbe2f2083d 100644 --- a/windows/keep-secure/credential-guard.md +++ b/windows/keep-secure/credential-guard.md @@ -44,7 +44,7 @@ Here's a high-level overview on how the LSA is isolated by using virtualization- ## New and changed functionality -To see what was added or changed in Credential Guard, see [What's new in Credential Guard?](/windows/whats-new/credential-guard.md). +To see what was added or changed in Credential Guard, see [What's new in Credential Guard?](../whats-new/credential-guard.md). ## Hardware and software requirements diff --git a/windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md b/windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md index bc072da553..81c566d5e8 100644 --- a/windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md +++ b/windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md @@ -396,7 +396,7 @@ For many organizations, compromising the organization's data resources can cause - **Global Object Access Auditing**. A growing number of organizations are using security auditing to comply with regulatory requirements that govern data security and privacy. But demonstrating that strict controls are being enforced can be extremely difficult. To address this issue, the supported versions of Windows include two **Global Object Access Auditing** policy settings, one for the registry and one for the file system. When you configure these settings, they apply a global system access control SACL on all objects of that class on a system, which cannot be overridden or circumvented. **Important**   - The **Global Object Access Auditing** policy settings must be configured and applied in conjunction with the **Audit File System** and **Audit Registry** audit policy settings in the **Object Access** category. For more information about using the **Global Object Access Auditing** policy settings, see the [Advanced security auditing walkthrough](/windows/keep-secure/advanced-security-auditing-walkthrough.md). + The **Global Object Access Auditing** policy settings must be configured and applied in conjunction with the **Audit File System** and **Audit Registry** audit policy settings in the **Object Access** category. For more information about using the **Global Object Access Auditing** policy settings, see the [Advanced security auditing walkthrough](../keep-secure/advanced-security-auditing-walkthrough.md).   @@ -531,7 +531,7 @@ In addition, a growing number of organizations are being required to store archi Before deploying the audit policy in a production environment, it is critical that you determine the effects of the policy settings that you have configured. -The first step in assessing your audit policy deployment is to create a test environment in a lab and use it to simulate the various use scenarios that you have identified to confirm that the audit settings you have selected are configured correctly and generate the type of results you intend. For more information about setting up a lab environment for testing security audit policy, see the [Advanced security auditing walkthrough](/windows/keep-secure/advanced-security-auditing-walkthrough.md). +The first step in assessing your audit policy deployment is to create a test environment in a lab and use it to simulate the various use scenarios that you have identified to confirm that the audit settings you have selected are configured correctly and generate the type of results you intend. For more information about setting up a lab environment for testing security audit policy, see the [Advanced security auditing walkthrough](../keep-secure/advanced-security-auditing-walkthrough.md). However, unless you are able to run fairly realistic simulations of network usage patterns, a lab setup cannot provide you with accurate information about the volume of audit data that the audit policy settings you selected will generate and how effective your plan for monitoring audit data will be. To provide this type of information, you need to conduct one or more pilot deployments. These pilot deployments could involve: diff --git a/windows/keep-secure/security-auditing-overview-glbl.md b/windows/keep-secure/security-auditing-overview-glbl.md index a99323b04b..ac7d5b52ac 100644 --- a/windows/keep-secure/security-auditing-overview-glbl.md +++ b/windows/keep-secure/security-auditing-overview-glbl.md @@ -22,7 +22,7 @@ Topics in this section are for IT professionals and describes the security audit Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system. As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment. Auditing should identify attacks (successful or not) that pose a threat to your network, and attacks against resources that you have determined to be valuable in your risk assessment. -For info on the changes that were added in Windows 10, see [Security auditing](/windows/whats-new/security-auditing.md). +For info on the changes that were added in Windows 10, see [Security auditing](../whats-new/security-auditing.md). ## In this section diff --git a/windows/keep-secure/trusted-platform-module-technology-overview.md b/windows/keep-secure/trusted-platform-module-technology-overview.md index e0387f31f7..9a9ecc1b5f 100644 --- a/windows/keep-secure/trusted-platform-module-technology-overview.md +++ b/windows/keep-secure/trusted-platform-module-technology-overview.md @@ -50,7 +50,7 @@ The TPM has several Group Policy settings that can be used to manage how it is u ## New and changed functionality -For more info on new and changed functionality for Trusted Platform Module in Windows 10, see [What's new in Trusted Platform Module?](/windows/whats-new/trusted-platform-module.md). +For more info on new and changed functionality for Trusted Platform Module in Windows 10, see [What's new in Trusted Platform Module?](../whats-new/trusted-platform-module.md). ## Device health attestation diff --git a/windows/keep-secure/user-account-control-overview.md b/windows/keep-secure/user-account-control-overview.md index 00bcc26d14..6a43f96b95 100644 --- a/windows/keep-secure/user-account-control-overview.md +++ b/windows/keep-secure/user-account-control-overview.md @@ -34,7 +34,7 @@ Admin Approval Mode in UAC helps prevent malware from silently installing withou ## New and changed functionality -To find out what's new in UAC for Windows 10, see [User Account Control](/windows/whats-new/user-account-control.md). +To find out what's new in UAC for Windows 10, see [User Account Control](../whats-new/user-account-control.md). ## In this section diff --git a/windows/keep-secure/windows-10-mobile-security-guide.md b/windows/keep-secure/windows-10-mobile-security-guide.md index 51eac4c903..c94eeae25a 100644 --- a/windows/keep-secure/windows-10-mobile-security-guide.md +++ b/windows/keep-secure/windows-10-mobile-security-guide.md @@ -219,7 +219,7 @@ In Windows 10 Mobile, enterprise data protection (EDP) helps separate personal - Prevent users from copying corporate data to public locations. **Note**   -EDP is currently being tested in select customer evaluation programs. For more information about EDP, see [Enterprise data protection overview](/windows/whats-new/enterprise-data-protection-overview.md). +EDP is currently being tested in select customer evaluation programs. For more information about EDP, see [Enterprise data protection overview](../whats-new/enterprise-data-protection-overview.md).   @@ -555,13 +555,13 @@ In addition, all UWP apps follow the security principle of least privilege. Apps The Windows Store app-distribution process and the app sandboxing capabilities of Windows 10 Mobile can dramatically reduce the likelihood that users encounter malicious apps on the system. -For more information about Store for Business, see [Windows Store for Business overview](/windows/whats-new/business-store-for-windows-10.md). +For more information about Store for Business, see [Windows Store for Business overview](../whats-new/business-store-for-windows-10.md). ### App management An enterprise typically exerts some configuration and control over the apps installed on devices. In this way, the organization accomplishes several business goals, such managing software licenses, ensuring mandatory app deployment on required devices, and preventing the installation of unacceptable apps on corporate devices. -An important component in delivering on these goals is Store for Business, which builds on the Windows Store infrastructure that Microsoft hosts and enables you to deploy Windows Store apps across your Windows 10-based devices. Store for Business is both powerful and highly flexible. It allows you to extend and customize features without having to stand up new on-premises infrastructure. It supports and integrates with your existing MDM service but doesn’t require one. (Ask your MDM service vendor about integration with Store for Business.) You can configure Store for Business for a wide variety of scenarios, including online and offline licensing and different app-distribution options. For a more detailed description of the available Store for Business scenarios, see [Windows Store for Business overview](/windows/whats-new/business-store-for-windows-10.md). +An important component in delivering on these goals is Store for Business, which builds on the Windows Store infrastructure that Microsoft hosts and enables you to deploy Windows Store apps across your Windows 10-based devices. Store for Business is both powerful and highly flexible. It allows you to extend and customize features without having to stand up new on-premises infrastructure. It supports and integrates with your existing MDM service but doesn’t require one. (Ask your MDM service vendor about integration with Store for Business.) You can configure Store for Business for a wide variety of scenarios, including online and offline licensing and different app-distribution options. For a more detailed description of the available Store for Business scenarios, see [Windows Store for Business overview](../whats-new/business-store-for-windows-10.md). A web-based portal for IT pros simplifies Windows 10 Mobile app deployment. The familiar look of Windows Store was used to design the Store for Business experience. It showcases apps relevant to business use, hand-selected and sorted by category. The store can use Azure AD accounts for all users, linking them to a single, unique organizational identity. @@ -587,7 +587,7 @@ Alternatively, you can choose one of two other app-distribution options in Store - Add the app to the organization’s private store, and allow all users to discover and install it. -For details about app distribution, see [Distribute apps using your private store](/windows/manage/distribute-apps-from-your-private-store.md). +For details about app distribution, see [Distribute apps using your private store](../manage/distribute-apps-from-your-private-store.md). The IT process for preparing Store for Business for app deployment is shown in Figure 4. @@ -595,7 +595,7 @@ The IT process for preparing Store for Business for app deployment is shown in F Figure 4. The IT process for Store for Business -For details about the process of distributing apps through Store for Business, see [Find and acquire apps](/windows/manage/find-and-acquire-apps.md). +For details about the process of distributing apps through Store for Business, see [Find and acquire apps](../manage/find-and-acquire-apps.md). ### The user side @@ -628,13 +628,13 @@ The web browser is a critical component of any security strategy, and for good r [Windows 10 security overview](windows-10-security-guide.md) -[Windows 10 Mobile and MDM](/windows/manage/windows-10-mobile-and-mdm.md) +[Windows 10 Mobile and MDM](../manage/windows-10-mobile-and-mdm.md) [Windows 10 and Windows 10 Mobile](../index.md) [Windows Store for Business](http://go.microsoft.com/fwlink/p/?LinkId=722910) -[Windows Store for Business overview](/windows/whats-new/business-store-for-windows-10.md) +[Windows Store for Business overview](../whats-new/business-store-for-windows-10.md)   diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 9870642206..570ef60fae 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -1 +1,56 @@ -#[Manage and update](placeholder.md) \ No newline at end of file +# [Manage and update Windows 10](manage-and-update-windows-10.md) +## [Change history for Manage and update Windows 10](change-history-for-manage-and-update-windows-10.md) +## [Administrative Tools in Windows 10](administrative-tools-in-windows-10.md) +## [Cortana integration in your business or enterprise](manage-cortana-in-your-enterprise.md) +## [Manage corporate devices](manage-corporate-devices.md) +### [New policies for Windows 10](new-policies-for-windows-10.md) +### [Changes to Group Policy settings for Windows 10 Start](changes-to-start-policies-in-windows-10.md) +### [Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md) +### [Introduction to configuration service providers (CSPs)](how-it-pros-can-use-configuration-service-providers--csps--.md) +## [Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) +### [Customize and export Start layout](customize-and-export-start-layout.md) +### [Customize Windows 10 Start with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) +### [Customize Windows 10 Start with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) +### [Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) +## [Lock down Windows 10](lock-down-windows-10.md) +### [Set up a device for anyone to use (kiosk mode)](set-up-a-device-for-anyone-to-use.md) +#### [Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) +#### [Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise](set-up-a-kiosk-for-windows-10-for-mobile-edition.md) +### [Lock down Windows 10 to specific apps](lock-down-windows-10-to-specific-apps.md) +### [Configure telemetry and other settings in your organization](manage-privacy-for-windows-10-in-your-company.md) +### [Configure access to Windows Store](stop-employees-from-using-the-windows-store.md) +### [Manage Wi-Fi Sense in your company](manage-wi-fi-sense-in-your-company.md) +### [Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md) +#### [Settings and quick actions that can be locked down in Windows 10 Mobile](settings-that-can-be-locked-down.md) +#### [Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md) +### [Reset a Windows 10 Mobile device](reset-a-windows-10-mobile-device.md) +## [Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md) +## [Configure devices without MDM](configure-devices-without-mdm.md) +## [Windows 10 servicing options for updates and upgrades](introduction-to-windows-10-servicing.md) +## [Windows Store for Business](windows-store-for-business.md) +### [Sign up and get started](sign-up-and-get-started.md) +#### [Prerequisites for Windows Store for Business](prerequisites-for-windows-store-for-business.md) +#### [Sign up for Windows Store for Business](sign-up-for-windows-store-for-business.md) +#### [Roles and permissions in the Windows Store for Business](roles-and-permissions-in-the-windows-store-for-business.md) +#### [Settings reference: Windows Store for Business](settings-reference--windows-store-for-business.md) +### [Find and acquire apps](find-and-acquire-apps.md) +#### [Apps in the Windows Store for Business](apps-in-the-windows-store-for-business.md) +#### [Working with line-of-business apps](working-with-line-of-business-apps.md) +### [Distribute apps to your employees from the Windows Store for Business](distribute-apps-to-your-employees-from-the-windows-store-for-business.md) +#### [Distribute apps using your private store](distribute-apps-from-your-private-store.md) +#### [Assign apps to employees](assign-apps-to-employees.md) +#### [Distribute apps with a management tool](distribute-apps-with-a-management-tool.md) +#### [Distribute offline apps](distribute-offline-apps.md) +### [Manage apps](manage-apps.md) +#### [Manage access to private store](manage-access-to-private-store.md) +#### [App inventory managemement for Windows Store for Business](app-inventory-managemement-for-windows-store-for-business.md) +#### [Manage private store settings](manage-private-store-settings.md) +#### [Configure MDM provider](configure-mdm-provider.md) +### [Device Guard signing portal](device-guard-signing-portal.md) +#### [Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md) +#### [Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md) +### [Manage settings in the Windows Store for Business](manage-settings-in-the-windows-store-for-business.md) +#### [Update Windows Store for Business account settings](update-windows-store-for-business-account-settings-.md) +#### [Manage user accounts in Windows Store for Business](manage-users-and-groups-in-the-windows-store-for-business.md) +### [Troubleshoot Windows Store for Business](troubleshoot.md) + diff --git a/windows/manage/add-unsigned-app-to-code-integrity-policy.md b/windows/manage/add-unsigned-app-to-code-integrity-policy.md new file mode 100644 index 0000000000..c1f6d000d8 --- /dev/null +++ b/windows/manage/add-unsigned-app-to-code-integrity-policy.md @@ -0,0 +1,122 @@ +--- +title: Add unsigned app to code integrity policy (Windows 10) +description: When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device. +ms.assetid: 580E18B1-2FFD-4EE4-8CC5-6F375BE224EA +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Add unsigned app to code integrity policy + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device. Then, create the catalog files for your unsigned app, sign the catalog files, and then merge the default policy that includes your signing certificate with existing code integrity policies. + +## In this section + + +- [Create a code integrity policy based on a reference device](#create_ci_policy) +- [Create catalog files for your unsigned app](#create_catalog_files) +- [Catalog signing with Device Guard signing portal](#catalog_signing_device_guard_portal) + +## Create a code integrity policy based on a reference device + + +To add an unsigned app to a code integrity policy, your code integrity policy must be created from golden image machine. For more information, see [Create a Device Guard code integrity policy based on a reference device](https://technet.microsoft.com/library/mt243445.aspx). + +## Create catalog files for your unsigned app + + +Creating catalog files starts the process for adding an unsigned app to a code integrity policy. + +Before you get started, be sure to review these best practices and requirements: + +**Requirements** + +- You'll use Package Inspector during this process. + +- Only perform this process with a code integrity policy running in audit mode. You should not perform this process on a system running an enforced Device Guard policy. + +**Best practices** + +- **Naming convention** -- Using a naming convention makes it easier to find deployed catalog files. We'll use \*-Contoso.cat as the naming convention in this topic. For more information, see the section Inventorying catalog files by using Configuration Manager in the [Device Guard deployment guide](https://technet.microsoft.com/library/mt463091.aspx). + +- **Where to deploy code integrity policy** -- The [code integrity policy that you created](#create_ci_policy) should be deployed to the system on which you are running Package Inspector. This will ensure that the code integrity policy binaries are trusted. + +Copy the commands for each step into an elevated Windows PowerShell session. You'll use Package Inspector to find and trust all binaries in the app. + +**To create catalog files for your unsigned app** + +1. Start Package Inspector to scan the C drive. + + `PackageInspector.exe Start C:` + +2. Copy the installation media to the C drive. + + Copying the installation media to the C drive ensures that Package Inspector finds and catalogs the installer. If you skip this step, the code integrity policy may trust the application to run, but not trust it to be installed. + +3. Install and start the app. + + All binaries that are used while Package Inspector is running will be part of the catalog files. After the installation, start the app and make sure that any product updates are installed and any downloadable content was found during the scan. Then, close and restart the app to make sure that the scan found all binaries. + +4. Stop the scan and create definition and catalog files. + + After app install is complete, stop the Package Inspector scan and create catalog and definition files on your desktop. + + `$ExamplePath=$env:userprofile+"\Desktop"` + + `$CatFileName=$ExamplePath+"\LOBApp-Contoso.cat"` + + `$CatDefName=$ExamplePath+"\LOBApp.cdf"` + + `PackageInspector.exe Stop C: -Name $CatFileName -cdfpath $CatDefName` + +The Package Inspector scan catalogs the hash values for each binary file that is finds. If the app that was scanned are updated, do this process again to trust the new binaries hash values. + +After you're done, the files are saved to your desktop. You still need to sign the catalog file so that it will be trusted within the code integrity policy. + +## Catalog signing with Device Guard signing portal + + +To sign catalog files with the Device Guard signing portal, you need to be signed up with the Windows Store for Business. For more information, see [Sign up for the Windows Store for Business](sign-up-for-windows-store-for-business.md). + +Catalog signing is a vital step to adding your unsigned apps to your code integrity policy. + +**To sign a catalog file with Device Guard signing portal** + +1. Sign in to the Store for Business + +2. Click **Settings**, and then choose **Device Guard signing**. + +3. Click **Upload** to upload your unsigned catalog files. These are the catalog files you created earlier in [Create catalog files for your unsigned app](#create_catalog_files). + +4. After the files are uploaded, click **Sign** to sign the catalog files. + +5. Click Download to download each item: + + - signed catalog file + + - default policy + + - root certificate for your organization + + When you use the Device Guard signing portal to sign a catalog file, the signing certificate is added to the default policy. When you download the signed catalog file, you should also download the default policy and merge this code integrity policy with your existing code integrity policies to protect machines running the catalog file. You need to do this step to trust and run your catalog files. For more information, see the Merging code integrity policies in the [Device Guard deployment guide](https://technet.microsoft.com/library/mt463091.aspx). + +6. Open the root certificate that you downloaded, and follow the steps in **Certificate Import wizard** to install the certificate in your machine's certificate store. + +7. Deploy signed catalogs to your managed devices. For more information, see Deploy catalog files with Group Policy, or Deploy catalog files with System Center Configuration Manager in the [Device Guard deployment guide](https://technet.microsoft.com/library/mt463091.aspx). + +  + +  + + + + + diff --git a/windows/manage/administrative-tools-in-windows-10.md b/windows/manage/administrative-tools-in-windows-10.md new file mode 100644 index 0000000000..fc68012857 --- /dev/null +++ b/windows/manage/administrative-tools-in-windows-10.md @@ -0,0 +1,52 @@ +--- +title: Administrative Tools in Windows 10 (Windows 10) +description: Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users. +ms.assetid: FDC63933-C94C-43CB-8373-629795926DC8 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Administrative Tools in Windows 10 + + +**Applies to** + +- Windows 10 + +Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users. The tools in the folder might vary depending on which edition of Windows you are using. + +These tools were included in previous versions of Windows and the associated documentation for each tool should help you use these tools in Windows 10. The following list links to documentation for each tool. + +**Tip**   +If the content that is linked to a tool in the following list doesn't provide the information you need to use that tool, send us a comment by using the **Was this page helpful?** feature on this **Administrative Tools in Windows 10** page. Details about the information you want for a tool will help us plan future content. + +  + +- [Component Services]( http://go.microsoft.com/fwlink/p/?LinkId=708489) +- [Computer Management](http://go.microsoft.com/fwlink/p/?LinkId=708490) +- [Defragment and Optimize Drives](http://go.microsoft.com/fwlink/p/?LinkId=708488) +- [Disk Cleanup](http://go.microsoft.com/fwlink/p/?LinkID=698648) +- [Event Viewer](http://go.microsoft.com/fwlink/p/?LinkId=708491) +- [iSCSI Initiator](http://go.microsoft.com/fwlink/p/?LinkId=708492) +- [Local Security Policy](http://go.microsoft.com/fwlink/p/?LinkId=708493) +- [ODBC Data Sources]( http://go.microsoft.com/fwlink/p/?LinkId=708494) +- [Performance Monitor](http://go.microsoft.com/fwlink/p/?LinkId=708495) +- [Print Management](http://go.microsoft.com/fwlink/p/?LinkId=708496) +- [Resource Monitor](http://go.microsoft.com/fwlink/p/?LinkId=708497) +- [Services](http://go.microsoft.com/fwlink/p/?LinkId=708498) +- [System Configuration](http://go.microsoft.com/fwlink/p/?LinkId=708499) +- [System Information]( http://go.microsoft.com/fwlink/p/?LinkId=708500) +- [Task Scheduler](http://go.microsoft.com/fwlink/p/?LinkId=708501) +- [Windows Firewall with Advanced Security](http://go.microsoft.com/fwlink/p/?LinkId=708503) +- [Windows Memory Diagnostic]( http://go.microsoft.com/fwlink/p/?LinkId=708507) + +  + +  + + + + + diff --git a/windows/manage/app-inventory-managemement-for-windows-store-for-business.md b/windows/manage/app-inventory-managemement-for-windows-store-for-business.md new file mode 100644 index 0000000000..0b1842c286 --- /dev/null +++ b/windows/manage/app-inventory-managemement-for-windows-store-for-business.md @@ -0,0 +1,206 @@ +--- +title: App inventory management for Windows Store for Business (Windows 10) +description: You can manage all apps that you've acquired on your Inventory page. +ms.assetid: 44211937-801B-4B85-8810-9CA055CDB1B2 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# App inventory management for Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +You can manage all apps that you've acquired on your **Inventory** page. + +The **Inventory** page in Windows Store for Business shows all apps in your inventory. This includes all apps that you've acquired from Store for Business, and the line-of-business (LOB) apps that you've accepted into your inventory. After LOB apps are submitted to your organization, you'll see a notification on your **Inventory** page. On the **New line-of-business apps** page, you can accept, or reject the LOB apps. For more information on LOB apps, see [Working with line-of-business apps](working-with-line-of-business-apps.md). + +All of these apps are treated the same once they are in your inventory and you can perform app lifecycle tasks for them: distribute apps, add apps to private store, review license details, and reclaim app licenses. + +![](images/wsfb-inventoryaddprivatestore.png) + +Store for Business shows this info for each app in your inventory: + +- Name + +- Access to actions for the app + +- Last modified date + +- Supported devices + +- Private store status + +### Find apps in your inventory + +There are a couple of ways to find specific apps, or groups of apps in your inventory. + +**Search** - Use the Search box to search for an app. + +**Refine** - Use **Refine** to scope your list of apps by one or more of these app attributes: + +- **License** - Online or offline licenses. For more info, see [Apps in Windows Store for Business](apps-in-the-windows-store-for-business.md#licensing_model). + +- **Platforms** - Lists the devices that apps in your inventory were originally written to support. This list is cumulative for all apps in your inventory. + +- **Source** - **Store**, for apps acquired from Store for Business, or LOB, for line-of-business apps. + +- **Private store** - **In private store**, or **Not in private store**, depending on whether or not you've added the app to your private store. + +### Manage apps in your inventory + +Each app in the Store for Business has an online, or an offline license. For more information on Store for Business licensing model, see [Apps in the Windows Store for Business](apps-in-the-windows-store-for-business.md#licensing_model). There are different actions you can take depending on the app license type. They're summarized in this table. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ActionOnline-licensed appOffline-licensed app

Assign to employees

X

Add to private store

X

Remove from private store

X

View license details

X

View product details

X

X

Download for offline use

X

+ +  + +**Note**   +Removing apps from inventory is not currently supported. + +  + +The actions in the table are how you distribute apps, and manage app licenses. We'll cover those in the next sections. Working with offline-licensed apps has different steps. For more information on distributing offline-licensed apps, see [Distribute offline apps](distribute-offline-apps.md). + +### Distribute apps + +For online-licensed apps, there are a couple of ways to distribute apps from your inventory: + +- Assign apps to people in your organization. + +- Add apps to your private store, and let people in your organization install the app. + +If you use a management tool that supports Store for Business, you can distribute apps with your management tool. Once it is configured to work with Store for Business, your managment tool will have access to all apps in your inventory. For more information, see [Distribute apps with a management tool](distribute-apps-with-a-management-tool.md). + +### Assign apps + +You can assign apps directly to people in your organization. You can assign apps to individuals, a few people, or to a group. For more information, see [Assign apps to employees](assign-apps-to-employees.md). + +### Private store + +The private store is a feature in the Store for Business. Once an online-licensed app is in your inventory, you can make it available in your private store. When you add apps to the private store, all employees in your organization can view and download the app. Employees access the private store as a page in Windows Store app. + +For more information, see [Distribute apps using your private store](distribute-apps-from-your-private-store.md). + +### Manage app licenses + +For each app in your inventory, you can view and manage license details. This give you another way to assign apps to people in your organization. It also allows you to reclaim app licenses after they've been assigned to people, or claimed by people in your organization. + +**To view license details** + +1. Sign in to [Store for Business](http://go.microsoft.com/fwlink/p/?LinkId=691845) + +2. Click **Manage**, and then choose **Inventory**. + +3. Click the ellipses for and app, and then choose **View license details**. + + ![](images/wsfb-inventory-viewlicense.png) + + You'll see the names of people in your organization who have installed the app and are using one of the licenses. + + ![](images/wsfb-licensedetails.png) + + On **Assigned licenses**, you can do several things: + + - Assign the app to other people in your organization. + + - Reclaim app licenses. + + - View app details. + + - Add the app to your private store, if it is not in the private store. + + You can assign the app to more people in your organization, or reclaim licenses. + + **To assign an app to more people** + + - Click Assign to people, type the email address for the employee that you're assigning the app to, and click **Assign**. + + ![](images/wsfb-licenseassign.png) + + Store for Business updates the list of assigned licenses. + + **To reclaim licenses** + + - Choose the person you want to reclaim the license from, click **Reclaim licenses**, and then click **Reclaim licenses**. + + ![](images/wsfb-licensereclaim.png) + + Store for Business updates the list of assigned licenses. + +### Download offline-licensed app + +Offline licensing is a new feature in Windows 10 and allows apps to be deployed to devices that are not connected to the Internet. This means organizations can deploy apps when users or devices do not have connectivity to the Store. + +You can download offline-licensed apps from your inventory. You'll need to download these items: + +- App metadata + +- App package + +- App license + +- App framework + +For more information about online and offline licenses, see [Apps in the Windows Store for Business](apps-in-the-windows-store-for-business.md#licensing_model). + +For more information about downloading offline-licensed apps, see [Download offline apps](../p_ent_manage_Update/download-offline-licensed-app.md). + +  + +  + + + + + diff --git a/windows/manage/apps-in-the-windows-store-for-business.md b/windows/manage/apps-in-the-windows-store-for-business.md new file mode 100644 index 0000000000..d2c7a4435e --- /dev/null +++ b/windows/manage/apps-in-the-windows-store-for-business.md @@ -0,0 +1,91 @@ +--- +title: Apps in Windows Store for Business (Windows 10) +description: Windows Store for Business has thousands of apps from many different categories. +ms.assetid: CC5641DA-3CEA-4950-AD81-1AF1AE876926 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Apps in Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Windows Store for Business has thousands of apps from many different categories. + +## + + +These app types are supported in Store for Business: + +- Universal Windows apps for Windows 10 + +- Universal Windows apps, by device: phone, Surface Hub, IoT, HoloLens + +Apps in your inventory will have at least one of these supported platforms listed for the app: + +- Windows 10 desktops + +- Windows 10 phones + +- Windows 10 xbox + +- Windows 10 IOT devices + +- Windows 10 servers + +- Windows 10 \*all devices\* + +- Windows 10 Surface Hub + +- Windows 10 HoloLens + +Apps that you acquire from the Store for Business only work on Windows 10-based devices. Even though an app might list Windows 8 as its supported platform, that tells you what platform the app was originally written for. Apps developed for Windows 8, or Windows phone 8 will work on Windows 10. + +Line-of-business (LOB) apps are also supported using the Store for Business. Admins can invite IT devs and ISVs to be LOB publishers. Apps developed by your LOB publishers that are submitted to the Store are only available to your organization. Once an administrator accepts an app submitted by one of their LOB publishers, the app can be distributed just like any other app from Store for Business. For more information, see Working with Line-of-Business apps. + +## In-app purchases + + +Some apps offer you the option to make in-app purchases. In-app purchases are not currently supported for apps that are acquired through Store for Business and distributed to employees. + +If an employee makes an in-app purchase, they'll make it with their personal Microsoft account and pay for it with a personal payment method. The employee will own the item purchased, and it cannot be transferred to your organization’s inventory. + +## Licensing model: online and offline licenses + + +Store for Business supports two options to license apps: online and offline. + +**Online** licensing is the default licensing model and is similar to the Windows Store. Online licensed apps require users and devices to connect to the Store for Business service to acquire an app and its license. Licensing management is enforced based on the user’s Azure AD identity and maintained by the store as well as the management tool. By default app updates are handled by Windows Update. + +Distribution options for online-licensed apps include the ability to: + +- Assign an app to employees. + +- Add an app to your private store, allowing employees to download the app. + +- Distribute through a management tool. + +**Offline** licensing is a new licensing option for Windows 10. With offline licenses, organizations can cache apps and their licenses to deploy within their network. ISVs or devs can opt-in their apps for offline licensing when they submit them to the developer center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in Store for Business. This model means organizations can deploy apps when users or devices do not have connectivity to the Store. + +You have the following distribution options for offline-licensed apps: + +- Include the app in a provisioning package, and then use it as part of imaging a device. + +- Distribute the app through a management tool. + +For more information, see [Distribute apps to your employees from the Store for Business](distribute-apps-to-your-employees-from-the-windows-store-for-business.md). + +  + +  + + + + + diff --git a/windows/manage/assign-apps-to-employees.md b/windows/manage/assign-apps-to-employees.md new file mode 100644 index 0000000000..9d09dd9cf5 --- /dev/null +++ b/windows/manage/assign-apps-to-employees.md @@ -0,0 +1,40 @@ +--- +title: Assign apps to employees (Windows 10) +description: Administrators can assign online-licensed apps to employees in their organization. +ms.assetid: A0DF4EC2-BE33-41E1-8832-DBB0EBECA31A +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Assign apps to employees + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Administrators can assign online-licensed apps to employees in their organization. + +**To assign an app to an employee** + +1. Sign in to Windows Store for Business. + +2. Click **Manage**, and then choose **Inventory**. + +3. Find an app, click the ellipses under **Action**, and then choose **Assign to people**. + +4. Type the email address for the employee that you're assigning the app to, and click **Confirm**. + +Employees will receive an email with a link that will install the app on their device. Click the link to start the Windows Store app, and then click **Install**. + +  + +  + + + + + diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md new file mode 100644 index 0000000000..4e7605259b --- /dev/null +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -0,0 +1,157 @@ +--- +title: Change history for Manage and update Windows 10 (Windows 10) +description: This topic lists new and updated topics in the Manage and update Windows 10 documentation for Windows 10 and Windows 10 Mobile. +ms.assetid: 29144AFA-1DA9-4532-B07D-1EBE34B7E1E0 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +--- + +# Change history for Manage and update Windows 10 + + +This topic lists new and updated topics in the [Manage and update Windows 10](manage-and-update-windows-10.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). + +## March 2016 + + + ++++ + + + + + + + + + + + + +
New or changed topicDescription
[Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md)

New

+ +  + +## February 2016 + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
New or changed topicDescription
[Configure telemetry and other settings in your organization](manage-privacy-for-windows-10-in-your-company.md)

Added call history and email to the Settings > Privacy section.

+

Added the Turn off Windows Mail application Group Policy to the Mail synchronization section.

[Customize and export Start layout](customize-and-export-start-layout.md)Added a note to clarify that partial Start layout is only supported in Windows 10, Version 1511 and later
[Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md)Added instructions for replacing markup characters with escape characters in Start layout XML
[Introduction to configuration service providers (CSPs) for IT pros](how-it-pros-can-use-configuration-service-providers--csps--.md)New
[Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md)New
[Windows 10 servicing options for updates and upgrades](introduction-to-windows-10-servicing.md)Added information on servicing options for Windows 10 Mobile, Windows 10 Mobile Enterprise, and Windows 10 IoT Core (IoT Core).
+ +  + +## December 2015 + + + ++++ + + + + + + + + + + + + + + + + + + + + +
New or changed topicDescription
[Cortana integration in your business or enterprise](manage-cortana-in-your-enterprise.md)New
[Manage Wi-Fi Sense in your company](manage-wi-fi-sense-in-your-company.md)New
Customize Windows 10 Start with mobile device management (MDM)
+ +  + +## November 2015 + + +| New or changed topic | Description | +|--------------------------------------------------------------------------------------------------------------------------------------------------|-------------| +| [Administrative Tools in Windows 10](administrative-tools-in-windows-10.md) | New | +| [Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md) | New | +| [Customize and export Start layout](customize-and-export-start-layout.md) | New | +| [Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) | New | +| [Lock down Windows 10 to specific apps](lock-down-windows-10-to-specific-apps.md) | New | +| [Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md) | New | +| [Reset a Windows 10 Mobile device](reset-a-windows-10-mobile-device.md) | New | +| [Settings and quick actions that can be locked down in Windows 10 Mobile](settings-that-can-be-locked-down.md) | New | +| [Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise](set-up-a-kiosk-for-windows-10-for-mobile-edition.md) | New | +| [Windows Hello biometrics in the enterprise](../keep-secure/windows-hello-biometrics-in-the-enterprise.md) | New | +| [Windows Store for Business](windows-store-for-business.md) (multiple topics) | New | +| [Changes to Group Policy settings for Windows 10 Start](changes-to-start-policies-in-windows-10.md) | Updated | +| [Configure telemetry and other settings in your organization](manage-privacy-for-windows-10-in-your-company.md) | Updated | +| [New policies for Windows 10](new-policies-for-windows-10.md) | Updated | + +  + +## Related topics + + +[Change history for What's new in Windows 10](../whats-new/change-history-for-what-s-new-in-windows-10.md) + +[Change history for Plan for Windows 10 deployment](../plan/change-history-for-plan-for-windows-10-deployment.md) + +[Change history for Deploy Windows 10](../deploy/change-history-for-deploy-windows-10.md) + +[Change history for Keep Windows 10 secure](../keep-secure/change-history-for-keep-windows-10-secure.md) + +  + +  + + + + + diff --git a/windows/manage/changes-to-start-policies-in-windows-10.md b/windows/manage/changes-to-start-policies-in-windows-10.md new file mode 100644 index 0000000000..2dd9ca8e5b --- /dev/null +++ b/windows/manage/changes-to-start-policies-in-windows-10.md @@ -0,0 +1,180 @@ +--- +title: Changes to Group Policy settings for Windows 10 Start (Windows 10) +description: Windows 10 has a brand new Start experience. +ms.assetid: 612FB68A-3832-451F-AA97-E73791FEAA9F +keywords: ["group policy", "start menu", "start screen"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Changes to Group Policy settings for Windows 10 Start + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Start policy settings supported for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education](#start_policy_settings_supported_for_windows_10_pro__windows_10_enterprise__and_windows_10_education) +- [Deprecated Group Policy settings for Start](#deprecated_group_policy_settings_for_start_) +- [Related topics](#related_topics) + +Windows 10 has a brand new Start experience. As a result, there are changes to the Group Policy settings that you can use to manage Start. Some policy settings are new or changed, and some old Start policy settings still apply. Other Start policy settings no longer apply and are deprecated. + +## Start policy settings supported for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education + + +These policy settings are available in **Administrative Templates\\Start Menu and Taskbar** under **User Configuration**. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyNotes
Clear history of recently opened documents on exitDocuments that the user opens are tracked during the session. When the user signs off, the history of opened documents is deleted.
Do not allow pinning items in Jump ListsJump Lists are lists of recently opened items, such as files, folders, or websites, organized by the program that you use to open them. This policy prevents users from pinning items to any Jump List.
Do not display or track items in Jump Lists from remote locationsWhen this policy is applied, only items local on the computer are shown in Jump Lists.
Do not keep history of recently opened documentsDocuments that the user opens are not tracked during the session.
Prevent changes to Taskbar and Start Menu SettingsIn Windows 10, this disables all of the settings in Settings > Personalization > Start as well as the options in dialog available via right-click Taskbar > Properties
Prevent users from customizing their Start Screen

Use this policy in conjunction with [CopyProfile](http://go.microsoft.com/fwlink/p/?LinkId=623229) or other methods for configuring the layout of Start to prevent users from changing it

Prevent users from uninstalling applications from StartIn Windows 10, this removes the uninstall button in the context menu. It does not prevent users from uninstalling the app through other entry points (e.g. PowerShell)
Remove All Programs list from the Start menuIn Windows 10, this removes the All apps button.
Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commandsThis removes the Shut Down, Restart, Sleep, and Hibernate commands from the Start Menu, Start Menu power button, CTRL+ALT+DEL screen, and Alt+F4 Shut Down Windows menu.
Remove common program groups from Start MenuAs in earlier versions of Windows, this removes apps specified in the All Users profile from Start
Remove frequent programs list from the Start MenuIn Windows 10, this removes the top left Most used group of apps.
Remove Logoff on the Start MenuLogoff has been changed to Sign Out in the user interface, however the functionality is the same.
Remove pinned programs list from the Start MenuIn Windows 10, this removes the bottom left group of apps (by default, only File Explorer and Settings are pinned).
Show "Run as different user" command on StartThis enables the Run as different user option in the right-click menu for apps.
Start Layout

This applies a specific Start layout, and it also prevents users from changing the layout. This policy can be configured in User Configuration or Computer Configuration.

+
+Note   +

Start Layout policy setting applies only to Windows 10 Enterprise and Windows 10 Education.

+
+
+  +
Force Start to be either full screen size or menu sizeThis applies a specific size for Start.
+ +  + +## Deprecated Group Policy settings for Start + + +The Start policy settings listed below do not work on Windows 10. Most of them were deprecated in Windows 8 however a few more were deprecated in Windows 10. Deprecation in this case means that the policy setting will not work on Windows 10. The “Supported on” text for a policy setting will not list Windows 10. The policy settings are still in the Group Policy Management Console and can be used on the operating systems that they apply to. + +| Policy | When deprecated | +|----------------------------------------------------------------------------------|-----------------| +| Go to the desktop instead of Start when signing in | Windows 10 | +| List desktop apps first in the Apps view | Windows 10 | +| Pin Apps to Start when installed (User or Computer) | Windows 10 | +| Remove Default Programs link from the Start menu. | Windows 10 | +| Remove Documents icon from Start Menu | Windows 10 | +| Remove programs on Settings menu | Windows 10 | +| Remove Run menu from Start Menu | Windows 10 | +| Remove the "Undock PC" button from the Start Menu | Windows 10 | +| Search just apps from the Apps view | Windows 10 | +| Show Start on the display the user is using when they press the Windows logo key | Windows 10 | +| Show the Apps view automatically when the user goes to Start | Windows 10 | +| Add the Run command to the Start Menu | Windows 8 | +| Change Start Menu power button | Windows 8 | +| Gray unavailable Windows Installer programs Start Menu shortcuts | Windows 8 | +| Remove Downloads link from Start Menu | Windows 8 | +| Remove Favorites menu from Start Menu | Windows 8 | +| Remove Games link from Start Menu | Windows 8 | +| Remove Help menu from Start Menu | Windows 8 | +| Remove Homegroup link from Start Menu | Windows 8 | +| Remove Music icon from Start Menu | Windows 8 | +| Remove Network icon from Start Menu | Windows 8 | +| Remove Pictures icon from Start Menu | Windows 8 | +| Remove Recent Items menu from Start Menu | Windows 8 | +| Remove Recorded TV link from Start Menu | Windows 8 | +| Remove user folder link from Start Menu | Windows 8 | +| Remove Videos link from Start Menu | Windows 8 | + +  + +## Related topics + + +[Manage corporate devices](manage-corporate-devices.md) + +[New policies for Windows 10](new-policies-for-windows-10.md) + +[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) + +[Customize and export Start layout](customize-and-export-start-layout.md) + +[Customize Windows 10 Start screens with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +[Customize Windows 10 Start screens with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +[Customize Windows 10 Start screens with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +  + +  + + + + + diff --git a/windows/manage/configure-devices-without-mdm.md b/windows/manage/configure-devices-without-mdm.md new file mode 100644 index 0000000000..9978f43052 --- /dev/null +++ b/windows/manage/configure-devices-without-mdm.md @@ -0,0 +1,195 @@ +--- +title: Configure devices without MDM (Windows 10) +description: Create a runtime provisioning package to apply settings, profiles, and file assets to a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise. +ms.assetid: 66D14E97-E116-4218-8924-E2A326C9367E +keywords: ["runtime provisioning", "provisioning package"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Configure devices without MDM + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [Advantages](#advantages) +- [Typical use cases](#typical_use_cases) +- [Create package](#create_package) +- [Apply package](#apply_package) +- [Manage a package](#manage_a_package) +- [Learn more](#learn_more) + +Create a runtime provisioning package to apply settings, profiles, and file assets to a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise. + +Sometimes mobile device management (MDM) isn't available to you for setting up a device because the device isn't connected to your network, or because an employee is remote and needs a fast replacement for a work device. You might not use MDM in your organization at all, but would like an easy way to place a standard configuration on multiple devices. + +Rather than wiping a device and applying a new system image, in Windows 10 you can apply a provisioning package at any time. A provisioning package can include management instructions and policies, installation of specific apps, customization of network connections and policies, and more. + +You can provide provisioning packages on a network shared folder that employees can access to configure their devices. Or you can put a provisioning package on a USB flash drive or SD card to hand out. You can even send the provisioning package to someone in email. + +Provisioning packages are simple for employees to install. And when they remove a provisioning package, policies that the package applied to their device are removed. + +## Advantages + + +- You can configure new devices without re-imaging. + +- Works on both mobile and desktop devices. + +- No network connectivity required. + +- Simple for people to apply. + +- Ensures compliance and security before a device is enrolled in MDM. + +## Typical use cases + + +- **Set up a new off-the-shelf device for an employee** + + Package might include edition upgrade, device name, company root certificate, Wi-Fi profile, domain join with service account, or company application. + +- **Configure an off-the-shelf mobile device to be used as a point of sale or inventory terminal** + + Package might include edition upgrade, device name, company root certificate, Wi-Fi profile, security policies, company application, or assigned access (also known as [kiosk mode](set-up-a-device-for-anyone-to-use.md)). + +- **Help employees set up personally-owned devices to use for work** + + Package might include company root certificate, Wi-Fi profiles, security policies, or company application. + + **Note**   + Test to make sure that removing the provisioning package from a personal device removes everything that the package installed. Some settings are not reverted when a provisioning package is removed from the device. + +   + +- **Repurpose devices by returning the device to a specific state between users** + + Package might include computer name, company root certificate, Wi-Fi profile, or company application. + + **Note**   + To return the **Start** menu to a specific state, you must reset the device. When you reset the device, you can apply the provisioning package during the first-run experience. + +   + +For details about the settings you can customize in provisioning packages, see [Windows Provisioning settings reference]( http://go.microsoft.com/fwlink/p/?LinkId=619012). + +## Create package + + +Use the Windows Imaging and Configuration Designer (ICD) tool included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a runtime provisioning package. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +1. Open Windows ICD (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +2. Choose **New provisioning package**. + +3. Name your project, and click **Next**. + +4. Choose **Common to all Windows editions**, **Common to all Windows desktop editions**, or **Common to all Windows mobile editions**, depending on the devices you intent to provision, and click **Next**. + +5. On **New project**, click **Finish**. The workspace for your package opens. + +6. Configure settings. [Learn more about specific settings in provisioning packages.]( http://go.microsoft.com/fwlink/p/?LinkId=615916) + +7. On the **File** menu, select **Save.** + +8. On the **Export** menu, select **Provisioning package**. + +9. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +10. Set a value for **Package Version**. + + **Tip**   + You can make changes to existing packages and change the version number to update previously applied packages. + +   + +11. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select...** and choosing the certificate you want to use to sign the package. + + **Important**   + We recommend that you include a trusted provisioning certificate in your provisioning package. When the package is applied to a device, the certificate is added to the system store and any package signed with that certificate thereafter can be applied silently. + +   + +12. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +13. Click **Next**. + +14. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +15. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +16. Select the **output location** link to go to the location of the package. You can provide that .ppkg to others through any of the following methods: + + - Shared network folder + + - SharePoint site + + - Removable media (USB/SD) + + - Email + + - USB tether (mobile only) + +Learn more: [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkID=629651) + +## Apply package + + +On a desktop computer, the employee goes to **Settings** > **Accounts** > **Work access** > **Add or remove a management package** > **Add a package**, and selects the package to install. The user can also add a provisioning package simply by double-clicking the .ppkg file in email, in local storage, on removable media, or at a URL. + +![add a package option](images/package.png) + +On a mobile device, the employee goes to **Settings** > **Accounts** > **Provisioning.** > **Add a package**, and selects the package on removable media to install. The user can also add a provisioning package simply by double-tapping the .ppkg file in email. + +![add provisioning package on phone](images/phoneprovision.png) + +## Manage a package + + +- Users can view details or delete package (if policy allows deletion); only user-installed packages are listed. + +- Deleting a package removes settings, profiles, certificates, and apps it contains. + +- Use policies to disable manual deletion of packages, installation of unsigned packages, or the installation of any additional packages. + +- Update content by installing a new package with same name and new version number. + +- Optionally, keep packages when you reset a mobile device. When you reset a desktop, runtime packages are removed. + + ![](images/resetdevice.png) + +## Learn more + + +- [Provisioning Windows 10 Devices with New Tools](http://go.microsoft.com/fwlink/p/?LinkId=615921) + +- [Windows 10 for Mobile Devices: Provisioning Is Not Imaging](http://go.microsoft.com/fwlink/p/?LinkId=615922) + +  + +  + + + + + diff --git a/windows/manage/configure-mdm-provider.md b/windows/manage/configure-mdm-provider.md new file mode 100644 index 0000000000..33917f1a5a --- /dev/null +++ b/windows/manage/configure-mdm-provider.md @@ -0,0 +1,54 @@ +--- +title: Configure an MDM provider (Windows 10) +description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses. +ms.assetid: B3A45C8C-A96C-4254-9659-A9B364784673 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Configure an MDM provider + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content. + +Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business + +**To configure a management tool in Azure AD** + +1. Sign in to the Azure Portal as an Administrator. + +2. Click **Active Directory**, and then choose your directory.  + +3. Click **Applications**, find the application, and add it to your directory. + +After your management tool is added to your Azure AD directory, you can configure it to work with Store for Business. + +**To configure a management tool in Store for Business** + +1. Log in to Store for Business. + +2. Click **Settings**, and then choose **Management tool**. + + You'll see a list of available MDM tools. + + ![](images/wsfb-settings-mgmt.png) + +3. Choose the MDM tool you want to synchronize with Store for Business, and then click **Activate.** + +Your MDM tool is ready to use with Store for Business. Consult docs for your management tool to learn how to distribute apps from your synchronized inventory. + +  + +  + + + + + diff --git a/windows/manage/customize-and-export-start-layout.md b/windows/manage/customize-and-export-start-layout.md new file mode 100644 index 0000000000..6c0d31e4cc --- /dev/null +++ b/windows/manage/customize-and-export-start-layout.md @@ -0,0 +1,148 @@ +--- +title: Customize and export Start layout (Windows 10) +description: The easiest method for creating a customized Start layout to apply to other Windows 10 devices is to set up the Start screen on a test computer and then export the layout. +ms.assetid: CA8DF327-5DD4-452F-9FE5-F17C514B6236 +keywords: ["start screen"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Customize and export Start layout + + +**Applies to** + +- Windows 10 + +**Looking for consumer information?** + +- [Customize the Start menu](http://go.microsoft.com/fwlink/p/?LinkId=623630) + +**In this article** + +- [Customize the Start screen on your test computer](#BKMKCustomizeStartScreen) +- [Export the Start layout](#BMK_ExportStartScreenLayout) +- [Configure a partial Start layout](#configure_a_partial_start_layout) +- [Related topics](#related_topics) + +The easiest method for creating a customized Start layout to apply to other Windows 10 devices is to set up the Start screen on a test computer and then export the layout. + +After you export the layout, decide whether you want to apply a *full* Start layout or a *partial* Start layout. + +When a full Start layout is applied, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. + +When [a partial Start layout](#configure_a_partial_start_layout) is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. + +**Note**  Partial Start layout is only supported on Windows 10, Version 1511 and later. + +  + +You can deploy the resulting .xml file to devices using one of the following methods: + +- [Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +- [Windows Imaging and Configuration Designer provisioning package](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +- [Mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +## Customize the Start screen on your test computer + + +To prepare a Start layout for export, you simply customize the Start layout on a test computer. + +**To prepare a test computer** + +1. Set up a test computer on which to customize the Start layout. Your test computer should have the operating system that is installed on the users’ computers (Windows 10 Enterprise or Windows 10 Education). Install all apps and services that the Start layout should display. + + **Important**   + **Start layout** can only be applied to a device using the same architecture (32-bit or 64-bit) as the device on which **Start layout** was created. + +   + +2. Create a new user account that you will use to customize the Start layout. + + +**To customize Start** + +1. Sign in to your test computer with the user account that you created. + +2. Customize the Start layout as you want users to see it by using the following techniques: + + - **Pin apps to Start**. From Start, type the name of the app. When the app appears in the search results, right-click the app, and then click **Pin to Start**. + + To view all apps, click **All apps** in the bottom-left corner of Start. Right-click any app, and pin or unpin it from Start. + + - **Unpin apps** that you don’t want to display. To unpin an app, right-click the app, and then click **Unpin from Start**. + + - **Drag tiles** on Start to reorder or group apps. + + - **Resize tiles**. To resize tiles, right-click the tile and then click **Resize.** + + - **Create your own app groups**. Drag the apps to an empty area. To name a group, click above the group of tiles and then type the name in the **Name group** field that appears above the group. + +## Export the Start layout + + +When you have the Start layout that you want your users to see, use the [Export-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet in Windows PowerShell to export the Start layout to an .xml file. + +**To export the Start layout to an .xml file** + +1. From Start, open **Windows PowerShell**. + +2. At the Windows PowerShell command prompt, enter the following command: + + `export-startlayout –path .xml ` + + In the previous command, `-path` is a required parameter that specifies the path and file name for the export file. You can specify a local path or a UNC path (for example, \\\\FileServer01\\StartLayouts\\StartLayoutMarketing.xml). + + Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet does not append the file name extension, and the policy settings require the extension. + +## Configure a partial Start layout + + +A partial Start layout enables you to add one or more customized tile groups to users' Start screens or menus, while still allowing users to make changes to other parts of the Start layout. All groups that you add are *locked*, meaning users cannot change the contents of those tile groups, however users can change the location of those groups. Locked groups are identified with an icon, as shown in the following image. + +![locked tile group](images/start-pinned-app.png) + +When a partial Start layout is applied for the first time, the new groups are added to the users' existing Start layouts. If an app tile is in both an existing group and in a new locked group, the duplicate app tile is removed from the existing (unlocked) group. + +When a partial Start layout is applied to a device that already has a StartLayout.xml applied, groups that were added previously are removed and the groups in the new layout are added. + +If the Start layout is applied by Group Policy or MDM, and the policy is removed, the groups remain on the devices but become unlocked. + +**To configure a partial Start screen layout** + +1. [Customize the Start layout](#BMK_customize_start). + +2. [Export the Start layout](#BMK_ExportStartScreenLayout). +3. Open the layout .xml file. There is a `` element. Add `LayoutCustomizationRestrictionType="OnlySpecifiedGroups"` to the **DefaultLayoutOverride** element as follows: + + ``` syntax + + ``` + +4. Save the file and apply using any of the deployment methods. + +## Related topics + + +[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) + +[Customize Windows 10 Start with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +[Customize Windows 10 Start with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +[Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +[Changes to Group Policy settings for Windows 10 Start](changes-to-start-policies-in-windows-10.md) + +  + +  + + + + + diff --git a/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md b/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md new file mode 100644 index 0000000000..2336a4b7fa --- /dev/null +++ b/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md @@ -0,0 +1,148 @@ +--- +title: Customize Windows 10 Start with Group Policy (Windows 10) +description: In Windows 10 Enterprise and Windows 10 Education, you can use a Group Policy Object (GPO) to deploy a customized Start layout to users in a domain. +ms.assetid: F4A47B36-F1EF-41CD-9CBA-04C83E960545 +keywords: ["Start layout", "start menu", "layout", "group policy"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Customize Windows 10 Start with Group Policy + + +**Applies to** + +- Windows 10 + +**Looking for consumer information?** + +- [Customize the Start menu](http://go.microsoft.com/fwlink/p/?LinkId=623630) + +**In this article** + +- [Operating system requirements](#operating_system_requirements) +- [How Start layout control works](#BKMK_HowStartScreenControlWorks) +- [Use Group Policy to apply a customized Start layout in a domain](#BKMK_DomainGPODeployment) +- [Use Group Policy to apply a customized Start layout on the local computer](#BKMK_LocalGPImport) +- [Update a customized Start layout](#BKMK_UpdateStartScreenLayout) +- [Related topics](#related_topics) + +In Windows 10 Enterprise and Windows 10 Education, you can use a Group Policy Object (GPO) to deploy a customized Start layout to users in a domain. No reimaging is required, and the Start layout can be updated simply by overwriting the .xml file that contains the layout. This enables you to customize Start layouts for different departments or organizations, with minimal management overhead. + +This topic describes how to update Group Policy settings to display a customized Start layout when the users sign in. By creating a domain-based GPO with these settings, you can deploy a customized Start layout to users in a domain. + +**Warning**   +When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. + +  + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) + +## Operating system requirements + + +Start layout control using Group Policy is supported in Windows 10 Enterprise and Windows 10 Education. Start layout control is not supported in Windows 10 Pro. + +The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. In Group Policy, ADMX files are used to define Registry-based policy settings in the Administrative Templates category. To find out how to create a central store for Administrative Templates files, see [article 929841](http://go.microsoft.com/fwlink/p/?LinkId=691687) in the Microsoft Knowledge Base. + +## How Start layout control works + + +Two features enable Start layout control: + +- The [Export-StartLayout](http://go.microsoft.com/fwlink/p/?LinkID=620879) cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. **Start layout** can only be applied to a device using the same architecture (32-bit or 64-bit) as the device on which **Start layout** was created. + + **Note**   + To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=623707) cmdlet. + +   + +- In Group Policy, you use the **Start Layout** settings for the **Start Menu and Taskbar** administrative template to set a Start layout from an .xml file when the policy is applied. + +**Note**   +To learn how customize Start to include your line-of-business apps when you deploy Windows 10, see [Customize the Windows 10 Start layout]( http://go.microsoft.com/fwlink/p/?LinkId=620863). + +  + +## Use Group Policy to apply a customized Start layout in a domain + + +To apply the Start layout to users in a domain, use the Group Policy Management Console (GPMC) to configure a domain-based Group Policy Object (GPO) that sets **Start Layout** policy settings in the **Start Menu and Taskbar** administrative template for users in a domain. + +The GPO applies the Start layout at the next user sign-in. Each time the user signs in, the timestamp of the .xml file with the Start layout is checked and if a newer version of the file is available, the settings in the latest version of the file are applied. + +The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. + +The .xml file with the Start layout must be located on shared network storage that is available to the users’ computers when they sign in and the users must have Read-only access to the file. If the file is not available at sign-in, Start is not customized during the session, and the user can make changes to Start. + +For information about deploying GPOs in a domain, see [Working with Group Policy Objects](http://go.microsoft.com/fwlink/p/?LinkId=620889). + +## Use Group Policy to apply a customized Start layout on the local computer + + +You can use the Local Group Policy Editor to provide a customized Start layout for any user who signs in on the local computer. To display the customized Start layout for any user who signs in, configure **Start Layout** policy settings for the **Start Menu and Taskbar** administrative template. You can use the **Start Menu and Taskbar** administrative template in **User Configuration** or **Computer Configuration**. + +**Note**   +This procedure applies the policy settings on the local computer only. For information about deploying the Start layout to users in a domain, see [Use Group Policy to deploy a customized Start layout in a domain](#BKMK_DomainGPODeployment), later in this topic. + +This procedure creates a Local Group Policy that applies to all users on the computer. To configure Local Group Policy that applies to a specific user or group on the computer, see [Step-by-Step Guide to Managing Multiple Local Group Policy Objects](http://go.microsoft.com/fwlink/p/?LinkId=620881). The guide was written for Windows Vista and the procedures still apply to Windows 10. + +  + +This procedure adds the customized Start layout to the user configuration, which overrides any Start layout settings in the local computer configuration when a user signs in on the computer. + +**To configure Start Layout policy settings in Local Group Policy Editor** + +1. On the test computer, press the Windows key, type **gpedit**, and then select **Edit group policy (Control panel)**. + +2. Go to **User Configuration** or **Computer Configuration** > **Administrative Templates** >**Start Menu and Taskbar**. + + ![start screen layout policy settings](images/starttemplate.jpg) + +3. Right-click **Start Layout** in the right pane, and click **Edit**. + + This opens the **Start Layout** policy settings. + + ![policy settings for start screen layout](images/startlayoutpolicy.jpg) + +4. Enter the following settings, and then click **OK**: + + 1. Select **Enabled**. + + 2. Under **Options**, specify the path to the .xml file that contains the Start layout. For example, type **C:\\Users\\Test01\\StartScreenMarketing.xml**. + + 3. Optionally, enter a comment to identify the Start layout. + + **Important**   + If you disable Start Layout policy settings that have been in effect and then re-enable the policy, users will not be able to make changes to Start, however the layout in the .xml file will not be reapplied unless the file has been updated. In Windows PowerShell, you can update the timestamp on a file by running the following command: + + `(ls ).LastWriteTime = Get-Date` + +   + +## Update a customized Start layout + + +After you use Group Policy to apply a customized Start layout on a computer or in a domain, you can update the layout simply by replacing the .xml file that is specified in the Start Layout policy settings with a file with a newer timestamp. + +## Related topics + + +[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) + +[Customize and export Start layout](customize-and-export-start-layout.md) + +[Customize Windows 10 Start with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +[Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +  + +  + + + + + diff --git a/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md b/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md new file mode 100644 index 0000000000..97359258fa --- /dev/null +++ b/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md @@ -0,0 +1,159 @@ +--- +title: Customize Windows 10 Start with mobile device management (MDM) (Windows 10) +description: In Windows 10 Enterprise and Windows 10 Education, you can use a mobile device management (MDM) policy to deploy a customized Start layout to users. +ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4 +keywords: ["start screen", "start menu"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Customize Windows 10 Start with mobile device management (MDM) + + +**Applies to** + +- Windows 10 + +**Looking for consumer information?** + +- [Customize the Start menu](http://go.microsoft.com/fwlink/p/?LinkId=623630) + +In Windows 10 Enterprise and Windows 10 Education, you can use a mobile device management (MDM) policy to deploy a customized Start layout to users. No reimaging is required, and the Start layout can be updated simply by overwriting the .xml file that contains the layout. This enables you to customize Start layouts for different departments or organizations, with minimal management overhead. + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) + +**Warning**   +When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. + +  + +## How Start layout control works + + +Two features enable Start layout control: + +- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. **Start layout** can only be applied to a device using the same architecture (32-bit or 64-bit) as the device on which **Start layout** was created. + + **Note**   + To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=623707) cmdlet. + +   + +- In MDM, you set the path to the .xml file that defines the Start layout using an OMA-URI setting, which is based on the [Policy configuration service provider (CSP)](http://go.microsoft.com/fwlink/p/?LinkID=623244). + +## Create a policy for your customized Start layout + + +This example uses Microsoft Intune to configure an MDM policy that applies a customized Start layout. See the documentation for your MDM solution for help in applying the policy. + +1. In the Start layout file created when you ran **Export-StartLayout**, replace markup characters with escape characters, and save the file. (You can replace the characters manually or use an online tool.) + + Example of a layout file produced by Export-StartLayout: + + + + + + + + + + + + + + + + +
XML
<LayoutModificationTemplate Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
+      <DefaultLayoutOverride>
+        <StartLayoutCollection>
+          <defaultlayout:StartLayout GroupCellWidth="6" xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout">
+            <start:Group Name="Life at a glance" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout">
+              <start:Tile Size="2x2" Column="0" Row="0" AppUserModelID="Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge" />
+              <start:Tile Size="2x2" Column="4" Row="0" AppUserModelID="Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI" />
+              <start:Tile Size="2x2" Column="2" Row="0" AppUserModelID="Microsoft.BingWeather_8wekyb3d8bbwe!App" />
+            </start:Group>        
+          </defaultlayout:StartLayout>
+        </StartLayoutCollection>
+      </DefaultLayoutOverride>
+    </LayoutModificationTemplate>
+ + Example of the same layout file with escape characters replacing the markup characters: + + + + + + + + + + + + + + + + +
XML
&lt;wdcml:p xmlns:wdcml=&quot;http://microsoft.com/wdcml&quot;&gt;Example of a layout file produced by Export-StartLayout:&lt;/wdcml:p&gt;&lt;wdcml:snippet xmlns:wdcml=&quot;http://microsoft.com/wdcml&quot;&gt;&lt;![CDATA[&lt;LayoutModificationTemplate Version=&quot;1&quot; xmlns=&quot;http://schemas.microsoft.com/Start/2014/LayoutModification&quot;&gt;
+      &lt;DefaultLayoutOverride&gt;
+        &lt;StartLayoutCollection&gt;
+          &lt;defaultlayout:StartLayout GroupCellWidth=&quot;6&quot; xmlns:defaultlayout=&quot;http://schemas.microsoft.com/Start/2014/FullDefaultLayout&quot;&gt;
+            &lt;start:Group Name=&quot;Life at a glance&quot; xmlns:start=&quot;http://schemas.microsoft.com/Start/2014/StartLayout&quot;&gt;
+              &lt;start:Tile Size=&quot;2x2&quot; Column=&quot;0&quot; Row=&quot;0&quot; AppUserModelID=&quot;Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge&quot; /&gt;
+              &lt;start:Tile Size=&quot;2x2&quot; Column=&quot;4&quot; Row=&quot;0&quot; AppUserModelID=&quot;Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI&quot; /&gt;
+              &lt;start:Tile Size=&quot;2x2&quot; Column=&quot;2&quot; Row=&quot;0&quot; AppUserModelID=&quot;Microsoft.BingWeather_8wekyb3d8bbwe!App&quot; /&gt;
+            &lt;/start:Group&gt;        
+          &lt;/defaultlayout:StartLayout&gt;
+        &lt;/StartLayoutCollection&gt;
+      &lt;/DefaultLayoutOverride&gt;
+    &lt;/LayoutModificationTemplate&gt;]]&gt;&lt;/wdcml:snippet&gt;
+ +2. In the Microsoft Intune administration console, click **Policy** > **Add Policy**. + +3. Under **Windows**, choose a **Custom Configuration (Windows 10 Desktop and Mobile and later)** policy. + +4. Enter a name (mandatory) and description (optional) for the policy. + +5. In the **OMA-URI Settings** section, click **Add.** + +6. In **Add or Edit OMA-URI Setting**, enter the following information. + + | Item | Information | + |------------------------------|-------------------------------------------------------------------------------------------------------------------| + | **Setting name** | Enter a unique name for the OMA-URI setting to help you identify it in the list of settings. | + | **Setting description** | Provide a description that gives an overview of the setting and other relevant information to help you locate it. | + | **Data type** | **String** | + | **OMA-URI (case sensitive)** | **./User/Vendor/MSFT/Policy/Config/Start/StartLayout** | + | **Value** | Path to the Start layout .xml file that you created. | + +   + +7. Click **OK** to save the setting and return to the **Create Policy** page. + +8. Click **Save Policy**. + +## Related topics + + +[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) + +[Customize and export Start layout](customize-and-export-start-layout.md) + +[Customize Windows 10 Start with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +[Customize Windows 10 Start with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +[Use Windows 10 custom policies to manage device settings with Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkID=616316) + +  + +  + + + + + diff --git a/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md b/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md new file mode 100644 index 0000000000..46f2c730a2 --- /dev/null +++ b/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md @@ -0,0 +1,122 @@ +--- +title: Customize Windows 10 Start with ICD and provisioning packages (Windows 10) +description: In Windows 10 Enterprise and Windows 10 Education, you can use a provisioning package that you create with Windows Imaging and Configuration Designer (ICD) tool to deploy a customized Start layout to users. +ms.assetid: AC952899-86A0-42FC-9E3C-C25F45B1ACAC +keywords: ["Start layout", "start menu"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Customize Windows 10 Start with ICD and provisioning packages + + +**Applies to** + +- Windows 10 + +**Looking for consumer information?** + +- [Customize the Start menu](http://go.microsoft.com/fwlink/p/?LinkId=623630) + +**In this article** + +- [How Start layout control works](#BKMK_HowStartScreenControlWorks) +- [Create a provisioning package that contains a customized Start layout](#BKMK_DomainGPODeployment) +- [Related topics](#related_topics) + +In Windows 10 Enterprise and Windows 10 Education, you can use a provisioning package that you create with Windows Imaging and Configuration Designer (ICD) tool to deploy a customized Start layout to users. No reimaging is required, and the Start layout can be updated simply by overwriting the .xml file that contains the layout. The provisioning package can be applied to a running device. This enables you to customize Start layouts for different departments or organizations, with minimal management overhead. + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) + +## How Start layout control works + + +Two features enable Start layout control: + +- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. **Start layout** can only be applied to a device using the same architecture (32-bit or 64-bit) as the device on which **Start layout** was created. + + **Note**   + To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=623707) cmdlet. + +   + +- In ICD, you use the **Start/StartLayout** setting to set the path to the .xml file that defines the Start layout. + +## Create a provisioning package that contains a customized Start layout + + +Use the [Imaging and Configuration Designer (ICD) tool](http://go.microsoft.com/fwlink/p/?LinkID=525483) included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a provisioning package that applies a customized Start layout. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +1. Open ICD (by default, %systemdrive%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +2. Choose **New provisioning package**. + +3. Name your project, and click **Next**. + +4. Choose **Common to all Windows desktop editions** and click **Next**. + +5. On **New project**, click **Finish**. The workspace for your package opens. + +6. Expand **Runtime settings** > **Start**, and click **StartLayout**. + +7. Specify the path and file name of the Start layout .xml that you created with the [Export-StartLayout](http://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet. + +8. On the **File** menu, select **Save.** + +9. On the **Export** menu, select **Provisioning package**. + +10. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +11. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select...** and choosing the certificate you want to use to sign the package. + +12. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Imaging and Configuration Designer (ICD) uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +13. Click **Next**. + +14. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +15. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +16. Copy the provisioning package to the target device. + +17. Double-click the ppkg file and allow it to install. + + **Warning**   + When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. + +   + +## Related topics + + +[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md) + +[Customize and export Start layout](customize-and-export-start-layout.md) + +[Customize Windows 10 Start with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +[Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +  + +  + + + + + diff --git a/windows/manage/device-guard-signing-portal.md b/windows/manage/device-guard-signing-portal.md new file mode 100644 index 0000000000..21f2938875 --- /dev/null +++ b/windows/manage/device-guard-signing-portal.md @@ -0,0 +1,95 @@ +--- +title: Device Guard signing (Windows 10) +description: Device Guard signing is a Device Guard feature that is available in the Windows Store for Business. +ms.assetid: 8D9CD2B9-5FC6-4C3D-AA96-F135AFEEBB78 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Device Guard signing + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Device Guard signing is a Device Guard feature that is available in the Windows Store for Business. It gives admins a single place to sign catalog files and code integrity policies. After admins have created catalog files for unsigned apps and signed the catalog files, they can add the signers to a code integrity policy. You can merge the code integrity policy with your existing policy to include your custom signing certificate. This allows you to trust the catalog files. + +Device Guard is a feature set that consists of both hardware and software system integrity hardening features. These features use new virtualization-based security options and the trust-nothing mobile device operating system model. A key feature in this model is called configurable code integrity, which allows your organization to choose exactly which software or trusted software publishers are allowed to run code on your client machines. Also, Device Guard offers organizations a way to sign existing line-of-business (LOB) applications so that they can trust their own code, without the requirement that the application be repackaged. Also, this same method of signing allows organizations to trust individual third-party applications. For more information, see [Device Guard deployment guide](https://technet.microsoft.com/library/mt463091.aspx). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md)

When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device. Then, create the catalog files for your unsigned app, sign the catalog files, and then merge the default policy that includes your signing certificate with existing code integrity policies.

[Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md)

Signing code integrity policies prevents policies from being tampered with after they're deployed. You can sign code integrity policies with the Device Guard signing portal.

+ +  + +## File and size limits + + +When you're uploading files for Device Guard signing, there are a few limits for files and file size: + +| | | +|-------------------------------------------------------|----------| +| Description | Limit | +| Maximum size for a policy or catalog file | 3.5 MB | +| Maximum size for multiple files (uploaded in a group) | 4 MB | +| Maximum number of files per upload | 15 files | + +  + +## File types + + +Catalog and policy files have required files types. + +| | | +|---------------|--------------------| +| File | Required file type | +| catalog files | .cat | +| policy files | .bin | + +  + +## Store for Business roles and permissions + + +Signing code integrity policies and access to Device Guard portal requires the Device Guard signer role. + +## Device Guard signing certificates + + +All certificates generated by the Device Guard signing service are unique per customer and are independent of the Microsoft production code signing certificate authorities. All Certification Authority (CA) keys are stored within the cryptographic boundary of Federal Information Processing Standards (FIPS) publication 140-2 compliant hardware security modules. After initial generation, root certificate keys and top level CA keys are removed from the online signing service, encrypted, and stored offline. + +  + +  + + + + + diff --git a/windows/manage/distribute-apps-from-your-private-store.md b/windows/manage/distribute-apps-from-your-private-store.md new file mode 100644 index 0000000000..414a19f67e --- /dev/null +++ b/windows/manage/distribute-apps-from-your-private-store.md @@ -0,0 +1,75 @@ +--- +title: Distribute apps using your private store (Windows 10) +description: The private store is a feature in Windows Store for Business that organizations receive during the sign up process. +ms.assetid: C4644035-845C-4C84-87F0-D87EA8F5BA19 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Distribute apps using your private store + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +The private store is a feature in Windows Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in the Windows Store, and is usually named for your company or organization. Only apps with online licenses can be added to the private store. + +You can make an app available in your private store when you acquire the app, or you can do it later from your inventory. Once the app is in your private store, employees can claim and install the app. + +**To acquire an app and make it available in your private store** + +1. Sign in to the Store for Business. + +2. Click an app and then click **Get the app** to acquire the app for your organization. + +3. You'll have a few options for distributing the app -- choose **Add to your private store where all people in your organization can find and install it.** + + ![](images/wsfb-distribute.png) + + It will take approximately twelve hours before the app is available in the private store. + +**To make an app in inventory available in your private store** + +1. Sign in to the Store for Business. + +2. Click **Manage**, and then choose **Inventory**. + + ![](images/wsfb-manageinventory.png) + +3. Click **Refine**, and then choose **Online**. Store for Business will update the list of apps on the **Inventory** page. + +4. From an app in **Inventory**, click the ellipses under **Action**, and then choose **Add to private store**. + + ![](images/wsfb-inventoryaddprivatestore.png) + +The value under **Private store** for the app will change to pending. It will take approximately twelve hours before the app is available in the private store. + +Employees can claim apps that admins added to the private store by doing the following. + +**To claim an app from the private store** + +1. Sign in to your computer with your Azure Active Directory (AD) credentials, and start the Windows Store app. + +2. Click the **private store** tab. + +3. Click the app you want to install, and then click **Install**. + +## Related topics + + +[Manage access to private store](manage-access-to-private-store.md) + +[Configure access to Windows Store](stop-employees-from-using-the-windows-store.md) + +  + +  + + + + + diff --git a/windows/manage/distribute-apps-to-your-employees-from-the-windows-store-for-business.md b/windows/manage/distribute-apps-to-your-employees-from-the-windows-store-for-business.md new file mode 100644 index 0000000000..9d3638e9ea --- /dev/null +++ b/windows/manage/distribute-apps-to-your-employees-from-the-windows-store-for-business.md @@ -0,0 +1,64 @@ +--- +title: Distribute apps to your employees from the Windows Store for Business (Windows 10) +description: Distribute apps to your employees from Windows Store for Business. You can assign apps to employees, or let employees install them from your private store. +ms.assetid: E591497C-6DFA-49C1-8329-4670F2164E9E +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Distribute apps to your employees from the Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Distribute apps to your employees from Windows Store for Business. You can assign apps to employees, or let employees install them from your private store. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Distribute apps using your private store](distribute-apps-from-your-private-store.md)

The private store is a feature in Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in the Windows Store, and is usually named for your company or organization. Only apps with online licenses can be added to the private store.

[Assign apps to employees](assign-apps-to-employees.md)

Administrators can assign online-licensed apps to employees in their organization.

[Distribute apps with a management tool](distribute-apps-with-a-management-tool.md)

You can configure a mobile device management (MDM) tool to synchronize your Store for Business inventory. Store for Business management tool services work with MDM tools to manage content.

[Distribute offline apps](distribute-offline-apps.md)

Offline licensing is a new licensing option for Windows 10. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. ISVs or devs can opt-in their apps for offline licensing when they submit them to the Windows Dev Center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in the Store for Business. This model means organizations can deploy apps when users or devices do not have connectivity to the Store.

+ +  + +  + +  + + + + + diff --git a/windows/manage/distribute-apps-with-a-management-tool.md b/windows/manage/distribute-apps-with-a-management-tool.md new file mode 100644 index 0000000000..24510e5252 --- /dev/null +++ b/windows/manage/distribute-apps-with-a-management-tool.md @@ -0,0 +1,66 @@ +--- +title: Distribute apps with a management tool (Windows 10) +description: You can configure a mobile device management (MDM) tool to synchronize your Store for Business inventory. Store for Business management tool services work with MDM tools to manage content. +ms.assetid: 006F5FB1-E688-4769-BD9A-CFA6F5829016 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Distribute apps with a management tool + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +You can configure a mobile device management (MDM) tool to synchronize your Store for Business inventory. Store for Business management tool services work with MDM tools to manage content. + +Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Windows Store for Business. + +In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Store for Business. This allows the MDM tool to call Store for Business management tool services. For more information, see [Configure MDM provider](configure-mdm-provider.md). + +Store for Business services provide: + +- Services for third-party MDM tools. + +- Synchronize app purchases and updates. + +- Synchronize metadata. For offline-licensed apps, also synchronize offline app package and offline licenses. + +- The ability to download offline-licensed apps from Store for Business. + +MDM tool requirements: + +- Must be an Azure Active Directory (AD) application to authenticate against the Store for Business services. + +- Must be configured in Azure AD, and Store for Business. + +- Azure AD identity is required to authorize Store for Business services. + +## Distribute offline-licensed apps + + +If your vendor doesn’t support the ability to synchronize applications from the management tool services or cannot connect to the management tool services, your vendor may support the ability to deploy offline licensed applications by downloading the application and license from the store and then deploying the app through your MDM. For more information on online and offline licensing with Store for Business, see [Apps in the Windows Store for Business.](apps-in-the-windows-store-for-business.md#licensing_model) + +This diagram shows how you can use a management tool to distribute offline-licensed app to employees in your organization. Once synchronized from Store for Business, management tools can use the Windows Management framework to distribute applications to devices. + +![](images/wsfb-offline-distribute-mdm.png) + +## Distribute online-licensed apps + + +This diagram shows how you can use a management tool to distribute an online-licensed app to employees in your organization. Once synchronized from Store for Business, management tools use the Windows Management framework to distribute applications to devices. For Online licensed applications, the management tool calls back in to Store for Business management services to assign an application prior to issuing the policy to install the application. + +![](images/wsfb-online-distribute-mdm.png) + +  + +  + + + + + diff --git a/windows/manage/distribute-offline-apps.md b/windows/manage/distribute-offline-apps.md new file mode 100644 index 0000000000..270d9f1f23 --- /dev/null +++ b/windows/manage/distribute-offline-apps.md @@ -0,0 +1,88 @@ +--- +title: Distribute offline apps (Windows 10) +description: Offline licensing is a new licensing option for Windows 10. +ms.assetid: 6B9F6876-AA66-4EE4-A448-1371511AC95E +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Distribute offline apps + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Offline licensing is a new licensing option for Windows 10. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. ISVs or devs can opt-in their apps for offline licensing when they submit them to the Windows Dev Center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in the Windows Store for Business. This model means organizations can deploy apps when users or devices do not have connectivity to the Store. + +## Why offline-licensed apps? + + +Offline-licensed apps offer an alternative to online apps, and provide additional deployment options. Some reasons to use offline-licensed apps include: + +- **You don't have access to Windows Store services** - If your employees don't have access to the internet and Windows Store services, downloading offline-licensed apps and deploying them with imaging is an alternative to online-licensed apps. + +- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD). + +- **Your employees do not have Azure Active Directory (AD) accounts** - Azure AD accounts are required for employees that install apps assigned to them from Store for Business or that claim apps from a private store. + +## Distribution options for offline-licensed apps + + +You can't distribute offline-licensed apps directly from the Store for Business. Once you download the items for the offline-licensed app, you have three options for distributing the apps: + +- **Deployment Image Servicing and Management**. DISM is a command-line tool that is used to mount and service Microsoft WindowsWindows images before deployment. You can also use DISM to install, uninstall, configure, and update Windows features, packages, drivers, and international settings in a .wim file or VHD using the DISM servicing commands. DISM commands are used on offline images. For more information, see [Deployment Image Servicing and Management](https://msdn.microsoft.com/library/windows/hardware/dn898558.aspx). + +- **Windows ICD**. ICD is GUI tool that you can use to create Windows provisioning answer files, and add third-party drivers, apps, or other assets to an answer file. For more information, see [Windows Imaging and Configuration Designer](https://msdn.microsoft.com/library/windows/hardware/dn916113.aspx). + +- **Management server.** + +## Download an offline-licensed app + + +There are several items to download or create for offline-licensed apps. You'll need all of these items to distribute offline apps to your employees. This section includes more info on each item, and tells you how to download an offline-licensed app. + +- **App metadata** -- App metadata is required for distributing offline apps. The metadata includes app details, links to icons, product id, localized product ids, and other items. + +- **App package** -- App packages are required for distributing offline apps. There are app packages for different combinations of app platform and device architecture. You'll need to know what device architectures you have in your organization to know if there are app packages to support your devices. + +- **App license** -- App licenses are required for distributing offline apps. Use encoded licenses when you distribute offline-licensed apps using a management tool or ICD. Use unencoded licenses when you distribute offline-licensed apps using DISM. + +- **App frameworks** -- App frameworks are required for distributing offline apps, but you might not need to download one. If you already have the required framework, you don't need to download another copy. The Store for Business will select the app framework needed for the app platform and architecture that you selected. + + +**To download an offline-licensed app** + +1. Sign in to the Store for Business + +2. Click **Manage**, and then choose **Inventory**. + +3. Click **Refine**, and then choose **Offline**. + +4. Find the app you want to download, click the ellipses under **Actions**, and then choose **Download for offline use**. + +5. To download app metadata: choose the language for the app metadata, and then click **Download**. Save the downloaded app metadata. + +6. To download app package for offline use: click to expand the package details information, choose the Platform and Architecture combination that you need for your organization, and then click **Download**. Save the downloaded app package. + +7. To download an app license: choose either **Encoded**, or **Unencoded**, and then click **Generate license**. Save the downloaded license. + +8. To download an app framework: find the framework you need to support your app package, and click **Download**. + **Note**   + You need the framework to support your app package, but if you already have a copy, you don't need to download it again. + + Frameworks are backward compatible. + +   + +  + +  + + + + + diff --git a/windows/manage/find-and-acquire-apps.md b/windows/manage/find-and-acquire-apps.md new file mode 100644 index 0000000000..5b9761add7 --- /dev/null +++ b/windows/manage/find-and-acquire-apps.md @@ -0,0 +1,56 @@ +--- +title: Find and acquire apps (Windows 10) +description: Use the Windows Store for Business to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. +ms.assetid: 274A5003-5F15-4635-BB8B-953953FD209A +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Find and acquire apps + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Use the Windows Store for Business to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Apps in the Windows Store for Business](apps-in-the-windows-store-for-business.md)

Store for Business has thousands of apps from many different categories.

[Working with line-of-business apps](working-with-line-of-business-apps.md)

Your company can make line-of-business (LOB) applications available through Store for Business. These apps are custom to your company – they might be internal business apps, or apps specific to your business or industry.

+ +  + +  + +  + + + + + diff --git a/windows/manage/how-it-pros-can-use-configuration-service-providers--csps--.md b/windows/manage/how-it-pros-can-use-configuration-service-providers--csps--.md new file mode 100644 index 0000000000..4f483df086 --- /dev/null +++ b/windows/manage/how-it-pros-can-use-configuration-service-providers--csps--.md @@ -0,0 +1,228 @@ +--- +title: Introduction to configuration service providers (CSPs) for IT pros (Windows 10) +description: Configuration service providers (CSPs) expose device configuration settings in Windows 10. This topic is written for people who have no experience with CSPs. +ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Introduction to configuration service providers (CSPs) for IT pros + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [What is a CSP?](#what_is_a_csp_) +- [Why should you learn about CSPs?](#why_should_you_learn_about_csps_) +- [How do you use the CSP documentation?](#BKMK_CSP_Doc) +- [CSP examples](#csp_examples) +- [Related topics](#related_topics) + +Configuration service providers (CSPs) expose device configuration settings in Windows 10. This topic is written for people who have no experience with CSPs. + +The CSPs are documented on the [Hardware Dev Center](http://go.microsoft.com/fwlink/p/?LinkId=717390) because CSPs are used by mobile device management (MDM) service providers. This topic explains how IT pros and system administrators can take advantage of many settings available through CSPs to configure devices running Windows 10 and Windows 10 Mobile in their organizations. + +**Note**   +The explanation of CSPs and CSP documentation also apply to Windows Mobile 5, Windows Mobile 6, Windows Phone 7, and Windows Phone 8, but links to current CSPs are for Windows 10 and Windows 10 Mobile. + +  + +## What is a CSP? + + +A CSP is an interface in the operating system between configuration settings specified in a provisioning document and configuration settings on the device. Some of these settings are configurable and some are read-only. + +Starting in Windows Mobile 5.0, CSPs were used to manage Windows mobile devices. In the Windows 10 platform, the management approach for both desktop and mobile devices converges, taking advantage of the same CSPs to configure and manage all devices running Windows 10. + +Each CSP provides access to specific settings. For example, the [Wi-Fi CSP](http://go.microsoft.com/fwlink/p/?LinkId=717438) contains the settings to create a Wi-Fi profile. + +CSPs are behind many of the management tasks and policies for Windows 10 in Microsoft Intune and non-Microsoft MDM service providers. For example, in Intune, the policy to allow search suggestions in the Microsoft Edge address bar uses **Browser/AllowSearchSuggestionsinAddressBar** in the [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkID=623244). + +![how intune maps to csp](images/policytocsp.png) + +## Why should you learn about CSPs? + + +Generally, enterprises rely on Group Policy or MDM to configure and manage devices. For devices running Windows, MDM services use CSPs to configure your devices. + +In addition, you may have unmanaged devices, or a large number of devices that you want to configure before enrolling them in management, or you want to apply custom settings that aren't available through your MDM service. The [CSP documentation](#BKMK_CSP_doc) can help you understand the settings that can be configured or queried. + +In addition, some of the topics in the [Windows 10 and Windows 10 Mobile](../index.md) library on Technet include links to applicable CSP reference topics, such as [Cortana integration in your business or enterprise](manage-cortana-in-your-enterprise.md) which links to the [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkID=623244). In the CSP topics, you can learn about all of the available configuration settings. + +### CSPs in Windows Imaging and Configuration Designer (ICD) + +You can use Windows Imaging and Configuration Designer (ICD) to create [provisioning packages](http://go.microsoft.com/fwlink/p/?LinkId=717466) to apply settings to devices during the out-of-box-experience (OOBE) and after devices are set up. You can use provisioning packages to configure a device's connectivity and enroll the device in MDM. Many of the runtime settings in Windows ICD are based on CSPs. + +Many settings in Windows ICD will display documentation for that setting in the center pane, and will include a reference to the CSP if the setting uses one, as shown in the following image. + +![how help content appears in icd](images/cspinicd.png) + +[Configure devices without MDM](configure-devices-without-mdm.md) explains how to use the Windows ICD tool included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a runtime provisioning package. + +### CSPs in MDM + +Most, if not all, CSPs are surfaced through your MDM service. If you see a CSP that provides a capability that you want to make use of and cannot find that capability in your MDM service, contact your MDM provider for assistance. It might simply be named differently than you expected. You can see the CSPs supported by MDM in the [Configuration service provider reference](http://go.microsoft.com/fwlink/p/?LinkId=717390). + +When a CSP is available but is not explicitly included in your MDM solution, you may be able to make use of the CSP by using OMA-URI settings. In Intune, for example, you can use [custom policy settings](http://go.microsoft.com/fwlink/p/?LinkID=616316) to deploy settings. Intune documents [a partial list of settings](http://go.microsoft.com/fwlink/p/?LinkID=616317) that you can enter in the **OMA-URI Settings** section of a custom policy, if your MDM service provides that extension. You'll notice that the list doesn't explain the meanings of the allowed and default values, so use the [CSP reference documentation](http://go.microsoft.com/fwlink/p/?LinkId=717390) to locate that information. + +### CSPs in Lockdown XML + +Lockdown XML can be used to configure devices running Windows 10 Mobile. You can manually author a [Lockdown XML file](lockdown-xml.md) to make use of the configuration settings available through the [EnterpriseAssignedAccess configuration service provider (CSP)](http://go.microsoft.com/fwlink/p/?LinkID=618601). + +## How do you use the CSP documentation? + + +All CSPs in Windows 10 are documented in the [Configuration service provider reference](http://go.microsoft.com/fwlink/p/?LinkId=717390). + +The [main CSP topic](http://go.microsoft.com/fwlink/p/?LinkId=717390) tells you which CSPs are supported on each edition of Windows 10, and links to the documentation for each individual CSP. + +![csp per windows edition](images/csptable.png) + +The documentation for each CSP follows the same structure. After an introduction that explains the purpose of the CSP, a diagram shows the parts of the CSP in tree format. The following example shows the diagram for the [AssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=626608). The diagram maps to the XML for that CSP. Notice the different shapes in the diagram: rounded elements are nodes and rectangular elements are settings or policies for which a value must be supplied. + +![assigned access csp tree](images/provisioning-csp-assignedaccess.png) + +The element in the tree diagram after the root node tells you the name of the CSP. Knowing this structure, you would recognize in XML the parts of the URI path for that CSP and, if you saw it in XML, you would know which CSP reference to look up. For example, in the following path, you can see it uses the [AssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=626608). + +```XML +./Vendor/MSFT/AssignedAccess/KioskModeApp +``` + +When an element in the diagram uses italic font, it indicates a placeholder for specific information, such as the tenant ID in the following example. + +![placeholder in csp tree](images/csp-placeholder.png) + +After the diagram, the documentation describes each element. For each policy or setting, the valid values are listed. + +For example, in the [AssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=626608), the setting is **KioskModeApp**. The documentation tells you that the value for **KioskModeApp** is a JSON string that contains the user account name and Application User Model ID (AUMID) of the Kiosk mode app. + +The documentation for most CSPs will also include an XML example. + +## CSP examples + + +CSPs provide access to a number of settings useful to enterprises. This section introduces two CSPs that an enterprise might find particularly useful. + +- [EnterpriseAssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=618601) + + The EnterpriseAssignedAccess configuration service provider allows IT administrators to configure settings on a Windows 10 Mobile device. An enterprise can make use of this CSP to create single-use or limited-use mobile devices, such as a handheld device that only runs a price-checking app. + + In addition to lockscreen wallpaper, theme, time zone, and language, the EnterpriseAssignedAccess CSP includes AssignedAccessXml which can be used to lock down the device through the following settings: + + - Enabling or disabling the Action Center. + - Configuring the number of tile columns in the Start layout. + - Restricting the apps that will be available on the device. + - Restricting the settings that the user can access. + - Restricting the hardware buttons that will be operable. + - Restricting access to the context menu. + - Enabling or disabling tile manipulation. + - Creating role-specific configurations. +- [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkID=623244) + + The Policy configuration service provider enables the enterprise to configure policies on Windows 10 and Windows 10 Mobile. Some of these policy settings can also be applied using Group Policy, and the CSP documentation lists the equivalent Group Policy settings. + + Some of the settings available in the Policy CSP include the following: + + - **Accounts**, such as whether a non-Microsoft account can be added to the device + - **Application management**, such as whether only Windows Store apps are allowed + - **Bluetooth**, such as the services allowed to use it + - **Browser**, such as restricting InPrivate browsing + - **Connectivity**, such as whether the device can be connected to a computer by USB + - **Defender** (for desktop only), such as day and time to scan + - **Device lock**, such as the type of PIN or password required to unlock the device + - **Experience**, such as allowing Cortana + - **Security**, such as whether provisioning packages are allowed + - **Settings**, such as allowing the user to change VPN settings + - **Start**, such as applying a standard Start layout + - **System**, such as allowing the user to reset the device + - **Text input**, such as allowing the device to send anonymized user text input data samples to Microsoft + - **Update**, such as specifying whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Windows Store + - **WiFi**, such as whether to enable Internet sharing + +Here is a list of CSPs supported on Windows 10 Enterprise, Windows 10 Mobile Enterprise, or both: + +- [ActiveSync CSP](http://go.microsoft.com/fwlink/p/?LinkId=723219) +- [Application CSP](http://go.microsoft.com/fwlink/p/?LinkId=723220) +- [AppLocker CSP](http://go.microsoft.com/fwlink/p/?LinkID=626609) +- [AssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=626608) +- [Bootstrap CSP](http://go.microsoft.com/fwlink/p/?LinkId=723224) +- [BrowserFavorite CSP](http://go.microsoft.com/fwlink/p/?LinkId=723428) +- [CellularSettings CSP](http://go.microsoft.com/fwlink/p/?LinkId=723427) +- [CertificateStore CSP](http://go.microsoft.com/fwlink/p/?LinkId=723225) +- [ClientCertificateInstall CSP](http://go.microsoft.com/fwlink/p/?LinkId=723226) +- [CM\_CellularEntries CSP](http://go.microsoft.com/fwlink/p/?LinkId=723426) +- [CM\_ProxyEntries CSP](http://go.microsoft.com/fwlink/p/?LinkId=723425) +- [CMPolicy CSP](http://go.microsoft.com/fwlink/p/?LinkId=723424) +- [Defender CSP](http://go.microsoft.com/fwlink/p/?LinkId=723227) +- [DevDetail CSP](http://go.microsoft.com/fwlink/p/?LinkId=723228) +- [DeviceInstanceService CSP](http://go.microsoft.com/fwlink/p/?LinkId=723275) +- [DeviceLock CSP](http://go.microsoft.com/fwlink/p/?LinkId=723370) +- [DeviceStatus CSP](http://go.microsoft.com/fwlink/p/?LinkId=723229) +- [DevInfo CSP](http://go.microsoft.com/fwlink/p/?LinkId=723230) +- [DiagnosticLog CSP](http://go.microsoft.com/fwlink/p/?LinkId=723231) +- [DMAcc CSP](http://go.microsoft.com/fwlink/p/?LinkId=723232) +- [DMClient CSP](http://go.microsoft.com/fwlink/p/?LinkId=723233) +- [Email2 CSP](http://go.microsoft.com/fwlink/p/?LinkId=723234) +- [EnterpriseAPN CSP](http://go.microsoft.com/fwlink/p/?LinkId=723235) +- [EnterpriseAppManagement CSP](http://go.microsoft.com/fwlink/p/?LinkId=723237) +- [EnterpriseAssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=618601) +- [EnterpriseDesktopAppManagement CSP](http://go.microsoft.com/fwlink/p/?LinkId=723236) +- [EnterpriseExt CSP](http://go.microsoft.com/fwlink/p/?LinkId=723423) +- [EnterpriseExtFileSystem CSP](http://go.microsoft.com/fwlink/p/?LinkID=703716) +- [EnterpriseModernAppManagement CSP](http://go.microsoft.com/fwlink/p/?LinkId=723257) +- [FileSystem CSP](http://go.microsoft.com/fwlink/p/?LinkId=723422) +- [HealthAttestation CSP](http://go.microsoft.com/fwlink/p/?LinkId=723258) +- [HotSpot CSP](http://go.microsoft.com/fwlink/p/?LinkId=723421) +- [Maps CSP](http://go.microsoft.com/fwlink/p/?LinkId=723420) +- [NAP CSP](http://go.microsoft.com/fwlink/p/?LinkId=723419) +- [NAPDEF CSP](http://go.microsoft.com/fwlink/p/?LinkId=723371) +- [NodeCache CSP]( http://go.microsoft.com/fwlink/p/?LinkId=723265) +- [PassportForWork CSP](http://go.microsoft.com/fwlink/p/?LinkID=692070) +- [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkID=623244) +- [PolicyManager CSP]( http://go.microsoft.com/fwlink/p/?LinkId=723418) +- [Provisioning CSP](http://go.microsoft.com/fwlink/p/?LinkId=723266) +- [Proxy CSP]( http://go.microsoft.com/fwlink/p/?LinkId=723372) +- [PXLOGICAL CSP](http://go.microsoft.com/fwlink/p/?LinkId=723374) +- [Registry CSP](http://go.microsoft.com/fwlink/p/?LinkId=723417) +- [RemoteFind CSP](http://go.microsoft.com/fwlink/p/?LinkId=723267) +- [RemoteWipe CSP](http://go.microsoft.com/fwlink/p/?LinkID=703714) +- [Reporting CSP](http://go.microsoft.com/fwlink/p/?LinkId=723375) +- [RootCATrustedCertificates CSP](http://go.microsoft.com/fwlink/p/?LinkId=723270) +- [SecurityPolicy CSP](http://go.microsoft.com/fwlink/p/?LinkId=723376) +- [Storage CSP](http://go.microsoft.com/fwlink/p/?LinkId=723377) +- [SUPL CSP](http://go.microsoft.com/fwlink/p/?LinkId=723378) +- [UnifiedWriteFilter CSP](http://go.microsoft.com/fwlink/p/?LinkId=723272) +- [Update CSP](http://go.microsoft.com/fwlink/p/?LinkId=723271) +- [VPN CSP](http://go.microsoft.com/fwlink/p/?LinkId=723416) +- [VPNv2 CSP](http://go.microsoft.com/fwlink/p/?LinkID=617588) +- [Wi-Fi CSP](http://go.microsoft.com/fwlink/p/?LinkID=71743) +- [WindowsLicensing CSP](http://go.microsoft.com/fwlink/p/?LinkId=723274) +- [WindowsSecurityAuditing CSP](http://go.microsoft.com/fwlink/p/?LinkId=723415) + +## Related topics + + +[Lock down Windows 10](lock-down-windows-10.md) + +[Manage corporate devices](manage-corporate-devices.md) + +[New policies for Windows 10](new-policies-for-windows-10.md) + +[Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md) + +[Changes to Group Policy settings for Start in Windows 10](changes-to-start-policies-in-windows-10.md) + +  + +  + + + + + diff --git a/windows/manage/images/aadj1.jpg b/windows/manage/images/aadj1.jpg new file mode 100644 index 0000000000..2348fc4c84 Binary files /dev/null and b/windows/manage/images/aadj1.jpg differ diff --git a/windows/manage/images/aadj2.jpg b/windows/manage/images/aadj2.jpg new file mode 100644 index 0000000000..39486bfc66 Binary files /dev/null and b/windows/manage/images/aadj2.jpg differ diff --git a/windows/manage/images/aadj3.jpg b/windows/manage/images/aadj3.jpg new file mode 100644 index 0000000000..46520c667c Binary files /dev/null and b/windows/manage/images/aadj3.jpg differ diff --git a/windows/manage/images/aadj4.jpg b/windows/manage/images/aadj4.jpg new file mode 100644 index 0000000000..0db2910012 Binary files /dev/null and b/windows/manage/images/aadj4.jpg differ diff --git a/windows/manage/images/aadjcal.jpg b/windows/manage/images/aadjcal.jpg new file mode 100644 index 0000000000..1858886f5f Binary files /dev/null and b/windows/manage/images/aadjcal.jpg differ diff --git a/windows/manage/images/aadjcalmail.jpg b/windows/manage/images/aadjcalmail.jpg new file mode 100644 index 0000000000..5a5661259a Binary files /dev/null and b/windows/manage/images/aadjcalmail.jpg differ diff --git a/windows/manage/images/aadjmail1.jpg b/windows/manage/images/aadjmail1.jpg new file mode 100644 index 0000000000..89b1fcc3b7 Binary files /dev/null and b/windows/manage/images/aadjmail1.jpg differ diff --git a/windows/manage/images/aadjmail2.jpg b/windows/manage/images/aadjmail2.jpg new file mode 100644 index 0000000000..0608010c6a Binary files /dev/null and b/windows/manage/images/aadjmail2.jpg differ diff --git a/windows/manage/images/aadjmail3.jpg b/windows/manage/images/aadjmail3.jpg new file mode 100644 index 0000000000..d7154a7e0e Binary files /dev/null and b/windows/manage/images/aadjmail3.jpg differ diff --git a/windows/manage/images/aadjonenote.jpg b/windows/manage/images/aadjonenote.jpg new file mode 100644 index 0000000000..4ccd207f9f Binary files /dev/null and b/windows/manage/images/aadjonenote.jpg differ diff --git a/windows/manage/images/aadjonenote2.jpg b/windows/manage/images/aadjonenote2.jpg new file mode 100644 index 0000000000..1b6941e638 Binary files /dev/null and b/windows/manage/images/aadjonenote2.jpg differ diff --git a/windows/manage/images/aadjonenote3.jpg b/windows/manage/images/aadjonenote3.jpg new file mode 100644 index 0000000000..3ac6911046 Binary files /dev/null and b/windows/manage/images/aadjonenote3.jpg differ diff --git a/windows/manage/images/aadjpin.jpg b/windows/manage/images/aadjpin.jpg new file mode 100644 index 0000000000..dac6cfec30 Binary files /dev/null and b/windows/manage/images/aadjpin.jpg differ diff --git a/windows/manage/images/aadjverify.jpg b/windows/manage/images/aadjverify.jpg new file mode 100644 index 0000000000..7b30210f39 Binary files /dev/null and b/windows/manage/images/aadjverify.jpg differ diff --git a/windows/manage/images/aadjwsfb.jpg b/windows/manage/images/aadjwsfb.jpg new file mode 100644 index 0000000000..428f1a26d4 Binary files /dev/null and b/windows/manage/images/aadjwsfb.jpg differ diff --git a/windows/manage/images/apprule.png b/windows/manage/images/apprule.png new file mode 100644 index 0000000000..ec5417849a Binary files /dev/null and b/windows/manage/images/apprule.png differ diff --git a/windows/manage/images/appwarning.png b/windows/manage/images/appwarning.png new file mode 100644 index 0000000000..877d8afebd Binary files /dev/null and b/windows/manage/images/appwarning.png differ diff --git a/windows/manage/images/backicon.png b/windows/manage/images/backicon.png new file mode 100644 index 0000000000..3007e448b1 Binary files /dev/null and b/windows/manage/images/backicon.png differ diff --git a/windows/manage/images/checkmark.png b/windows/manage/images/checkmark.png new file mode 100644 index 0000000000..04cc421e12 Binary files /dev/null and b/windows/manage/images/checkmark.png differ diff --git a/windows/manage/images/configconflict.png b/windows/manage/images/configconflict.png new file mode 100644 index 0000000000..011a2d76e7 Binary files /dev/null and b/windows/manage/images/configconflict.png differ diff --git a/windows/manage/images/crossmark.png b/windows/manage/images/crossmark.png new file mode 100644 index 0000000000..2b267dc802 Binary files /dev/null and b/windows/manage/images/crossmark.png differ diff --git a/windows/manage/images/csp-placeholder.png b/windows/manage/images/csp-placeholder.png new file mode 100644 index 0000000000..fe6bcf4720 Binary files /dev/null and b/windows/manage/images/csp-placeholder.png differ diff --git a/windows/manage/images/cspinicd.png b/windows/manage/images/cspinicd.png new file mode 100644 index 0000000000..a60ad9e2bf Binary files /dev/null and b/windows/manage/images/cspinicd.png differ diff --git a/windows/manage/images/csptable.png b/windows/manage/images/csptable.png new file mode 100644 index 0000000000..ee210cad69 Binary files /dev/null and b/windows/manage/images/csptable.png differ diff --git a/windows/manage/images/doneicon.png b/windows/manage/images/doneicon.png new file mode 100644 index 0000000000..d80389f35b Binary files /dev/null and b/windows/manage/images/doneicon.png differ diff --git a/windows/manage/images/genrule.png b/windows/manage/images/genrule.png new file mode 100644 index 0000000000..1d68f1ad0b Binary files /dev/null and b/windows/manage/images/genrule.png differ diff --git a/windows/manage/images/icdbrowse.png b/windows/manage/images/icdbrowse.png new file mode 100644 index 0000000000..53c91074c7 Binary files /dev/null and b/windows/manage/images/icdbrowse.png differ diff --git a/windows/manage/images/identitychoices.png b/windows/manage/images/identitychoices.png new file mode 100644 index 0000000000..9a69c04f20 Binary files /dev/null and b/windows/manage/images/identitychoices.png differ diff --git a/windows/manage/images/launchicon.png b/windows/manage/images/launchicon.png new file mode 100644 index 0000000000..d469c68a2c Binary files /dev/null and b/windows/manage/images/launchicon.png differ diff --git a/windows/manage/images/lockdownapps.png b/windows/manage/images/lockdownapps.png new file mode 100644 index 0000000000..ad928d87bc Binary files /dev/null and b/windows/manage/images/lockdownapps.png differ diff --git a/windows/manage/images/mdm.png b/windows/manage/images/mdm.png new file mode 100644 index 0000000000..8ebcc00526 Binary files /dev/null and b/windows/manage/images/mdm.png differ diff --git a/windows/manage/images/package.png b/windows/manage/images/package.png new file mode 100644 index 0000000000..f5e975e3e9 Binary files /dev/null and b/windows/manage/images/package.png differ diff --git a/windows/manage/images/phoneprovision.png b/windows/manage/images/phoneprovision.png new file mode 100644 index 0000000000..01ada29ac9 Binary files /dev/null and b/windows/manage/images/phoneprovision.png differ diff --git a/windows/manage/images/policytocsp.png b/windows/manage/images/policytocsp.png new file mode 100644 index 0000000000..80ca76cb62 Binary files /dev/null and b/windows/manage/images/policytocsp.png differ diff --git a/windows/manage/images/powericon.png b/windows/manage/images/powericon.png new file mode 100644 index 0000000000..b497ff859d Binary files /dev/null and b/windows/manage/images/powericon.png differ diff --git a/windows/manage/images/priv-settings-table-1511.png b/windows/manage/images/priv-settings-table-1511.png new file mode 100644 index 0000000000..5a635c240a Binary files /dev/null and b/windows/manage/images/priv-settings-table-1511.png differ diff --git a/windows/manage/images/priv-telemetry-levels.png b/windows/manage/images/priv-telemetry-levels.png new file mode 100644 index 0000000000..9581cee54d Binary files /dev/null and b/windows/manage/images/priv-telemetry-levels.png differ diff --git a/windows/manage/images/provisioning-csp-assignedaccess.png b/windows/manage/images/provisioning-csp-assignedaccess.png new file mode 100644 index 0000000000..14d49cdd89 Binary files /dev/null and b/windows/manage/images/provisioning-csp-assignedaccess.png differ diff --git a/windows/manage/images/resetdevice.png b/windows/manage/images/resetdevice.png new file mode 100644 index 0000000000..4e265c3f8d Binary files /dev/null and b/windows/manage/images/resetdevice.png differ diff --git a/windows/manage/images/settingsicon.png b/windows/manage/images/settingsicon.png new file mode 100644 index 0000000000..0ad27fc558 Binary files /dev/null and b/windows/manage/images/settingsicon.png differ diff --git a/windows/manage/images/start-pinned-app.png b/windows/manage/images/start-pinned-app.png new file mode 100644 index 0000000000..e1e4a24a00 Binary files /dev/null and b/windows/manage/images/start-pinned-app.png differ diff --git a/windows/manage/images/startannotated.png b/windows/manage/images/startannotated.png new file mode 100644 index 0000000000..d46f3a70c2 Binary files /dev/null and b/windows/manage/images/startannotated.png differ diff --git a/windows/manage/images/starticon.png b/windows/manage/images/starticon.png new file mode 100644 index 0000000000..fa8cbdff10 Binary files /dev/null and b/windows/manage/images/starticon.png differ diff --git a/windows/manage/images/startlayoutpolicy.jpg b/windows/manage/images/startlayoutpolicy.jpg new file mode 100644 index 0000000000..d3c8d054fe Binary files /dev/null and b/windows/manage/images/startlayoutpolicy.jpg differ diff --git a/windows/manage/images/starttemplate.jpg b/windows/manage/images/starttemplate.jpg new file mode 100644 index 0000000000..900eed08c5 Binary files /dev/null and b/windows/manage/images/starttemplate.jpg differ diff --git a/windows/manage/images/w10servicing-f1-branches.png b/windows/manage/images/w10servicing-f1-branches.png new file mode 100644 index 0000000000..ac4a549aed Binary files /dev/null and b/windows/manage/images/w10servicing-f1-branches.png differ diff --git a/windows/manage/images/wifisense-grouppolicy.png b/windows/manage/images/wifisense-grouppolicy.png new file mode 100644 index 0000000000..1142d834bd Binary files /dev/null and b/windows/manage/images/wifisense-grouppolicy.png differ diff --git a/windows/manage/images/wifisense-registry.png b/windows/manage/images/wifisense-registry.png new file mode 100644 index 0000000000..cbb1fa8347 Binary files /dev/null and b/windows/manage/images/wifisense-registry.png differ diff --git a/windows/manage/images/wifisense-settingscreens.png b/windows/manage/images/wifisense-settingscreens.png new file mode 100644 index 0000000000..cbb6903177 Binary files /dev/null and b/windows/manage/images/wifisense-settingscreens.png differ diff --git a/windows/manage/images/win10-mobile-mdm-fig1.png b/windows/manage/images/win10-mobile-mdm-fig1.png new file mode 100644 index 0000000000..6ddac1df99 Binary files /dev/null and b/windows/manage/images/win10-mobile-mdm-fig1.png differ diff --git a/windows/manage/images/win10servicing-fig2-featureupgrade.png b/windows/manage/images/win10servicing-fig2-featureupgrade.png new file mode 100644 index 0000000000..e4dc76b44f Binary files /dev/null and b/windows/manage/images/win10servicing-fig2-featureupgrade.png differ diff --git a/windows/manage/images/win10servicing-fig3.png b/windows/manage/images/win10servicing-fig3.png new file mode 100644 index 0000000000..688f92b173 Binary files /dev/null and b/windows/manage/images/win10servicing-fig3.png differ diff --git a/windows/manage/images/win10servicing-fig4-upgradereleases.png b/windows/manage/images/win10servicing-fig4-upgradereleases.png new file mode 100644 index 0000000000..961c8bebe2 Binary files /dev/null and b/windows/manage/images/win10servicing-fig4-upgradereleases.png differ diff --git a/windows/manage/images/win10servicing-fig5.png b/windows/manage/images/win10servicing-fig5.png new file mode 100644 index 0000000000..dc4b2fc5b2 Binary files /dev/null and b/windows/manage/images/win10servicing-fig5.png differ diff --git a/windows/manage/images/win10servicing-fig6.png b/windows/manage/images/win10servicing-fig6.png new file mode 100644 index 0000000000..4cdc5f9c6f Binary files /dev/null and b/windows/manage/images/win10servicing-fig6.png differ diff --git a/windows/manage/images/win10servicing-fig7.png b/windows/manage/images/win10servicing-fig7.png new file mode 100644 index 0000000000..0a9a851449 Binary files /dev/null and b/windows/manage/images/win10servicing-fig7.png differ diff --git a/windows/manage/images/wsfb-distribute.png b/windows/manage/images/wsfb-distribute.png new file mode 100644 index 0000000000..f276ca5211 Binary files /dev/null and b/windows/manage/images/wsfb-distribute.png differ diff --git a/windows/manage/images/wsfb-firstrun.png b/windows/manage/images/wsfb-firstrun.png new file mode 100644 index 0000000000..2673567a1e Binary files /dev/null and b/windows/manage/images/wsfb-firstrun.png differ diff --git a/windows/manage/images/wsfb-inventory-viewlicense.png b/windows/manage/images/wsfb-inventory-viewlicense.png new file mode 100644 index 0000000000..9fafad1aff Binary files /dev/null and b/windows/manage/images/wsfb-inventory-viewlicense.png differ diff --git a/windows/manage/images/wsfb-inventoryaddprivatestore.png b/windows/manage/images/wsfb-inventoryaddprivatestore.png new file mode 100644 index 0000000000..b7152ea973 Binary files /dev/null and b/windows/manage/images/wsfb-inventoryaddprivatestore.png differ diff --git a/windows/manage/images/wsfb-landing.png b/windows/manage/images/wsfb-landing.png new file mode 100644 index 0000000000..beae0b52af Binary files /dev/null and b/windows/manage/images/wsfb-landing.png differ diff --git a/windows/manage/images/wsfb-licenseassign.png b/windows/manage/images/wsfb-licenseassign.png new file mode 100644 index 0000000000..5904abb3b9 Binary files /dev/null and b/windows/manage/images/wsfb-licenseassign.png differ diff --git a/windows/manage/images/wsfb-licensedetails.png b/windows/manage/images/wsfb-licensedetails.png new file mode 100644 index 0000000000..53e0f5c935 Binary files /dev/null and b/windows/manage/images/wsfb-licensedetails.png differ diff --git a/windows/manage/images/wsfb-licensereclaim.png b/windows/manage/images/wsfb-licensereclaim.png new file mode 100644 index 0000000000..9f94cd3600 Binary files /dev/null and b/windows/manage/images/wsfb-licensereclaim.png differ diff --git a/windows/manage/images/wsfb-manageinventory.png b/windows/manage/images/wsfb-manageinventory.png new file mode 100644 index 0000000000..9a544ddc21 Binary files /dev/null and b/windows/manage/images/wsfb-manageinventory.png differ diff --git a/windows/manage/images/wsfb-offline-distribute-mdm.png b/windows/manage/images/wsfb-offline-distribute-mdm.png new file mode 100644 index 0000000000..ec0e77a9a9 Binary files /dev/null and b/windows/manage/images/wsfb-offline-distribute-mdm.png differ diff --git a/windows/manage/images/wsfb-onboard-1.png b/windows/manage/images/wsfb-onboard-1.png new file mode 100644 index 0000000000..012e91a845 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-1.png differ diff --git a/windows/manage/images/wsfb-onboard-2.png b/windows/manage/images/wsfb-onboard-2.png new file mode 100644 index 0000000000..2ff98fb1f7 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-2.png differ diff --git a/windows/manage/images/wsfb-onboard-3.png b/windows/manage/images/wsfb-onboard-3.png new file mode 100644 index 0000000000..ed9a61d353 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-3.png differ diff --git a/windows/manage/images/wsfb-onboard-4.png b/windows/manage/images/wsfb-onboard-4.png new file mode 100644 index 0000000000..d99185ddc6 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-4.png differ diff --git a/windows/manage/images/wsfb-onboard-5.png b/windows/manage/images/wsfb-onboard-5.png new file mode 100644 index 0000000000..68049f4425 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-5.png differ diff --git a/windows/manage/images/wsfb-onboard-7.png b/windows/manage/images/wsfb-onboard-7.png new file mode 100644 index 0000000000..38b7348b21 Binary files /dev/null and b/windows/manage/images/wsfb-onboard-7.png differ diff --git a/windows/manage/images/wsfb-online-distribute-mdm.png b/windows/manage/images/wsfb-online-distribute-mdm.png new file mode 100644 index 0000000000..4b0f7cbf3a Binary files /dev/null and b/windows/manage/images/wsfb-online-distribute-mdm.png differ diff --git a/windows/manage/images/wsfb-permissions-assignrole.png b/windows/manage/images/wsfb-permissions-assignrole.png new file mode 100644 index 0000000000..de2e1785ba Binary files /dev/null and b/windows/manage/images/wsfb-permissions-assignrole.png differ diff --git a/windows/manage/images/wsfb-privatestore.png b/windows/manage/images/wsfb-privatestore.png new file mode 100644 index 0000000000..74c9f1690d Binary files /dev/null and b/windows/manage/images/wsfb-privatestore.png differ diff --git a/windows/manage/images/wsfb-privatestoreapps.png b/windows/manage/images/wsfb-privatestoreapps.png new file mode 100644 index 0000000000..1ddb543796 Binary files /dev/null and b/windows/manage/images/wsfb-privatestoreapps.png differ diff --git a/windows/manage/images/wsfb-renameprivatestore.png b/windows/manage/images/wsfb-renameprivatestore.png new file mode 100644 index 0000000000..c6db282581 Binary files /dev/null and b/windows/manage/images/wsfb-renameprivatestore.png differ diff --git a/windows/manage/images/wsfb-settings-mgmt.png b/windows/manage/images/wsfb-settings-mgmt.png new file mode 100644 index 0000000000..2a7b590d19 Binary files /dev/null and b/windows/manage/images/wsfb-settings-mgmt.png differ diff --git a/windows/manage/images/wsfb-settings-permissions.png b/windows/manage/images/wsfb-settings-permissions.png new file mode 100644 index 0000000000..63d04d270b Binary files /dev/null and b/windows/manage/images/wsfb-settings-permissions.png differ diff --git a/windows/manage/images/wsfb-wsappaddacct.png b/windows/manage/images/wsfb-wsappaddacct.png new file mode 100644 index 0000000000..5c0bd9a4ce Binary files /dev/null and b/windows/manage/images/wsfb-wsappaddacct.png differ diff --git a/windows/manage/images/wsfb-wsappprivatestore.png b/windows/manage/images/wsfb-wsappprivatestore.png new file mode 100644 index 0000000000..9c29e7604c Binary files /dev/null and b/windows/manage/images/wsfb-wsappprivatestore.png differ diff --git a/windows/manage/images/wsfb-wsappsignin.png b/windows/manage/images/wsfb-wsappsignin.png new file mode 100644 index 0000000000..c2c2631a94 Binary files /dev/null and b/windows/manage/images/wsfb-wsappsignin.png differ diff --git a/windows/manage/images/wsfb-wsappworkacct.png b/windows/manage/images/wsfb-wsappworkacct.png new file mode 100644 index 0000000000..5eb9035124 Binary files /dev/null and b/windows/manage/images/wsfb-wsappworkacct.png differ diff --git a/windows/manage/introduction-to-windows-10-servicing.md b/windows/manage/introduction-to-windows-10-servicing.md new file mode 100644 index 0000000000..acecc206b2 --- /dev/null +++ b/windows/manage/introduction-to-windows-10-servicing.md @@ -0,0 +1,362 @@ +--- +title: Windows 10 servicing options for updates and upgrades (Windows 10) +description: This article describes the new servicing options available in Windows 10, Windows 10 Mobile, and IoT Core and how they enable enterprises to keep their devices current with the latest feature upgrades. +ms.assetid: D1DEB7C0-283F-4D7F-9A11-EE16CB242B42 +keywords: ["update", "LTSB", "lifecycle", "Windows update", "upgrade"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Windows 10 servicing options for updates and upgrades + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile +- Windows 10 IoT Core (IoT Core) + +**In this article** + +- [Introduction](#introduction) +- [Streamlined product development and release cycles](#streamlined_product_development_and_release_cycles) +- [New Windows 10 delivery and installation alternatives](#new_windows_10_delivery_and_installation_alternatives) +- [Windows 10 servicing options](#windows_10_servicing_options) +- [Plan for Windows 10 deployment](#plan_for_windows_10_deployment) +- [Servicing options and servicing branch designations](#servicing_options_and_servicing_branch_designations) +- [Related topics](#related_topics) + +This article describes the new servicing options available in Windows 10, Windows 10 Mobile, and IoT Core and how they enable enterprises to keep their devices current with the latest feature upgrades. It also covers related topics, such as how enterprises can make better use of Windows Update, and what the new servicing options mean for support lifecycles. + +**Note**   +Several of the figures in this article show multiple feature upgrades of Windows being released by Microsoft over time. Be aware that these figures were created with dates that were chosen for illustrative clarity, not for release roadmap accuracy, and should not be used for planning purposes. + +  + +## Introduction + + +In enterprise IT environments, the desire to provide users with the latest technologies needs to be balanced with the need for manageability and cost control. In the past, many enterprises managed their Windows deployments homogeneously and performed large-scale upgrades to new releases of Windows (often in parallel with large-scale hardware upgrades) about every three to six years. Today, the rapid evolution of Windows as a platform for device-like experiences is causing businesses to rethink their upgrade strategies. Especially with the release of Windows 10, there are good business reasons to keep a significant portion of your enterprise's devices *current* with the latest release of Windows. For example, during the development of Windows 10, Microsoft: + +- Streamlined the Windows product engineering and release cycle so that Microsoft can deliver the features, experiences, and functionality customers want, more quickly than ever. + +- Created new ways to deliver and install feature upgrades and servicing updates that simplify deployments and on-going management, broaden the base of employees who can be kept current with the latest Windows capabilities and experiences, and lower total cost of ownership. + +- Implemented new servicing options – referred to as Current Branch (CB), Current Branch for Business (CBB), and Long-Term Servicing Branch (LTSB) – that provide pragmatic solutions to keep more devices more current in enterprise environments than was previously possible. + +The remainder of this article provides additional information about each of these areas. This article also provides an overview of the planning implications of the three Windows 10 servicing options (summarized in Table 1) so that IT administrators can be well-grounded conceptually before they start a Windows 10 deployment project. + +Table 1. Windows 10 servicing options + +| Servicing option | Availability of new feature upgrades for installation | Minimum length of servicing lifetime | Key benefits | Supported editions | +|-----------------------------------|-----------------------------------------------------------|--------------------------------------|-------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------| +| Current Branch (CB) | Immediately after first published by Microsoft | Approximately 4 months | Makes new features available to users as soon as possible | Home, Pro, Education, Enterprise, Mobile, IoT Core, Windows 10 IoT Core Pro (IoT Core Pro) | +| Current Branch for Business (CBB) | Approximately 4 months after first published by Microsoft | Approximately 8 months | Provides additional time to test new feature upgrades before deployment | Pro, Education, Enterprise, Mobile Enterprise, IoT Core Pro | +| Long-Term Servicing Branch (LTSB) | Immediately after published by Microsoft | 10 Years | Enables long-term deployment of selected Windows 10 releases in low-change configurations | Enterprise LTSB | + +  + +## Streamlined product development and release cycles + + +**Product cycles and builds** + +The Windows engineering team adds new features and functionality to Windows through *product cycles* comprised of development, testing, and release phases. Each day during a product cycle, the team compiles the source code for Windows and assembles the output into a *build* that users can install on their devices. The first recipients of builds are Microsoft employees who begin what Microsoft calls *selfhost* testing. + +**Testing and release prior to Windows 10** + +Prior to Windows 10, Microsoft issued and extensively tested many builds internally before selecting one for testing outside Microsoft. After repeating the external test cycle several times against builds of progressively better quality, the engineering team selected a build to enter the release phase. At the end of this phase, the team published the build as a new version of Windows – an event referred to as the *Release to Manufacturing* (RTM) milestone. In total, product cycles took between one and three years to complete, with testing and release processes taking up as much as half of the total investment in time. + +**A different approach for Windows 10** + +In today’s environment, where user expectations frequently are set by device-centric experiences, complete product cycles need to be measured in months, not years. Additionally, new releases must be made available on a continual basis, and must be deployable with minimal impact on users. Microsoft designed Windows 10 to meet these requirements by implementing a new approach to innovation development and delivery called *Windows as a Service* (WaaS). + +The key to enabling significantly shorter product cycles while maintaining high quality levels is an innovative community-centric approach to testing that Microsoft has implemented for Windows 10. The community, known as Windows Insiders, is comprised of millions of users around the world. When Windows Insiders opt in to the community, they test many builds over the course of a product cycle, and provide feedback to Microsoft through an iterative methodology called *flighting*. + +Builds distributed as *flights* provide the Windows engineering team with significant data regarding how well builds are performing in actual use. Flighting with Windows Insiders also enables Microsoft to test builds in much more diverse hardware, application, and networking environments than in the past, and to identify issues far more quickly. As a result, Microsoft believes that community-focused flighting will enable both a faster pace of innovation delivery, and better public release quality than ever. + +**Windows 10 release types and cadences** + +Although Microsoft releases flight builds to Windows Insiders, Microsoft will publish two types of Windows 10 releases broadly to the public on an ongoing basis: + +- **Feature upgrades** that install the latest new features, experiences, and capabilities on devices that are already running Windows 10. Because feature upgrades contain an entire copy of Windows, they are also what customers use to install Windows 10 on existing devices running Windows 7 or Windows 8.1, and on new devices where no operating system is installed. + +- **Servicing updates** that focus on the installation of security fixes and other important updates. + +Microsoft expects to publish an average of two to three new feature upgrades per year, and to publish servicing updates as needed for any feature upgrades that are still in support. Microsoft will continue publishing servicing updates on Update Tuesday (sometimes referred to as Patch Tuesday). Additionally, Microsoft may publish additional servicing updates for Windows 10 outside the Update Tuesday process when required to address customer needs. + +**The cumulative nature of all Windows 10 releases** + +It is important to note that, in order to improve release quality and simplify deployments, all new releases that Microsoft publishes for Windows 10 will be *cumulative*. This means new feature upgrades and servicing updates will contain the *payloads* of all previous releases (in an optimized form to reduce storage and networking requirements), and installing the release on a device will bring it completely up to date. Also, unlike earlier versions of Windows, you cannot install a subset of the contents of a Windows 10 servicing update. For example, if a servicing update contains fixes for three security vulnerabilities and one reliability issue, deploying the update will result in the installation of all four fixes.   + +## New Windows 10 delivery and installation alternatives + + +As with earlier releases of Windows, Windows 10 includes support for the deployment of new releases using Windows Update, Windows Server Update Services, System Center Configuration Manager, and third-party configuration management tools. Because of the importance of the Windows as a Service (WaaS) approach to delivering innovations to businesses, and the proven ability of Windows Update to deploy releases quickly and seamlessly to consumers and small businesses, several of the largest investments in Windows 10 focus on enabling broader use of Windows Update within enterprises. + +**Windows Update use by consumers and small businesses** + +Since Microsoft introduced the first generation of Windows Update with Windows 95, Windows Update has evolved to become the standard way for consumers and small businesses to help keep devices running Windows secure and running reliably. Almost one billion Windows devices communicate with the Windows Update service on a regular basis. The process of downloading and installing updates has evolved to be less and less obtrusive to users. More recently, Microsoft also has used Windows Update to deliver larger, feature-centric updates, such as the upgrade from Windows 8 to Windows 8.1, and is using Windows Update to upgrade devices running Windows 7 and Windows 8.1 to Windows 10. + +**Windows Update use within enterprises** + +Although Windows Update greatly simplifies and accelerates update deployment, enterprises are not using Windows Update as broadly as consumers and small businesses. This is largely because Windows Update maintains control over which updates are installed and the timing of installation. This makes it difficult for IT administrators to test updates before deployment in their specific environment. + +**The role of Windows Server Update Services** + +To help address the concerns of IT administrators, Microsoft released Windows Server Update Services in 2005. Windows Server Update Services enables IT administrators to obtain the updates that Windows Update determines are applicable to the devices in their enterprise, perform additional testing and evaluation on the updates, and select the updates they want to install. Windows Server Update Services also provides IT administrators with an all or nothing way to specify when they want an approved update to be installed. Because IT administrators ultimately select and install most updates identified by Windows Update, the role of Windows Server Update Services in many enterprises is to provide IT administrators with the additional time they need to gain confidence in the quality of updates prior to deployment. + +**New Windows Update capabilities in Windows 10** + +To enable enterprises to manage more of their devices using Windows Update directly, Windows 10 provides IT administrators with a way to configure devices so that Windows Update will defer new feature upgrade installations until approximately four months after Microsoft first publishes them. The additional time can be used to perform testing or enable releases to gain additional time in market prior to deployment. + +At the end of each approximately four month period, Microsoft executes a set of processes that require no action from enterprise IT administrators. First, Microsoft creates new installation media for the feature upgrade by combining the original installation media with all the servicing updates published by Microsoft since the original media’s release. This reduces the time it can take to install a feature upgrade on a device. Second, Microsoft *republishes* the new media to Windows Update with *targeting* instructions that state (in effect) “install this media on devices that are configured for deferred installation of new feature upgrades.” At this point, devices configured to defer installation will begin receiving and installing the feature upgrade automatically. + +**The role of Windows Update for Business** + +Although Windows 10 will enable IT administrators to defer installation of new feature upgrades using Windows Update, enterprises may also want additional control over how and when Windows Update installs releases. With this need in mind, Microsoft [announced Windows Update for Business](http://go.microsoft.com/fwlink/p/?LinkId=624798) in May of 2015. Microsoft designed Windows Update for Business to provide IT administrators with additional Windows Update-centric management capabilities, such as the ability to deploy updates to groups of devices and to define maintenance windows for installing releases. This article will be updated with additional information about the role of Windows Update for Business in servicing Windows 10 devices as it becomes available. + +## Windows 10 servicing options + + +Historically, because of the length of time between releases of new Windows versions, and the relatively low number of enterprise devices that were upgraded to newer versions of Windows during their deployment lifetimes, most IT administrators defined servicing as installing the updates that Microsoft published every month. Looking forward, because Microsoft will be publishing new feature upgrades on a continual basis, *servicing* will also include (on some portion of an enterprise's devices) installing new feature upgrades as they become available. + +In fact, when planning to deploy Windows 10 on a device, one of the most important questions for IT administrators to ask is, “What should happen to this device when Microsoft publishes a new feature upgrade?” This is because Microsoft designed Windows 10 to provide businesses with multiple servicing options, centered on enabling different rates of feature upgrade adoption. In particular, IT administrators can configure Windows 10 devices to: + +- Receive feature upgrades immediately after Microsoft makes them available publicly, so that users gain access to new features, experiences, and functionality as soon as possible. For more information, see [Immediate feature upgrade installation with Current Branch (CB) servicing](#immediate_upgrade_CB). + +- Defer receiving feature upgrades for a period of approximately four months after Microsoft makes them available publicly, to provide IT administrators with time to perform pre-deployment testing and provide feature upgrades releases with additional time-in-market to mature. For more information, see [Deferred feature upgrade installation with Current Branch for Business (CBB) servicing](#deferred_upgrade_CBB). + +- Receive only servicing updates for the duration of their Windows 10 deployment in order to reduce the number of non-essential changes made to the device. For more information, see [Install servicing updates only by using Long-Term Servicing Branch (LTSB) servicing](#install_updates_LTSB). + +The breakout of a company’s devices by the categories above is likely to vary significantly by industry and other factors. What is most important is that companies can decide what works best for them and can choose different options for different devices. + +## Plan for Windows 10 deployment + + +The remainder of this article focuses on the description of the three options outlined above, and their planning implications, in more detail. In practice, IT administrators have to focus on two areas when planning a Windows 10 device deployment: + +- **When should new feature upgrades be deployed?** Should the device install new feature upgrades when they are published by Microsoft? If so, should installation occur immediately or on a deferred basis? + +- **How will releases be installed on devices?** Will Windows Update or Windows Server Update Services be used to install new releases, or will installation be performed using a configuration management system such as Configuration Manager? + +The content that follows will provide IT administrators with the context needed to understand why these areas are pivotal, and the choices available to them. + +**How Microsoft releases Windows 10 feature upgrades** + +When it is time to release a build as a new feature upgrade for Windows 10, Microsoft performs several processes in sequence. The first process involves creating either one or two servicing branches in a source code management system. These branches (shown in Figure 1) are required to produce feature upgrade installation media and servicing update packages that can be deployed on different Windows 10 editions, running in different configurations. + +![figure 1](images/w10servicing-f1-branches.png) + +Figure 1. Feature upgrades and servicing branches + +In all cases, Microsoft creates a servicing branch (referred to in Figure 1 as Servicing Branch \#1) that is used to produce releases for approximately one year (although the lifetime of the branch will ultimately depend on when Microsoft publishes subsequent feature upgrade releases). If Microsoft has selected the feature upgrade to receive long-term servicing-only support, Microsoft also creates a second servicing branch (referred to in Figure 1 as Servicing Branch \#2) that is used to produce servicing update releases for up to 10 years. + +As shown in Figure 2, when Microsoft publishes a new feature upgrade, Servicing Branch \#1 is used to produce the various forms of media needed by OEMs, businesses, and consumers to install Windows 10 Home, Pro, Education, and Enterprise editions. Microsoft also produces the files needed by Windows Update to distribute and install the feature upgrade, along with *targeting* information that instructs Windows Update to only install the files on devices configured for *immediate* installation of feature upgrades. + +![figure 2](images/win10servicing-fig2-featureupgrade.png) + +Figure 2. Producing feature upgrades from servicing branches + +Approximately four months after publishing the feature upgrade, Microsoft uses Servicing Branch \#1 again to *republish* updated installation media for Windows 10 Pro, Education, and Enterprise editions. The updated media contains the exact same feature upgrade as contained in the original media except Microsoft also includes all the servicing updates that were published since the feature upgrade was first made available. This enables the feature upgrade to be installed on a device more quickly, and in a way that is potentially less obtrusive to users. + +Concurrently, Microsoft also changes the way the feature upgrade is published in the Windows Update service. In particular, the files used by Windows Update to distribute and install the feature upgrade are refreshed with the updated versions, and the targeting instructions are changed so that the updated feature upgrade will now be installed on devices configured for *deferred* installation of feature upgrades. + +**How Microsoft publishes the Windows 10 Enterprise LTSB Edition** + +If Microsoft has selected the feature upgrade to receive long-term servicing support, Servicing Branch \#2 is used to publish the media needed to install the Windows 10 Enterprise LTSB edition. The time between releases of feature upgrades with long-term servicing support will vary between one and three years, and is strongly influenced by input from customers regarding the readiness of the release for long-term enterprise deployment. Figure 2 shows the Windows 10 Enterprise LTSB edition being published at the same time as the other Windows 10 editions, which mirrors the way editions were actually published for Windows 10 in July of 2015. It is important to note that this media is never published to Windows Update for deployment. Installations of the Enterprise LTSB edition on devices must be performed another way. + +**How Microsoft releases Windows 10 servicing updates** + +As shown in Figure 3, servicing branches are also used by Microsoft to produce servicing updates containing fixes for security vulnerabilities and other important issues. Servicing updates are published in a way that determines the Windows 10 editions on which they can be installed. For example, servicing updates produced from a given servicing branch can only be installed on devices running a Windows 10 edition produced from the same servicing branch. In addition, because Windows 10 Home does not support deferred installation of feature upgrades, servicing updates produced from Servicing Branch \#1 are targeted at devices running Windows 10 Home only until Microsoft publishes feature upgrades for deferred installation. + +![figure 3](images/win10servicing-fig3.png) + +Figure 3. Producing servicing updates from servicing branches + +**Release installation alternatives** + +When IT administrators select Windows Update and/or Windows Server Update Services to deploy feature upgrades and servicing updates, Windows 10 and Windows Update will determine and deploy the correct releases for each of the three servicing options at the appropriate times. If there are multiple feature upgrades receiving long-term servicing support at the same time, Windows Update will select updates for each device that are appropriate for the feature upgrades they are running. + +When IT administrators manage deployments of feature upgrades and servicing updates directly with configuration management products such as Configuration Manager, they are responsible for the timing of installation of both feature upgrades and servicing updates. It is important to note that until IT administrators install a new servicing update, devices may remain exposed to security vulnerabilities. Therefore, when managing deployments directly, IT administrators should deploy new servicing updates as soon as possible. + +## Servicing options and servicing branch designations + + +Servicing options have several different attributes that affect deployment planning decisions. For example, each servicing option: + +- Is supported on a selected set of Windows 10 editions (and no Windows 10 edition supports all three servicing options). + +- Has a policy that determines the periods of time during which Microsoft will produce servicing updates for a given feature upgrade. + +- Has a policy that determines when devices being managed by Windows Update or Windows Server Update Services will install new feature upgrades when they become available from Microsoft. + +Because the servicing lifetime of a feature upgrade typically ends when the servicing lifetime of the subsequent feature upgrade begins, the length of servicing lifetimes will also vary. To simplify referring to these ranges, Microsoft created *servicing branch designations* for each of the three time range/servicing branch combinations. The designations are Current Branch (CB), Current Branch for Business (CBB), and Long-Term Servicing Branch (LTSB). + +Because there is a one-to-one mapping between servicing options and servicing branch designations, Microsoft occasionally refers to servicing options using servicing branch-centric terminology. The following sections describe servicing options and servicing branch designations, including terminology, servicing lifetime policies, upgrade behavior, and edition support, in more detail. + +**Service lifetime and feature upgrade installation paths** + +Although Microsoft is currently planning to release approximately two to three feature upgrades per year, the actual frequency and timing of releases will vary. Because the servicing lifetimes of feature upgrades typically end when the servicing lifetimes of other, subsequent feature upgrades begin, the lengths of servicing lifetimes will also vary. + +![figure 4](images/win10servicing-fig4-upgradereleases.png) + +Figure 4. Example release cadence across multiple feature upgrades + +To show the variability of servicing lifetimes, and show the paths that feature upgrade installations will take when Windows Update and Windows Server Update Services are used for deployments, Figure 4 contains three feature upgrade releases (labeled *X*, *Y*, and *Z*) and their associated servicing branches. The time period between publishing X and Y is four months, and the time period between publishing Y and Z is six months. X and Z have long-term servicing support, and Y has shorter-term servicing support only. + +The same underlying figure will be used in subsequent figures to show all three servicing options in detail. It is important to note that Figure 4 is provided for illustration of servicing concepts only and should not be used for actual Windows 10 release planning. + +To simplify the servicing lifetime and feature upgrade behavior explanations that follow, this document refers to branch designations for a specific feature upgrade as the +0 versions, the designations for the feature upgrade after the +0 version as the +1 (or successor) versions, and the designation for the feature upgrade after the +1 version as the +2 (or second successor) versions. + +### + +**Immediate feature upgrade installation with Current Branch (CB) servicing** + +As shown in Figure 5, the Current Branch (CB) designation refers to Servicing Branch \#1 during the period that starts when Microsoft publishes a feature upgrade targeted for devices configured for *immediate* installation and ends when Microsoft publishes the *successor* feature upgrade targeted for devices configured for *immediate* installation. + +![figure 5](images/win10servicing-fig5.png) + +Figure 5. Immediate installation with Current Branch Servicing + +The role of Servicing Branch \#1 during the CB period is to produce feature upgrades and servicing updates for Windows 10 devices configured for *immediate* installation of new feature upgrades. Microsoft refers to devices configured this way as being *serviced from CBs*. The Windows 10 editions that support servicing from CBs are Home, Pro, Education, and Enterprise. The Current Branch designation is intended to reflect the fact that devices serviced using this approach will be kept as current as possible with respect to the latest Windows 10 feature upgrade release. + +Windows 10 Home supports Windows Update for release deployment. Windows 10 editions (Pro, Education, and Enterprise) support Windows Update, Windows Server Update Services, Configuration Manager, and other configuration management systems: + +- When IT administrators use Windows Update to manage deployments, devices will receive new feature upgrades and servicing updates as soon as they are published by Microsoft in the Windows Update service, targeted to devices configured for *immediate* feature upgrade installation. + +- When devices are being managed by using Windows Server Update Services, the same workflows are executed as with Windows Update except IT administrators must approve releases before installations begin. + +- When using configuration management systems such as Configuration Manager to manage deployments, IT administrators can obtain installation media from Microsoft and deploy new feature upgrades immediately by using standard change control processes. IT administrators who use configuration management systems should also make sure to obtain and deploy all servicing updates published by Microsoft as soon as possible. + +It is important to note that devices serviced from CBs must install two to three feature upgrades per year to remain current and continue to receive servicing updates. + +### + +**Deferred feature upgrade installation with Current Branch for Business (CBB) servicing** + +As shown in Figure 6, the Current Branch for Business (CBB) designation refers to Servicing Branch \#1 during the period that starts when Microsoft republishes a feature upgrade targeted for devices configured for *deferred* installation and ends when Microsoft republishes the *second successor* feature upgrade targeted for devices configured for *deferred* installation. + +![figure 6](images/win10servicing-fig6.png) + +Figure 6. Deferred installation with Current Branch for Business Servicing + +The role of Servicing Branch \#1 during the CBB period is to produce feature upgrades and servicing updates for Windows 10 devices configured for *deferred* installation of new feature upgrades. Microsoft refers to devices configured this way as being *serviced from CBBs*. The Windows 10 editions that support servicing from CBBs are Pro, Education, and Enterprise. The Current Branch for Business designation is intended to reflect the fact that many businesses require IT administrators to test feature upgrades prior to deployment, and servicing devices from CBBs is a pragmatic solution for businesses with testing constraints to remain as current as possible. + +Windows 10 (Pro, Education, and Enterprise editions) support release deployment by using Windows Update, Windows Server Update Services, Configuration Manager, and other configuration management systems: + +- When IT administrators use Windows Update to manage deployments, devices will receive new feature upgrades and servicing updates as soon as they are published by Microsoft in the Windows Update service, targeted to devices configured for *deferred* feature upgrade installation. It is important to note that, even when devices are configured to defer installations, all servicing updates that are applicable to the feature upgrade that is running on a device will be installed immediately after being published by Microsoft in the Windows Update service. + +- When devices are being managed through Windows Server Update Services, the same workflows are executed as with Windows Update except IT administrators must approve releases before installations begin. + +- When using configuration management systems such as Configuration Manager to manage deployments, IT administrators can obtain media published for deferred installation from Microsoft and deploy new feature upgrades by using standard change control processes. When deferring feature upgrade installations, IT administrators should still deploy all applicable servicing updates as soon as they become available from Microsoft. + +Microsoft designed Windows 10 servicing lifetime policies so that CBBs will receive servicing updates for approximately twice as many months as CBs. This enables two CBBs to receive servicing support at the same time, which provides businesses with more flexibility when deploying new feature upgrades. That said, it is important to note that Microsoft will not produce servicing updates for a feature upgrade after its corresponding CBB reaches the end of its servicing lifetime. This means that feature upgrade deployments cannot be extended indefinitely and IT administrators should ensure that they deploy newer feature upgrades onto devices before CBBs end. + +### + +**Install servicing updates only by using Long-Term Servicing Branch (LTSB) servicing** + +As shown in Figure 7, the Long-Term Servicing Branch (LTSB) designation refers to Servicing Branch \#2 from beginning to end. LTSBs begin when a feature upgrade with long-term support is published by Microsoft and end after 10 years. It is important to note that only the Windows 10 Enterprise LTSB edition supports long-term servicing, and there are important differences between this edition and other Windows 10 editions regarding upgradability and feature set (described below in the [Considerations when configuring devices for servicing updates only](#servicing_only) section). + +![figure 7](images/win10servicing-fig7.png) + +Figure 7. Servicing updates only using LTSB Servicing + +The role of LTSBs is to produce servicing updates for devices running Windows 10 configured to install servicing updates only. Devices configured this way are referred to as being *serviced from LTSBs*. The Long-Term Servicing Branch designation is intended to reflect the fact that this servicing option is intended for scenarios where changes to software running on devices must be limited to essential updates (such as those for security vulnerabilities and other important issues) for the duration of deployments. + +Windows 10 Enterprise LTSB supports release deployment by using Windows Update, Windows Server Update Services, Configuration Manager, and other configuration management systems: + +- When IT administrators use Windows Update to manage deployments, Windows Update will install only servicing updates, and do so as soon as they are published by Microsoft in the Windows Update service. Windows Update does not install feature upgrades on devices configured for long-term servicing. + +- When devices are being managed using Windows Server Update Services, the same workflows are executed as with Windows Update except IT administrators must approve releases before installations begin. + +- When using configuration management systems such as System Center Configuration Manager to manage deployments, IT administrators should make sure to obtain and deploy all servicing updates published by Microsoft as soon as possible. + +**Note**   +It is important to note again that not all feature upgrades will have an LTSB. The initial release of Windows 10, published in July 2015, has an LTSB and Microsoft expects to designate one additional feature upgrade in the next 12 months for long-term support. After that, Microsoft expects to publish feature upgrades with long-term servicing support approximately every two to three years. Microsoft will provide additional information in advance of publishing new feature upgrades so that IT administrators can make informed deployment planning decisions. + +  + +### + +**Considerations when configuring devices for servicing updates only** + +Before deciding to configure a device for LTSB-based servicing, IT administrators should carefully consider the implications of changing to a different servicing option later, and the effect of using Windows 10 Enterprise LTSB on the availability of *in-box* applications. + +Regarding edition changes, it is possible to reconfigure a device running Windows 10 Enterprise LTSB to run Windows 10 Enterprise while preserving the data and applications already on the device. Reconfiguring a device running Windows 10 Enterprise LTSB to run other editions of Windows 10 may require IT administrators to restore data and/or reinstall applications on the device after the other edition has been installed. + +Regarding in-box applications, Windows 10 Enterprise LTSB does not include all the universal apps that are included with other Windows 10 editions. This is because the universal apps included with Windows 10 will be continually upgraded by Microsoft, and new releases of in-box universal apps are unlikely to remain compatible with a feature upgrade of Windows 10 Enterprise LTSB for the duration of its servicing lifetime. Examples of apps that Windows 10 Enterprise LTSB does not include are Microsoft Edge, Windows Store Client, Cortana (limited search capabilities remain available), Outlook Mail, Outlook Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock. + +Windows 10 Enterprise LTSB does include Internet Explorer 11, and is compatible with Windows 32 versions of Microsoft Office. IT administrators can also install universal apps on devices when apps are compatible with the feature upgrades running on the device. They should do so with care, however, as servicing updates targeted for devices running Windows 10 Enterprise LTSB will not include security or non-security fixes for universal apps. Additionally, Microsoft will not provide servicing updates for specific releases of apps on any Windows 10 edition after the feature upgrade of Windows 10 with which the apps were included reaches the end of its servicing lifetime. + +**Servicing option summary** + +Table 2. Servicing option summary + +Comparison +Windows 10 servicing options +Current Branch (CB) +Current Branch for Business (CBB) +Long-Term Servicing Branch (LTSB) +**Availability of new feature upgrades for installation** +Immediate +Deferred by ~4 months +Not applicable +**Supported editions** +Windows 10 Home, Windows 10 Pro, Windows 10 Education, Windows 10 Enterprise, Windows 10 Mobile, IoT Core, IoT Core Pro +Windows 10 Pro, Windows 10 Education, Windows 10 Enterprise, Windows 10 Mobile Enterprise, IoT Core Pro +Windows 10 Enterprise LTSB +**Minimum length of servicing lifetime** +Approximately 4 Months +Approximately 8 months +10 years +**Ongoing installation of new feature upgrades required to receive servicing updates** +Yes +Yes +No +**Supports Windows Update for release deployment** +Yes +Yes +Yes +**Supports Windows Server Update Services for release deployment** +Yes (excludes Home) +Yes +Yes +**Supports Configuration Manager/configuration management systems for release deployment** +Yes (excludes Home) +Yes +Yes +**First party browsers included** +Microsoft Edge, Internet Explorer 11 +Microsoft Edge, IE11 +IE11 +**Notable Windows system apps removed** +None +None +Microsoft Edge, Windows Store Client, Cortana (limited search available) +**Notable Windows universal apps removed** +None +None +Outlook Mail/Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, Clock +  + +## Related topics + + +[Plan for Windows 10 deployment](../plan/planning-for-windows-10-deployment.md) + +[Deploy Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=624776) + +[Manage and update Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=624796) + +  + +  + + + + + diff --git a/windows/manage/join-windows-10-mobile-to-azure-active-directory.md b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md new file mode 100644 index 0000000000..64404781ef --- /dev/null +++ b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md @@ -0,0 +1,198 @@ +--- +title: Join Windows 10 Mobile to Azure Active Directory (Windows 10) +description: Devices running Windows 10 Mobile can join Azure Active Directory (Azure AD) when the device is configured during the out-of-box experience (OOBE). +ms.assetid: 955DD9EC-3519-4752-827E-79CEB1EC8D6B +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +--- + +# Join Windows 10 Mobile to Azure Active Directory + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Why join Windows 10 Mobile to Azure AD](#why_join_windows_10_mobile_to_azure_ad) +- [Are you upgrading current devices to Windows 10 Mobile?](#BKMK_upgrade) +- [The difference between "add work account" and "join Azure AD"](#add_work_account) +- [Preparing for Windows 10 Mobile](#preparing_for_windows_10_mobile) +- [How to join Windows 10 Mobile to Azure AD](#how_to_join_windows_10_mobile_to_azure_ad) +- [Set up mail and calendar](#set_up_mail_and_calendar) +- [Use Office and OneDrive apps](#use_office_and_onedrive_apps) +- [Use Windows Store for Business](#use_windows_store_for_business) + +Devices running Windows 10 Mobile can join Azure Active Directory (Azure AD) when the device is configured during the out-of-box experience (OOBE). This article describes the considerations and options for using Windows 10 Mobile with Azure AD in your organization. + +## Why join Windows 10 Mobile to Azure AD + + +When a device running Windows 10 Mobile is joined to Azure AD, the device can exclusively use a credential owned by your organization, and you can ensure users sign in using the sign-in requirements of your organization. Joining a Windows 10 Mobile device to Azure AD provides many of the same benefits as joining desktop devices, such as: + +- Single sign-on (SSO) in applications like Mail, Word, and OneDrive using resources backed by Azure AD. + +- SSO in Edge browser to Azure AD-connected web applications like Office 365 Portal, Visual Studio, and more than [2500 non-Microsoft apps](http://go.microsoft.com/fwlink/p/?LinkID=746211). + +- SSO to resources on-premises. + +- Automatically enroll in your mobile device management (MDM) service. + +- Enable enterprise roaming of settings. + +- Use Windows Store for Business to target applications to users. + +## Are you upgrading current devices to Windows 10 Mobile? + + +Windows Phone 8.1 only supported the ability to connect the device to personal cloud services using a Microsoft account for authentication. This required creating Microsoft accounts to be used for work purposes. In Windows 10 Mobile, you have the ability to join devices directly to Azure AD without requiring a personal Microsoft account. + +If you have existing Windows Phone 8.1 devices, the first thing to understand is whether the devices you have can be upgraded to Windows 10 Mobile. Microsoft will be releasing more information about upgrade availability soon. As more information becomes available, it will be posted at [How to get Windows 10 Mobile]( http://go.microsoft.com/fwlink/p/?LinkId=746312). Premier Enterprise customers that have a business need to postpone Windows 10 Mobile upgrade should contact their Technical Account Manager to understand what options may be available. + +Before upgrading and joining devices to Azure AD, you will want to consider existing data usage. How users are using the existing devices and what data is stored locally will vary for every customer. Are text messages used for work purposes and need to be backed up and available after the upgrade? Are there photos stored locally or stored associated with an Microsoft account? Are there device and app settings that to be retained? Are there contacts stored in the SIM or associated with an Microsoft account? You will need to explore methods for capturing and storing the data that needs to be retained before you join the devices to Azure AD. Photos, music files, and documents stored locally on the device can be copied from the device using a USB connection to a PC. + +To join upgraded mobile devices to Azure AD, [the devices must be reset](reset-a-windows-10-mobile-device.md) to start the out-of-box experience for device setup. When the device is joined to Azure AD, the account used for authentication changes from the Microsoft account to an Azure AD account and this is not a change that can be done while maintaining all existing user data. This is similar to changing a device from personally owned to organizationally owned. When a user joins an organization’s domain, the user is then required to log in as the domain user and start with a fresh user profile. A new user profile means there would not be any persisted settings, apps, or data from the previous personal profile. + +If you want to avoid the device reset process, consider [adding work accounts](#add_work_account) rather than joining the devices to Azure AD. + +## The difference between "add work account" and "join Azure AD" + + +You can add access to Azure AD-backed resources on the device without resetting the device. However, this method does not provide SSO in the Windows Store and does not provide the ability to roam settings based on the Azure AD account using enterprise roaming. [Learn about enterprise state roaming in Azure AD.](http://go.microsoft.com/fwlink/p/?LinkId=734996) + +Using **Settings** > **Accounts** > **Your email and accounts** > **Add work or school account**, users can add their Azure AD account to the device, keeping their Microsoft account as the primary account. If you [enable auto-enrollment in your MDM settings](http://go.microsoft.com/fwlink/p/?LinkID=691615), the device will automatically be enrolled in MDM. + +An added work account provides the same SSO experience in browser apps like Office 365 (Office portal, Outlook Web Access, Calendar, People, OneDrive), Azure AD profile and change password app, and Visual Studio. You get SSO to built-in applications like Mail, Calendar, People, OneDrive and files hosted on OneDrive without prompts for a password. In Office apps like Microsoft Word, Microsoft Excel, etc., you simply select the Azure AD account and you are able to open files without entering a password. + +## Preparing for Windows 10 Mobile + + +- **Azure AD configuration** + + Currently, Azure AD join only supports self-provisioning, meaning the credentials of the user of the device must be used during the initial setup of the device. If your mobile operator prepares devices on your behalf, this will impact your ability to join the device to Azure AD. + + By default, Azure AD is set up to allow devices to join and to allow users to use their corporate credentials on organizational-owned devices or personal devices. The blog post [Azure AD Join on Windows 10 devices](http://go.microsoft.com/fwlink/p/?LinkID=616791) has more information on where you can review your Azure AD settings. You can configure Azure AD to not allow anyone to join, to allow everyone in your organization to join, or you can select specific Azure AD groups which are allowed to join. + +- **Device setup** + + A device running Windows 10 Mobile can only join Azure AD during OOBE. New devices from mobile operators will be in this state when they are received. Windows Phone 8.1 devices that are [upgraded](#BKMK_upgrade) to Windows 10 Mobile will need to be reset to get back to OOBE for device setup. + +- **Mobile device management** + + An MDM service is required for managing Azure AD-joined devices. You can use MDM to push settings to devices, as well as application and certificates used by VPN, Wi-Fi, etc. Azure AD Premium or EDP licenses are required to set up your Azure AD-joined devices to automatically enroll in MDM. [Learn more about setting up your Azure AD tenant for MDM auto-enrollment.](http://go.microsoft.com/fwlink/p/?LinkID=691615) + +- **Microsoft Passport** + + Creating a Microsoft Passport (PIN) is required on Windows 10 Mobile by default and cannot be disabled. [You can control Microsoft Passport policies](http://go.microsoft.com/fwlink/p/?LinkId=735079) using controls in MDM, such as Intune. Because the device is joined using organizational credentials, the device must have a PIN to unlock the device. Windows Hello (biometrics such as fingerprint or iris) can be used for Passport authentication. Creating a Microsoft Passport requires the user to perform an multi-factor authentication since the PIN is a strong authentication credential. [Learn more about Microsoft Passport for Azure AD.](http://go.microsoft.com/fwlink/p/?LinkId=735004) + +- **Conditional access** + + Conditional access policies are also applicable to Windows 10 Mobile. Multifactor authentication and device compliance policies can be applied to users or resources and require that the user or device satisfies these requirements before access to resources is allowed. Policies like **Domain Join** which support traditional domain joining only apply to desktop PC. Policies dependent on IP range will be tough to enforce on a phone as the IP address of the operator is used unless the user has connected to corporate Wi-Fi or a VPN. + +- **Known issues** + + - The apps for **Device backup and restore** and to sync photos to OneDrive only work with the Microsoft account as the primary account—these apps won’t work on devices joined to Azure AD. + + - **Find my Phone** will work depending on how you add a Microsoft account to the device—for example, the Cortana application will sign in with your Microsoft account in a way that makes **Find my Phone** work. Cortana and OneNote both work with Azure AD accounts but must be set up with a Microsoft account first. + + - OneNote requires the user to sign in with a Microsoft account but will also provide access to Notebooks using the Azure AD account. + + - If your organization is configured to federate with Azure AD, your federation proxy will need to be Active Directory Federation Services (ADFS) or a 3rd party which supports WS-Trust endpoints just like ADFS does. + +## How to join Windows 10 Mobile to Azure AD + + +1. During OOBE, on the **Keep your life in sync** screen, choose the option **Sign in with a work account**, and then tap **Next**. + + ![choose how to sign in](images/aadj1.jpg) + +2. Enter your Azure AD account. If your Azure AD account is federated, you will be redirected to your organization's sign-in page; if not, you enter your password here. + + ![sign in](images/aadj2.jpg) + + If you are taken to your organization's sign-in page, you may be required to provide a second factor of authentication. + + ![multi-factor authentication](images/aadj3.jpg) + +3. After authentication completes, the device registration is complete. If your MDM service has a terms of use page, it would be seen here as well. Federated users are required to provide a password again to complete the authentication to Windows. Users with passwords managed in the cloud will not see this additional authentication prompt. This federated login requires your federation server to support a WS-Trust active endpoint. + + ![enter password](images/aadj4.jpg) + +4. Next, you set up a PIN. + + ![set up a pin](images/aadjpin.jpg) + + **Note**  To learn more about the PIN requirement, see [Why a PIN is better than a password](../keep-secure/why-a-pin-is-better-than-a-password.md). + +   + +**To verify Azure AD join** + +- Go to **Settings** > **Accounts** > **Your email and accounts**. You will see your Azure AD account listed at the top and also listed as an account used by other apps. If auto-enrollment into MDM was configured, you will see in **Settings** > **Accounts** > **Work Access** that the device is correctly enrolled in MDM. If the MDM is pushing a certificate to be used by VPN, then **Settings** > **Network & wireless** > **VPN** will show the ability to connect to your VPN. + + ![verify that device joined azure ad](images/aadjverify.jpg) + +## Set up mail and calendar + + +Setting up email on your Azure AD joined device is simple. Launching the **Mail** app brings you to the **Accounts** page. Most users will have their email accounts hosted in Office 365 and will automatically start syncing. Just tap **Ready to go**. + +![email ready to go](images/aadjmail1.jpg) + +When email is hosted in on-premises Exchange, the user must provide credentials to establish a basic authentication connection to the Exchange server. Tap **Add account** to see the types of mail accounts you can add, including your Azure AD account. + +![email add an account](images/aadjmail2.jpg) + +After you select an account type, you provide credentials to complete setup for that mailbox. + +![set up email account](images/aadjmail3.jpg) + +Setup for the **Calendar** app is similar. Open the app and you'll see your Azure AD account listed -- just tap **Ready to go**. + +![calendar ready to go](images/aadjcal.jpg) + +Return to **Settings** > **Accounts** > **Your email and accounts**, and you will see your Azure AD account listed for **Email, calendar, and contacts**. + +![email, calendar, and contacts](images/aadjcalmail.jpg) + +## Use Office and OneDrive apps + + +Office applications like Microsoft Word and Microsoft PowerPoint will automatically sign you in with your Azure AD account. When you open an Office app, you see a screen that allows you to choose between a Microsoft account and Azure AD account. Office shows this screen while it is automatically signing you in, so just be patient for a couple seconds and Office will automatically sign you in using your Azure AD account. + +Microsoft Word automatically shows the documents recently opened on other devices. Opening a document allows you to jump straight to the same section you were last editing on another device. Microsoft PowerPoint shows your recently opened slide decks. + +The OneDrive application also uses SSO, showing you all your documents and enabling you to open them without any authentication experience. + +In addition to application SSO, Azure AD joined devices also get SSO for browser applications which trust Azure AD, such as web applications, Visual Studio, Office 365 portal, and OneDrive for Business. + +OneNote requires a Microsoft account, but you can use it with your Azure AD account as well. + +![sign in to onenote](images/aadjonenote.jpg) + +After you sign in to OneNote, go to Settings > Accounts, and you will see that your Azure AD account is automatically added. + +![onenote settings](images/aadjonenote2.jpg) + +To see the Notebooks that your Azure AD account has access to, tap **More Notebooks** and select the Notebook you want to open. + +![see more notebooks](images/aadjonenote3.jpg) + +## Use Windows Store for Business + + +[Windows Store for Business](windows-store-for-business.md) allows you to specify applications to be available to your users in the Windows Store application. These applications show up on a tab titled for your company. Applications approved in the Windows Store for Business portal can be installed by users. + +![company tab on store](images/aadjwsfb.jpg) + +  + +  + + + + + diff --git a/windows/manage/lock-down-windows-10-to-specific-apps.md b/windows/manage/lock-down-windows-10-to-specific-apps.md new file mode 100644 index 0000000000..52bfccf8a0 --- /dev/null +++ b/windows/manage/lock-down-windows-10-to-specific-apps.md @@ -0,0 +1,130 @@ +--- +title: Lock down Windows 10 to specific apps (Windows 10) +description: Learn how to configure a device running Windows 10 Enterprise or Windows 10 Education so that users can only run a few specific apps. +ms.assetid: 14DDDC96-88C7-4181-8415-B371F25726C8 +keywords: ["lockdown", "app restrictions", "applocker"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Lock down Windows 10 to specific apps + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Install apps](#install_apps) +- [Use AppLocker to set rules for apps](#use_applocker_to_set_rules_for_apps) +- [Other settings to lock down](#other_settings_to_lock_down) +- [Customize Start screen layout for the device](#customize_start_screen_layout_for_the_device) + +Learn how to configure a device running Windows 10 Enterprise or Windows 10 Education so that users can only run a few specific apps. The result is similar to [a kiosk device](set-up-a-device-for-anyone-to-use.md), but with multiple apps available. For example, you might set up a library computer so that users can search the catalog and browse the Internet, but can't run any other apps or change computer settings. + +You can restrict users to a specific set of apps on a device running Windows 10 Enterprise or Windows 10 Education by using [AppLocker](../keep-secure/applocker-overview-server.md). AppLocker rules specify which apps are allowed to run on the device. + +AppLocker rules are organized into collections based on file format. If no AppLocker rules for a specific rule collection exist, all files with that file format are allowed to run. However, when an AppLocker rule for a specific rule collection is created, only the files explicitly allowed in a rule are permitted to run. For more information, see [How AppLocker works](../keep-secure/how-applocker-works-techref.md). + +This topic describes how to lock down apps on a local device. You can also use AppLocker to set rules for applications in a domain by using Group Policy. + +![install create lockdown customize](images/lockdownapps.png) + +## Install apps + + +First, install the desired apps on the device for the target user account(s). This works for both Store and Win32. For Store apps, you must log on as that user for the app to install. For Win32 you can install an app for all users without logging on to the particular account. + +## Use AppLocker to set rules for apps + + +After you install the desired apps, set up AppLocker rules to only allow specific apps, and block everything else. + +1. Run Local Security Policy (secpol.msc) as an administrator. + +2. Go to **Security Settings** > **Application Control Policies** > **AppLocker**, and select **Configure rule enforcement**. + + ![configure rule enforcement](images/apprule.png) + +3. Check **Configured** under **Executable rules**, and then click **OK**. + +4. Right-click **Executable Rules** and then click **Automatically generate rules**. + + ![automatically generate rules](images/genrule.png) + +5. Select the folder that contains the apps that you want to permit, or select C:\\ to analyze all apps. + +6. Type a name to identify this set of rules, and then click **Next**. + +7. On the **Rule Preferences** page, click **Next**. Be patient, it might take awhile to generate the rules. + +8. On the **Review Rules** page, click **Create**. The wizard will now create a set of rules allowing the installed set of apps. + +9. Read the message and click **Yes**. + + ![default rules warning](images/appwarning.png) + +10. (optional) If you want a rule to apply to a specific set of users, right-click on the rule and select **Properties**. Then use the dialog to choose a different user or group of users. + +11. (optional) If rules were generated for apps that should not be run, you can delete them by right-clicking on the rule and selecting **Delete**. + +12. Before AppLocker will enforce rules, the **Application Identity** service must be turned on. To force the Application Identity service to automatically start on reset, open a command prompt and run: + + ``` syntax + sc config appidsvc start=auto + ``` + +13. Restart the device. + +## Other settings to lock down + + +In addition to specifying the apps that users can run, you should also restrict some settings and functions on the device. For a more secure experience, we recommend that you make the following configuration changes to the device: + +- Remove **All apps**. + + Go to **Group Policy Editor** > **User Configuration** > **Administrative Templates\\Start Menu and Taskbar\\Remove All Programs list from the Start menu**. + +- Hide **Ease of access** feature on the logon screen. + + Go to **Control Panel** > **Ease of Access** > **Ease of Access Center**, and turn off all accessibility tools. + +- Disable the hardware power button. + + Go to **Power Options** > **Choose what the power button does**, change the setting to **Do nothing**, and then **Save changes**. + +- Disable the camera. + + Go to **Settings** > **Privacy** > **Camera**, and turn off **Let apps use my camera**. + +- Turn off app notifications on the lock screen. + + Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Logon\\Turn off app notifications on the lock screen**. + +- Disable removable media. + + Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Device Installation\\Device Installation Restrictions**. Review the policy settings available in **Device Installation Restrictions** for the settings applicable to your situation. + + **Note**   + To prevent this policy from affecting a member of the Administrators group, in **Device Installation Restrictions**, enable **Allow administrators to override Device Installation Restriction policies**. + +   + +To learn more about locking down features, see [Customizations for Windows 10 Enterprise](http://go.microsoft.com/fwlink/p/?LinkId=691442). + +## Customize Start screen layout for the device + + +Configure the Start menu on the device to only show tiles for the permitted apps. You will make the changes manually, export the layout to an .xml file, and then apply that file to devices to prevent users from making changes. For instructions, see [Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md). + +  + +  + + + + + diff --git a/windows/manage/lock-down-windows-10.md b/windows/manage/lock-down-windows-10.md new file mode 100644 index 0000000000..6cb03fe5ef --- /dev/null +++ b/windows/manage/lock-down-windows-10.md @@ -0,0 +1,83 @@ +--- +title: Lock down Windows 10 (Windows 10) +description: Enterprises often need to manage how people use corporate devices. Windows 10 provides a number of features and methods to help you lock down specific parts of a Windows 10 device. +ms.assetid: 955BCD92-0A1A-4C48-98A8-30D7FAF2067D +keywords: ["lockdown"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Lock down Windows 10 + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Enterprises often need to manage how people use corporate devices. Windows 10 provides a number of features and methods to help you lock down specific parts of a Windows 10 device. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Set up a device for anyone to use (kiosk mode)](set-up-a-device-for-anyone-to-use.md)

You can configure a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise as a kiosk device, so that users can only interact with a single application that you select.

[Lock down Windows 10 to specific apps](lock-down-windows-10-to-specific-apps.md)

Learn how to configure a device running Windows 10 Enterprise or Windows 10 Education so that users can only run a few specific apps. The result is similar to [a kiosk device](set-up-a-device-for-anyone-to-use.md), but with multiple apps available. For example, you might set up a library computer so that users can search the catalog and browse the Internet, but can't run any other apps or change computer settings.

[Configure telemetry and other settings in your organization](manage-privacy-for-windows-10-in-your-company.md)

Learn about the telemetry that Microsoft gathers, the network connections that Windows components make to Microsoft, and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro.

[Configure access to Windows Store](stop-employees-from-using-the-windows-store.md)

IT Pros can configure access to Windows Store for client computers in their organization. For some organizations, business policies require blocking access to Windows Store.

[Manage Wi-Fi Sense in your company](manage-wi-fi-sense-in-your-company.md)

Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places. It can connect you to open Wi-Fi hotspots it knows about through crowdsourcing, or to Wi-Fi networks your contacts have shared with you by using Wi-Fi Sense.

+

The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your PC with Windows 10.

[Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md)

Windows 10 Mobile allows enterprises to lock down a device, define multiple user roles, and configure custom layouts on a device.

[Reset a Windows 10 Mobile device](reset-a-windows-10-mobile-device.md)

There are two methods for resetting a Windows 10 Mobile device: factory reset and "wipe and persist" reset.

+ +  + +## Related topics + + +[Lockdown features from Windows Embedded Industry 8.1](../whats-new/lockdown-features-from-windows-embedded-industry-8-1.md) + +  + +  + + + + + diff --git a/windows/manage/lockdown-xml.md b/windows/manage/lockdown-xml.md new file mode 100644 index 0000000000..75ae863b1b --- /dev/null +++ b/windows/manage/lockdown-xml.md @@ -0,0 +1,564 @@ +--- +title: Configure Windows 10 Mobile using Lockdown XML (Windows 10) +description: Windows 10 Mobile allows enterprises to lock down a device, define multiple user roles, and configure custom layouts on a device. +ms.assetid: 22C8F654-2EC3-4E6D-8666-1EA9FCF90F5F +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Configure Windows 10 Mobile using Lockdown XML + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Order of lockdown settings](#order_of_lockdown_settings) +- [Configuring multiple app packages](#BMK_map) +- [Lockdown example to use in a lockdown XML file](#lockdown_example_to_use_in_a_lockdown_xml_file) +- [Add lockdown XML to a provisioning package](#add_lockdown_xml_to_a_provisioning_package) +- [Push lockdown XML using MDM](#push_lockdown_xml_using_mdm) +- [Related topics](#related_topics) + +Windows 10 Mobile allows enterprises to lock down a device, define multiple user roles, and configure custom layouts on a device. For example, the enterprise can lock down a device so that only applications and settings in an allow list are available. + +This topic provides example XML that you can use in your own lockdown XML file that can be included in a provisioning package or when using a mobile device management (MDM) solution to push lockdown settings to enrolled devices. + +After you apply the lockdown settings, the lockdown configuration is stored in a wehlockdown.xml file on the device. + +For details on each of the configuration items, see the AssignedAccess/AssignedAccessXml section of the [EnterpriseAssignedAccess configuration service provider (CSP) reference](http://go.microsoft.com/fwlink/p/?LinkID=618601). + +## Order of lockdown settings + + +The configuration items must be in the following order when you lock down settings: + +- Default profile + - ActionCenter + - Apps + - Application product ID, as described in [Product IDs in Windows 10 Mobile](http://go.microsoft.com/fwlink/p/?LinkId=698449) + - App User Model ID, as described in [Configuring Multiple App Packages](#BMK_map) + - PinToStart + - Size + - Location + - Buttons + - ButtonLockdownList + - Button name + - ButtonRemapList + - Button name + - Button event name + - Application product ID, as described in [Product IDs in Windows 10 Mobile](http://go.microsoft.com/fwlink/p/?LinkId=698449) + - CSPRunner + - SyncML + - MenuItems + - Disable menu items + - Settings + - System name, as described in [Settings and quick actions that can be locked down](settings-that-can-be-locked-down.md) + - Tiles + - Enable tile manipulation + - StartScreenSize +- RoleList + - Role (repeat for each role) + - ActionCenter + - Apps + - Application product ID, as described in [Product IDs in Windows 10 Mobile](http://go.microsoft.com/fwlink/p/?LinkId=698449) + - App User Model ID (AUMID), as described in [Configuring Multiple App Packages](#BMK_map) + - PinToStart + - Size + - Location + - Buttons + - ButtonLockdownList + - Button name + - ButtonRemapList + - Button name + - Button event name + - Application product ID, as described in [Product IDs in Windows 10 Mobile](http://go.microsoft.com/fwlink/p/?LinkId=698449) + - CSPRunner + - SyncML + - MenuItems + - Disable menu items + - Settings + - System name, as described in [Settings and quick actions that can be locked down](settings-that-can-be-locked-down.md) + - Tiles + - Enable tile manipulation + - StartScreenSize + +## Configuring multiple app packages + + +Multiple app packages enable multiple apps to exist inside the same package. Since product IDs identify packages and not applications, specifying a product ID is not enough to distinguish between individual apps inside a multiple app package. Trying to pin application tiles from a multiple app package with just a product ID can result in unexpected behavior. + +To support pinning applications in multiple app packages, an AUMID parameter can be specified in lockdown.xml. + +The following example shows how to pin both Outlook Mail and Outlook Calendar: + +``` syntax + + + + + Large + + 1 + 4 + + + + + + + Large + + 1 + 6 + + + + +``` + +## Lockdown example to use in a lockdown XML file + + +The XML example can be used as a lockdown file that is contained in a provisioning package created in Windows Imaging and Configuration Designer (ICD). However, if you use MDM to push the lockdown file directly to devices, the XML example must use escaped characters for lockdown (such as < in place of <) as a result of XML embedded in XML. You can easily find an online escape tool to help you with this process. + +``` + + + + + + + + + Large + + 0 + 0 + + + + + + + Small + + 0 + 2 + + + + + + + Medium + + 2 + 2 + + + + + + + + + + + + + + + + + + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID + + + int + + + 7 + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeBackground + + + int + + + 1 + + + + + + + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + + chr + text/plain + + c:\windows\system32\lockscreen\480x800\Wallpaper_05.jpg + + + + + + + + + + + + + + + + + + + + + + + + + Small + + + + + + + + + Small + + 0 + 0 + + + + + + + Large + + 0 + 2 + + + + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID + + + int + + + 10 + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeBackground + + + int + + + 0 + + + + + + + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + + chr + text/plain + + c:\windows\system32\lockscreen\480x800\Wallpaper_08.jpg + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Small + + 0 + 0 + + + + + + + Small + + 1 + 0 + + + + + + + Medium + + 2 + 0 + + + + + + + + + Small + + 0 + 2 + + + + + + + Medium + + 2 + 2 + + + + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID + + + int + + + 2 + + + + + + + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeBackground + + + int + + + 1 + + + + + + + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + + chr + text/plain + + c:\windows\system32\lockscreen\480x800\Wallpaper_015.jpg + + + + + + + + + + + + + + + + + + +``` + +## Add lockdown XML to a provisioning package + + +Use the Windows ICD tool included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a provisioning package. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +1. Follow the instructions at [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkID=629651) to create a project, selecting **Common to all Windows mobile editions** for your project. + +2. In **Available customizations**, go to **Runtime settings** > **EmbeddedLockdownProfiles** > **AssignedAccessXml**. + +3. In the center pane, click **Browse** to locate and select the lockdown XML file that you created. + + ![browse button](images/icdbrowse.png) + +4. On the **File** menu, select **Save.** + +5. On the **Export** menu, select **Provisioning package**. + +6. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +7. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select** and choosing the certificate you want to use to sign the package. + +8. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows ICD uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +9. Click **Next**. + +10. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +11. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +After you build the provisioning package, follow the instructions for [applying a provisioning package at runtime to Windows 10 Mobile](http://go.microsoft.com/fwlink/p/?LinkID=619164). + +## Push lockdown XML using MDM + + +After you deploy your devices, you can still configure lockdown settings through your MDM solution if it supports the [EnterpriseAssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=618601). + +To push lockdown settings to enrolled devices, use the AssignedAccessXML setting and use the lockdown XML as the value. The lockdown XML will be in a HandheldLockdown section that becomes XML embedded in XML, so the XML that you enter must use escaped characters (such as < in place of <). After the MDM provider pushes your lockdown settings to the device, the CSP processes the file and updates the device. + +## Related topics + + +[Settings and quick actions that can be locked down in Windows 10 Mobile](settings-that-can-be-locked-down.md) + +[Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md) + +  + +  + + + + + diff --git a/windows/manage/manage-access-to-private-store.md b/windows/manage/manage-access-to-private-store.md new file mode 100644 index 0000000000..6dee688668 --- /dev/null +++ b/windows/manage/manage-access-to-private-store.md @@ -0,0 +1,42 @@ +--- +title: Manage access to private store (Windows 10) +description: You can manage access to your private store in Windows Store for Business. +ms.assetid: 4E00109C-2782-474D-98C0-02A05BE613A5 +author: jdeckerMS +--- + +# Manage access to private store + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +You can manage access to your private store in Windows Store for Business. + +Organizations might want control the set of apps that are available to their employees, and not show the full set of applications that are in the Windows Store. Using the private store with the Store for Business, an administrator can curate the set of apps that are available to their employees. + +The private store is a feature in Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in the Windows Store, and is usually named for your company or organization. Only apps with online licenses can be added to the private store. Your private store looks something like this: + +![](images/wsfb-wsappprivatestore.png) + +Organizations using an MDM to manage apps can use a policy to show only the private store. When your MDM supports the Store for Business, the MDM can use the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#group_policy_table). More specifically, the **ApplicationManagement/RequirePrivateStoreOnly** policy. + +You can also prevent employees from using the Windows Store. For more information, see [Configure access to Windows Store](stop-employees-from-using-the-windows-store.md). + +## Related topics + + +[Distribute apps using your private store](distribute-apps-from-your-private-store.md) + +[Configure access to Windows Store](stop-employees-from-using-the-windows-store.md) + +  + +  + + + + + diff --git a/windows/manage/manage-and-update-windows-10.md b/windows/manage/manage-and-update-windows-10.md new file mode 100644 index 0000000000..88659504fc --- /dev/null +++ b/windows/manage/manage-and-update-windows-10.md @@ -0,0 +1,84 @@ +--- +title: Manage and update Windows 10 (Windows 10) +description: Learn about managing and updating Windows 10. +ms.assetid: E5716355-02AB-4B75-A962-14B1A7F7BDA0 +keywords: ["Windows 10", "MDM", "WSUS", "Windows update"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage and update Windows 10 + + +Learn about managing and updating Windows 10. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Change history for Manage and update Windows 10](change-history-for-manage-and-update-windows-10.md)

This topic lists new and updated topics in the Manage and update Windows 10 documentation for [Windows 10 and Windows 10 Mobile](../index.md).

[Administrative Tools in Windows 10](administrative-tools-in-windows-10.md)

Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users.

[Cortana integration in your business or enterprise](manage-cortana-in-your-enterprise.md)

The world’s first personal digital assistant helps users get things done, even at work. Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and enterprise environments.

[Manage corporate devices](manage-corporate-devices.md)

You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), Windows PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions.

[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md)

Organizations might want to deploy a customized Start screen and menu to devices running Windows 10 Enterprise or Windows 10 Education. A standard Start layout can be useful on devices that are common to multiple users and devices that are locked down for specialized purposes.

[Lock down Windows 10](lock-down-windows-10.md)

Enterprises often need to manage how people use corporate devices. Windows 10 provides a number of features and methods to help you lock down specific parts of a Windows 10 device.

[Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md)

Devices running Windows 10 Mobile can join Azure Active Directory (Azure AD) when the device is configured during the out-of-box experience (OOBE).

[Configure devices without MDM](configure-devices-without-mdm.md)

Create a runtime provisioning package to apply settings, profiles, and file assets to a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise.

[Windows 10 servicing options for updates and upgrades](introduction-to-windows-10-servicing.md)

This article describes the new servicing options available in Windows 10, Windows 10 Mobile, and Windows 10 IoT Core (IoT Core) and how they enable enterprises to keep their devices current with the latest feature upgrades. It also covers related topics, such as how enterprises can make better use of Windows Update, and what the new servicing options mean for support lifecycles.

[Windows Store for Business](windows-store-for-business.md)

Welcome to the Windows Store for Business! You can use the Store for Business, to find, acquire, distribute, and manage apps for your organization.

+ +  + +  + +  + + + + + diff --git a/windows/manage/manage-apps.md b/windows/manage/manage-apps.md new file mode 100644 index 0000000000..0d661cb50a --- /dev/null +++ b/windows/manage/manage-apps.md @@ -0,0 +1,64 @@ +--- +title: Manage apps in Windows Store for Business (Windows 10) +description: Manage settings and access to apps in Windows Store for Business. +ms.assetid: 2F65D4C3-B02C-41CC-92F0-5D9937228202 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage apps in Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Manage settings and access to apps in Windows Store for Business. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Manage access to private store](manage-access-to-private-store.md)

You can manage access to your private store in Store for Business.

[App inventory managemement for Windows Store for Business](app-inventory-managemement-for-windows-store-for-business.md)

You can manage all apps that you've acquired on your Inventory page.

[Manage private store settings](manage-private-store-settings.md)

The private store is a feature in the Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Only online-licensed apps can be distributed from your private store.

[Configure MDM provider](configure-mdm-provider.md)

For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.

+ +  + +  + +  + + + + + diff --git a/windows/manage/manage-corporate-devices.md b/windows/manage/manage-corporate-devices.md new file mode 100644 index 0000000000..f05c0d2b34 --- /dev/null +++ b/windows/manage/manage-corporate-devices.md @@ -0,0 +1,138 @@ +--- +title: Manage corporate devices (Windows 10) +description: You can use the same management tools to manage all device types running Windows 10 -- desktops, laptops, tablets, and phones. +ms.assetid: 62D6710C-E59C-4077-9C7E-CE0A92DFC05D +keywords: ["MDM", "device management"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage corporate devices + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [Identity and management options](#identity_and_management_options) +- [How setting conflicts are resolved](#how_setting_conflicts_are_resolved) +- [MDM enrollment](#mdm_enrollment) +- [Learn more](#learn_more) +- [Related topics](#related_topics) + +You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), Windows PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions. + +There are several options for managing Windows 10 on corporate-owned devices in an enterprise. + +## Identity and management options + + +Your employees using devices that are owned by the organization can connect to Active Directory or Azure Active Directory (Azure AD). Windows 10 does not require a personal Microsoft account on devices joined to Azure AD or an on-premises Active Directory domain. + +![choose active directory or azure ad for identity](images/identitychoices.png) + +### Active Directory join + +You can join a device running Windows 10 to an on-premises Active Directory domain after the first-run experience (sometimes called out-of-box experience or OOBE). You can add devices running Windows 10 to your existing Active Directory infrastructure and manage them just as you've always been used to managing PCs running Windows. + +Desktop devices running Windows 10 that are joined to an Active Directory domain can be managed using Group Policy and System Center 2012 R2 Configuration Manager. The following table shows the management support for Windows 10 in Configuration Manager. + + ++++ + + + + + + + + + + + + + + + + + + + + +
Product versionWindows 10 support

[Microsoft System Center Configuration Manager Technical Preview](http://go.microsoft.com/fwlink/p/?LinkId=613622)

Client deployment, upgrade, and management with new and existing features

Configuration Manager and Configuration Manager SP1

Deployment, upgrade, and management with existing features

Configuration Manager 2007

Management with existing features

+ +  + +### Azure AD join + +Devices joined to Azure AD can be managed using Microsoft Intune or other mobile device management (MDM) solutions. MDM infrastructure for Windows 10 is consistent across device types. Configuration capabilities may vary based on device platform. + +![mdm options for mobile, desktop, and iot through device lifecycle](images/mdm.png) + +For flexibility in identity and management, you can combine Active Directory and Azure AD. Learn about [integrating Active Directory and Azure Active Directory for a hybrid identity solution](http://go.microsoft.com/fwlink/p/?LinkId=613209). + +## How setting conflicts are resolved + + +A device or user might receive policies from multiple sources, such as MDM, Exchange, or provisioning packages. In any policy conflict, the most secure policy value is applied. Policy settings take precedence over settings applied in a provisioning package. + +**Note**   +Provisioning packages can be applied either during device setup or after setup for runtime configuration. For more information about runtime provisioning packages, see [Configure devices without MDM](configure-devices-without-mdm.md). + +  + +When setting values that do not have a security implication conflict, last write wins. When settings are configured from both a provisioning package and another configuration source, the non-provisioning package configuration source has higher priority. + +![](images/configconflict.png) + +## MDM enrollment + + +Devices running Windows 10 include a built-in agent that can be used by MDM servers to enroll and manage devices. MDM servers do not need to create a separate agent or client to install on devices running Windows 10. + +For more information about the MDM protocols, see [Mobile device management](http://go.microsoft.com/fwlink/p/?LinkID=533172). + +## Learn more + + +[Windows 10, Azure AD and Microsoft Intune: Automatic MDM Enrollment](http://go.microsoft.com/fwlink/p/?LinkId=623321) + +[Microsoft Intune End User Enrollment Guide](http://go.microsoft.com/fwlink/p/?LinkID=617169) + +[Azure AD Join on Windows 10 devices](http://go.microsoft.com/fwlink/p/?LinkId=616791) + +[Azure AD support for Windows 10](http://go.microsoft.com/fwlink/p/?LinkID=615765) + +[Windows 10 and Azure Active Directory: Embracing the Cloud](http://go.microsoft.com/fwlink/p/?LinkId=615768) + +[How to manage Windows 10 devices using Intune](http://go.microsoft.com/fwlink/p/?LinkId=613620) + +[Using Intune alone and with Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=613207) + +Microsoft Virtual Academy course: [System Center 2012 R2 Configuration Manager & Windows Intune](http://go.microsoft.com/fwlink/p/?LinkId=613208) + +## Related topics + + +[New policies for Windows 10](new-policies-for-windows-10.md) + +[Changes to Group Policy settings for Start in Windows 10](changes-to-start-policies-in-windows-10.md) + +[Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md) + +  + +  + + + + + diff --git a/windows/manage/manage-cortana-in-your-enterprise.md b/windows/manage/manage-cortana-in-your-enterprise.md new file mode 100644 index 0000000000..b356bfd53c --- /dev/null +++ b/windows/manage/manage-cortana-in-your-enterprise.md @@ -0,0 +1,200 @@ +--- +title: Cortana integration in your business or enterprise (Windows 10) +description: The world’s first personal digital assistant helps users get things done, even at work. Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and enterprise environments. +ms.assetid: DB7B05DA-186F-4628-806A-F8B134E2AF2C +author: jdeckerMS +--- + +# Cortana integration in your business or enterprise + + +**Applies to:** + +- Windows 10 +- Windows 10 Mobile + +The world’s first personal digital assistant helps users get things done, even at work. Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and enterprise environments. + +## Cortana integration with Office 365 + + +Cortana in Windows 10 is already great at letting your employees quickly see what the day is going to look like, see where and when their meetings are going to be, get a sense of travel times to and from work, and even get updates from a calendar for upcoming trips. + +But Cortana works even harder when she connects to Office 365, helping employees prepare for meetings, learn about co-workers, and receive reminders about where they need to be so they won’t be late. + +**More info:** + +- For specific info about what you need to know as a company administrator, including how to turn off Cortana with Office 365, see the [Cortana integration with Office 365](http://go.microsoft.com/fwlink/p/?LinkId=717378) support topic. + +- For a quick review of the frequently asked questions about Cortana and Office 365 integration, see the blog post, [An early look at Cortana integration with Office 365](http://go.microsoft.com/fwlink/p/?LinkId=717379). + +## Set up Cortana using Group Policy and MDM policies + + +Set up and manage Cortana by using the following Group Policy and mobile device management (MDM) policies. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Group PolicyMDM policyDescription

Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana

Experience/AllowCortana

Specifies whether employees can use Cortana.

+
+Note   +

Employees can still perform searches even with Cortana turned off.

+
+
+  +

Computer Configuration\Administrative Templates\Control Panel\Regional and Language Options\Allow input personalization

Privacy/AllowInput Personalization

Specifies whether to turn on automatic learning, which allows the collection of speech and handwriting patterns, typing history, contacts, and recent calendar information. It is required for the use of Cortana.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

None

System/AllowLocation

Specifies whether to allow app access to the Location service.

Computer Configuration\Administrative Templates\Windows Components\Search\Don't search the web or display web results

None

Specifies whether search can perform queries on the web and if the web results are displayed in search.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location

Search/AllowSearchToUse Location

Specifies whether search and Cortana can provide location aware search and Cortana results.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

Computer Configuration\Administrative Templates\Windows Components\Search\Set the SafeSearch setting for Search

Search/SafeSearch Permissions

Specifies what level of safe search (filtering adult content) is required.

+
+Note   +

This setting only applies to Windows 10 Mobile.

+
+
+  +

User Configuration\Administrative Templates\Windows Components\File Explorer\Turn off display of recent search entries in the File Explorer search box

None

Specifies whether the search box can suggest recent queries and prevent entries from being stored in the registry for future reference.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

User Configuration\Administrative Templates\Start Menu and Taskbar\Do not search for files

None

Specifies whether the Start menu search box searches for files.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

User Configuration\Administrative Templates\Start Menu and Taskbar\Do not search programs and Control Panel items

None

Specifies whether the Start menu search box searches for programs or Control Panel items.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +

User Configuration\Administrative Templates\Start Menu and Taskbar\Do not search communications

None

Specifies whether the Start menu search box searches communications.

+
+Important   +

Cortana won’t work if this setting is turned off (disabled).

+
+
+  +
+ +  + +**More info:** + +- For specific info about how to set, manage, and use each of these MDM policies to configure Cortana in your enterprise, see the [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkId=717380) topic, located in the configuration service provider reference topics. For specific info about how to set, manage, and use each of these Group Policies to configure Cortana in your enterprise, see the [Group Policy TechCenter](http://go.microsoft.com/fwlink/p/?LinkId=717381). + +## Cortana and Power BI + + +Integration between Cortana and Power BI shows how Cortana can work with custom business analytics solutions to enable you to get answers directly from your key business data, including introducing new features that let you create custom Cortana answers using the full capabilities of Power BI Desktop. + +**More info:** + +- For specific info about how to start using Power BI and Cortana integration, how to customize your data results, and how to use the “Hey Cortana” functionality, see the [Power BI: Announcing Power BI integration with Cortana and new ways to quickly find insights in your data](http://go.microsoft.com/fwlink/p/?LinkId=717382) blog. + +## Cortana and privacy + + +We understand that there are concerns about Cortana and enterprise privacy, so we’ve put together the [Cortana, Search, and privacy: FAQ](http://go.microsoft.com/fwlink/p/?LinkId=717383) topic that covers many of the frequently asked questions. These questions include things such as what info is collected by Cortana, where the info is saved, how to manage what data is collected, how to turn Cortana off, how to opt completely out of data collection, and what info is shared with other Microsoft apps and services. + +## Related topics + + +[Cortana and Windows](http://go.microsoft.com/fwlink/p/?LinkId=717384) + +[Cortana for developers](http://go.microsoft.com/fwlink/p/?LinkId=717385) + +  + +  + + + + + diff --git a/windows/manage/manage-privacy-for-windows-10-in-your-company.md b/windows/manage/manage-privacy-for-windows-10-in-your-company.md new file mode 100644 index 0000000000..5ad28e3464 --- /dev/null +++ b/windows/manage/manage-privacy-for-windows-10-in-your-company.md @@ -0,0 +1,1776 @@ +--- +title: Configure telemetry and other settings in your organization (Windows 10) +description: Learn about the telemetry that Microsoft gathers, the network connections that Windows components make to Microsoft, and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro. +ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Configure telemetry and other settings in your organization + + +**Applies to** + +- Windows 10 + +Learn about the telemetry that Microsoft gathers, the network connections that Windows components make to Microsoft, and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro. + +If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. You can configure telemetry at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article. + +**Note**  Telemetry is a term that means different things to different people and organizations. For the purpose of this article, we discuss telemetry as system data that is uploaded by the Connected User Experience and Telemetry component. The telemetry data is used to keep Windows devices secure, and to help Microsoft improve the quality of Windows and Microsoft services. We discuss separately the network connections that Windows features and components make directly to Microsoft Services. It is used to provide a service to the user as part of Windows. + +  + +Some of the network connections discussed in this article can be managed in Windows 10 Mobile, Windows 10 Mobile Enterprise, and Windows 10, Version 1507. However, you must use Windows 10 Enterprise, Version 1511 or Windows 10 Education, Version 1511 to manage them all. + +In Windows 10 Enterprise, Version 1511 or Windows 10 Education, Version 1511, you can configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all other connections to Microsoft services as described in this article to prevent Windows from sending any data to Microsoft. We strongly recommend against this, as this data helps us deliver a secure, reliable, and more delightful personalized experience. + +We are always working on improving Windows 10 for our customers. We invite IT pros to join the [Windows Insider Program](http://insider.windows.com) to give us feedback on what we can do to make Windows 10 work better for your organization. + +Here's what's covered in this article: + +- [Info management settings](#BKMK_OtherSettings) + + - [Cortana](#BKMK_Cortana) + + - [Cortana Group Policies](#BKMK_Cortana_GP) + + - [Cortana MDM policies](#BKMK_Cortana_MDM) + + - [Cortana Windows Provisioning](#BKMK_Cortana_Prov) + + - [Device metadata retrieval](#BKMK_DevInst) + + - [Insider Preview builds](#BKMK_PreviewBuilds) + + - [Internet Explorer](#BKMK_IE) + + - [Internet Explorer Group Policies](#BKMK_IE_GP) + + - [ActiveX control blocking](#BKMK_IE_ActiveX) + + - [Mail synchronization](#BKMK_MailSync) + + - [Microsoft Edge](#BKMK_Edge) + + - [Microsoft Edge Group Policies](#BKMK_EdgeGP) + + - [Microsoft Edge MDM policies](#BKMK_Edge_MDM) + + - [Microsoft Edge Windows Provisioning](#BKMK_Edge_Prov) + + - [Network Connection Status Indicator](#BKMK_NCSI) + + - [Offline maps](#BKMK_OfflineMaps) + + - [OneDrive](#BKMK_OneDrive) + + - [Preinstalled apps](#BKMK_PreinstalledApps) + + - [Settings > Privacy](#BKMK_SettingsSection) + + - [General](#BKMK_General) + + - [Location](#BKMK_Priv_Location) + + - [Camera](#BKMK_Priv_Camera) + + - [Microphone](#BKMK_Priv_Microphone) + + - [Speech, inking, & typing](#BKMK_Priv_Speech) + + - [Account info](#BKMK_Priv_Accounts) + + - [Contacts](#BKMK_Priv_Contacts) + + - [Calendar](#BKMK_Priv_Calendar) + + - [Call history](#BKMK_Priv_CallHistory) + + - [Email](#BKMK_Priv_Email) + + - [Messaging](#BKMK_Priv_Messaging) + + - [Radios](#BKMK_Priv_Radios) + + - [Other devices](#BKMK_Priv_Other_Devices) + + - [Feedback & diagnostics](#BKMK_Priv_Feedback) + + - [Background apps](#BKMK_Priv_Background) + + - [Software Protection Platform](#BKMK_SPP) + + - [Sync your settings](#BKMK_SyncSettings) + + - [Teredo](#BKMK_Teredo) + + - [Wi-Fi Sense](#BKMK_WiFiSense) + + - [Windows Defender](#BKMK_Defender) + + - [Windows Media Player](#BKMK_WMP) + + - [Windows spotlight](#BKMK_Spotlight) + + - [Windows Store](#BKMK_WindowsStore) + + - [Windows Update Delivery Optimization](#BKMK_Updates) + + - [Settings > Update & security](#BKMK_WUDO_UI) + + - [Delivery Optimization Group Policies](#BKMK_WUDO_GP) + + - [Delivery Optimization MDM policies](#BKMK_WUDO_MDM) + + - [Delivery Optimization Windows Provisioning](#BKMK_WUDO_Prov) + + - [Windows Update](#BKMK_WU) + +- [Manage your telemetry settings](#BKMK_UTC) + +- [How telemetry works](#BKMK_MoreUTC) + +## What's new in Windows 10, Version 1511 + + +Here's a list of changes that were made to this article for Windows 10, Version 1511: + +- Added the following new sections: + + - [Mail synchronization](#BKMK_MailSync) + + - [Offline maps](#BKMK_OfflineMaps) + + - [Windows spotlight](#BKMK_Spotlight) + + - [Windows Store](#BKMK_WindowsStore) + +- Added the following Group Policies: + + - Open a new tab with an empty tab + + - Configure corporate Home pages + + - Let Windows apps access location + + - Let Windows apps access the camera + + - Let Windows apps access the microphone + + - Let Windows apps access account information + + - Let Windows apps access contacts + + - Let Windows apps access the calendar + + - Let Windows apps access messaging + + - Let Windows apps control radios + + - Let Windows apps access trusted devices + + - Do not show feedback notifications + + - Turn off Automatic Download and Update of Map Data + + - Force a specific default lock screen image + +- Added the AllowLinguisticDataCollection MDM policy. + +- Added steps in the [Cortana](#BKMK_Cortana) section on how to disable outbound traffic using Windows Firewall. + +- Added steps in the [Live tiles](#BKMK_LiveTiles) section on how to remove the Money and Sports apps. + +- Changed the Windows Update section to apply system-wide settings, and not just per user. + +## Info management settings + + +This section lists the components that make network connections to Microsoft services automatically. You can configure these settings to control the data that is sent to Microsoft. To prevent Windows from sending any data to Microsoft, configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all of these connections. We strongly recommend against this, as this data helps us deliver a secure, reliable, and more delightful personalized experience. + +The settings in this section assume you are using Windows 10, Version 1511 (currently available in the Current Branch and Current Branch for Business). They will also be included in the next update for the Long Term Servicing Branch. + +- [Cortana](#BKMK_Cortana) + +- [Device metadata retrieval](#BKMK_DevInst) + +- [Insider Preview builds](#BKMK_PreviewBuilds) + +- [Internet Explorer](#BKMK_IE) + +- [Mail synchronization](#BKMK_MailSync) + +- [Microsoft Edge](#BKMK_Edge) + +- [Network Connection Status Indicator](#BKMK_NCSI) + +- [Offline maps](#BKMK_OfflineMaps) + +- [OneDrive](#BKMK_OneDrive) + +- [Preinstalled apps](#BKMK_PreinstalledApps) + +- [Settings > Privacy](#BKMK_SettingsSection) + +- [Software Protection Platform](#BKMK_SPP) + +- [Sync your settings](#BKMK_SyncSettings) + +- [Teredo](#BKMK_Teredo) + +- [Wi-Fi Sense](#BKMK_WiFiSense) + +- [Windows Defender](#BKMK_Defender) + +- [Windows Media Player](#BKMK_WMP) + +- [Windows spotlight](#BKMK_Spotlight) + +- [Windows Store](#BKMK_WindowsStore) + +- [Windows Update](#BKMK_WU) + +- [Windows Update Delivery Optimization](#BKMK_Updates) + +See the following table for a summary of the management settings. For more info, see its corresponding section. + +![](images/priv-settings-table-1511.png) + +### Cortana + +Use either Group Policy or MDM policies to manage settings for Cortana. For more info, see [Cortana, Search, and privacy: FAQ]( http://go.microsoft.com/fwlink/p/?LinkId=730683). + +### Cortana Group Policies + +Find the Cortana Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Search**. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

Allow Cortana

Choose whether to let Cortana install and run on the device.

+

Default: Enabled

Allow search and Cortana to use location

Choose whether Cortana and Search can provide location-aware search results.

+

Default: Enabled

Do not allow web search

Choose whether to search the web from Windows Desktop Search.

+

Default: Disabled

Don't search the web or display web results in Search

Choose whether to search the web from Cortana.

+

Default: Disabled

Set what information is shared in Search

Control what information is shared with Bing in Search.

+ +  + +When you enable the **Don't search the web or display web results in Search** Group Policy, you can control the behavior of whether Cortana searches the web to display web results. However, this policy only covers whether or not web search is performed. There could still be a small amount of network traffic to Bing.com to evaluate if certain Cortana components are up-to-date or not. In order to turn off that network activity completely, you can create a Windows Firewall rule to prevent outbound traffic. + +1. Expand **Computer Configuration** > **Windows Settings** > **Security Settings** > **Windows Firewall with Advanced Security** > **Windows Firewall with Advanced Security - <LDAP name>**, and then click **Outbound Rules**. + +2. Right-click **Outbound Rules**, and then click **New Rule**. The **New Outbound Rule Wizard** starts. + +3. On the **Rule Type** page, click **Program**, and then click **Next**. + +4. On the **Program** page, click **This program path**, type **%windir%\\systemapps\\Microsoft.Windows.Cortana\_cw5n1h2txyewy\\SearchUI.exe**, and then click **Next**. + +5. On the **Action** page, click **Block the connection**, and then click **Next**. + +6. On the **Profile** page, ensure that the **Domain**, **Private**, and **Public** check boxes are selected, and then click **Next**. + +7. On the **Name** page, type a name for the rule, such as **Cortana firewall configuration**, and then click **Finish.** + +8. Right-click the new rule, click **Properties**, and then click **Protocols and Ports**. + +9. Configure the **Protocols and Ports** page with the following info, and then click **OK**. + + - For **Protocol type**, choose **TCP**. + + - For **Local port**, choose **All Ports**. + + - For **Remote port**, choose **All ports**. + +**Note**   +If your organization tests network traffic, you should not use Fiddler to test Windows Firewall settings. You should use a network traffic analyzer, such as WireShark or Message Analyzer. + +  + +### Cortana MDM policies + +The following Cortana MDM policies are available in the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). + + ++++ + + + + + + + + + + + + + + + + +
PolicyDescription

Experience/AllowCortana

Choose whether to let Cortana install and run on the device.

+

Default: Allowed

Search/AllowSearchToUseLocation

Choose whether Cortana and Search can provide location-aware search results.

+

Default: Allowed

+ +  + +### Windows Provisioning + +To use Windows Imaging and Configuration Designer (ICD) to create a provisioning package with the settings for these policies, go to **Runtime settings** > **Policies** to find **Experience** > **AllowCortana** and **Search** > **AllowSearchToUseLocation**. + +### Device metadata retrieval + +To prevent Windows from retrieving device metadata from the Internet, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Device Installation** > **Prevent device metadata retrieval from the Internet**. + +### Insider Preview builds + +To turn off Insider Preview builds if you're running a released version of Windows 10. If you're running a preview version of Windows 10, you must roll back to a released version before you can turn off Insider Preview builds. + +- Turn off the feature in the UI: **Settings** > **Update & security** > **Windows Update** > **Advanced options** > **Stop Insider builds**. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds** > **Toggle user control over Insider builds**. + + -or- + +- Apply the System/AllowBuildPreview MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where: + + - **0**. Users cannot make their devices available for downloading and installing preview software. + + - **1**. Users can make their devices available for downloading and installing preview software. + + - **2**. (default) Not configured. Users can make their devices available for download and installing preview software. + + -or- + +- Create a provisioning package: **Runtime settings** > **Policies** > **System** > **AllowBuildPreview**, where: + + - **0**. Users cannot make their devices available for downloading and installing preview software. + + - **1**. Users can make their devices available for downloading and installing preview software. + + - **2**. (default) Not configured. Users can make their devices available for download and installing preview software. + +### Internet Explorer + +Use Group Policy to manage settings for Internet Explorer. + +### Internet Explorer Group Policies + +Find the Internet Explorer Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer**. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

Turn on Suggested Sites

Choose whether an employee can configure Suggested Sites.

+

Default: Enabled

+

You can also turn this off in the UI by clearing the Internet Options > Advanced > Enable Suggested Sites check box.

Allow Microsoft services to provide enhanced suggestions as the user types in the Address Bar

Choose whether an employee can configure enhanced suggestions, which are presented to the employee as they type in the address bar.

+

Default: Enabled

Turn off the auto-complete feature for web addresses

Choose whether auto-complete suggests possible matches when employees are typing web address in the address bar.

+

Default: Disabled

+

You can also turn this off in the UI by clearing the Internet Options > Advanced > Use inline AutoComplete in the Internet Explorer Address Bar and Open Dialog check box.

Disable Periodic Check for Internet Explorer software updates

Choose whether Internet Explorer periodically checks for a new version.

+

Default: Enabled

Turn off browser geolocation

Choose whether websites can request location data from Internet Explorer.

+

Default: Disabled

+ +  + +### ActiveX control blocking + +ActiveX control blocking periodically downloads a new list of out-of-date ActiveX controls that should be blocked. You can turn this off by changing the REG\_DWORD registry setting **HKEY\_CURRENT\_USER\\Software\\Microsoft\\Internet Explorer\\VersionManager\\DownloadVersionList** to 0 (zero). + +For more info, see [Out-of-date ActiveX control blocking](http://technet.microsoft.com/library/dn761713.aspx). + +### Mail synchronization + +To turn off mail synchronization for Microsoft Accounts that are configured on a device: + +- In **Settings** > **Accounts** > **Your email and accounts**, remove any connected Microsoft Accounts. + + -or- + +- Remove any Microsoft Accounts from the Mail app. + + -or- + +- Apply the Accounts/AllowMicrosoftAccountConnection MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is not allowed and 1 is allowed. This does not apply to Microsoft Accounts that have already been configured on the device. + +To turn off the Windows Mail app: + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Mail** > **Turn off Windows Mail application** + +### Microsoft Edge + +Use either Group Policy or MDM policies to manage settings for Microsoft Edge. For more info, see [Microsoft Edge and privacy: FAQ](http://go.microsoft.com/fwlink/p/?LinkId=730682). + +### Microsoft Edge Group Policies + +Find the Microsoft Edge Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Edge**. + +**Note**   +The Microsoft Edge Group Policy names were changed in Windows 10, Version 1511. The table below reflects those changes. + +  + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

Turn off autofill

Choose whether employees can use autofill on websites.

+

Default: Enabled

Allow employees to send Do Not Track headers

Choose whether employees can send Do Not Track headers.

+

Default: Disabled

Turn off password manager

Choose whether employees can save passwords locally on their devices.

+

Default: Enabled

Turn off address bar search suggestions

Choose whether the address bar shows search suggestions.

+

Default: Enabled

Turn off the SmartScreen Filter

Choose whether SmartScreen is turned on or off.

+

Default: Enabled

Open a new tab with an empty tab

Choose whether a new tab page appears.

+

Default: Enabled

Configure corporate Home pages

Choose the corporate Home page for domain-joined devices.

+

Set this to about:blank

+ +  + +### Microsoft Edge MDM policies + +The following Microsoft Edge MDM policies are available in the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

Browser/AllowAutoFill

Choose whether employees can use autofill on websites.

+

Default: Allowed

Browser/AllowDoNotTrack

Choose whether employees can send Do Not Track headers.

+

Default: Not allowed

Browser/AllowPasswordManager

Choose whether employees can save passwords locally on their devices.

+

Default: Allowed

Browser/AllowSearchSuggestionsinAddressBar

Choose whether the address bar shows search suggestions.

+

Default: Allowed

Browser/AllowSmartScreen

Choose whether SmartScreen is turned on or off.

+

Default: Allowed

+ +  + +### Windows Provisioning + +Use Windows ICD to create a provisioning package with the settings for these policies, go to **Runtime settings** > **Policies**. + +For a complete list of the Microsoft Edge policies, see [Available policies for Microsoft Edge](http://technet.microsoft.com/library/mt270204.aspx). + +### Network Connection Status Indicator + +Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to http://www.msftncsi.com to determine if the device can communicate with the Internet. For more info about NCIS, see [The Network Connection Status Icon](http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx). + +You can turn off NCSI through Group Policy: + +- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication Settings** > **Turn off Windows Network Connectivity Status Indicator active tests** + +### Offline maps + +You can turn off the ability to download and update offline maps. + +- In the UI: **Settings** > **System** > **Offline maps** > **Automatically update maps** + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Maps** > **Turn off Automatic Download and Update of Map Data** + +### OneDrive + +To turn off OneDrive in your organization: + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **OneDrive** > **Prevent the usage of OneDrive for file storage** + +### Preinstalled apps + +Some preinstalled apps get content before they are opened to ensure a great experience. You can remove these using the steps in this section. + +To remove the News app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingNews"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.BingNews | Remove-AppxPackage** + +To remove the Weather app: + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingWeather"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.BingWeather | Remove-AppxPackage** + +To remove the Money app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingFinance"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.BingFinance | Remove-AppxPackage** + +To remove the Sports app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.BingSports"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.BingSports | Remove-AppxPackage** + +To remove the Twitter app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "\*.Twitter"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage \*.Twitter | Remove-AppxPackage** + +To remove the XBOX app: + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.XboxApp"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.XboxApp | Remove-AppxPackage** + +To remove the Sway app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.Office.Sway"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.Office.Sway | Remove-AppxPackage** + +To remove the OneNote app: + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.Office.OneNote"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.Office.OneNote | Remove-AppxPackage** + +To remove the Get Office app: + +- Right-click the app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.MicrosoftOfficeHub"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.MicrosoftOfficeHub | Remove-AppxPackage** + +To remove the Get Skype app: + +- Right-click the Sports app in Start, and then click **Uninstall**. + + -or- + +- Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxProvisionedPackage -Online | Where-Object {$\_.PackageName -Like "Microsoft.SkypeApp"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $\_.PackageName}** + + -and- + + Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.SkypeApp | Remove-AppxPackage** + +### Settings > Privacy + +Use Settings > Privacy to configure some settings that may be important to your organization. Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC. + +- [General](#BKMK_General) + +- [Location](#BKMK_Priv_Location) + +- [Camera](#BKMK_Priv_Camera) + +- [Microphone](#BKMK_Priv_Microphone) + +- [Speech, inking, & typing](#BKMK_Priv_Speech) + +- [Account info](#BKMK_Priv_Accounts) + +- [Contacts](#BKMK_Priv_Contacts) + +- [Calendar](#BKMK_Priv_Calendar) + +- [Call history](#BKMK_Priv_CallHistory) + +- [Email](#BKMK_Priv_Email) + +- [Messaging](#BKMK_Priv_Messaging) + +- [Radios](#BKMK_Priv_Radios) + +- [Other devices](#BKMK_Priv_Other_Devices) + +- [Feedback & diagnostics](#BKMK_Priv_Feedback) + +- [Background apps](#BKMK_Priv_Background) + +### General + +**General** includes options that don't fall into other areas. + +To turn off **Let apps use my advertising ID for experiences across apps (turning this off will reset your ID)**: + +**Note**   +When you turn this feature off in the UI, it turns off the advertising ID, not just resets it. + +  + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **User Profiles** > **Turn off the advertising ID**. + + -or- + +- Create a REG\_DWORD registry setting called **Enabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AdvertisingInfo**, with a value of 0 (zero). + +To turn off **Turn on SmartScreen Filter to check web content (URLs) that Windows Store apps use**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Edge** > **Turn off the SmartScreen Filter**. + + Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **File Explorer** > **Configure Windows SmartScreen**. + + -or- + +- Apply the Browser/AllowSmartScreen MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on. + + -or- + +- Create a provisioning package, using: + + - For Internet Explorer: **Runtime settings** > **Policies** > **Browser** > **AllowSmartScreen** + + - For Microsoft Edge: **Runtime settings** > **Policies** > **MicrosoftEdge** > **AllowSmartScreen** + + -or- + +- Create a REG\_DWORD registry setting called **Enabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AppHost\\EnableWebContentEvaluation**, with a value of 0 (zero). + +To turn off **Send Microsoft info about how I write to help us improve typing and writing in the future**: + +**Note**   +If the telemetry level is set to either [Basic](#BKMK_UTC_Basic) or [Security](#BKMK_UTC_Security), this is turned off automatically. + +  + +- Turn off the feature in the UI. + + -or- + +- Apply the TextInput/AllowLinguisticDataCollection MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where: + + - **0**. Not allowed + + - **1**. Allowed (default) + +To turn off **Let websites provide locally relevant content by accessing my language list**: + +- Turn off the feature in the UI. + + -or- + +- Create a new REG\_DWORD registry setting called **HttpAcceptLanguageOptOut** in **HKEY\_CURRENT\_USER\\Control Panel\\International\\User Profile**, with a value of 1. + +### Location + +In the **Location** area, you choose whether devices have access to location-specific sensors and which apps have access to the device's location. + +To turn off **Location for this device**: + +- Click the **Change** button in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Location and Sensors** > **Turn off location**. + + -or- + +- Apply the System/AllowLocation MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx), where: + + - **0**. Turned off and the employee can't turn it back on. + + - **1**. Turned on, but lets the employee choose whether to use it. (default) + + - **2**. Turned on and the employee can't turn it off. + + **Note**   + You can also set this MDM policy in System Center Configuration Manager using the [WMI Bridge Provider](http://msdn.microsoft.com/library/dn905224.aspx). + +   + + -or- + +- Create a provisioning package, using **Runtime settings** > **Policies** > **System** > **AllowLocation**, where + + - **No**. Turns off location service. + + - **Yes**. Turns on location service. (default) + +To turn off **Location**: + +- Turn off the feature in the UI. + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access location** + + - Set the **Select a setting** box to **Force Deny**. + + -or- + +To turn off **Location history**: + +- Erase the history using the **Clear** button in the UI. + +To turn off **Choose apps that can use your location**: + +- Turn off each app using the UI. + +### Camera + +In the **Camera** area, you can choose which apps can access a device's camera. + +To turn off **Let apps use my camera**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access the camera** + + - Set the **Select a setting** box to **Force Deny**. + + -or- + +- Apply the Camera/AllowCamera MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx), where: + + - **0**. Apps can't use the camera. + + - **1**. Apps can use the camera. + + **Note**   + You can also set this MDM policy in System Center Configuration Manager using the [WMI Bridge Provider](http://msdn.microsoft.com/library/dn905224.aspx). + +   + + -or- + +- Create a provisioning package with use Windows ICD, using **Runtime settings** > **Policies** > **Camera** > **AllowCamera**, where: + + - **0**. Apps can't use the camera. + + - **1**. Apps can use the camera. + +To turn off **Choose apps that can use your camera**: + +- Turn off the feature in the UI for each app. + +### Microphone + +In the **Microphone** area, you can choose which apps can access a device's microphone. + +To turn off **Let apps use my microphone**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access the microphone** + + - Set the **Select a setting** box to **Force Deny**. + +To turn off **Choose apps that can use your microphone**: + +- Turn off the feature in the UI for each app. + +### Speech, inking, & typing + +In the **Speech, Inking, & Typing** area, you can let Windows and Cortana better understand your employee's voice and written input by sampling their voice and writing, and by comparing verbal and written input to contact names and calendar entrees. + +**Note**   +For more info on how to disable Cortana in your enterprise, see [Cortana](#BKMK_Cortana) in this article. + +  + +To turn off the functionality: + +- Click the **Stop getting to know me** button, and then click **Turn off**. + + -or- + +- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Regional and Language Options** > **Handwriting personalization** > **Turn off automatic learning** + + -or- + +- Create a REG\_DWORD registry setting called **AcceptedPrivacyPolicy** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Personalization\\Settings**, with a value of 0 (zero). + + -and- + + Create a REG\_DWORD registry setting called **HarvestContacts** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\InputPersonalization\\TrainedDataStore**, with a value of 0 (zero). + +### Account info + +In the **Account Info** area, you can choose which apps can access your name, picture, and other account info. + +To turn off **Let apps access my name, picture, and other account info**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access account information** + + - Set the **Select a setting** box to **Force Deny**. + +To turn off **Choose the apps that can access your account info**: + +- Turn off the feature in the UI for each app. + +### Contacts + +In the **Contacts** area, you can choose which apps can access an employee's contacts list. + +To turn off **Choose apps that can access contacts**: + +- Turn off the feature in the UI for each app. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access contacts** + + - Set the **Select a setting** box to **Force Deny**. + +### Calendar + +In the **Calendar** area, you can choose which apps have access to an employee's calendar. + +To turn off **Let apps access my calendar**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access the calendar** + + - Set the **Select a setting** box to **Force Deny**. + +To turn off **Choose apps that can access calendar**: + +- Turn off the feature in the UI for each app. + +### Call history + +In the **Call history** area, you can choose which apps have access to an employee's call history. + +To turn off **Let apps access my call history**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access call history** + + - Set the **Select a setting** box to **Force Deny**. + +### Email + +In the **Email** area, you can choose which apps have can access and send email. + +To turn off **Let apps access and send email**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access email** + + - Set the **Select a setting** box to **Force Deny**. + +### Messaging + +In the **Messaging** area, you can choose which apps can read or send messages. + +To turn off **Let apps read or send messages (text or MMS)**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access messaging** + + - Set the **Select a setting** box to **Force Deny**. + +To turn off **Choose apps that can read or send messages**: + +- Turn off the feature in the UI for each app. + +### Radios + +In the **Radios** area, you can choose which apps can turn a device's radio on or off. + +To turn off **Let apps control radios**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps control radios** + + - Set the **Select a setting** box to **Force Deny**. + +To turn off **Choose apps that can control radios**: + +- Turn off the feature in the UI for each app. + +### Other devices + +In the **Other Devices** area, you can choose whether devices that aren't paired to PCs, such as an Xbox One, can share and sync info. + +To turn off **Let apps automatically share and sync info with wireless devices that don't explicitly pair with your PC, tablet, or phone**: + +- Turn off the feature in the UI. + +To turn off **Let your apps use your trusted devices (hardware you've already connected, or comes with your PC, tablet, or phone)**: + +- Turn off the feature in the UI. + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **App Privacy** > **Let Windows apps access trusted devices** + + - Set the **Select a setting** box to **Force Deny**. + +### Feedback & diagnostics + +In the **Feedback & Diagnostics** area, you can choose how often you're asked for feedback and how much diagnostic and usage information is sent to Microsoft. + +To change how frequently **Windows should ask for my feedback**: + +**Note**   +Feedback frequency only applies to user-generated feedback, not diagnostic and usage data sent from the device. + +  + +- To change from **Automatically (Recommended)**, use the drop-down list in the UI. + + -or- + +- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds** > **Do not show feedback notifications** + + -or- + +- Create the registry keys (REG\_DWORD type): + + - HKEY\_CURRENT\_USER\\Software\\Microsoft\\Siuf\\Rules\\PeriodInNanoSeconds + + - HKEY\_CURRENT\_USER\\Software\\Microsoft\\Siuf\\Rules\\NumberOfSIUFInPeriod + + Based on these settings: + + | Setting | PeriodInNanoSeconds | NumberOfSIUFInPeriod | + |---------------|-----------------------------|-----------------------------| + | Automatically | Delete the registry setting | Delete the registry setting | + | Never | 0 | 0 | + | Always | 100000000 | Delete the registry setting | + | Once a day | 864000000000 | 1 | + | Once a week | 6048000000000 | 1 | + +   + +To change the level of diagnostic and usage data sent when you **Send your device data to Microsoft**: + +- To change from [Enhanced](#BKMK_UTC_Enhanced), use the drop-down list in the UI. The other levels are **Basic** and **Full**. For more info about these levels, see [How telemetry works](#BKMK_MoreUTC). + + **Note**   + You can't use the UI to change the telemetry level to [Security](#BKMK_UTC_Security). + +   + + -or- + +- Apply the Group Policy: **Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection And Preview Builds\\Allow Telemetry** + + -or- + +- Apply the System/AllowTelemetry MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx), where: + + - **0**. Maps to the [Security](#BKMK_UTC_Security) level. + + - **1**. Maps to the [Basic](#BKMK_UTC_Basic) level. + + - **2**. Maps to the [Enhanced](#BKMK_UTC_Enhanced) level. + + - **3**. Maps to the [Full](#BKMK_UTC_Full) level. + + -or- + +- Create a provisioning package, using **Runtime settings** > **Policies** > **System** > **AllowTelemetry**, where: + + - **0**. Maps to the [Security](#BKMK_UTC_Security) level. + + - **1**. Maps to the [Basic](#BKMK_UTC_Basic) level. + + - **2**. Maps to the [Enhanced](#BKMK_UTC_Enhanced) level. + + - **3**. Maps to the [Full](#BKMK_UTC_Full) level. + +### Background apps + +In the **Background Apps** area, you can choose which apps can run in the background. + +To turn off **Let apps run in the background**: + +- Turn off the feature in the UI for each app. + +### Software Protection Platform + +Enterprise customers can manage their Windows activation status with volume licensing using an on-premise Key Management Server. You can opt out of sending KMS client activation data to Microsoft automatically by applying the following Group Policy: + +**Computer Configuration** > **Administrative Templates** > **Windows Components** > **Software Protection Platform** > **Turn off KMS Client Online AVS Activation** + +The Windows activation status will be valid for a rolling period of 180 days with weekly activation status checks to the KMS. + +### Sync your settings + +You can control if your settings are synchronized: + +- In the UI: **Settings** > **Accounts** > **Sync your settings** + + -or- + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Sync your settings** > **Do not sync** + + -or- + +- Apply the Experience/AllowSyncMySettings MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is not allowed and 1 is allowed. + + -or- + +- Create a provisioning package, using **Runtime settings** > **Policies** > **Experience** > **AllowSyncMySettings**, where + + - **No**. Settings are not synchronized. + + - **Yes**. Settings are synchronized. (default) + +To turn off Messaging cloud sync: + +- Create a REG\_DWORD registry setting called **CloudServiceSyncEnabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Messaging**, with a value of 0 (zero). + +### Teredo + +You can disable Teredo by using the netsh.exe command. For more info on Teredo, see [Internet Protocol Version 6, Teredo, and Related Technologies](http://technet.microsoft.com/library/cc722030.aspx). + +- From an elevated command prompt, run **netsh interface teredo set state disabled** + +### Wi-Fi Sense + +Wi-Fi Sense automatically connects devices to known hotspots and to the wireless networks the person’s contacts have shared with them. + +To turn off **Connect to suggested open hotspots** and **Connect to networks shared by my contacts**: + +- Turn off the feature in the UI. + + -or- + +- Disable the Group Policy: **Computer Configuration** > **Administrative Templates** > **Network** > **WLAN Service** > **WLAN Settings** > **Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services**. + + -or- + +- Create a new REG\_DWORD registry setting called **AutoConnectAllowedOEM** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\WcmSvc\\wifinetworkmanager\\config**, with a value of 0 (zero). + + -or- + +- Change the Windows Provisioning setting, WiFISenseAllowed, to 0 (zero). For more info, see the Windows Provisioning Settings reference doc, [WiFiSenseAllowed](http://go.microsoft.com/fwlink/p/?LinkId=620909). + + -or- + +- Use the Unattended settings to set the value of WiFiSenseAllowed to 0 (zero). For more info, see the Unattended Windows Setup reference doc, [WiFiSenseAllowed.](http://go.microsoft.com/fwlink/p/?LinkId=620910) + +When turned off, the Wi-Fi Sense settings still appear on the Wi-Fi Settings screen, but they’re non-functional and they can’t be controlled by the employee. + +### Windows Defender + +You can opt of the Microsoft Antimalware Protection Service. + +- Disable the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Defender** > **MAPS** > **Join Microsoft MAPS** + + -or- + +- Apply the Defender/AllowClouldProtection MDM policy from the [Defender CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). + + -or- + +- Use the registry to set the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SpyNetReporting** to 0 (zero). + +You can stop sending file samples back to Microsoft. + +- Set the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Defender** > **MAPS** > **Send file samples when further analysis is required** to **Always Prompt** or **Never Send**. + + -or- + +- Apply the Defender/SubmitSamplesConsent MDM policy from the [Defender CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx), where: + + - **0**. Always prompt. + + - **1**. (default) Send safe samples automatically. + + - **2**. Never send. + + - **3**. Send all samples automatically. + + -or- + +- Use the registry to set the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SubmitSamplesConsent** to 0 (zero) to always prompt or 2 to never send. + +You can also use the registry to turn off Malicious Software Reporting Tool telemetry by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1. + +### Windows Media Player + +To remove Windows Media Player: + +- From the **Programs and Features** control panel, click **Turn Windows features on or off**, under **Media Features**, clear the **Windows Media Player** check box, and then click **OK**. + + -or- + +- Run the following DISM command from an elevated command prompt: **dism /online /Disable-Feature /FeatureName:WindowsMediaPlayer** + +### Windows spotlight + +Windows spotlight provides different background images and text on the lock screen. You can control it by using the user interface or through Group Policy. + +- Configure the following in **Settings**: + + - **Personalization** > **Lock screen** > **Background** > **Windows spotlight**, select a different background, and turn off **Show me tips, tricks, and more on the lock screen**. + + - **Personalization** > **Start** > **Occasionally show suggestions in Start**. + + - **System** > **Notifications & actions** > **Show me tips about Windows**. + + -or- + +- Apply the Group Policies: + + - **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Force a specific default lock screen image**. + - Add a location in the **Path to local lock screen image** box. + + - Set the **Turn off fun facts, tips, tricks, and more on lock screen** check box. + + **Note**  This will only take effect if the policy is applied before the first logon. If you cannot apply the **Force a specific default lock screen image** policy before the first logon to the device, you can apply this policy: **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Do not display the lock screen**. + +   + + - **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Cloud Content** > **Do not show Windows Tips**. + + - **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Cloud Content** > **Turn off Microsoft consumer experiences**. + +For more info, see [Windows spotlight on the lock screen](../whats-new/windows-spotlight.md). + +### Windows Store + +You can turn off the ability to launch apps from the Windows Store that were preinstalled or downloaded. This will also turn off automatic app updates, and the Windows Store will be disabled. + +- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Store** > **Disable all apps from Windows Store**. + +### Windows Update Delivery Optimization + +Windows Update Delivery Optimization lets you get Windows updates and Windows Store apps from sources in addition to Microsoft, which not only helps when you have a limited or unreliable Internet connection, but can also help you reduce the amount of bandwidth needed to keep all of your organization’s PCs up-to-date. If you have Delivery Optimization turned on, PCs on your network may send and receive updates and apps to other PCs on your local network, if you choose, or to PCs on the Internet. + +By default, PCs running Windows 10 Enterprise and Windows 10 Education will only use Delivery Optimization to get and receive updates for PCs and apps on your local network. + +Use the UI, Group Policy, MDM policies, or Windows Provisioning to set up Delivery Optimization. + +### Settings > Update & security + +You can set up Delivery Optimization from the **Settings** UI. + +- Go to **Settings** > **Update & security** > **Windows Update** > **Advanced options** > **Choose how updates are delivered**. + +### Delivery Optimization Group Policies + +You can find the Delivery Optimization Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Delivery Optimization**. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

Download Mode

Lets you choose where Delivery Optimization gets or sends updates and apps, including

+
    +
  • None. Turns off Delivery Optimization.

  • +
  • Group. Gets or sends updates and apps to PCs on the same local network domain.

  • +
  • Internet. Gets or sends updates and apps to PCs on the Internet.

  • +
  • LAN. Gets or sends updates and apps to PCs on the same NAT only.

  • +

Group ID

Lets you provide a Group ID that limits which PCs can share apps and updates.

+
+Note   +

This ID must be a GUID.

+
+
+  +

Max Cache Age

Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache.

+

The default value is 259200 seconds (3 days).

Max Cache Size

Lets you specify the maximum cache size as a percentage of disk size.

+

The default value is 20, which represents 20% of the disk.

Max Upload Bandwidth

Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity.

+

The default value is 0, which means unlimited possible bandwidth.

+ +  + +### Delivery Optimization MDM policies + +The following Delivery Optimization MDM policies are available in the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyDescription

DeliveryOptimization/DODownloadMode

Lets you configure where Delivery Optimization gets or sends updates and apps, including:

+
    +
  • 0. Turns off Delivery Optimization.

  • +
  • 1. Gets or sends updates and apps to PCs on the same NAT only.

  • +
  • 2. Gets or sends updates and apps to PCs on the same local network domain.

  • +
  • 3. Gets or sends updates and apps to PCs on the Internet.

  • +

DeliveryOptimization/DOGroupID

Lets you provide a Group ID that limits which PCs can share apps and updates.

+
+Note   +

This ID must be a GUID.

+
+
+  +

DeliveryOptimization/DOMaxCacheAge

Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache.

+

The default value is 259200 seconds (3 days).

DeliveryOptimization/DOMaxCacheSize

Lets you specify the maximum cache size as a percentage of disk size.

+

The default value is 20, which represents 20% of the disk.

DeliveryOptimization/DOMaxUploadBandwidth

Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity.

+

The default value is 0, which means unlimited possible bandwidth.

+ +  + +### Windows Provisioning + +If you don't have an MDM server in your enterprise, you can use Windows Provisioning to configure the Delivery Optimization policies + +Use Windows ICD, included with the [Windows Assessment and Deployment Kit (Windows ADK)](http://go.microsoft.com/fwlink/p/?LinkId=526803), to create a provisioning package for Delivery Optimization. + +1. Open Windows ICD, and then click **New provisioning package**. + +2. In the **Name** box, type a name for the provisioning package, and then click **Next.** + +3. Click the **Common to all Windows editions** option, click **Next**, and then click **Finish**. + +4. Go to **Runtime settings** > **Policies** > **DeliveryOptimization** to configure the policies. + +For more info about Delivery Optimization in general, see [Windows Update Delivery Optimization: FAQ](http://go.microsoft.com/fwlink/p/?LinkId=730684). + +### Windows Update + +You can turn off Windows Update by setting the following registry entries: + +- Add a REG\_DWORD value called **DoNotConnectToWindowsUpdateInternetLocations** to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate** and set the value to 1. + + -and- + +- Add a REG\_DWORD value called **DisableWindowsUpdateAccess** to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate** and set the value to 1. + +You can turn off automatic updates by doing one of the following. This is not recommended. + +- Add a REG\_DWORD value called **AutoDownload** to **HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\WindowsStore\\WindowsUpdate** and set the value to 5. + + -or- + +- Apply the Update/AllowAutoUpdate MDM policy from the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx), where: + + - **0**. Notify the user before downloading the update. + + - **1**. Auto install the update and then notify the user to schedule a device restart. + + - **2** (default). Auto install and restart. + + - **3**. Auto install and restart at a specified time. + + - **4**. Auto install and restart without end-user control. + + - **5**. Turn off automatic updates. + +To learn more, see [Device update management](http://msdn.microsoft.com/library/windows/hardware/dn957432.aspx) and [Configure Automatic Updates by using Group Policy](http://technet.microsoft.com/library/cc720539.aspx). + +## Manage your telemetry settings + + +You can manage your telemetry settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your telemetry levels through a management policy overrides any device-level settings. + +You can set your organization’s devices to use 1 of 4 telemetry levels: + +- [Security](#BKMK_UTC_Security) (only available on Windows 10 Enterprise, Windows 10 Education, and Windows 10 IoT Core (IoT Core) editions) + +- [Basic](#BKMK_UTC_Basic) + +- [Enhanced](#BKMK_UTC_Enhanced) + +- [Full](#BKMK_UTC_Full) + +For more info about these telemetry levels, see [Telemetry levels](#BKMK_TelemetryLevels). In Windows 10 Enterprise, Windows 10 Education, and IoT Core, the default telemetry level is [Enhanced](#BKMK_UTC_Enhanced). + +**Important**   +These telemetry levels only apply to Windows components and apps that use the Connected User Experience and Telemetry component. Non-Windows components, such as Microsoft Office or other 3rd-party apps, may communicate with their cloud services outside of these telemetry levels. App publishers must let people know about how they use their telemetry, ways to opt in or opt out, and they must separately document their privacy policies. + +  + +### Use Group Policy to set the telemetry level + +Use a Group Policy object to set your organization’s telemetry level. + +1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. + +2. Double-click **Allow Telemetry**. + +3. In the **Options** box, select the level that you want to configure, and then click **OK**. + +### Use MDM to set the telemetry level + +Use the [Policy Configuration Service Provider (CSP)](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) to apply the System/AllowTelemetry MDM policy, using one of these telemetry values: + +- **0**. Maps to the [Security](#BKMK_UTC_Security) level. + +- **1**. Maps to the [Basic](#BKMK_UTC_Basic) level. + +- **2**. Maps to the [Enhanced](#BKMK_UTC_Enhanced) level. + +- **3**. Maps to the [Full](#BKMK_UTC_Full) level. + +### Use Windows Provisioning to set the telemetry level + +Use Windows Provisioning and the Windows Imaging and Configuration Designer (Windows ICD) tool – part of the [Windows Assessment and Deployment Kit (Windows ADK) toolkit](http://go.microsoft.com/fwlink/p/?LinkId=526803) - to create a provisioning package and runtime setting that sets your organization’s telemetry level. + +After you create the provisioning package, you can email it to your employees, put it on a network share, or integrate the package directly into a custom image using Windows ICD. + +**To use Windows ICD to integrate your package into a custom image** + +1. Open Windows ICD, and then click **New provisioning package**. + +2. In the **Name** box, type a name for the provisioning package, and then click **Next**. + +3. Click **Common to all Windows editions** > **Next** > **Finish**. + +4. Go to **Runtime settings** > **Policies** > **System** > **AllowTelemetry** to configure the policies. You can set it to one of the following: + + - **Disabled \[Enterprise SKU Only\]**. Maps to the [Security](#BKMK_UTC_Security) level. + + - **Basic**. Maps to the [Basic](#BKMK_UTC_Basic) level. + + - **Full**. Maps to the [Enhanced](#BKMK_UTC_Enhanced) level + + - **Diagnostic**. Maps to the [Full](#BKMK_UTC_Full) level. + +5. After you've added all of your settings to the provisioning package, click **Export** > **Provisioning package**. + +6. On the **Describe the provisioning package** step, in the **Owner** box, click **IT Admin** > **Next**. + +7. On the **Select security details for the provisioning package** step, if you want to protect the package with a password, select the **Encrypt package** check box. If you'd like to sign the package with a certificate, select the **Sign package** check box and select the certificate to use. Click **Next**. + +8. On the **Select where to save the provisioning package** step, if you want to save it somewhere other than the Windows ICD project folder, choose a new location, and then click **Next**. + +9. On the **Build the provisioning package** step, click **Build**. + +### Use Registry Editor to set the telemetry level + +Use Registry Editor to manually set the registry level on each device in your organization, or write a script to edit the registry. + +If a management policy already exists (from Group Policy, MDM, or Windows Provisioning), it will override this registry setting. + +1. Open Registry Editor, and go to **HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\DataCollection**. + +2. Right-click **DataCollection**, click **New**, and then click **DWORD (32-bit) Value**. + +3. Type **AllowTelemetry**, and then press ENTER. + +4. Double-click **AllowTelemetry** and set the value to one of the following levels, and the click **OK**. + + - **0**. This setting maps to the [Security](#BKMK_UTC_Security) level. + + - **1**. This setting maps to the [Basic](#BKMK_UTC_Basic) level. + + - **2**. This setting maps to the [Enhanced](#BKMK_UTC_Enhanced) level + + - **3**. This setting maps to the [Full](#BKMK_UTC_Full) level. + +5. Click **File** > **Export**, and then save the file as a .reg file, such as **C:\\AllowTelemetry.reg**. You can run this file from a script on each device in your organization. + +### Additional telemetry controls + +There are a few more settings that you can turn off that may send telemetry information: + +- To turn off Windows Update telemetry, you have two choices. Either turn off Windows Update, or set your devices to be managed by an on premises update server, such as [Windows Server Update Services (WSUS)](http://technet.microsoft.com/library/hh852345.aspx) or [System Center Configuration Manager](http://www.microsoft.com/server-cloud/products/system-center-2012-r2-configuration-manager/). + +- Turn off **Windows Defender Cloud-based Protection** and **Automatic sample submission** in **Settings** > **Update & security** > **Windows Defender**. + +- Manage the Malicious Software Removal Tool in your organization. For more info, see Microsoft KB article [891716](http://support.microsoft.com/kb/891716). + +- Turn off Linguistic Data Collection in **Settings** > **Privacy**. At telemetry levels Enhanced and Full, Microsoft uses Linguistic Data Collection info to improve language model features such as autocomplete, spellcheck, suggestions, input pattern recognition, and dictionary. For more info, see the **Get to know me** setting in the [Speech, inking, & typing](#BKMK_Priv_Speech) section of this article and the **Send Microsoft info about how I write to help us improve typing and writing in the future** setting in the [General](#BKMK_Priv_General) section of this article. + + **Note**   + Microsoft doesn't intentionally gather sensitive information, such as credit card numbers, usernames and passwords, email addresses, or other similarly sensitive information for Linguistic Data Collection. We guard against such events by using technologies to identify and remove sensitive information before linguistic data is sent from the user's device. If we determine that sensitive information has been inadvertently received, we delete the information. + +   + +## How telemetry works + + +Windows uses telemetry information to analyze and fix software problems. It also helps Microsoft improve its software and provide updates that enhance the security and reliability of devices within your organization. + +### Telemetry levels + +This section explains the different telemetry levels in Windows 10. These levels are available on all desktop and mobile editions of Windows 10, with the exception of the Security level which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and IoT Core. + +- **Security**. Information that’s required to help keep Windows secure, including info about theConnected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. This level is available only on Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and IoT Core. + +- **Basic**. Basic device info, including: quality-related info, app compat, and info from the Security level. + +- **Enhanced** Additional insights, including: how Windows and Windows apps are used, how they perform, advanced reliability info, and info from both the Basic and the Security levels. + +- **Full**. All info necessary to identify and help to fix problems, plus info from the Security, Basic, and Enhanced levels. + +As a diagram: + +![](images/priv-telemetry-levels.png) + +### Security level + +The Security level gathers only telemetry info that’s required to keep Windows devices secure. This level is only available on Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and IoT Core editions. + +**Note**   +If your organization relies on Windows Update for updates, you shouldn’t use the Security level. Because no Windows Update information is gathered at this level, Microsoft can’t tell whether an update successfully installed. + +You can continue to use Windows Server Update Services and System Center Configuration Manager while using the Security level. + +  + +Security level info includes: + +- **Connected User Experience and Telemetry component settings**. If data has been gathered and is queued to be sent, the Connected User Experience and Telemetry component downloads its settings file from Microsoft’s servers. The data collected by the client for this request includes OS information, device id (used to identify what specific device is requesting settings) and device class (for example, whether the device is server or desktop). + +- **Malicious Software Removal Tool (MSRT)** The MSRT infection report contains information, including device info and IP address. + + **Note**   + You can turn off the MSRT infection report. No MSRT information is included if MSRT is not used. If Windows Update is turned off, MSRT will not be offered to users. + +   + +- **Windows Defender**. Windows Defender requires some information to function, including: anti-malware signatures, diagnostic information, User Account Control settings, Unified Extensible Firmware Interface (UEFI) settings, and IP address. + + **Note**   + This reporting can be turned off and no information is included if a customer is using third party antimalware software, or if Windows Defender is turned off. + + Microsoft recommends that Windows Update, Windows Defender, and MSRT remain enabled unless the enterprise uses alternative solutions such as Windows Server Update Services, System Center Configuration Manager, or a third party antimalware solution. Windows Update, Windows Defender, and MSRT provide core Windows functionality such as driver and OS updates, including security updates; moreover, Window Defender requires updated anti-malware signatures in order to provide security functionality. + +   + +No user content, such as user files or communications, is gathered at the Security telemetry level, and we take steps to avoid gathering any information that directly identifies a company or user, such as name, email address, or account ID. However, in rare circumstances, MSRT information may unintentionally contain personal information. For instance, some malware may create entries in a computer’s registry that include information such as a username, causing it to be gathered. MSRT reporting is optional and can be turned off at any time. + +To set the telemetry level to Security, use a management policy (Group Policy or MDM) or by manually changing the setting in the registry. For more info, see the [Manage your telemetry settings](#BKMK_UTC) section of this article. + +### Basic level + +The Basic level gathers a limited set of info that’s critical for understanding the device and its configuration. This level also includes the Security level info. This level helps to identify problems that can occur on a particular device hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a particular driver version. + +Basic level info includes: + +- **Basic device info**. Helps provide an understanding about the various types of devices in the Windows 10 ecosystem, including: + + - Device attributes, such as camera resolution and display type + + - Internet Explorer version + + - Battery attributes, such as capacity and type + + - Networking attributes, such as mobile operator network and IMEI number + + - Processor and memory attributes, such as number of cores, speed, and firmware + + - Operating system attributes, such as Windows edition and IsVirtualDevice + + - Storage attributes, such as number of drives and memory size + +- **Connected User Experience and Telemetry component quality metrics**. Helps provide an understanding about how the Connected User Experience and Telemetry component is functioning, including uploaded events, dropped events, and the last upload time. + +- **Quality-related information**. Helps Microsoft develop a basic understanding of how a device and its operating system are performing. Some examples are the amount of time a connected standby device was able to fullsleep, the number of crashes or hangs, and application state change details, such as how much processor time and memory were used, and the total uptime for an app. + +- **App compat info**. Helps provide understanding about which apps are installed on a device and to help identify potential compatibility problems. + + - **General app info and app info for Internet Explorer add-ons**. Includes a list of apps and Internet Explorer add-ons that are installed on a device and whether these apps will work after an upgrade. This app info includes the app name, publisher, version, and basic details about which files have been blocked from usage. + + - **System info**. Helps provide understanding about whether a device meets the minimum requirements to upgrade to the next version of the operating system. System information includes the amount of memory, as well as info about the processor and BIOS. + + - **Accessory device info**. Includes a list of accessory devices, such as printers or external storage devices, that are connected to Windows PCs and whether these devices will function after upgrading to a new version of the operating system. + + - **Driver info**. Includes specific driver usage that’s meant to help figure out whether apps and devices will function after upgrading to a new version of the operating system. This info can help to determine blocking issues and then help Microsoft and our partners apply fixes and improvements. + +- **Store**. Provides info about how the Windows Store performs, including app downloads, installations, and updates. It also includes Windows Store launches, page views, suspend and resumes, and obtaining licenses. + +### Enhanced level + +The Enhanced level gathers info about how Windows and apps are used and how they perform. This level also includes info from both the Basic and Security levels. This level helps to improve experiences by analyzing user interaction with the operating system and apps. Info from this level can be abstracted into patterns and trends that can help Microsoft determine future improvements. + +Enhanced level info includes: + +- **Operating system events**. Helps to gain insights into different areas of the operating system, including networking, Hyper-V, Cortana, and other components. + +- **Operating system app events**. A set of events resulting from Microsoft apps that were downloaded from the Store or pre-installed with Windows, including Photos, Mail, and Microsoft Edge. + +- **Device-specific events**. Contains info about events that are specific to certain devices, such as Surface Hub and Microsoft HoloLens. For example, Microsoft HoloLens sends Holographic Processing Unit (HPU)-related events. + +If the Connected User Experience and Telemetry component detects a problem that requires gathering more detailed instrumentation, then the Connected User Experience and Telemetry component will only gather info about the events associated with the specific issue, for no more than 2 weeks. Also, if the operating system or an app crashes or hangs, Microsoft will gather the memory contents of the faulting process only at the time of the crash or hang. + +### Full level + +The Full level gathers info necessary to identify and to help fix problems, following the approval process described below. This level also includes info from the Basic, Enhanced, and Security levels. + +Additionally, at this level, devices opted in to the Windows Insider Program will send events that can show Microsoft how pre-release binaries and features are performing. All devices in the Windows Insider Program are automatically set to this level. + +If a device experiences problems that are difficult to identify or repeat using Microsoft’s internal testing, additional info becomes necessary. This info can include any user content that might have triggered the problem and is gathered from a small sample of devices that have both opted into the Full telemetry level and have exhibited the problem. + +However, before more info is gathered, Microsoft’s privacy governance team, including privacy and other subject matter experts, must approve the diagnostics request made by a Microsoft engineer. If the request is approved, Microsoft engineers can use the following capabilities to get the information: + +- Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe. + +- Ability to get registry keys. + +- Ability to gather user content, such as documents, if they might have been the trigger for the issue. + +### How is telemetry information handled by Microsoft? + +### Collection + +Information gathered by the Connected User Experience and Telemetry component complies with Microsoft’s security and privacy policies, as well as international laws and regulations. Only those who can demonstrate a valid business need can access the telemetry info. + +### Data Transfer + +All telemetry info is encrypted during transfer from the device to the Microsoft Data Management Service. Data is uploaded on a schedule that is sensitive to event priority, battery use, and network cost. Real-time events, such as gaming achievements, are always sent immediately. Normal events are not uploaded on metered networks. On a free network, normal events can be uploaded every 4 hours if on battery, or every 15 minutes if on A/C power. Diagnostic and crash data are only uploaded on A/C power and free networks. + +### Microsoft Data Management Service + +The Microsoft Data Management Service routes information to internal cloud storage, where it's compiled into business reports for analysis and research. Sensitive info is stored in a separate data store that’s locked down to a small subset of Microsoft employees in the Windows Devices Group. The privacy governance team permits access only to people with a valid business justification. The Connected User Experiences and Telemetry component connects to the Microsoft Data Management service at v10.vortex-win.data.microsoft.com. The Connected User Experience and Telemetry component connects to settings-win.data.microsoft.com to collect its settings. + +### Usage + +Information is used by teams within Microsoft to provide, improve, and personalize experiences, and for security, health, quality, and performance analysis. + +An example of personalization is to create individually tailored in-product messages. + +Microsoft doesn’t share organization-specific customer information with third parties, except at the customer’s direction or for the limited purposes described in the privacy statement. However, we do share business reports with partners that include aggregated, anonymous telemetry information. Decisions to share info are made by an internal team that includes privacy, legal, and data management professionals. + +### Retention + +Microsoft believes in and practices information minimization, so we only gather the info we need, and we only store it for as long as it’s needed to provide a service or for analysis. Much of the info about how Windows and apps are functioning is deleted within 30 days. Other info may be retained longer, particularly if there is a regulatory requirement to do so. Info is typically gathered at a fractional sampling rate, which for some client services, can be as low as 1%. + +  + +  + + + + + diff --git a/windows/manage/manage-private-store-settings.md b/windows/manage/manage-private-store-settings.md new file mode 100644 index 0000000000..6b52a382f2 --- /dev/null +++ b/windows/manage/manage-private-store-settings.md @@ -0,0 +1,50 @@ +--- +title: Manage private store settings (Windows 10) +description: The private store is a feature in the Windows Store for Business that organizations receive during the sign up process. +ms.assetid: 2D501538-0C6E-4408-948A-2BF5B05F7A0C +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage private store settings + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +The private store is a feature in the Windows Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Only online-licensed apps can be distributed from your private store. + +The name of your private store is shown on a tab in the Windows Store. + +![](images/wsfb-wsappprivatestore.png) + +You can change the name of your private store in Store for Business. + +**To change the name of your private store** + +1. Sign in to Store for Business. + +2. Click **Settings**, and then choose **Private store**. + + You'll see your private store name. + + ![](images/wsfb-privatestore.png) + +3. Click **Change**. + +4. Type a new display name for your private store, and click **Save**. + + ![](images/wsfb-renameprivatestore.png) + +  + +  + + + + + diff --git a/windows/manage/manage-settings-in-the-windows-store-for-business.md b/windows/manage/manage-settings-in-the-windows-store-for-business.md new file mode 100644 index 0000000000..9a61f80f15 --- /dev/null +++ b/windows/manage/manage-settings-in-the-windows-store-for-business.md @@ -0,0 +1,56 @@ +--- +title: Manage settings for the Windows Store for Business (Windows 10) +description: You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant. +ms.assetid: E3283D77-4DB2-40A9-9479-DDBC33D5A895 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage settings for the Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Update Windows Store for Business account settings](update-windows-store-for-business-account-settings-.md)

The Account information page in Windows Store for Business shows information about your organization that you can update, including: country or region, organization name, default domain, and language preference. These are settings in the Azure AD directory that you used when signing up for Store for Business

[Manage user accounts in Windows Store for Business](manage-users-and-groups-in-the-windows-store-for-business.md)

Store for Business manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-in-the-windows-store-for-business.md), but not to groups.

+ +  + +  + +  + + + + + diff --git a/windows/manage/manage-users-and-groups-in-the-windows-store-for-business.md b/windows/manage/manage-users-and-groups-in-the-windows-store-for-business.md new file mode 100644 index 0000000000..d34ca092f9 --- /dev/null +++ b/windows/manage/manage-users-and-groups-in-the-windows-store-for-business.md @@ -0,0 +1,56 @@ +--- +title: Manage user accounts in Windows Store for Business (Windows 10) +description: Windows Store for Business manages permissions with a set of roles. Currently, you can assign these roles to individuals in your organization, but not to groups. +ms.assetid: 5E7FA071-CABD-4ACA-8AAE-F549EFCE922F +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage user accounts in Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Windows Store for Business manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-in-the-windows-store-for-business.md), but not to groups. + +## Why Azure AD accounts? + + +For organizations planning to use the private store feature with Store for Business, we recommend that you also configure cloud domain join. This provides a seamless integration between the identity your admin and employees will use to sign in to Windows and the Store for Business. + +Azure AD is an Azure service that provides identity and access management capabilities using the cloud. It is primarily designed to provide this service for cloud- or web-based applications that need to access your local Active Directory information. Azure AD identity and access management includes: + +- Single sign-on to any cloud and on-premises web app. + +- Works with multiple platforms and devices. + +- Integrate with on-premises Active Directory. + +For more information on Azure AD, see [About Office 365 and Azure Active Directory](http://go.microsoft.com/fwlink/p/?LinkId=708612), and [Intro to Azure: identity and access](http://go.microsoft.com/fwlink/p/?LinkId=708611). + +## Add user accounts to your Azure AD directory + + +If you created a new Azure AD directory when you signed up for Store for Business, you'll have a directory set up with one user account - the global administrator. That global administrator can add user accounts to your Azure AD directory. However, adding user accounts to your Azure AD directory will not give those employees access to Store for Business. You'll need to assign Store for Business roles to your employees. For more information, see [Roles and permissions in the Store for Business.](roles-and-permissions-in-the-windows-store-for-business.md) + +You can use the [Office 365 admin dashboard](http://go.microsoft.com/fwlink/p/?LinkId=708616) or [Azure management portal](http://go.microsoft.com/fwlink/p/?LinkId=691086) to add user accounts to your Azure AD directory. If you'll be using Azure management portal, you'll need an active subscription to [Azure management portal](http://go.microsoft.com/fwlink/p/?LinkId=708617). + +For more information, see: + +- [Add user accounts using Office 365 admin dashboard](http://go.microsoft.com/fwlink/p/?LinkId=708618) + +- [Add user accounts using Azure management portal](http://go.microsoft.com/fwlink/p/?LinkId=708619) + +  + +  + + + + + diff --git a/windows/manage/manage-wi-fi-sense-in-your-company.md b/windows/manage/manage-wi-fi-sense-in-your-company.md new file mode 100644 index 0000000000..25fef38407 --- /dev/null +++ b/windows/manage/manage-wi-fi-sense-in-your-company.md @@ -0,0 +1,152 @@ +--- +title: Manage Wi-Fi Sense in your company (Windows 10) +description: Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places. +ms.assetid: 1845E00D-C4EE-4A8F-A5E5-D00F2735A271 +keywords: ["WiFi Sense", "Shared networks"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage Wi-Fi Sense in your company + + +**Applies to:** + +- Windows 10 +- Windows 10 Mobile + +Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places. It can connect you to open Wi-Fi hotspots it knows about through crowdsourcing, or to Wi-Fi networks your contacts have shared with you by using Wi-Fi Sense. + +The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your PC with Windows 10. + +**Note**   +Wi-Fi Sense isn’t available in all countries or regions. + +  + +## How does Wi-Fi Sense work? + + +Wi-Fi Sense connects your employees to the available Wi-Fi networks, including: + +- **Open Wi-Fi networks.** Wi-Fi Sense uses crowdsourcing to find the networks that other Windows users are connected to. Typically, these are the open (no password required) Wi-Fi hotspots you see when you’re out and about. + +- **Shared Wi-Fi networks.** Wi-Fi Sense uses the Wi-Fi networks that your employee shares with Facebook friends, Outlook.com contacts, or Skype contacts. Sharing doesn’t happen automatically; an employee must connect to a network, enter the network password, and then choose the **Share network with my contacts** box before the network is shared. + +**Important**   +Wi-Fi Sense lets your employees share your network access with their contacts, without telling their contacts the actual network password. Should the contact want to share your network with another contact, he or she would have to share the network directly, by providing the password and clicking to share the network. + +Employees can't share network info with their contacts for any company network using the IEEE 802.1X protocol. + +  + +## How to manage Wi-Fi Sense in your company + + +In a company environment, you will most likely deploy Windows 10 to your employees' PCs using your preferred deployment method and then manage their settings globally. With that in mind, you have a few options for managing how your employees will use Wi-Fi Sense. + +**Important**   +Turning off Wi-Fi Sense also turns off all related features, including: connecting automatically to open hotspots, connecting automatically to networks shared by contacts, and sharing networks with contacts. + +  + +### Using Group Policy (available starting with Windows 10, Version 1511) + +You can manage your Wi-Fi Sense settings by using Group Policy and your Group Policy editor. + +**To set up Wi-Fi Sense using Group Policy** + +1. Open your Group Policy editor and go to the **Computer Configuration\\Administrative Templates\\Network\\WLAN Service\\WLAN Settings\\Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services** setting. + + ![group policy editor with wi-fi sense setting](images/wifisense-grouppolicy.png) + +2. Turn Wi-Fi Sense on (enabled) or off (disabled), based on your company's environment. + +### Using the Registry Editor + +You can manage your Wi-Fi Sense settings by using registry keys and the Registry Editor. + +**To set up Wi-Fi Sense using the Registry Editor** + +1. Open your Registry Editor and go to **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\WcmSvc\\wifinetworkmanager\\config\\**. + +2. Create and set a new **DWORD (32-bit) Value** named, **AutoConnectAllowedOEM**, with a **Value data** of **0 (zero)**. + + Setting this value to **0** turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings** screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see [How to configure Wi-Fi Sense on Windows 10 in an enterprise](http://go.microsoft.com/fwlink/p/?LinkId=620959). + + ![registry editor showing new dword value](images/wifisense-registry.png) + +### Using the Windows Provisioning settings + +You can manage your Wi-Fi Sense settings by changing the Windows provisioning setting, **WiFISenseAllowed**. + +**To set up Wi-Fi Sense using **WiFISenseAllowed**** + +- Change the Windows Provisioning setting, **WiFISenseAllowed**, to **0**. + + Setting this value to **0** turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings** screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Windows Provisioning settings reference topic, [WiFiSenseAllowed](http://go.microsoft.com/fwlink/p/?LinkId=620909). + +### Using Unattended Windows Setup settings + +If your company still uses Unattend, you can manage your Wi-Fi Sense settings by changing the Unattended Windows Setup setting, **WiFiSenseAllowed**. + +**To set up Wi-Fi Sense using **WiFISenseAllowed**** + +- Change the Unattended Windows Setup setting, **WiFISenseAllowed**, to **0**. + + Setting this value to **0** turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings** screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Unattended Windows Setup Reference topic, [WiFiSenseAllowed](http://go.microsoft.com/fwlink/p/?LinkId=620910). + +### How employees can change their own Wi-Fi Sense settings + +If you don’t turn off the ability for your employees to use Wi-Fi Sense, they can turn the settings on locally by selecting **Settings > Network & Internet > Wi-Fi > Manage Wi-Fi settings**, and then changing one or both of these settings under **Wi-Fi Sense**: + +- • Connect to suggested open hotspots + +- • Connect to networks shared by my contacts + + ![local wi-fi sense settings](images/wifisense-settingscreens.png) + +## Important considerations + + +Whether to allow your employees to share your password-protected Wi-Fi networks with their contacts to give them Internet access is completely up to you. However, if you decide to allow it, you should consider the following important info. + +### Network considerations + +- Wi-Fi Sense is designed to block contacts given Internet access through your password-protected network from reaching your intranet sites and other devices or files on the shared network. + +- Network info can only be shared with contacts using Wi-Fi Sense on PCs running Windows 10 or phones running Windows 10 Mobile. Wi-Fi Sense won’t work with any other operating system. + +### Security considerations + +- Your employees must be connected using a Microsoft account to use Wi-Fi Sense. + +- Your employees can’t pick individual contacts to share with. Instead, they must pick a group of contacts, such as their Skype contacts. In this case, all of the employee’s Skype contacts will be able to access the shared network. + +- Wi-Fi Sense is designed to block contacts from seeing the Wi-Fi network password. For networks you choose to share access to, the password is sent over an encrypted connection, stored in an encrypted file on a Microsoft server, and then sent over an HTTPS connection to the contacts' PC or phone if they use Wi-Fi Sense. + +- Access is only shared with your employee’s contacts. Wi-Fi Sense doesn't share networks with the contact's contacts. Should the contact want to share your network with another contact, he or she would have to share the network directly, by providing the password and clicking to share the network. + +### Sharing considerations + +- Employees can't share network info with their contacts for any company network using the IEEE 802.1X protocol. + +- Your employees can pick which Wi-Fi networks they want to share. The first time the employee connects to a password-protected Wi-Fi network, they’re presented with an option to share the network and to pick the contacts that should be given the info. + +## Related topics + + +[Wi-Fi Sense FAQ](http://go.microsoft.com/fwlink/p/?LinkId=620911) + +[How to configure Wi-Fi Sense on Windows 10 in an enterprise](http://go.microsoft.com/fwlink/p/?LinkId=620959) + +  + +  + + + + + diff --git a/windows/manage/new-policies-for-windows-10.md b/windows/manage/new-policies-for-windows-10.md new file mode 100644 index 0000000000..7bc7dd8224 --- /dev/null +++ b/windows/manage/new-policies-for-windows-10.md @@ -0,0 +1,96 @@ +--- +title: New policies for Windows 10 (Windows 10) +description: Windows 10 includes the following new policies for management, in addition to policies that were available for Windows 8.1 and Windows Phone 8.1. +ms.assetid: 1F24ABD8-A57A-45EA-BA54-2DA2238C573D +keywords: ["MDM", "Group Policy"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# New policies for Windows 10 + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Windows 10 includes the following new policies for management, in addition to policies that were available for Windows 8.1 and Windows Phone 8.1. [Download the complete set of Administrative Template (.admx) files for Windows 10](http://go.microsoft.com/fwlink/p/?LinkID=625081). + +## New GPOs in Windows 10 + + +There are some new policy settings in Group Policy for devices running Windows 10 , such as: + +- Microsoft Edge browser settings + +- Universal Windows app settings, such as: + + - Disable deployment of Windows Store apps to non-system volumes + + - Restrict users' application data to always stay on the system volume + + - Allow applications to share app data between users + +- [Start screen and Start menu layout](customize-windows-10-start-screens-by-using-group-policy.md) + +- Windows Tips + +- Consumer experiences, such as suggested apps in Start and app tiles from Microsoft dynamically inserted in the default Start menu + +- [Microsoft Passport](http://go.microsoft.com/fwlink/p/?LinkId=623294) + +- Windows Updates for Business + +For a spreadsheet of Group Policy settings included in Windows, see [Group Policy Settings Reference for Windows and Windows Server](http://go.microsoft.com/fwlink/p/?LinkId=613627). + +## New MDM policies + + +Mobile device management (MDM) for Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile includes settings from Windows Phone 8.1, plus new or enhanced settings for Windows 10, such as: + +- Defender (Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education only) + +- Enhanced Bluetooth policies + +- Passport and Hello + +- Device update + +- Hardware-based device health attestation + +- [Kiosk mode](set-up-a-device-for-anyone-to-use.md), start screen, start menu layout + +- Security + +- [VPN](http://go.microsoft.com/fwlink/p/?LinkId=623295) and enterprise Wi-Fi management + +- Certificate management + +- Windows Tips + +- Consumer experiences, such as suggested apps in Start and app tiles from Microsoft dynamically inserted in the default Start menu + +If you use Microsoft Intune for MDM, you can [configure custom policies](http://go.microsoft.com/fwlink/p/?LinkId=616316) to deploy Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings that can be used to control features on Windows 10. For a list of OMA-URI settings, see [Custom URI settings for Windows 10 devices](http://go.microsoft.com/fwlink/p/?LinkId=616317). + +No new [Exchange ActiveSync policies](http://go.microsoft.com/fwlink/p/?LinkId=613264). For more information, see the [ActiveSync configuration service provider](http://go.microsoft.com/fwlink/p/?LinkId=618944) technical reference. + +## Related topics + + +[Manage corporate devices](manage-corporate-devices.md) + +[Changes to Group Policy settings for Start in Windows 10](changes-to-start-policies-in-windows-10.md) + +[Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md) + +  + +  + + + + + diff --git a/windows/manage/prerequisites-for-windows-store-for-business.md b/windows/manage/prerequisites-for-windows-store-for-business.md new file mode 100644 index 0000000000..b469db817d --- /dev/null +++ b/windows/manage/prerequisites-for-windows-store-for-business.md @@ -0,0 +1,77 @@ +--- +title: Prerequisites for Windows Store for Business (Windows 10) +description: There are a few prerequisites for using Windows Store for Business. +ms.assetid: CEBC6870-FFDD-48AD-8650-8B0DC6B2651D +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Prerequisites for Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +There are a few prerequisites for using Windows Store for Business. + +## Prerequisites + + +You'll need this software to work with Store for Business. + +### Required + +- IT Pros that are administering Store for Business need a browser compatible with Store for Business running on a PC or mobile device. Supported browsers include: Internet Explorer 10 or later, Microsoft Edge, or current versions of Chrome or Firefox. + +- Employees using apps from Store for Business need Windows 10, Version 1511 running on a PC or mobile device. + +Microsoft Azure Active Directory (AD) accounts for your employees: + +- IT Pros need Azure AD accounts to sign up for Store for Business, and then to sign in, get apps, distribute apps, and manage app licenses. + +- Employees need Azure AD accounts when they access Store for Business content from Windows-based devices. + +- If you use a management tool to distribute and manage online-licensed apps, all employees will need an Azure AD account. + +For more information on Azure AD, see [About Office 365 and Azure Active Directory](http://go.microsoft.com/fwlink/p/?LinkId=708612), and [Intro to Azure: identity and access](http://go.microsoft.com/fwlink/p/?LinkId=708611). + +### Optional + +While not required, you can use a management tool to distribute and manage apps. Using a management tool allows you to distribute content, scope app availability, and control when app updates are installed. This might make sense for larger organizations that already use a management tool. If you're considering using management tools, check with the management tool vendor to see if they support Store for Business. The management tool will need to: + +- Integrate with the Windows 10 management framework and Azure AD. + +- Sync with the Store for Business inventory to distribute apps. + +### Proxy configuration + +If your organization restricts computers on your network from connecting to the Internet, there is a set of URLs that need to be available for devices to use Store for Business. Some of the Store for Business features use Windows Store app and Windows Store services. Devices using Store for Business – either to acquire, install, or update apps – will need access to these URLs. If you use a proxy server to block traffic, your configuration needs to allow these URLs: + +- login.live.com + +- login.windows.net + +- account.live.com + +- clientconfig.passport.net + +- windowsphone.com + +- \*.wns.windows.com + +- \*.microsoft.com + +- \*.msftncsi.com/ncsi.txt + +  + +  + + + + + diff --git a/windows/manage/product-ids-in-windows-10-mobile.md b/windows/manage/product-ids-in-windows-10-mobile.md new file mode 100644 index 0000000000..f5b92e0974 --- /dev/null +++ b/windows/manage/product-ids-in-windows-10-mobile.md @@ -0,0 +1,270 @@ +--- +title: Product IDs in Windows 10 Mobile (Windows 10) +description: You can use the product ID and Application User Model (AUMID) in Lockdown.xml to specify apps that will be available to the user. +ms.assetid: 31116BED-C16A-495A-BD44-93218A087A1C +keywords: ["lockdown"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Product IDs in Windows 10 Mobile + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Apps included in Windows 10 Mobile](#apps_included_in_windows_10_mobile) +- [Get product ID and AUMID for other apps](#get_product_id_and_aumid_for_other_apps) +- [Related topics](#related_topics) + +You can use the product ID and Application User Model (AUMID) in Lockdown.xml to specify apps that will be available to the user. + +## Apps included in Windows 10 Mobile + + +The following table lists the product ID and AUMID for each app that is included in Windows 10 Mobile. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
AppProduct IDAUMID
Alarms and clock44F7D2B4-553D-4BEC-A8B7-634CE897ED5FMicrosoft.WindowsAlarms_8wekyb3d8bbwe!App
CalculatorB58171C6-C70C-4266-A2E8-8F9C994F4456Microsoft.WindowsCalculator_8wekyb3d8bbwe!App
CameraF0D8FEFD-31CD-43A1-A45A-D0276DB069F1Microsoft.WindowsCamera_8wekyb3d8bbwe!App
Contact Support0DB5FCFF-4544-458A-B320-E352DFD9CA2BWindows.ContactSupport_cw5n1h2txyewy!App
CortanaFD68DCF4-166F-4C55-A4CA-348020F71B94Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
ExcelEAD3E7C0-FAE6-4603-8699-6A448138F4DCMicrosoft.Office.Excel_8wekyb3d8bbwe!microsoft.excel
Facebook82A23635-5BD9-DF11-A844-00237DE2DB9EMicrosoft.MSFacebook_8wekyb3d8bbwe!x82a236355bd9df11a84400237de2db9e
File ExplorerC5E2524A-EA46-4F67-841F-6A9465D9D515c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy!App
FM RadioF725010E-455D-4C09-AC48-BCDEF0D4B626N/A
Get StartedB3726308-3D74-4A14-A84C-867C8C735C3CMicrosoft.Getstarted_8wekyb3d8bbwe!App
Groove MusicD2B6A184-DA39-4C9A-9E0A-8B589B03DEC0Microsoft.ZuneMusic_8wekyb3d8bbwe!Microsoft.ZuneMusic
MapsED27A07E-AF57-416B-BC0C-2596B622EF7DMicrosoft.WindowsMaps_8wekyb3d8bbwe!App
Messaging27E26F40-E031-48A6-B130-D1F20388991AMicrosoft.Messaging_8wekyb3d8bbwe!x27e26f40ye031y48a6yb130yd1f20388991ax
Microsoft Edge395589FB-5884-4709-B9DF-F7D558663FFDMicrosoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge
Money1E0440F1-7ABF-4B9A-863D-177970EEFB5EMicrosoft.BingFinance_8wekyb3d8bbwe!AppexFinance
Movies and TV6AFFE59E-0467-4701-851F-7AC026E21665Microsoft.ZuneVideo_8wekyb3d8bbwe!Microsoft.ZuneVideo
News9C3E8CAD-6702-4842-8F61-B8B33CC9CAF1Microsoft.BingNews_8wekyb3d8bbwe!AppexNews
OneDriveAD543082-80EC-45BB-AA02-FFE7F4182BA8Microsoft.MicrosoftSkydrive_8wekyb3d8bbwe!App
OneNoteCA05B3AB-F157-450C-8C49-A1F127F5E71DMicrosoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim
Outlook Calendar

A558FEBA-85D7-4665-B5D8-A2FF9C19799B

Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Calendar

Outlook Mail

A558FEBA-85D7-4665-B5D8-A2FF9C19799B

Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Mail

People60BE1FB8-3291-4B21-BD39-2221AB166481Microsoft.People_8wekyb3d8bbwe!xb94d6231y84ddy49a8yace3ybc955e769e85x
Phone (dialer)F41B5D0E-EE94-4F47-9CFE-3D3934C5A2C7Microsoft.CommsPhone_8wekyb3d8bbwe!App
PhotosFCA55E1B-B9A4-4289-882F-084EF4145005Microsoft.Windows.Photos_8wekyb3d8bbwe!App
PodcastsC3215724-B279-4206-8C3E-61D1A9D63ED3Microsoft.MSPodcast_8wekyb3d8bbwe!xc3215724yb279y4206y8c3ey61d1a9d63ed3x
PowerpointB50483C4-8046-4E1B-81BA-590B24935798Microsoft.Office.PowerPoint_8wekyb3d8bbwe!microsoft.pptim
Settings2A4E62D8-8809-4787-89F8-69D0F01654FB2a4e62d8-8809-4787-89f8-69d0f01654fb_8wekyb3d8bbwe!App
SkypeC3F8E570-68B3-4D6A-BDBB-C0A3F4360A51Microsoft.SkypeApp_kzf8qxf38zg5c!Skype.AppId
Skype Video27E26F40-E031-48A6-B130-D1F20388991AMicrosoft.Messaging_8wekyb3d8bbwe!App
Sports0F4C8C7E-7114-4E1E-A84C-50664DB13B17Microsoft.BingSports_8wekyb3d8bbwe!AppexSports
Storage5B04B775-356B-4AA0-AAF8-6491FFEA564DN/A
Store7D47D89A-7900-47C5-93F2-46EB6D94C159Microsoft.WindowsStore_8wekyb3d8bbwe!App
Voice recorder7311B9C5-A4E9-4C74-BC3C-55B06BA95AD0Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe!App
Wallet587A4577-7868-4745-A29E-F996203F1462Microsoft.MicrosoftWallet_8wekyb3d8bbwe!App
Weather63C2A117-8604-44E7-8CEF-DF10BE3A57C8Microsoft.BingWeather_8wekyb3d8bbwe!App
Windows Feedback7604089D-D13F-4A2D-9998-33FC02B63CE3Microsoft.WindowsFeedback_8wekyb3d8bbwe!App
Word258F115C-48F4-4ADB-9A68-1387E634459BMicrosoft.Office.Word_8wekyb3d8bbwe!microsoft.word
XboxB806836F-EEBE-41C9-8669-19E243B81B83Microsoft.XboxApp_8wekyb3d8bbwe!Microsoft.XboxApp
+ +  + +## Get product ID and AUMID for other apps + + +To get the product ID and AUMID for apps that are installed from Windows Store or installed locally ([side-loaded](http://go.microsoft.com/fwlink/p/?LinkID=623433)), use the following steps. + +**Prerequisites**: a device with an SD card inserted and all apps installed that you want to get IDs for + +1. On Start ![start](images/starticon.png), swipe over to the App list, then tap **Settings** ![settings](images/settingsicon.png) > **Accounts** > **Apps Corner**. + +2. Tap **Apps**, tap to select the app that you want to get IDs for, and then tap done ![done button](images/doneicon.png) + +3. Tap **advanced**, and then **tap export to SD card**. + +4. Connect the device to a PC using USB, and then open the WEHLockdown.xml file on the SD card of the device to view the product ID and AUMID for each app. + +## Related topics + + +[Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md) + +[Settings and quick actions that can be locked down in Windows 10 Mobile](settings-that-can-be-locked-down.md) + +  + +  + + + + + diff --git a/windows/manage/reset-a-windows-10-mobile-device.md b/windows/manage/reset-a-windows-10-mobile-device.md new file mode 100644 index 0000000000..ff42ffcf26 --- /dev/null +++ b/windows/manage/reset-a-windows-10-mobile-device.md @@ -0,0 +1,97 @@ +--- +title: Reset a Windows 10 Mobile device (Windows 10) +description: There are two methods for resetting a Windows 10 Mobile device-- factory reset and &\#0034;wipe and persist&\#0034; reset. +ms.assetid: B42A71F4-DFEE-4D6E-A904-7942D1AAB73F +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Reset a Windows 10 Mobile device + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Reset using MDM](#reset_using_mdm) +- [Reset using the UI](#_reset_using_the_ui) +- [Reset using hardware buttons](#reset_using_hardware_buttons) + +There are two methods for resetting a Windows 10 Mobile device: factory reset and "wipe and persist" reset. + +- **Factory reset** restores the state of the device back to its first-boot state plus any update packages. The reset will not return device to the original factory state. To return the device to the original factory state, you must flash it with the original factory image.All the provisioning applied to the device by the enterprise will be lost and will need to be re-applied if needed. For details on what is removed or persists, see [Resetting a mobile device](http://go.microsoft.com/fwlink/p/?LinkID=703715). +- **"Wipe and persist" reset** preserves all the provisioning applied to the device before the reset. After the "wipe and persist" reset, all the preserved provisioning packages are automatically applied on the device and the data in the enterprise shared storage folder \\Data\\SharedData\\Enterprise\\Persistent is restored in that folder. For more information on the enterprise shared storage folder, see [EnterpriseExtFileSystem CSP](http://go.microsoft.com/fwlink/p/?LinkId=703716). + +You can trigger a reset using your mobile device management (MDM) service, or a user can trigger a reset in the user interface (UI) or by using hardware buttons. + +## Reset using MDM + + +The remote wipe command is sent as an XML provisioning file to the device. Since the [RemoteWipe configuration service provider (CSP)](http://go.microsoft.com/fwlink/p/?LinkId=703714) uses OMA DM and WAP, authentication between client and server and delivery of the XML provisioning file is handled by provisioning. The remote wipe command is implemented on the device by using the **ResetPhone** function. For more information about the data that is removed as a result of the remote wipe command, see [Resetting a mobile device](http://go.microsoft.com/fwlink/p/?LinkId=703715). + +To perform a factory reset, restoring the device back to its out-of-box state, use the following syncML. + +``` + + + + 3 + + ./Vendor/MSFT/RemoteWipe/DoWipe + + + + + +``` + +To perform a "wipe and persist" reset, preserving the provisioning applied to the device before the reset and persisting data files locally, use the following syncML. + +``` + + + + 3 + ./Vendor/MSFT/RemoteWipe/DoWipePersistProvisionedData + + + + + +``` + +## Reset using the UI + + +1. On your mobile device, go to **Settings** > **System** > **About** > **Reset your Phone** + +2. When you tap **Reset your phone**, the dialog box will present an option to **Also remove provisioned content** if: + + - At least one provisioning package has been applied, or + - A file is present in the enterprise shared storage folder \\Data\\SharedData\\Enterprise\\Persistent. + + If the option to **Also remove provisioned content** is selected, the reset that ensues is a regular factory reset. If the option is not selected, a "wipe and persist" reset is performed. + +## Reset using hardware buttons + + +If your phone is unresponsive and you can't reach **Settings**, you may be able to reset your phone using the hardware buttons. Reset using hardware buttons does not give you the option to persist provisioned content. On Lumia phones (and some others), do the following to reset your phone: + +1. Press and hold the **Volume down** and **Power** buttons at the same time until you feel a vibration (about 10–15 seconds). + +2. When you feel the vibration, release the buttons, and then immediately press and hold the **Volume down** button until you see a large exclamation mark. + +3. When the exclamation mark appears, press the following four buttons in this order: **Volume up**, **Volume down**, **Power**, **Volume down**. Your phone should now reset and restart itself. (It might take a while for the reset to finish.) + +  + +  + + + + + diff --git a/windows/manage/roles-and-permissions-in-the-windows-store-for-business.md b/windows/manage/roles-and-permissions-in-the-windows-store-for-business.md new file mode 100644 index 0000000000..f776407a57 --- /dev/null +++ b/windows/manage/roles-and-permissions-in-the-windows-store-for-business.md @@ -0,0 +1,223 @@ +--- +title: Roles and permissions in Windows Store for Business (Windows 10) +description: The first person to sign in to Windows Store for Business must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. +ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Roles and permissions in Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +The first person to sign in to Windows Store for Business must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. + +Store for Business has a set of roles that help admins and employees manage access to apps and tasks for the Store for Business. Employees with these roles will need to use their Azure AD account to access the Store for Business. Global Administrators and global user accounts that are used with other Microsoft services, such as Azure, or Office 365 can sign in to Store for Business. Global user accounts have some permissions in the Store for Business. Store for Business has a set of roles that help IT admins and employees manage access to apps and tasks for the Store for Business. + +### Global user account permissions in Store for Business + +This table lists the global user accounts and the permissions they have in the Store for Business. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Global AdministratorUser AdministratorBilling Administrator

Sign up for Store for Business

X

Assign roles

X

X

Modify company profile settings

X

Manage Store for Business settings

X

Acquire apps

X

X

Distribute apps

X

X

Sign policies and catalogs

X

+ +  + +- **Global Administrator** - IT Pros with this account have full access to Store for Business. They can do everything allowed in the Store for Business Admin role, plus they can sign up for the Store for Business, and assign Store for Business roles to other employees. + +- **User Administrator** - IT Pros with this account can assign Store for Business roles to other employees, as long as the User Administrator also has the Store for Business Admin role. + +- **Billing Administrator** - IT Pros with this account have the same permissions as the Store for Business Purchaser role. + +### Store for Business roles and permissions + +Store for Businesshas a set of roles that help IT admins and employees manage access to apps and tasks for the Store for Business. Employees with these roles will need to use their Azure AD account to access the Store for Business. + +This table lists the roles and their permissions. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
AdminPurchaserDevice Guard signer

Sign up for Store for Business

Assign roles

Modify company profile settings

Manage Store for Business settings

X

Acquire apps

X

X

Distribute apps

X

X

Sign policies and catalogs

X

Sign Device Guard changes

X

+ +  + +These permissions allow people to: + +- **Manage Store for Business settings** - Manage Store for Business settings: + + - Account information (view only) + + - Device Guard signing + + - LOB publishers + + - Management tools + + - Offline licensing + + - Permissions (view only) + + - Private store + +- **Acquire apps** - Acquire apps from Store for Business and add them to your inventory. + +- **Distribute apps** - Distribute apps that are in your inventory. You can distribute from inventory, private store, or management tool. + +**To assign roles to people** + +1. Sign in to Store for Business. + + **Note**   + You need to be a Global Administrator, or have the Store for Business Admin role to access the **Permissions** page. + + To assign roles, you need to be a Global Administrator or a Store Administrator that is also a User Administrator. + +   + +2. Click **Settings**, and then choose **Permissions**. + + ![](images/wsfb-settings-permissions.png) + +3. Click **Add people**, type a name, choose the role you want to assign, and click **Save** . + + ![](images/wsfb-permissions-assignrole.png) + +4. + + If you are not finding the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts in the Windows Store for Business.](manage-users-and-groups-in-the-windows-store-for-business.md) + +  + +  + + + + + diff --git a/windows/manage/set-up-a-device-for-anyone-to-use.md b/windows/manage/set-up-a-device-for-anyone-to-use.md new file mode 100644 index 0000000000..9c70e0cbf2 --- /dev/null +++ b/windows/manage/set-up-a-device-for-anyone-to-use.md @@ -0,0 +1,86 @@ +--- +title: Set up a device for anyone to use (kiosk mode) (Windows 10) +description: You can configure a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise as a kiosk device, so that users can only interact with a single application that you select. +ms.assetid: F1F4FF19-188C-4CDC-AABA-977639C53CA8 +keywords: ["kiosk", "lockdown", "assigned access"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Set up a device for anyone to use (kiosk mode) + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**Looking for Windows Embedded 8.1 Industry information?** + +- [Assigned Access]( http://go.microsoft.com/fwlink/p/?LinkId=613653) + +You can configure a device running Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile, or Windows 10 Mobile Enterprise as a kiosk device, so that users can only interact with a single application that you select. + +Do you need a computer that can only do one thing? For example: + +- A device in the lobby that customers can use to view your product catalog. + +- A portable device that drivers can use to check a route on a map. + +- A device that a temporary worker uses to enter data. + +The following table identifies the type of application that can be used on each Windows 10 edition to create a kiosk device. + +**Note**   +A Universal Windows app is built on the Universal Windows Platform (UWP), which was first introduced in Windows 8 as the Windows Runtime. A Classic Windows application uses the Classic Windows Platform (CWP) (e.g., COM, Win32, WPF, WinForms, etc.) and is typically launched using an .EXE or .DLL file. + +  + +| Windows 10 edition | Universal Windows app | Classic Windows application | +|--------------------|------------------------------------|--------------------------------------| +| Mobile | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | +| Mobile Enterprise | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | +| Pro | ![supported](images/checkmark.png) | ![unsupported](images/crossmark.png) | +| Enterprise | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | +| Education | ![supported](images/checkmark.png) | ![supported](images/checkmark.png) | + +  + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md)

A single-use device is easy to set up in Windows 10 for desktop editions (Pro, Enterprise, and Education). For a kiosk device to run a Universal Windows app, use the assigned access feature. For a kiosk device (Windows 10 Enterprise or Education) to run a Classic Windows application, use Shell Launcher to set a custom user interface as the shell.

[Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise](set-up-a-kiosk-for-windows-10-for-mobile-edition.md)

A device in kiosk mode runs a specified app with no access to other device functions, menus, or settings. You configure a device running Windows 10 Mobile or Windows 10 Mobile Enterprise for kiosk mode by using the Apps Corner feature. You can also use the Enterprise Assigned Access configuration service provider (CSP) to configure a kiosk experience.

+ +  + +  + +  + + + + + diff --git a/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md new file mode 100644 index 0000000000..a08768549d --- /dev/null +++ b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md @@ -0,0 +1,392 @@ +--- +title: Set up a kiosk on Windows 10 Pro, Enterprise, or Education (Windows 10) +description: A single-use device is easy to set up in Windows 10 for desktop editions (Pro, Enterprise, and Education). +ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC +keywords: ["assigned access", "kiosk", "lockdown"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Set up a kiosk on Windows 10 Pro, Enterprise, or Education + + +**Applies to** + +- Windows 10 + +**Looking for Windows Embedded 8.1 Industry information?** + +- [Assigned Access]( http://go.microsoft.com/fwlink/p/?LinkId=613653) + +**In this article** + +- [Other settings to lock down](#other_settings_to_lock_down) +- [Assigned access method for Universal Windows apps](#assigned_access_method) +- [Shell Launcher for Classic Windows applications](#local_user_policy) +- [Related topics](#related_topics) + +A single-use device is easy to set up in Windows 10 for desktop editions (Pro, Enterprise, and Education). For a kiosk device to run a Universal Windows app, use the **assigned access** feature. For a kiosk device (Windows 10 Enterprise or Education) to run a Classic Windows application, use **Shell Launcher** to set a custom user interface as the shell. To return the device to the regular shell, see [Sign out of assigned access](#sign_out_of_assigned_access). + +**Note**   +A Universal Windows app is built on the Universal Windows Platform (UWP), which was first introduced in Windows 8 as the Windows Runtime. A Classic Windows application uses the Classic Windows Platform (CWP) (e.g., COM, Win32, WPF, WinForms, etc.) and is typically launched using an .EXE or .DLL file. + +  + +## Other settings to lock down + + +For a more secure kiosk experience, we recommend that you make the following configuration changes to the device: + +- Put device in **Tablet mode**. + + If you want users to be able to use the touch (on screen) keyboard, go to **Settings** > **System** > **Tablet mode** and choose **On.** + +- Hide **Ease of access** feature on the logon screen. + + Go to **Control Panel** > **Ease of Access** > **Ease of Access Center**, and turn off all accessibility tools. + +- Disable the hardware power button. + + Go to **Power Options** > **Choose what the power button does**, change the setting to **Do nothing**, and then **Save changes**. + +- Disable the camera. + + Go to **Settings** > **Privacy** > **Camera**, and turn off **Let apps use my camera**. + +- Turn off app notifications on the lock screen. + + Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Logon\\Turn off app notifications on the lock screen**. + +- Disable removable media. + + Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Device Installation\\Device Installation Restrictions**. Review the policy settings available in **Device Installation Restrictions** for the settings applicable to your situation. + + **Note**   + To prevent this policy from affecting a member of the Administrators group, in **Device Installation Restrictions**, enable **Allow administrators to override Device Installation Restriction policies**. + +   + +## Assigned access method for Universal Windows apps + + +Using assigned access, Windows 10 runs the designated Universal Windows app above the lockscreen, so that the assigned access account has no access to any other functionality on the device. You have these choices for setting up assigned access: + +- [Use Settings on the PC](#set_up_assigned_access_in_pc_settings) - Windows 10 Pro, Enterprise, and Education + +- [Apply a mobile device management (MDM) policy](#set_up_assigned_access_in_mdm) - Windows 10 Enterprise and Education + +- [Create a provisioning package using Windows Imaging and Configuration Designer (ICD)](#icd) - Windows 10 Enterprise and Education + +- [Run a PowerShell script](#set_up_assigned_access_using_windows_powershell) - Windows 10 Pro, Enterprise, and Education + +### Requirements + +- A domain or local user account. + + The user account must have logged on at least once before you set up assigned access, or no apps will be available for that account. To set up assigned access using MDM, you need the user account (domain\\account). + +- A Universal Windows app that is installed for that account and is an above lock screen app. For details on building an above lock screen app, see [Kiosk apps for assigned access: Best practices](http://go.microsoft.com/fwlink/p/?LinkId=708386). + + The app can be your own company app that you have made available in your own app Store. To set up assigned access using MDM or PowerShell, you also need the Application User Model ID (AUMID) for the app. [Learn how to get the AUMID](http://go.microsoft.com/fwlink/p/?LinkId=614867). + + The Universal Windows app must be able to handle multiple views and cannot launch other apps or dialogs. + +**Note**   +Assigned access does not work on a device that is connected to more than one monitor. + +  + +### Set up assigned access in PC settings + +1. Go to **Start** > **Settings** > **Accounts** > **Other users**. + +2. Choose **Set up assigned access**. + +3. Choose an account. + +4. Choose an app. Only apps that can run above the lock screen will be displayed. + +5. Close **Settings** – your choices are saved automatically, and will be applied the next time that user account logs on. + +To remove assigned access, in step 3, choose **Don't use assigned access**. + +### Set up assigned access in MDM + +Assigned Access has one setting, KioskModeApp. In the KioskModeApp setting, you enter the user account name and AUMID for the app to run in kiosk mode. + +[Learn how to get the AUMID](http://go.microsoft.com/fwlink/p/?LinkId=614867). + +[See the technical reference for the Assigned Access configuration service provider.](http://go.microsoft.com/fwlink/p/?LinkId=626608) + +### Set up assigned access using Windows Imaging and Configuration Designer (ICD) + +Use the Windows Imaging and Configuration Designer (ICD) tool included in the Windows Assessment and Deployment Kit (ADK) for Windows 10 to create a provisioning package that configures a device as a kiosk. [Install the ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +**Create a provisioning package for a kiosk device** + +1. Open Windows ICD (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +2. Choose **New provisioning package**. + +3. Name your project, and click **Next**. + +4. Choose **Common to all Windows desktop editions** and click **Next**. + +5. On **New project**, click **Finish**. The workspace for your package opens. + +6. Expand **Runtime settings** > **AssignedAccess**, and click **AssignedAccessSettings**. + +7. Enter a string to specify the user account and app (by AUMID). For example: + + "Account":"contoso\\\\kiosk","AUMID":"8f82d991-f842-44c3-9a95-521b58fc2084" + +8. On the **File** menu, select **Save.** + +9. On the **Export** menu, select **Provisioning package**. + +10. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +11. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select** and choosing the certificate you want to use to sign the package. + +12. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows ICD uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +13. Click **Next**. + +14. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +15. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +**Apply the provisioning package** + +1. Select the provisioning package that you want to apply, double-click the file, and then allow admin privileges. + +2. Consent to allow the package to be installed. + + After you allow the package to be installed, the settings will be applied to the device + +[Learn how to apply a provisioning package in audit mode or OOBE.](http://go.microsoft.com/fwlink/p/?LinkID=692012) + +### Set up assigned access using Windows PowerShell + +You can use any of the following PowerShell cmdlets to set up assigned access on multiple devices. To open PowerShell on Windows 10, search for PowerShell and find **Windows PowerShell Desktop app** in the results. + +``` +Set-AssignedAccess -AppUserModelId -UserName +``` + +``` +Set-AssignedAccess -AppUserModelId -UserSID +``` + +``` +Set-AssignedAccess -AppName -UserName +``` + +``` +Set-AssignedAccess -AppName -UserSID +``` + +[Learn how to get the AUMID](http://go.microsoft.com/fwlink/p/?LinkId=614867). + +[Learn how to get the SID](http://go.microsoft.com/fwlink/p/?LinkId=615517). + +### Set up automatic logon + +When your kiosk device restarts, whether from an update or power outage, you can log on the assigned access account manually or you can configure the device to log on to the assigned access account automatically. + +Edit the registry to have an account automatically logged on. + +1. Open Registry Editor (regedit.exe). + + **Note**   + If you are not familiar with Registry Editor, [learn how to modify the Windows registry](http://go.microsoft.com/fwlink/p/?LinkId=615002). + +   + +2. Go to + + ****HKEY\_LOCAL\_MACHINE**\\**SOFTWARE**\\**Microsoft**\\**WindowsNT**\\**CurrentVersion**\\**Winlogon**** + +3. Set the values for the following keys. + + - *AutoAdminLogon*: set value as **1**. + + - *DefaultUserName*: set value as the account that you want logged in. + + - *DefaultPassword*: set value as the password for the account. + + **Note**   + If *DefaultUserName* and *DefaultPassword* aren't there, add them as **New** > **String Value**. + +   + + - *DefaultDomainName*: set value for domain, only for domain accounts. For local accounts, do not add this key. + +4. Close Registry Editor. The next time the computer restarts, the account will be logged on automatically. + +### Sign out of assigned access + +To sign out of an assigned access account, press **Ctrl + Alt + Del**, and then sign in using another account. When you press **Ctrl + Alt + Del** to sign out of assigned access, the kiosk app will exit automatically. If you sign in again as the assigned access account or wait for the login screen timeout, the kiosk app will be re-launched. + +If you press **Ctrl + Alt + Del** and do not sign in to another account, after a set time, assigned access will resume. The default time is 30 seconds, but you can change that in the following registry key: + +****HKEY\_LOCAL\_MACHINE**\\**SOFTWARE**\\**Microsoft**\\**Windows**\\**CurrentVersion**\\**Authentication**\\**LogonUI**** + +To change the default time for assigned access to resume, add *IdleTimeOut* (DWORD) and enter the value data as milliseconds in hexadecimal. + +## Shell Launcher for Classic Windows applications + + +Using Shell Launcher, you can configure a kiosk device that runs a Classic Windows application as the user interface. The application that you specify replaces the default shell (explorer.exe) that usually runs when a user logs on. + +### Requirements + +- A domain or local user account. + +- A Classic Windows application that is installed for that account. The app can be your own company application or a common app like Internet Explorer. + +[See the technical reference for the shell launcher component.](http://go.microsoft.com/fwlink/p/?LinkId=618603) + +### Configure Shell Launcher + +To set a Classic Windows application as the shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using Windows PowerShell. + +**To turn on Shell Launcher in Windows features** + +1. Go to Control Panel > **Programs and Features** > **Turn Windows features on or off**. +2. Select **Embedded Shell Launcher** and **OK**. + +Alternatively, you can turn on Shell Launcher using the Deployment Image Servicing and Management (DISM.exe) tool. + +**To turn on Shell Launcher using DISM** + +1. Open a command prompt as an administrator. +2. Enter the following command. + + + + + + + + + + +
Dism /online /Enable-Feature /FeatureName:Client-EmbeddedShellLauncher
+ +**To set your custom shell** + +- Modify the following PowerShell script as appropriate and run the script on the kiosk device. + + + + + + + + + + + +
$COMPUTER = "localhost"
+    $NAMESPACE = "root\standardcimv2\embedded"
+
+# Create a handle to the class instance so we can call the static methods.
+    $ShellLauncherClass = [wmiclass]"\\$COMPUTER\${NAMESPACE}:WESL_UserSetting"
+
+
+# This well-known security identifier (SID) corresponds to the BUILTIN\Administrators group.
+
+    $Admins_SID = "S-1-5-32-544"
+
+# Create a function to retrieve the SID for a user account on a machine.
+
+    function Get-UsernameSID($AccountName) {
+
+        $NTUserObject = New-Object System.Security.Principal.NTAccount($AccountName)
+        $NTUserSID = $NTUserObject.Translate([System.Security.Principal.SecurityIdentifier])
+
+        return $NTUserSID.Value
+        
+    }
+
+# Get the SID for a user account named "Cashier". Rename "Cashier" to an existing account on your system to test this script.
+
+    $Cashier_SID = Get-UsernameSID("Cashier")
+
+# Define actions to take when the shell program exits.
+
+    $restart_shell = 0
+    $restart_device = 1
+    $shutdown_device = 2
+
+# Examples
+
+# Set the command prompt as the default shell, and restart the device if it's closed.
+
+    $ShellLauncherClass.SetDefaultShell("cmd.exe", $restart_device)
+
+# Display the default shell to verify that it was added correctly.
+
+    $DefaultShellObject = $ShellLauncherClass.GetDefaultShell()
+
+    "`nDefault Shell is set to " + $DefaultShellObject.Shell + " and the default action is set to " + $DefaultShellObject.defaultaction
+
+# Set Internet Explorer as the shell for "Cashier", and restart the machine if it's closed.
+
+    $ShellLauncherClass.SetCustomShell($Cashier_SID, "c:\program files\internet explorer\iexplore.exe www.microsoft.com", ($null), ($null), $restart_shell)
+
+# Set Explorer as the shell for administrators.
+
+    $ShellLauncherClass.SetCustomShell($Admins_SID, "explorer.exe")
+
+# View all the custom shells defined.
+
+    "`nCurrent settings for custom shells:"
+    Get-WmiObject -namespace $NAMESPACE -computer $COMPUTER -class WESL_UserSetting | Select Sid, Shell, DefaultAction
+
+# Enable Shell Launcher
+
+    $ShellLauncherClass.SetEnabled($TRUE)
+
+    "`nEnabled is set to " + $DefaultShellObject.IsEnabled()
+
+# Remove the new custom shells.
+
+    $ShellLauncherClass.RemoveCustomShell($Admins_SID)
+
+    $ShellLauncherClass.RemoveCustomShell($Cashier_SID)
+    
+ +## Related topics + + +[Set up a device for anyone to use](set-up-a-device-for-anyone-to-use.md) + +[Set up a kiosk for Windows 10 for mobile edition](set-up-a-kiosk-for-windows-10-for-mobile-edition.md) + +[Manage and update Windows 10](manage-and-update-windows-10.md) + +  + +  + + + + + diff --git a/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md b/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md new file mode 100644 index 0000000000..5009c67faf --- /dev/null +++ b/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md @@ -0,0 +1,199 @@ +--- +title: Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise (Windows 10) +description: A device in kiosk mode runs a specified app with no access to other device functions, menus, or settings. +ms.assetid: 35EC82D8-D9E8-45C3-84E9-B0C8C167BFF7 +keywords: ["kiosk", "lockdown", "assigned access"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Apps Corner](#apps_corner) +- [Enterprise Assigned Access](#enterprise_assigned_access) +- [Related topics](#related_topics) + +A device in kiosk mode runs a specified app with no access to other device functions, menus, or settings. You configure a device running Windows 10 Mobile or Windows 10 Mobile Enterprise for kiosk mode by using the Apps Corner feature. You can also use the Enterprise Assigned Access configuration service provider (CSP) to configure a kiosk experience. + +**Note**   +The specified app must be an above lock screen app. For details on building an above lock screen app, see [Kiosk apps for assigned access: Best practices](http://go.microsoft.com/fwlink/p/?LinkId=708386). + +  + +## Apps Corner + + +Apps Corner lets you set up a custom Start screen on your Windows 10 Mobile or Windows 10 Mobile Enterprise device, where you can share only the apps you choose with the people you let use your device. You configure a device for kiosk mode by selecting a single app to use in Apps Corner. + +**To set up Apps Corner** + +1. On Start ![start](images/starticon.png), swipe over to the App list, then tap **Settings** ![settings](images/settingsicon.png) > **Accounts** > **Apps Corner**. + +2. Tap **Apps**, tap to select the app that you want people to use in the kiosk mode, and then tap done ![](images/doneicon.png) + +3. If your phone doesn't already have a lock screen password, you can set one now to ensure that people can't get to your Start screen from Apps Corner. Tap **Protect my phone with a password**, click **Add**, type a PIN in the **New PIN** box, type it again in the **Confirm PIN** box, and then tap **OK**. Press **Back** ![back](images/backicon.png) to the Apps Corner settings. + +4. Turn **Action center** on or off, depending on whether you want people to be able to use these features when using the device in kiosk mode. + +5. Tap **advanced**, and then turn features on or off, depending on whether you want people to be able to use them. + +6. Press **Back** ![back](images/backicon.png) when you're done. + +**To use Apps Corner** + +1. On Start ![start](images/starticon.png), swipe over to the App list, then tap **Settings** ![settings](images/settingsicon.png) > **Accounts** > **Apps Corner** > launch ![launch](images/launchicon.png). + + **Tip**   + Want to get to Apps Corner with one tap? In **Settings**, tap **Apps Corner** > **pin** to pin the Apps Corner tile to your Start screen. + +   + +2. Give the device to someone else, so they can use the device and only the one app you chose. + +3. When they're done and you get the device back, press and hold Power ![power](images/powericon.png), and then swipe right to exit Apps Corner. + +## Enterprise Assigned Access + + +Enterprise Assigned Access allows you to lock down your Windows 10 Mobile or Windows 10 Mobile Enterprise device in kiosk mode by creating a user role that has only a single app, set to run automatically, in the Allow list. + +**Note**  The app can be a Universal Windows app, Universal Windows Phone 8 app, or a legacy Silverlight app. + +  + +### Set up Enterprise Assigned Access in MDM + +In AssignedAccessXml, for Application, you enter the product ID for the app to run in kiosk mode. Find product IDs at [Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md). + +[See the technical reference for the Enterprise Assigned Access configuration service provider (CSP).](http://go.microsoft.com/fwlink/p/?LinkID=618601) + +### Set up assigned access using Windows Imaging and Configuration Designer (ICD) + +**To create and apply a provisioning package for a kiosk device** + +1. Create an *AssignedAccess*.xml file that specifies the app the device will run. (You can name use any file name.) For instructions on AssignedAccessXml, see [EnterpriseAssignedAccess CSP](http://go.microsoft.com/fwlink/p/?LinkID=618601). + + **Note**   + Do not escape the xml in *AssignedAccess*.xml file as Windows Imaging and Configuration Designer (ICD) will do that when building the package. Providing escaped xml in Windows ICD will cause building the package fail. + +   + +2. Open Windows ICD (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +3. Choose **New provisioning package**. + +4. Name your project, and click **Next**. + +5. Choose **Common to all Windows mobile editions** and click **Next**. + +6. On **New project**, click **Finish**. The workspace for your package opens. + +7. Expand **Runtime settings** > **EmbeddedLockdownProfiles**, and click **AssignedAccessXml**. + +8. Click **Browse** to select the *AssignedAccess*.xml file. + +9. On the **File** menu, select **Save.** + +10. On the **Export** menu, select **Provisioning package**. + +11. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +12. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Select** and choosing the certificate you want to use to sign the package. + +13. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows ICD uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +14. Click **Next**. + +15. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +16. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +17. Select the **output location** link to go to the location of the package. You can distribute that .ppkg to mobile devices using any of the following methods: + + - Removable media (USB/SD) + + **To apply a provisioning package from removable media** + + 1. Copy the provisioning package file to the root directory on a micro SD card. + + 2. On the device, insert the micro SD card containing the provisioning package. + + 3. Go to **Settings** > **Accounts** > **Provisioning.** + + 4. Tap **Add a package**. + + 5. On the **Choose a method** screen, in the **Add from** dropdown menu, select **Removable Media**. + + 6. Select a package will list all available provisioning packages on the micro SD card. Tap the desired package, and then tap **Add**. + + 7. You will see a message that tells you what the package will do the device, such as **Adding it will: Lock down the user interface**. Tap **Yes, add it**. + + 8. Restart the device and verify that the runtime settings that were configured in the provisioning package were applied to the device. + + - Email + + **To apply a provisioning package sent in email** + + 1. Send the provisioning package in email to an account on the device. + + 2. Open the email on the device, and then double-tap the attached file. + + 3. You will see a message that tells you what the package will do the device, such as **Adding it will: Lock down the user interface**. Tap **Yes, add it**. + + 4. Restart the device and verify that the runtime settings that were configured in the provisioning package were applied to the device. + + - USB tether (mobile only) + + **To apply a provisioning package using USB tether** + + 1. Connect the device to your PC by USB. + + 2. Select the provisioning package that you want to use to provision the device, and then drag and drop the file to your device. + + 3. The provisioning package installation dialog will appear on the phone. + + 4. You will see a message that tells you what the package will do the device, such as **Adding it will: Lock down the user interface**. Tap **Yes, add it**. + + 5. Restart the device and verify that the runtime settings that were configured in the provisioning package were applied to the device. + + [Learn how to apply a provisioning package in audit mode or OOBE.](http://go.microsoft.com/fwlink/p/?LinkID=692012) + +## Related topics + + +[Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) + +[Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md) + +[Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md) + +  + +  + + + + + diff --git a/windows/manage/settings-reference--windows-store-for-business.md b/windows/manage/settings-reference--windows-store-for-business.md new file mode 100644 index 0000000000..8391df2790 --- /dev/null +++ b/windows/manage/settings-reference--windows-store-for-business.md @@ -0,0 +1,41 @@ +--- +title: Settings reference-- Windows Store for Business (Windows 10) +description: The Windows Store for Business has a group of settings that admins use to manage the store. +ms.assetid: 34F7FA2B-B848-454B-AC00-ECA49D87B678 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Settings reference: Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +The Windows Store for Business has a group of settings that admins use to manage the store. + +| | | +|----------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Setting | Description | +| Account information | Provides info on these configured settings for your Store for Business account . These settings include: country or region, default domain, organization name, and language preference. You can make updates to these settings with Office 365 or Azure management portals. For more information, see [Manage settings for the Windows Store for Business](manage-settings-in-the-windows-store-for-business.md). | +| Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | +| LOB publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | +| Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider.md). | +| Offline licensing | Configure whether or not to make offline-licensed apps available in the Store for Business. For more information, see [Distribute offline apps](distribute-offline-apps.md). | +| Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Windows Store for Business](roles-and-permissions-in-the-windows-store-for-business.md). | +| Private store | Update the name for your private store. The new name will be displayed on a tab in the Store. For more information, see [Manage private store settings](manage-private-store-settings.md). | + +  + +  + +  + + + + + diff --git a/windows/manage/settings-that-can-be-locked-down.md b/windows/manage/settings-that-can-be-locked-down.md new file mode 100644 index 0000000000..dda4084fd0 --- /dev/null +++ b/windows/manage/settings-that-can-be-locked-down.md @@ -0,0 +1,489 @@ +--- +title: Settings and quick actions that can be locked down in Windows 10 Mobile (Windows 10) +description: This topic lists the settings and quick actions that can be locked down in Windows 10 Mobile. +ms.assetid: 69E2F202-D32B-4FAC-A83D-C3051DF02185 +keywords: ["lockdown"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Settings and quick actions that can be locked down in Windows 10 Mobile + + +**Applies to** + +- Windows 10 Mobile + +This topic lists the settings and quick actions that can be locked down in Windows 10 Mobile. + +## Settings lockdown + + +You can use Lockdown.xml to configure lockdown settings. + +The following table lists the settings pages and page groups. Use the page name in the Settings section of Lockdown.xml. The Settings section contains an allow list of pages in the Settings app. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Main menuSub-menuPage name
SystemSettingsPageGroupPCSystem
DisplaySettingsPageDisplay
Notifications and actionsSettingsPageAppsNotifications
PhoneSettingsPageCalls
MessageSettingsPageMessaging
Battery saverSettingsPageBatterySaver
StorageSettingsPageStorageSenseStorageOverview
Device encryptionSettingsPageGroupPCSystemDeviceEncryption
Driving modeSettingsPageDrivingMode
Offline mapsSettingsPageMaps
AboutSettingsPagePCSystemInfo
DevicesSettingsPageGroupDevices
Default cameraSettingsPagePhotos
BluetoothSettingsPagePCSystemBluetooth
NFCSettingsPagePhoneNFC
MouseSettingsPageMouseTouchpad
USBSettingsPageUsb
Network and wirelessSettingsPageGroupNetwork
Cellular and simSettingsPageNetworkCellular
Wi-FiSettingsPageNetworkWiFi
Airplane modeSettingsPageNetworkAirplaneMode
Data usageSettingsPageDataSenseOverview
Mobile hotspotSettingsPageInternetSharing
VPNSettingsPageNetworkVPN
PersonalizationSettingsPageGroupPersonalization
StartSettingsPageBackGround
ColorsSettingsPageColors
SoundsSettingsPageSounds
Lock screenSettingsPageLockscreen
ThemeSettingsPageStartTheme
AccountsSettingsPageGroupAccounts
Your accountSettingsPageAccountsPicture
Sign-in optionsSettingsPageAccountsSignInOptions
Work accessSettingsPageAccountsWorkplace
Sync your settingsSettingsPageAccountsSync

Kid's corner

+

(disabled in Assigned Access)

SettingsPageKidsCorner

Apps corner

+

(disabled in Assigned Access)

SettingsPageAppsCorner
ProvisioningSettingsPageProvisioningPage
Time and languageSettingsPageGroupTimeRegion
Date and timeSettingsPageTimeRegionDateTime
LanguageSettingsPageTimeLanguage
RegionSettingsPageTimeRegion
KeyboardSettingsPageKeyboard
SpeechSettingsPageSpeech
Ease of accessSettingsPageGroupEaseOfAccess
NarratorSettingsPageEaseoOfAccessNarrator
MagnifierSettingsPageEaseoOfAccessMagnifier
High contractsSettingsPageEaseoOfAccessHighContrast
Closed captionsSettingsPageEaseoOfAccessClosedCaptioning
More optionsSettingsPageEaseoOfAccessMoreOptions
PrivacySettingsPageGroupPrivacy
LocationSettingsPagePrivacyLocation
CameraSettingsPagePrivacyWebcam
MicrophoneSettingsPagePrivacyMicrophone
MotionSettingsPagePrivacyMotionData
Speech inking and typingSettingsPagePrivacyPersonalization
Account infoSettingsPagePrivacyAccountInfo
ContactsSettingsPagePrivacyContacts
CalendarSettingsPagePrivacyCalendar
MessagingSettingsPagePrivacyMessaging
RadiosSettingsPagePrivacyRadios
Background appsSettingsPagePrivacyBackgroundApps
Accessory app0sSettingsPagePrivacyAccessories
Advertising IDSettingsPagePrivacyAdvertisingId
Other devicesSettingsPagePrivacyCustomPeripherals
Feedback and diagnosticsSettingsPagePrivacySIUFSettings
Update and securitySettingsPageGroupRestore
Phone updateSettingsPageRestoreMusUpdate
BackupSettingsPageRestoreOneBackup
Find my phoneSettingsPageFindMyDevice
For developersSettingsSystemDeveloperOptions
OEMSettingsPageGroupExtensibility
ExtensibilitySettingsPageExtensibility
+ +  + +## Quick actions lockdown + + +Quick action buttons are locked down in exactly the same way as Settings pages/groups. By default they are always conditional. + +You can specify the quick actions as follows: + +``` syntax + + + + + + + + + + + + + + + +``` + +The following quick actions buttons are not conditional and will always be displayed: + +- QuickActions\_Launcher\_AllSettings +- SystemSettings\_Launcher\_QuickNote +- QuickActions\_Launcher\_DeviceDiscovery + +Some quick actions are dependent on related settings pages/page groups. When a dependent page/group is not available, then the corresponding quick action will also be hidden. + +**Note**   +Dependent settings group/pages will be automatically enabled when a quick action is specified in the lockdown xml file. For example, if the Rotation quick setting is specified, the following group and page will automatically be added to the allow list: “SettingsPageSystemDisplay” and “SettingsPageDisplay”. + +  + +The following table lists the dependencies between quick actions and Settings groups/pages. + +| Quick action | Settings group | Settings page | +|------------------------------------------------------------|--------------------------------------------------|------------------------------------| +| SystemSettings\_System\_Display\_QuickAction\_Brightness | SettingsPageSystemDisplay | SettingsPageDisplay | +| SystemSettings\_System\_Display\_Internal\_Rotation | SettingsPageSystemDisplay | SettingsPageDisplay | +| SystemSettings\_QuickAction\_WiFi | SettingsPageNetworkWiFi | SettingsPageNetworkWiFi | +| SystemSettings\_QuickAction\_InternetSharing | SettingsPageNetworkInternetSharing | SettingsPageNetworkInternetSharing | +| SystemSettings\_QuickAction\_CellularData | SettingsGroupCellular | SettingsPageNetworkCellular | +| SystemSettings\_QuickAction\_AirplaneMode | SettingsPageNetworkAirplaneMode | SettingsPageNetworkAirplaneMode | +| SystemSettings\_Privacy\_LocationEnabledUserPhone | SettingsGroupPrivacyLocationGlobals | SettingsPagePrivacyLocation | +| SystemSettings\_Network\_VPN\_QuickAction | SettingsPageNetworkVPN | SettingsPageNetworkVPN | +| SystemSettings\_Launcher\_QuickNote | N/A | N/A | +| SystemSettings\_Flashlight\_Toggle | N/A | N/A | +| SystemSettings\_QuickAction\_Bluetooth | SettingsPagePCSystemBluetooth | SettingsPagePCSystemBluetooth | +| SystemSettings\_BatterySaver\_LandingPage\_OverrideControl | BatterySaver\_LandingPage\_SettingsConfiguration | SettingsPageBatterySaver | +| QuickActions\_Launcher\_DeviceDiscovery | N/A | N/A | +| QuickActions\_Launcher\_AllSettings | N/A | N/A | +| SystemSettings\_QuickAction\_QuietHours | N/A | N/A | +| SystemSettings\_QuickAction\_Camera | N/A | N/A | + +  + +## Related topics + + +[Configure Windows 10 Mobile using Lockdown XML](lockdown-xml.md) + +[Product IDs in Windows 10 Mobile](product-ids-in-windows-10-mobile.md) + +  + +  + + + + + diff --git a/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md b/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md new file mode 100644 index 0000000000..68685446d7 --- /dev/null +++ b/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md @@ -0,0 +1,53 @@ +--- +title: Sign code integrity policy with Device Guard signing (Windows 10) +description: Signing code integrity policies prevents policies from being tampered with after they're deployed. You can sign code integrity policies with the Device Guard signing portal. +ms.assetid: 63B56B8B-2A40-44B5-B100-DC50C43D20A9 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Sign code integrity policy with Device Guard signing + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Signing code integrity policies prevents policies from being tampered with after they're deployed. You can sign code integrity policies with the Device Guard signing portal. + +## Sign your code integrity policy + + +Before you get started, be sure to review these best practices: + +**Best practices** + +- Test your code integrity policies on a group of devices before deploying them to a large group of devices. + +- Use rule options 9 and 10 during testing. For more information, see the section Code integrity policy rules in the [Device Guard deployment guide](https://technet.microsoft.com/library/mt463091.aspx). + +**To sign a code integrity policy** + +1. Sign in to the Windows Store for Business + +2. Click **Settings**, and then choose **Device Guard signing**. + +3. Click **Upload** to upload your code integrity policy. + +4. After the files are uploaded, click **Sign** to sign the code integrity policy. + +5. Click **Download** to download the signed code integrity policy. + + When you sign a code integrity policy with the Device Guard signing portal, the signing certificate is added to the policy. This means you can't modify this policy. If you need to make changes, make them to an unsigned version of the policy, and then resign the policy. + +  + +  + + + + + diff --git a/windows/manage/sign-up-and-get-started.md b/windows/manage/sign-up-and-get-started.md new file mode 100644 index 0000000000..1516f02855 --- /dev/null +++ b/windows/manage/sign-up-and-get-started.md @@ -0,0 +1,64 @@ +--- +title: Sign up and get started (Windows 10) +description: IT admins can sign up for the Windows Store for Business, and get started working with apps. +ms.assetid: 87C6FA60-3AB9-4152-A85C-6A1588A20C7B +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Sign up and get started + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +IT admins can sign up for the Windows Store for Business, and get started working with apps. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Prerequisites for Windows Store for Business](prerequisites-for-windows-store-for-business.md)

There are a few prerequisites for using Store for Business.

[Sign up for Windows Store for Business](sign-up-for-windows-store-for-business.md)

Before you sign up for Store for Business, at a minimum, you'll need an Azure Active Directory (AD) account for your organization, and you'll need to be the global administrator for your organization. If your organization is already using Azure AD, you can go ahead and sign up for Store for Business. If not, we'll help you create an Azure AD account and directory as part of the sign up process.

[Roles and permissions in the Windows Store for Business](roles-and-permissions-in-the-windows-store-for-business.md)

The first person to sign in to Store for Business must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.

[Settings reference: Windows Store for Business](settings-reference--windows-store-for-business.md)

The Store for Business has a group of settings that admins use to manage the store.

+ +  + +  + +  + + + + + diff --git a/windows/manage/sign-up-for-windows-store-for-business.md b/windows/manage/sign-up-for-windows-store-for-business.md new file mode 100644 index 0000000000..90a852b957 --- /dev/null +++ b/windows/manage/sign-up-for-windows-store-for-business.md @@ -0,0 +1,99 @@ +--- +title: Sign up for Windows Store for Business (Windows 10) +description: Before you sign up for Windows Store for Business, at a minimum, you'll need an Azure Active Directory (AD) account for your organization, and you'll need to be the global administrator for your organization. +ms.assetid: 296AAC02-5C79-4999-B221-4F5F8CEA1F12 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Sign up for Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Before you sign up for Windows Store for Business, at a minimum, you'll need an Azure Active Directory (AD) account for your organization, and you'll need to be the global administrator for your organization. If your organization is already using Azure AD, you can go ahead and sign up for Store for Business. If not, we'll help you create an Azure AD account and directory as part of the sign up process. + +## Sign up for Store for Business + + +Before signing up for the Store for Business, make sure you're the global administrator for your organization. + +**To sign up for the Store for Business** + +1. Go to [https://www.microsoft.com/business-store](http://go.microsoft.com/fwlink/p/?LinkId=691845), and click **Sign up**. + + - If you start the Store for Business sign up process, and don't have an Azure AD directory for your organization, we'll help you create one. For more info, see [Sign up for Azure AD accounts](#o365_welcome). + + + + - If you already have an Azure AD directory, you'll [sign in to Store for Business](#sign_in), and then accept Store for Business terms. + + ![](images/wsfb-landing.png) + + **To sign up for Azure AD accounts through Office 365 for Business** + + - Signing up for Store for Business will create an Azure AD directory and global administrator account for you. There are just a few steps. + + Step 1: About you. + + Type the required info and click **Next.** + + ![](images/wsfb-onboard-1.png) + + - Step 2: Create an ID. + + We'll use info you provided on the previous page to build your user ID. Check the info and click **Next**. + + ![](images/wsfb-onboard-2.png) + + - Step 3: You're in. + + Let us know how you'd like to receive a verification code, and click either **Text me**, or **Call me**. We'll send you a verification code + + ![](images/wsfb-onboard-3.png) + + - Verification. + + Type your verification code and click **Create my account**. + + ![](images/wsfb-onboard-4.png) + + - Save this info. + + Be sure to save the portal sign-in page and your user ID info. Click **You're ready to go**. + + ![](images/wsfb-onboard-5.png) + + - At this point, you'll have an Azure AD directory created with one user account. That user account is the global administrator. You can use that account to sign in to Store for Business. + +2. Sign in with your Azure AD account. + + ![](images/wsfb-onboard-7.png) + +3. Read through and accept Store for Business terms. + +4. Welcome to the Store for Business. Click **Next** to continue. + + ![](images/wsfb-firstrun.png) + +### Next steps + +After signing up for Store for Business, you can: + +- **Add users to your Azure AD directory**. If you created your Azure AD directory during Store for Business sign up, additional user accounts are required for employees to install apps you assign to them, or to browse the private store. For more information, see [Manage user accounts in Store for Business](manage-users-and-groups-in-the-windows-store-for-business.md). + +- **Assign roles to employees**. For more information, see [Roles and permissions in the Windows Store for Business](roles-and-permissions-in-the-windows-store-for-business.md). + +  + +  + + + + + diff --git a/windows/manage/stop-employees-from-using-the-windows-store.md b/windows/manage/stop-employees-from-using-the-windows-store.md new file mode 100644 index 0000000000..da89adadf8 --- /dev/null +++ b/windows/manage/stop-employees-from-using-the-windows-store.md @@ -0,0 +1,100 @@ +--- +title: Configure access to Windows Store (Windows 10) +description: IT Pros can configure access to Windows Store for client computers in their organization. For some organizations, business policies require blocking access to Windows Store. +ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Configure access to Windows Store + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +IT Pros can configure access to Windows Store for client computers in their organization. For some organizations, business policies require blocking access to Windows Store. + +## Options to configure access to Windows Store + + +You can use these tools to configure access to Windows Store: AppLocker or Group Policy. For Windows 10, this is only supported on Windows 10 Enterprise edition. + +## Block Windows Store using AppLocker + + +Applies to: Windows 10 Enterprise, Windows 10 Mobile + +AppLocker provides policy-based access control management for applications. You can block access to Windows Store app with AppLocker by creating a rule for packaged apps. You'll give the name of the Windows Store app as the packaged app that you want to block from client computers. + +For more information on AppLocker, see [What is AppLocker?](../keep-secure/what-is-applocker.md) For more information on creating an AppLocker rule for app packages, see [Create a rule for packaged apps](../keep-secure/create-a-rule-for-packaged-apps.md). + +**To block Windows Store using AppLocker** + +1. Type secpol in the search bar to find and start AppLocker. + +2. In the console tree of the snap-in, click **Application Control Policies**, click **AppLocker**, and then click **Packaged app Rules**. + +3. On the **Action** menu, or by right-clicking on **Packaged app Rules**, click **Create New Rule**. + +4. On **Before You Begin**, click **Next**. + +5. On **Permissions**, select the action (allow or deny) and the user or group that the rule should apply to, and then click **Next**. + +6. On **Publisher**, you can select **Use an installed app package as a reference**, and then click **Select**. + +7. On **Select applications**, find and click **Store** under **Applications** column, and then click **OK**. Click **Next**. + + [Create a rule for packaged apps](../keep-secure/create-a-rule-for-packaged-apps.md) has more information on reference options and setting the scope on packaged app rules. + +8. Optional: On **Exceptions**, specify conditions by which to exclude files from being affected by the rule. This allows you to add exceptions based on the same rule reference and rule scope as you set before. Click **Next**. + +## Block Windows Store using Group Policy + + +Applies to: Windows 10 Enterprise, Version 1511 + +You can also use Group Policy to manage access to Windows Store. + +**To block Windows Store using Group Policy** + +1. Type gpedit in the search bar to find and start Group Policy Editor. + +2. In the console tree of the snap-in, click **Computer Configuration**, click **Administrative Templates** , click **Windows Components**, and then click **Store**. + +3. In the Setting pane, click **Turn off Store application**, and then click **Edit policy setting**. + +4. On the **Turn off Store application** setting page, click **Enabled**, and then click **OK**. + +## Block Windows Store using management tool + + +Applies to: Windows 10 Mobile + +If you have mobile devices in your organization that you upgraded from earlier versions of Windows Phone 8 to Windows 10 Mobile, existing policies created using the Windows Phone 8.1 configuration service providers (CSP) with your MDM tool will continue to work on Windows 10 Mobile. If you are starting with Windows 10 Mobile, we recommend using [AppLocker](#block_store_applocker) to manage access to Windows Store app. + +When your MDM tool supports Windows Store for Business, the MDM can use these CSPs to block Windows Store app: + +- [Policy](http://go.microsoft.com/fwlink/p/?LinkId=717030) + +- [EnterpriseAssignedAccess](https://msdn.microsoft.com/library/windows/hardware/mt157024.aspx) (Windows 10 Mobile, only) + +For more information, see [Configure an MDM provider](configure-mdm-provider.md). +## Related topics + + +[Distribute apps using your private store](distribute-apps-from-your-private-store.md) + +[Manage access to private store](manage-access-to-private-store.md) + +  + +  + + + + + diff --git a/windows/manage/troubleshoot.md b/windows/manage/troubleshoot.md new file mode 100644 index 0000000000..645ed563fe --- /dev/null +++ b/windows/manage/troubleshoot.md @@ -0,0 +1,59 @@ +--- +title: Troubleshoot Windows Store for Business (Windows 10) +description: Troubleshooting topics for Windows Store for Business. +ms.assetid: 243755A3-9B20-4032-9A77-2207320A242A +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Troubleshoot Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Troubleshooting topics for Windows Store for Business. + +## Can't find apps in private store + + +The private store for your organization is a page in the Windows Store app that contains apps that are private to your organization. After your organization acquires an app, your Store for Business admin can add it to your organization's private store. Your private store usually has a name that is close to the name of your organization or company. If you can't see your private store, there are a couple of things to check: + +- **No apps in the private store** - The private store page is only available in the Windows Store app if there are apps added to your private store. You won't see your private store page with no apps listed on it. If your Store for Business admin has added an app to the private store, and the private store page is still not available, they can check the private store status for the app on the **Inventory** page. If the status is **Add in progress**, wait and check back. + +- **Signed in with the wrong account** - If you have multiple accounts that you use in your organization, you might be signed in with the wrong account. Or, you might not be signed in. Use this procedure to sign in with your organization account. + +**To sign in with organization account in Windows Store app** + +1. Click the people icon in Windows Store app, and click **Sign in**. + + ![](images/wsfb-wsappsignin.png) + +2. Click **Add account**, and then click **Work or school account**. + + ![](images/wsfb-wsappaddacct.png) + +3. Type the email account and password, and click **Sign in**. + + ![](images/wsfb-wsappworkacct.png) + +4. You should see the private store for your organization. In our example, the page is named **Contoso publishing**. + + ![](images/wsfb-wsappprivatestore.png) + + Click the private store to see apps in your private store. + + ![](images/wsfb-privatestoreapps.png) + +  + +  + + + + + diff --git a/windows/manage/update-windows-store-for-business-account-settings-.md b/windows/manage/update-windows-store-for-business-account-settings-.md new file mode 100644 index 0000000000..623262c56a --- /dev/null +++ b/windows/manage/update-windows-store-for-business-account-settings-.md @@ -0,0 +1,54 @@ +--- +title: Update Windows Store for Business account settings (Windows 10) +description: The Account information page in Windows Store for Business shows information about your organization that you can update, including-- country or region, organization name, default domain, and language preference. +ms.assetid: CEFFF451-D7D2-4A35-AF28-4A72B9582585 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Update Windows Store for Business account settings + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +The **Account information** page in Windows Store for Business shows information about your organization that you can update, including: country or region, organization name, default domain, and language preference. These are settings in the Azure AD directory that you used when signing up for Store for Business + +If you need to change any of these settings, you can use Office 365 admin portal, or Azure admin portal. + +**To make updates to Store for Business directory settings in Office 365** + +1. [Sign in to Office 365](http://go.microsoft.com/fwlink/p/?LinkId=708616) with your work or school account. + +2. Go to the [Office 365 admin center](http://go.microsoft.com/fwlink/p/?LinkId=708620). + +3. Select your organization's name on the right side of the page. + +4. Change the information you want to update, and then click **Save.** + +For more information about updating organization information, see [Change your organization's address, technical contact email, and other information](http://go.microsoft.com/fwlink/p/?LinkId=708621). + +**To make updates to Store for Business directory settings in Azure management portal** + +1. Sign in to the Azure Portal as Administrator. + +2. Click **Active Directory**. + +3. On the **Directory** tab, choose your directory + +4. Click the **Configure** tab. + +For more information about updating organization information, see [Add your own domain name in Azure AD](http://go.microsoft.com/fwlink/p/?LinkId=708622). + +  + +  + + + + + diff --git a/windows/manage/windows-10-mobile-and-mdm.md b/windows/manage/windows-10-mobile-and-mdm.md new file mode 100644 index 0000000000..9cf338b2d1 --- /dev/null +++ b/windows/manage/windows-10-mobile-and-mdm.md @@ -0,0 +1,1482 @@ +--- +title: Windows 10 Mobile and mobile device management (Windows 10) +description: This guide provides an overview of the mobile device and app management technologies in the Windows 10 Mobile operating system. +ms.assetid: 6CAA1004-CB65-4FEC-9B84-61AAD2125E5E +keywords: ["telemetry", "BYOD", "MDM"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Windows 10 Mobile and mobile device management + + +**Applies to** + +- Windows 10 Mobile + +**In this article** + +- [Overview](#overview) +- [Device deployment](#device_deployment__) +- [Device configuration](#device_configuration) +- [App management](#__app_management) +- [Device operations](#device_operations) +- [Device retirement](#device_retirement) +- [Related topics](#related_topics) + +This guide provides an overview of the mobile device and app management technologies in the Windows 10 Mobile operating system. It describes how mobile device management (MDM) systems use the built-in device management client to deploy, configure, maintain, and support phones and small tablets running Windows 10 Mobile. + +Bring Your Own Device (BYOD—that is, personal devices) and corporate devices are key scenarios that Windows 10 Mobile MDM capabilities support. The operating system offers a flexible approach to registering devices with directory services and MDM systems, and IT organizations can provision comprehensive device-configuration profiles based on their company’s need to control and secure mobile business data. + +Windows 10 Mobile not only delivers more comprehensive, restrictive configuration settings than Windows Phone 8.1 did but also provides capabilities to deploy and manage apps built on the Universal Windows Platform (UWP). Companies can distribute apps directly from Windows Store or by using their MDM system. They can control and distribute custom line-of-business (LOB) apps the same way. + +## Overview + + +Organizations’ users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime. IT must ensure that the apps and data on those mobile devices are safe, especially on personal devices. Windows 10 Mobile helps organizations address these challenges by providing a robust, flexible, built-in MDM client. IT departments can use the MDM system of their choice to manage this client. + +### Built-in MDM client + +The built-in MDM client is common to all editions of the Windows 10 operating system, including desktop, mobile, and Internet of Things (IoT). The client provides a single interface through which you can manage any device that runs Windows 10. The client has two important roles: device enrollment in an MDM system and device management. + +- **Device enrollment.** Users can enroll in the MDM system. On Windows 10, a user can register a device with Microsoft Azure Active Directory (Azure AD) and enroll in an MDM system at the same time so that the system can manage the device, the apps running on it, and the confidential data it holds. Enrollment establishes the management authority for the device. Only one management authority (or MDM enrollment) is possible at a time, which helps prevent unauthorized access to devices and ensures their stability and reliability. + +- **Device management.** The MDM client allows the MDM system to configure policy settings; deploy apps and updates; and perform other management tasks, such as remotely wiping the device. The MDM system sends configuration requests and collects inventory through the MDM client. The client uses [configuration service providers (CSPs)](http://go.microsoft.com/fwlink/p/?LinkId=734049) to configure and inventory settings. A CSP is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. (The security architecture of Windows 10 Mobile prevents direct access to registry settings and operating system files. For more information, see the [Windows 10 Mobile security guide](../keep-secure/windows-10-mobile-security-guide.md).) + +The MDM client is an integral part of Windows 10 Mobile. As a result, there is no need for an additional, custom MDM app to enroll the device or to allow an MDM system to manage it. All MDM systems have equal access to Windows 10 Mobile MDM application programming interfaces (APIs), so you can choose Microsoft Intune or a third-party MDM product to manage Windows 10 Mobile devices. For more information about Windows 10 Mobile device management APIs, see [Mobile device management](http://go.microsoft.com/fwlink/p/?LinkId=734050). + +### Windows 10 Mobile editions + +Every device that runs Windows 10 Mobile includes all the enterprise mobile device security and management capabilities the MDM client provides. Microsoft also offers an Enterprise edition of Windows 10 Mobile, which includes three additional capabilities. To enable these capabilities, you can provision a license file without reinstalling the operating system: + +- **Ability to postpone software updates.**Windows 10 Mobile gets software updates directly from Windows Update, and you cannot curate updates prior to deployment. Windows 10 Mobile Enterprise, however, allows you to curate and validate updates prior to deploying them. + +- **No limit on the number of self-signed LOB apps that you can deploy to a single device.** To use an MDM system to deploy LOB apps directly to devices, you must cryptographically sign the software packages with a code signing certificate that your organization’s certificate authority (CA) generates. You can deploy a maximum of 20 self-signed LOB apps to a Windows 10 Mobile device, more than 20 if your organization’s devices run Windows 10 Mobile Enterprise. + +- **Set telemetry to security level.** The telemetry security level configures the operating system to gather only the telemetry information required to keep devices secured. + +**Note**   +Your organization can opt to purchase a code signing certificate from Verisign to sign LOB apps or use [Windows Store for Business](windows-store-for-business.md) to obtain apps. With either method, you can distribute more than 20 apps to a single device without activating Windows 10 Mobile Enterprise on that device by using your MDM system. + +  + +To activate Windows 10 Mobile Enterprise on any Windows 10 Mobile device, use your company’s MDM system or a provisioning package to inject a license onto the device. You can download a Windows 10 Mobile Enterprise license from the Business Support Portal. + +### Lifecycle management + +Windows 10 Mobile supports end-to-end lifecycle device management to give companies control of their devices, data, and apps. Comprehensive MDM systems use the built-in MDM client to manage devices throughout their lifecycle, as Figure 1 illustrates. The remainder of this guide describes the operating system’s mobile device and app management capabilities through each phase of the lifecycle, showing how MDM systems use specific features. + +![figure 1](images/win10-mobile-mdm-fig1.png) + +Figure 1. Device management lifecycle + +## Device deployment + + +Device deployment includes the initial registration and configuration of the device, including its enrollment with an MDM system. Sometimes, companies preinstall apps. The major factors in how you deploy devices and which controls you put in place are device ownership and how the user will use the device. This guide covers two scenarios: + +1. Companies allow users to personalize their devices because the users own the devices or because company policy doesn’t require tight controls (defined as *personal devices* in this guide). + +2. Companies don’t allow users to personalize their devices or they limit personalization, usually because the organization owns the devices and security considerations are high (defined as *corporate devices* in this guide). + +Often, employees can choose devices from a list of supported models, or companies provide devices that they preconfigure, or bootstrap, with a baseline configuration. + +Microsoft recommends Azure AD Join and MDM enrollment and management for corporate devices and Azure AD Registration and MDM enrollment and management for personal devices. + +### Deployment scenarios + +Most organizations support both personal and corporate device scenarios. The infrastructure for these scenarios is similar, but the deployment process and configuration policies differ. Table 1 describes characteristics of the personal and corporate device scenarios. Activation of a device with an organizational identity is unique to Windows 10 Mobile. + +Table 1. Characteristics of personal and corporate device scenarios + + +++++ + + + + + + + + + + + + + + + + + + + + + + +
Personal devicesCorporate devices
OwnershipUserOrganization
Primary usePersonalWork
DeploymentThe primary identity on the device is a personal identity. A Microsoft account is the default option for Windows 10 Mobile.The primary identity on the device is an organizational identity. An Azure AD account is the default option for Windows 10 Mobile.
+ +  + +### Identity management + +People can use only one account to activate a device, so it’s imperative that your organization control which account you enable first. The account you choose will determine who controls the device and influence your management capabilities. The following list describes the impact that users’ identities have on management (Table 2 summarizes these considerations): + +- **Personal identity.** In this scenario, employees use their Microsoft account to activate the device. Then, they use their Azure AD account (organizational identity) to register the device in Azure AD and enroll it with the company’s MDM solution. You can apply policies to help protect and contain corporate apps and data on the devices, designed to prevent intellectual property leaks, but users keep full control over personal activities, such as downloading and installing apps and games. + +- **Organizational identity.** In this scenario, employees use their Azure AD account to register the device to Azure AD and automatically enroll it with the organization’s MDM solution. In this case, companies can block personal use of devices. Using organizational Identities to initialize devices gives organizations complete control over devices and allows them to prevent personalization. + +Table 2. Personal vs. organizational identity + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Personal identityCorporate identity
First account on the deviceMicrosoft accountAzure AD account
Device sign-inUsers cannot sign in to devices with Azure AD credentials, even if they add the credentials after initial activation with a Microsoft account.Users can unlock devices with an Azure AD account. Organizations can block the addition of a personal identity.
User settings and data roaming across devicesUser and app settings roam across devices activated with the same personal identity over personal OneDrive.Windows 10 Mobile currently does not support users and app settings roaming over the enterprise cloud. It can block the roaming of personal cloud settings.
Ability to block the use of a personal identity on the deviceNoYes
Level of control

Organization can apply most* restrictive policies to devices, but they cannot remove the Microsoft account from them. Device users can reclaim full control over their devices by un-enrolling them from the organization’s MDM solution.

+
+Note   +

* MDM functionality on personal devices might be limited in the future.

+
+
+  +
Organizations are free to apply the restrictive policies to devices that policy standards and compliance regulations require and prevent the user from un-enrolling the device from the enterprise.
+ +  + +### Infrastructure requirements + +For both device scenarios, the essential infrastructure and tools required to deploy and manage Windows 10 Mobile devices include an Azure AD subscription and an MDM system. + +Azure AD is a cloud-based directory service that provides identity and access management. You can integrate it with existing on-premises directories to create a hybrid solution. Azure AD has three editions: Free, Basic, and Premium (see [Azure Active Directory editions](http://go.microsoft.com/fwlink/p/?LinkId=723980)). All editions support Azure AD device registration, but the Premium edition is required to enable MDM auto-enrollment and conditional access based on device state. Organizations that use Microsoft Office 365 or Intune are already using Azure AD. + +**Note**   +Most industry-leading MDM vendors already support integration with Azure AD or are working on integration. You can find the MDM vendors that support Azure AD in [Azure Marketplace](http://go.microsoft.com/fwlink/p/?LinkId=723981). + +  + +Users can enroll Windows 10 Mobile devices in third-party MDM systems without using an Azure AD organizational account. (By default, Intune uses Azure AD and includes a license). If your organization doesn’t use Azure AD, you must use a personal identity to activate devices and enable common scenarios, such as downloading apps from Windows Store. + +Multiple MDM systems that support Windows 10 Mobile are available. Most support personal and corporate device deployment scenarios. Microsoft offers [Intune](http://go.microsoft.com/fwlink/p/?LinkId=723983), which is part of the [Enterprise Mobility Suite](http://go.microsoft.com/fwlink/p/?LinkId=723984) and a cloud-based MDM system that manages devices off premises. Like Office 365, Intune uses Azure AD for identity management, so employees use the same credentials to enroll devices in Intune or sign in to Office 365. Intune supports devices that run other operating systems, as well, such as iOS and Android, to provide a complete MDM solution. + +You can also integrate Intune with System Center Configuration Manager to gain a single console in which to manage all devices—in the cloud and on premises. For more information, see [Manage Mobile Devices with Configuration Manager and Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkId=734051). For guidance on choosing between a stand-alone Intune installation and Intune integrated with Configuration Manager, see [Choose between Intune by itself or integrating Intune with System Center Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=723985). + +In addition to Intune, other MDM providers support Windows 10 Mobile. Currently, the following MDM systems claim to support Windows 10 and Windows 10 Mobile: [AirWatch](http://go.microsoft.com/fwlink/p/?LinkId=723986), [Citrix](http://go.microsoft.com/fwlink/p/?LinkId=723987), [Lightspeed Systems](http://go.microsoft.com/fwlink/p/?LinkId=723988), [Matrix42](http://go.microsoft.com/fwlink/p/?LinkId=723989), [MobileIron](http://go.microsoft.com/fwlink/p/?LinkId=723990), [SAP](http://go.microsoft.com/fwlink/p/?LinkId=723991), [SOTI](http://go.microsoft.com/fwlink/p/?LinkId=723992), and [Symantec](http://go.microsoft.com/fwlink/p/?LinkId=723993). + +All MDM vendors have equal access to the [Windows 10 MDM APIs](http://go.microsoft.com/fwlink/p/?LinkId=734050). The extent to which they implement these APIs depends on the vendor. Contact your preferred MDM vendor to determine its level of support. + +**Note**   +Although not covered in this guide, you can use Exchange ActiveSync (EAS) to manage mobile devices instead of using a full-featured MDM system. EAS is available in Microsoft Exchange Server 2010 or later and Office 365. + +In addition, Microsoft recently added MDM capabilities powered by Intune to Office 365. MDM for Office 365 supports mobile devices only, such as those running Windows 10 Mobile, iOS, and Android. MDM for Office 365 offers a subset of the management capabilities found in Intune, including the ability to remotely wipe a device, block a device from accessing Exchange Server email, and configure device policies (for example, passcode requirements). For more information about MDM for Office 365 capabilities, see [Overview of Mobile Device Management for Office 365](http://go.microsoft.com/fwlink/p/?LinkId=734052). + +  + +### Provisioning + +Provisioning is new to Windows 10 and uses the MDM client in Windows 10 Mobile. You can create a runtime provisioning package to apply settings, profiles, and file assets to a device running Windows 10. + +To assist users with MDM system enrollment, use a provisioning package. To do so, use the [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=733911) to create a provisioning package, and then install that package on the device. + +Users can perform self-service MDM enrollment based on the following deployment scenarios: + +- **Corporate device.** During the out-of-the-box experience (OOBE), you can instruct the user to select **This device is owned by my organization** and join the device to Azure AD and the MDM system. + +- **Personal device.** The user activates the device with a Microsoft account, but you can instruct him or her to register the device with Azure AD and enroll in Intune. To do so in Windows 10 Mobile, the user clicks, **Settings**, clicks **Accounts**, and then clicks **Work access**. + +To automate MDM enrollment, use provisioning packages as follows: + +- **Corporate device.** You can create a provisioning package and apply it to a corporate device before delivery to the user, or instruct the user to apply the package during OOBE. After application of the provisioning package, the OOBE process automatically chooses the enterprise path and requires the user to register the device with Azure AD and enroll it in the MDM system. + +- **Personal device.** You can create a provisioning package and make it available to users who want to enroll their personal device in the enterprise. The user enrolls the device in the corporate MDM for further configuration by applying the provisioning package. To do so in Windows 10 Mobile, the user clicks **Settings**, clicks **Accounts**, and then clicks **Provisioning**). + +Distribute provisioning packages to devices by publishing them in an easily accessible location (e.g., an email attachment or a web page). You can cryptographically sign or encrypt provisioning packages and require that the user enter a password to apply them. + +See [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkId=734054) for more information on creating provisioning packages. + +## Device configuration + + +The following sections describe the device configuration capabilities of the built-in Windows 10 Mobile MDM client. This client exposes the capabilities to any MDM system compatible with Windows 10. Configurable settings include: + +- [Email accounts](#email) + +- [Account restrictions](#restrictions) + +- [Device lock restrictions](#device_lock) + +- [Hardware restrictions](#hardware) + +- [Certificate management](#certificate) + +- [Wi-Fi](#wifi) + +- [Proxy](#proxy) + +- [Virtual private network (VPN)](#vpn) + +- [Access point name (APN) profiles](#apn) + +- [Data leak prevention](#data) + +- [Storage management](#storage) + +**Note**   +Although all the MDM settings this section describes are available in Windows 10 Mobile, not all MDM systems may show them in their user interface. In addition, naming may vary among MDM systems. Consult your MDM system’s documentation for more information. + +  + +### Email accounts + +You can use your corporate MDM system to manage corporate email accounts. Define email account profiles in the MDM system, and then deploy them to devices. You would usually deploy these settings immediately after enrollment, regardless of scenario. + +This capability extends to email systems that use EAS. Table 3 lists settings that you can configure in EAS email profiles. + +Table 3. Windows 10 Mobile settings for EAS email profiles + +| Setting | Description | +|----------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Email Address | The email address associated with the EAS account | +| Domain | The domain name of the Exchange Server instance | +| Account Name | A user-friendly name for the email account on the device | +| Password | The password for the email account | +| Server Name | The server name that the email account uses | +| User Name | The user name for the email account | +| Calendar Age Filter | The age of calendar items to be synchronized with the device (for example, synchronizing calendar items within the past 7 days) | +| Logging | The level of diagnostic logging | +| Mail Body Type | The email body format type: text, HTML, RTF, or Multipurpose Internet Mail Extensions | +| Mail HTML Truncation | The maximum size of an HTML-formatted email message before the message is synchronized to the device (Any HTML-formatted email message that exceeds this size is automatically truncated.) | +| Mail Plain Text Truncation | The maximum size of a text-formatted email message before the message is synchronized to the device (Any text-formatted email message that exceeds this size is automatically truncated.) | +| Schedule | The schedule for synchronizing email between the Exchange Server instance and the device | +| Use SSL | Establishes whether Secure Sockets Layer (SSL) is required when syncing | +| Mail Age Filter | The age of messages to be synchronized with the device (for example, synchronizing messages within the past 7 days) | +| Content Types | The content type that is synchronized (e.g., email, contacts, calendar, task items) | + +  + +Table 4 lists settings that you can configure in other email profiles. + +Table 4. Windows 10 Mobile settings for other email profiles + +| Setting | Description | +|-------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------| +| User logon name | The user logon name for the email account | +| Outgoing authentication required | Whether the outgoing server requires authentication | +| Password | The password for the account in the **User logon name** field | +| Domain | The domain name for the account in the **User logon name** field | +| Days to download | How much email (measured in days) should be downloaded from the server | +| Incoming server | The incoming server name and port number, where the value format is *server\_name:port\_number* (The port number is optional.) | +| Send and receive schedule | The length of time (in minutes) between email send-and-receive updates | +| IMAP4 maximum attachment size | The maximum size for message attachments for Internet Message Access Protocol version 4 (IMAP4) accounts | +| Send mail display name | The name of the sender displayed on a sent email | +| Outgoing server | The outgoing server name and port number, where the value format is *server\_name:port\_number* (The port number is optional.) | +| Reply address | The user’s reply email address | +| Email service name | The name of the email service | +| Email service type | The email service type (for example, POP3, IMAP4). | +| Maximum receive message size | The maximum size (in bytes) of messages retrieved from the incoming email server (Messages that exceed this size are truncated to the maximum size.) | +| Delete message action | How messages are deleted on the server (Messages can either be permanently deleted or sent to the Trash folder.) | +| Use cellular only | Whether the account should be used only with cellular connections and not Wi-Fi connections | +| Content types to synchronize | The content types supported for synchronization (in other words, mail messages, contacts, calendar items) | +| Content synchronization server | The name of the content synchronization server, if it’s different from the email server | +| Calendar synchronization server | The name of the calendar synchronization server, if it’s different from the email server | +| Contact server requires SSL | Whether the contact server requires an SSL connection | +| Calendar server requires SSL | Whether the calendar server requires an SSL connection | +| Contact items synchronization schedule | The schedule for syncing contact items | +| Calendar items synchronization schedule | The schedule for syncing calendar items | +| Alternative SMTP email account | The display name associated with a user’s alternative Simple Mail Transfer Protocol (SMTP) email account | +| Alternate SMTP domain name | The domain name for the user’s alternative SMTP email account | +| Alternate SMTP account enabled | Whether the user’s alternative SMTP account is enabled | +| Alternate SMTP password | The password for the user’s alternative SMTP account | +| Incoming and outgoing servers require SSL | A group of properties that specify whether the incoming and outgoing email servers use SSL | + +  + +### Account restrictions + +On a corporate device registered with Azure AD and enrolled in the MDM system, you can control whether users can use a Microsoft account or add other consumer email accounts. Table 5 lists the settings that you can use to manage accounts on Windows 10 Mobile devices. + +Table 5. Windows 10 Mobile account management settings + +| Setting | Description | +|-------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Allow Microsoft Account | Specifies whether users are allowed to add a Microsoft account to the device after MDM enrollment and use this account for connection authentication and services, such as purchasing apps in Windows Store, or cloud-based consumer services, such as Xbox or Groove. If a device was activated with a Microsoft account, the MDM system would not be able to block that account from being used. | +| Allow Adding Non Microsoft Accounts | Specifies whether users are allowed to add email accounts other than Microsoft accounts after MDM enrollment. If **Allow Microsoft Account** is applied, user can also not use a Microsoft account. | +| Allow “Your Account” | Specifies whether users are able to change account configuration in the **Your Email and Accounts** panel in Settings. | + +  + +### Device lock restrictions + +It’s common sense to lock a device when it is not in use. Microsoft recommends that you secure Windows 10 Mobile devices and implement a device lock policy. A device password or PIN lock is a best practice for securing apps and data on devices. [Windows Hello](http://go.microsoft.com/fwlink/p/?LinkId=723994) is the name given to the new biometric sign-in option that allows users to use their face, iris, or fingerprints to unlock their compatible device, all of which Windows 10 supports. + +**Note**   +In addition to the device lock restrictions discussed in this section, Windows 10 supports Microsoft Passport for Work, which lets you access apps and services without a password. Microsoft Passport for Work is supported only in Windows 10 for desktop and requires Configuration Manager. In addition, the device must be joined to a domain. For more information, see [Enable Microsoft Passport for work in the organization](http://go.microsoft.com/fwlink/p/?LinkId=723995). + +  + +Table 6 lists the MDM settings in Windows 10 Mobile that you can use to configure device lock restrictions. + +Table 6. Windows 10 Mobile device lock restrictions + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
Device Password Enabled

Specifies whether users are required to use a device lock password

+
+Note   +

+
    +
  • When a device is registered with Azure AD and automatic MDM enrollment is not configured, the user will automatically be prompted to set a password PIN of at least six digits (simple PINs are not allowed).

  • +
  • If the device is capable of using biometric authentication, the user will be able to enroll an iris or other biometric gesture (depending on hardware) for device lock purposes. When a user uses a biometric gesture, he or she can still use the PIN as a fallback mechanism (for example, if the iris-recognition camera fails).

  • +
+
+
+  +
Allow Simple Device PasswordWhether users can use a simple password (for example, 1111 or 1234)
Alphanumeric Device Password RequiredWhether users need to use an alphanumeric password When configured, Windows prompts the user with a full device keyboard to enter a complex password. When not configured, the user will be able to enter a numeric PIN on the keyboard.
Min Device Password Complex CharactersThe number of password element types (in other words, uppercase letters, lowercase letters, numbers, or punctuation) required to create strong passwords
Device Password ExpirationThe number of days before a password expires (Biometric data does not expire.)
Device Password HistoryThe number of passwords Windows 10 Mobile remembers in the password history (Users cannot reuse passwords in the history to create new passwords.)
Min Device Password LengthThe minimum number of characters required to create new passwords
Max Inactivity Time Device LockThe number of minutes of inactivity before devices are locked and require a password to unlock
Allow Idle Return Without PasswordWhether users are required to re-authenticate when their devices return from a sleep state, before the inactivity time was reached
Max Device Password Failed AttemptsThe number of authentication failures allowed before a device is wiped (A value of zero disables device wipe functionality.)
Screen Timeout While LockedThe number of minutes before the lock screen times out (This policy influences the device’s power management.)
Allow Screen Timeout While Locked User ConfigurationWhether users can manually configure screen timeout while the device is on the lock screen (Windows 10 Mobile ignores the Screen Timeout While Locked setting if you disable this setting.)
+ +  + +### Hardware restrictions + +Windows 10 Mobile devices use state-of-the-art technology that includes popular hardware features such as cameras, global positioning system (GPS) sensors, microphones, speakers, near-field communication (NFC) radios, storage card slots, USB interfaces, Bluetooth interfaces, cellular radios, and Wi-Fi. You can also use hardware restrictions to control the availability of these features. Table 7 lists the MDM settings that Windows 10 Mobile supports to configure hardware restrictions. + +**Note**   +Some of these hardware restrictions provide connectivity and assist in data protection. Enterprise data protection is currently being tested in select customer evaluation programs. + +  + +Table 7. Windows 10 Mobile hardware restrictions + +| Setting | Description | +|--------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------| +| Allow NFC | Whether the NFC radio is enabled | +| Allow USB Connection | Whether the USB connection is enabled (this setting doesn’t affect USB charging) | +| Allow Bluetooth | Whether users can enable and use the Bluetooth radio on their devices | +| Allow Bluetooth Advertising | Whether the device can act as a source for Bluetooth advertisements and be discoverable to other devices | +| Allow Bluetooth Discoverable Mode | Whether the device can discover other devices (for example, headsets) | +| Bluetooth Services Allowed List | The list of Bluetooth services and profiles to which the device can connect | +| Set Bluetooth Local Device Name | The local Bluetooth device name | +| Allow Wi-Fi | Whether the Wi-Fi radio is enabled | +| Allow Auto Connect to Wi-Fi Sense Hotspots | Whether the device can automatically connect to Wi-Fi hotspots and friends’ home networks that are shared through Wi-Fi Sense | +| Allow Manual Wi-Fi Configuration | Whether users can manually connect to Wi-Fi networks not specified in the MDM system’s list of configured Wi-Fi networks | +| WLAN Scan Mode | How actively the device scans for Wi-Fi networks (This setting is hardware dependent.) | +| Allow Camera | Whether the camera is enabled | +| Allow Storage Card | Whether the storage card slot is enabled | +| Allow Voice Recording | Whether the user can use the microphone to create voice recordings | +| Allow Location | Whether the device can use the GPS sensor or other methods to determine location so applications can use location information | + +  + +### Certificate management + +Managing certificates can be difficult for users, but certificates are pervasive for a variety of uses, including, account authentication, Wi-Fi authentication, VPN encryption, and SSL encryption of web content. Although users could manage certificates on devices manually, it’s a best practice to use your MDM system to manage those certificates for their entire life cycle, from enrollment through renewal to revocation. You can use the Simple Certificate Enrollment Protocol (SCEP) and Personal Information Exchange (PFX) certificates files to install certificates on Windows 10 Mobile. Certificate management through SCEP and MDM systems is fully transparent to users and requires no user intervention, so it helps improve user productivity and reduce support calls. Your MDM system can automatically deploy these certificates to the devices’ certificate stores after you enroll the device. Table 8 lists the SCEP settings that the MDM client in Windows 10 Mobile provides. + +Table 8. Windows 10 Mobile SCEP certificate enrollment settings + +| Setting | Description | +|------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Certificate enrollment server URLs | The certificate enrollment servers (to specify multiple server URLs, separate the URLs with semicolons \[;\]) | +| SCEP enrollment challenge | The Base64-encoded SCEP enrollment challenge | +| Extended key use object identifiers | The object identifiers (OIDs) for extended key use | +| Key usage | The key usage bits for the certificate in decimal format | +| Subject name | The certificate subject name | +| Private key storage | Where to store the private key (in other words, the Trusted Platform Module \[TPM\], a software key storage provider \[KSP\], or the Microsoft Passport KSP) | +| Pending retry delay | How long the device will wait to retry when the SCEP server sends a pending status | +| Pending retry count | The number of times a device will retry when the SCEP server sends a pending status | +| Template name | The OID of the certificate template name | +| Private key length | The private key length (in other words, 1024, 2048, or 4096 bits; Microsoft Passport supports only the 2048 key length) | +| Certificate hash algorithm | The hash algorithm family (in other words, SHA-1, SHA-2, SHA-3; multiple hash algorithm families are separated by plus signs \[+\]) | +| Root CA thumbprint | The root CA thumbprint | +| Subject alternative names | Subject alternative names for the certificate (Use semicolons to separate multiple subject alternative names.) | +| Valid period | The unit of measure for the period of time the certificate is considered valid (in other words, days, months, or years) | +| Valid period units | The number of units of time that the certificate is considered valid (Use this setting with the **Valid Period** setting. For example, if this setting is **3** and **Valid Period** is **Years**, the certificate is valid for 3 years.) | +| Custom text to show in Microsoft Passport PIN prompt | The custom text to show on the Microsoft Passport PIN prompt during certificate enrollment | +| Thumbprint | The current certificate thumbprint, if certificate enrollment succeeds | + +  + +In addition to SCEP certificate management, Windows 10 Mobile supports deployment of PFX certificates. Table 9 lists the Windows 10 Mobile PFX certificate deployment settings. + +Table 9. Windows 10 Mobile PFX certificate deployment settings + +| Setting | Description | +|-----------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Private key storage | Where to store the private key (in other words, the TPM, a software KSP, or the Microsoft Passport KSP) | +| Microsoft Passport container name | The tenant identifier of the Azure AD tenant from which the Microsoft Passport is derived, required only if you select **Microsoft Passport KSP** in **Private key storage** | +| PFX packet | The PFX packet with the exported and encrypted certificates and keys in Binary64 format | +| PFX packet password | The password that protects the PFX blob specified in **PFX packet** | +| PFX packet password encryption | Whether the MDM system encrypts the PFX certificate password with the MDM certificate | +| PFX private key export | Whether the PFX private key can be exported | +| Thumbprint | The thumbprint of the installed PFX certificate | + +  + +Use the **Allow Manual Root Certificate Installation** setting to prevent users from manually installing root and intermediate CA certificates intentionally or accidently. + +**Note**   +To diagnose certificate-related issues on Windows 10 Mobile devices, use the free [Certificates app](http://go.microsoft.com/fwlink/p/?LinkId=723996) in Windows Store. This Windows 10 Mobile app can help you: + +- View a summary of all personal certificates. + +- View the details of individual certificates. + +- View the certificates used for VPN, Wi-Fi, and email authentication. + +- Identify which certificates may have expired. + +- Verify the certificate path and confirm that you have the correct intermediate and root CA certificates. + +- View the certificate keys stored in the device TPM. + +  + +### Wi-Fi + +People use Wi-Fi on their mobile devices as much as or more than cellular data. Most corporate Wi-Fi networks require certificates and other complex information to restrict and secure user access. This advanced Wi-Fi information is difficult for typical users to configure, but you can use your MDM system to fully configure Wi-Fi settings without user intervention. + +Table 10 lists the Windows 10 Mobile Wi-Fi connection profile settings. Use the information in this table to help you create Wi-Fi connection profiles in your MDM system. + +Table 10. Windows 10 Mobile Wi-Fi connection profile settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
SSIDThe case-sensitive name of the Wi-Fi network (service set identifier [SSID])
Security typeThe type of security the Wi-Fi network uses; can be one of the following authentication types: +
    +
  • Open 802.11

  • +
  • Shared 802.11

  • +
  • WPA-Enterprise 802.11

  • +
  • WPA-Personal 802.11

  • +
  • WPA2-Enterprise 802.11

  • +
  • WPA2-Personal 802.11

  • +
Authentication encryptionThe type of encryption the authentication uses; can be one of the following encryption methods: +
    +
  • None (no encryption)

  • +
  • Wired Equivalent Privacy

  • +
  • Temporal Key Integrity Protocol

  • +
  • Advanced Encryption Standard (AES)

  • +
Extensible Authentication Protocol Transport Layer Security (EAP-TLS)WPA-Enterprise 802.11 and WPA2-Enterprise 802.11 security types can use EAP-TLS with certificates for authentication
Protected Extensible Authentication Protocol with Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MSCHAPv2)WPA-Enterprise 802.11 and WPA2-Enterprise 802.11 security types can use PEAP-MSCHAPv2 with a user name and password for authentication
Shared keyWPA-Personal 802.11 and WPA2-Personal 802.11 security types can use a shared key for authentication.
ProxyThe configuration of any network proxy that the Wi-Fi connection requires (To specify the proxy server, use its fully qualified domain name [FQDN], Internet Protocol version 4 [IPv4] address, IP version 6 [IPv6] address, or IPvFuture address.)
Disable Internet connectivity checksWhether the Wi-Fi connection should check for Internet connectivity
Proxy auto-configuration URLA URL that specifies the proxy auto-configuration file
Enable Web Proxy Auto-Discovery Protocol (WPAD)Specifies whether WPAD is enabled
+ +  + +Table 11 lists the Windows 10 Mobile settings for managing Wi-Fi connectivity. + +Table 11. Windows 10 Mobile Wi-Fi connectivity settings + +| Setting | Configuration | +|--------------------------------------------|----------------------------------------------------------------------------| +| Allow Auto Connect To Wi-Fi Sense Hotspots | Whether the device will automatically detect and connect to Wi-Fi networks | +| Allow Manual Wi-Fi Configuration | Whether the user can manually configure Wi-Fi settings | +| Allow Wi-Fi | Whether the Wi-Fi hardware is enabled | +| WLAN Scan Mode | How actively the device scans for Wi-Fi networks | + +  + +### Proxy + +Apps running on Windows 10 Mobile (for example, Microsoft Edge) can use proxy connections to access Internet content, but Wi-Fi connections on the corporate intranet most typically use proxy connections, instead. You can define multiple proxies in Windows 10 Mobile. + +**Note**   +Windows 10 Mobile also supports proxy auto-configuration (PAC) files, which can automatically configure proxy settings. The Web Proxy Auto-Discovery Protocol (WPAD) lets apps use Dynamic Host Configuration Protocol and Domain Name System (DNS) lookups to locate the PAC file. + +  + +Table 12 lists the Windows 10 Mobile settings for proxy connections. + +Table 12. Windows 10 Mobile proxy connection settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingsConfiguration
Proxy nameThe unique name of the proxy connection
Proxy IDThe unique identifier for the proxy connection
NameThe user-friendly name of the proxy connection
Server addressThe address of the proxy server, which can be the server FQDN or IP address
IP address typeThe IP address type that identifies the proxy server, which can be one of the following values: +
    +
  • IPV4

  • +
  • IPV6

  • +
  • E164

  • +
  • ALPHA

  • +
Proxy connection typeThe proxy connection type, which can be one of the following values: +
    +
  • ISA

  • +
  • WAP

  • +
  • SOCKS

  • +
  • NULL

  • +
PortsThe port information for the proxy connection; includes the following settings: +
    +
  • Port Name. The unique name of a port that the proxy connection uses, such as PORT0 or PORT1

  • +
  • Port Name/Port Nbr. The proxy connection port number for this port

  • +
  • Port Name/Services. The services that use this proxy connection port

  • +
  • Services/Service Name. The name of a service that uses the proxy connection

  • +
  • Services/Service Name/Service Name. The protocol associated with the parent port connection

  • +
Configuration referenceThe connection reference information for the proxy connection. The corporation determines the information in this optional setting.
+ +  + +### VPN + +In addition to Wi-Fi, users often use a VPN to securely access apps and resources on their company’s intranet behind a firewall. Windows 10 Mobile supports several VPN vendors in addition to native Microsoft VPNs (such as Point to Point Tunneling Protocol \[PPTP\], Layer 2 Tunneling Protocol \[L2TP\], and Internet Key Exchange Protocol version 2 \[IKEv2\]), including: + +- IKEv2 + +- IP security + +- SSL VPN connections (which require a downloadable plug-in from the VPN server vendor) + +You can configure Windows 10 Mobile to use auto-triggered VPN connections, as well. You define a VPN connection for each app that requires intranet connectivity. When users switch between apps, the operating system automatically establishes the VPN connection for that app. In the event the device drops the VPN connection, Windows 10 Mobile automatically reconnects to the VPN without user intervention. + +With always-on VPN, Windows 10 Mobile can automatically start a VPN connection when a user signs-in, as well. The VPN stays connected until the user manually disconnects it. + +MDM support for VPN connections in Windows 10 Mobile includes provisioning and updating VPN connection profiles and associating VPN connections with apps. You can create and provision VPN connection profiles, and then deploy them to managed devices that run Windows 10 Mobile. Table 13 lists the Windows 10 Mobile fields for VPN connection profiles. + +Table 13. Windows 10 Mobile VPN connection profile settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
Native VPN protocol profile

The configuration information when the VPN uses native Windows 10 Mobile VPN protocols (such as IKEv2, PPTP, or L2TP); includes the following settings:

+
    +
  • Servers. The VPN server for the VPN profile

  • +
  • Routing policy type. The type of routing policy the VPN profile uses; can be set to one of the following values:

    +
      +
    • Split tunnel. Only network traffic destined to the intranet goes through the VPN connection.

    • +
    • Force tunnel. All traffic goes through the VPN connection.

    • +
  • +
  • Tunneling protocol type. The tunneling protocol used for VPN profiles that use native Windows 10 Mobile VPN protocols; can be one the following values:

    +
      +
    • PPTP

    • +
    • L2TP

    • +
    • IKEv2

    • +
    • Automatic

    • +
  • +
  • User authentication method. The user authentication method for the VPN connection; can have a value of EAP or MSChapv2. Windows 10 Mobile does not support the value MSChapv2 for IKEv2-based VPN connections.

  • +
  • Machine certificate. The machine certificate used for IKEv2-based VPN connections.

  • +
  • EAP configuration. An HTML-encoded XML blob of the EAP configuration. For more information about creating the EAP configuration XML blob, see [EAP configuration](http://go.microsoft.com/fwlink/p/?LinkId=734055). You can use the XML blob these steps create in the MDM system to create the VPN profile.

  • +
VPN plugin profileWindows Store–based VPN plug-ins for the VPN connection; includes the following settings: +
    +
  • VPN servers. A comma-separated list of VPN servers; you can specify the servers with a URL, fully qualified host name, or IP address.

  • +
  • Custom configuration. An HTML-encoded XML blob for SSL–VPN plug-in–specific configuration information (e.g., authentication information) that the plug-in provider requires.

  • +
  • Windows Store VPN plugin family name. Specifies the Windows Store package family name for the Windows Store–based VPN plug-in.

  • +
Always on connectionWhether the VPN connects at user sign-in and stays connected until the user manually disconnects the VPN connection.
App trigger listA list of apps that automatically initiate the VPN connection. Each app trigger in the list includes the following settings: +
    +
  • App ID. The app identity for the app that automatically initiates the VPN connection Any apps in this list can send data through the VPN connection; set it to one of the following values:

    +
      +
    • Unique name of the Windows Store app (Package Family Name). The package family name is a unique name for each app. For example, the package family name for the Skype app is Microsoft.SkypeApp_kzf8qxf38zg5c.

    • +
    • Fully qualified path to the app (such as C:\Windows\System\Notepad.exe).

    • +
    • Kernel driver name.

    • +
  • +
DNS suffixesA comma-separated list of DNS suffixes for the VPN connection. Any DNS suffixes in this list are automatically added to Suffix Search List.
LockDown VPN profileWhether this VPN connection is a LockDown profile. A LockDown VPN profile has the following characteristics: +
    +
  • It is an always-on VPN profile.

  • +
  • It can never be disconnected.

  • +
  • If the VPN profile is not connected, the user has no network connectivity.

  • +
  • No other VPN profiles can be connected or modified.

  • +
+

You must delete a LockDown VPN profile before you can add, remove, or connect other VPN profiles.

Name Resolution Policy Table rulesA list of Name Resolution Policy Table rules for the VPN connection. Each rule in the list includes the following settings: +
    +
  • Domain name. The namespace for the policy; can be an FQDN or a domain suffix.

  • +
  • Domain name type. The type of namespace in Domain name; has a value of either FQDN or Suffix.

  • +
  • DNS servers. A comma-separated list of DNS server IP addresses to use for the namespace specified in Domain name.

  • +
  • Web proxy servers. The IP address for the web proxy server (if the intranet redirects traffic through a web proxy server).

  • +
ProxyAny post connection proxy support required for the VPN connection; includes the following settings: +
    +
  • Proxy server. Specifies the fully qualified host name or IP address of the proxy server when a specific proxy server is required.

  • +
  • Automatic proxy configuration URL. Specifies the URL for automatically retrieving proxy server settings.

  • +
Remember credentialsWhether the VPN connection caches credentials.
Route listA list of routes to add to the routing table for the VPN connection. Each route in the list includes the following settings: +
    +
  • Address. The destination subnet address in IPv4 or IPv6 format (such as 192.168.0.0).

  • +
  • Prefix size. The portion of the address used to identify the destination subnet address (such as 16 to produce the subnet 192.168.0.0/16).

  • +
Traffic filter listA list of traffic rules that define the traffic that can be sent through the VPN connection. Each rule in the list includes the following settings: +
    +
  • App ID. The app identity for the traffic filter based on a specific app (app-based traffic filter). Any apps in this list can send data through the VPN connection; set to one of the following values:

    +
      +
    • Unique name of the Windows Store app (Package Family Name). The package family name is a unique name for each app. For example, the package family name for the Skype app is Microsoft.SkypeApp_kzf8qxf38zg5c.

    • +
    • Fully qualified path to the app (such as C:\Windows\System\Notepad.exe).

    • +
    • Kernel driver name.

    • +
  • +
  • Protocol. The IP protocol to use for the traffic filter rule (for example, TCP = 6, UDP = 17).

  • +
  • Local port ranges. Specifies a comma-separated list of local IP port ranges (for example, 100–180, 200, 300–350).

  • +
  • Remote port ranges. A comma-separated list of remote IP port ranges (for example, 100–180, 200, 300–350).

  • +
  • Local address ranges. A comma-separated list of local IP address ranges that are allowed to use the VPN connection (for example, 192.168.0.1–192.168.0.255, 172.16.10.0–172.16.10.255).

  • +
  • Remote address ranges. A comma-separated list of remote IP address ranges that are allowed to use the VPN connection (for example, 192.168.0.1–192.168.0.255, 172.16.10.0–172.16.10.255).

  • +
  • Routing policy type. The type of IP tunnel for the VPN connection; set to one of the following:

    +
      +
    • Split tunnel. Only traffic destined for the intranet is sent through the VPN connection.

    • +
    • Force tunnel. All traffic is sent through the VPN connection.

    • +
  • +
Trusted network detectionA comma-separated list of trusted networks that causes the VPN not to connect when the intranet is directly accessible.
+ +  + +Table 14 lists the Windows 10 Mobile settings for managing VPN connections. These settings help you manage VPNs over cellular data connections, which in turn help reduce costs associated with roaming or data plan charges. + +Table 14. Windows 10 Mobile VPN management settings + +| Setting | Description | +|--------------------------------------|---------------------------------------------------------------------------------| +| Allow VPN | Whether users can change VPN settings | +| Allow VPN Over Cellular | Whether users can establish VPN connections over cellular networks | +| Allow VPN Over Cellular when Roaming | Whether users can establish VPN connections over cellular networks when roaming | + +  + +### APN profiles + +An APN defines network paths for cellular data connectivity. Typically, you define just one APN for a device in collaboration with a mobile operator, but you can define multiple APNs if your company uses multiple mobile operators. + +An APN provides a private connection to the corporate network that is unavailable to other companies on the mobile operator network. Corporations in Europe and the Asia-Pacific use APNs, but they are not common in the United States. + +You can define and deploy APN profiles in MDM systems that configure cellular data connectivity for Windows 10 Mobile. Devices running Windows 10 Mobile can have only one APN profile. Table 15 lists the MDM settings that Windows 10 Mobile supports for APN profiles. + +Table 15. Windows 10 Mobile APN profile settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
APN nameThe APN name
IP connection typeThe IP connection type; set to one of the following values: +
    +
  • IPv4 only

  • +
  • IPv6 only

  • +
  • IPv4 and IPv6 concurrently

  • +
  • IPv6 with IPv4 provided by 46xlat

  • +
LTE attachedWhether the APN should be attached as part of an LTE Attach
APN class IDThe globally unique identifier that defines the APN class to the modem
APN authentication typeThe APN authentication type; set to one of the following values: +
    +
  • None

  • +
  • Auto

  • +
  • PAP

  • +
  • CHAP

  • +
  • MSCHAPv2

  • +
User nameThe user account when users select Password Authentication Protocol (PAP), CHAP, or MSCHAPv2 authentication in APN authentication type
PasswordThe password for the user account specified in User name
Integrated circuit card IDThe integrated circuit card ID associated with the cellular connection profile
+ +  + +### Data leak protection + +Some user experiences can risk corporate data stored on corporate devices. For example, allowing users to copy and paste information out of the organization’s LOB app can put data at risk. To mitigate the risk, you can restrict the Windows 10 Mobile user experience to help protect corporate data and prevent data leaks. For example, you can prevent settings synchronization, copy-and-paste operations, and screen captures. Table 16 lists the MDM settings in Windows 10 Mobile that you can use to help prevent data leaks. + +Table 16. Windows 10 Mobile data leak protection settings + +| Setting | Description | +|----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Allow copy and paste | Whether users can copy and paste content | +| Allow Cortana | Whether users can use Cortana on the device, where available | +| Allow device discovery | Whether the device discovery user experience is available on the lock screen (For example, this setting can control whether a device could discover a projector \[or other devices\] when the lock screen is displayed.) | +| Allow input personalization | Whether personally identifiable information can leave the device or be saved locally (for example, Cortana learning, inking, dictation) | +| Allow manual MDM unenrollment | Whether users are allowed to delete the workplace account (in other words, unenroll the device from the MDM system) | +| Allow screen capture | Whether users are allowed to capture screenshots on the device | +| Allow SIM error dialog prompt | Specifies whether to display a dialog prompt when no SIM card is installed | +| Allow sync my settings | Whether the user experience settings are synchronized between devices (works with Microsoft accounts only) | +| Allow toasts notifications above lock screen | Whether users are able to view toast notification on the device lock screen | +| Allow voice recording | Whether users are allowed to perform voice recordings. | + +  + +### Storage management + +Protecting the apps and data stored on a device is critical to device security. One method for helping protect your apps and data is to encrypt internal device storage by using the device encryption in Windows 10 Mobile. This encryption helps protect corporate data against unauthorized access, even when an unauthorized user has physical possession of the device. + +A feature in Windows 10 Mobile is the ability to install apps on a secure digital (SD) card. The operating system stores apps on a partition specifically designated for that purpose. This feature is always on, so you don’t need to set a policy explicitly to enable it. + +The SD card is uniquely paired with a device. No other devices can see the apps or data on the encrypted partition, but they can access the data stored on the unencrypted partition of the SD card, such as music or photos. + +You can disable the **Allow Storage Card** setting to prevent users from using SD cards altogether, but the primary advantage of the SD card app partition–encryption feature is that organizations can give users the flexibility to use an SD card while still protecting the confidential apps and data on it. + +If you don’t encrypt storage, you can help protect your corporate apps and data by using the **Restrict app data to the system volume** and **Restrict apps to the system volume** settings. They help ensure that users cannot copy your apps and data to SD cards. + +Table 17 lists the MDM storage-management settings that Windows 10 Mobile provides. + +Table 17. Windows 10 Mobile storage management settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
Allow Storage CardWhether users can use storage cards for device storage (This setting does not prevent programmatic access to the storage cards.)
Require Device EncryptionWhether internal storage is encrypted (When a device is encrypted, you cannot use a policy to turn encryption off.)
Encryption methodSpecifies the BitLocker drive encryption method and cipher strength; can be one of the following values: +
    +
  • AES-Cipher Block Chaining (CBC) 128-bit

  • +
  • AES-CBC 256-bit

  • +
  • XEX-based tweaked-codebook mode with cipher text stealing (XTS)–AES (XTS-AES) 128-bit (this is the default)

  • +
  • XTS-AES-256-bit

  • +
Allow Federal Information Processing Standard (FIPS) algorithm policyWhether the device allows or disallows the FIPS algorithm policy
SSL cipher suitesSpecifies a list of the allowed cryptographic cipher algorithms for SSL connections
Restrict app data to the system volumeSpecifies whether app data is restricted to the system drive
Restrict apps to the system volumeSpecifies whether apps are restricted to the system drive
+ +  + +## App management + + +Apps help improve user productivity on mobile devices. New to Windows 10 is the ability for organizations purchase apps from Windows Store for their employees and deploy those apps from Windows Store or an MDM system. App management is becoming a key capability of MDM systems, helping reduce the effort required to perform common app-related tasks, such as distributing apps, and protecting data through app policies. This section describes the app management features in Windows 10 Mobile and includes the following topics: + +- [Universal Windows Platform (UWP)](#UWP) + +- [Sourcing the right app](#sourcing) + +- [Windows Store for Business](#store) + +- [Mobile application management (MAM) policies](#MAM) + +- [Microsoft Edge](#edge) + +### Universal Windows Platform + +Windows 10 introduces UWP, converging the application platform for all devices running some edition of Windows 10. UWP apps run without modification on all editions of Windows 10, and Windows Store now has apps that you can license and purchased for all your Windows 10 devices. Windows Phone 8.1 and Windows 8.1 apps still run on Windows 10 devices, but the MAM improvements in Windows 10 work only with UWP apps. See the [Guide to Universal Windows Platform (UWP) apps](http://go.microsoft.com/fwlink/p/?LinkId=734056) for additional information. + +### Sourcing the right app + +The first step in app management is to obtain the apps your users need, and you can now acquire apps from Windows Store. Developers can also create apps specific to an organization, known as *line-of-business (LOB) apps* (the developers of these apps are *LOB publishers*). An LOB developer (internal or external) can now publish these apps to Windows Store at your request, or you can obtain the app packages offline and distribute them through your MDM system. + +To install Windows Store or LOB apps, use the Windows Store cloud service or your MDM system to distribute the app packages. Your MDM system can deploy apps online by redirecting the user to a licensed app in Windows Store or offline by distributing a package that you downloaded from Windows Store (also called *sideloading*) on Windows 10 Mobile devices. You can fully automate the app deployment process so that no user intervention is required. + +IT administrators can obtain apps through Store for Business. Most apps can be distributed online, meaning that the user must be logged in to the device with an Azure AD account and have Internet access at the time of installation. To distribute an app offline, the developer must opt in. If the app developer doesn’t allow download of the app from Windows Store, then you must obtain the files directly from the developer or use the online method. See [Windows Store for Business](windows-store-for-business.md) for additional information about apps obtained through Store for Business. + +Windows Store apps are automatically trusted. For custom LOB apps developed internally or by a trusted software vendor, ensure that the device trusts the app signing certificate. There are two ways to establish this trust: use a signing certificate from a trusted source, or generate your own signing certificate and add your chain of trust to the trusted certificates on the device. You can install up to 20 self-signed apps on a Windows 10 Mobile device. When you purchase a signing certificate from a public CA, you can install more than 20 apps on a device, although you can install more than 20 self-signed apps per device with [Windows 10 Mobile Enterprise](#mobile_edition). + +Users can install apps from Windows Store that the organization purchases through the Store app on their device. If you allow your users to log in with a Microsoft account, the Store app on the device provides a unified method for installing personal and corporate apps. + +### Store for Business + +[Windows Store for Business](http://go.microsoft.com/fwlink/p/?LinkId=722910) is a web portal that IT pros and purchasers use to find, acquire, manage, and distribute apps to Windows 10 devices. This online portal gives Azure AD authenticated managers access to Store for Business functionality and settings. Store managers can create a private section of Windows Store in which organizations can manage apps specific and private to them. Store for Business allows organizations to make apps available to their users and purchase app licenses for them. They can also integrate their Store for Business subscriptions with their MDM systems, so the MDM system can deploy apps from their free Store for Business subscription. + +The process for using Store for Business is as follows: + +1. Create a Store for Business subscription for your organization. + +2. In the Store for Business portal, acquire apps from Windows Store (only free apps are available at this time). + +3. In Store for Business, distribute apps to users, and manage the app licenses for the apps acquired in the previous step. + +4. Integrate your MDM system with your organization’s Store for Business subscription. + +5. Use your MDM system to deploy the apps. + +For more information about Store for Business, see [Windows Store for Business](windows-store-for-business.md). + +### Mobile application management (MAM) policies + +With MDM, you can manage Device Guard on Windows 10 Mobile and create an allow (whitelist) or deny (blacklist) list of apps. This capability extends to built-in apps, as well, such as phone, text messaging, email, and calendar. The ability to allow or deny apps helps to ensure that people use their mobile devices for their intended purposes. + +You can also control users’ access to Windows Store and whether the Store service updates apps automatically. You can manage all these capabilities through your MDM system. Table 18 lists the Windows 10 Mobile app management settings. + +Table 18. Windows 10 Mobile app management settings + +| Setting | Description | +|------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Allow All Trusted Apps | Whether users can sideload apps on the device | +| Allow App Store Auto Update | Whether automatic updates of apps from Windows Store are allowed | +| Allow Developer Unlock | Whether developer unlock is allowed | +| Allow Shared User App Data | Whether multiple users of the same app can share data | +| Allow Store | Whether Windows Store app is allowed to run | +| Allow Windows Bridge For Android App Execution | Whether the Windows Bridge for Android app is allowed to run | +| Application Restrictions | An XML blob that defines the app restrictions for a device (The XML blob can contain an app allow or deny list. You can allow or deny apps based on their app ID or publisher.) | +| Require Private Store Only | Whether the private store is exclusively available to users (If enabled, only the private store is available. If disabled, the retail catalog and private store are both available.) | +| Restrict App Data To System Volume | Whether app data is allowed only on the system drive | +| Restrict App To System Volume | Whether app installation is allowed only to the system drive | +| Start screen layout | An XML blob used to configure the Start screen (See [Start layout for Windows 10 Mobile editions](http://go.microsoft.com/fwlink/p/?LinkId=734057) for more information.) | + +  + +One potential security issue is that users can register as Windows 10 Mobile app developers and turn on developer features on their device, potentially installing apps from unknown sources and opening the device to malware threats. To prevent users from turning on developer features on their devices, set the **Disable development unlock (side loading)** policy, which you can configure through your MDM system. + +### Microsoft Edge + +MDM systems give you the ability to manage Microsoft Edge on mobile devices. Table 19 lists the Microsoft Edge settings for Windows 10 Mobile. + +Table 19. Microsoft Edge settings for Windows 10 Mobile + +| Setting | Description | +|-------------------------------------------------|-------------------------------------------------------------------------------------------------------| +| Allow Active Scripting | Whether active scripting is allowed | +| Allow Autofill | Whether values are automatically filled on websites | +| Allow Browser | Whether Internet Explorer is allowed on the device | +| Allow Cookies | Whether cookies are allowed | +| Allow Do Not Track headers | Whether Do Not Track headers are allowed | +| Allow InPrivate | Whether users can use InPrivate browsing | +| Allow Password Manager | Whether users can use Password Manager to save and manage passwords locally | +| Allow Search Suggestions in Address Bar | Whether search suggestions are shown in the address bar | +| Allow SmartScreen | Whether SmartScreen Filter is enabled | +| First Run URL | The URL to open when a user launches Microsoft Edge for the first time | +| Include Sites Bypassing Proxy In Intranet Sites | Whether websites that bypass the proxy server are able to use the Intranet security zone | +| Include UNC Paths In Intranet Sites | Whether URL paths can represent Universal Naming Convention (UNC) paths in the Intranet security zone | +| Intranet Sites | A list of the websites that are in the Intranet security zone | +| Prevent Smart Screen Prompt Override For Files | Whether users can override the SmartScreen Filter warnings about downloading unverified files | + +  + +## Device operations + + +In this section, you learn how MDM settings in Windows 10 Mobile enable the following scenarios: + +- [Device update](#device_update) + +- [Device compliance monitoring](#device_comp) + +- [Device inventory](#data_inv) + +- [Remote assistance](#remote_assist) + +- [Cloud services](#cloud_serv) + +### Device update + +To help protect mobile devices and their data, you must keep those devices updated. Windows Update automatically installs updates and upgrades when they become available. + +The device update features described in this section are available only in [Windows 10 Mobile Enterprise](#mobile_edition). You can use your MDM system to postpone system upgrades when you activate an Enterprise license on managed Windows 10 Mobile devices and control how updates and upgrades are applied. For example, you can disable updates altogether, defer updates and upgrades, and schedule the day and time to install updates, as you would with Windows Server Update Services (WSUS) on Windows 10 desktops running the [Current Branch for Business](introduction-to-windows-10-servicing.md). Table 20 lists the Windows 10 Mobile Enterprise settings that you can use to configure updates and upgrades. + +Table 20. Windows 10 Mobile Enterprise update management settings + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
Allow automatic updateThe automatic update behavior for scanning, downloading, and installing updates; the behavior can be one of the following: +
    +
  • Notify users prior to downloading updates.

  • +
  • Automatically install updates, and then notify users to schedule a restart (this is the default behavior).

  • +
  • Automatically install and restart devices with user notification.

  • +
  • Automatically install and restart devices at a specified time.

  • +
  • Automatically install and restart devices without user interaction.

  • +
  • Turn off automatic updates.

  • +
Allow non Microsoft signed updateWhether automatic updates will accept updates that entities other than Microsoft have signed
Allow update serviceWhether devices can obtain updates from Windows Update, WSUS, or Windows Store
Monthly security updates deferredWhether monthly updates (for example, security patches) are deferred (You can defer updates up to 4 weeks.)
Nonsecurity upgrades deferredWhether nonsecurity upgrades are deferred (You can defer upgrades up to 8 months.)
Pause update deferralsWhether the device should skip an update cycle (This setting is valid only when you configure devices to defer updates or upgrades.)
Require update approvalWhether approval is required before updates can be installed on devices (If approval is required, any updates that have an End User License Agreement [EULA] are automatically accepted on the user’s behalf.)
Schedule install timeThe scheduled time at which updates are installed
Scheduled install dayThe schedule of days on which updates are installed
Update deferral periodHow long updates should be deferred
Update service URLThe name of a WSUS server from which to download updates instead of Windows Update
Upgrade deferral periodHow long Windows 10 Mobile upgrades should be deferred
+ +  + +In addition to configuring how Windows 10 Mobile Enterprise obtains updates, you can manage individual Windows 10 Mobile updates. Table 21 provides information about approved updates to help you control the rollout of new updates to Windows 10 Mobile Enterprise devices. + +Table 21. Windows 10 Mobile Enterprise approved update information + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingDescription
Approved updatesA list of approved updates. Each update in the list includes the Approved Time setting, which specifies the update approval time. Any approved updates automatically accept EULAs on behalf of users.
Failed updatesA list of updates that failed during installation. Each update in the list includes the following settings: +
    +
  • H Result. The update failure code

  • +
  • Status. The failed update state (for example, download, install)

  • +
Installed updatesA list of updates that are installed on the device.
Installable updatesA list of updates that are available for installation. Each update in the list includes the following settings: +
    +
  • Type. The type of update available for installation, set to one of the following values:

    +
      +
    • 0 (no type)

    • +
    • 1 (security)

    • +
    • 2 (critical)

    • +
  • +
  • Revision Number. The revision number for the update used to get metadata for the update during synchronization.

  • +
Pending reboot updatesA list of updates that require a restart to complete update installation. Each update in the last has the Installed Time setting enabled, which specifies installation time for the update.
Last successful scan timeThe last time a successful update scan was completed.
Defer upgradeWhether the upgrade is deferred until the next update cycle.
+ +  + +### Device compliance monitoring + +You can use your MDM system to monitor compliance. Windows 10 Mobile provides audit information to track issues or perform remedial actions. This information helps you ensure that devices are configured to comply with organizational standards. + +You can also assess the health of devices that run Windows 10 Mobile and take enterprise policy actions. The process that the health attestation feature in Windows 10 Mobile uses is as follows: + +1. The health attestation client collects data used to verify device health. + +2. The client forwards the data to the Health Attestation Service (HAS). + +3. The HAS generates a Health Attestation Certificate. + +4. The client forwards the Health Attestation Certificate and related information to the MDM system for verification. + +For more information about health attestation in Windows 10 Mobile, see the [Windows 10 Mobile security guide](../keep-secure/windows-10-mobile-security-guide.md). + +Depending on the results of the health state validation, an MDM system can take one of the following actions: + +- Allow the device to access resources. + +- Allow the device to access resources but identify the device for further investigation. + +- Prevent the device from accessing resources. + +Table 21 lists data points that the HAS collects and evaluates from devices that run Windows 10 Mobile to determine the action to perform. For most of these data points, the MDM system can take one of the following actions: + +- Disallow all access. + +- Disallow access to high-business-impact assets. + +- Allow conditional access based on other data points that are present at evaluation time—for example, other attributes on the health certificate or a device’s past activities and trust history. + +- Take one of the previous actions, and also place the device on a watch list to monitor it more closely for potential risks. + +- Take corrective action, such as informing IT administrators to contact the owner and investigate the issue. + +Table 21. Windows 10 Mobile HAS data points + +| Data point | Description | +|----------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Attestation Identity Key (AIK) present | Indicates that an AIK is present (in other words, the device can be trusted more than a device without an AIK). | +| Data Execution Prevention (DEP) enabled | Whether a DEP policy is enabled for the device, indicating that the device can be trusted more than a device without a DEP policy. | +| BitLocker status | BitLocker helps protect the storage on the device. A device with BitLocker can be trusted more than a device without BitLocker. | +| Secure Boot enabled | Whether Secure Boot is enabled on the device. A device with Secure Boot enabled can be trusted more than a device without Secure Boot. Secure Boot is always enabled on Windows 10 Mobile devices. | +| Code integrity enabled | Whether the code integrity of a drive or system file is validated each time it’s loaded into memory. A device with code integrity enabled can be trusted more than a device without code integrity. | +| Safe mode | Whether Windows is running in safe mode. A device that is running Windows in safe mode isn’t as trustworthy as a device running in standard mode. | +| Running Windows Preinstallation Environment (Windows PE) | Whether the device is running Windows PE. A device running Windows PE isn’t as secure as a device running Windows 10 Mobile. | +| Boot debug enabled | Whether the device has boot debug enabled. A device that has boot debug enabled is less secure (trusted) than a device without boot debug enabled. | +| OS kernel debugging enabled | Whether the device has operating system kernel debugging enabled. A device that has operating system kernel debugging enabled is less secure (trusted) than a device with operating system kernel debugging disabled. | +| Test signing enabled | Whether test signing is disabled. A device that has test signing disabled is more trustworthy than a device that has test signing enabled. | +| Boot Manager Version | The version of the Boot Manager running on the device. The HAS can check this version to determine whether the most current Boot Manager is running, which is more secure (trusted). | +| Code integrity version | Specifies the version of code that is performing integrity checks during the boot sequence. The HAS can check this version to determine whether the most current version of code is running, which is more secure (trusted). | +| Secure Boot Configuration Policy (SBCP) present | Whether the hash of the custom SBCP is present. A device with an SBCP hash present is more trustworthy than a device without an SBCP hash. | +| Boot cycle whitelist | The view of the host platform between boot cycles as defined by the manufacturer compared to a published whitelist. A device that complies with the whitelist is more trustworthy (secure) than a device that is noncompliant. | + +  + +### Device inventory + +Device inventory helps organizations better manage devices because it provides in-depth information about those devices. MDM systems collect inventory information remotely, and you can use the system’s reporting capabilities to analyze device resources and information. With this information, you can determine the current hardware and software resources of the device (for example, installed updates). + +Table 22 lists examples of the Windows 10 Mobile software and hardware information that a device inventory provides. In addition to this information, the MDM system can read any of the configuration settings described in this guide. + +Table 22. Windows 10 Mobile software and hardware inventory examples + +| Setting | Description | +|----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Installed enterprise apps | List of the enterprise apps installed on the device | +| Device name | The device name configured for the device | +| Firmware version | Version of firmware installed on the device | +| Operating system version | Version of the operating system installed on the device | +| Device local time | Local time on the device | +| Processor type | Processor type for the device | +| Device model | Model of the device as defined by the manufacturer | +| Device manufacturer | Manufacturer of the device | +| Device processor architecture | Processor architecture for the device | +| Device language | Language in use on the device | +| Phone number | Phone number assigned to the device | +| Roaming status | Indicates whether the device has a roaming cellular connection | +| International mobile equipment identity (IMEI) and international mobile subscriber identity (IMSI) | Unique identifiers for the cellular connection for the phone; Global System for Mobile Communications networks identify valid devices by using the IMEI, and all cellular networks use the IMSI to identify the device and user | +| Wi-Fi IP address | IPv4 and IPv6 addresses currently assigned to the Wi-Fi adapter in the device | +| Wi-Fi media access control (MAC) address | MAC address assigned to the Wi-Fi adapter in the device | +| Wi-Fi DNS suffix and subnet mask | DNS suffix and IP subnet mask assigned to the Wi-Fi adapter in the device | +| Secure Boot state | Indicates whether Secure Boot is enabled | +| Enterprise encryption policy compliance | Indicates whether the device is encrypted | + +  + +### Remote assistance + +The remote assistance features in Windows 10 Mobile help resolve issues that users might encounter even when the help desk does not have physical access to the device. These features include: + +- **Remote lock.** Support personnel can remotely lock a device. This ability can help when a user loses his or her mobile device and can retrieve it but not immediately (for example, leaving the device at a customer site). + +- **Remote PIN reset.** Support personnel can remotely reset the PIN, which helps when users forget their PIN and are unable to access their device. No corporate or user data is lost, and users are able to gain access to their devices quickly. + +- **Remote ring.** Support personnel can remotely make devices ring. This ability can help users locate misplaced devices and, in conjunction with the Remote Lock feature, help ensure that unauthorized users are unable to access the device if they find it. + +- **Remote find.** Support personnel can remotely locate a device on a map, which helps identify the geographic location of the device. To configure Windows 10 Mobile remote find, use the settings in Table 23. The remote find feature returns the most current latitude, longitude, and altitude of the device. + +These remote management features help organizations reduce the IT effort required to manage devices. They also help users quickly regain use of their device should they misplace it or forget the device password. + +Table 23. Windows 10 Mobile remote find settings + +| Setting | Description | +|---------------------------|---------------------------------------------------------------------------------------------------------------------------------| +| Desired location accuracy | The desired accuracy as a radius value in meters; has a value between 1 and 1,000 meters | +| Maximum remote find | Maximum length of time in minutes that the server will accept a successful remote find; has a value between 0 and 1,000 minutes | +| Remote find timeout | The number of seconds devices should wait for a remote find to finish; has a value between 0 and 1,800 seconds | + +  + +### Cloud services + +On mobile devices that run Windows 10 Mobile, users can easily connect to apps and data. As a result, they frequently connect to cloud services that provide user notifications and collect telemetry (usage data). Windows 10 Mobile enables organizations to manage how devices consume these cloud services. + +**Manage push notifications** + +The Windows Push Notification Services enable software developers to send toast, tile, badge, and raw updates from their cloud services. It provides a mechanism to deliver updates to users in a power-efficient and dependable way. + +Push notifications can affect battery life, however, so the battery saver in Windows 10 Mobile limits background activity on the devices to extend battery life. Users can configure battery saver to turn on automatically when the battery drops below a set threshold. When battery saver is on, Windows 10 Mobile disables the receipt of push notifications to save energy. + +There is an exception to this behavior, however. In Windows 10 Mobile, the **Always allowed** battery saver settings (found in the Settings app) allow apps to receive push notifications even when battery saver is on. Users can manually configure this list, or you can use the MDM system to configure it—that is, you can use the battery saver settings URI scheme in Windows 10 Mobile (**ms-settings:batterysaver-settings**) to configure these settings. + +For more information about push notifications, see [Windows Push Notification Services (WNS) overview](http://go.microsoft.com/fwlink/p/?LinkId=734060). + +**Manage telemetry** + +As people use Windows 10 Mobile, it can collect performance and usage telemetry that helps Microsoft identify and troubleshoot problems as well as improve its products and services. Microsoft recommends that you select **Full** for this setting. + +Microsoft employees, contractors, vendors, and partners might have access to relevant portions of the information that Windows 10 Mobile collects, but they are permitted to use the information only to repair or improve Microsoft products and services or third-party software and hardware designed for use with Microsoft products and services. + +You can control the level of data that MDM systems collect. Table 24 lists the data levels that Windows 10 Mobile collects and provides a brief description of each. To configure devices, specify one of these levels in the **Allow Telemetry** setting. + +Table 24. Windows 10 Mobile data collection levels + +| Level of data | Description | +|---------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Security | Collects only the information required to keep Windows 10 Mobile enterprise-grade secure, including information about telemetry client settings, the Malicious Software Removal Tool, and Windows Defender. This level is available only on Windows 10 Enterprise, Windows 10 Education, and Windows 10 IoT Core. For Windows 10 Mobile, this setting disables Windows 10 Mobile telemetry. | +| Basic | Provides only the data vital to the operation of Windows 10 Mobile. This data level helps keep Windows 10 Mobile and apps running properly by letting Microsoft know the device’s capabilities, what’s installed, and whether Windows is operating correctly. This option also turns on basic error reporting back to Microsoft. By selecting this option, you allow Microsoft to provide updates through Windows Update, including malicious software protection through the Malicious Software Removal Tool. | +| Enhanced | Includes all Basic data plus data about how users use Windows 10 Mobile, such as how frequently or how long they use certain features or apps and which apps they use most often. This option also lets operating system collect enhanced diagnostic information, such as the memory state of a device when a system or app crash occurs, and measure reliability of devices, the operating system, and apps. | +| Full | Includes all Basic and Enhanced data and also turns on advanced diagnostic features that collect additional data from devices, such as system files or memory snapshots, which may unintentionally include parts of documents user are working on when a problem occurred. This information helps Microsoft further troubleshoot and fix problems. If an error report contains personal data, Microsoft does not use that information to identify, contact, or target advertising to users. | + +  + +## Device retirement + + +Device retirement (unenrollment) is the last phase of the device life cycle. Historically, mobile device retirement has been a complex and difficult process for organizations. When the organization no longer needs devices, it must remove (wipe) corporate data from them. BYOD scenarios make retirement even more complex because users expect their personal apps and data to remain untouched. Therefore, organizations must remove their data without affecting users’ data. + +You can remotely remove all corporate data from devices that run Windows 10 Mobile without affecting existing user data (partial or enterprise wipe). The help desk or the devices’ users can initiate device retirement. When retirement is complete, Windows 10 Mobile returns the devices to a consumer state, as they were before enrollment. The following list summarizes the corporate data removed from a device when it’s retired: + +- Email accounts + +- Enterprise-issued certificates + +- Network profiles + +- Enterprise-deployed apps + +- Any data associated with the enterprise-deployed apps + +**Note**   +All these features are in addition to the device’s software and hardware factory reset features, which users can use to restore devices to their factory configuration. + +  + +To specify whether users can delete the workplace account in Control Panel and unenroll from the MDM system, enable the **Allow Manual MDM Unenrollment** setting. Table 25 lists additional Windows 10 remote wipe settings that you can use the MDM system to configure. + +Table 25. Windows 10 Mobile remote wipe settings + +| Setting | Description | +|-------------------------------|----------------------------------------------------------------------------------------------------------------------| +| Wipe | Specifies that a remote wipe of the device should be performed | +| Allow manual MDM unenrollment | Whether users are allowed to delete the workplace account (in other words, unenroll the device from the MDM system) | +| Allow user to reset phone | Whether users are allowed to use Control Panel or hardware key combinations to return the device to factory defaults | + +  + +## Related topics + + +[Mobile device management](http://go.microsoft.com/fwlink/p/?LinkId=734050) + +[Enterprise Mobility Suite](http://go.microsoft.com/fwlink/p/?LinkId=723984) + +[Overview of Mobile Device Management for Office 365](http://go.microsoft.com/fwlink/p/?LinkId=734052) + +[Windows Store for Business](http://go.microsoft.com/fwlink/p/?LinkId=722910) + +  + +  + + + + + diff --git a/windows/manage/windows-10-start-layout-options-and-policies.md b/windows/manage/windows-10-start-layout-options-and-policies.md new file mode 100644 index 0000000000..245bf282ea --- /dev/null +++ b/windows/manage/windows-10-start-layout-options-and-policies.md @@ -0,0 +1,145 @@ +--- +title: Manage Windows 10 Start layout options (Windows 10) +description: Organizations might want to deploy a customized Start screen and menu to devices running Windows 10 Enterprise or Windows 10 Education. +ms.assetid: 2E94743B-6A49-463C-9448-B7DD19D9CD6A +keywords: ["start screen", "start menu"] +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Manage Windows 10 Start layout options + + +**Applies to** + +- Windows 10 + +**Looking for consumer information?** + +- [Customize the Start menu](http://go.microsoft.com/fwlink/p/?LinkId=623630) + +Organizations might want to deploy a customized Start screen and menu to devices running Windows 10 Enterprise or Windows 10 Education. A standard Start layout can be useful on devices that are common to multiple users and devices that are locked down for specialized purposes. + +![start layout sections](images/startannotated.png) + +Some areas of Start can be managed using Group Policy. The layout of Start tiles can be managed using either Group Policy or Mobile Device Management (MDM) policy. + +The following table lists the different parts of Start and any applicable policy settings or Settings options. Group Policy settings are in the **User Configuration**\\**Administrative Templates**\\**Start Menu and Taskbar** path except where a different path is listed in the table. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
StartPolicySetting
User tileGroup Policy: Remove Logoff on the Start menu
Most usedGroup Policy: Remove frequent programs from the Start menuSettings > Personalization > Start > Show most used apps

Suggestions

+

-and-

+

Dynamically inserted app tile

MDM: Allow Windows Consumer Features

+

Group Policy: Computer Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off Microsoft consumer experiences

+
+Note   +

This policy also enables or disables notifications for a user's Microsoft account and app tiles from Microsoft dynamically inserted in the default Start menu.

+
+
+  +
Settings > Personalization > Start > Occasionally show suggestions in Start
Recently addedSettings > Personalization > Start > Show recently added apps
Pinned foldersSettings > Personalization > Start > Choose which folders appear on Start
PowerGroup Policy: Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commandsNone
All appsGroup Policy: Remove All Programs list from the Start menuNone
Start layout

MDM: Start layout

+

Group Policy: Start layout

+

Group Policy: Prevent users from customizing their Start Screen

+
+Warning   +

Start layout can only be applied to a device using the same architecture (32-bit or 64-bit) as the device on which Start layout was created. When a Start screen layout is imported with Group Policy or MDM, the users cannot pin, unpin, or uninstall apps from the Start screen. Users can view and open all apps in the All Apps view, but they cannot pin any apps to the Start screen.

+
+
+  +
None
Jump listsGroup Policy: Do not keep history of recently opened documentsSettings > Personalization > Start > Show recently opened items in Jump Lists on Start or the taskbar
Start size

MDM: Force Start size

+

Group Policy: Force Start to be either full screen size or menu size

Settings > Personalization > Start > Use Start full screen
All SettingsGroup Policy: Prevent changes to Taskbar and Start Menu SettingsNone
+ +  + +## Related topics + + +[Customize and export Start layout](customize-and-export-start-layout.md) + +[Customize Windows 10 Start with Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) + +[Customize Windows 10 Start with mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management--mdm-.md) + +[Customize Windows 10 Start with ICD and provisioning packages](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) + +[Changes to Group Policy settings for Windows 10 Start](changes-to-start-policies-in-windows-10.md) + +  + +  + + + + + diff --git a/windows/manage/windows-store-for-business.md b/windows/manage/windows-store-for-business.md new file mode 100644 index 0000000000..6de08eed0e --- /dev/null +++ b/windows/manage/windows-store-for-business.md @@ -0,0 +1,76 @@ +--- +title: Windows Store for Business (Windows 10) +description: Welcome to the Windows Store for Business! You can use the Store for Business, to find, acquire, distribute, and manage apps for your organization. +ms.assetid: 527E611E-4D47-44F0-9422-DCC2D1ACBAB8 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Windows Store for Business + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Welcome to the Windows Store for Business! You can use the Store for Business, to find, acquire, distribute, and manage apps for your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Sign up and get started](sign-up-and-get-started.md)

IT admins can sign up for the Store for Business, and get started working with apps.

[Find and acquire apps](find-and-acquire-apps.md)

Use the Store for Business to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization.

[Distribute apps to your employees from the Windows Store for Business](distribute-apps-to-your-employees-from-the-windows-store-for-business.md)

Distribute apps to your employees from Store for Business. You can assign apps to employees, or let employees install them from your private store.

[Manage apps](manage-apps.md)

Manage settings and access to apps in Store for Business.

[Device Guard signing portal](device-guard-signing-portal.md)

Device Guard signing is a Device Guard feature that is available in the Store for Business. It gives admins a single place to sign catalog files and code integrity policies. After admins have created catalog files for unsigned apps and signed the catalog files, they can add the signers to a code integrity policy. You can merge the code integrity policy with your existing policy to include your custom signing certificate. This allows you to trust the catalog files.

[Manage settings in the Windows Store for Business](manage-settings-in-the-windows-store-for-business.md)

You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant

[Troubleshoot Windows Store for Business](troubleshoot.md)

Troubleshooting topics for Store for Business.

+ +  + +  + +  + + + + + diff --git a/windows/manage/working-with-line-of-business-apps.md b/windows/manage/working-with-line-of-business-apps.md new file mode 100644 index 0000000000..8194e17dc0 --- /dev/null +++ b/windows/manage/working-with-line-of-business-apps.md @@ -0,0 +1,109 @@ +--- +title: Working with line-of-business apps (Windows 10) +description: Your company can make line-of-business (LOB) applications available through Windows Store for Business. These apps are custom to your company – they might be internal business apps, or apps specific to your business or industry. +ms.assetid: 95EB7085-335A-447B-84BA-39C26AEB5AC7 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jdeckerMS +--- + +# Working with line-of-business apps + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +Your company can make line-of-business (LOB) applications available through Windows Store for Business. These apps are custom to your company – they might be internal business apps, or apps specific to your business or industry. + +Developers within your own company, or ISVs that you invite, can become LOB publishers and submit apps to the Windows Store for your company. Once a LOB publisher submits an app for your company, the app is only available to your company. LOB publishers submit apps through the Windows Dev Center using the same process as all apps that are in the Store, and then can be managed or deployed using the same process as any other app that has been acquired through the Store. + +One advantage of making apps available through Store for Business is that the app has been signed by the Store, and uses the standard Store policies. For companies that can’t submit their application through the Windows Dev Center (for example, those needing additional capabilities or due to compliance purposes), [Sideloading](http://go.microsoft.com/fwlink/p/?LinkId=623433) is also supported in Windows 10. + +## Adding LOB apps to your private store + + +Your Store for Business admin and ISV each own different parts of the process for getting LOB apps created, submitted, and deployed to your employees. They’ll use the Store for Business portal, and the Windows Dev center on MSDN. Here’s what’s involved: + +- The Store for Business admin invites a developer or ISV to become an LOB publisher for your company. + +- LOB publisher develops and submits app to the Store, tagging the app so it is only available to your company. + +- The Store for Business admin accepts the app and can distribute the app to employees in your company. + +What you'll have to set up: + +- Your company needs to be signed up with Store for Business. + +- LOB publishers need to have an active developer account. To learn more about account options, see [Ready to sign up](http://go.microsoft.com/fwlink/p/?LinkId=623432). + +- LOB publishers need to have an app in the Store, or have an app ready to submit to the Store. + +### Add an LOB publisher (admin) + +For developers within your own organization, or ISVs you're working with to create LOB apps, you'll need to invite them to become a LOB publisher. + +**To invite a developer to become an LOB publisher** + +1. Sign in to the [Windows Store for Business]( http://go.microsoft.com/fwlink/p/?LinkId=623531). +2. Click **Settings**, and then choose **LOB publishers**. +3. On the Line-of business publishers page, click **Add** to complete a form and send an email invitation to a developer. + +### Submit apps (LOB publisher) + +The developer receives an email invite to become an LOB publisher for your company. Once they accept the invite, they can log in to the Windows Dev Center to create an app submission for your company. The info here assumes that devs or ISVs have an active developer account. + +After an app is published and available in the Store, ISVs publish an updated version by creating another submission in their dashboard. Creating a new submission allows the ISV to make the changes required to create a LOB app for your company. To learn more about updates to an app submission, see [App submissions](http://go.microsoft.com/fwlink/p/?LinkId=623463) and [Distributing LOB apps to enterprises](http://go.microsoft.com/fwlink/p/?LinkId=627543). + +**To create a new submission for an app** + +1. Sign in to the [Windows Dev Center](http://go.microsoft.com/fwlink/p/?LinkId=623486), go to your Dashboard, and click the app you want to make available as an LOB app. +2. On the App overview page, under **Action**, click **Update**. + + -OR- + + Submit your app following the guidelines in [App submissions](http://go.microsoft.com/fwlink/p/?LinkId=623463). Be sure to completed steps 3 and 4 when you set app pricing and availability options. + +3. On the **Pricing and availability** page, under **Distribution and visibility**, click **Line-of-business (LOB) distribution**, and then choose the enterprise(s) who will get the LOB app. No one else will have access to the app. +4. Under **Organizational licensing**, click **Show options**. + + Organizational licensing options apply to all apps, not just LOB apps: + + - **Store-managed (online) volume licensing** - This is required. You must select this item to make your app available as an a LOB app. By default, it will be selected. This won't make the app available to anyone outside of the enterprise(s) that you selected in **Distribution and visibility**. + + - **Disconnected (offline) licensing** - This is optional for LOB apps. + +5. Click **Save** to save your changes and start the app submission process. + +For more information, see [Organizational licensing options]( http://go.microsoft.com/fwlink/p/?LinkId=708615) and [Distributing LOB apps to enterprises](http://go.microsoft.com/fwlink/p/?LinkId=627543). + +### Add app to inventory (admin) + +After an ISV submits the LOB app for your company, the Store for Businessadmin needs to accept the app. + +**To add the LOB app to your inventory** + +1. Sign in to the Store for Business. +2. Click **Manage**, and then choose **New LOB apps**. +3. Click the ellipses under **Action** for the app you want to add to your inventory, and then choose **add to inventory**. + +After you add the app to your inventory, you can choose how to distribute the app. For more information, see: + +- [Distribute apps to your employees from the Windows Store for Business](distribute-apps-to-your-employees-from-the-windows-store-for-business.md) + +- [Distribute apps from your private store](distribute-apps-from-your-private-store.md) + +- [Assign apps to employees](assign-apps-to-employees.md) + +- [Distribute offline apps](distribute-offline-apps.md) + +  + +  + + + + + diff --git a/windows/plan/TOC.md b/windows/plan/TOC.md index 70b75db006..8def250605 100644 --- a/windows/plan/TOC.md +++ b/windows/plan/TOC.md @@ -1 +1,114 @@ -#[Plan](placeholder.md) \ No newline at end of file +# [Plan for Windows 10 deployment](planning-for-windows-10-deployment.md) +## [Change history for Plan for Windows 10 deployment](change-history-for-plan-for-windows-10-deployment.md) +## [Windows 10 servicing options](windows-10-servicing-model.md) +## [Windows 10 deployment considerations](windows-10-deployment-considerations.md) +## [Windows 10 compatibility](windows-10-compatibility.md) +## [Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) +## [Windows Update for Business](windows-update-for-business.md) +### [Setup and deployment](setup-and-deployment.md) +### [Integration with management solutions](integration-with-management-solutions-.md) +## [Guidance for education environments](guidance-for-education-environments.md) +### [Chromebook migration guide](chromebook-migration-guide.md) +## [Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) +### [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md) +### [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) +### [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) +### [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) +### [Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) +## [Application Compatibility Toolkit (ACT) Technical Reference](application-compatibility-toolkit--act--technical-reference.md) +### [Welcome to ACT](welcome-to-act.md) +#### [What's New in ACT 6.1](whats-new-in-act-60.md) +#### [Software Requirements for ACT](software-requirements-for-act.md) +#### [Software Requirements for RAP](software-requirements-for-rap.md) +### [Configuring ACT](configuring-act.md) +#### [ACT Tools, Packages, and Services](act-tools-packages-and-services.md) +#### [ACT Deployment Options](act-deployment-options.md) +#### [ACT Database Configuration](act-database-configuration.md) +#### [ACT Database Migration](act-database-migration.md) +#### [ACT LPS Share Permissions](act-lps-share-permissions.md) +### [Using ACT](using-act.md) +#### [Taking Inventory of Your Organization](taking-inventory-of-your-organization.md) +##### [Identifying Computers for Inventory Collection](identifying-computers-for-inventory-collection.md) +##### [Creating an Inventory-Collector Package](creating-an-inventory-collector-package.md) +##### [Deploying an Inventory-Collector Package](deploying-an-inventory-collector-package.md) +#### [Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md) +##### [Deciding Which Applications to Test](deciding-which-applications-to-test.md) +##### [Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md) +##### [Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md) +##### [Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md) +##### [Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md) +###### [Using Compatibility Monitor to Send Feedback](using-compatibility-monitor-to-send-feedback.md) +###### [Common Compatibility Issues](common-compatibility-issues.md) +#### [Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) +##### [Log File Locations for Data-Collection Packages](log-file-locations-for-data-collection-packages.md) +##### [Exporting a Data-Collection Package](exporting-a-data-collection-package.md) +##### [Deleting a Data-Collection Package](deleting-a-data-collection-package.md) +##### [Labeling Data in ACM](labeling-data-in-acm.md) +#### [Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) +##### [Viewing Your Compatibility Reports](viewing-your-compatibility-reports.md) +###### [<OperatingSystem> - Application Report](operatingsystem---application-report.md) +####### [<Application> Dialog Box](application-dialog-box.md) +###### [<OperatingSystem> - Computer Report](operatingsystem---computer-report.md) +####### [<Computer> Dialog Box](computer-dialog-box.md) +###### [<OperatingSystem> - Device Report](operatingsystem---device-report.md) +####### [<Device> Dialog Box](device-dialog-box.md) +###### [Internet Explorer - Web Site Report](internet-explorer---web-site-report.md) +####### [<WebsiteURL> Dialog Box](websiteurl-dialog-box.md) +###### [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md) +###### [Customizing Your Report Views](customizing-your-report-views.md) +##### [Organizing Your Compatibility Data](organizing-your-compatibility-data.md) +###### [Organizational Tasks for Each Report Type](organizational-tasks-for-each-report-type.md) +###### [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md) +###### [Selecting Your Deployment Status](selecting-your-deployment-status.md) +###### [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md) +###### [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md) +###### [Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md) +###### [Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md) +####### [Adding or Editing an Issue](adding-or-editing-an-issue.md) +####### [Adding or Editing a Solution](adding-or-editing-a-solution.md) +####### [Resolving an Issue](resolving-an-issue.md) +##### [Filtering Your Compatibility Data](filtering-your-compatibility-data.md) +###### [Example Filter Queries](example-filter-queries.md) +##### [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md) +###### [Data Sent Through the Microsoft Compatibility Exchange](data-sent-through-the-microsoft-compatibility-exchange.md) +###### [ACT Community Ratings and Process](act-community-ratings-and-process.md) +#### [Fixing Compatibility Issues](fixing-compatibility-issues.md) +##### [Deciding Whether to Fix an Application or Deploy a Workaround](deciding-whether-to-fix-an-application-or-deploy-a-workaround.md) +##### [SUA User's Guide](sua-users-guide.md) +###### [Using the SUA Wizard](using-the-sua-wizard.md) +###### [Using the SUA Tool](using-the-sua-tool.md) +####### [Tabs on the SUA Tool Interface](tabs-on-the-sua-tool-interface.md) +####### [Showing Messages Generated by the SUA Tool](showing-messages-generated-by-the-sua-tool.md) +####### [Applying Filters to Data in the SUA Tool](applying-filters-to-data-in-the-sua-tool.md) +####### [Fixing Applications by Using the SUA Tool](fixing-applications-by-using-the-sua-tool.md) +##### [Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) +###### [Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md) +####### [Available Data Types and Operators in Compatibility Administrator](available-data-types-and-operators-in-compatibility-administrator.md) +####### [Searching for Fixed Applications in Compatibility Administrator](searching-for-fixed-applications-in-compatibility-administrator.md) +####### [Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator](searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md) +####### [Creating a Custom Compatibility Fix in Compatibility Administrator](creating-a-custom-compatibility-fix-in-compatibility-administrator.md) +####### [Creating a Custom Compatibility Mode in Compatibility Administrator](creating-a-custom-compatibility-mode-in-compatibility-administrator.md) +####### [Creating an AppHelp Message in Compatibility Administrator](creating-an-apphelp-message-in-compatibility-administrator.md) +####### [Viewing the Events Screen in Compatibility Administrator](viewing-the-events-screen-in-compatibility-administrator.md) +####### [Enabling and Disabling Compatibility Fixes in Compatibility Administrator](enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md) +####### [Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator](installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md) +###### [Managing Application-Compatibility Fixes and Custom Fix Databases](managing-application-compatibility-fixes-and-custom-fix-databases.md) +####### [Understanding and Using Compatibility Fixes](understanding-and-using-compatibility-fixes.md) +####### [Compatibility Fix Database Management Strategies and Deployment](compatibility-fix-database-management-strategies-and-deployment.md) +####### [Testing Your Application Mitigation Packages](testing-your-application-mitigation-packages.md) +###### [Using the Sdbinst.exe Command-Line Tool](using-the-sdbinstexe-command-line-tool.md) +### [Troubleshooting ACT](troubleshooting-act.md) +#### [Troubleshooting the ACT Configuration Wizard](troubleshooting-the-act-configuration-wizard.md) +#### [Troubleshooting the ACT Log Processing Service](troubleshooting-the-act-log-processing-service.md) +#### [Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md) +### [ACT User Interface Reference](act-user-interface-reference.md) +#### [Toolbar Icons in ACM](toolbar-icons-in-acm-win-8.md) +#### [Ratings Icons in ACM](ratings-icons-in-acm.md) +#### [Activating and Closing Windows in ACM](activating-and-closing-windows-in-acm.md) +#### [Settings for ACM](settings-for-acm.md) +##### [Settings Dialog Box - Settings Tab](settings-dialog-box---settings-tab.md) +##### [Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md) +### [ACT Product and Documentation Resources](act-product-and-documentation-resources.md) +### [ACT Glossary](act-glossary.md) +### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) + diff --git a/windows/plan/act-community-ratings-and-process.md b/windows/plan/act-community-ratings-and-process.md new file mode 100644 index 0000000000..90c94ca481 --- /dev/null +++ b/windows/plan/act-community-ratings-and-process.md @@ -0,0 +1,47 @@ +--- +title: ACT Community Ratings and Process (Windows 10) +description: The Application Compatibility Toolkit (ACT) Community uses the Microsoft® Compatibility Exchange to share compatibility ratings between all registered ACT Community members. +ms.assetid: be6c8c71-785b-4adf-a375-64ca7d24e26c +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Community Ratings and Process + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Application Compatibility Toolkit (ACT) Community uses the Microsoft® Compatibility Exchange to share compatibility ratings between all registered ACT Community members. + +When you access the Microsoft Compatibility Exchange as a registered ACT Community member, you can upload your compatibility data to the community and download issues from other ACT Community members. For information about how compatibility ratings are entered, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). + +ACT takes your information and combines it with all of the information provided by the other ACT Community users and shows the average rating as a color gradient from one to five bars. + +![act community](images/dep-win8-e-act-communityexample.gif) + +## Process for Synchronizing Compatibility Ratings + + +The following diagram shows the process for synchronizing compatibility ratings with the ACT Community. + +You have the option to exclude applications from being shared with the Microsoft Compatibility Exchange. However, you will not get compatibility ratings from the ACT Community for any application that you exclude. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +![act community workflow](images/dep-win8-l-act-communityworkflowdiagram.jpg) + +  + +  + + + + + diff --git a/windows/plan/act-database-configuration.md b/windows/plan/act-database-configuration.md new file mode 100644 index 0000000000..528cd9a8e2 --- /dev/null +++ b/windows/plan/act-database-configuration.md @@ -0,0 +1,84 @@ +--- +title: ACT Database Configuration (Windows 10) +description: The Application Compatibility Toolkit (ACT) uses a Microsoft® SQL Server® database for storing and sharing compatibility issue data. +ms.assetid: 032bbfe0-86fa-48ff-b638-b9d6a908c45e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Database Configuration + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Application Compatibility Toolkit (ACT) uses a Microsoft® SQL Server® database for storing and sharing compatibility issue data. If you do not use Microsoft SQL Server, you can download and install Microsoft SQL Server Express. For information about creating Microsoft SQL Server databases, see [Administering the Database Engine](http://go.microsoft.com/fwlink/p/?LinkId=64169). + +## ACT Database Creation + + +You can create the ACT database by using one of the following methods: + +- Run Application Compatibility Manager (ACM), and then use the ACT Configuration Wizard to create a new database. + + -or- + +- Run the CreateDB.sql file, located at %SYSTEMDRIVE%\\ProgramData\\Microsoft\\Application Compatibility Toolkit\\CreateDB.sql. + +### ACT Database Permissions + +You must assign the following database roles to the following accounts. + +- To the user and local service accounts that will run the ACT Log Processing Service (LPS), assign the db\_datareader, db\_datawriter, and db\_owner database roles. + +- To the user account that will run Application Compatibility Manager (ACM), assign the db\_datareader and db\_datawriter database roles. + +Alternatively, grant the following explicit permissions to each user that will run the ACT LPS or ACM. + +- SELECT + +- INSERT + +- UPDATE + +- DELETE + +- EXECUTE + +### ACT Database Recommendations + +We also recommend that you make the following changes to the database as part of your deployment planning: + +- **Create a larger database, including a larger log file–size setting, and then set the growth increments appropriately**. If you create a database with the default setting for data storage, the data portion of the database will have an initial size of 1 megabyte (MB), and a growth increment of 1 MB. If you create a database with the default setting for log file storage, the log file portion of the database will have an initial size of 1 MB and a growth increment of 10 percent. We recommend that you maintain a data-to-log file ratio of 5:1 or 4:1. For example, if your data portion is 5 gigabytes (GB), your log file portion should be 1 GB. + +- **Change the recovery model of your database**. The default recovery model is **Full**, but we recommend that you change the recovery model to **Simple** to improve performance and reduce disk space requirements. + +- **Store the data portion and log file portion of your ACT database on separate hard drives**. Unless otherwise specified by your SQL Administrator, the default is for the data and log files to be stored on the same hard drive. We recommend separating the data from the log files to reduce disk I/O contention. + +## Related topics + + +[ACT Tools, Packages, and Services](act-tools-packages-and-services.md) + +[ACT Deployment Options](act-deployment-options.md) + +[ACT Database Migration](act-database-migration.md) + +[ACT LPS Share Permissions](act-lps-share-permissions.md) + +  + +  + + + + + diff --git a/windows/plan/act-database-migration.md b/windows/plan/act-database-migration.md new file mode 100644 index 0000000000..38d1886347 --- /dev/null +++ b/windows/plan/act-database-migration.md @@ -0,0 +1,67 @@ +--- +title: ACT Database Migration (Windows 10) +description: The schema for an ACT database can change when ACT is updated or when a new version of ACT is released. +ms.assetid: b13369b4-1fb7-4889-b0b8-6d0ab61aac3d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Database Migration + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The schema for an ACT database can change when ACT is updated or when a new version of ACT is released. If the schema for an ACT database does not match the current schema, you can migrate the compatibility data to a new database. You can then use the current version of ACT to open the new database. + +To create the new database, you must have database-creation permissions on the instance of SQL Server. + +## Migrating Compatibility Data from an ACT Database + + +You can migrate compatibility data from an ACT database to a new database by using one of the following methods: + +- Run Application Compatibility Manager (ACM), and then use the ACT Configuration Wizard to open the database. The wizard guides you through migrating the compatibility data to a new database. + +- Run the MigrateDB.sql file, located at %SYSTEMDRIVE%\\ProgramData\\Microsoft\\Application Compatibility Toolkit\\MigrateDB.sql.. The following table shows the location of the MigrateDB.sql file. + +## Database Migration from ACT 5.6 + + +When you migrate compatibility data from an ACT 5.6 database to a new database, the following information is excluded from the migration: + +- Issues that were reported by ACT 5.6 data-collection packages (DCPs). + +- Solutions that correspond to issues reported by ACT 5.6 DCPs. + +- Lists of file names that ACT 5.6 associated with each application. + +You cannot migrate any compatibility data from ACT databases that were created on a version of ACT before ACT 5.6. + +## Related topics + + +[ACT Tools, Packages, and Services](act-tools-packages-and-services.md) + +[ACT Deployment Options](act-deployment-options.md) + +[ACT Database Configuration](act-database-configuration.md) + +[ACT LPS Share Permissions](act-lps-share-permissions.md) + +  + +  + + + + + diff --git a/windows/plan/act-deployment-options.md b/windows/plan/act-deployment-options.md new file mode 100644 index 0000000000..bf817c11b1 --- /dev/null +++ b/windows/plan/act-deployment-options.md @@ -0,0 +1,60 @@ +--- +title: ACT Deployment Options (Windows 10) +description: While planning your deployment of the Application Compatibility Toolkit (ACT), consider which computers you want running the various tools, packages, and services for ACT. +ms.assetid: 90d56dd8-8d57-44e8-bf7a-29aabede45ba +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Deployment Options + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +While planning your deployment of the Application Compatibility Toolkit (ACT), consider which computers you want running the various tools, packages, and services for ACT. + +The following diagram shows supported deployment options for an ACT installation. The options listed first are the most highly recommended. + +![act supported topologies](images/dep-win8-l-act-supportedtopologies.jpg) + +## Collecting Data Across Domains + + +If you plan to deploy inventory-collector packages to computers running Windows XP, where some of the computers are on a different domain than the ACT LPS share, do one of the following: + +- Set up a separate ACT LPS share on each domain and configure the inventory-collector package to upload log files to the ACT LPS share on the same domain. + +- Set up a single ACT LPS share on one computer. On the computer that hosts the share, use Group Policy to allow connections from anonymous users. + +These steps are not necessary if the computers where you deploy inventory-collector packages are running Windows Vista, Windows 7, Windows 8, Windows 8.1, or Windows 10. + +If you choose to have distributed logging with a subsequent step of moving log files to your central share, move the files to the central share before processing the files. You can move the files manually or use a technology like Distributed File-System Replication (DFSR). + +## Related topics + + +[ACT Tools, Packages, and Services](act-tools-packages-and-services.md) + +[ACT Database Configuration](act-database-configuration.md) + +[ACT Database Migration](act-database-migration.md) + +[ACT LPS Share Permissions](act-lps-share-permissions.md) + +  + +  + + + + + diff --git a/windows/plan/act-glossary.md b/windows/plan/act-glossary.md new file mode 100644 index 0000000000..ed5fb09904 --- /dev/null +++ b/windows/plan/act-glossary.md @@ -0,0 +1,117 @@ +--- +title: ACT Glossary (Windows 10) +description: The following table lists terms and definitions used by the Application Compatibility Toolkit (ACT). +ms.assetid: 984d1cce-c1ac-4aa8-839a-a23e15da6f32 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Glossary + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The following table lists terms and definitions used by the Application Compatibility Toolkit (ACT). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDefinition

ACT Community

An online environment that enables ACT users to share issues and solution data with other registered ACT users.

ACT Log Processing Service (LPS)

The service that processes the log files uploaded from your client computers, adding the information to your ACT database.

AppHelp message

A type of compatibility fix. An AppHelp message is designed to appear when a user starts an application that has compatibility issues. The message can prevent the application from starting, or simply provide information about compatibility issues in the application.

Application Compatibility Manager (ACM)

The user interface that enables you to view reports generated from the ACT database. This is also where you create data-collection packages.

Compatibility Administrator

A tool that enables you to create and deploy compatibility fixes, compatibility modes, and AppHelp messages, to resolve your compatibility issues.

compatibility fix

A small piece of code that intercepts API calls from applications, transforming them so that Windows will provide the same product support for the application as previous versions of the operating system. Previously known as a "shim".

compatibility mode

Group of compatibility fixes found to resolve many common application compatibility issues.

compatibility solution

The solution to a known compatibility issue, as entered by the user, Microsoft, or a vendor.

data-collection package

A Windows installer (.msi) file created by Application Compatibility Manager (ACM) for deploying to each of your client computers. Data-collection packages include inventory collection packages and runtime analysis packages.

deployment

The process of distributing and installing a software program throughout an entire organization. A deployment is not the same as a pilot, which is where you provide the software application to a smaller group of users to identify and evaluate problems that might occur during the actual deployment.

independent software vendor (ISV)

An individual or an organization that independently creates computer software.

inventory-collector package

A package that examines each of your organization's computers to identify the installed applications and system information. You can view the results on the Analyze screen in ACM.

Microsoft Compatibility Exchange

A web service that transfers compatibility information between Microsoft and the ACT database.

runtime-analysis package

A data-collection package that you deploy to computers in a test environment for compatibility testing. The runtime-analysis package includes tools for monitoring applications for compatibility issues and submitting compatibility feedback.

session 0

The session that is used for all of the system services. Previously, users could run in Session 0 without issues; however, this was changed in Windows Vista so that all users are now required to run in Session 1 or later.

shim

See Other Term: compatibility fix

User Account Control (UAC)

A security feature that helps prevent unauthorized changes to a computer, by asking the user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users.

+ +  + +  + +  + + + + + diff --git a/windows/plan/act-lps-share-permissions.md b/windows/plan/act-lps-share-permissions.md new file mode 100644 index 0000000000..f9299c2fed --- /dev/null +++ b/windows/plan/act-lps-share-permissions.md @@ -0,0 +1,75 @@ +--- +title: ACT LPS Share Permissions (Windows 10) +description: To upload log files to the ACT Log Processing Service (LPS) share, certain permissions must be set at the share level and folder level. +ms.assetid: 51f6ddf7-f424-4abe-a0e0-71fe616f9e84 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT LPS Share Permissions + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +To upload log files to the ACT Log Processing Service (LPS) share, certain permissions must be set at the share level and folder level. + +## Share-Level Permissions + + +The **Everyone** group must have **Change** and **Read** permissions to the ACT LPS share. + +**To set the share-level permissions** + +1. Browse to the ACT LPS share, right-click the folder, and select **Properties**. + +2. Click the **Sharing** tab, share the folder, and then click **Permissions**. + +3. Add the **Everyone** group if it is not already listed, and then select the **Change** and **Read** check boxes in the **Allow** column. + +## Folder-Level Permissions (NTFS Only) + + +The **Everyone** group must have **Write** access to the ACT LPS share. + +The ACT Log Processing Service account must have **List Folder Contents**, **Read**, and **Write** permissions. + +- If the ACT Log Processing Service account is **Local System Account**, apply the permissions to the *<domain>*\\*<computer>*$ account. + +- If the ACT Log Processing Service is a user account, apply the permissions to the specific user. + +**To set the folder-level permissions** + +1. In Windows Explorer, right-click the folder for the ACT LPS share, and then click **Properties**. + +2. Click the **Security** tab, add the account that runs the ACT Log Processing Service, and then select the **List Folder Contents**, **Read**, and **Write** check boxes in the **Allow** column. + +3. Add the **Everyone** group if it is not already listed, and then select the **Write** check box in the **Allow** column. + +## Related topics + + +[ACT Tools, Packages, and Services](act-tools-packages-and-services.md) + +[ACT Deployment Options](act-deployment-options.md) + +[ACT Database Configuration](act-database-configuration.md) + +[ACT Database Migration](act-database-migration.md) + +  + +  + + + + + diff --git a/windows/plan/act-product-and-documentation-resources.md b/windows/plan/act-product-and-documentation-resources.md new file mode 100644 index 0000000000..54cb4635de --- /dev/null +++ b/windows/plan/act-product-and-documentation-resources.md @@ -0,0 +1,66 @@ +--- +title: ACT Product and Documentation Resources (Windows 10) +description: The following sections provide links to resources and reference material for the Application Compatibility Toolkit (ACT). +ms.assetid: c7954b5a-164d-4548-af58-cd3a1de5cc43 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Product and Documentation Resources + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The following sections provide links to resources and reference material for the Application Compatibility Toolkit (ACT). + +## Information Related to the Application Compatibility Toolkit + + +- [Microsoft SQL Server](http://go.microsoft.com/fwlink/p/?LinkId=184584). Use Microsoft SQL Server to take full advantage of ACT features. Visit the SQL Server home page for product information, technical resources, and support. + +- [Microsoft SQL Server Express Edition](http://go.microsoft.com/fwlink/p/?LinkId=690325). If you are not already running SQL Server, download a free version of SQL Server Express and its management tools. + +- [Microsoft System Center Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=690326). Visit the System Center Configuration Manager home page for product information, technical resources, and support. + +- [Microsoft Application Verifier](http://go.microsoft.com/fwlink/p/?LinkId=52529). Application Verifier is required by the Standard User Analyzer tool. + +## Information About Application Compatibility + + +- [Application Compatibility home page](http://go.microsoft.com/fwlink/p/?LinkId=184586). Go here for general application compatibility information, including videos, key resources, advice, and technical guidance. + +- [Windows Developer Center home page](http://go.microsoft.com/fwlink/p/?LinkId=184587). Find information about the Windows SDK, including how to develop your application, how to get help with compatibility issues, and other development-related content. + +## Information About Windows Deployment + + +- [Microsoft Deployment Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=618117). Download the latest version of the Microsoft Deployment Toolkit (MDT) to assist with image creation and automated installation, reduce deployment time, standardize desktop and server images, limit service disruptions, reduce post-deployment help desk costs, and improve security and ongoing configuration management. + +- [Windows website](http://go.microsoft.com/fwlink/p/?LinkId=731). Visit the Windows home page for product information, technical resources, and support. + +## Related topics + + +[Troubleshooting ACT](troubleshooting-act.md) + +[Using ACT](using-act.md) + +[Software Requirements for ACT](software-requirements-for-act.md) + +  + +  + + + + + diff --git a/windows/plan/act-tools-packages-and-services.md b/windows/plan/act-tools-packages-and-services.md new file mode 100644 index 0000000000..5d3ef9ba47 --- /dev/null +++ b/windows/plan/act-tools-packages-and-services.md @@ -0,0 +1,59 @@ +--- +title: ACT Tools, Packages, and Services (Windows 10) +description: The Application Compatibility Toolkit is included with the Windows ADK. Download the Windows ADK. +ms.assetid: f5a16548-7d7b-4be9-835e-c06158dd0b89 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT Tools, Packages, and Services + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Application Compatibility Toolkit is included with the Windows ADK. [Download the Windows ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740) + +ACT includes the following: + +- **Application Compatibility Manager (ACM):** A tool that you can use to create your data-collection packages and analyze the collected inventory and compatibility data. + +- **Inventory-collector package:** A data-collection package that can be deployed to computers to gather inventory data that will be uploaded to the ACT database. + +- **Runtime-analysis package:** A data-collection package that can be deployed to computers in a test environment for compatibility testing on the new operating system. + +- **ACT Log Processing Service (LPS):** A service that is used to process the ACT log files uploaded from the computers where your data-collection packages have been installed. The service adds the information to your ACT database. + +- **ACT LPS share:** A file share that is accessed by the ACT LPS, to store the log files that will be processed and added to the ACT database. + +- **ACT database:** A Microsoft® SQL Server database that stores the collected inventory and compatibility data. You can use ACM to view the information stored in the ACT database. + +- **Microsoft Compatibility Exchange:** A web service that propagates application-compatibility issues. + +## Related topics + + +[ACT Deployment Options](act-deployment-options.md) + +[ACT Database Configuration](act-database-configuration.md) + +[ACT Database Migration](act-database-migration.md) + +[ACT LPS Share Permissions](act-lps-share-permissions.md) + +  + +  + + + + + diff --git a/windows/plan/act-user-interface-reference.md b/windows/plan/act-user-interface-reference.md new file mode 100644 index 0000000000..a121803d67 --- /dev/null +++ b/windows/plan/act-user-interface-reference.md @@ -0,0 +1,73 @@ +--- +title: ACT User Interface Reference (Windows 10) +description: This section contains information about the user interface for Application Compatibility Manager (ACM), which is a tool in the Application Compatibility Toolkit (ACT). +ms.assetid: 303d3dd7-2cc1-4f5f-b032-b7e288b04893 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# ACT User Interface Reference + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section contains information about the user interface for Application Compatibility Manager (ACM), which is a tool in the Application Compatibility Toolkit (ACT). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Toolbar Icons in ACM](toolbar-icons-in-acm-win-8.md)

The following table shows icons that appear on toolbars and navigational elements in Application Compatibility Manager (ACM).

[Ratings Icons in ACM](ratings-icons-in-acm.md)

Compatibility ratings can originate from Microsoft, the application vendor, your organization, and from the Application Compatibility Toolkit (ACT) community.

[Activating and Closing Windows in ACM](activating-and-closing-windows-in-acm.md)

The Windows dialog box shows the windows that are open in Application Compatibility Manager (ACM).

[Settings for ACM](settings-for-acm.md)

This section provides information about settings that you can configure in Application Compatibility Manager (ACM).

+ +  + +## Related topics + + +[Using ACT](using-act.md) + +  + +  + + + + + diff --git a/windows/plan/activating-and-closing-windows-in-acm.md b/windows/plan/activating-and-closing-windows-in-acm.md new file mode 100644 index 0000000000..3e7eaaef87 --- /dev/null +++ b/windows/plan/activating-and-closing-windows-in-acm.md @@ -0,0 +1,51 @@ +--- +title: Activating and Closing Windows in ACM (Windows 10) +description: The Windows dialog box shows the windows that are open in Application Compatibility Manager (ACM). +ms.assetid: 747bf356-d861-4ce7-933e-fa4ecfac7be5 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Activating and Closing Windows in ACM + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The **Windows** dialog box shows the windows that are open in Application Compatibility Manager (ACM). + +**To view a list of the open windows in ACM** + +- On the **Window** menu, click **Windows**. + +**To show an open window in ACM** + +- In the **Windows** dialog box, click the window name from the list of open windows, and then click **Activate**. + + The selected window appears on top of any others on your screen. + +**To close one or more windows in ACM** + +- In the **Windows** dialog box, click one or more window names from the list of open windows, and then click **Close Window(s)**. + +## Related topics + + +[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) + +  + +  + + + + + diff --git a/windows/plan/adding-or-editing-a-solution.md b/windows/plan/adding-or-editing-a-solution.md new file mode 100644 index 0000000000..a3ebf8c8ff --- /dev/null +++ b/windows/plan/adding-or-editing-a-solution.md @@ -0,0 +1,104 @@ +--- +title: Adding or Editing a Solution (Windows 10) +description: If you find your own solutions to compatibility issues, you can enter the solutions in Application Compatibility Manager (ACM). You can use the Microsoft Compatibility Exchange to upload solutions to Microsoft Corporation. +ms.assetid: 86cb8804-d577-4af6-b96f-5e0409784a23 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Adding or Editing a Solution + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +If you find your own solutions to compatibility issues, you can enter the solutions in Application Compatibility Manager (ACM). You can use the Microsoft Compatibility Exchange to upload solutions to Microsoft Corporation. + +## Adding Solutions for Compatibility Issues with Your Applications and Websites + + +You can view or add solutions only for applications or websites. + +**Note**   +The following examples use the **<Application\_Name>** dialog box. The procedures for websites are similar. + +  + +**To add a solution** + +1. On the **<Operating\_System> - Application Report** screen, double-click the name of the application to display the **<Application\_Name>** dialog box. + +2. Click the **Issues** tab. + +3. On the **Actions** menu, click **Add Solution**. + +4. Enter the information from the following table, and then click **Save**. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
FieldDescription

Title

Can be up to 100 characters in length.

Solution Type

You must select a value from the list.

Solution Details

Information about your solution, including the steps to reproduce your fix.

Solution Details URL

URL for a page that shows more information about the solution.

+ +   + +**To edit an existing solution** + +1. On the **<Operating\_System> - Application Report** screen, double-click the name of the application to display the <Application\_Name> dialog box. + +2. Click the **Issues** tab. + +3. Double-click the issue that includes the solution that you want to modify. + +4. Click the **Solutions** tab. + +5. Double-click the solution to edit. + +6. Modify the information about the solution, and then click **Save**. + + **Note**   + You can only modify your own solutions. You cannot modify solutions entered by other users. + +   + +  + +  + + + + + diff --git a/windows/plan/adding-or-editing-an-issue.md b/windows/plan/adding-or-editing-an-issue.md new file mode 100644 index 0000000000..51a8522a05 --- /dev/null +++ b/windows/plan/adding-or-editing-an-issue.md @@ -0,0 +1,114 @@ +--- +title: Adding or Editing an Issue (Windows 10) +description: In Application Compatibility Manager (ACM), you can enter information about the compatibility issues that you discover. +ms.assetid: 8a9fff79-9f88-4ce2-a4e6-b9382f28143d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Adding or Editing an Issue + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), you can enter information about the compatibility issues that you discover. + +You can use the Microsoft Compatibility Exchange to share compatibility information with others. For information about the Microsoft Compatibility Exchange, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +## Adding Issues for Your Applications and Websites + + +You can view or add issues only for applications or websites. + +**Note**   +The following examples use the **<Application\_Name>** dialog box. The procedures are similar for websites. + +  + +**To add an issue** + +1. On the **<Operating\_System> - Application Report** screen, double-click the name of the application to display the **<Application\_Name>** dialog box. + +2. On the **Actions** menu, click **Add Issue**. + +3. Enter the information from the following table, and then click **Save**. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
FieldDescription

Title

Can be up to 256 characters in length.

Priority

You must select a value from the list.

Severity

You must select a value from the list.

Symptom

You must select a value from the list.

Cause

You must select a value from the list.

Affected Operating Systems

Operating systems on which the issue occurs. You must select at least one operating system.

Issue Description

Description of the issue, including the steps to reproduce the problem.

Link to More Information

URL for a page that shows more information about the issue.

+ +   + +**To edit an existing issue** + +1. On the **<Operating\_System> - Application Report** screen, double-click the name of the application that includes the issue you want to modify. + +2. In the **<Application\_Name>** dialog box, click the **Issues** tab, and then double-click the specific issue to be edited. + +3. Modify the issue information, and then click **Save**. + + **Note**   + You can modify your own issues. You cannot modify issues entered by another user. + +   + +  + +  + + + + + diff --git a/windows/plan/analyzing-your-compatibility-data.md b/windows/plan/analyzing-your-compatibility-data.md new file mode 100644 index 0000000000..4b145ad92f --- /dev/null +++ b/windows/plan/analyzing-your-compatibility-data.md @@ -0,0 +1,79 @@ +--- +title: Analyzing Your Compatibility Data (Windows 10) +description: This section provides information about viewing and working with your compatibility data in Application Compatibility Manager (ACM). +ms.assetid: b98f3d74-fe22-41a2-afe8-2eb2799933a1 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Analyzing Your Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about viewing and working with your compatibility data in Application Compatibility Manager (ACM). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Viewing Your Compatibility Reports](viewing-your-compatibility-reports.md)

This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports.

[Organizing Your Compatibility Data](organizing-your-compatibility-data.md)

This section provides step-by-step instructions for organizing your compatibility data in Application Compatibility Manager (ACM).

[Filtering Your Compatibility Data](filtering-your-compatibility-data.md)

You can use Query Builder to filter your compatibility-issue data or reports by selecting specific restriction criteria.

[Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md)

The Microsoft® Compatibility Exchange is a web service that propagates application compatibility issues between various data sources, for example Microsoft Corporation, independent software vendors (ISVs) and the ACT Community. This process involves checking for updated compatibility information from Microsoft over the Internet. You can send and receive data to keep Application Compatibility Manager (ACM) updated with the latest compatibility information.

+ +  + +## Related topics + + +[Taking Inventory of Your Organization](taking-inventory-of-your-organization.md) + +[Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md) + +[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) + +[Fixing Compatibility Issues](fixing-compatibility-issues.md) + +  + +  + + + + + diff --git a/windows/plan/application-compatibility-toolkit--act--technical-reference.md b/windows/plan/application-compatibility-toolkit--act--technical-reference.md new file mode 100644 index 0000000000..6544f9dc8e --- /dev/null +++ b/windows/plan/application-compatibility-toolkit--act--technical-reference.md @@ -0,0 +1,88 @@ +--- +title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10) +description: The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. +ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Application Compatibility Toolkit (ACT) Technical Reference + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. + +By using ACT, you can obtain compatibility information from Microsoft and software vendors, identify compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility issues before you deploy a version of Windows to your organization. + +ACT is available in the [Windows Assessment and Deployment Kit (ADK) for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526740). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Welcome to ACT](welcome-to-act.md)

The Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. With ACT, you can obtain compatibility information from Microsoft and software vendors, identify compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility issues before deploying a version of Windows to your organization.

[Configuring ACT](configuring-act.md)

This section provides information about setting up the Application Compatibility Toolkit (ACT) in your organization.

[Using ACT](using-act.md)

This section describes how to use the Application Compatibility Toolkit (ACT) in your organization.

[Troubleshooting ACT](troubleshooting-act.md)

This section provides troubleshooting information for the Application Compatibility Toolkit (ACT).

[ACT User Interface Reference](act-user-interface-reference.md)

This section contains information about the user interface for Application Compatibility Manager (ACM), which is a tool in the Application Compatibility Toolkit (ACT).

[ACT Product and Documentation Resources](act-product-and-documentation-resources.md)

The following sections provide links to resources and reference material for the Application Compatibility Toolkit (ACT).

[ACT Glossary](act-glossary.md)

The following table lists terms and definitions used by the Application Compatibility Toolkit (ACT).

[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md)

You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions.

+ +  + +  + +  + + + + + diff --git a/windows/plan/application-dialog-box.md b/windows/plan/application-dialog-box.md new file mode 100644 index 0000000000..8bbcad3398 --- /dev/null +++ b/windows/plan/application-dialog-box.md @@ -0,0 +1,125 @@ +--- +title: <Application> Dialog Box (Windows 10) +description: In Application Compatibility Manager (ACM), the <Application> dialog box shows information about the selected application. +ms.assetid: a43e85a6-3cd4-4235-bc4d-01e4d097db7e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <Application> Dialog Box + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), the *<Application>* dialog box shows information about the selected application. + +**To open the <Application> dialog box** + +1. In ACM, in the **Quick Reports** pane, click **Analyze**. + +2. Under an operating system heading, click **Applications**. + +3. Double-click the name of an application. + +## Tabs in the <Application> dialog box + + +The following table shows the information available in the *<Application>* dialog box. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TabInformation

Assessment

Shows the compatibility ratings for the application from the application vendor, your internal organization, and the ACT Community.

+

For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md).

Issues

For each issue associated with the selected application, shows:

+
    +
  • The issue status, either active (a red X) or resolved (a green check mark).

  • +
  • The provider who created the record of the issue.

  • +
  • The severity of the issue as entered by the provider.

  • +
  • The symptom of the issue as entered by the provider.

  • +
  • The date on which the issue was added to the ACT database.

  • +
+

For more information, see [Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md).

Application Properties

Shows the following properties for the selected application:

+
    +
  • MSI. Shows the installer name, vendor, version, language, and so on.

  • +
  • Add/Remove Programs. Shows the application name that appears in Control Panel, vendor, registry path, and string for uninstalling.

  • +
  • Shell. Shows the shortcuts for the application and where the shortcuts appear on the Start menu.

  • +
  • Registry. Shows the registry name for the application, registry path, file name, and so on.

  • +
  • Service Control Manager. Shows the entries in the Services console that correspond to the application.

  • +

Computers

Shows the following information for each of the computers that have the specified application installed:

+
    +
  • Computer name, domain, and operating system.

  • +
  • Media Access Control (MAC) address for the computer.

  • +
  • Manufacturer of the computer.

  • +

Labels

Shows the label for the selected application.

+

For information about labels, see [Labeling Data in ACM](labeling-data-in-acm.md).

Feedback

Shows feedback that your testers have submitted to the ACT database for the selected application.

+ +  + +## Using the <Application> Dialog Box + + +In the **<Application>** dialog box, you can perform the following actions: + +- Select your compatibility rating for the application. For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). + +- Select your deployment status for the application. For more information, see [Selecting Your Deployment Status](selecting-your-deployment-status.md). + +- Assign categories and subcategories to the application. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of the application to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Choose whether to synchronize data for the application with the Microsoft Compatibility Exchange. For more information, see [Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md). + +- Add, edit, or resolve an issue for the selected application, and add or edit solutions. For more information, see [Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md). + +  + +  + + + + + diff --git a/windows/plan/applying-filters-to-data-in-the-sua-tool.md b/windows/plan/applying-filters-to-data-in-the-sua-tool.md new file mode 100644 index 0000000000..7f960b8cf6 --- /dev/null +++ b/windows/plan/applying-filters-to-data-in-the-sua-tool.md @@ -0,0 +1,94 @@ +--- +title: Applying Filters to Data in the SUA Tool (Windows 10) +description: On the user interface for the Standard User Analyzer (SUA) tool, you can apply filters to the issues that the tool has found so that you can view only the information that interests you. +ms.assetid: 48c39919-3501-405d-bcf5-d2784cbb011f +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Applying Filters to Data in the SUA Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +On the user interface for the Standard User Analyzer (SUA) tool, you can apply filters to the issues that the tool has found so that you can view only the information that interests you. + +**To apply filters to data in the SUA tool** + +1. Use the SUA tool to test an application. For more information, see [Using the SUA Tool](using-the-sua-tool.md). + +2. After you finish testing, in the SUA tool, click a tab that shows issues that the SUA tool has found. All tabs except the **App Info** tab can show issues. + +3. On the **Options** menu, click a command that corresponds to the filter that you want to apply. The following table describes the commands. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Options menu commandDescription

Filter Noise

Filters noise from the issues.

+

This command is selected by default.

Load Noise Filter File

Opens the Open Noise Filter File dialog box, in which you can load an existing noise filter (.xml) file.

Export Noise Filter File

Opens the Save Noise Filter File dialog box, in which you can save filter settings as a noise filter (.xml) file.

Only Display Records with Application Name in StackTrace

Filters out records that do not have the application name in the stack trace.

+

However, because the SUA tool captures only the first 32 stack frames, this command can also filter out real issues with the application where the call stack is deeper than 32 frames.

Show More Details in StackTrace

Shows additional stack frames that are related to the SUA tool, but not related to the diagnosed application.

Warn Before Deleting AppVerifier Logs

Displays a warning message before the SUA tool deletes all of the existing SUA-related log files on the computer.

+

This command is selected by default.

Logging

Provides the following logging-related options:

+
    +
  • Show or hide log errors.

  • +
  • Show or hide log warnings.

  • +
  • Show or hide log information.

  • +
+

To maintain a manageable file size, we recommend that you do not select the option to show informational messages.

+ +   + +  + +  + + + + + diff --git a/windows/plan/available-data-types-and-operators-in-compatibility-administrator.md b/windows/plan/available-data-types-and-operators-in-compatibility-administrator.md new file mode 100644 index 0000000000..bc5e40d571 --- /dev/null +++ b/windows/plan/available-data-types-and-operators-in-compatibility-administrator.md @@ -0,0 +1,235 @@ +--- +title: Available Data Types and Operators in Compatibility Administrator (Windows 10) +description: The Compatibility Administrator tool provides a way to query your custom-compatibility databases. +ms.assetid: 67d9c03e-ab9d-4fda-8a55-8c5b90266d3b +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Available Data Types and Operators in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Compatibility Administrator tool provides a way to query your custom-compatibility databases. + +## Available Data Types + + +Customized-compatibility databases in Compatibility Administrator contain the following data types. + +- **Integer**. A numerical value with no fractional part. All integers are unsigned because none of the attributes can have a negative value. + +- **String**. A series of alphanumeric characters manipulated as a group. + +- **Boolean**. A value of True or False. + +## Available Attributes + + +The following table shows the attributes you can use for querying your customized-compatibility databases in Compatibility Administrator. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
AttributeDescriptionData type

APP_NAME

Name of the application.

String

DATABASE_GUID

Unique ID for your compatibility database.

String

DATABASE_INSTALLED

Specifies if you have installed the database.

Boolean

DATABASE_NAME

Descriptive name of your database.

String

DATABASE_PATH

Location of the database on your computer.

String

FIX_COUNT

Number of compatibility fixes applied to a specific application.

Integer

FIX_NAME

Name of your compatibility fix.

String

MATCH_COUNT

Number of matching files for a specific, fixed application.

Integer

MATCHFILE_NAME

Name of a matching file used to identify a specific, fixed application.

String

MODE_COUNT

Number of compatibility modes applied to a specific, fixed application.

Integer

MODE_NAME

Name of your compatibility mode.

String

PROGRAM_APPHELPTYPE

Type of AppHelp message applied to an entry. The value can be 1 or 2, where 1 enables the program to run and 2 blocks the program.

Integer

PROGRAM_DISABLED

Specifies if you disabled the compatibility fix for an application. If True, Compatibility Administrator does not apply the fixes to the application.

Boolean

PROGRAM_GUID

Unique ID for an application.

String

PROGRAM_NAME

Name of the application that you are fixing.

String

+ +  + +## Available Operators + + +The following table shows the operators that you can use for querying your customized-compatibility databases in the Compatibility Administrator. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SymbolDescriptionData typePrecedence

>

Greater than

Integer or string

1

>=

Greater than or equal to

Integer or string

1

<

Less than

Integer or string

1

<=

Less than or equal to

Integer or string

1

<>

Not equal to

Integer or string

1

=

Equal to

Integer, string, or Boolean

1

HAS

A special SQL operator used to check if the left-hand operand contains a substring specified by the right-hand operand.

Left-hand operand. MATCHFILE_NAME, MODE_NAME, FIX_NAME

+
+Note   +

Only the HAS operator can be applied to the MATCHFILE_NAME, MODE_NAME, and FIX_NAME attributes.

+
+
+  +
+

Right-hand operand. String

1

OR

Logical OR operator

Boolean

2

AND

Logical AND operator

Boolean

2

+ +  + +## Related topics + + +[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md) + +  + +  + + + + + diff --git a/windows/plan/best-practice-recommendations-for-windows-to-go.md b/windows/plan/best-practice-recommendations-for-windows-to-go.md new file mode 100644 index 0000000000..4f9850c51c --- /dev/null +++ b/windows/plan/best-practice-recommendations-for-windows-to-go.md @@ -0,0 +1,55 @@ +--- +title: Best practice recommendations for Windows To Go (Windows 10) +description: Best practice recommendations for Windows To Go +ms.assetid: 05e6e0ab-94ed-4c0c-a195-0abd006f0a86 +keywords: ["best practices, USB, device, boot"] +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Best practice recommendations for Windows To Go + + +**Applies to** + +- Windows 10 + +The following are the best practice recommendations for using Windows To Go: + +- Always shut down Windows and wait for shutdown to complete before removing the Windows To Go drive. + +- Do not insert the Windows To Go drive into a running computer. + +- Do not boot the Windows To Go drive from a USB hub. Always insert the Windows To Go drive directly into a port on the computer. + +- If available, use a USB 3.0 port with Windows To Go. + +- Do not install non-Microsoft core USB drivers on Windows To Go. + +- Suspend BitLocker on Windows host computers before changing the BIOS settings to boot from USB and then resume BitLocker protection. + +Additionally, we recommend that when you plan your deployment you should also plan a standard operating procedure for answering questions about which USB drives can be used for Windows To Go and how to enable booting from USB to assist your IT department or help desk in supporting users and work groups that want to use Windows To Go. It may be very helpful for your organization to work with your hardware vendors to create an IT standard for USB drives for use with Windows To Go, so that if groups within your organization want to purchase drives they can quickly determine which ones they should obtain. + +## More information + + +[Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) + +[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) + +[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) + +[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) + +  + +  + + + + + diff --git a/windows/plan/categorizing-your-compatibility-data.md b/windows/plan/categorizing-your-compatibility-data.md new file mode 100644 index 0000000000..637af36069 --- /dev/null +++ b/windows/plan/categorizing-your-compatibility-data.md @@ -0,0 +1,89 @@ +--- +title: Categorizing Your Compatibility Data (Windows 10) +ms.assetid: 6420f012-316f-4ef0-bfbb-14baaa664e6e +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Categorizing Your Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +To customize and filter your compatibility reports, you can create categories and subcategories to assign to your applications, computers, devices, and websites. By default, Microsoft provides the following categories: + +- **Software Vendor**. In this category, you can, for example, create a subcategory for each vendor. You can then use this category to generate reports by software vendor, which can be helpful when having discussions with a specific vendor or evaluating the vendor’s performance relative to your compatibility requirements. + +- **Test Complexity**. You can use this category to help with planning and assigning test resources. You can, for example, create subcategories like Critical and Nice-to-Have. + +Categories are extensible, multiple-selection string values, so you can use them for almost anything. For example, you can create a category for signoff from multiple owners so that software can be authorized only when all categories have been selected, indicating that each group has signed off. + +As another example, you can create a category for unit of deployment. You can use subcategories such as Division and Region. You can use this category to track the software needs of a specific deployment unit. This way, you can see when the software required by the unit has been tested, approved, and is ready for deployment to the unit. + +**Note**   +The following examples use the **<Operating\_System> - Application Report** screen. You can alternatively use the **<Application\_Name>** dialog box. You can also complete these procedures in the reports for computers, devices, and websites. + +  + +## Creating, Renaming, or Deleting Categories and Subcategories + + +You can manage your categories and subcategories from both the report screen and report-details screen. + +**To create, rename, or delete a category or subcategory** + +1. On the **<Operating\_System> - Application Report** screen, click any application name. + +2. On the **Actions** menu, click **Assign Categories**. + +3. Click **Category List**. + +4. In the **Categories** or **Subcategories** area, do any or all of the following: + + - Add a category or subcategory, by clicking **Add**. Type the name of your new category or subcategory, and then click outside the active text area. + + You must create at least one subcategory before a category will appear in the **Assign Categories** dialog box. + + - Rename a category or subcategory, by selecting the item and then clicking **Rename**. Type the new name, and then click outside the active text area. + + - Delete a category or subcategory, by selecting the item and then clicking **Remove**. + +5. After you have finished adding, renaming, and deleting categories and subcategories, click **OK** to close the **Category List** dialog box. + +## Assigning Data to a Category and Subcategory + + +You can assign categories and subcategories from both the report screen and report-details screen. + +**To assign and unassign categories and subcategories** + +1. On the **<Operating\_System> - Application Report** screen, click the application name. + +2. On the **Actions** menu, click **Assign Categories**. + +3. To assign a category, select the check box next to the applicable category or subcategory. + + To unassign a category, clear the check box. + +4. Click **OK**. + + You can use the query builder to filter based on this information. + +  + +  + + + + + diff --git a/windows/plan/change-history-for-plan-for-windows-10-deployment.md b/windows/plan/change-history-for-plan-for-windows-10-deployment.md new file mode 100644 index 0000000000..ac3bffb105 --- /dev/null +++ b/windows/plan/change-history-for-plan-for-windows-10-deployment.md @@ -0,0 +1,54 @@ +--- +title: Change history for Plan for Windows 10 deployment (Windows 10) +description: This topic lists new and updated topics in the Plan for Windows 10 deployment documentation for Windows 10 and Windows 10 Mobile. +ms.assetid: 70D9F4F8-F2A4-4FB4-9459-5B2BE7BCAC66 +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Change history for Plan for Windows 10 deployment + + +This topic lists new and updated topics in the [Plan for Windows 10 deployment](planning-for-windows-10-deployment.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). + +## December 2015 + + +| New or changed topic | Description | +|--------------------------------------------------------------------------------------------------------------------------------------------------|-------------| +| [Application Compatibility Toolkit (ACT) Technical Reference](application-compatibility-toolkit--act--technical-reference.md) (multiple topics) | New | + +  + +## November 2015 + + +| New or changed topic | Description | +|--------------------------------------------------------------------------------------------------|-------------| +| [Chromebook migration guide](chromebook-migration-guide.md) | New | +| [Windows Update for Business](windows-update-for-business.md) (multiple topics) | New | +| [Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) (multiple topics) | Updated | + +  + +## Related topics + + +[Change history for What's new in Windows 10](../whats-new/change-history-for-what-s-new-in-windows-10.md) + +[Change history for Deploy Windows 10](../deploy/change-history-for-deploy-windows-10.md) + +[Change history for Keep Windows 10 secure](../keep-secure/change-history-for-keep-windows-10-secure.md) + +[Change history for Manage and update Windows 10](../manage/change-history-for-manage-and-update-windows-10.md) + +  + +  + + + + + diff --git a/windows/plan/chromebook-migration-guide.md b/windows/plan/chromebook-migration-guide.md new file mode 100644 index 0000000000..741a3223fe --- /dev/null +++ b/windows/plan/chromebook-migration-guide.md @@ -0,0 +1,983 @@ +--- +title: Chromebook migration guide (Windows 10) +description: In this guide you will learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment. +ms.assetid: 7A1FA48A-C44A-4F59-B895-86D4D77F8BEA +keywords: ["migrate", "automate", "device"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Chromebook migration guide + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Plan Chromebook migration](#plan_migration) +- [Plan for app migration or replacement](#plan_app_migrate_replace) +- [Plan for migration of user and device settings](#plan_migrate_user_device_settings) +- [Plan for email migration](#plan_email_migrate) +- [Plan for cloud storage migration](#plan_cloud_storage_migration) +- [Plan for cloud services migration](#plan_cloud_services) +- [Plan for Windows device deployment](#plan_windevice_deploy) +- [Perform Chromebook migration](#perform_chromebook_migration) +- [Perform network infrastructure remediation](#network_infra_remediation) +- [Perform AD DS and Azure AD services deployment or remediation](#perform_ad_ds_and_azure_ad_services_deployment_or_remediation) +- [Prepare device, user, and app management systems](#prepare_device__user__and_app_management_systems) +- [Perform app migration or replacement](#perform_app_migration_or_replacement_) +- [Perform migration of user and device settings](#migrate_user_device_settings) +- [Perform email migration](#perform_email_migration) +- [Perform cloud storage migration](#perform_cloud_storage_migration) +- [Perform cloud services migration](#perform_cloud_services_migration) +- [Perform Windows device deployment](#perform_windows_device_deployment) +- [Related topics](#related_topics) + +In this guide you will learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment. You will learn how to perform the necessary planning steps, including Windows device deployment, migration of user and device settings, app migration or replacement, and cloud storage migration. You will then learn the best method to perform the migration by using automated deployment and migration tools. + +## Plan Chromebook migration + + +Before you begin to migrate Chromebook devices, plan your migration. As with most projects, there can be an urge to immediately start doing before planning. When you plan your Chromebook migration before you perform the migration, you can save countless hours of frustration and mistakes during the migration process. + +In the planning portion of this guide, you will identify all the decisions that you need to make and how to make each decision. At the end of the planning section, you will have a list of information you need to collect and what you need to do with the information. You will be ready to perform your Chromebook migration. + +## Plan for app migration or replacement + + +App migration or replacement is an essential part of your Chromebook migration. In this section you will plan how you will migrate or replace Chromebook (Chrome OS) apps that are currently in use with the same or equivalent Windows apps. At the end of this section, you will have a list of the active Chrome OS apps and the Windows app counterparts. + +**Identify the apps currently in use on Chromebook devices** + +Before you can do any analysis or make decisions about which apps to migrate or replace, you need to identify which apps are currently in use on the Chromebook devices. You will create a list of apps that are currently in use (also called an app portfolio). + +**Note**   +The majority of Chromebook apps are web apps. For these apps you need to first perform Microsoft Edge compatibility testing and then publish the web app URL to the Windows users. For more information, see the [Perform app compatibility testing for web apps](#perform_testing_webapps) section. + +  + +You can divide the apps into the following categories: + +- **Apps installed and managed by the institution.** These apps are typically managed in the Apps section in the Google Admin Console. You can record the list of these apps in your app portfolio. + +- **Apps installed by faculty or students.** Faculty or students might have installed these apps as a part of a classroom curriculum. Obtain the list of these apps from faculty or students. Ensure you only record apps that are legitimately used as a part of classroom curriculum (and not for personal entertainment or use). + +Record the following information about each app in your app portfolio: + +- App name + +- App type (such as offline app, online app, web app, and so on) + +- App publisher or developer + +- App version currently in use + +- App priority (how necessary is the app to the day-to-day process of the institution or a classroom? Rank as high, medium, or low) + +Throughout the entire app migration or replacement process, focus on the higher priority apps. Focus on lower priority apps only after you have determined what you will do with the higher priority apps. + +### + +**Select Google Apps replacements** + +Table 1 lists the Windows device app replacements for the common Google Apps on Chromebook devices. If your users rely on any of these Google Apps, use the corresponding app on the Windows device. Use the information in Table 1 to select the Google App replacement on a Windows device. + +Table 1. Google App replacements + +| If you use this Google app on a Chromebook | Use this app on a Windows device | +|--------------------------------------------|--------------------------------------| +| Google Docs | Word 2016 or Word Online | +| Google Sheets | Excel 2016 or Excel Online | +| Google Slides | PowerPoint 2016 or PowerPoint Online | +| Google Apps Gmail | Outlook 2016 or Outlook Web App | +| Google Hangouts | Microsoft Skype for Business | +| Chrome | Microsoft Edge | +| Google Drive | Microsoft OneDrive for Business | + +  + +It may be that you will decide to replace Google Apps after you deploy Windows devices. For more information on making this decision, see the [Select cloud services migration strategy](#select_CS_migrationstrat) section of this guide. + +**Find the same or similar apps in the Windows Store** + +In many instances, software vendors will create a version of their app for multiple platforms. You can search the Windows Store to find the same or similar apps to any apps not identified in the [Select Google Apps replacements](#select_googleapps) section. + +In other instances, the offline app does not have a version written for the Windows Store or is not a web app. In these cases, look for an app that provides similar functions. For example, you might have a graphing calculator offline Android app published on the Chrome OS, but the software publisher does not have a version for Windows devices. Search the Windows Store for a graphing calculator app that provides similar features and functionality. Use that Windows Store app as a replacement for the graphing calculator offline Android app published on the Chrome OS. + +Record the Windows app that replaces the Chromebook app in your app portfolio. + +### + +**Perform app compatibility testing for web apps** + +The majority of Chromebook apps are web apps. Because you cannot run native offline Chromebook apps on a Windows device, there is no reason to perform app compatibility testing for offline Chromebook apps. However, you may have a number of web apps that will run on both platforms. + +Ensure that you test these web apps in Microsoft Edge. Record the level of compatibility for each web app in Microsoft Edge in your app portfolio. + +## Plan for migration of user and device settings + + +Some institutions have configured the Chromebook devices to make the devices easier to use by using the Google Chrome Admin Console. You have also probably configured the Chromebook devices to help ensure the user data access and ensure that the devices themselves are secure by using the Google Chrome Admin Console. + +However, in addition to your centralized configuration in the Google Admin Console, Chromebook users have probably customized their device. In some instances, users may have changed the web content that is displayed when the Chrome browser starts. Or they may have bookmarked websites for future reference. Or users may have installed apps for use in the classroom. + +In this section, you will identify the user and device configuration settings for your Chromebook users and devices. Then you will prioritize these settings to focus on the configuration settings that are essential to your educational institution. + +At the end of this section, you should have a list of Chromebook user and device settings that you want to migrate to Windows, as well as a level of priority for each setting. You may discover at the end of this section that you have few or no higher priority settings to be migrated. If this is the case, you can skip the [Perform migration of user and device settings](#migrate_user_device_settings) section of this guide. + +**Identify Google Admin Console settings to migrate** + +You use the Google Admin Console (as shown in Figure 1) to manage user and device settings. These settings are applied to all the Chromebook devices in your institution that are enrolled in the Google Admin Console. Review the user and device settings in the Google Admin Console and determine which settings are appropriate for your Windows devices. + +![figure 1](images/chromebook-fig1-googleadmin.png) + +Figure 1. Google Admin Console + +Table 2 lists the settings in the Device Management node in the Google Admin Console. Review the settings and determine which settings you will migrate to Windows. + +Table 2. Settings in the Device Management node in the Google Admin Console + + ++++ + + + + + + + + + + + + + + + + + + + + +
SectionSettings
Network

These settings configure the network connections for Chromebook devices and include the following settings categories:

+
    +
  • Wi-Fi. Configures the Wi-Fi connections that are available. The Windows devices will need these configuration settings to connect to the same Wi-Fi networks.

  • +
  • Ethernet. Configures authentication for secured, wired Ethernet connections (802.1x). The Windows devices will need these configuration settings to connect to the network.

  • +
  • VPN. Specifies the VPN network connections used by devices when not directly connected to your intranet. The Windows devices will need the same VPN network connections for users to remotely connect to your intranet.

  • +
  • Certificates. Contains the certificates used for network authentication. The Windows devices will need these certificates to connect to the network.

  • +
Mobile

These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:

+
    +
  • Device management settings. Configures settings for mobile (companion) devices, such as device synchronization, password settings, auditing, enable remote wipe, and other settings. Record these settings so that you can ensure the same settings are applied when the devices are being managed by Microsoft Intune or another mobile device management (MDM) provider.

  • +
  • Device activation. Contains a list of mobile (companion) devices that need to be approved for management by using the Google Admin Console. Approve or block any devices in this list so that the list of managed devices accurately reflects active managed devices.

  • +
  • Managed devices. Performs management tasks on mobile (companion) devices that are managed by the Google Admin Console. Record the list of companion devices on this page so that you can ensure the same devices are managed by Intune or another MDM provider.

  • +
  • Set Up Apple Push Certificate. Configures the certificate that is essentially the digital signature that lets the Google Admin Console manage iOS devices. You will need this certificate if you plan to manage iOS devices by using Intune or another MDM provider.

  • +
  • Set Up Android for Work. Authorizes the Google Admin Console to be the MDM provider for Android devices by providing an Enterprise Mobility Management (EMM) token. You will need this token if you plan to manage Android devices by using another MDM provider.

  • +
Chrome management

These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:

+
    +
  • User settings. Configures user-based settings for the Chrome browser and Chromebook devices. Most of these Chromebook user-based settings can be mapped to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.

  • +
  • Public session settings. Configures Public Sessions for Chrome devices that are used as kiosks, loaner devices, shared computers, or for any other work or school-related purpose for which users don't need to sign in with their credentials. You can configure Windows devices similarly by using Assigned Access. Record the settings and apps that are available in Public Sessions so that you can provide similar configuration in Assigned Access.

  • +
  • Device settings. Configures device-based settings for the Chrome browser and Chromebook devices. You can map most of these Chromebook device-based settings to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.

  • +
  • Devices. Manages Chrome device management licenses. The number of licenses recorded here should correspond to the number of licenses you will need for your new management system, such as Intune. Record the number of licenses and use those to determine how many licenses you will need to manage your Windows devices.

  • +
  • App Management. Provides configuration settings for Chrome apps. Record the settings for any apps that you have identified that will run on Windows devices.

  • +
+ +  + +Table 3 lists the settings in the Security node in the Google Admin Console. Review the settings and determine which settings you will migrate to Windows. + +Table 3. Settings in the Security node in the Google Admin Console + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SectionSettings

Basic settings

These settings configure password management and whether or not two-factor authentication (2FA) is configured. You can set the minimum password length, the maximum password length, if non-admin users can recover their own passwords, and enable 2FA.

+

Record these settings and use them to help configure your on-premises Active Directory or Azure Active Directory (Azure AD) to mirror the current behavior of your Chromebook environment.

Password monitoring

This section is used to monitor the strength of user passwords. You don’t need to migrate any settings in this section.

API reference

This section is used to enable access to various Google Apps Administrative APIs. You don’t need to migrate any settings in this section.

Set up single sign-on (SSO)

This section is used to configure SSO for Google web-based apps (such as Google Apps Gmail or Google Apps Calendar). While you don’t need to migrate any settings in this section, you probably will want to configure Azure Active Directory synchronization to replace Google-based SSO.

Advanced settings

This section is used to configure administrative access to user data and to configure the Google Secure Data Connector (which allows Google Apps to access data on your local network). You don’t need to migrate any settings in this section.

+ +  + +**Identify locally-configured settings to migrate** + +In addition to the settings configured in the Google Admin Console, users may have locally configured their devices based on their own personal preferences (as shown in Figure 2). Table 4 lists the Chromebook user and device settings that you can locally configure. Review the settings and determine which settings you will migrate to Windows. Some of the settings listed in Table 4 can only be seen when you click the **Show advanced settings** link (as shown in Figure 2). + +![figure 2](images/fig2-locallyconfig.png) + +Figure 2. Locally-configured settings on Chromebook + +Table 4. Locally-configured settings + +| Section | Settings | +|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Internet connections | These settings configure the Internet connection for the devices, such as Wi-Fi and VPN connections. Record the network connection currently in use and configure the Windows device to use the same network connection settings. | +| Appearances | These settings affect the appearance of the desktop. Record the wallpaper image file that is used. Migrate the image file to the Windows device and configure as the user’s wallpaper to maintain similar user experience. | +| Search | These settings configure which search engine is used to search for content. Record this setting so that you can use as the search engine on the Windows device. | +| Advanced sync settings | These settings configure which user settings are synchronized with the Google cloud, such as Apps, Extensions, History, Passwords, Settings, and so on. Record these settings and configure the Windows device with the same settings if you decide to continue to use Google Apps and other cloud services after you migrate to Windows devices. | +| Date and time | These settings configure the time zone and if 24-hour clock time should be used. Record these settings and configure the Windows device to use these settings. | +| Privacy | These settings configure Google Chrome web browser privacy settings (such as prediction service, phishing and malware protection, spelling errors, resource pre-fetch, and so on). Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. | +| Bluetooth | This setting configures whether or not Bluetooth is enabled on the device. Record this setting and configure the Windows device similarly. | +| Passwords and forms | These settings configure Google Chrome web browser to enable autofill of web forms and to save web passwords. Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. | +| Smart lock | These settings configure the Chromebook when the user’s Android phone is nearby and unlocked, which eliminates the need to type a password. You don’t need to migrate settings in this section. | +| Web content | These settings configure how the Chrome web browser displays content (such as font size and page zoom). Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. | +| Languages | These settings configure the language in use for the Chromebook. Record these settings and configure the Windows device to support the same language. | +| Downloads | These settings configure the default folder for file download, if the user should be prompted where to save files, and if the Google Drive account should be disconnected. Record these settings and configure the Windows device with similar settings. | +| HTTPS/SSL | These settings configure client-side certificates that are used to authenticate the device. Depending on the services or apps that use these certificates, you may need to export and then migrate these certificates to the Windows device. Contact the service or app provider to determine if you can use the existing certificate or if a new certificate needs to be issued. Record these settings and migrate the certificate to the Windows device or enroll for a new certificate as required by the service or app. | +| Google Cloud Print | These settings configure the printers that are available to the user. Record the list of printers available to the user and configure the Windows device to have the same printers available. Ensure that the user-friendly printer names in Windows are the same as for the Chromebook device. For example, if the Chromebook device has a printer named “Laser Printer in Registrar’s Office”, use that same name in Windows. | +| On startup | These settings configure which web pages are opened when the Chrome web browser starts. Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. | +| Accessibility | These settings configure the Chromebook ease of use (such as display of large mouse cursor, use of high contrast mode, enablement of the screen magnifier, and so on). Record these settings and configure the Windows device with similar settings. | +| Powerwash | This action removes all user accounts and resets the Chromebook device back to factory settings. You don’t have to migrate any settings in this section. | +| Reset settings | This action retains all user accounts, but restores all settings back to their default values. You don’t have to migrate any settings in this section. | + +  + +Determine how many users have similar settings and then consider managing those settings centrally. For example, a large number of users may have many of the same Chrome web browser settings. You can centrally manage these settings in Windows after migration. + +Also, as a part of this planning process, consider settings that may not be currently managed centrally, but should be managed centrally. Record the settings that are currently being locally managed, but you want to manage centrally after the migration. + +**Prioritize settings to migrate** + +After you have collected all the Chromebook user, app, and device settings that you want to migrate, you need to prioritize each setting. Evaluate each setting and assign a priority to the setting based on the levels of high, medium, and low. + +Assign the setting-migration priority based on how critical the setting is to the faculty performing their day-to-day tasks and how the setting affects the curriculum in the classrooms. Focus on the migration of higher priority settings and put less effort into the migration of lower priority settings. There may be some settings that are not necessary at all and can be dropped from your list of settings entirely. Record the setting priority in the list of settings you plan to migrate. + +## Plan for email migration + + +Many of your users may be using Google Apps Gmail to manage their email, calendars, and contacts. You need to create the list of users you will migrate and the best time to perform the migration. + +Office 365 supports automated migration from Google Apps Gmail to Office 365. For more information, see [Migrate Google Apps mailboxes to Office 365](http://go.microsoft.com/fwlink/p/?LinkId=690252). + +**Identify the list of user mailboxes to migrate** + +In regards to creating the list of users you will migrate, it might seem that the answer “all the users” might be the best one. However, depending on the time you select for migration, only a subset of the users may need to be migrated. For example, you may not persist student email accounts between semesters or between academic years. In this case you would only need to migrate faculty and staff. + +Also, when you perform a migration it is a great time to verify that all user mailboxes are active. In many environments there are a significant number of mailboxes that were provisioned for users that are no longer a part of the institution (such as interns or student assistants). You can eliminate these users from your list of user mailboxes to migrate. + +Create your list of user mailboxes to migrate in Excel 2016 based on the format described in step 7 in [Create a list of Gmail mailboxes to migrate](http://go.microsoft.com/fwlink/p/?LinkId=690253). If you follow this format, you can use the Microsoft Excel spreadsheet to perform the actual migration later in the process. + +**Identify companion devices that access Google Apps Gmail** + +In addition to Chromebook devices, users may have companion devices (smartphones, tablets, desktops, laptops, and so on) that also access the Google Apps Gmail mailbox. You will need to identify those companion devices and identify the proper configuration for those devices to access Office 365 mailboxes. + +After you have identified each companion device, verify the settings for the device that are used to access Office 365. You only need to test one type of each companion device. For example, if users use Android phones to access Google Apps Gmail mailboxes, configure the device to access Office 365 and then record those settings. You can publish those settings on a website or to your helpdesk staff so that users will know how to access their Office 365 mailbox. + +In most instances, users will only need to provide in their Office 365 email account and password. However, you should verify this on each type of companion device. For more information about how to configure a companion device to work with Office 365, see [Compare how different mobile devices work with Office 365](http://go.microsoft.com/fwlink/p/?LinkId=690254). + +**Identify the optimal timing for the migration** + +Typically, the best time to perform the migration is between academic years or during semester breaks. Select the time of least activity for your institution. And during that time, the optimal time to perform the migration might be during an evening or over a weekend. + +Ensure that you communicate the time the migration will occur to your users well in advance. Also, ensure that users know how to access their Office 365 email after the migration is complete. Finally, ensure that your users know how to perform the common tasks they performed in Google Apps Gmail in Office 365 and/or Outlook 2016. + +## Plan for cloud storage migration + + +Chromebook devices have limited local storage. So, most of your users will store data in cloud storage, such as Google Drive. You will need to plan how to migrate your cloud storage as a part of the Chromebook migration process. + +In this section, you will create a list of the existing cloud services, select the Microsoft cloud services that best meet your needs, and then optimize your cloud storage services migration plan. + +**Identify cloud storage services currently in use** + +Typically, most Chromebook users use Google Drive for cloud storage services because your educational institution purchased other Google cloud services and Google Drive is a part of those services. However, some users may use cloud storage services from other vendors. For each member of your faculty and staff and for each student, create a list of cloud storage services that includes the following: + +- Name of the cloud storage service + +- Cloud storage service vendor + +- Associated licensing costs or fees + +- Approximate storage currently in use per user + +Use this information as the requirements for your cloud storage services after you migrate to Windows devices. If at the end of this discovery you determine there is no essential data being stored in cloud storage services that requires migration, then you can skip to the [Plan for cloud services migration](#plan_cloud_services) section. + +**Optimize cloud storage services migration plan** + +Now that you know the current cloud storage services configuration, you need to optimize your cloud storage services migration plan for Microsoft OneDrive for Business. Optimization helps ensure that your use only the cloud storage services resources that are necessary for your requirements. + +Consider the following to help optimize your cloud storage services migration plan: + +- **Eliminate inactive user storage.** Before you perform the cloud storage services migration, identify cloud storage that is currently allocated to inactive users. Remove this storage from your list of cloud storage to migrate. + +- **Eliminate or archive inactive files.** Review cloud storage to identify files that are inactive (have not been accessed for some period of time). Eliminate or archive these files so that they do not consume cloud storage. + +- **Consolidate cloud storage services.** If multiple cloud storage services are in use, reduce the number of cloud storage services and standardize on one cloud storage service. This will help reduce management complexity, support time, and typically will reduce cloud storage costs. + +Record your optimization changes in your cloud storage services migration plan. + +## Plan for cloud services migration + + +Many of your users may use cloud services on their Chromebook device, such as Google Apps, Google Drive, or Google Apps Gmail. You have planned for these individual cloud services in the [Plan for app migration or replacement](#plan_app_migrate_replace), [Plan for Google Apps Gmail to Office 365 migration](#plan_email_migrate), and [Plan for cloud storage migration](#plan_cloud_storage_migration) sections. + +In this section, you will create a combined list of these cloud services and then select the appropriate strategy to migrate these cloud services. + +### + +**Identify cloud services currently in use** + +You have already identified the individual cloud services that are currently in use in your educational institution in the [Plan for app migration or replacement](#plan_app_migrate_replace), [Plan for Google Apps Gmail to Office 365 migration](#plan_email_migrate), and [Plan for cloud storage migration](#plan_cloud_storage_migration) sections. Create a unified list of these cloud services and record the following about each service: + +- Cloud service name + +- Cloud service provider + +- Number of users that use the cloud service + +**Select cloud services to migrate** + +One of the first questions you should ask after you identify the cloud services currently in use is, “Why do we need to migrate from these cloud services?” The answer to this question largely comes down to finances and features. + +Here is a list of reasons that describe why you might want to migrate from an existing cloud service to Microsoft cloud services: + +- **Better integration with Office 365.** If your long-term strategy is to migrate to Office 365 apps (such as Word 2016 or Excel 2016) then a migration to Microsoft cloud services will provide better integration with these apps. The use of existing cloud services may not be as intuitive for users. For example, Office 365 apps will integrate better with OneDrive for Business compared to Google Drive. + +- **Online apps offer better document compatibility.** Microsoft Office online apps (such as Word Online and Excel Online) provide the highest level of compatibility with Microsoft Office documents. The Office online apps allow you to open and edit documents directly from SharePoint or OneDrive for Business. Users can access the Office online app from any device with Internet connectivity. + +- **Reduce licensing costs.** If you pay for Office 365 licenses, then Office 365 apps and cloud storage are included in those licenses. Although you could keep existing cloud services, you probably would pay more to keep those services. + +- **Improve storage capacity and cross-platform features.** Microsoft cloud services provide competitive storage capacity and provide more Windows-centric features than other cloud services providers. While the Microsoft cloud services user experience is highly optimized for Windows devices, Microsoft cloud services are also highly optimized for companion devices (such as iOS or Android devices). + +Review the list of existing cloud services that you created in the [Identify cloud services currently in use](#identify_cloud_services_inuse) section and identify the cloud services that you want to migrate to Microsoft cloud services. If you determine at the end of this task that there are no cloud services to be migrated, then skip to the [Plan for Windows device deployment](#plan_windevice_deploy) section. Also, skip the [Perform cloud services migration](#perform_cloud_services_migration) section later in this guide. + +**Prioritize cloud services** + +After you have created your aggregated list of cloud services currently in use by Chromebook users, prioritize each cloud service. Evaluate each cloud service and assign a priority based on the levels of high, medium, and low. + +Assign the priority based on how critical the cloud service is to the faculty and staff performing their day-to-day tasks and how the cloud service affects the curriculum in the classrooms. Also, make cloud services that are causing pain for the users a higher priority. For example, if users experience outages with a specific cloud service, then make migration of that cloud service a higher priority. + +Focus on the migration of higher priority cloud services first and put less effort into the migration of lower priority cloud services. There may be some cloud services that are unnecessary and you can remove them from your list of cloud services to migrate entirely. Record the cloud service migration priority in the list of cloud services you plan to migrate. + +### + +**Select cloud services migration strategy** + +When you deploy the Windows devices, should you migrate the faculty, staff, and students to the new cloud services? Perhaps. But, in most instances you will want to select a migration strategy that introduces a number of small changes over a period of time. + +Consider the following when you create your cloud services migration strategy: + +- **Introduce small changes.** The move from Chrome OS to Windows will be simple for most users as most will have exposure to Windows from home, friends, or family. However, users may not be as familiar with the apps or cloud services. Consider the move to Windows first, and then make other changes as time progresses. + +- **Start off by using existing apps and cloud services.** Immediately after the migration to Windows devices, you may want to consider running the existing apps and cloud services (such Google Apps, Google Apps Gmail, and Google Drive). This gives users a familiar method to perform their day-to-day tasks. + +- **Resolve pain points.** If some existing apps or cloud services cause problems, you may want to migrate them sooner rather than later. In most instances, users will be happy to go through the learning curve of a new app or cloud service if it is more reliable or intuitive for them to use. + +- **Migrate classrooms or users with common curriculum.** Migrate to Windows devices for an entire classroom or for multiple classrooms that share common curriculum. You must ensure that the necessary apps and cloud services are available for the curriculum prior to the migration of one or more classrooms. + +- **Migrate when the fewest number of active users are affected.** Migrate your cloud services at the end of an academic year or end of a semester. This will ensure you have minimal impact on faculty, staff, and students. Also, a migration during this time will minimize the learning curve for users as they are probably dealing with new curriculum for the next semester. Also, you may not need to migrate student apps and data because many educational institutions do not preserve data between semesters or academic years. + +- **Overlap existing and new cloud services.** For faculty and staff, consider overlapping the existing and new cloud services (having both services available) for one business cycle (end of semester or academic year) after migration. This allows you to easily recover any data that might not have migrated successfully from the existing cloud services. At a minimum, overlap the user of existing and new cloud services until the user can verify the migration. Of course, the tradeoff for using this strategy is the cost of the existing cloud services. However, depending on when license renewal occurs, the cost may be minimal. + +## Plan for Windows device deployment + + +You need to plan for Windows device deployment to help ensure that the devices are successfully installed and configured to replace the Chromebook devices. Even if the vendor that provides the devices pre-loads Windows 10 on them, you still will need to perform other tasks. + +In this section you will select a Windows device deployment strategy; plan for Active Directory Domain Services (AD DS) and Azure AD services; plan for device, user, and app management; and plan for any necessary network infrastructure remediation. + +### + +**Select a Windows device deployment strategy** + +What decisions need to be made about Windows device deployment? You just put the device on a desk, hook up power, connect to Wi-Fi, and then let the users operate the device, right? That is essentially correct, but depending on the extent of your deployment and other factors, you need to consider different deployment strategies. + +For each classroom that has Chromebook devices, select a combination of the following device deployment strategies: + +- **Deploy one classroom at a time.** In most cases you will want to perform your deployment in batches of devices and a classroom is an excellent way to batch devices. You can treat each classroom as a unit and check each classroom off your list after you have deployed the devices. + +- **Deploy based on curriculum.** Deploy the Windows devices after you have confirmed that the curriculum is ready for the Windows devices. If you deploy Windows devices without the curriculum installed and tested, you could significantly reduce the ability for students and teachers to perform effectively in the classroom. Also, deployment based on curriculum has the advantage of letting you move from classroom to classroom quickly if multiple classrooms use the same curriculum. + +- **Deploy side-by-side.** In some instances you may need to have both the Chromebook and Windows devices in one or more classrooms. You can use this strategy if some of the curriculum only works on Chromebook and other parts of the curriculum works on Windows devices. This is a good method to help prevent delays in Windows device deployment, while ensuring that students and teachers can make optimal use of technology in their curriculum. + +- **Deploy after apps and cloud services migration.** If you deploy a Windows device without the necessary apps and cloud services to support the curriculum, this provides only a portion of your complete solution. Ensure that the apps and cloud services are tested, provisioned, and ready for use prior to the deployment of Windows devices. + +- **Deploy after the migration of user and device settings.** Ensure that you have identified the user and device settings that you plan to migrate and that those settings are ready to be applied to the new Windows devices. For example, you would want to create Group Policy Objects (GPOs) to apply the user and device settings to Windows devices. + + If you ensure that Windows devices closely mirror the Chromebook device configuration, you will ease user learning curve and create a sense of familiarity. Also, when you have the settings ready to be applied to the devices, it helps ensure you will deploy your new Windows devices in a secure configuration. + +Record the combination of Windows device deployment strategies that you selected. + +### + +**Plan for AD DS and Azure AD services** + +The next decision you will need to make concerns AD DS and Azure AD services. You can run AD DS on-premises, in the cloud by using Azure AD, or a combination of both (hybrid). The decision about which of these options is best is closely tied to how you will manage your users, apps, and devices and if you will use Office 365 and other Azure-based cloud services. + +In the hybrid configuration, your on-premises AD DS user and group objects are synchronized with Azure AD (including passwords). The synchronization happens both directions so that changes are made in both your on-premises AD DS and Azure AD. + +Table 5 is a decision matrix that helps you decide if you can use only on-premises AD DS, only Azure AD, or a combination of both (hybrid). If the requirements you select from the table require on-premises AD DS and Azure AD, then you should select hybrid. For example, if you plan to use Office 365 and use Group Policy for management, then you would select hybrid. However, if you plan to use Office 365 and use Intune for management, then you would select only Azure AD. + +Table 5. Select on-premises AD DS, Azure AD, or hybrid + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
If you plan to...On-premises AD DSAzure ADHybrid
Use Office 365XX
Use Intune for managementXX
Use System Center 2012 R2 Configuration Manager for managementXX
Use Group Policy for managementXX
Have devices that are domain-joinedXX
Allow faculty and students to Bring Your Own Device (BYOD) which are not domain-joinedXX
+ +  + +### + +**Plan device, user, and app management** + +You may ask the question, “Why plan for device, user, and app management before you deploy the device?” The answer is that you will only deploy the device once, but you will manage the device throughout the remainder of the device's lifecycle. + +Also, planning management before deployment is essential to being ready to support the devices as you deploy them. You want to have your management processes and technology in place when the first teachers, facility, or students start using their new Windows device. + +Table 6 is a decision matrix that lists the device, user, and app management products and technologies and the features supported by each product or technology. The primary device, user, and app management products and technologies include Group Policy, System Center Configuration Manager, Intune, and the Microsoft Deployment Toolkit (MDT). Use this decision matrix to help you select the right combination of products and technologies for your plan. + +Table 6. Device, user, and app management products and technologies + + +++++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Desired featureWindows provisioning packagesGroup PolicyConfiguration ManagerIntuneMDTWindows Software Update Services
Deploy operating system imagesXXX
Deploy apps during operating system deploymentXXX
Deploy apps after operating system deploymentXXX
Deploy software updates during operating system deploymentXX
Deploy software updates after operating system deploymentXXXXX
Support devices that are domain-joinedXXXXX
Support devices that are not domain-joinedXXX
Use on-premises resourcesXXXX
Use cloud-based servicesX
+ +  + +You can use Configuration Manager and Intune in conjunction with each other to provide features from both products and technologies. In some instances you may need only one of these products or technologies. In other instances, you may need two or more to meet the device, user, and app management needs for your institution. + +Record the device, user, and app management products and technologies that you selected. + +### + +**Plan network infrastructure remediation** + +In addition to AD DS, Azure AD, and management components, there are other network infrastructure services that Windows devices need. In most instances, Windows devices have the same network infrastructure requirements as the existing Chromebook devices. + +Examine each of the following network infrastructure technologies and services and determine if any remediation is necessary: + +- **Domain Name System (DNS)** provides translation between a device name and its associated IP address. For Chromebook devices, public facing, Internet DNS services are the most important. For Windows devices that only access the Internet, they have the same requirements. + + However, if you intend to communicate between Windows devices (peer-to-peer or client/server) then you will need local DNS services. Windows devices will register their name and IP address with the local DNS services so that Windows devices can locate each other. + +- **Dynamic Host Configuration Protocol (DHCP)** provides automatic IP configuration for devices. Your existing Chromebook devices probably use DHCP for configuration. If you plan to immediately replace the Chromebook devices with Windows devices, then you only need to release all the DHCP reservations for the Chromebook devices prior to the deployment of Windows devices. + + If you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that your DHCP service has adequate IP addresses available for both sets of devices. + +- **Wi-Fi.** Chromebook devices are designed to connect to Wi-Fi networks. Windows devices are the same. Your existing Wi-Fi network for the Chromebook devices should be adequate for the same number of Windows devices. + + If you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that Wi-Fi network can support the number of devices. + +- **Internet bandwidth.** Chromebook devices consume more Internet bandwidth (up to 700 times more) than Windows devices. This means that if your existing Internet bandwidth is adequate for the Chromebook devices, then the bandwidth will be more than adequate for Windows devices. + + However, if you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that your Internet connection can support the number of devices. + + For more information that compares Internet bandwidth consumption for Chromebook and Windows devices, see the following resources: + + - [Chromebook vs. Windows Notebook Network Traffic Analysis](http://go.microsoft.com/fwlink/p/?LinkId=690255) + + - [Hidden Cost of Chromebook Deployments](http://go.microsoft.com/fwlink/p/?LinkId=690256) + + - [Microsoft Windows 8.1 Notebook vs. Chromebooks for Education](http://go.microsoft.com/fwlink/p/?LinkId=690257) + +- **Power.** Although not specifically a network infrastructure, you need to ensure your classrooms have adequate power. Chromebook and Windows devices should consume similar amounts of power. This means that your existing power outlets should support the same number of Windows devices. + + If you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, you need to ensure that the power outlets, power strips, and other power management components can support the number of devices. + +At the end of this process, you may determine that no network infrastructure remediation is necessary. If so, you can skip the [Perform network infrastructure remediation](#network_infra_remediation) section of this guide. + +## Perform Chromebook migration + + +Thus far, planning has been the primary focus. Believe it or not most of the work is now done. The rest of the Chromebook migration is just the implementation of the plan you have created. + +In this section you will perform the necessary steps for the Chromebook device migration. You will perform the migration based on the planning decision that you made in the [Plan Chromebook migration](#plan_migration) section earlier in this guide. + +You must perform some of the steps in this section in a specific sequence. Each section has guidance about when to perform a step. You can perform other steps before, during, or after the migration. Again, each section will tell you if the sequence is important. + +## Perform network infrastructure remediation + + +The first migration task is to perform any network infrastructure remediation. In the [Plan network infrastructure remediation](#plan_network_infra_remediation) section, you determined the network infrastructure remediation (if any) that you needed to perform. + +It is important that you perform any network infrastructure remediation first because the remaining migration steps are dependent on the network infrastructure. Table 7 lists the Microsoft network infrastructure products and technologies and deployment resources for each. + +Table 7. Network infrastructure products and technologies and deployment resources + + ++++ + + + + + + + + + + + + + + + + +
Product or technologyResources
DHCP
    +
  • [Core Network Guide](http://go.microsoft.com/fwlink/p/?LinkId=733920)

  • +
  • [DHCP Deployment Guide](http://go.microsoft.com/fwlink/p/?LinkId=734021)

  • +
DNS
    +
  • [Core Network Guide](http://go.microsoft.com/fwlink/p/?LinkId=733920)

  • +
  • [Deploying Domain Name System (DNS)](http://go.microsoft.com/fwlink/p/?LinkId=734022)

  • +
+ +  + +If you use network infrastructure products and technologies from other vendors, refer to the vendor documentation on how to perform the necessary remediation. If you determined that no remediation is necessary, you can skip this section. + +## Perform AD DS and Azure AD services deployment or remediation + + +It is important that you perform AD DS and Azure AD services deployment or remediation right after you finish network infrastructure remediation. Many of the remaining migration steps are dependent on you having your identity system (AD DS or Azure AD) in place and up to necessary expectations. + +In the [Plan for Active Directory services](#plan_ADservices) section, you determined the AD DS and/or Azure AD deployment or remediation (if any) that needed to be performed. Table 8 list AD DS, Azure AD, and the deployment resources for both. Use the resources in this table to deploy or remediate on-premises AD DS, Azure AD, or both. + +Table 8. AD DS, Azure AD and deployment resources + + ++++ + + + + + + + + + + + + + + + + +
Product or technologyResources
AD DS
    +
  • [Core Network Guide](http://go.microsoft.com/fwlink/p/?LinkId=733920)

  • +
  • [Active Directory Domain Services Overview](http://go.microsoft.com/fwlink/p/?LinkId=733909)

  • +
Azure AD
    +
  • [Azure Active Directory documentation](http://go.microsoft.com/fwlink/p/?LinkId=690258)

  • +
  • [Manage and support Azure Active Directory Premium](http://go.microsoft.com/fwlink/p/?LinkId=690259)

  • +
  • [Guidelines for Deploying Windows Server Active Directory on Azure Virtual Machines](http://go.microsoft.com/fwlink/p/?LinkId=690260)

  • +
+ +  + +If you decided not to migrate to AD DS or Azure AD as a part of the migration, or if you determined that no remediation is necessary, you can skip this section. If you use identity products and technologies from another vendor, refer to the vendor documentation on how to perform the necessary steps. + +## Prepare device, user, and app management systems + + +In the [Plan device, user, and app management](#plan_userdevapp_manage) section of this guide, you selected the products and technologies that you will use to manage devices, users, and apps on Windows devices. You need to prepare your management systems prior to Windows 10 device deployment. You will use these management systems to manage the user and device settings that you selected to migrate in the [Plan for migration of user and device settings](#plan_migrate_user_device_settings) section. You need to prepare these systems prior to the migration of user and device settings. + +Table 9 lists the Microsoft management systems and the deployment resources for each. Use the resources in this table to prepare (deploy or remediate) these management systems. + +Table 9. Management systems and deployment resources + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Management systemResources
Windows provisioning packages
    +
  • [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkId=733918)

  • +
  • [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=733911)

  • +
  • [Step-By-Step: Building Windows 10 Provisioning Packages](http://go.microsoft.com/fwlink/p/?LinkId=690261)

  • +
Group Policy
    +
  • [Core Network Companion Guide: Group Policy Deployment](http://go.microsoft.com/fwlink/p/?LinkId=733915)

  • +
  • [Deploying Group Policy](http://go.microsoft.com/fwlink/p/?LinkId=734024)

  • +
Configuration Manager
    +
  • [Site Administration for System Center 2012 Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=733914)

  • +
  • [Deploying Clients for System Center 2012 Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=733919)

  • +
Intune
    +
  • [Set up and manage devices with Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkId=690262)

  • +
  • [Smoother Management Of Office 365 Deployments with Windows Intune](http://go.microsoft.com/fwlink/p/?LinkId=690263)

  • +
  • [System Center 2012 R2 Configuration Manager & Windows Intune](http://go.microsoft.com/fwlink/p/?LinkId=690264)

  • +
MDT
    +
  • [MDT documentation in the Microsoft Deployment Toolkit (MDT) 2013](http://go.microsoft.com/fwlink/p/?LinkId=690324)

  • +
  • [Step-By-Step: Installing Windows 8.1 From A USB Key](http://go.microsoft.com/fwlink/p/?LinkId=690265)

  • +
+ +  + +If you determined that no new management system or no remediation of existing systems is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps. + +## Perform app migration or replacement + + +In the [Plan for app migration or replacement](#plan_app_migrate_replace) section, you identified the apps currently in use on Chromebook devices and selected the Windows apps that will replace the Chromebook apps. You also performed app compatibility testing for web apps to ensure that web apps on the Chromebook devices would run on Microsoft Edge and Internet Explorer. + +In this step, you need to configure your management system to deploy the apps to the appropriate Windows users and devices. Table 10 lists the Microsoft management systems and the app deployment resources for each. Use the resources in this table to configure these management systems to deploy the apps that you selected in the [Plan for app migration or replacement](#plan_app_migrate_replace) section of this guide. + +Table 10. Management systems and app deployment resources + + ++++ + + + + + + + + + + + + + + + + + + + + +
Management systemResources
Group Policy
    +
  • [Editing an AppLocker Policy](http://go.microsoft.com/fwlink/p/?LinkId=734025)

  • +
  • [Group Policy Software Deployment Background](http://go.microsoft.com/fwlink/p/?LinkId=734026)

  • +
  • [Assigning and Publishing Software](http://go.microsoft.com/fwlink/p/?LinkId=734027)

  • +
Configuration Manager
    +
  • [How to Deploy Applications in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=733917)

  • +
  • [Application Management in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=733907)

  • +
Intune
    +
  • [Deploy apps to mobile devices in Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkId=733913)

  • +
  • [Manage apps with Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkId=733910)

  • +
+ +  + +If you determined that no deployment of apps is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps. + +## Perform migration of user and device settings + + +In the [Plan for migration of user and device settings](#plan_migrate_user_device_settings) section, you determined the user and device settings that you want to migrate. You selected settings that are configured in the Google Admin Console and locally on the Chromebook device. + +Perform the user and device setting migration by using the following steps: + +1. From the list of institution-wide settings that you created in the [Plan for migration of user and device settings](#plan_migrate_user_device_settings) section, configure as many as possible in your management system (such as Group Policy, Configuration Manager, or Intune). + +2. From the list of device-specific settings that you created in the [Plan for migration of user and device settings](#plan_migrate_user_device_settings) section, configure device-specific setting for higher priority settings. + +3. From the list of user-specific settings that you created in the [Plan for migration of user and device settings](#plan_migrate_user_device_settings) section, configure user-specific setting for higher priority settings. + +4. Verify that all higher-priority user and device settings have been configured in your management system. + +If you do no want to migrate any user or device settings from the Chromebook devices to the Windows devices, you can skip this section. + +## Perform email migration + + +In the [Plan for email migration](#plan_email_migrate) section, you identified the user mailboxes to migrate, identified the companion devices that access Google Apps Gmail, and identified the optimal timing for migration. You can perform this migration before or after you deploy the Windows devices. + +Office 365 supports automated migration from Google Apps Gmail to Office 365. For more information on how to automate the migration from Google Apps Gmail to Office 365, see [Migrate Google Apps mailboxes to Office 365](http://go.microsoft.com/fwlink/p/?LinkId=690252). + +Alternatively, if you want to migrate to Office 365 from: + +- **On-premises Microsoft Exchange Server.** Use the following resources to migrate to Office 365 from an on-premises Microsoft Exchange Server: + + - [Cutover Exchange Migration and Single Sign-On](http://go.microsoft.com/fwlink/p/?LinkId=690266) + + - [Step-By-Step: Migration of Exchange 2003 Server to Office 365](http://go.microsoft.com/fwlink/p/?LinkId=690267) + + - [Step-By-Step: Migrating from Exchange 2007 to Office 365](http://go.microsoft.com/fwlink/p/?LinkId=690268) + +- **Another on-premises or cloud-based email service.** Follow the guidance from that vendor. + +## Perform cloud storage migration + + +In the [Plan for cloud storage migration](#plan_cloud_storage_migration) section, you identified the cloud storage services currently in use, selected the Microsoft cloud storage services that you will use, and optimized your cloud storage services migration plan. You can perform the cloud storage migration before or after you deploy the Windows devices. + +Manually migrate the cloud storage migration by using the following steps: + +1. Install both Google Drive app and OneDrive for Business or OneDrive app on a device. + +2. Sign in as the user in the Google Drive app. + +3. Sign in as the user in the OneDrive for Business or OneDrive app. + +4. Copy the data from the Google Drive storage to the OneDrive for Business or OneDrive storage. + +5. Optionally uninstall the Google Drive app. + +There are also a number of software vendors who provide software that helps automate the migration from Google Drive to OneDrive for Business, Office 365 SharePoint, or OneDrive. For more information about these automated migration tools, contact the vendors. + +## Perform cloud services migration + + +In the [Plan for cloud services migration](#plan_cloud_services)section, you identified the cloud services currently in use, selected the cloud services that you want to migrate, prioritized the cloud services to migrate, and then selected the cloud services migration strategy. You can perform the cloud services migration before or after you deploy the Windows devices. + +Migrate the cloud services that you currently use to the Microsoft cloud services that you selected. For example, you could migrate from a collaboration website to Office 365 SharePoint. Perform the cloud services migration based on the existing cloud services and the Microsoft cloud services that you selected. + +There are also a number of software vendors who provide software that helps automate the migration from other cloud services to Microsoft cloud services. For more information about these automated migration tools, contact the vendors. + +## Perform Windows device deployment + + +In the [Select a Windows device deployment strategy](#select_windows_device_deploy) section, you selected how you wanted to deploy Windows 10 devices. The other migration task that you designed in the [Plan for Windows device deployment](#plan_windevice_deploy) section have already been performed. Now it's time to deploy the actual devices. + +For example, if you selected to deploy Windows devices by each classroom, start with the first classroom and then proceed through all of the classrooms until you’ve deployed all Windows devices. + +In some instances, you may receive the devices with Windows 10 already deployed, and want to use provisioning packages. In other cases, you may have a custom Windows 10 image that you want to deploy to the devices by using Configuration Manager and/or MDT. For information on how to deploy Windows 10 images to the devices, see the following resources: + +- [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=733911) + +- [Build and apply a provisioning package](http://go.microsoft.com/fwlink/p/?LinkId=733918) + +- [MDT documentation in the Microsoft Deployment Toolkit (MDT) 2013](http://go.microsoft.com/fwlink/p/?LinkId=690324) + +- [Step-By-Step: Installing Windows 8.1 From A USB Key](http://go.microsoft.com/fwlink/p/?LinkId=690265) + +- [Operating System Deployment in Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=733916) + +In addition to the Windows 10 image deployment, you may need to perform the following tasks as a part of device deployment: + +- Enroll the device with your management system. + +- Ensure that Windows Defender is enabled and configured to receive updates. + +- Ensure that Windows Update is enabled and configured to receive updates. + +- Deploy any apps that you want the user to immediately be able to access when they start the device (such as Word 2016 or Excel 2016). + +After you complete these steps, your management system should take over the day-to-day maintenance tasks for the Windows 10 devices. Verify that the user and device settings migrated correctly as you deploy each batch of Windows 10 devices. Continue this process until you deploy all Windows 10 devices. + +## Related topics + + +[Try it out: Windows 10 deployment (for education)](http://go.microsoft.com/fwlink/p/?LinkId=623254) + +[Try it out: Windows 10 in the classroom](http://go.microsoft.com/fwlink/p/?LinkId=623255) + +  + +  + + + + + diff --git a/windows/plan/common-compatibility-issues.md b/windows/plan/common-compatibility-issues.md new file mode 100644 index 0000000000..e9feba9487 --- /dev/null +++ b/windows/plan/common-compatibility-issues.md @@ -0,0 +1,57 @@ +--- +title: Common Compatibility Issues (Windows 10) +ms.assetid: f5ad621d-bda2-45b5-ae85-bc92970f602f +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Common Compatibility Issues + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Compatibility issues tend to occur with the following technologies: + +- **User Account Control (UAC)**: Adds security to Windows by limiting administrator-level access to the computer, restricting most users to running as Standard Users. UAC limits the context in which a process executes to minimize the ability of the user to inadvertently expose the computer to viruses or other malware. UAC affects any application installer or update that requires Administrator permissions to run, performs Administrator checks or actions, or attempts to write to a non-virtualized registry location. + +- **Windows Resource Protection (WRP)**: Enables applications to function properly even if an application attempts to write to protected system files or registry locations. WRP creates a temporary work area and redirects write actions for the application session. WRP affects any application installation that attempts to replace, modify, or delete protected operating system files or registry keys. Attempts typically fail and return an Access Denied error. + +- **Internet Explorer Protected Mode**: Helps to defend against elevation-of-privilege attacks by restricting the ability to write to any local-computer-zone resources other than temporary Internet files. This mode affects any website or web application that attempts to modify user files or registry keys or that attempts to open a new window in another domain. + +- **Deprecation**: Any application that uses .dll files, executable (.exe) files, COM objects, registry keys, APIs, or other files that have been deprecated from previous versions of Windows may lose functionality or fail to start. + +- **Graphical Identification and Authentication (GINA) DLL**: Prior to the release of Windows Vista, independent software vendors (ISVs) were able to modify authentication by installing a GINA DLL. The GINA DLL performed the user identification and authentication. + + The current authentication model does not require the GINA DLL and ignores all previous GINA DLLs. This change affects any application or hardware component that attempts to log on by using customized logon applications, including biometric devices (fingerprint readers), customized user interfaces, and virtual private network (VPN) solutions for remote users with customized logon user interfaces. + +- **Session 0**: Prior to the release of Windows Vista, the first user who logged on to a computer ran in Session 0, which is the same session that is used for system services. The current model requires all users to run in Session 1 or later so that no user runs in the same session as the system services. Applications will fail to start if they depend on *interactive services*. An interactive service is any service that attempts to send a window message, attempts to locate a window or additional service, or attempts to run any user processes that open the same named object, unless it is a globally named object. + +- **Windows Filtering Platform (WFP)**: WFP is an API that enables developers to create code that interacts with the filtering that occurs at several layers in the networking stack and throughout the operating system. If you are using a previous version of the WFP API in your environment, you might experience failures when running network-scanning, antivirus, or firewall applications. + +- **Operating System Version Changes**: The operating system version number changes with each operating system release. The **GetVersion** function returns the version number when queried by an application. This change affects any application or application installer that specifically checks for the operating system version and might prevent the installation from occurring or the application from running. + +- **Windows 64-bit**: 64-bit versions of Windows use the Windows on Windows 64 (WOW64) emulator. This emulator enables the 64-bit operating system to run 32-bit applications. The use of this emulator might cause an application or a component that uses 16-bit executables or installers, or 32-bit kernel drivers, to fail to start or to function incorrectly. + +## Related topics + + +[Using Compatibility Monitor to Send Feedback](using-compatibility-monitor-to-send-feedback.md) + +  + +  + + + + + diff --git a/windows/plan/compatibility-administrator-users-guide.md b/windows/plan/compatibility-administrator-users-guide.md new file mode 100644 index 0000000000..06246f50b6 --- /dev/null +++ b/windows/plan/compatibility-administrator-users-guide.md @@ -0,0 +1,79 @@ +--- +title: Compatibility Administrator User's Guide (Windows 10) +ms.assetid: 0ce05f66-9009-4739-a789-60f3ce380e76 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Compatibility Administrator User's Guide + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. Compatibility Administrator provides the following: + +- Compatibility fixes, compatibility modes, and AppHelp messages that you can use to resolve specific compatibility issues. + +- Tools for creating customized compatibility fixes, compatibility modes, AppHelp messages, and compatibility databases. + +- A query tool that you can use to search for installed compatibility fixes on your local computers. + +The following flowchart shows the steps for using the Compatibility Administrator tool to create your compatibility fixes, compatibility modes, and AppHelp messages. + +![act compatibility admin flowchart](images/dep-win8-l-act-compatadminflowchart.jpg) + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to create and work with custom databases for 32-bit applications, and the 64-bit version to create and work with custom databases for 64-bit applications. + +  + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md)

This section provides information about using the Compatibility Administrator tool.

[Managing Application-Compatibility Fixes and Custom Fix Databases](managing-application-compatibility-fixes-and-custom-fix-databases.md)

This section provides information about managing your application-compatibility fixes and custom-compatibility fix databases. This section explains the reasons for using compatibility fixes and how to deploy custom-compatibility fix databases.

[Using the Sdbinst.exe Command-Line Tool](using-the-sdbinstexe-command-line-tool.md)

You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. You can deploy your customized database files in several ways, including by using a logon script, by using Group Policy, or by performing file copy operations.

+ +  + +  + +  + + + + + diff --git a/windows/plan/compatibility-fix-database-management-strategies-and-deployment.md b/windows/plan/compatibility-fix-database-management-strategies-and-deployment.md new file mode 100644 index 0000000000..9abe28e94d --- /dev/null +++ b/windows/plan/compatibility-fix-database-management-strategies-and-deployment.md @@ -0,0 +1,174 @@ +--- +title: Compatibility Fix Database Management Strategies and Deployment (Windows 10) +ms.assetid: fdfbf02f-c4c4-4739-a400-782204fd3c6c +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Compatibility Fix Database Management Strategies and Deployment + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +After you determine that you will use compatibility fixes in your application-compatibility mitigation strategy, you must define a strategy to manage your custom compatibility-fix database. Typically, you can use one of two approaches: + +- Deploying your compatibility fixes as part of an application-installation package. + +- Deploying your compatibility fixes through a centralized compatibility-fix database. + +Regardless of which approach you decide to use in your organization, Microsoft provides the following general recommendations for improving the management of your custom compatibility-fix databases: + +- **Define standards for when you will apply compatibility fixes.** + + You must define the standards and scenarios for using compatibility fixes, based on your specific business and technology needs. + +- **Define standards for your custom compatibility-fix databases.** + + You must define how to associate your compatibility fixes to particular applications. For example, you might want to ensure that your compatibility fixes always include a version check, so that a fix will not be applied to newer versions of your applications. + +- **Define your resources responsible for addressing questions and enforcing your standards.** + + You must determine who will be responsible for staying current with the technology and standards related to your compatibility fixes and custom compatibility-fix databases. As your databases are managed over time, you must ensure that someone in your organization stays current with the relevant technology. + +## Strategies for Deploying Your Compatibility Fixes + + +We recommend that you use one of two strategies to deploy your compatibility fixes into your organization. They are: + +- Deploying your compatibility fixes as part of an application-installation package. + +- Deploying your compatibility fixes through a centralized compatibility-fix database. + +You must determine which method best meets your organization's deployment needs. + +### Deploying Fixes as Part of an Application-Installation Package + +One strategy for deploying compatibility fixes is to create a custom compatibility-fix database that contains a single entry that is applied directly to the application-installation package. While this is the most straightforward method of deployment, it has been shown that this method can become overly complex, especially if you are fixing a large number of applications. + +If the following considerations apply to your organization, you should avoid this strategy and instead consider using a centralized compatibility-fix database, as described in the next section. + +- **How many applications require compatibility fixes?** + + Custom compatibility-fix databases are actual databases. Therefore, if you have 1000 applications to be fixed, it will take longer to open and query 1000 single-row databases for a match, instead of a single database with 1000 rows. + +- **Will you be able to track which applications are installed on which computer?** + + You might determine that your initial set of compatibility fixes is not comprehensive, and that you must deploy an updated version of the compatibility-fix database to resolve the additional issues. If you deployed the initial set by using the application-installation package, you will be required to locate each client computer that is running the application and replace the compatibility fix. + +### Deploying Fixes Through a Centralized Compatibility-Fix Database + +The other recommended strategy for deploying compatibility fixes into your organization is to create and manage either a single custom compatibility-fix database, or else to create and manage several custom databases for large subsets of your organization. This strategy will help to enforce your company policy and to provide consistent updates for application fixes that you discover later. + +This approach tends to work best for organizations that have a well-developed deployment infrastructure in place, with centralized ownership of the process. We recommend that you consider the following before using this approach: + +- Does your organization have the tools required to deploy and update a compatibility-fix database for all of the effected computers? + + If you intend to manage a centralized compatibility-fix database, you must verify that your organization has the required tools to deploy and update all of the affected computers in your organization. + +- Do you have centralized resources that can manage and update the centralized compatibility-fix database? + + You must ensure that you have identified the appropriate owners for the deployment process, for the applications, and for the database updates, in addition to determining the process by which compatibility issues can be deployed to specific computers. + +### Merging Centralized Compatibility-Fix Databases + +If you decide to use the centralized compatibility-fix database deployment strategy, you can merge any of your individual compatibility-fix databases. This enables you to create a single custom compatibility-fix database that can be used to search for and determine whether Windows® should apply a fix to a specific executable (.exe) file. We recommend merging your databases based on the following process. + +**To merge your custom-compatibility databases** + +1. Verify that your application-compatibility testers are performing their tests on computers with the latest version of your compatibility-fix database. For example, Custom DB1. + +2. If the tester determines that an application requires an additional compatibility fix that is not a part of the original compatibility-fix database, he or she must create a new custom compatibility database with all of the required information for that single fix. For example, Custom DB2. + +3. The tester applies the new Custom DB2 information to the application and then tests for both the functionality and integration, to ensure that the compatibility issues are addressed. + +4. After the application passes all of the required functionality and integration tests, the tester can send Custom DB2 to the team that manages the central compatibility-fix database. + +5. The team that manages the centralized database opens Custom DB1 and uses the Compatibility Administrator to include the new compatibility fixes that were included in Custom DB2. + + **Note**   + Custom DB1 contains a unique GUID that makes updating the database easier. For example, if you install a new version of the custom compatibility-fix database that uses the same GUID as the previous version, the computer will automatically uninstall the old version. + +   + +6. The centralized management team then redeploys the new version of Custom DB1 to all of the end users in your organization. + +### Deploying Your Custom Compatibility-Fix Databases + +Deploying your custom compatibility-fix database into your organization requires you to perform the following actions: + +1. Store your custom compatibility-fix database (.sdb file) in a location that is accessible to all of your organization’s computers. + +2. Use the Sdbinst.exe command-line tool to install the custom compatibility-fix database locally. + +In order to meet the two requirements above, we recommend that you use one of the following two methods: + +- **Using a Windows Installer package and a custom script** + + You can package your .sdb file and a custom deployment script into an .msi file, and then deploy the .msi file into your organization. + + **Important**   + You must ensure that you mark your custom script so that it does not impersonate the calling user. For example, if you use Microsoft® Visual Basic® Scripting Edition (VBScript), the custom action type would be: + +   + + ``` syntax + msidbCustomActionTypeVBScript + msidbCustomActionTypeInScript + msidbCustomActionTypeNoImpersonate = 0x0006 + 0x0400 + 0x0800 = 0x0C06 = 3078 decimal) + ``` + +- **Using a network share and a custom script** + +You can store your .sdb file on your network share and then call to a script that resides on your specified computers. + +**Important**   +You must ensure that you call the script at a time when it will receive elevated rights. For example, you should call the script by using computer startup scripts instead of a user logon script. You must also ensure that the installation of the custom compatibility-fix database occurs with Administrator rights. + +  + +### Example Script for an Installation of the .sdb File based on an .msi File + +The following examples show an installation of a custom compatibility-fix database based on an .msi file. + +``` syntax +'InstallSDB.vbs +Function Install +Dim WshShell +Set WshShell = CreateObject("WScript.Shell") +WshShell.Run "sdbinst.exe -q " & CHR(34) & "%ProgramFiles%\MyOrganizationSDB\MyOrg.sdb" & CHR(34), 0, true +WshShell.Run "cmd.exe /c " & CHR(34) & "del " & CHR(34) & "%ProgramFiles%\MyOrganizationSDB\MyOrg.sdb" & CHR(34) & CHR(34), 0 +WshShell.Run "reg.exe delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{guidFromMyOrgsSdb}.sdb /f", 0 +End Function + +Function UnInstall +Dim WshShell +Set WshShell = CreateObject("WScript.Shell") +WshShell.Run "sdbinst.exe -q -u -g {guidFromMyOrgsSdb}", 0 +End Function +``` + +### Initial Deployment and Updates + +Most of your testing of application-compatibility issues will happen prior to the deployment of a new Windows operating system into your environment. As such, a common approach is to include the custom compatibility-fix database, which includes all of your known issues, in your corporate image. Then, as you update your compatibility-fix database, you can provide the updates by using one of the two mechanisms described in the "Deploying Your Custom Compatibility Fix Databases" section earlier in this topic. + +## Related topics + + +[Managing Application-Compatibility Fixes and Custom Fix Databases](managing-application-compatibility-fixes-and-custom-fix-databases.md) + +  + +  + + + + + diff --git a/windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md b/windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md new file mode 100644 index 0000000000..1efec32cb1 --- /dev/null +++ b/windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md @@ -0,0 +1,1022 @@ +--- +title: Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista (Windows 10) +description: You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. +ms.assetid: cd51c824-557f-462a-83bb-54b0771b7dff +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. + +**Important**   +The Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator. You must use the 32-bit version for 32-bit applications and the 64-bit version to work for 64-bit applications. You will receive an error message if you try to use the wrong version. + +If you start the Compatibility Administrator as an Administrator (with elevated privileges), all repaired applications can run successfully; however, virtualization and redirection might not occur as expected. To verify that a compatibility fix addresses an issue, you must test the repaired application by running it under the destination user account. + +  + +## Compatibility Fixes + + +The following table lists the known compatibility fixes for all Windows operating systems that have been released from Windows Vista through Windows 10. The fixes are listed in alphabetical order. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
FixFix Description

8And16BitAggregateBlts

Applications that are mitigated by 8/16-bit mitigation can exhibit performance issues. This layer aggregates all the blt operations and improves performance.

8And16BitDXMaxWinMode

Applications that use DX8/9 and are mitigated by the 8/16-bit mitigation are run in a maximized windowed mode. This layer mitigates applications that exhibit graphical corruption in full screen mode.

8And16BitGDIRedraw

This fix repairs applications that use GDI and that work in 8-bit color mode. The application is forced to repaint its window on RealizePalette.

AccelGdipFlush

This fix increases the speed of GdipFlush, which has perf issues in DWM.

AoaMp4Converter

This fix resolves a display issue for the AoA Mp4 Converter.

BIOSRead

This problem is indicated when an application cannot access the Device\PhysicalMemory object beyond the kernel-mode drivers, on any of the Windows Server® 2003 operating systems.

+

The fix enables OEM executable (.exe) files to use the GetSystemFirmwareTable function instead of the NtOpenSection function when the BIOS is queried for the \\Device\Physical memory information..

BlockRunasInteractiveUser

This problem occurs when InstallShield creates installers and uninstallers that fail to complete and that generate error messages or warnings.

+

The fix blocks InstallShield from setting the value of RunAs registry keys to InteractiveUser Because InteractiveUser no longer has Administrator rights.

+
+Note   +

For more detailed information about this application fix, see [Using the BlockRunAsInteractiveUser Fix](http://go.microsoft.com/fwlink/p/?LinkId=690328).

+
+
+  +

ChangeFolderPathToXPStyle

This fix is required when an application cannot return shell folder paths when it uses the SHGetFolder API.

+

The fix intercepts the SHGetFolder path request to the common appdata file path and returns the Windows® XP-style file path instead of the Windows Vista-style file path.

ClearLastErrorStatusonIntializeCriticalSection

This fix is indicated when an application fails to start.

+

The fix modifies the InitializeCriticalSection function call so that it checks the NTSTATUS error code, and then sets the last error to ERROR_SUCCESS.

CopyHKCUSettingsFromOtherUsers

This problem occurs when an application's installer must run in elevated mode and depends on the HKCU settings that are provided for other users.

+

The fix scans the existing user profiles and tries to copy the specified keys into the HKEY_CURRENT_USER registry area.

+

You can control this fix further by entering the relevant registry keys as parameters that are separated by the ^ Symbol; for example: Software\MyCompany\Key1^Software\MyCompany\Key2.

+
+Note   +

For more detailed information about this application fix, see [Using the CopyHKCUSettingsFromOtherUsers Fix](http://go.microsoft.com/fwlink/p/?LinkId=690329).

+
+
+  +

CorrectCreateBrushIndirectHatch

The problem is indicated by an access violation error message that displays and when the application fails when you select or crop an image.

+

The fix corrects the brush style hatch value, which is passed to the CreateBrushIndirect() function and enables the information to be correctly interpreted.

CorrectFilePaths

The problem is indicated when an application tries to write files to the hard disk and is denied access or receives a file not found or path not found error message.

+

The fix modifies the file path names to point to a new location on the hard disk.

+
+Note   +

For more detailed information about the CorrectFilePaths application fix, see [Using the CorrectFilePaths Fix](http://go.microsoft.com/fwlink/p/?LinkId=690330). We recommend that you use this fix together with the CorrectFilePathsUninstall fix if you are applying it to a setup installation file.

+
+
+  +

CorrectFilePathsUninstall

This problem occurs when an uninstalled application leaves behind files, directories, and links.

+

The fix corrects the file paths that are used by the uninstallation process of an application.

+
+Note   +

For more detailed information about this fix, see [Using the CorrectFilePathsUninstall Fix](http://go.microsoft.com/fwlink/p/?LinkId=690331). We recommend that you use this fix together with the CorrectFilePaths fix if you are applying it to a setup installation file.

+
+
+  +

CorrectShellExecuteHWND

This problem occurs when you start an executable (.exe) and a taskbar item blinks instead of an elevation prompt being opened, or when the application does not provide a valid HWND value when it calls the ShellExecute(Ex) function.

+

The fix intercepts the ShellExecute(Ex) calls, and then inspects the HWND value. If the value is invalid, this fix enables the call to use the currently active HWND value.

+
+Note   +

For more detailed information about the CorrectShellExecuteHWND application fix, see [Using the CorrectShellExecuteHWND Fix](http://go.microsoft.com/fwlink/p/?LinkId=690332).

+
+
+  +

CustomNCRender

This fix instructs DWM to not render the non-client area, thereby forcing the application to do its own NC rendering. This often gives windows an XP look.

DelayApplyFlag

This fix applies a KERNEL, USER, or PROCESS flag if the specified DLL is loaded.

+

You can control this fix further by typing the following command at the command prompt:

+

DLL_Name;Flag_Type;Hexidecimal_Value

+

Where the DLL_Name is the name of the specific DLL, including the file extension. Flag_Type is KERNEL, USER, or PROCESS, and a Hexidecimal_Value, starting with 0x and up to 64-bits long.

+
+Note   +

The PROCESS flag type can have a 32-bit length only. You can separate multiple entries with a backslash ().

+
+
+  +

DeprecatedServiceShim

The problem is indicated when an application tries to install a service that has a dependency on a deprecated service. An error message displays.

+

The fix intercepts the CreateService function calls and removes the deprecated dependency service from the lpDependencies parameter.

+

You can control this fix further by typing the following command at the command prompt:

+

Deprecated_Service\App_Service/Deprecated_Service2 \App_Service2

+

Where Deprecated_Service is the name of the service that has been deprecated and App_Service is the name of the specific application service that is to be modified; for example, NtLmSsp\WMI.

+
+Note   +

If you do not provide an App_Service name, the deprecated service will be removed from all newly created services.

+
+
+  +
+
+Note   +

You can separate multiple entries with a forward slash (/).

+
+
+  +

DirectXVersionLie

This problem occurs when an application fails because it does not find the correct version number for DirectX®.

+

The fix modifies the DXDIAGN GetProp function call to return the correct DirectX version.

+

You can control this fix further by typing the following command at the command prompt:

+

MAJORVERSION.MINORVERSION.LETTER

+

For example, 9.0.c.

DetectorDWM8And16Bit

This fix offeres mitigation for applications that work in 8/16-bit display color mode because these legacy color modes are not supported in Windows 8 .

Disable8And16BitD3D

This fix improves performance of 8/16-bit color applications that render using D3D and do not mix directdraw.

Disable8And16BitModes

This fix disables 8/16-bit color mitigation and enumeration of 8/16-bit color modes.

DisableDWM

The problem occurs when some objects are not drawn or object artifacts remain on the screen in an application.

+

The fix temporarily disables the Windows Aero menu theme functionality for unsupported applications.

+
+Note   +

For more detailed information about this application fix, see [Using the DisableDWM Fix]( http://go.microsoft.com/fwlink/p/?LinkId=690334).

+
+
+  +

DisableFadeAnimations

The problem is indicated when an application fade animations, buttons, or other controls do not function properly.

+

The fix disables the fade animations functionality for unsupported applications.

DisableThemeMenus

The problem is indicated by an application that behaves unpredictably when it tries to detect and use the correct Windows settings.

+

The fix temporarily disables the Windows Aero menu theme functionality for unsupported applications.

DisableWindowsDefender

The fix disables Windows Defender for security applications that do not work with Windows Defender.

DWM8And16BitMitigation

The fix offers mitigation for applications that work in 8/16-bit display color mode because these legacy color modes are not supported in Windows 8.

DXGICompat

The fix allows application-specific compatibility instructions to be passed to the DirectX engine.

DXMaximizedWindowedMode

Applications that use DX8/9 are run in a maximized windowed mode. This is required for applications that use GDI/DirectDraw in addition to Direct3D.

ElevateCreateProcess

The problem is indicated when installations, de-installations, or updates fail because the host process calls the CreateProcess function and it returns an ERROR_ELEVATION_REQUIRED error message.

+

The fix handles the error code and attempts to recall the CreateProcess function together with requested elevation. If the fixed application already has a UAC manifest, the error code will be returned unchanged.

+
+Note   +

For more detailed information about this application fix, see [Using the ElevateCreateProcess Fix](http://go.microsoft.com/fwlink/p/?LinkId=690335).

+
+
+  +

EmulateOldPathIsUNC

The problem occurs when an application fails because of an incorrect UNC path.

+

The fix changes the PathIsUNC function to return a value of True for UNC paths in Windows. 

EmulateGetDiskFreeSpace

The problem is indicated when an application fails to install or to run, and it generates an error message that there is not enough free disk space to install or use the application, even though there is enough free disk space to meet the application requirements.

+

The fix determines the amount of free space, so that if the amount of free space is larger than 2 GB, the compatibility fix returns a value of 2 GB, but if the amount of free space is smaller than 2 GB, the compatibility fix returns the actual free space amount.

+
+Note   +

For more detailed information about this application fix, see [Using the EmulateGetDiskFreeSpace Fix](http://go.microsoft.com/fwlink/p/?LinkId=690336).

+
+
+  +

EmulateSorting

The problem occurs when an application experiences search functionality issues.

+

The fix forces applications that use the CompareStringW/LCMapString sorting table to use an older version of the table.

+
+Note   +

For more detailed information about this e application fix, see [Using the EmulateSorting Fix](http://go.microsoft.com/fwlink/p/?LinkId=690337).

+
+
+  +

EmulateSortingWindows61

The fix emulates the sorting order of Windows 7 and Windows Server 2008 R2 for various APIs.

EnableRestarts

The problem is indicated when an application and computer appear to hang because processes cannot end to allow the computer to complete its restart processes.

+

The fix enables the computer to restart and finish the installation process by verifying and enabling that the SeShutdownPrivilege service privilege exists.

+
+Note   +

For more detailed information about this application fix, see [Using the EnableRestarts Fix](http://go.microsoft.com/fwlink/p/?LinkId=690338).

+
+
+  +

ExtraAddRefDesktopFolder

The problem occurs when an application invokes the Release() method too many times and causes an object to be prematurely destroyed.

+

The fix counteracts the application's tries to obtain the shell desktop folder by invoking the AddRef() method on the Desktop folder, which is returned by the SHGetDesktopFolder function.

FailObsoleteShellAPIs

The problem occurs when an application fails because it generated deprecated API calls.

+

The fix either fully implements the obsolete functions or implements the obsolete functions with stubs that fail.

+
+Note   +

You can type FailAll=1 at the command prompt to suppress the function implementation and force all functions to fail.

+
+
+  +

FailRemoveDirectory

The problem occurs when an application uninstallation process does not remove all of the application files and folders.

+

This fix fails calls to RemoveDirectory() when called with a path matching the one specified in the shim command-line.  Only a single path is supported.  The path can contain environment variables, but must be an exact path – no partial paths are supported.

+

The fix can resolve an issue where an application expects RemoveDirectory() to delete a folder immediately even though a handle is open to it.

FakeLunaTheme

The problem occurs when a theme application does not properly display: the colors are washed out or the user interface is not detailed.

+

The fix intercepts the GetCurrentThemeName API and returns the value for the Windows XP default theme, (Luna).

+
+Note   +

For more detailed information about the FakeLunaTheme application fix, see [Using the FakeLunaTheme Fix](http://go.microsoft.com/fwlink/p/?LinkId=690339).

+
+
+  +

FlushFile

This problem is indicated when a file is updated and changes do not immediately appear on the hard disk. Applications cannot see the file changes.

+

The fix enables the WriteFile function to call to the FlushFileBuffers APIs, which flush the file cache onto the hard disk.

FontMigration

The fix replaces an application-requested font with a better font selection, to avoid text truncation.

ForceAdminAccess

The problem occurs when an application fails to function during an explicit administrator check.

+

The fix allows the user to temporarily imitate being a part of the Administrators group by returning a value of True during the administrator check.

+
+Note   +

For more detailed information about this application fix, see [Using the ForceAdminAccess Fix](http://go.microsoft.com/fwlink/p/?LinkId=690342).

+
+
+  +

ForceInvalidateOnClose

The fix invalidates any windows that exist under a closing or hiding window for applications that rely on the invalidation messages.

ForceLoadMirrorDrvMitigation

The fix loads the Windows 8 mirror driver mitigation for applications where the mitigation is not automatically applied.

FreestyleBMX

The fix resolves an application race condition that is related to window message order.

GetDriveTypeWHook

The application presents unusual behavior during installation; for example, the setup program states that it cannot install to a user-specified location.

+

The fix changes GetDriveType() so that only the root information appears for the file path. This is required when an application passes an incomplete or badly-formed file path when it tries to retrieve the drive type on which the file path exists.

GlobalMemoryStatusLie

The problem is indicated by a Computer memory full error message that displays when you start an application.

+

The fix modifies the memory status structure, so that it reports a swap file that is 400 MB, regardless of the true swap file size.

HandleBadPtr

The problem is indicated by an access violation error message that displays because an API is performing pointer validation before it uses a parameter.

+

The fix supports using lpBuffer validation from the InternetSetOptionA and InternetSetOptionW functions to perform the additional parameter validation.

HandleMarkedContentNotIndexed

The problem is indicated by an application that fails when it changes an attribute on a file or directory.

+

The fix intercepts any API calls that return file attributes and directories that are invoked from the %TEMP% directory, and resets the FILE_ATTRIBUTE_NOT_CONTENT_INDEXED attribute to its original state.

HeapClearAllocation

The problem is indicated when the allocation process shuts down unexpectedly.

+

The fix uses zeros to clear out the heap allocation for an application.

IgnoreAltTab

The problem occurs when an application fails to function when special key combinations are used.

+

The fix intercepts the RegisterRawInputDevices API and prevents the delivery of the WM_INPUT messages. This delivery failure forces the included hooks to be ignored and forces DInput to use Windows-specific hooks.

+
+Note   +

For more detailed information about this application fix, see [Using the IgnoreAltTab Fix](http://go.microsoft.com/fwlink/p/?LinkId=690343).

+
+
+  +

IgnoreChromeSandbox

The fix allows Google Chrome to run on systems that have ntdll loaded above 4GB.

IgnoreDirectoryJunction

The problem is indicated by a read or access violation error message that displays when an application tries to find or open files.

+

The fix links the FindNextFileW, FindNextFileA, FindFirstFileExW, FindFirstFileExA, FindFirstFileW and FindFirstFileA APIs to prevent them from returning directory junctions.

+
+Note   +

Symbolic links appear starting in Windows Vista.

+
+
+  +

IgnoreException

The problem is indicated when an application stops functioning immediately after it starts, or the application starts with only a cursor appearing on the screen.

+

The fix enables the application to ignore specified exceptions. By default, this fix ignores privileged-mode exceptions; however, it can be configured to ignore any exception.

+

You can control this fix further by typing the following command at the command prompt:

+

Exception1;Exception2

+

Where Exception1 and Exception2 are specific exceptions to be ignored. For example: ACCESS_VIOLATION_READ:1;ACCESS_VIOLATION_WRITE:1.

+
+Important   +

You should use this compatibility fix only if you are certain that it is acceptable to ignore the exception. You might experience additional compatibility issues if you choose to incorrectly ignore an exception.

+
+
+  +
+
+Note   +

For more detailed information about this application fix, see [Using the IgnoreException Fix](http://go.microsoft.com/fwlink/p/?LinkId=690344).

+
+
+  +

IgnoreFloatingPointRoundingControl

This fix enables an application to ignore the rounding control request and to behave as expected in previous versions of the application.

+

Before floating point SSE2 support in the C runtime library, the rounding control request was being ignored which would use round to nearest option by default. This shim ignores the rounding control request to support applications relying on old behavior.

IgnoreFontQuality

The problem occurs when application text appears to be distorted.

+

The fix enables color-keyed fonts to properly work with anti-aliasing.

IgnoreMessageBox

The problem is indicated by a message box that displays with debugging or extraneous content when the application runs on an unexpected operating system.

+

The fix intercepts the MessageBox* APIs and inspects them for specific message text. If matching text is found, the application continues without showing the message box.

+
+Note   +

For more detailed information about this application fix, see [Using the IgnoreMessageBox Fix](http://go.microsoft.com/fwlink/p/?LinkId=690345).

+
+
+  +

IgnoreMSOXMLMF

The problem is indicated by an error message that states that the operating system cannot locate the MSVCR80D.DLL file.

+

The fix ignores the registered MSOXMLMF.DLL object, which Microsoft® Office 2007 loads into the operating system any time that you load an XML file, and then it fails the CoGetClassObject for its CLSID. This compatibility fix will just ignore the registered MSOXMLMF and fail the CoGetClassObject for its CLSID.

IgnoreSetROP2

The fix ignores read-modify-write operations on the desktop to avoid performance issues.

InstallComponent

The fix prompts the user to install.Net 3.5 or .Net 2.0 because .Net is not included with Windows 8.

LoadLibraryRedirect

The fix forces an application to load system versions of libraries instead of loading redistributable versions that shipped with the application.

LocalMappedObject

The problem occurs when an application unsuccessfully tries to create an object in the Global namespace.

+

The fix intercepts the function call to create the object and replaces the word Global with Local.

+
+Note   +

For more detailed information about this application fix, see [Using the LocalMappedObject Fix](http://go.microsoft.com/fwlink/p/?LinkId=690346).

+
+
+  +

MakeShortcutRunas

The problem is indicated when an application fails to uninstall because of access-related errors.

+

The fix locates any RunDLL.exe-based uninstallers and forces them to run with different credentials during the application installation. After it applies this fix, the installer will create a shortcut that specifies a matching string to run during the application installation, thereby enabling the uninstallation to occur later.

+
+Note   +

For more detailed information about this application fix, see [Using the MakeShortcutRunas Fix]( http://go.microsoft.com/fwlink/p/?LinkId=690347)

+
+
+  +

ManageLinks

The fix intercepts common APIs that are going to a directory or to an executable (.exe) file, and then converts any symbolic or directory junctions before passing it back to the original APIs.

MirrorDriverWithComposition

The fix allows mirror drivers to work properly with acceptable performance with desktop composition.

MoveToCopyFileShim

The problem occurs when an application experiences security access issues during setup.

+

The fix forces the CopyFile APIs to run instead of the MoveFile APIs. CopyFile APIs avoid moving the security descriptor, which enables the application files to get the default descriptor of the destination folder and prevents the security access issue.

OpenDirectoryAcl

The problem is indicated by an error message that states that you do not have the appropriate permissions to access the application.

+

The fix reduces the security privilege levels on a specified set of files and folders.

+
+Note   +

For more detailed information about this application fix, see [Using the OpenDirectoryACL Fix](http://go.microsoft.com/fwlink/p/?LinkId=690348).

+
+
+  +

PopCapGamesForceResPerf

The fix resolves the performance issues in PopCap games like Bejeweled2. The performance issues are visible in certain low-end cards at certain resolutions where the 1024x768 buffer is scaled to fit the display resolution.

PreInstallDriver

The fix preinstalls drivers for applications that would otherwise try to install or start drivers during the initial start process.

PreInstallSmarteSECURE

The fix preinstalls computer-wide CLSIDs for applications that use SmartSECURE copy protection, which would otherwise try to install the CLSIDs during the initial start process.

ProcessPerfData

The problem is indicated by an Unhandled Exception error message because the application tried to read the process performance data registry value to determine if another instance of the application is running.

+

The fix handles the failure case by passing a fake process performance data registry key, so that the application perceives that it is the only instance running.

+
+Note   +

This issue seems to occur most frequently with .NET applications.

+
+
+  +

PromoteDAM

The fix registers an application for power state change notifications.

PropagateProcessHistory

The problem occurs when an application incorrectly fails to apply an application fix.

+

The fix sets the _PROCESS_HISTORY environment variable so that child processes can look in the parent directory for matching information while searching for application fixes.

ProtectedAdminCheck

The problem occurs when an application fails to run because of incorrect Protected Administrator permissions.

+

The fix addresses the issues that occur when applications use non-standard Administrator checks, thereby generating false positives for user accounts that are being run as Protected Administrators. In this case, the associated SID exists, but it is set as deny-only.

RedirectCRTTempFile

The fix intercepts failing CRT calls that try to create a temporary file at the root of the volume, thereby redirecting the calls to a temporary file in the user's temporary directory.

RedirectHKCUKeys

The problem occurs when an application cannot be accessed because of User Account Control (UAC) restrictions.

+

The fix duplicates any newly created HKCU keys to other users' HKCU accounts. This fix is generic for UAC restrictions, whereby the HKCU keys are required, but are unavailable to an application at runtime.

RedirectMP3Codec

This problem occurs when you cannot play MP3 files.

+

The fix intercepts the CoCreateInstance call for the missing filter and then redirects it to a supported version.

RedirectShortcut

The problem occurs when an application cannot be accessed by its shortcut, or application shortcuts are not removed during the application uninstallation process.

+

The fix redirects all of the shortcuts created during the application setup to appear according to a specified path.

+
    +
  • Start Menu shortcuts: Appear in the \\ProgramData\Microsoft\Windows\Start Menu directory for all users.

  • +
  • Desktop or Quick Launch shortcuts:You must manually place the shortcuts on the individual user's desktop or Quick Launch bar.

  • +
+

This issue occurs because of UAC restrictions: specifically, when an application setup runs by using elevated privileges and stores the shortcuts according to the elevated user's context. In this situation, a restricted user cannot access the shortcuts.

+

You cannot apply this fix to an .exe file that includes a manifest and provides a runlevel.

RelaunchElevated

The problem occurs when installers, uninstallers, or updaters fail when they are started from a host application.

+

The fix enables a child .exe file to run with elevated privileges when it is difficult to determine the parent process with either the ElevateCreateProcess fix or by marking the .exe files to RunAsAdmin.

+
+Note   +

For more detailed information about this application fix, see [Using the RelaunchElevated Fix](http://go.microsoft.com/fwlink/p/?LinkId=690349).

+
+
+  +

RetryOpenSCManagerWithReadAccess

The problem occurs when an application tries to open the Service Control Manager (SCM) and receives an Access Denied error message.

+

The fix retries the call and requests a more restricted set of rights that include the following:

+
    +
  • SC_MANAGER_CONNECT

  • +
  • SC_MANAGER_ENUMERATE_SERVICE

  • +
  • SC_MANAGER_QUERY_LOCK_STATUS

  • +
  • STANDARD_READ_RIGHTS

    +
    +Note   +

    For more detailed information about this application fix, see [Using the RetryOpenSCManagerwithReadAccess Fix](http://go.microsoft.com/fwlink/p/?LinkId=690350).

    +
    +
    +  +
  • +

RetryOpenServiceWithReadAccess

The problem occurs when an Unable to open service due to your application using the OpenService() API to test for the existence of a particular service error message displays.

+

The fix retries the OpenService() API call and verifies that the user has Administrator rights, is not a Protected Administrator, and by using read-only access. Applications can test for the existence of a service by calling the OpenService() API but some applications ask for all access when making this check. This fix retries the call but only asking for read-only access. The user needs to be an administrator for this to work

+
+Note   +

For more detailed information about this application fix, see [Using the RetryOpenServiceWithReadAccess Fix](http://go.microsoft.com/fwlink/p/?LinkId=690351).

+
+
+  +

RunAsAdmin

The problem occurs when an application fails to function by using the Standard User or Protected Administrator account.

+

The fix enables the application to run by using elevated privileges. The fix is the equivalent of specifying requireAdministrator in an application manifest.

+
+Note   +

For more detailed information about this application fix, see [Using the RunAsAdmin Fix](http://go.microsoft.com/fwlink/p/?LinkId=690353).

+
+
+  +

RunAsHighest

The problem occurs when administrators cannot view the read/write version of an application that presents a read-only view to standard users.

+

The fix enables the application to run by using the highest available permissions. This is the equivalent of specifying highestAvailable in an application manifest.

+
+Note   +

For more detailed information about this application fix, see [Using the RunAsHighest Fix](http://go.microsoft.com/fwlink/p/?LinkId=690355).

+
+
+  +

RunAsInvoker

The problem occurs when an application is not detected as requiring elevation.

+

The fix enables the application to run by using the privileges that are associated with the creation process, without requiring elevation. This is the equivalent of specifying asInvoker in an application manifest.

+
+Note   +

For more detailed information about this application fix, see [Using the RunAsInvoker Fix](http://go.microsoft.com/fwlink/p/?LinkId=690356).

+
+
+  +

SecuROM7

The fix repairs applications by using SecuROM7 for copy protection.

SessionShim

The fix intercepts API calls from applications that are trying to interact with services that are running in another session, by using the terminal service name prefix (Global or Local) as the parameter.

+

At the command prompt, you can supply a list of objects to modify, separating the values by a double backslash (\). Or, you can choose not to include any parameters, so that all of the objects are modified.

+
+Important   +

Users cannot log in as Session 0 (Global Session) in Windows Vista and later. Therefore, applications that require access to Session 0 automatically fail.

+
+
+  +
+
+Note   +

For more detailed information about this application fix, see [Using the SessionShim Fix](http://go.microsoft.com/fwlink/p/?LinkId=690358).

+
+
+  +

SetProtocolHandler

The fix registers an application as a protocol handler.

+

You can control this fix further by typing the following command at the command prompt:

+

Client;Protocol;App

+

Where the Client is the name of the email protocol, Protocol is mailto, and App is the name of the application.

+
+Note   +

Only the mail client and the mailto protocol are supported. You can separate multiple clients by using a backslash ().

+
+
+  +

SetupCommitFileQueueIgnoreWow

The problem occurs when a 32-bit setup program fails to install because it requires 64-bit drivers.

+

The fix disables the Wow64 file system that is used by the 64-bit editions of Windows, to prevent 32-bit applications from accessing 64-bit file systems during the application setup.

SharePointDesigner2007

The fix resolves an application bug that severely slows the application when it runs in DWM.

ShimViaEAT

The problem occurs when an application fails, even after applying acompatibility fix that is known to fix an issue. Applications that use unicows.dll or copy protection often present this issue.

+

The fix applies the specified compatibility fixes by modifying the export table and by nullifying the use of module inclusion and exclusion.

+
+Note   +

For more information about this application fix, see [Using the ShimViaEAT Fix](http://go.microsoft.com/fwlink/p/?LinkId=690359).

+
+
+  +

ShowWindowIE

The problem occurs when a web application experiences navigation and display issues because of the tabbing feature.

+

The fix intercepts the ShowWindow API call to address the issues that can occur when a web application determines that it is in a child window. This fix calls the real ShowWindow API on the top-level parent window.

SierraWirelessHideCDROM

The fix repairs the Sierra Wireless Driver installation, thereby preventing bugcheck.

Sonique2

The application uses an invalid window style, which breaks in DWM. This fix replaces the window style with a valid value.

SpecificInstaller

The problem occurs when an application installation file fails to be picked up by the GenericInstaller function.

+

The fix flags the application as being an installer file (for example, setup.exe), and then prompts for elevation.

+
+Note   +

For more detailed information about this application fix, see [Using the SpecificInstaller Fix]( http://go.microsoft.com/fwlink/p/?LinkId=690361).

+
+
+  +

SpecificNonInstaller

The problem occurs when an application that is not an installer (and has sufficient privileges) generates a false positive from the GenericInstaller function.

+

The fix flags the application to exclude it from detection by the GenericInstaller function.

+
+Note   +

For more detailed information about this application fix, see [Using the SpecificNonInstaller Fix](http://go.microsoft.com/fwlink/p/?LinkId=690363).

+
+
+  +

SystemMetricsLie

The fix replaces SystemMetrics values and SystemParametersInfo values with the values of previous Windows versions.

TextArt

The application receives different mouse coordinates with DWM ON versus DWM OFF, which causes the application to hang. This fix resolves the issue.

TrimDisplayDeviceNames

The fix trims the names of the display devices that are returned by the EnumDisplayDevices API.

UIPICompatLogging

The fix enables the logging of Windows messages from Internet Explorer and other processes.

UIPIEnableCustomMsgs

The problem occurs when an application does not properly communicate with other processes because customized Windows messages are not delivered.

+

The fix enables customized Windows messages to pass through to the current process from a lower Desktop integrity level. This fix is the equivalent of calling the RegisterWindowMessage function, followed by the ChangeWindowMessageFilter function in the code.

+

You can control this fix further by typing the following command at the command prompt:

+

MessageString1 MessageString2

+

Where MessageString1 and MessageString2 reflect the message strings that can pass.

+
+Note   +

Multiple message strings must be separated by spaces. For more detailed information about this application fix, see [Using the UIPIEnableCustomMsgs Fix](http://go.microsoft.com/fwlink/p/?LinkId=690365).

+
+
+  +

UIPIEnableStandardMsgs

The problem occurs when an application does not communicate properly with other processes because standard Windows messages are not delivered.

+

The fix enables standard Windows messages to pass through to the current process from a lower Desktop integrity level. This fix is the equivalent of calling the ChangeWindowMessageFilter function in the code.

+

You can control this fix further by typing the following command at the command prompt:

+

1055 1056 1069

+

Where 1055 reflects the first message ID, 1056 reflects the second message ID, and 1069 reflects the third message ID that can pass.

+
+Note   +

Multiple messages can be separated by spaces. For more detailed information about this application fix, see [Using the UIPIEnableStandardMsgs Fix [act]](http://go.microsoft.com/fwlink/p/?LinkId=690367).

+
+
+  +

VirtualizeDeleteFileLayer

The fix virtualizes DeleteFile operations for applications that try to delete protected files.

VirtualizeDesktopPainting

This fix improves the performance of a number of operations on the Desktop DC while using DWM.

VirtualRegistry

The problem is indicated when a Component failed to be located error message displays when an application is started.

+

The fix enables the registry functions to allow for virtualization, redirection, expansion values, version spoofing, the simulation of performance data counters, and so on.

+

For more detailed information about this application fix, see [Using the VirtualRegistry Fix](http://go.microsoft.com/fwlink/p/?LinkId=690368).

VirtualizeDeleteFile

The problem occurs when several error messages display and the application cannot delete files.

+

The fix makes the application's DeleteFile function call a virtual call in an effort to remedy the UAC and file virtualization issues that were introduced with Windows Vista. This fix also links other file APIs (for example, GetFileAttributes) to ensure that the virtualization of the file is deleted.

+
+Note   +

For more detailed information about this application fix, see [Using the VirtualizeDeleteFile Fix](http://go.microsoft.com/fwlink/p/?LinkId=690369).

+
+
+  +

VirtualizeHKCRLite

The problem occurs when an application fails to register COM components at runtime.

+

The fix redirects the HKCR write calls (HKLM) to the HKCU hive for a per-user COM registration. This operates much like the VirtualRegistry fix when you use the VirtualizeHKCR parameter; however, VirtualizeHKCRLite provides better performance.

+

HKCR is a virtual merge of the HKCU\Software\Classes and HKLM\Software\Classes directories. The use of HKCU is preferred if an application is not elevated and is ignored if the application is elevated.

+

You typically will use this compatibility fix in conjunction with the VirtualizeRegisterTypeLib fix.

+

For more detailed information about this application fix, see [Using the VirtualizeHKCRLite Fix](http://go.microsoft.com/fwlink/p/?LinkId=690370).

VirtualizeRegisterTypeLib

The fix, when it is used with the VirtualizeHKCRLite fix, ensures that the type library and the COM class registration happen simultaneously. This functions much like the RegistryTypeLib fix when the RegisterTypeLibForUser parameter is used.

+
+Note   +

For more detailed information about this application fix, see [Using the VirtualizeRegisterTypelib Fix](http://go.microsoft.com/fwlink/p/?LinkId=690371).

+
+
+  +

WaveOutIgnoreBadFormat

This problem is indicated by an error message that states: Unable to initialize sound device from your audio driver; the application then closes.

+

The fix enables the application to ignore the format error and continue to function properly.

WerDisableReportException

The fix turns off the silent reporting of exceptions to the Windows Error Reporting tool, including those that are reported by Object Linking and Embedding-Database (OLE DB). The fix intercepts the RtlReportException API and returns a STATUS_NOT_SUPPORTED error message.

Win7RTM/Win8RTM

The layer provides the application with Windows 7/Windows 8 compatibility mode.

WinxxRTMVersionLie

The problem occurs when an application fails because it does not find the correct version number for the required Windows operating system.

+

All version lie compatibility fixes address the issue whereby an application fails to function because it is checking for, but not finding, a specific version of the operating system. The version lie fix returns the appropriate operating system version information. For example, the VistaRTMVersionLie returns the Windows Vista version information to the application, regardless of the actual operating system version that is running on the computer.

Wing32SystoSys32

The problem is indicated by an error message that states that the WinG library was not properly installed.

+

The fix detects whether the WinG32 library exists in the correct directory. If the library is located in the wrong location, this fix copies the information (typically during the runtime of the application) into the %WINDIR% \system32 directory.

+
+Important   +

The application must have Administrator privileges for this fix to work.

+
+
+  +

WinSrv08R2RTM

WinXPSP2VersionLie

The problem occurs when an application experiences issues because of a VB runtime DLL.

+

The fix forces the application to follow these steps:

+
    +
  1. Open the Compatibility Administrator, and then select None for Operating System Mode.

  2. +
  3. On the Compatibility Fixes page, click WinXPSP2VersionLie, and then click Parameters.

    +

    The Options for <fix_name> dialog box appears.

  4. +
  5. Type vbrun60.dll into the Module Name box, click Include, and then click Add.

  6. +
  7. Save the custom database.

    +
    +Note   +

    For more information about the WinXPSP2VersionLie application fix, see [Using the WinXPSP2VersionLie Fix](http://go.microsoft.com/fwlink/p/?LinkId=690374).

    +
    +
    +  +
  8. +

WRPDllRegister

The application fails when it tries to register a COM component that is released together with Windows Vista and later.

+

The fix skips the processes of registering and unregistering WRP-protected COM components when calling the DLLRegisterServer and DLLUnregisterServer functions.

+

You can control this fix further by typing the following command at the command prompt:

+

Component1.dll;Component2.dll

+

Where Component1.dll and Component2.dll reflect the components to be skipped.

+
+Note   +

For more detailed information about this application fix, see [Using the WRPDllRegister Fix](http://go.microsoft.com/fwlink/p/?LinkId=690375).

+
+
+  +

WRPMitigation

The problem is indicated when an access denied error message displays when the application tries to access a protected operating system resource by using more than read-only access.

+

The fix emulates the successful authentication and modification of file and registry APIs, so that the application can continue.

+
+Note   +

For more detailed information about WRPMitigation, see [Using the WRPMitigation Fix](http://go.microsoft.com/fwlink/p/?LinkId=690376).

+
+
+  +

WRPRegDeleteKey

The problem is indicated by an access denied error message that displays when the application tries to delete a registry key.

+

The fix verifies whether the registry key is WRP-protected. If the key is protected, this fix emulates the deletion process.

XPAfxIsValidAddress

The fix emulates the behavior of Windows XP for MFC42!AfxIsValidAddress.

+ +  + +## Compatibility Modes + + +The following table lists the known compatibility modes. + + +++++ + + + + + + + + + + + + + + + + + + + +
Compatibility Mode NameDescriptionIncluded Compatibility Fixes

WinSrv03

Emulates the Windows Server 2003 operating system.

    +
  • Win2k3RTMVersionLie

  • +
  • VirtualRegistry

  • +
  • ElevateCreateProcess

  • +
  • EmulateSorting

  • +
  • FailObsoleteShellAPIs

  • +
  • LoadLibraryCWD

  • +
  • HandleBadPtr

  • +
  • GlobalMemoryStatus2GB

  • +
  • RedirectMP3Codec

  • +
  • EnableLegacyExceptionHandlinginOLE

  • +
  • NoGhost

  • +
  • HardwareAudioMixer

  • +

WinSrv03Sp1

Emulates the Windows Server 2003 with Service Pack 1 (SP1) operating system.

    +
  • Win2K3SP1VersionLie

  • +
  • VirtualRegistry

  • +
  • ElevateCreateProcess

  • +
  • EmulateSorting

  • +
  • FailObsoleteShellAPIs

  • +
  • LoadLibraryCWD

  • +
  • HandleBadPtr

  • +
  • EnableLegacyExceptionHandlinginOLE

  • +
  • RedirectMP3Codec

  • +
  • HardwareAudioMixer

  • +
+ +  + +  + +  + + + + + diff --git a/windows/plan/compatibility-monitor-users-guide.md b/windows/plan/compatibility-monitor-users-guide.md new file mode 100644 index 0000000000..f5b56c4858 --- /dev/null +++ b/windows/plan/compatibility-monitor-users-guide.md @@ -0,0 +1,71 @@ +--- +title: Compatibility Monitor User's Guide (Windows 10) +description: Compatibility Monitor is a tool in the runtime analysis package that you can use to monitor applications for compatibility issues. You can also use the Compatibility Monitor tool to submit compatibility feedback. +ms.assetid: 67d6eff0-1576-44bd-99b4-a3ffa5e205ac +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Compatibility Monitor User's Guide + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Compatibility Monitor is a tool in the runtime analysis package that you can use to monitor applications for compatibility issues. You can also use the Compatibility Monitor tool to submit compatibility feedback. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Using Compatibility Monitor to Send Feedback](using-compatibility-monitor-to-send-feedback.md)

The Microsoft Compatibility Monitor tool is installed as part of the runtime-analysis package. From the computers in your test environment, you can use Compatibility Monitor to submit compatibility information to the Application Compatibility Toolkit (ACT) database for your organization.

[Common Compatibility Issues](common-compatibility-issues.md)

Compatibility issues tend to occur with the following technologies:

+ +  + +## Related topics + + +[Deciding Which Applications to Test](deciding-which-applications-to-test.md) + +[Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md) + +[Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md) + +[Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md) + +  + +  + + + + + diff --git a/windows/plan/computer-dialog-box.md b/windows/plan/computer-dialog-box.md new file mode 100644 index 0000000000..8868744fa1 --- /dev/null +++ b/windows/plan/computer-dialog-box.md @@ -0,0 +1,108 @@ +--- +title: <Computer> Dialog Box (Windows 10) +description: In Application Compatibility Manager (ACM), the <Computer> dialog box shows information about the selected computer. +ms.assetid: f89cbb28-adcd-41cd-9a54-402bc4aaffd9 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <Computer> Dialog Box + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), the *<Computer>* dialog box shows information about the selected computer. + +**To open the <Computer> dialog box** + +1. In ACM, in the **Quick Reports** pane, click **Analyze**. + +2. Under an operating system heading, click **Computers**. + +3. Double-click the name of a computer. + +## Tabs in the <Computer> dialog box + + +The following table shows the information available in the *<Computer>* dialog box. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TabInformation

Details

Shows the following information for the selected computer:

+
    +
  • The computer name, operating system, architecture, and domain.

  • +
  • The IP address, Media Access Control (MAC) address, and hardware identifier.

  • +
  • The manufacturer, asset tag, and system number.

  • +
  • The hardware specifications.

  • +

Applications

Shows the following information for each of the applications installed on the selected computer:

+
    +
  • The application name, version number, and application vendor.

  • +
  • The compatibility rating for the application as determined by your organization.

  • +
  • The compatibility information from the application vendor.

  • +
  • The compatibility information from the ACT Community, which you can view if you are a member of the ACT Community. For more information, see [Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md).

  • +
  • The issues that have been opened for the application.

  • +
  • The count of computers in your organization on which the application is installed.

  • +

Devices

Shows the following information for each of the devices installed on the selected computer:

+
    +
  • The model and manufacturer of the device.

  • +
  • An evaluation of whether the device works on a 32-bit operating system or a 64-bit operating system.

  • +
  • The class of device, as reported by the device.

  • +
  • The count of computers in your organization on which the device is installed.

  • +

Labels

Shows the label for the selected computer.

+

For information about labels, see [Labeling Data in ACM](labeling-data-in-acm.md).

+ +  + +## Using the <Computer> Dialog Box + + +In the *<Computer>* dialog box, you can perform the following actions: + +- Assign categories and subcategories to the computer. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of the computer to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +  + +  + + + + + diff --git a/windows/plan/configuring-act.md b/windows/plan/configuring-act.md new file mode 100644 index 0000000000..ef72f68d43 --- /dev/null +++ b/windows/plan/configuring-act.md @@ -0,0 +1,89 @@ +--- +title: Configuring ACT (Windows 10) +description: This section provides information about setting up the Application Compatibility Toolkit (ACT) in your organization. +ms.assetid: aacbe35e-ea40-47ac-bebf-ed2660c8fd86 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Configuring ACT + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about setting up the Application Compatibility Toolkit (ACT) in your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[ACT Tools, Packages, and Services](act-tools-packages-and-services.md)

The Application Compatibility Toolkit is included with the Windows ADK. [Download the Windows ADK.](http://go.microsoft.com/fwlink/p/?LinkId=526740)

[ACT Deployment Options](act-deployment-options.md)

While planning your deployment of the Application Compatibility Toolkit (ACT), consider which computers you want running the various tools, packages, and services for ACT.

[ACT Database Configuration](act-database-configuration.md)

The Application Compatibility Toolkit (ACT) uses a Microsoft® SQL Server® database for storing and sharing compatibility issue data. If you do not use Microsoft SQL Server, you can download and install Microsoft SQL Server Express. For information about creating Microsoft SQL Server databases, see [Administering the Database Engine](http://go.microsoft.com/fwlink/p/?LinkId=64169).

[ACT Database Migration](act-database-migration.md)

The schema for an ACT database can change when ACT is updated or when a new version of ACT is released. If the schema for an ACT database does not match the current schema, you can migrate the compatibility data to a new database. You can then use the current version of ACT to open the new database.

[ACT LPS Share Permissions](act-lps-share-permissions.md)

To upload log files to the ACT Log Processing Service (LPS) share, certain permissions must be set at the share level and folder level.

+ +  + +## Related topics + + +[Welcome to ACT](welcome-to-act.md) + +[Using ACT](using-act.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +[ACT User Interface Reference](act-user-interface-reference.md) + +[ACT Product and Documentation Resources](act-product-and-documentation-resources.md) + +[ACT Glossary](act-glossary.md) + +[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) + +  + +  + + + + + diff --git a/windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md b/windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md new file mode 100644 index 0000000000..722d28be44 --- /dev/null +++ b/windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md @@ -0,0 +1,89 @@ +--- +title: Creating a Custom Compatibility Fix in Compatibility Administrator (Windows 10) +description: The Compatibility Administrator tool uses the term fix to describe the combination of compatibility information added to a customized database for a specific application. +ms.assetid: e4f2853a-0e46-49c5-afd7-0ed12f1fe0c2 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating a Custom Compatibility Fix in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [What is a Compatibility Fix?](#what_is_a_compatibility_fix_) +- [Searching for Existing Compatibility Fixes](#searching_for_existing_compatibility_fixes) +- [Creating a New Compatibility Fix](#creating_a_new_compatibility_fix) +- [Related topics](#related_topics) + +The Compatibility Administrator tool uses the term *fix* to describe the combination of compatibility information added to a customized database for a specific application. This combination can include single application fixes, groups of fixes that work together as a compatibility mode, and blocking and non-blocking AppHelp messages. + +**Important**   +Fixes apply to a single application only; therefore, you must create multiple fixes if you need to fix the same issue in multiple applications. + +  + +## What is a Compatibility Fix? + + +A compatibility fix, previously known as a shim, is a small piece of code that intercepts API calls from applications. The fix transforms the API calls so that the current version of the operating system supports the application in the same way as previous versions of the operating system. This can mean anything from disabling a new feature in the current version of the operating system to emulating a particular behavior of an older version of the Windows API. + +## Searching for Existing Compatibility Fixes + + +The Compatibility Administrator tool has preloaded fixes for many common applications, including known compatibility fixes, compatibility modes, and AppHelp messages. Before you create a new compatibility fix, you can search for an existing application and then copy and paste the known fixes into your customized database. + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to create custom databases for 32-bit applications and the 64-bit version to create custom databases for 64-bit applications. + +  + +**To search for an existing application** + +1. In the left-side pane of Compatibility Administrator, expand the **Applications** folder and search for your application name. + +2. Click the application name to view the preloaded compatibility fixes, compatibility modes, or AppHelp messages. + +## Creating a New Compatibility Fix + + +If you are unable to find a preloaded compatibility fix for your application, you can create a new one for use by your customized database. + +**To create a new compatibility fix** + +1. In the left-side pane of Compatibility Administrator underneath the **Custom Databases** heading, right-click the name of the database to which you want to apply the compatibility fix, click **Create New**, and then click **Application Fix**. + +2. Type the name of the application to which the compatibility fix applies, type the name of the application vendor, browse to the location of the application file (.exe) on your computer, and then click **Next**. + +3. Select the operating system for which your compatibility fix applies, click any applicable compatibility modes to apply to your compatibility fix, and then click **Next**. + +4. Select any additional compatibility fixes to apply to your compatibility fix, and then click **Next**. + +5. Select any additional criteria to use to match your applications to the AppHelp message, and then click **Finish**. + + By default, Compatibility Administrator selects the basic matching criteria for your application. As a best practice, use a limited set of matching information to represent your application, because it reduces the size of the database. However, make sure you have enough information to correctly identify your application. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md b/windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md new file mode 100644 index 0000000000..661ad8bd6a --- /dev/null +++ b/windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md @@ -0,0 +1,94 @@ +--- +title: Creating a Custom Compatibility Mode in Compatibility Administrator (Windows 10) +description: Windows® provides several compatibility modes, groups of compatibility fixes found to resolve many common application-compatibility issues. +ms.assetid: 661a1c0d-267f-4a79-8445-62a9a98d09b0 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating a Custom Compatibility Mode in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [What Is a Compatibility Mode?](#what_is_a_compatibility_mode_) +- [Searching for Existing Compatibility Modes](#searching_for_existing_compatibility_modes) +- [Creating a New Compatibility Mode](#creating_a_new_compatibility_mode) +- [Related topics](#related_topics) + +Windows® provides several *compatibility modes*, groups of compatibility fixes found to resolve many common application-compatibility issues. While working with Compatibility Administrator, you might decide to group some of your individual compatibility fixes into a custom-compatibility mode, which you can then deploy and use on any of your compatibility databases. + +## What Is a Compatibility Mode? + + +A compatibility mode is a group of compatibility fixes. A compatibility fix, previously known as a shim, is a small piece of code that intercepts API calls from applications. The fix transforms the API calls so that the current version of the operating system supports the application in the same way as previous versions of the operating system. This can be anything from disabling a new feature in Windows to emulating a particular behavior of an older version of the Windows API. + +## Searching for Existing Compatibility Modes + + +The Compatibility Administrator tool has preloaded fixes for many common applications, including known compatibility fixes, compatibility modes, and AppHelp messages. Before you create a new compatibility mode, you can search for an existing application and then copy and paste the known fixes into your custom database. + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to create custom databases for 32-bit applications and the 64-bit version to create custom databases for 64-bit applications. + +  + +**To search for an existing application** + +1. In the left-side pane of Compatibility Administrator, expand the **Applications** folder and search for your application name. + +2. Click the application name to view the preloaded compatibility modes, compatibility fixes, or AppHelp messages. + +## Creating a New Compatibility Mode + + +If you are unable to find a preloaded compatibility mode for your application, you can create a new one for use by your custom database. + +**Important**   +A compatibility mode includes a set of compatibility fixes and must be deployed as a group. Therefore, you should include only fixes that you intend to deploy together to the database. + +  + +**To create a new compatibility mode** + +1. In the left-side pane of Compatibility Administrator, underneath the **Custom Databases** heading, right-click the name of the database to which you will apply the compatibility mode, click **Create New**, and then click **Compatibility Mode**. + +2. Type the name of your custom-compatibility mode into the **Name of the compatibility mode** text box. + +3. Select each of the available compatibility fixes to include in your custom-compatibility mode and then click **>**. + + **Important**   + If you are unsure which compatibility fixes to add, you can click **Copy Mode**. The **Select Compatibility Mode** dialog box appears and enables you to select from the preloaded compatibility modes. After you select a compatibility mode and click **OK**, any compatibility fixes that are included in the preloaded compatibility mode will be automatically added to your custom-compatibility mode. + +   + + If you have any compatibility fixes that require additional parameters, you can select the fix, and then click **Parameters**. The **Options for <Compatibility\_Fix\_Name>** dialog box appears, enabling you to update the parameter fields. + +4. After you are done selecting the compatibility fixes to include, click **OK**. + + The compatibility mode is added to your custom database. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/creating-a-runtime-analysis-package.md b/windows/plan/creating-a-runtime-analysis-package.md new file mode 100644 index 0000000000..8246a9de4a --- /dev/null +++ b/windows/plan/creating-a-runtime-analysis-package.md @@ -0,0 +1,61 @@ +--- +title: Creating a Runtime-Analysis Package (Windows 10) +description: In Application Compatibility Manager (ACM), you can create runtime-analysis packages, which you can then deploy to computers for compatibility testing in your test environment. +ms.assetid: 3c703ebe-46b3-4dcd-b355-b28344bc159b +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating a Runtime-Analysis Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), you can create runtime-analysis packages, which you can then deploy to computers for compatibility testing in your test environment. + +**To create a runtime-analysis package** + +1. In ACM, click **Collect** to open the Collect screen. + +2. On the **File** menu, click **New**. + +3. Click **Runtime application testing**. + +4. Provide the information that is requested for the package, and then click **Create**. + +5. Navigate to the location where you want to save the Windows installer (.msi) file for the package. + + This .msi file is the file that you can use to install the runtime-analysis package on each computer in your test environment. + +6. Type a file name for the .msi file, and then click **Save**. + +7. Click **Finish**. + +## Related topics + + +[Deciding Which Applications to Test](deciding-which-applications-to-test.md) + +[Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md) + +[Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md) + +[Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md b/windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md new file mode 100644 index 0000000000..0f9059eb1d --- /dev/null +++ b/windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md @@ -0,0 +1,110 @@ +--- +title: Creating an AppHelp Message in Compatibility Administrator (Windows 10) +description: The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system. +ms.assetid: 5c6e89f5-1942-4aa4-8439-ccf0ecd02848 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating an AppHelp Message in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Blocking Versus Non-Blocking AppHelp Messages](#blocking_versus_non-blocking_apphelp_messages) +- [Searching for Existing Compatibility Fixes](#searching_for_existing_compatibility_fixes) +- [Creating a New AppHelp Message](#creating_a_new_apphelp_message) +- [Issues with AppHelp Messages and Computers Running Windows 2000](#issues_with_apphelp_messages_and_computers_running_windows_2000) +- [Related topics](#related_topics) + +The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system. + +## Blocking Versus Non-Blocking AppHelp Messages + + +A blocking AppHelp message prevents the application from starting and displays a message to the user. You can define a specific URL where the user can download an updated driver or other fix to resolve the issue. When using a blocking AppHelp message, you must also define the file-matching information to identify the version of the application and enable the corrected version to continue. + +A non-blocking AppHelp message does not prevent the application from starting, but provides a message to the user including information such as security issues, updates to the application, or changes to the location of network resources. + +## Searching for Existing Compatibility Fixes + + +The Compatibility Administrator tool has preloaded fixes for many common applications, including known compatibility fixes, compatibility modes, and AppHelp messages. Before you create a new AppHelp message, you can search for an existing application and then copy and paste the known fixes into your custom database. + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to create custom databases for 32-bit applications and the 64-bit version to create custom databases for 64-bit applications. + +  + +**To search for an existing application** + +1. In the left-side pane of Compatibility Administrator, expand the **Applications** folder and search for your application name. + +2. Click the application name to view the preloaded AppHelp messages, compatibility fixes, and compatibility modes. + +## Creating a New AppHelp Message + + +If you are unable to find a preloaded AppHelp message for your application, you can create a new one for use by your custom database. + +**To create a new AppHelp message** + +1. In the left-side pane of Compatibility Administrator, below the **Custom Databases** heading, right-click the name of the database to which you will apply the AppHelp message, click **Create New**, and then click **AppHelp Message**. + +2. Type the name of the application to which this AppHelp message applies, type the name of the application vendor, browse to the location of the application file (.exe) on your computer, and then click **Next**. + + The wizard shows the known **Matching Information**, which is used for program identification. + +3. Select any additional criteria to use to match your applications to the AppHelp message, and then click **Next**. + + By default, Compatibility Administrator selects the basic matching criteria for your application. + + The wizard shows the **Enter Message Type** options. + +4. Click one of the following options: + + - **Display a message and allow this program to run**. This is a non-blocking message, which means that you can alert the user that there might be a problem, but the application is not prevented from starting. + + - **Display a message and do not allow this program to run**. This is a blocking message, which means that the application will not start. Instead, this message points the user to a location that provides more information about fixing the issue. + +5. Click **Next**. + + The wizard then shows the **Enter Message Information** fields. + +6. Type the website URL and the message text to appear when the user starts the application, and then click **Finish**. + +## Issues with AppHelp Messages and Computers Running Windows 2000 + + +The following issues might occur with computers running Windows 2000: + +- You might be unable to create a custom AppHelp message. + +- The AppHelp message text used for system database entries might not appear. + +- Copying an AppHelp entry for a system database or a custom-compatibility fix from a system database might cause Compatibility Administrator to hide the descriptive text. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md b/windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md new file mode 100644 index 0000000000..d5d0587feb --- /dev/null +++ b/windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md @@ -0,0 +1,122 @@ +--- +title: Creating an Enterprise Environment for Compatibility Testing (Windows 10) +description: The goal of the test environment is to model the operating system that you want to deploy and assess compatibility before deploying the operating system to your production environment. +ms.assetid: cbf6d8b6-7ebc-4faa-bbbd-e02653ed4adb +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating an Enterprise Environment for Compatibility Testing + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Modeling the Production Environment](#modeling_the_production_environment) +- [Configuring the Test Environment for Automated Testing](#configuring_the_test_environment_for_automated_testing) +- [Determining When Virtualization Is Appropriate](#determining_when_virtualization_is_appropriate) +- [Testing Methodology](#testing_methodology) +- [Related topics](#related_topics) + +The goal of the test environment is to model the operating system that you want to deploy and assess compatibility before deploying the operating system to your production environment. Your test environment is composed of computers on which the new operating system is installed. Your test environment can be a long-term investment. Consider retaining the test environment after deployment to assist in future deployment projects. + +## Modeling the Production Environment + + +We recommend the following practices for setting up your test environment: + +- Physically separate your test environment from your production environment. Physical separation helps ensure that activity in the test environment does not affect the production environment. + +- On the computers in your test environment, install the new operating system. + +- Perform all of your tests by using accounts that have similar permissions to the accounts in your production environment. This approach helps to ensure that you can determine potential security issues. + +## Configuring the Test Environment for Automated Testing + + +Typically, tests are run more than once, which requires being able to revert your test environment to a previous state. We recommend the following practices to ensure consistency in testing and consistency in restoring the state of your test environment: + +- Use disk-imaging software to create physical disk images. + +- Use software virtualization features to reverse changes to virtualized hard disks. + +## Determining When Virtualization Is Appropriate + + +The following table shows some of the advantages and disadvantages of virtualization. + + ++++ + + + + + + + + + + + + +
AdvantagesDisadvantages
    +
  • Supports a large number of servers in a limited amount of physical space. You can run as many virtual servers as the physical computer’s resources allow.

  • +
  • Easily shares your test environment between teams. For example, your test team can create a virtualized test environment and then provide a copy to your development team for use in its development processes.

  • +
  • Supports multiple users performing simultaneous testing, mimicking the ability for each user to have a dedicated test environment.

  • +
  • Easily restores your environment to a previous state. For example, you can revert to a previous state by using the Undo Disks option.

  • +
    +
  • May reduce performance. Virtualized servers may be slower than their physical counterparts. The performance of virtualized servers is reduced because physical resources such as disks are virtualized.

  • +
  • May not support all applications and device drivers. Some hardware-specific device drivers and applications are not supported in virtualized servers.

  • +
+ +  + +## Testing Methodology + + +When testing an application in a new operating system, we recommend the following methods: + +- Retain the default security-feature selections. + +- Use test automation tools to run your test cases in a consistent, reproducible way. + +- Use your application in the same way that you use it in your production environment. + +- Use the Compatibility Monitor tool in the runtime-analysis package to gather compatibility feedback. + +- Send and receive compatibility data to obtain data and solutions through the Microsoft Compatibility Exchange. + +- When testing a website or a web application, include both intranet and extranet sites, prioritizing the list based on how critical the site or the application is to your organization. + +## Related topics + + +[Deciding Which Applications to Test](deciding-which-applications-to-test.md) + +[Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md) + +[Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md) + +[Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/creating-an-inventory-collector-package.md b/windows/plan/creating-an-inventory-collector-package.md new file mode 100644 index 0000000000..01d9dcf89c --- /dev/null +++ b/windows/plan/creating-an-inventory-collector-package.md @@ -0,0 +1,57 @@ +--- +title: Creating an Inventory-Collector Package (Windows 10) +description: You can use Application Compatibility Manager (ACM) to create an inventory-collector package. +ms.assetid: 61d041d6-e308-47b3-921b-709d72926d6d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating an Inventory-Collector Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can use Application Compatibility Manager (ACM) to create an inventory-collector package. You can then deploy the inventory-collector package to other computers to gather inventory data. The package uploads inventory data to the Application Compatibility Toolkit (ACT) database. + +**To create an inventory-collector package** + +1. In ACM, click **Collect** to open the **Collect** screen. + +2. On the **File** menu, click **New**. + +3. Click **Application inventory**. + +4. Provide the information that is requested for the package, and then click **Create**. + +5. Browse to the location where you want to save the Windows® Installer (.msi) file for the package. + + You can use this .msi file to install the inventory-collector package on each computer for which you want to gather inventory data. + +6. Type a file name for the .msi file, and then click **Save**. + +7. Click **Finish**. + +## Related topics + + +[Identifying Computers for Inventory Collection](identifying-computers-for-inventory-collection.md) + +[Deploying an Inventory-Collector Package](deploying-an-inventory-collector-package.md) + +  + +  + + + + + diff --git a/windows/plan/creating-and-editing-issues-and-solutions.md b/windows/plan/creating-and-editing-issues-and-solutions.md new file mode 100644 index 0000000000..d4e183c235 --- /dev/null +++ b/windows/plan/creating-and-editing-issues-and-solutions.md @@ -0,0 +1,64 @@ +--- +title: Creating and Editing Issues and Solutions (Windows 10) +description: This section provides step-by-step instructions for adding and editing application compatibility issues and solutions. Your issue and solution data can be uploaded to Microsoft through the Microsoft® Compatibility Exchange. +ms.assetid: b64fe4e0-24bd-4bbd-9645-80ae5644e774 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Creating and Editing Issues and Solutions + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides step-by-step instructions for adding and editing application compatibility issues and solutions. Your issue and solution data can be uploaded to Microsoft through the Microsoft® Compatibility Exchange. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Adding or Editing an Issue](adding-or-editing-an-issue.md)

In Application Compatibility Manager (ACM), you can enter information about the compatibility issues that you discover.

[Adding or Editing a Solution](adding-or-editing-a-solution.md)

If you find your own solutions to compatibility issues, you can enter the solutions in Application Compatibility Manager (ACM). You can use the Microsoft Compatibility Exchange to upload solutions to Microsoft Corporation.

[Resolving an Issue](resolving-an-issue.md)

You can use Application Compatibility Manager (ACM) to flag issues as resolved. Resolving an issue changes the status of the issue from a red x to a green check mark on your report and report detail screens.

+ +  + +  + +  + + + + + diff --git a/windows/plan/customizing-your-report-views.md b/windows/plan/customizing-your-report-views.md new file mode 100644 index 0000000000..e41f2f89d0 --- /dev/null +++ b/windows/plan/customizing-your-report-views.md @@ -0,0 +1,148 @@ +--- +title: Customizing Your Report Views (Windows 10) +description: You can customize how you view your report data in Application Compatibility Manager (ACM). +ms.assetid: ba8da888-6749-43b4-8efb-4f26c7954721 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Customizing Your Report Views + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can customize how you view your report data in Application Compatibility Manager (ACM). + +## Modifying the <Operating\_System> Reports View + + +You can choose which operating systems ACM shows in the compatibility reports. For operating systems that you exclude from the reports, the data continues to be collected but ACM does not display it. + +If you are using ACM on multiple computers that access the same ACT database, when you remove an operating system from your reports, all of the computers running ACM no longer show the operating system. + +**To add or remove an operating system from the Quick Reports pane** + +1. On the **Analyze** screen, at the bottom of the **Quick Reports** pane, click **Customize this view**. + +2. In the **Deployment Reports** area, select the check boxes for the operating systems you want to show in your reports, and then click **OK**. + +3. Select the architectures, **32-bit**, **64-bit**, or **Both**, for which you want to see compatibility ratings in the report screens. + +## Adding and Removing Columns from the Report Views + + +You can add and remove columns from most of the report screens. In the report dialog boxes, you cannot add or remove columns, but you can reorder the columns. + +**To add or remove a column** + +1. On the selected report screen, right-click the column headings, and then click **Column Options**. + +2. Select the check box next to any column that you want to add, and clear the check box next to any column that you want to remove. + +3. If you want, reorder the columns by using the **Move Up** and **Move Down** buttons. + +4. Click **OK**. + +### Columns by Screen + +The following table shows the columns that are available for each screen. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ScreenDefault columnsAdditional columns

[<OperatingSystem> - Application Report](operatingsystem---application-report.md)

    +
  • Application Name

  • +
  • Version

  • +
  • Company

  • +
  • My Assessment

  • +
  • User Assessment

  • +
  • Send/Receive Status

  • +
  • Vendor Assessment

  • +
  • Community Assessment

  • +
  • Active Issues

  • +
  • Computers

  • +
    +
  • Resolved Issues

  • +
  • Language

  • +
  • Priority

  • +
  • Deployment Status

  • +
  • Issues with Solutions

  • +

[<OperatingSystem> - Computer Report](operatingsystem---computer-report.md)

    +
  • Computer Name

  • +
  • Applications with Issues

  • +
  • Devices with Issues

  • +
  • Operating System

  • +
  • Domain

  • +
  • Applications

  • +
  • Devices

  • +
    +
  • Priority

  • +

[<OperatingSystem> - Device Report](operatingsystem---device-report.md)

    +
  • Model

  • +
  • Manufacturer

  • +
  • Assessment

  • +
  • Device Class

  • +
  • Computers

  • +
    +
  • Assessment

  • +
  • Priority

  • +

[Internet Explorer - Web Site Report](internet-explorer---web-site-report.md)

    +
  • Web Site

  • +
  • My Assessment

  • +
  • Active Issues

  • +
  • Resolved Issues

  • +
    +
  • None

  • +
+ +  + +  + +  + + + + + diff --git a/windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md b/windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md new file mode 100644 index 0000000000..4f5456aa5d --- /dev/null +++ b/windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md @@ -0,0 +1,238 @@ +--- +title: Data Sent Through the Microsoft Compatibility Exchange (Windows 10) +description: The Microsoft Compatibility Exchange propagates data of various types between Microsoft Corporation, independent software vendors (ISVs) and the Application Compatibility Toolkit (ACT) Community. +ms.assetid: 3ec61e33-9db8-4367-99d5-e05c2f50e144 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Data Sent Through the Microsoft Compatibility Exchange + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Microsoft Compatibility Exchange propagates data of various types between Microsoft Corporation, independent software vendors (ISVs) and the Application Compatibility Toolkit (ACT) Community. + +## Data Sent to Microsoft + + +During synchronization, the Microsoft Compatibility Exchange sends the following information to Microsoft Corporation: + +- **Application information and properties**. This data includes the application name, the vendor, the version number, the language, and the deployment type. + +The data-synchronization process does not send your list of URLs visited as part of the information exchange. + +## Data Sent to the ACT Community + + +The Microsoft Compatibility Exchange sends the following information to the ACT Community for each application that you decide to share with the ACT Community: + +- **Application information and properties**. This data includes the application name, the vendor, the version number, the language, and the deployment type. + +- **Miscellaneous data**. This data includes: + + - The database GUID that identifies the organization that is the source of the data. + + - The issue data. + + - The issue ID. + + - The platform and destination operating system. + + - The severity. + + - The cause. + + - The symptom. + + - The solution data. + + - The solution type. + + - The issue and solution provider. + + - The issue and solution subprovider. + + - The issue and solution published date. + + - Your risk assessment. + +The data-synchronization process does not send your list of URLs visited as part of the information exchange. + +## Data Matching + + +After you send your data, the Microsoft Compatibility Exchange matches your application properties against the known issues listed in the Application Profile database. The Microsoft Compatibility Exchange downloads any issues and corresponding solutions that match your application set and then stores the information in your ACT database. + +## Data Sent From Microsoft and ISVs + + +For each application that matches an application in the Application Profile database, the Microsoft Compatibility Exchange returns the following information, provided by authoritative sources including Microsoft Corporation and independent software vendors (ISVs). + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
DataDescription

Risk assessment

The determination of whether the application has compatibility issues.

Symptom

Behavior exhibited by the application.

Cause

Reason for the failure.

Provider and subprovider

Source of the compatibility issue.

Issue ID

A unique ID number for the compatibility issue.

Severity

Impact this issue has on the application experience.

Priority

Degree of impact that this issue has on your organization.

Published Date

Date that the source entered the data into the database.

Operating system name

Friendly name of the installed operating system.

Major version

Major version number of the operating system.

Minor version

Minor version number of the operating system.

Locale

Language ID of the application to which the compatibility issue applies.

Title

Short title of the compatibility issue.

Summary

Description of the compatibility issue.

Service pack major

Major version number of the operating system service pack.

Service pack minor

Minor version number of the operating system service pack.

URL HREF

URL of any links provided for the compatibility issue.

Provider and subprovider IDs

IDs for the source of the compatibility issue's solution.

Solution type

Type of solution provided for the compatibility issue.

Locale

Language ID of the application to which the solution applies.

Title

Short title of the solution.

Details

Description of the solution.

URL HREF

URL of any links provided for the compatibility issue solution.

+ +  + +## Data Sent From the ACT Community + + +For each application that matches an application in the Application Profile database, the Microsoft Compatibility Exchange returns the following ACT Community information, which you receive only if you are a member of the ACT Community: + + ++++ + + + + + + + + + + + + + + + + + + + + +
DataDescription

Works

The count of Works ratings, for 32-bit and 64-bit operating systems.

Works with Minor Issues or has Solutions

The count of Works with Minor Issues or has Solutions ratings, for 32-bit and 64-bit operating systems.

Does Not Work

The count of Does Not Work ratings, for 32-bit and 64-bit operating systems.

+ +  + +## Related topics + + +[Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md) + +[Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md) + +  + +  + + + + + diff --git a/windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md b/windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md new file mode 100644 index 0000000000..ed48afa8a9 --- /dev/null +++ b/windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md @@ -0,0 +1,53 @@ +--- +title: Deciding Whether to Fix an Application or Deploy a Workaround (Windows 10) +description: You can fix a compatibility issue by changing the code for the application or by deploying a workaround. +ms.assetid: e495d0c8-bfba-4537-bccd-64c4b52206f1 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Deciding Whether to Fix an Application or Deploy a Workaround + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can fix a compatibility issue by changing the code for the application or by deploying a workaround. + +## Fixing an Application + + +Fixing an application by changing the code is often the recommended way to address a compatibility issue. Although applying a fix to the code might involve higher initial costs or additional development time, it can limit long-term maintenance or operational costs. After you change the code, all users can use the application without encountering the issue. + +If you do not have access to the code, or if you do not have the time and resources to apply a fix, an alternative approach is to deploy a workaround. + +## Deploying a Workaround + + +A workaround involves applying alternative registry settings to address a compatibility issue. Deploying a workaround might be quicker and easier than changing the code, but you can incur long-term maintenance or operational costs. For example, you must make sure that new users have the correct set of features enabled or disabled on their computers. Using a workaround might also make your application or systems less secure. However, the overall security enhancement associated with deploying the newer version of Windows® may more than offset this reduction in security. + +Consider changing registry settings as a short-term solution while you develop the long-term solution of changing the code. + +## Related topics + + +[SUA User's Guide](sua-users-guide.md) + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/deciding-which-applications-to-test.md b/windows/plan/deciding-which-applications-to-test.md new file mode 100644 index 0000000000..f5719dbdb7 --- /dev/null +++ b/windows/plan/deciding-which-applications-to-test.md @@ -0,0 +1,53 @@ +--- +title: Deciding Which Applications to Test (Windows 10) +description: Before starting your compatibility testing on the version of Windows that you want to deploy, you can use the Application Compatibility Toolkit (ACT) to identify which applications should be the focus of your testing. +ms.assetid: d7c1c28f-b7b4-43ac-bf87-2910a2b603bf +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Deciding Which Applications to Test + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Before starting your compatibility testing on the version of Windows that you want to deploy, you can use the Application Compatibility Toolkit (ACT) to identify which applications should be the focus of your testing. + +**To choose the applications to include in compatibility testing** + +1. Gather your application and device inventory. For more information, see [Taking Inventory of Your Organization](taking-inventory-of-your-organization.md). + +2. Use the Microsoft Compatibility Exchange to get the latest compatibility ratings. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +3. Organize and group your applications, and determine which applications need to be tested. For more information, see [Organizing Your Compatibility Data](organizing-your-compatibility-data.md). + + After completing these steps, you can then start creating and deploying your runtime-analysis packages to the test environment for your compatibility testing. + +## Related topics + + +[Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md) + +[Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md) + +[Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md) + +[Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/deleting-a-data-collection-package.md b/windows/plan/deleting-a-data-collection-package.md new file mode 100644 index 0000000000..ade04833e1 --- /dev/null +++ b/windows/plan/deleting-a-data-collection-package.md @@ -0,0 +1,51 @@ +--- +title: Deleting a Data-Collection Package (Windows 10) +description: In Application Compatibility Manager (ACM), you can delete any of your existing data-collection packages from the database. +ms.assetid: 1b397d7a-7216-4078-93d9-47c7becbf73e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Deleting a Data-Collection Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), you can delete any of your existing data-collection packages from the database. + +You cannot undo the deletion of a data-collection package. If you mistakenly delete a data-collection package, you must create a new package to replace the deleted package. + +**To delete a data-collection package** + +1. In ACM, click **Collect** to open the Collect screen. + +2. Select the data-collection package that you want to delete, and then press the DELETE key. + +3. In the confirmation box, click **Yes**. + +## Related topics + + +[Log File Locations for Data-Collection Packages](log-file-locations-for-data-collection-packages.md) + +[Exporting a Data-Collection Package](exporting-a-data-collection-package.md) + +[Labeling Data in ACM](labeling-data-in-acm.md) + +  + +  + + + + + diff --git a/windows/plan/deploying-a-runtime-analysis-package.md b/windows/plan/deploying-a-runtime-analysis-package.md new file mode 100644 index 0000000000..09c49b1cc9 --- /dev/null +++ b/windows/plan/deploying-a-runtime-analysis-package.md @@ -0,0 +1,47 @@ +--- +title: Deploying a Runtime-Analysis Package (Windows 10) +description: When you deploy a runtime-analysis package, you are deploying it to your test environment for compatibility testing. +ms.assetid: 304bf0be-0e7c-4c5f-baac-bed7f8bef509 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Deploying a Runtime-Analysis Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +When you deploy a runtime-analysis package, you are deploying it to your test environment for compatibility testing. + +For information about creating the test environment, see [Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md). + +To deploy a runtime-analysis package, you can use the same deployment methods that you might use to deploy an inventory-collector package. For information about deployment methods, see [Deploying an Inventory-Collector Package](deploying-an-inventory-collector-package.md). + +## Related topics + + +[Deciding Which Applications to Test](deciding-which-applications-to-test.md) + +[Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md) + +[Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md) + +[Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/deploying-an-inventory-collector-package.md b/windows/plan/deploying-an-inventory-collector-package.md new file mode 100644 index 0000000000..a3d471a410 --- /dev/null +++ b/windows/plan/deploying-an-inventory-collector-package.md @@ -0,0 +1,142 @@ +--- +title: Deploying an Inventory-Collector Package (Windows 10) +ms.assetid: 8726ff71-0d17-4449-bdb7-66957ae51c62 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Deploying an Inventory-Collector Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can use the following methods to deploy an inventory-collector package to the destination computers: + +- **Group Policy Software Installation.** This is a feature of Active Directory Domain Services in Windows Server. All computers to which you deploy the package must be part of the Active Directory forest. + +- **Logon script.** You can use Windows Script Host to create a logon script. Installing by using a logon script requires administrator credentials on the local computer. + +- **Microsoft® System Center Configuration Manager.** For information about how to use System Center Configuration Manager, see the product documentation. + +- **Manual distribution.** You can use a file server on the network as a software distribution point, or you can distribute removable media. User installation of an inventory-collector package requires administrator credentials on the local computer. + +**To deploy an inventory-collector package by using Group Policy Software Installation** + +1. Ensure that the computers to which you want to deploy the inventory-collector package are members of the Active Directory forest. + +2. Create a Group Policy Object (GPO) for publishing the inventory-collector package. + +3. Assign the GPO to the organizational units (OUs) that contain the set of computers. + +4. Create and publish a new software installation package by using Group Policy Software Installation. + + For information about the Group Policy Software Installation process, see [Best practices for Group Policy Software Installation](http://go.microsoft.com/fwlink/p/?LinkId=87996). + +**To assign a logon script for installing an inventory-collector package to an organizational unit** + +1. Create the logon script. The following script is an example. + + ``` syntax + Set ws = WScript.CreateObject("WScript.Shell") + ws.Run("\\servername\collector\package_name.exe") + ``` + + To keep the installation from running repeatedly, your script must create a marker. + + For more information about logon scripts, see [Assign a Logon Script to a User in the Active Directory](http://go.microsoft.com/fwlink/p/?LinkId=87997). + +2. Save your script in the SYSVOL\\Scripts folder. + +3. Open the Active Directory Users and Computers console by clicking **Start**, clicking **All Programs**, clicking **Administrative Tools**, and then clicking **Active Directory Users and Computers**. + +4. Right-click the OU to which you intend to assign the logon script, click **Properties**, and then click the **Group Policy** tab. + +5. Click **New** to add a new GPO, or select an existing GPO and then click **Edit**. + +6. In the left pane, expand the **User Configuration** object, expand the **Windows Setting** object, and then click **Scripts (Logon/Logoff)**. + +7. In the right pane, double-click the **Logon** script. + +8. Click **Add**. + +9. Click **Browse**, browse to the \\\\*<domain>*\\Sysvol\\Scripts folder, select your script, and then click **Open**. + +10. Click **OK** to close the **Logon Properties** dialog box. + +11. Close the Group Policy Management console and the Active Directory Users and Computers console. + +12. On a computer that is a member of the domain and a part of the OU, log on as an OU user. + +13. Open a **Command Prompt** window, and then type `GPUPDATE /force` to force the update of the Group Policy setting. + +14. At the command prompt, type `RSOP.msc` to verify your Group Policy assignment. + +15. In the left pane, expand the **Computer Configuration** object, expand the **Windows Setting** object, and then click **Security Settings**. + +16. Expand **Account Policies**, click **Password Policy**, and verify the assigned Group Policy setting. + +17. Close the Resultant Set of Policy console and the **Command Prompt** window. + +**To deploy an inventory-collector package by using System Center Configuration Manager** + +1. Verify that the computers to which you want to deploy the package are included in your Configuration Manager inventory. + +2. Create a Configuration Manager computer collection that includes the computers. + +3. Create a shared folder that contains the source image of the inventory-collector package. + +4. Create a Configuration Manager package that is based on the source image from the shared folder. + + For more information, see [How to Create a Package](http://go.microsoft.com/fwlink/p/?LinkId=131355). + +5. Specify the Configuration Manager software distribution points. + +6. Create a Configuration Manager program that includes the required commands and command-line options to deploy the inventory-collector package. + + For more information, see [How to Create a Program](http://go.microsoft.com/fwlink/p/?LinkId=131356). + +7. Create a Configuration Manager advertisement that instructs Configuration Manager clients to run the program that you specified in the previous step. + + For more information, see [How to Create an Advertisement](http://go.microsoft.com/fwlink/p/?LinkId=131357). + +**To deploy an inventory-collector package from a network share** + +1. Store your package (.msi) file in a shared folder on the network. + +2. Notify the users of the computers that require the inventory-collector package to run the .msi file. For example, you might send an email message that includes a hyperlink to the shared folder. + +**To deploy an inventory-collector package to offline computers** + +1. In your inventory-collector package, specify a local output path for the log file. + +2. Burn your.msi file to removable media. + +3. Send the removable media to users of the offline computers. + +4. Instruct the users to run the .msi file and then return the generated log file. For example, the users might send the log file in an email message or place the file on a network share. + +## Related topics + + +[Identifying Computers for Inventory Collection](identifying-computers-for-inventory-collection.md) + +[Creating an Inventory-Collector Package](creating-an-inventory-collector-package.md) + +  + +  + + + + + diff --git a/windows/plan/deployment-considerations-for-windows-to-go.md b/windows/plan/deployment-considerations-for-windows-to-go.md new file mode 100644 index 0000000000..8f2edec923 --- /dev/null +++ b/windows/plan/deployment-considerations-for-windows-to-go.md @@ -0,0 +1,332 @@ +--- +title: Deployment considerations for Windows To Go (Windows 10) +description: Deployment considerations for Windows To Go +ms.assetid: dcfc5d96-b96b-44cd-ab65-416b5611c65e +keywords: ["deploy, mobile, device, USB, boot, image, workspace, driver"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Deployment considerations for Windows To Go + + +**Applies to** + +- Windows 10 + +From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB drive. Given that Windows To Go was designed as an enterprise solution, extra consideration was given to the deployment workflows that enterprises already have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs. + +**Note**   +Windows To Go does not support operating system upgrades. Windows To Go is designed as a feature that is managed centrally. IT departments that plan to transition from one operating system version to a later version will need to incorporate re-imaging their existing Windows To Go drives as part of their upgrade deployment process. + +  + +The following sections discuss the boot experience, deployment methods, and tools that you can use with Windows To Go. + +- [Initial boot experiences](#wtg_initboot) + +- [Image deployment and drive provisioning considerations](#wtg_imagedep) + +- [Application installation and domain join](#wtg_appinstall) + +- [Management of Windows To Go using Group Policy](#BKMK_wtggp) + +- [Supporting booting from USB](#wtg_bootusb) + +- [Updating firmware](#stg_firmware) + +- [Configure Windows To Go startup options](#wtg_startup) + +- [Change firmware settings](#wtg_changefirmware) + +## Initial boot experiences + + +The following diagrams illustrate the two different methods you could use to provide Windows To Go drives to your users. The experiences differ depending on whether the user will be booting the device initially on-premises or off-premises: + +![initial boot on-premises](images/wtg-first-boot-work.gif) + +When a Windows To Go workspace is first used at the workplace, the Windows To Go workspace can be joined to the domain through the normal procedures that occur when a new computer is introduced. It obtains a lease, applicable policies are applied and set, and user account tokens are placed appropriately. BitLocker protection can be applied and the BitLocker recovery key automatically stored in Active Directory Domain Services. The user can access network resources to install software and get access to data sources. When the workspace is subsequently booted at a different location either on or off premises, the configuration required for it to connect back to the work network using either DirectAccess or a virtual private network connection can be configured. It is not necessary to configure the workspace for offline domain join. DirectAccess can make connecting to organizational resources easier, but is not required. + +![initial boot off-premises](images/wtg-first-boot-home.gif) + +When the Windows To Go workspace is going to be used first on an off-premises computer, such as one at the employee’s home, then the IT professional preparing the Windows To Go drives should configure the drive to be able to connect to organizational resources and to maintain the security of the workspace. In this situation, the Windows To Go workspace needs to be configured for offline domain join and BitLocker needs to be enabled before the workspace has been initialized. + +**Tip**   +Applying BitLocker Drive Encryption to the drives before provisioning is a much faster process than encrypting the drives after data has already been stored on them due to a new feature called used-disk space only encryption. For more information, see [What's New in BitLocker](http://go.microsoft.com/fwlink/p/?LinkId=619076). + +  + +DirectAccess can be used to ensure that the user can login with their domain credentials without needing a local account. For instructions on setting up a DirectAccess solution, for a small pilot deployment see [Deploy a Single Remote Access Server using the Getting Started Wizard](http://go.microsoft.com/fwlink/p/?LinkId=619077) for a larger scale deployment, see [Deploy Remote Access in an Enterprise](http://go.microsoft.com/fwlink/p/?LinkId=619078). If you do not want to use DirectAccess as an alternative users could log on using a local user account on the Windows To Go workspace and then use a virtual private network for remote access to your organizational network. + +### Image deployment and drive provisioning considerations + +The Image Deployment process can be accomplished either by a centralized IT process for your organization or by individual users creating their own Windows To Go workspaces. You must have local Administrator access and access to a Windows 10 Enterprise or Windows 10 Education image to create a Windows To Go workspace, or you must be using System Center Configuration Manager 2012 Service Pack 1 or later to distribute Windows To Go workspaces to users. The image deployment process takes a blank USB drive and a Windows 10 Enterprise image (WIM) and turns it into a Windows To Go drive. + +![windows to go image deployment](images/wtg-image-deployment.gif) + +The simplest way to provision a Windows To Go drive is to use the Windows To Go Creator. After a single Windows To Go workspace has been created, it can be duplicated as many times as necessary using widely available USB duplicator products as long as the device has not been booted. After the Windows To Go drive is initialized, it should not be duplicated. Alternatively, Windows To Go Workspace Creator can be run multiple times to create multiple Windows To Go drives. + +**Tip**   +When you create your Windows To Go image use sysprep /generalize, just as you do when you deploy Windows 10 to a standard PC. In fact, if appropriate, use the same image for both deployments. + +  + +**Driver considerations** + +Windows includes most of the drivers that you will need to support a wide variety of host computers. However, you will occasionally need to download drivers from Windows Update to take advantage of the full functionality of a device. If you are using Windows To Go on a set of known host computers, you can add any additional drivers to the image used on Windows To Go to make Windows To Go drives more quickly usable by your employees. Especially ensure that network drivers are available so that the user can connect to Windows Update to get additional drivers if necessary. + +Wi-Fi network adapter drivers are one of the most important drivers to make sure that you include in your standard image so that users can easily connect to the internet for any additional updates. IT administrators that are attempting to build Windows 10 images for use with Windows To Go should consider adding additional Wi-Fi drivers to their image to ensure that their users have the best chance of still having basic network connectivity when roaming between systems. + +The following list of commonly used Wi-Fi network adapters that are not supported by the default drivers provided with Windows 10 is provided to help you ascertain whether or not you need to add drivers to your image. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Vendor name

Product description

HWID

Windows Update availability

Broadcom

802.11abgn Wireless SDIO adapter

sd\vid_02d0&pid_4330&fn_1

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_00d6106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_00f5106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_00ef106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_00f4106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_010e106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_00e4106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_433114e4&rev_02

Contact the system OEM or Broadcom for driver availability.

Broadcom

802.11n Network Adapter

pci\ven_14e4&dev_4331&subsys_010f106b&rev_02

Contact the system OEM or Broadcom for driver availability.

Marvell

Yukon 88E8001/8003/8010 PCI Gigabit Ethernet

pci\ven_11ab&dev_4320&subsys_811a1043

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619080)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619082)

Marvell

Libertas 802.11b/g Wireless

pci\ven_11ab&dev_1faa&subsys_6b001385&rev_03

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619128)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619129)

Qualcomm

Atheros AR6004 Wireless LAN Adapter

sd\vid_0271&pid_0401

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619086)

+

64-bit driver not available

Qualcomm

Atheros AR5BWB222 Wireless Network Adapter

pci\ven_168c&dev_0034&subsys_20031a56

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619348)

+

64-bit driver not available

Qualcomm

Atheros AR5BWB222 Wireless Network Adapter

pci\ven_168c&dev_0034&subsys_020a1028&rev_01

Contact the system OEM or Qualcom for driver availability.

Qualcomm

Atheros AR5005G Wireless Network Adapter

pci\ven_168c&dev_001a&subsys_04181468&rev_01

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619349)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619091)

Ralink

Wireless-G PCI Adapter

pci\ven_1814&dev_0301&subsys_00551737&rev_00

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619092)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619093)

Ralink

Turbo Wireless LAN Card

pci\ven_1814&dev_0301&subsys_25611814&rev_00

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619094)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619095)

Ralink

Wireless LAN Card V1

pci\ven_1814&dev_0302&subsys_3a711186&rev_00

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619097)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619098)

Ralink

D-Link AirPlus G DWL-G510 Wireless PCI Adapter(rev.C)

pci\ven_1814&dev_0302&subsys_3c091186&rev_00

[32-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619099)

+

[64-bit driver](http://go.microsoft.com/fwlink/p/?LinkId=619100)

+ +  + +IT administrators that want to target Windows To Go images for specific systems should test their images to ensure that the necessary system drivers are in the image, especially for critical functionality like Wi-Fi that is not supported by class drivers. Some consumer devices require OEM specific driver packages, which may not be available on Windows Update. For more information on how to add a driver to a Windows Image, please refer to the [Basic Windows Deployment Step-by-Step Guide](http://go.microsoft.com/fwlink/p/?LinkId=619079). + +### Application installation and domain join + +Unless you are using a customized Windows image that includes unattended installation settings, the initial Windows To Go workspace will not be domain joined and will not contain applications. This is exactly like a new installation of Windows on a desktop or laptop computer. When planning your deployment, you should develop methods to join Windows to Go drives to the domain and install the standard applications that users in your organization require. These methods probably will be similar to the ones used for setting up desktop and laptop computers with domain privileges and applications + +### Management of Windows To Go using Group Policy + +In general, management of Windows To Go workspaces is same as that for desktop and laptop computers. There are Windows To Go specific Group Policy settings that should be considered as part of Windows To Go deployment. Windows To Go Group Policy settings are located at `\\Computer Configuration\Administrative Templates\Windows Components\Portable Operating System\` in the Local Group Policy Editor. + +The use of the Store on Windows To Go workspaces that are running Windows 8 can also be controlled by Group Policy. This policy setting is located at `\\Computer Configuration\Administrative Templates\Windows Components\Store\` in the Local Group Policy Editor. The policy settings have specific implications for Windows To Go that you should be aware of when planning your deployment: + +**Settings for workspaces** + +- **Allow hibernate (S4) when started from a Windows To Go workspace** + + This policy setting specifies whether the PC can use the hibernation sleep state (S4) when started from a Windows To Go workspace. By default, hibernation is disabled when using Windows To Go workspace, so enabling this setting explicitly turns this ability back on. When a computer enters hibernation, the contents of memory are written to disk. When the disk is resumed, it is important that the hardware attached to the system, as well as the disk itself, are unchanged. This is inherently incompatible with roaming between PC hosts. Hibernation should only be used when the Windows To Go workspace is not being used to roam between host PCs. + + **Important**   + For the host-PC to resume correctly when hibernation is enabled the Windows To Go workspace must continue to use the same USB port. + +   + +- **Disallow standby sleep states (S1-S3) when starting from a Windows To Go workspace** + + This policy setting specifies whether the PC can use standby sleep states (S1–S3) when started from a Windows To Go workspace. The Sleep state also presents a unique challenge to Windows To Go users. When a computer goes to sleep, it appears as if it is shut down. It could be very easy for a user to think that a Windows To Go workspace in sleep mode was actually shut down and they could remove the Windows To Go drive and take it home. Removing the Windows To Go drive in this scenario is equivalent to an unclean shutdown which may result in the loss of unsaved user data or the corruption on the drive. Moreover, if the user now boots the drive on another PC and brings it back to the first PC which still happens to be in the sleep state, it will lead to an arbitrary crash and eventually corruption of the drive and result in the workspace becoming unusable. If you enable this policy setting, the Windows To Go workspace cannot use the standby states to cause the PC to enter sleep mode. If you disable or do not configure this policy setting, the Windows To Go workspace can place the PC in sleep mode. + +**Settings for host PCs** + +- **Windows To Go Default Startup Options** + + This policy setting controls whether the host computer will boot to Windows To Go if a USB device containing a Windows To Go workspace is connected, and controls whether users can make changes using the **Windows To Go Startup Options** settings dialog. If you enable this policy setting, booting to Windows To Go when a USB device is connected will be enabled and users will not be able to make changes using the **Windows To Go Startup Options** settings dialog. If you disable this policy setting, booting to Windows To Go when a USB device is connected will not be enabled unless a user configures the option manually in the firmware. If you do not configure this policy setting, users who are members of the local Administrators group can enable or disable booting from USB using the **Windows To Go Startup Options** settings dialog. + + **Important**   + Enabling this policy setting will cause PCs running Windows to attempt to boot from any USB device that is inserted into the PC before it is started. + +   + +## Supporting booting from USB + + +The biggest hurdle for a user wanting to use Windows To Go is configuring their computer to boot from USB. This is traditionally done by entering the firmware and configuring the appropriate boot order options. To ease the process of making the firmware modifications required for Windows To Go, Windows includes a feature named **Windows To Go Startup Options** that allows a user to configure their computer to boot from USB from within Windows—without ever entering their firmware, as long as their firmware supports booting from USB. + +**Note**   +Enabling a system to always boot from USB first has implications that you should consider. For example, a USB device that includes malware could be booted inadvertently to compromise the system, or multiple USB drives could be plugged in to cause a boot conflict. For this reason, the Windows To Go startup options are disabled by default. In addition, administrator privileges are required to configure Windows To Go startup options. + +  + +If you are going to be using a Windows 7 computer as a host-PC, see the wiki article [Tips for configuring your BIOS settings to work with Windows To Go](http://go.microsoft.com/fwlink/p/?LinkID=618951). + +### Roaming between different firmware types + +Windows supports two types of PC firmware: Unified Extensible Firmware Interface (UEFI), which is the new standard, and legacy BIOS firmware, which was used in most PCs shipping with Windows 7 or earlier version of Windows. Each firmware type has completely different Windows boot components that are incompatible with each other. Beyond the different boot components, Windows supports different partition styles and layout requirements for each type of firmware as shown in the following diagrams. + +![bios layout](images/wtg-mbr-bios.gif)![uefi layout](images/wtg-gpt-uefi.gif) + +This presented a unique challenge for Windows To Go because the firmware type is not easily determined by end-users—a UEFI computer looks just like a legacy BIOS computer and Windows To Go must boot on both types of firmware. + +To enable booting Windows To Go on both types of firmware, a new disk layout is provided for Windows 8 or later that contains both sets of boot components on a FAT32 system partition and a new command-line option was added to bcdboot.exe to support this configuration. The **/f** option is used with the **bcdboot /s** command to specify the firmware type of the target system partition by appending either **UEFI**, **BIOS** or **ALL**. When creating Windows To Go drives manually you must use the **ALL** parameter to provide the Windows To Go drive the ability to boot on both types of firmware. For example, on volume H: (your Windows To Go USB drive letter), you would use the command **bcdboot C:\\windows /s H: /f ALL**. The following diagram illustrates the disk layout that results from that command: + +![firmware roaming disk layout](images/wtg-mbr-firmware-roaming.gif) + +This is the only supported disk configuration for Windows To Go. With this disk configuration, a single Windows To Go drive can be booted on computers with UEFI and legacy BIOS firmware. + +### Configure Windows To Go startup options + +Windows To Go Startup Options is a setting available on Windows 10-based PCs that enables the computer to be booted from a USB without manually changing the firmware settings of the PC. To configure Windows To Go Startup Options you must have administrative rights on the computer and the **Windows To Go Default Startup Options** Group Policy setting must not be configured. + +**To configure Windows To Go startup options** + +1. On the Start screen, type, type **Windows To Go Startup Options**, click **Settings** and then press Enter. + + ![windows to go startup options](images/wtg-startup-options.gif) + +2. Select **Yes** to enable the startup options. + + **Tip**   + If your computer is part of a domain, the Group Policy setting can be used to enable the startup options instead of the dialog. + +   + +3. Click **Save Changes**. If the User Account Control dialog box is displayed, confirm that the action it displays is what you want, and then click **Yes**. + +### Change firmware settings + +If you choose to not use the Windows To Go startup options or are using a PC running Windows 7 as your host computer you will need to manually configure the firmware settings. The process used to accomplish this will depend on the firmware type and manufacturer. If your host computer is protected by BitLocker and running Windows 7 you should suspend BitLocker before making the change to the firmware settings. After the firmware settings have been successfully reconfigured, resume BitLocker protection. If you do not suspend BitLocker first, BitLocker will assume that the computer has been tampered with and will boot into BitLocker recovery mode. + +## Related topics + + +[Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) + +[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) + +[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) + +[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) + +  + +  + + + + + diff --git a/windows/plan/device-dialog-box.md b/windows/plan/device-dialog-box.md new file mode 100644 index 0000000000..37929da162 --- /dev/null +++ b/windows/plan/device-dialog-box.md @@ -0,0 +1,89 @@ +--- +title: <Device> Dialog Box (Windows 10) +description: In Application Compatibility Manager (ACM), the <Device> dialog box shows information about the selected device. +ms.assetid: 5bd7cfda-31ea-4967-8b64-6c0425092f4e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <Device> Dialog Box + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), the *<Device>* dialog box shows information about the selected device. + +**To open the <Device> dialog box** + +1. In ACM, in the **Quick Reports** pane, click **Analyze**. + +2. Under an operating system heading, click **Devices**. + +3. Double-click the name of a device. + +## Tabs in the <Device> dialog box + + +The following table shows the information available in the *<Device>* dialog box. + + ++++ + + + + + + + + + + + + + + + + +
TabInformation

Details

Shows the following information for the selected device:

+
    +
  • The model and manufacturer of the device.

  • +
  • The class of device, as reported by the device.

  • +
  • An evaluation of whether the device works on a 32-bit operating system or a 64-bit operating system.

  • +

Computers

Shows the following information for each of the computers on which the device is installed:

+
    +
  • Computer name, domain, and operating system.

  • +
  • The count of installed applications and devices.

  • +
  • The count of installed applications and devices that have issues.

  • +
+ +  + +## Using the <Device> Dialog Box + + +In the *<Device>* dialog box, you can perform the following actions: + +- Assign categories and subcategories to the device. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of the device to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +  + +  + + + + + diff --git a/windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md b/windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md new file mode 100644 index 0000000000..0f3ad7aa3d --- /dev/null +++ b/windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md @@ -0,0 +1,73 @@ +--- +title: Enabling and Disabling Compatibility Fixes in Compatibility Administrator (Windows 10) +description: You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes. +ms.assetid: 6bd4a7c5-0ed9-4a35-948c-c438aa4d6cb6 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Enabling and Disabling Compatibility Fixes in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes. + +## Disabling Compatibility Fixes + + +Customized compatibility databases can become quite complex as you add your fixes for the multiple applications found in your organization. Over time, you may find you need to disable a particular fix in your customized database. For example, if a software vendor releases a fix for an issue addressed in one of your compatibility fixes, you must validate that the vendor's fix is correct and that it resolves your issue. To do this, you must temporarily disable the compatibility fix and then test your application. + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to work with custom databases for 32-bit applications and the 64-bit version to work with custom databases for 64-bit applications. + +  + +**To disable a compatibility fix within a database** + +1. In the left-sde pane of Compatibility Administrator, expand the custom database that includes the compatibility fix that you want to disable, and then select the specific compatibility fix. + + The compatibility fix details appear in the right-hand pane. + +2. On the **Database** menu, click **Disable Entry**. + + **Important**   + When you disable an entry, it will remain disabled even if you do not save the database file. + +   + +## Enabling Compatibility Fixes + + +You can enable your disabled compatibility fixes at any time. + +**To enable a compatibility fix within a database** + +1. In the left-side pane of Compatibility Administrator, expand the custom database that includes the compatibility fix that you want to enable, and then select the specific compatibility fix. + + The compatibility fix details appear in the right-side pane. + +2. On the **Database** menu, click **Enable Entry**. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/example-filter-queries.md b/windows/plan/example-filter-queries.md new file mode 100644 index 0000000000..a128516e95 --- /dev/null +++ b/windows/plan/example-filter-queries.md @@ -0,0 +1,78 @@ +--- +title: Example Filter Queries (Windows 10) +description: You can filter your compatibility-issue data or reports by selecting specific restriction criteria. +ms.assetid: eae59380-56cc-4d57-bd2c-11a0e3c689c9 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Example Filter Queries + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can filter your compatibility-issue data or reports by selecting specific restriction criteria. + +## Example Queries + + +The following sections show example queries created by using the Query Builder. + +### All Applications with Issues + +The following example query returns all applications that have one or more known issues. + +![act filter example all apps with issues](images/dep-win8-e-act-filterexampleallappswissues.gif) + +### All Applications with Solutions for Known Issues + +The following example query returns all applications that have solutions for their known issues. + +![act filter examples for issues with solutions](images/dep-win8-e-act-filterexampleforissueswsolutions.gif) + +### All Applications with Specific Solution Types + +The following example query returns all applications that have a solution type of Application Update or Application Configuration. + +![act filter example for specific solutions](images/dep-win8-e-act-filterexampleforspecificsolutions.gif) + +### All Applications with No Known Issues + +The following example query returns all applications that have no known issues. + +![act filter example all apps with no issues](images/dep-win8-e-act-filterexampleallapps0issues.gif) + +### All Applications with No Active Issues + +The following example query returns all applications that have no active issues. + +![act filter example all apps with no active issues](images/dep-win8-e-act-filterexampleallapps0activeissues.gif) + +### All Applications Appearing in a Specific Category and Subcategory + +The following example query returns all applications that have a category of Department and a subcategory of either Human Resources or Finance. + +![act filter example category](images/dep-win8-e-act-filterexamplecategory.gif) + +## Related topics + + +[Filtering Your Compatibility Data](filtering-your-compatibility-data.md) + +  + +  + + + + + diff --git a/windows/plan/exporting-a-data-collection-package.md b/windows/plan/exporting-a-data-collection-package.md new file mode 100644 index 0000000000..c1eef9d0ad --- /dev/null +++ b/windows/plan/exporting-a-data-collection-package.md @@ -0,0 +1,53 @@ +--- +title: Exporting a Data-Collection Package (Windows 10) +description: In Application Compatibility Manager (ACM), you can export a data-collection package as a Windows installer (.msi) file. You can then use the .msi file to install the data-collection package on the computers from which you want to gather data. +ms.assetid: 98fe19e4-9533-4ffc-a275-8b3776ee93ed +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Exporting a Data-Collection Package + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), you can export a data-collection package as a Windows installer (.msi) file. You can then use the .msi file to install the data-collection package on the computers from which you want to gather data. + +You can export only one data-collection package at a time. + +**To export a data-collection package** + +1. In ACM, click **Collect** to open the Collect screen. + +2. Select the data-collection package that you want to export. + +3. On the **File** menu, click **Export**. + +4. Navigate to the folder where you want to store the Windows installer (.msi) file for the data-collection package, and then click **Save**. + +## Related topics + + +[Log File Locations for Data-Collection Packages](log-file-locations-for-data-collection-packages.md) + +[Deleting a Data-Collection Package](deleting-a-data-collection-package.md) + +[Labeling Data in ACM](labeling-data-in-acm.md) + +  + +  + + + + + diff --git a/windows/plan/filtering-your-compatibility-data.md b/windows/plan/filtering-your-compatibility-data.md new file mode 100644 index 0000000000..36776e764a --- /dev/null +++ b/windows/plan/filtering-your-compatibility-data.md @@ -0,0 +1,114 @@ +--- +title: Filtering Your Compatibility Data (Windows 10) +description: You can use Query Builder to filter your compatibility-issue data or reports by selecting specific restriction criteria. +ms.assetid: b64267b5-83c0-4b4d-a075-0975d3a359c8 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Filtering Your Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can use Query Builder to filter your compatibility-issue data or reports by selecting specific restriction criteria. + +The following table shows the columns in Query Builder. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
ColumnDescription

And/Or

If you select And, your data must match all query rows to appear as a returned result.

+

If you select Or, your data can match any query row to appear as a returned result.

Field

Select filter criteria.

Operator

Select an operator. The available operators depend on the field that you choose.

Value

Type or select a value.

+ +  + +## Creating Basic Queries + + +You can insert as many query clauses as you want to create a customized view of your compatibility data. + +**Note**   +The following examples use the **<Operating\_System> - Application Report** screen. The process is the same for other report types. + +  + +**To create a basic query** + +1. On the **<Operating\_System> - Application Report** screen, click **Toggle Filter**. + +2. In the Query Builder, enter your filter criteria, pressing the Tab key to add clauses. + + To delete a clause, right-click the row, and then click **Delete Clause**. + +3. Click **Refresh**. + + Your filtered results appear. To close the Query Builder, click **Toggle Filter** again. + +## Querying on Objects + + +You can query your compatibility data based on its relationship with other objects. For example, in the applications report, you can query for applications that have corresponding issues. Fields that have a (+) suffix in Query Builder are collections of objects. + +**To query for a collection of objects** + +1. In Query Builder, in the **Field** column, click any field that contains a plus sign (+) as suffix. + +2. In the **Operator** column, select **Exists**, **Not Exists**, or **All Have**. + + Query Builder creates a group clause, which is shown by a bracket that spans the rows that are included in the group. + +3. Move your cursor to the next row in the group clause, and then in the **Field** column, select a field. + +4. In the **Operator** column, select an operator. + +5. In the **Value** column, enter a value, and then click **Refresh**. + +## Related topics + + +[Example Filter Queries](example-filter-queries.md) + +  + +  + + + + + diff --git a/windows/plan/fixing-applications-by-using-the-sua-tool.md b/windows/plan/fixing-applications-by-using-the-sua-tool.md new file mode 100644 index 0000000000..99bd4deb6e --- /dev/null +++ b/windows/plan/fixing-applications-by-using-the-sua-tool.md @@ -0,0 +1,70 @@ +--- +title: Fixing Applications by Using the SUA Tool (Windows 10) +description: On the user interface for the Standard User Analyzer (SUA) tool, you can apply fixes to an application. +ms.assetid: 7f5947b1-977b-4d7e-bb52-fbe8e76f6b8b +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Fixing Applications by Using the SUA Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +On the user interface for the Standard User Analyzer (SUA) tool, you can apply fixes to an application. + +**To fix an application by using the SUA tool** + +1. Use the SUA tool to test an application. For more information, see [Using the SUA Tool](using-the-sua-tool.md). + +2. After you finish testing, open the SUA tool. + +3. On the **Mitigation** menu, click the command that corresponds to the action that you want to take. The following table describes the commands. + + + + + + + + + + + + + + + + + + + + + + + + + + +
Mitigation menu commandDescription

Apply Mitigations

Opens the Mitigate AppCompat Issues dialog box, in which you can select the fixes that you intend to apply to the application.

Undo Mitigations

Removes the application fixes that you just applied.

+

This option is available only after you apply an application fix and before you close the SUA tool. Alternatively, you can manually remove application fixes by using Programs and Features in Control Panel.

Export Mitigations as Windows Installer file

Exports your application fixes as a Windows® Installer (.msi) file, which can then be deployed to other computers that are running the application.

+ +   + +  + +  + + + + + diff --git a/windows/plan/fixing-compatibility-issues.md b/windows/plan/fixing-compatibility-issues.md new file mode 100644 index 0000000000..dc3e884415 --- /dev/null +++ b/windows/plan/fixing-compatibility-issues.md @@ -0,0 +1,77 @@ +--- +title: Fixing Compatibility Issues (Windows 10) +description: This section provides step-by-step instructions and describes development tools that you can use to help fix your compatibility issues. +ms.assetid: 30ba8d14-a41a-41b3-9019-e8658d6974de +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Fixing Compatibility Issues + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides step-by-step instructions and describes development tools that you can use to help fix your compatibility issues. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Deciding Whether to Fix an Application or Deploy a Workaround](deciding-whether-to-fix-an-application-or-deploy-a-workaround.md)

You can fix a compatibility issue by changing the code for the application or by deploying a workaround.

[SUA User's Guide](sua-users-guide.md)

You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows.

[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md)

The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. Compatibility Administrator provides the following:

+ +  + +## Related topics + + +[Taking Inventory of Your Organization](taking-inventory-of-your-organization.md) + +[Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md) + +[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) + +[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +  + +  + + + + + diff --git a/windows/plan/guidance-for-education-environments.md b/windows/plan/guidance-for-education-environments.md new file mode 100644 index 0000000000..91d543470a --- /dev/null +++ b/windows/plan/guidance-for-education-environments.md @@ -0,0 +1,47 @@ +--- +title: Guidance for education environments (Windows 10) +description: Find resources to help you plan your deployment of Windows 10 to desktops, laptops, tablets, and other devices in educational institutions. +ms.assetid: 225C9D6F-9329-4DDF-B447-6CE7804E314E +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Guidance for education environments + + +Find resources to help you plan your deployment of Windows 10 to desktops, laptops, tablets, and other devices in educational institutions. + +## In this section + + + ++++ + + + + + + + + + + + + +
TopicDescription

[Chromebook migration guide](chromebook-migration-guide.md)

In this guide you will learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment. You will learn how to perform the necessary planning steps, including Windows device deployment, migration of user and device settings, app migration or replacement, and cloud storage migration. You will then learn the best method to perform the migration by using automated deployment and migration tools.

+ +  + +  + +  + + + + + diff --git a/windows/plan/identifying-computers-for-inventory-collection.md b/windows/plan/identifying-computers-for-inventory-collection.md new file mode 100644 index 0000000000..7161dbdfb1 --- /dev/null +++ b/windows/plan/identifying-computers-for-inventory-collection.md @@ -0,0 +1,113 @@ +--- +title: Identifying Computers for Inventory Collection (Windows 10) +ms.assetid: f5bf2d89-fff2-4960-a153-dc1146b442fb +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Identifying Computers for Inventory Collection + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Managed and Unmanaged Environments](#BMK_ManagedUnmanaged) +- [Role-Based Applications](#BMK_RolebasedApplications) +- [Software Distribution](#BMK_SoftwareDistribution) +- [Geographic Distribution](#BMK_GeographicDistribution) +- [Computer Types](#BMK_ComputerTypes) +- [Related topics](#related_topics) + +An inventory-collector package gathers inventory data from the computers on which it is installed. This data includes the following: + +- **System inventory.** Information about the client computer. This information includes the memory capacity, the processor speed, and the processor architecture. + +- **Device inventory.** Information about the devices that are installed on the client computer. This information includes the model, the manufacturer, and the device class. + +- **Software inventory.** An inventory of the applications that are installed on the computer. This information includes system technologies such as Windows® Installer. + +To generate a complete inventory and obtain a comprehensive view of your organization, inventory all computers. However, remember that deploying inventory-collector packages to all computers in your organization will require the additional work of analyzing and reducing a larger list of applications. If you do not have the resources to deploy to all computers or you cannot process a larger list of applications, consider deploying inventory-collector packages to representative subsets of computers instead. + +If you decide to deploy inventory-collector packages to representative subsets of computers in your organization, consider the following: + +- [Managed and Unmanaged Environments](#BMK_ManagedUnmanaged) + +- [Role-Based Applications](#BMK_RolebasedApplications) + +- [Software Distribution](#BMK_SoftwareDistribution) + +- [Geographic Distribution](#BMK_GeographicDistribution) + +- [Computer Types](#BMK_ComputerTypes) + +## Managed and Unmanaged Environments + + +In your organization, you may have managed environments and unmanaged environments. + +In a managed environment, IT administrators strictly control and manage the installation and use of applications. In this environment, you can discover the full inventory by deploying inventory-collector packages to a limited subset of computers. + +In an unmanaged environment, users have administrator permissions and can install applications at their own discretion. To obtain the full inventory, you must deploy your inventory-collector packages to more computers. + +## Role-Based Applications + + +Your organization may use role-based applications that relate to job function. For example, accountants may use finance-related applications. Reviewing application use together with job function helps you better identify which subsets of computers need inventory-collector packages. + +## Software Distribution + + +You can distribute applications in various ways within an organization. For example, you can use Group Policy, Microsoft® IntelliMirror®, Microsoft System Center Configuration Manager, or a customized distribution method. Reviewing the policies for your software distribution system helps you better identify which subsets of computers need inventory-collector packages. + +## Geographic Distribution + + +While you plan for inventory collection, consider the geographic distribution of your organization, and consider application use within each region. Be sure to account for divisional applications, localized applications, and applications that are specific to the geographic location and export restrictions. Consult with technical and business leaders from each region to understand the differences and determine which subsets of computers need inventory-collector packages. + +## Computer Types + + +Computer types can be an important factor in the deployment of inventory-collector packages. The following sections describe common computer types. + +### Mobile Computers + +Mobile users are frequently offline, occasionally synchronizing with the corporate network through a LAN or VPN connection. The user must be online for the inventory-collector package to be downloaded and installed, and must be online again for the logged data to be uploaded. + +### Multiuser Computers + +Multiuser computers are typically in university computer labs, libraries, and organizations that enable job sharing. These computers include a core set of applications that are always available, in addition to many applications that can be installed and removed as necessary. Because these computers typically have a core set of applications, you can identify a narrow subset of computers to receive the inventory-collector package. + +### AppStations and TaskStations + +AppStations that run vertical applications are typically for marketing, claims and loan processing, and customer service. TaskStations are typically dedicated to running a single application in a location such as a manufacturing floor (as an entry terminal) or a call center. Because AppStations and TaskStations do not typically enable users to add or remove applications, you can identify a narrow subset of computers to receive the inventory-collector package. + +### Kiosks + +Kiosks are generally in public areas. These computers run unattended. They also generally run a single application by using a single-use account and automatic logon. Because these computers typically run a single application, you can identify a narrow subset of computers to receive the inventory-collector package. + +## Related topics + + +[Creating an Inventory-Collector Package](creating-an-inventory-collector-package.md) + +[Deploying an Inventory-Collector Package](deploying-an-inventory-collector-package.md) + +  + +  + + + + + diff --git a/windows/plan/images/branch.png b/windows/plan/images/branch.png new file mode 100644 index 0000000000..a7eefed13c Binary files /dev/null and b/windows/plan/images/branch.png differ diff --git a/windows/plan/images/chromebook-fig1-googleadmin.png b/windows/plan/images/chromebook-fig1-googleadmin.png new file mode 100644 index 0000000000..b3d42e5ff2 Binary files /dev/null and b/windows/plan/images/chromebook-fig1-googleadmin.png differ diff --git a/windows/plan/images/dep-win8-e-act-addissue.gif b/windows/plan/images/dep-win8-e-act-addissue.gif new file mode 100644 index 0000000000..dbe6b657bb Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-addissue.gif differ diff --git a/windows/plan/images/dep-win8-e-act-addsolution.gif b/windows/plan/images/dep-win8-e-act-addsolution.gif new file mode 100644 index 0000000000..98e6c27ad7 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-addsolution.gif differ diff --git a/windows/plan/images/dep-win8-e-act-categorize.gif b/windows/plan/images/dep-win8-e-act-categorize.gif new file mode 100644 index 0000000000..23bae141bc Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-categorize.gif differ diff --git a/windows/plan/images/dep-win8-e-act-communityexample.gif b/windows/plan/images/dep-win8-e-act-communityexample.gif new file mode 100644 index 0000000000..111e79a839 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-communityexample.gif differ diff --git a/windows/plan/images/dep-win8-e-act-createnewdcp.gif b/windows/plan/images/dep-win8-e-act-createnewdcp.gif new file mode 100644 index 0000000000..7ad0515838 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-createnewdcp.gif differ diff --git a/windows/plan/images/dep-win8-e-act-delete.gif b/windows/plan/images/dep-win8-e-act-delete.gif new file mode 100644 index 0000000000..24d6b6cd8f Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-delete.gif differ diff --git a/windows/plan/images/dep-win8-e-act-deploymentstatus.gif b/windows/plan/images/dep-win8-e-act-deploymentstatus.gif new file mode 100644 index 0000000000..5f07b13d22 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-deploymentstatus.gif differ diff --git a/windows/plan/images/dep-win8-e-act-doesnotwork64icon.gif b/windows/plan/images/dep-win8-e-act-doesnotwork64icon.gif new file mode 100644 index 0000000000..a92e0d9525 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-doesnotwork64icon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-doesnotworkicon.gif b/windows/plan/images/dep-win8-e-act-doesnotworkicon.gif new file mode 100644 index 0000000000..d07dce9b67 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-doesnotworkicon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-exportdcp.gif b/windows/plan/images/dep-win8-e-act-exportdcp.gif new file mode 100644 index 0000000000..35fb052076 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-exportdcp.gif differ diff --git a/windows/plan/images/dep-win8-e-act-exportreportdata.gif b/windows/plan/images/dep-win8-e-act-exportreportdata.gif new file mode 100644 index 0000000000..924efd2a21 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-exportreportdata.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterdata.gif b/windows/plan/images/dep-win8-e-act-filterdata.gif new file mode 100644 index 0000000000..ebb4547df3 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterdata.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexampleallapps0activeissues.gif b/windows/plan/images/dep-win8-e-act-filterexampleallapps0activeissues.gif new file mode 100644 index 0000000000..909cb95436 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexampleallapps0activeissues.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexampleallapps0issues.gif b/windows/plan/images/dep-win8-e-act-filterexampleallapps0issues.gif new file mode 100644 index 0000000000..178095998f Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexampleallapps0issues.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexampleallappswissues.gif b/windows/plan/images/dep-win8-e-act-filterexampleallappswissues.gif new file mode 100644 index 0000000000..824bcd764a Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexampleallappswissues.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexamplecategory.gif b/windows/plan/images/dep-win8-e-act-filterexamplecategory.gif new file mode 100644 index 0000000000..2621c7e2b5 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexamplecategory.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexampleforissueswsolutions.gif b/windows/plan/images/dep-win8-e-act-filterexampleforissueswsolutions.gif new file mode 100644 index 0000000000..40b8e61815 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexampleforissueswsolutions.gif differ diff --git a/windows/plan/images/dep-win8-e-act-filterexampleforspecificsolutions.gif b/windows/plan/images/dep-win8-e-act-filterexampleforspecificsolutions.gif new file mode 100644 index 0000000000..74c2687b0b Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-filterexampleforspecificsolutions.gif differ diff --git a/windows/plan/images/dep-win8-e-act-greenworks64icon.gif b/windows/plan/images/dep-win8-e-act-greenworks64icon.gif new file mode 100644 index 0000000000..a69b282a37 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-greenworks64icon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-greenworksicon.gif b/windows/plan/images/dep-win8-e-act-greenworksicon.gif new file mode 100644 index 0000000000..73626ccdcf Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-greenworksicon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-help.gif b/windows/plan/images/dep-win8-e-act-help.gif new file mode 100644 index 0000000000..6ce522acba Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-help.gif differ diff --git a/windows/plan/images/dep-win8-e-act-home.gif b/windows/plan/images/dep-win8-e-act-home.gif new file mode 100644 index 0000000000..0555779689 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-home.gif differ diff --git a/windows/plan/images/dep-win8-e-act-info64icon.gif b/windows/plan/images/dep-win8-e-act-info64icon.gif new file mode 100644 index 0000000000..b4593fd6d1 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-info64icon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-infoicon.gif b/windows/plan/images/dep-win8-e-act-infoicon.gif new file mode 100644 index 0000000000..6ef158023c Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-infoicon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-minorissues64icon.gif b/windows/plan/images/dep-win8-e-act-minorissues64icon.gif new file mode 100644 index 0000000000..8842896029 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-minorissues64icon.gif differ diff --git a/windows/plan/images/dep-win8-e-act-minorissuesicon.png b/windows/plan/images/dep-win8-e-act-minorissuesicon.png new file mode 100644 index 0000000000..ea4d0588a6 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-minorissuesicon.png differ diff --git a/windows/plan/images/dep-win8-e-act-moveupanddown.gif b/windows/plan/images/dep-win8-e-act-moveupanddown.gif new file mode 100644 index 0000000000..06a357b04e Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-moveupanddown.gif differ diff --git a/windows/plan/images/dep-win8-e-act-open.gif b/windows/plan/images/dep-win8-e-act-open.gif new file mode 100644 index 0000000000..430bc23095 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-open.gif differ diff --git a/windows/plan/images/dep-win8-e-act-prioritize.gif b/windows/plan/images/dep-win8-e-act-prioritize.gif new file mode 100644 index 0000000000..8327888637 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-prioritize.gif differ diff --git a/windows/plan/images/dep-win8-e-act-reactivate-resolved-issue.gif b/windows/plan/images/dep-win8-e-act-reactivate-resolved-issue.gif new file mode 100644 index 0000000000..4a647114a4 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-reactivate-resolved-issue.gif differ diff --git a/windows/plan/images/dep-win8-e-act-refresh.gif b/windows/plan/images/dep-win8-e-act-refresh.gif new file mode 100644 index 0000000000..1e9cd7e6aa Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-refresh.gif differ diff --git a/windows/plan/images/dep-win8-e-act-riskassessment.gif b/windows/plan/images/dep-win8-e-act-riskassessment.gif new file mode 100644 index 0000000000..74c9e784e2 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-riskassessment.gif differ diff --git a/windows/plan/images/dep-win8-e-act-save.gif b/windows/plan/images/dep-win8-e-act-save.gif new file mode 100644 index 0000000000..50691cc5c8 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-save.gif differ diff --git a/windows/plan/images/dep-win8-e-act-savereport.gif b/windows/plan/images/dep-win8-e-act-savereport.gif new file mode 100644 index 0000000000..00395ee6dd Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-savereport.gif differ diff --git a/windows/plan/images/dep-win8-e-act-sendandreceive.gif b/windows/plan/images/dep-win8-e-act-sendandreceive.gif new file mode 100644 index 0000000000..9272a99a14 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-sendandreceive.gif differ diff --git a/windows/plan/images/dep-win8-e-act-sendandreceiveicon.gif b/windows/plan/images/dep-win8-e-act-sendandreceiveicon.gif new file mode 100644 index 0000000000..7e38cf8108 Binary files /dev/null and b/windows/plan/images/dep-win8-e-act-sendandreceiveicon.gif differ diff --git a/windows/plan/images/dep-win8-l-act-appcallosthroughiat.jpg b/windows/plan/images/dep-win8-l-act-appcallosthroughiat.jpg new file mode 100644 index 0000000000..2ab0b3c13d Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-appcallosthroughiat.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-appredirectwithcompatfix.jpg b/windows/plan/images/dep-win8-l-act-appredirectwithcompatfix.jpg new file mode 100644 index 0000000000..a4a4f4f616 Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-appredirectwithcompatfix.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-communityworkflowdiagram.jpg b/windows/plan/images/dep-win8-l-act-communityworkflowdiagram.jpg new file mode 100644 index 0000000000..95f3fdb690 Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-communityworkflowdiagram.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-compatadminflowchart.jpg b/windows/plan/images/dep-win8-l-act-compatadminflowchart.jpg new file mode 100644 index 0000000000..a6b484d53c Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-compatadminflowchart.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-suaflowchart.jpg b/windows/plan/images/dep-win8-l-act-suaflowchart.jpg new file mode 100644 index 0000000000..07865c7c75 Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-suaflowchart.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-suawizardflowchart.jpg b/windows/plan/images/dep-win8-l-act-suawizardflowchart.jpg new file mode 100644 index 0000000000..9357e6f3bb Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-suawizardflowchart.jpg differ diff --git a/windows/plan/images/dep-win8-l-act-supportedtopologies.jpg b/windows/plan/images/dep-win8-l-act-supportedtopologies.jpg new file mode 100644 index 0000000000..fd03081e46 Binary files /dev/null and b/windows/plan/images/dep-win8-l-act-supportedtopologies.jpg differ diff --git a/windows/plan/images/fig1-deferupgrades.png b/windows/plan/images/fig1-deferupgrades.png new file mode 100644 index 0000000000..f8c52b943e Binary files /dev/null and b/windows/plan/images/fig1-deferupgrades.png differ diff --git a/windows/plan/images/fig2-deploymenttimeline.png b/windows/plan/images/fig2-deploymenttimeline.png new file mode 100644 index 0000000000..a8061d2f15 Binary files /dev/null and b/windows/plan/images/fig2-deploymenttimeline.png differ diff --git a/windows/plan/images/fig2-locallyconfig.png b/windows/plan/images/fig2-locallyconfig.png new file mode 100644 index 0000000000..d2fe9820da Binary files /dev/null and b/windows/plan/images/fig2-locallyconfig.png differ diff --git a/windows/plan/images/fig3-overlaprelease.png b/windows/plan/images/fig3-overlaprelease.png new file mode 100644 index 0000000000..58747a35cf Binary files /dev/null and b/windows/plan/images/fig3-overlaprelease.png differ diff --git a/windows/plan/images/fig4-wsuslist.png b/windows/plan/images/fig4-wsuslist.png new file mode 100644 index 0000000000..de35531356 Binary files /dev/null and b/windows/plan/images/fig4-wsuslist.png differ diff --git a/windows/plan/images/wtg-first-boot-home.gif b/windows/plan/images/wtg-first-boot-home.gif new file mode 100644 index 0000000000..46cd605a2e Binary files /dev/null and b/windows/plan/images/wtg-first-boot-home.gif differ diff --git a/windows/plan/images/wtg-first-boot-work.gif b/windows/plan/images/wtg-first-boot-work.gif new file mode 100644 index 0000000000..c1a9a9d31d Binary files /dev/null and b/windows/plan/images/wtg-first-boot-work.gif differ diff --git a/windows/plan/images/wtg-gpt-uefi.gif b/windows/plan/images/wtg-gpt-uefi.gif new file mode 100644 index 0000000000..2ff2079a3c Binary files /dev/null and b/windows/plan/images/wtg-gpt-uefi.gif differ diff --git a/windows/plan/images/wtg-image-deployment.gif b/windows/plan/images/wtg-image-deployment.gif new file mode 100644 index 0000000000..d622911f3e Binary files /dev/null and b/windows/plan/images/wtg-image-deployment.gif differ diff --git a/windows/plan/images/wtg-mbr-bios.gif b/windows/plan/images/wtg-mbr-bios.gif new file mode 100644 index 0000000000..b93796944a Binary files /dev/null and b/windows/plan/images/wtg-mbr-bios.gif differ diff --git a/windows/plan/images/wtg-mbr-firmware-roaming.gif b/windows/plan/images/wtg-mbr-firmware-roaming.gif new file mode 100644 index 0000000000..f21592c310 Binary files /dev/null and b/windows/plan/images/wtg-mbr-firmware-roaming.gif differ diff --git a/windows/plan/images/wtg-startup-options.gif b/windows/plan/images/wtg-startup-options.gif new file mode 100644 index 0000000000..302da78ea6 Binary files /dev/null and b/windows/plan/images/wtg-startup-options.gif differ diff --git a/windows/plan/images/wuforbus-fig1-manuallyset.png b/windows/plan/images/wuforbus-fig1-manuallyset.png new file mode 100644 index 0000000000..2f684c32ff Binary files /dev/null and b/windows/plan/images/wuforbus-fig1-manuallyset.png differ diff --git a/windows/plan/images/wuforbusiness-fig10-sccmconsole.png b/windows/plan/images/wuforbusiness-fig10-sccmconsole.png new file mode 100644 index 0000000000..5e43f36403 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig10-sccmconsole.png differ diff --git a/windows/plan/images/wuforbusiness-fig11-intune.png b/windows/plan/images/wuforbusiness-fig11-intune.png new file mode 100644 index 0000000000..8006085bf1 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig11-intune.png differ diff --git a/windows/plan/images/wuforbusiness-fig12a-updates.png b/windows/plan/images/wuforbusiness-fig12a-updates.png new file mode 100644 index 0000000000..078d60b745 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig12a-updates.png differ diff --git a/windows/plan/images/wuforbusiness-fig13a-upgrades.png b/windows/plan/images/wuforbusiness-fig13a-upgrades.png new file mode 100644 index 0000000000..432e0d8711 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig13a-upgrades.png differ diff --git a/windows/plan/images/wuforbusiness-fig2-gp.png b/windows/plan/images/wuforbusiness-fig2-gp.png new file mode 100644 index 0000000000..d748cd0dc9 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig2-gp.png differ diff --git a/windows/plan/images/wuforbusiness-fig3-mdm.png b/windows/plan/images/wuforbusiness-fig3-mdm.png new file mode 100644 index 0000000000..90900dee9d Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig3-mdm.png differ diff --git a/windows/plan/images/wuforbusiness-fig4-localpoleditor.png b/windows/plan/images/wuforbusiness-fig4-localpoleditor.png new file mode 100644 index 0000000000..0c6a1a0265 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig4-localpoleditor.png differ diff --git a/windows/plan/images/wuforbusiness-fig5-deferupgrade.png b/windows/plan/images/wuforbusiness-fig5-deferupgrade.png new file mode 100644 index 0000000000..591ba04c8a Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig5-deferupgrade.png differ diff --git a/windows/plan/images/wuforbusiness-fig6-pause.png b/windows/plan/images/wuforbusiness-fig6-pause.png new file mode 100644 index 0000000000..d19ef0e013 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig6-pause.png differ diff --git a/windows/plan/images/wuforbusiness-fig7-validationgroup.png b/windows/plan/images/wuforbusiness-fig7-validationgroup.png new file mode 100644 index 0000000000..ebd28fb689 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig7-validationgroup.png differ diff --git a/windows/plan/images/wuforbusiness-fig8a-chooseupdates.png b/windows/plan/images/wuforbusiness-fig8a-chooseupdates.png new file mode 100644 index 0000000000..ce8a59a910 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig8a-chooseupdates.png differ diff --git a/windows/plan/images/wuforbusiness-fig9-dosettings.jpg b/windows/plan/images/wuforbusiness-fig9-dosettings.jpg new file mode 100644 index 0000000000..04c3558d41 Binary files /dev/null and b/windows/plan/images/wuforbusiness-fig9-dosettings.jpg differ diff --git a/windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md b/windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md new file mode 100644 index 0000000000..2d040ed0be --- /dev/null +++ b/windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md @@ -0,0 +1,72 @@ +--- +title: Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator (Windows 10) +description: The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases. +ms.assetid: 659c9d62-5f32-433d-94aa-12141c01368f +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases. Both the custom databases and the standard databases store the known compatibility fixes, compatibility modes, and AppHelp messages. They also store the required application-matching information for installation on your local computers. + +By default, the Windows® operating system installs a System Application Fix database for use with the Compatibility Administrator. This database can be updated through Windows Update, and is stored in the %WINDIR% \\AppPatch directory. Your custom databases are automatically stored in the %WINDIR% \\AppPatch\\Custom directory and are installed by using the Sdbinst.exe tool provided with the Compatibility Administrator. + +**Important**   +Application Compatibility Toolkit (ACT) installs a 32-bit and a 64-bit version of the Compatibility Administrator tool. You must use the 32-bit version to work with custom databases for 32-bit applications and the 64-bit version to work with custom databases for 64-bit applications. + +In addition, you must deploy your databases to your organization’s computers before the included fixes will have any effect on the application issue. For more information about deploying your database, see [Using the Sdbinst.exe Command-Line Tool](using-the-sdbinstexe-command-line-tool.md). + +  + +## Installing a Custom Database + + +Installing your custom-compatibility database enables you to fix issues with your installed applications. + +**To install a custom database** + +1. In the left-side pane of Compatibility Administrator, click the custom database to install to your local computers. + +2. On the **File** menu, click **Install**. + + The Compatibility Administrator installs the database, which appears in the **Installed Databases** list. + + The relationship between your database file and an included application occurs in the registry. Every time you start an application, the operating system checks the registry for compatibility-fix information and, if found, retrieves the information from your customized database file. + +## Uninstalling a Custom Database + + +When a custom database is no longer necessary, either because the applications are no longer used or because the vendor has provided a fix that resolves the compatibility issues, you can uninstall the custom database. + +**To uninstall a custom database** + +1. In the **Installed Databases** list, which appears in the left-side pane of Compatibility Administrator, click the database to uninstall from your local computers. + +2. On the **File** menu, click **Uninstall**. + +## Related topics + + +[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md) + +  + +  + + + + + diff --git a/windows/plan/integration-with-management-solutions-.md b/windows/plan/integration-with-management-solutions-.md new file mode 100644 index 0000000000..5b6ea8cd28 --- /dev/null +++ b/windows/plan/integration-with-management-solutions-.md @@ -0,0 +1,76 @@ +--- +title: Integration with management solutions (Windows 10) +description: You can integrate Windows Update for Business deployments with existing management tools such as Windows Server Update Services (WSUS), System Center Configuration Manager, and Microsoft Intune. +ms.assetid: E0CB0CD3-4FE1-46BF-BA6F-5A5A8BD14CC9 +keywords: ["update", "upgrade", "deployment", "manage", "tools"] +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Integration with management solutions + + +**Applies to** + +- Windows 10 + +**In this article** + +- [System Center Configuration Manager](#system_center_configuration_manager) +- [WSUS standalone](#wsus_standalone_) +- [Enterprise Mobility Suite: Intune](#enterprise_mobility_suite__intune) +- [Related topics](#related_topics) + +You can integrate Windows Update for Business deployments with existing management tools such as Windows Server Update Services (WSUS), System Center Configuration Manager, and Microsoft Intune. + +## System Center Configuration Manager + + +For Windows 10, Version 1511, organizations that already manage their systems with Configuration Manager can also have their devices configured for Windows Update for Business (in other words, set deferral policies on those machines). For Windows 10, Version 1511, such devices will be visible in the Configuration Manager console, however they will appear with a detection state of “Unknown”. + +![figure 1](images/wuforbusiness-fig10-sccmconsole.png) + +## WSUS standalone + + +For Windows 10, Version 1511, you cannot configure devices for both Windows Update for Business *and* to receive updates from WSUS. If both group policies are set (for both deferrals as well as WSUS scanning), Windows Update for Business settings will NOT be respected and devices will continue to scan against WSUS. + +## Enterprise Mobility Suite: Intune + + +You can configure Windows Update for Business by using MDM policy. To configure Windows Update for Business with Intune: + +1. Create a new Windows 10 custom policy. (Add a policy, and choose **Custom Configuration for Windows 10 Desktop and phone…**). + + ![figure 2](images/wuforbusiness-fig11-intune.png) + +2. Configure the device to Consumer Branch for Business by selecting to defer upgrades (as described in [Setup and deployment](setup-and-deployment.md)). + + **Note**   + As noted, because WSUS and Windows Update for Business are mutually exclusive policies, do not set **UpdateServiceUrl** if you want to configure to defer upgrades. + +   + +3. Establish deferral windows for updates and upgrades. + + ![figure 3](images/wuforbusiness-fig12a-updates.png) + + ![figure 4](images/wuforbusiness-fig13a-upgrades.png) + +## Related topics + + +[Windows Update for Business](windows-update-for-business.md) + +[Setup and deployment](setup-and-deployment.md) + +  + +  + + + + + diff --git a/windows/plan/internet-explorer---web-site-report.md b/windows/plan/internet-explorer---web-site-report.md new file mode 100644 index 0000000000..fdcd6ef921 --- /dev/null +++ b/windows/plan/internet-explorer---web-site-report.md @@ -0,0 +1,67 @@ +--- +title: Internet Explorer - Web Site Report (Windows 10) +ms.assetid: f072033d-9d42-47ed-8fb0-dbdc28442910 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Internet Explorer - Web Site Report + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The **Internet Explorer - Web Site Report** screen shows the following information for each of the websites visited in your organization: + +- The website URL. + +- Your organization's compatibility rating for the website. + +- The count of issues for the website. + +- The count of resolved issues for the website. + +**To open the Internet Explorer - Web Site Report screen** + +1. In Application Compatibility Manager (ACM), on the **Quick Reports** pane, click **Analyze**. + +2. In the **Quick Reports** pane, under the **Internet Explorer** heading, click **Web Sites**. + +## Using the Internet Explorer - Web Site Report Screen + + +On the **Internet Explorer - Web Site Report** screen, you can: + +- Export the report data to a spreadsheet, or import a report. For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md). + +- Synchronize your compatibility issues by using the Microsoft Compatibility Exchange. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +- Filter the report by using the query builder. For more information, see [Filtering Your Compatibility Data](filtering-your-compatibility-data.md). + +- Specify your compatibility rating for a website. For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). + +- Select your deployment status for a website. For more information, see [Selecting Your Deployment Status](selecting-your-deployment-status.md). + +- Assign categories and subcategories to a website. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of a website to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Double-click a website name to view its associated dialog box. For more information, see [<WebsiteURL> Dialog Box](websiteurl-dialog-box.md). + +  + +  + + + + + diff --git a/windows/plan/labeling-data-in-acm.md b/windows/plan/labeling-data-in-acm.md new file mode 100644 index 0000000000..d9fe6d9da7 --- /dev/null +++ b/windows/plan/labeling-data-in-acm.md @@ -0,0 +1,53 @@ +--- +title: Labeling Data in ACM (Windows 10) +description: Application data and its associated compatibility issues can vary within an organization. +ms.assetid: d099c747-e68a-4cad-a639-9f33efab35b3 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Labeling Data in ACM + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Application data and its associated compatibility issues can vary within an organization. For example, the applications used by a Human Resources (HR) department might differ from the applications used by a Sales department. Even for applications that are used across an organization, different compatibility issues might be found for each business group because of the unique application use by each business group. + +Your data-collection packages can add a *label* to your inventoried applications. To filter by business group when analyzing reports, you can create a different data-collection package for each business group and have each package assign a unique label. For example, you can create a data-collection package for your Sales department with a **Sales** label. During reports analysis, you can filter your results so that only the data with the **Sales** label is visible. + +You can specify a label when you create a data-collection package. You cannot change the label for an existing data-collection package. + +**To specify the label for a new data-collection package** + +1. In Application Compatibility Manager (ACM), on the **Go** menu, click **Collect**. + +2. On the **Collect** screen, click **File** from the toolbar, and then click **New** to start creating a new data-collection package. + +3. In the wizard, enter the label that you want to be applied by the data-collection package. + +## Related topics + + +[Log File Locations for Data-Collection Packages](log-file-locations-for-data-collection-packages.md) + +[Exporting a Data-Collection Package](exporting-a-data-collection-package.md) + +[Deleting a Data-Collection Package](deleting-a-data-collection-package.md) + +  + +  + + + + + diff --git a/windows/plan/log-file-locations-for-data-collection-packages.md b/windows/plan/log-file-locations-for-data-collection-packages.md new file mode 100644 index 0000000000..6483bf1b49 --- /dev/null +++ b/windows/plan/log-file-locations-for-data-collection-packages.md @@ -0,0 +1,53 @@ +--- +title: Log File Locations for Data-Collection Packages (Windows 10) +ms.assetid: dcc395e7-2d9c-4935-abab-33c5934ce24a +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Log File Locations for Data-Collection Packages + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +When you create a data-collection package in Application Compatibility Manager (ACM), you can select an output location for your log files. You have the following options: + +- Specify an ACT Log Processing Service (LPS) share. The data-collection package automatically writes the log files to the specified ACT LPS share. + + If the ACT LPS share is unavailable when the upload time interval is reached, the data-collection package will make two more attempts. + + For inventory collector packages, after the third attempt, the inventory collector package no longer attempts to upload data. + + For runtime-analysis packages, if the problem persists, the runtime-analysis package will store the log file in %SYSTEMDRIVE%\\Users\\All Users\\Microsoft\\Application Compatibility Toolkit\\LogProcessor\\Failed. The runtime-analysis package will attempt to upload the files again at the next upload interval. + +- Select **Local (%ACTAppData%\\DataCollector\\Output)**. If you use this option, the data-collection package creates log files on the local system and the computer administrator must manually copy the files to the ACT LPS share location. Consider this option for mobile users who are not always connected to the network. The log files are located in %SYSTEMDRIVE%\\Users\\All Users\\Microsoft\\Application Compatibility Toolkit\\DataCollector\\Output. + +- Type an alternate network share location. If you use this option, verify that the data-collection package can write to the alternate location. You might consider this option if your organization is geographically diverse. For example, administrators can create data-collection packages and file shares individually for each geographic location. Administrators at a central location must then move the log files to a central location and map the files to the ACT LPS share for processing and entry into the ACT database. + +## Related topics + + +[Exporting a Data-Collection Package](exporting-a-data-collection-package.md) + +[Deleting a Data-Collection Package](deleting-a-data-collection-package.md) + +[Labeling Data in ACM](labeling-data-in-acm.md) + +  + +  + + + + + diff --git a/windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md b/windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md new file mode 100644 index 0000000000..d85029f97f --- /dev/null +++ b/windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md @@ -0,0 +1,71 @@ +--- +title: Managing Application-Compatibility Fixes and Custom Fix Databases (Windows 10) +description: This section provides information about managing your application-compatibility fixes and custom-compatibility fix databases. This section explains the reasons for using compatibility fixes and how to deploy custom-compatibility fix databases. +ms.assetid: 9c2e9396-908e-4a36-ad67-2e40452ce017 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Managing Application-Compatibility Fixes and Custom Fix Databases + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about managing your application-compatibility fixes and custom-compatibility fix databases. This section explains the reasons for using compatibility fixes and how to deploy custom-compatibility fix databases. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Understanding and Using Compatibility Fixes](understanding-and-using-compatibility-fixes.md)

As the Windows operating system evolves to support new technology and functionality, the implementations of some functions may change. This can cause problems for applications that relied upon the original implementation. You can avoid compatibility issues by using the Microsoft Windows Application Compatibility (Compatibility Fix) infrastructure to create a specific application fix for a particular version of an application.

[Compatibility Fix Database Management Strategies and Deployment](compatibility-fix-database-management-strategies-and-deployment.md)

After you determine that you will use compatibility fixes in your application-compatibility mitigation strategy, you must define a strategy to manage your custom compatibility-fix database. Typically, you can use one of two approaches:

[Testing Your Application Mitigation Packages](testing-your-application-mitigation-packages.md)

This topic provides details about testing your application-mitigation packages, including recommendations about how to report your information and how to resolve any outstanding issues.

+ +  + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md) + +  + +  + + + + + diff --git a/windows/plan/managing-your-data-collection-packages.md b/windows/plan/managing-your-data-collection-packages.md new file mode 100644 index 0000000000..eb9af845ad --- /dev/null +++ b/windows/plan/managing-your-data-collection-packages.md @@ -0,0 +1,79 @@ +--- +title: Managing Your Data-Collection Packages (Windows 10) +description: This section provides information about using Application Compatibility Manager (ACM) to manage your data-collection packages. +ms.assetid: 369ae82f-c8ca-42ec-85df-1b760a74e70a +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Managing Your Data-Collection Packages + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about using Application Compatibility Manager (ACM) to manage your data-collection packages. Data-collection packages include inventory-collector packages and runtime-analysis packages. The following procedures apply to both package types. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Log File Locations for Data-Collection Packages](log-file-locations-for-data-collection-packages.md)

When you create a data-collection package in Application Compatibility Manager (ACM), you can select an output location for your log files. You have the following options:

[Exporting a Data-Collection Package](exporting-a-data-collection-package.md)

In Application Compatibility Manager (ACM), you can export a data-collection package as a Windows installer (.msi) file. You can then use the .msi file to install the data-collection package on the computers from which you want to gather data.

[Deleting a Data-Collection Package](deleting-a-data-collection-package.md)

In Application Compatibility Manager (ACM), you can delete any of your existing data-collection packages from the database.

[Labeling Data in ACM](labeling-data-in-acm.md)

Application data and its associated compatibility issues can vary within an organization. For example, the applications used by a Human Resources (HR) department might differ from the applications used by a Sales department. Even for applications that are used across an organization, different compatibility issues might be found for each business group because of the unique application use by each business group.

+ +  + +## Related topics + + +[Taking Inventory of Your Organization](taking-inventory-of-your-organization.md) + +[Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md) + +[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) + +[Fixing Compatibility Issues](fixing-compatibility-issues.md) + +  + +  + + + + + diff --git a/windows/plan/operatingsystem---application-report.md b/windows/plan/operatingsystem---application-report.md new file mode 100644 index 0000000000..b784962421 --- /dev/null +++ b/windows/plan/operatingsystem---application-report.md @@ -0,0 +1,79 @@ +--- +title: <OperatingSystem> - Application Report (Windows 10) +description: This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports. +ms.assetid: 9721485b-6092-4974-8cfe-c84472237a57 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <OperatingSystem> - Application Report + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports. + +The **<OperatingSystem> - Application Report** screen shows the following information for the applications from which you have collected data: + +- The application name, application vendor, and application version. + +- Your organization’s compatibility rating for the application. + +- Compatibility ratings from users in your organization who are using a runtime analysis package to test the application. + +- Whether the information for the application is included in the synchronization process with the Microsoft Compatibility Exchange. + +- Compatibility information for the application from the application vendor. + +- Compatibility ratings from the ACT Community, if you are a member of the ACT Community. To join the ACT Community, see [Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md). + +- The count of active issues for the application. + +- The count of computers in your organization on which the application is installed. + +**To open the <OperatingSystem> - Application Report screen** + +1. In ACM, on the **Quick Reports** pane, click **Analyze**. + +2. In the **Quick Reports** pane, under an operating system heading, click **Applications**. + +## Using the <OperatingSystem> - Application Report Screen + + +On the **<OperatingSystem> - Application Report** screen, you can perform the following actions: + +- Export the report data to a spreadsheet, or import a report. For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md). + +- Choose whether to synchronize data for each application with the Microsoft Compatibility Exchange. For more information, see [Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md). + +- Synchronize your compatibility issues by using the Microsoft Compatibility Exchange. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +- Filter the report by using the query builder. For more information, see [Filtering Your Compatibility Data](filtering-your-compatibility-data.md). + +- Select your compatibility rating for an application. For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). + +- Select your deployment status for an application. For more information, see [Selecting Your Deployment Status](selecting-your-deployment-status.md). + +- Assign categories and subcategories to an application. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of an application to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Double-click an application name to view the associated dialog box. For more information, see [<Application> Dialog Box](application-dialog-box.md). + +  + +  + + + + + diff --git a/windows/plan/operatingsystem---computer-report.md b/windows/plan/operatingsystem---computer-report.md new file mode 100644 index 0000000000..d54c6212c6 --- /dev/null +++ b/windows/plan/operatingsystem---computer-report.md @@ -0,0 +1,61 @@ +--- +title: <OperatingSystem> - Computer Report (Windows 10) +ms.assetid: ed0a56fc-9f2a-4df0-8cef-3a09d6616de8 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <OperatingSystem> - Computer Report + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The **<OperatingSystem> - Computer Report** screen shows the following information for each computer in your organization: + +- The computer name, domain, and operating system. + +- The count of applications and devices installed on the computer. + +- The count of installed applications and devices that have issues. + +**To open the <OperatingSystem> - Computer Report screen** + +1. In Application Compatibility Manager (ACM), on the **Quick Reports** pane, click **Analyze**. + +2. In the **Quick Reports** pane, under an operating system heading, click **Computers**. + +## Using the <OperatingSystem> - Computer Report Screen + + +On the **<OperatingSystem> - Computer Report** screen, you can perform the following actions: + +- Export the report data to a spreadsheet, or import a report. For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md). + +- Synchronize your compatibility issues by using the Microsoft Compatibility Exchange. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +- Filter the report by using the query builder. For more information, see [Filtering Your Compatibility Data](filtering-your-compatibility-data.md). + +- Assign categories and subcategories to a computer. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of a computer to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Double-click a computer name to view its associated dialog box. For more information, see [<Computer> Dialog Box](computer-dialog-box.md). + +  + +  + + + + + diff --git a/windows/plan/operatingsystem---device-report.md b/windows/plan/operatingsystem---device-report.md new file mode 100644 index 0000000000..434b34487b --- /dev/null +++ b/windows/plan/operatingsystem---device-report.md @@ -0,0 +1,63 @@ +--- +title: <OperatingSystem> - Device Report (Windows 10) +ms.assetid: 8b5a936f-a92e-46a7-ac44-6edace262355 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <OperatingSystem> - Device Report + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The **<OperatingSystem> - Device Report** screen shows the following information for each device installed in your organization: + +- The model and manufacturer of the device. + +- The class of device, as reported by the device. + +- An evaluation from the device manufacturer of whether the device works on a 32-bit operating system or a 64-bit operating system. + +- The count of computers on which the device is installed. + +**To open the <OperatingSystem> - Device Report screen** + +1. In Application Compatibility Manager (ACM), on the **Quick Reports** pane, click **Analyze**. + +2. In the **Quick Reports** pane, under an operating system heading, click **Devices**. + +## Using the <OperatingSystem> - Device Report Screen + + +On the **<OperatingSystem> - Device Report** screen, you can: + +- Export the report data to a spreadsheet, or import a report. For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md). + +- Synchronize your compatibility issues by using the Microsoft Compatibility Exchange. For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +- Filter the report by using the query builder. For more information, see [Filtering Your Compatibility Data](filtering-your-compatibility-data.md). + +- Assign categories and subcategories to a device. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of a device to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Double-click a device name to view its associated dialog box. For more information, see [<Device> Dialog Box](device-dialog-box.md). + +  + +  + + + + + diff --git a/windows/plan/organizational-tasks-for-each-report-type.md b/windows/plan/organizational-tasks-for-each-report-type.md new file mode 100644 index 0000000000..dc649842a8 --- /dev/null +++ b/windows/plan/organizational-tasks-for-each-report-type.md @@ -0,0 +1,95 @@ +--- +title: Organizational Tasks for Each Report Type (Windows 10) +description: The following table shows which tasks can be performed for each report type. +ms.assetid: 7463fab1-ba6e-4a9a-9112-0b69a18fe353 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Organizational Tasks for Each Report Type + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The following table shows which tasks can be performed for each report type. + + +++++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Report[Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md)[Selecting Your Deployment Status](selecting-your-deployment-status.md)[Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md)[Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md)[Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md)[Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md)

[<OperatingSystem> - Application Report](operatingsystem---application-report.md)

Yes

Yes

Yes

Yes

Yes

Yes

[<OperatingSystem> - Computer Report](operatingsystem---computer-report.md)

No

No

Yes

Yes

No

No

[<OperatingSystem> - Device Report](operatingsystem---device-report.md)

No

No

Yes

Yes

No

No

[<WebsiteURL> Dialog Box](websiteurl-dialog-box.md)

Yes

Yes

Yes

Yes

Yes

Yes

+ +  + +  + +  + + + + + diff --git a/windows/plan/organizing-your-compatibility-data.md b/windows/plan/organizing-your-compatibility-data.md new file mode 100644 index 0000000000..15d1d152b6 --- /dev/null +++ b/windows/plan/organizing-your-compatibility-data.md @@ -0,0 +1,89 @@ +--- +title: Organizing Your Compatibility Data (Windows 10) +description: This section provides step-by-step instructions for organizing your compatibility data in Application Compatibility Manager (ACM). +ms.assetid: e91ae444-5d85-4b5f-b655-a765ecc78b1e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Organizing Your Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides step-by-step instructions for organizing your compatibility data in Application Compatibility Manager (ACM). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Organizational Tasks for Each Report Type](organizational-tasks-for-each-report-type.md)

The following table shows which tasks can be performed for each report type.

[Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md)

You can rate the compatibility of your applications, installation packages, or websites, based on whether they run successfully on a 32-bit or 64-bit operating system. Your rating applies to your entire organization and is based on your own testing results and organizational requirements.

[Selecting Your Deployment Status](selecting-your-deployment-status.md)

In Application Compatibility Manager (ACM), you can track the deployment status of your applications and websites.

[Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md)

To customize and filter your compatibility reports, you can create categories and subcategories to assign to your applications, computers, devices, and websites. By default, Microsoft provides the following categories:

[Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md)

You can prioritize your applications, websites, computers, and devices to help customize and filter your compatibility reports. The priority levels are:

[Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md)

For each application listed in Application Compatibility Manager (ACM), you can select whether to send and receive specific application data through the Microsoft Compatibility Exchange

[Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md)

This section provides step-by-step instructions for adding and editing application compatibility issues and solutions. Your issue and solution data can be uploaded to Microsoft through the Microsoft® Compatibility Exchange.

+ +  + +## Related topics + + +[Viewing Your Compatibility Reports](viewing-your-compatibility-reports.md) + +[Filtering Your Compatibility Data](filtering-your-compatibility-data.md) + +[Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md) + +  + +  + + + + + diff --git a/windows/plan/planning-for-windows-10-deployment.md b/windows/plan/planning-for-windows-10-deployment.md new file mode 100644 index 0000000000..c0de5b404e --- /dev/null +++ b/windows/plan/planning-for-windows-10-deployment.md @@ -0,0 +1,95 @@ +--- +title: Plan for Windows 10 deployment (Windows 10) +description: Windows 10 provides new deployment capabilities, scenarios, and tools by building on technologies introduced in Windows 7, and Windows 8.1, while at the same time introducing new Windows as a service concepts to keep the operating system up to date. +ms.assetid: 002F9B79-B50F-40C5-A7A5-0B4770E6EC15 +keywords: ["deploy", "upgrade", "update", "configure"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Plan for Windows 10 deployment + + +Windows 10 provides new deployment capabilities, scenarios, and tools by building on technologies introduced in Windows 7, and Windows 8.1, while at the same time introducing new Windows as a service concepts to keep the operating system up to date. Together, these changes require that you rethink the traditional deployment process. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Change history for Plan for Windows 10 deployment](change-history-for-plan-for-windows-10-deployment.md)

This topic lists new and updated topics in the Plan for Windows 10 deployment documentation for [Windows 10 and Windows 10 Mobile](../index.md).

[Windows 10 servicing options](windows-10-servicing-model.md)

Windows 10 provides a new model for organizations to deploy and upgrade Windows by providing updates to features and capabilities through a continual process.

[Windows 10 deployment considerations](windows-10-deployment-considerations.md)

There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications.

[Windows 10 compatibility](windows-10-compatibility.md)

Windows 10 will be compatible with most existing PC hardware; most devices running Windows 7, Windows 8, or Windows 8.1 will meet the requirements for Windows 10.

[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md)

There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization.

[Windows Update for Business](windows-update-for-business.md)

Get an overview of how you can implement and deploy a Windows Update for Business solution and how to maintain enrolled systems.

[Guidance for education environments](guidance-for-education-environments.md)

Find resources to help you plan your deployment of Windows 10 to desktops, laptops, tablets, and other devices in educational institutions.

[Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md)

Windows To Go is a feature in Windows 10 Enterprise and Windows 10 Education that enables the creation of a Windows To Go workspace that can be booted from a USB-connected external drive on PCs.

[Application Compatibility Toolkit (ACT) Technical Reference](application-compatibility-toolkit--act--technical-reference.md)

The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system.

+ +  + +## Related topics + + +[Windows 10 servicing options for updates and upgrades](../manage/introduction-to-windows-10-servicing.md) + +[Deploy Windows 10 with MDT 2013 Update 1](../deploy/deploy-windows-81-with-the-microsoft-deployment-toolkit.md) + +[Deploy Windows 10 with Configuration Manager and MDT 2013 Update 1](../deploy/deploy-windows-81-with-system-center-2012-r2-configuration-manager.md) + +[Upgrade to Windows 10 with MDT 2013 Update 1](../deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) + +[Upgrade to Windows 10 with Configuration Manager](../deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md) + +[Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=733911) + +  + +  + + + + + diff --git a/windows/plan/prepare-your-organization-for-windows-to-go.md b/windows/plan/prepare-your-organization-for-windows-to-go.md new file mode 100644 index 0000000000..49b177a81d --- /dev/null +++ b/windows/plan/prepare-your-organization-for-windows-to-go.md @@ -0,0 +1,139 @@ +--- +title: Prepare your organization for Windows To Go (Windows 10) +description: Prepare your organization for Windows To Go +ms.assetid: f3f3c160-90ad-40a8-aeba-2aedee18f7ff +keywords: ["mobile, device, USB, deploy"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Prepare your organization for Windows To Go + + +**Applies to** + +- Windows 10 + +**In this article** + +- [What is Windows To Go?](#what_is_windows_to_go_) +- [Usage scenarios](#usage_scenarios) +- [Infrastructure considerations](#infrastructure_considerations) +- [Activation considerations](#activation_considerations) +- [Organizational unit structure and use of Group Policy Objects](#organizational_unit_structure_and_use_of_group_policy_objects) +- [Computer account management](#computer_account_management) +- [User account and data management](#user_account_and_data_management) +- [Remote connectivity](#remote_connectivity) +- [Related topics](#related_topics) + +The following information is provided to help you plan and design a new deployment of a Windows To Go in your production environment. It provides answers to the “what”, “why”, and “when” questions an IT professional might have when planning to deploy Windows To Go. + +## What is Windows To Go? + + +Windows To Go is a feature of Windows 10 Enterprise and Windows 10 Education that enables users to boot Windows from a USB-connected external drive. Windows To Go drives can use the same image that enterprises use for their desktops and laptops, and can be managed the same way. Offering a new mobility option, a Windows To Go workspace is not intended to replace desktops or laptops, or supplant other mobility offerings. + +Enterprise customers utilizing Volume Activation Windows licensing will be able to deploy USB drives provisioned with Windows To Go workspace. These drives will be bootable on multiple compatible host computers. Compatible host computers are computers that are: + +- USB boot capable + +- Have USB boot enabled in the firmware + +- Meet Windows 7 minimum system requirements + +- Have compatible processor architectures (for example, x86 or AMD64) as the image used to create the Windows To Go workspace. ARM is not a supported processor for Windows To Go. + +- Have firmware architecture that is compatible with the architecture of the image used for the Windows To Go workspace + +Booting a Windows To Go workspace requires no specific software on the host computer. PCs certified for Windows 7 and later can host Windows To Go. + +The following topics will familiarize you with how you can use a Windows To Go workspace and give you an overview of some of the things you should consider in your design. + +## Usage scenarios + + +The following scenarios are examples of situations in which Windows To Go workspaces provide a solution for an IT implementer: + +- **Continuance of operations (COO).** In this scenario, selected employees receive a USB drive with a Windows To Go workspace, which includes all of the applications that the employees use at work. The employees can keep the device at home, in a briefcase, or wherever they want to store it until needed. When the users boot their home computer from the USB drive, it will create a corporate desktop experience so that they can quickly start working. On the very first boot, the employee sees that Windows is installing devices; after that one time, the Windows To Go drive boots like a normal computer. If they have enterprise network access, employees can use a virtual private network (VPN) connection or DirectAccess to access corporate resources. If the enterprise network is available, the Windows To Go workspace will automatically be updated using your standard client management processes. + +- **Contractors and temporary workers.** In this situation, an enterprise IT pro or manager would distribute the Windows To Go drive directly to the worker where they can be assisted with any necessary additional user education needs or address any possible compatibility issues. While the worker is on assignment, they can boot their computer exclusively from the Windows To Go drive and run all applications in that environment until the end of the assignment when the device is returned. No installation of software is required on the worker’s personal computer. + +- **Managed free seating.** The employee is issued a Windows To Go drive that is then used with the host computer assigned to that employee for a given session (this could be a vehicle, workspace, or standalone laptop). When the employee leaves the session, the next time they return they use the same USB flash drive but use a different host computer. + +- **Work from home.** In this situation, the Windows To Go drive can be provisioned for employees using various methods including System Center Configuration Manager or other deployment tools and then distributed to employees. The employee is instructed to boot the Windows To Go drive initially at work, which caches the employee’s credentials on the Windows To Go workspace and allows the initial data synchronization between the enterprise network and the Windows To Go workspace. The user can then bring the Windows To Go drive home where it can be used with their home computer, with or without enterprise network connectivity. + +- **Travel lightly.** In this situation you have employees who are moving from site to site, but who always will have access to a compatible host computer on site. Using Windows To Go workspaces allows them to travel without the need to pack their PC. + +**Note**   +If the employee wants to work offline for the majority of the time, but still maintain the ability to use the drive on the enterprise network, they should be informed of how often the Windows To Go workspace needs to be connected to the enterprise network. Doing so will ensure that the drive retains its access privileges and the workspace’s computer object is not potentially deleted from Active Directory Domain Services (AD DS). + +  + +## Infrastructure considerations + + +Because Windows To Go requires no additional software and minimal configuration, the same tools used to deploy images to other PCs can be used by an enterprise to install Windows To Go on a large group of USB devices. Moreover, because Windows To Go is compatible with connectivity and synchronization solutions already in use—such as Remote Desktop, DirectAccess and Folder Redirection—no additional infrastructure or management is necessary for this deployment. A Windows To Go image can be created on a USB drive that is identical to the hard drive inside a desktop. However, you may wish to consider making some modifications to your infrastructure to help make management of Windows To Go drives easier and to be able to identify them as a distinct device group. + +## Activation considerations + + +Windows To Go uses volume activation. You can use either Active Directory-based activation or KMS activation with Windows To Go. The Windows To Go workspace counts as another installation when assessing compliance with application licensing agreements. + +Microsoft software, such as Microsoft Office, distributed to a Windows To Go workspace must also be activated. Office deployment is fully supported on Windows To Go. Please note, due to the retail subscription activation method associated with Office 365 ProPlus, Office 365 ProPlus subscribers are provided volume licensing activation rights for Office Professional Plus 2013 MSI for local installation on the Windows To Go drive. This is available to organizations who purchase Office 365 ProPlus or Office 365 Enterprise SKUs containing Office 365 ProPlus via volume licensing channels. For more information about activating Microsoft Office, see [Volume activation methods in Office 2013](http://go.microsoft.com/fwlink/p/?LinkId=618922). + +You should investigate other software manufacturer’s licensing requirements to ensure they are compatible with roaming usage before deploying them to a Windows To Go workspace. + +**Note**   +Using Multiple Activation Key (MAK) activation is not a supported activation method for Windows To Go as each different PC-host would require separate activation. MAK activation should not be used for activating Windows, Office, or any other application on a Windows To Go drive. + +  + +See [Plan for Volume Activation](http://go.microsoft.com/fwlink/p/?LinkId=618923) for more information about these activation methods and how they can be used in your organization. + +## Organizational unit structure and use of Group Policy Objects + + +You may find it beneficial to create additional Active Directory organizational unit (OU) structures to support your Windows To Go deployment; one for host computer accounts and one for Windows To Go workspace computer accounts. Creating an organizational unit for host computers allows you to enable the Windows To Go Startup Options using Group Policy for only the computers that will be used as Windows To Go hosts. Setting this policy helps to prevent computers from being accidentally configured to automatically boot from USB devices and allows closer monitoring and control of those computers which have the ability to boot from a USB device. The organizational unit for Windows To Go workspaces allows you to apply specific policy controls to them, such as the ability to use the Store application, power state controls, and line-of-business application installation. + +If you are deploying Windows To Go workspaces for a scenario in which they are not going to be roaming, but are instead being used on the same host computer, such as with temporary or contract employees, you might wish to enable hibernation or the Windows Store. + +For more information about Group Policy settings that can be used with Windows To Go, see [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +## Computer account management + + +If you configure Windows To Go drives for scenarios where drives may remain unused for extended period of time such as use in continuance of operations scenarios, the AD DS computer account objects that correspond to Windows To Go drives have the potential to become stale and be pruned during maintenance operations. To address this issue, you should either have users log on regularly according to a schedule or modify any maintenance scripts to not clean up computer accounts in the Windows To Go device organizational unit. + +## User account and data management + + +People use computers to work with data and consume content - that is their core function. The data must be stored and retrievable for it to be useful. When users are working in a Windows To Go workspace, they need to have the ability to get to the data that they work with and to keep it accessible when the workspace is not being used. For this reason we recommend that you use folder redirection and offline files to redirect the path of local folders (such as the Documents folder) to a network location, while caching the contents locally for increased speed and availability. We also recommend that you use roaming user profiles to synchronize user specific settings so that users receive the same operating system and application settings when using their Windows To Go workspace and their desktop computer. When a user signs in using a domain account that is set up with a file share as the profile path, the user’s profile is downloaded to the local computer and merged with the local profile (if present). When the user logs off the computer, the local copy of their profile, including any changes, is merged with the server copy of the profile. For more information, see [Folder Redirection, Offline Files, and Roaming User Profiles overview](http://go.microsoft.com/fwlink/p/?LinkId=618924). + +Windows To Go is fully integrated with your Microsoft account. Setting synchronization is accomplished by connecting a Microsoft account to a user account. Windows To Go devices fully support this feature and can be managed by Group Policy so that the customization and configurations you prefer will be applied to your Windows To Go workspace. + +## Remote connectivity + + +If you want Windows To Go to be able to connect back to organizational resources when it is being used off-premises a remote connectivity solution must be enabled. Windows Server 2012 DirectAccess can be used as can a virtual private network (VPN) solution. For more information about configuring a remote access solution, see the [Remote Access (DirectAccess, Routing and Remote Access) Overview](http://go.microsoft.com/fwlink/p/?LinkId=618925). + +## Related topics + + +[Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) + +[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) + +[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) + +  + +  + + + + + diff --git a/windows/plan/prioritizing-your-compatibility-data.md b/windows/plan/prioritizing-your-compatibility-data.md new file mode 100644 index 0000000000..b597b63fc8 --- /dev/null +++ b/windows/plan/prioritizing-your-compatibility-data.md @@ -0,0 +1,102 @@ +--- +title: Prioritizing Your Compatibility Data (Windows 10) +ms.assetid: 103e125a-bd2b-4019-9d6a-2e1d50c380b1 +description: +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Prioritizing Your Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can prioritize your applications, websites, computers, and devices to help customize and filter your compatibility reports. The priority levels are: + +- **Priority 1 - Business Critical**. The highest priority level, applied to an item that is so important to your organization that a compatibility issue with the item would keep you from deploying a new operating system. + +- **Priority 2 - Important**. Items that your organization regularly uses but can function without. + +- **Priority 3 - Nice to Have**. Lower-priority items that you want to show in your compatibility reports that do not belong in either of the previous two categories. + +- **Priority 4 - Unimportant**. Items that are irrelevant to the daily functions of your organization. + +- **Unspecified**. The default priority level, applied to items that have not yet been reviewed for deployment. + +## Prioritizing Your Applications, Computers, Devices, and Websites + + +The following example uses the **<Operating\_System> - Application Report** screen. You can alternatively use the **<Application\_Name>** dialog box. The procedure is the same on the reports for computers, devices, and websites. + +**To change the priority** + +1. On the **<Operating\_System> - Application Report** screen, click the name of the application. + +2. On the **Actions** menu, click **Set Priority**. + +3. Click a priority, and then click **OK**. + +**To filter your data by priority** + +1. On the **<Operating\_System> - Application Report** screen, click **Toggle Filter**. + +2. Enter your filter criteria, pressing the Tab key to add clauses. + + Consider the following example, which shows a query that filters for all applications that have a priority level of **Business Critical** or **Important**. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
And/OrFieldOperatorValue

And

Priority

Equals

Priority 1 - Business Critical

Or

Priority

Equals

Priority 2 - Important

+ +   + + To delete a clause, right-click the row, and then click **Delete Clause**. + +3. Click **Refresh**. + + Your filtered results appear. + +  + +  + + + + + diff --git a/windows/plan/ratings-icons-in-acm.md b/windows/plan/ratings-icons-in-acm.md new file mode 100644 index 0000000000..ab8a3a47ec --- /dev/null +++ b/windows/plan/ratings-icons-in-acm.md @@ -0,0 +1,110 @@ +--- +title: Ratings Icons in ACM (Windows 10) +description: Compatibility ratings can originate from Microsoft, the application vendor, your organization, and from the Application Compatibility Toolkit (ACT) community. +ms.assetid: 0165499e-cb47-4d76-98a6-b871d23e4e83 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Ratings Icons in ACM + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Compatibility ratings can originate from Microsoft, the application vendor, your organization, and from the Application Compatibility Toolkit (ACT) community. + +For information about specifying your own ratings, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). For information about community ratings, see [ACT Community Ratings and Process](act-community-ratings-and-process.md). + +## Icons + + +The following table shows icons that appear on the report screens and dialog boxes for **Company Assessment** and **Vendor Assessment**. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IconDescription
ACT Green icon

Application, device, or website functions as expected on a 32-bit operating system.

ACT green 64-bit icon

Application, device, or website functions as expected on a 64-bit operating system.

ACT minor issue icon

Application, device, or website with issues that are minor or have known solutions on a 32-bit operating system. Severity 3 issues are considered minor issues.

ACT Minor issues 64-bit icon

Application, device, or website with issues that are minor or have known solutions on a 64-bit operating system.

ACT does not work icon

Application, device, or website with major issues, such as data loss or severely impaired functionality, on 32-bit operating systems. Severity 1 and Severity 2 issues are considered major issues.

ACT does not work 64-bit icon

Application, device, or website with major issues, such as data loss or severely impaired functionality, on 64-bit operating systems.

ACT Information icon

Application, device, or website that does not have any application assessment data for 32-bit operating systems. The item does not match any information in the database, or no assessments have been submitted.

ACT 64-bit info icon

Application, device, or website that does not have any application assessment data for 64-bit operating systems.

+ +  + +## User Ratings and ACT Community Ratings + + +Ratings are displayed graphically in the **User Ratings** column and the **Community Assessment** column. The rating color and bar count depend on how the users or community rated the item. There are three possible ratings: + +- **Works**. Applications with this rating receive five green bars. + +- **Works with minor issues or has solutions**. Applications with this rating receive three light-green bars. + +- **Does not work**. Applications with this rating receive a single red bar. + +The color gradient from one to five bars shows the average rating. + +![act community](images/dep-win8-e-act-communityexample.gif) + +## Related topics + + +[Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md) + +[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) + +  + +  + + + + + diff --git a/windows/plan/resolving-an-issue.md b/windows/plan/resolving-an-issue.md new file mode 100644 index 0000000000..74ffe1f620 --- /dev/null +++ b/windows/plan/resolving-an-issue.md @@ -0,0 +1,61 @@ +--- +title: Resolving an Issue (Windows 10) +description: You can use Application Compatibility Manager (ACM) to flag issues as resolved. Resolving an issue changes the status of the issue from a red x to a green check mark on your report and report detail screens. +ms.assetid: 96195122-185d-4f6a-8e84-79c3d069e933 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Resolving an Issue + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can use Application Compatibility Manager (ACM) to flag issues as resolved. Resolving an issue changes the status of the issue from a red **x** to a green check mark on your report and report detail screens. + +Resolving an issue is not required. However, if you do not resolve the issue, the issue remains active in your ACT database and provides inaccurate reports. + +## Resolving Issues for Your Applications and Websites + + +This procedure describes how to resolve an existing issue that is documented in ACM. For information about adding an issue, see [Adding or Editing an Issue](adding-or-editing-an-issue.md). + +**Note**   +The following example uses the **<Application\_Name>** dialog box. The procedure is similar for websites. + +  + +**To resolve issues** + +1. On the **<Operating\_System> - Application Report** screen, double-click the name of the application to display the **<Application\_Name>** dialog box. + +2. Click the **Issues** tab. + +3. Double-click the specific issue to resolve. + +4. On the **Actions** menu, click **Resolve**, and then close the **<Application\_Name> - <Issue\_Title>** dialog box. + + The issue appears with a green check mark in the report details screen. + + **Note**   + If you have not entered a solution but have resolved the issue, Microsoft recommends that you enter a solution with **Other** solution type and add text that describes why you resolved the issue without a solution. For information about entering solutions, see [Adding or Editing a Solution](adding-or-editing-a-solution.md). + +   + +  + +  + + + + + diff --git a/windows/plan/saving-opening-and-exporting-reports.md b/windows/plan/saving-opening-and-exporting-reports.md new file mode 100644 index 0000000000..2f947a935e --- /dev/null +++ b/windows/plan/saving-opening-and-exporting-reports.md @@ -0,0 +1,77 @@ +--- +title: Saving, Opening, and Exporting Reports (Windows 10) +description: You can perform several common reporting tasks from the Analyze screen, including saving a compatibility report, opening a saved compatibility report (.adq) file, and exporting your report data to a spreadsheet (.xls) file. +ms.assetid: 8be72a6c-63ab-4451-ad79-815e2ac18aa2 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Saving, Opening, and Exporting Reports + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can perform several common reporting tasks from the **Analyze** screen, including saving a compatibility report, opening a saved compatibility report (.adq) file, and exporting your report data to a spreadsheet (.xls) file. + +## Saving Your Compatibility Report + + +You can save your compatibility report data, including any custom filters created by the query builder tool. You can import this report data back into Application Compatibility Manager (ACM) at a later time. + +**To save a report** + +1. In the **Quick Reports** pane, click **Analyze**. + +2. Expand the node for the target operating system for which you want to see compatibility reports, and then click a node for a report type. + +3. On the **File** menu, click **Save As**. + +4. Browse to the folder where you want to save your report, and then click **Save**. + +## Opening an Existing Compatibility Report + + +In ACM, you can open, or import, a compatibility report (.adq) file. + +**To open a report** + +1. In the **Quick Reports** pane, click **Analyze**. + +2. Expand the node for the target operating system for which you want to see compatibility reports, and then click a node for a report type. + +3. On the **File** menu, click **Open Report**. + +4. Browse to the folder where you saved your report, and then click **Open**. + +## Exporting Compatibility Report Data + + +You can export your compatibility report data to an Microsoft® Excel® spreadsheet (.xls) file. + +**To export report data** + +1. In the **Quick Reports** pane, click **Analyze**. + +2. Expand the node for the target operating system for which you want to see compatibility reports, and then click a node for a report type. + +3. On the **File** menu, click **Export Report**. + +4. Browse to the folder where you want to store the spreadsheet file, and then click **Save**. + +  + +  + + + + + diff --git a/windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md b/windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md new file mode 100644 index 0000000000..6c83a990ee --- /dev/null +++ b/windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md @@ -0,0 +1,75 @@ +--- +title: Searching for Fixed Applications in Compatibility Administrator (Windows 10) +description: With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages. +ms.assetid: 1051a2dc-0362-43a4-8ae8-07dae39b1cb8 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Searching for Fixed Applications in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages. This is particularly useful if you are trying to identify applications with a specific compatibility fix or identifying which fixes are applied to a specific application. + +The **Query Compatibility Databases** tool provides additional search options. For more information, see [Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator](searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md). + +## Searching for Previously Applied Compatibility Fixes + + +**Important**   +You must perform your search with the correct version of the Compatibility Administrator tool. If you are searching for a 32-bit custom database, you must use the 32-bit version of Compatibility Administrator. If you are searching for a 64-bit custom database, you must use the 64-bit version of Compatibility Administrator. + +  + +**To search for previous fixes** + +1. On the Compatibility Administrator toolbar, click **Search**. + +2. Click **Browse** to locate the directory location to search for .exe files. + +3. Select at least one check box from **Entries with Compatibility Fixes**, **Entries with Compatibility Modes**, or **Entries with AppHelp**. + +4. Click **Find Now**. + + The query runs, returning your results in the lower pane. + +## Viewing Your Query Results + + +Your query results display the affected files, the application location, the application name, the type of compatibility fix, and the custom database that provided the fix. + +## Exporting Your Query Results + + +You can export your search results to a text (.txt) file for later review or archival. + +**To export your search results** + +1. In the **Search for Fixes** dialog box, click **Export**. + +2. Browse to the location where you want to store your search result file, and then click **Save**. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md b/windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md new file mode 100644 index 0000000000..88498f566b --- /dev/null +++ b/windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md @@ -0,0 +1,188 @@ +--- +title: Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator (Windows 10) +description: You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature. +ms.assetid: dd213b55-c71c-407a-ad49-33db54f82f22 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Querying by Using the Program Properties Tab](#querying_by_using_the_program_properties_tab) +- [Querying by Using the Fix Properties Tab](#querying_by_using_the_fix_properties_tab) +- [Querying by Using the Fix Description Tab](#querying_by_using_the_fix_description_tab) +- [Querying by Using the Fix Description Tab](#querying_by_using_the_fix_description_tab) +- [Exporting Your Search Results](#exporting_your_search_results) +- [Related topics](#related_topics) + +You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature. + +For information about the Search feature, see [Searching for Fixed Applications in Compatibility Administrator](searching-for-fixed-applications-in-compatibility-administrator.md). However, the Query tool provides more detailed search criteria, including tabs that enable you to search the program properties, the compatibility fix properties, and the fix description. You can perform a search by using SQL SELECT and WHERE clauses, in addition to searching specific types of databases. + +**Important**   +You must perform your search with the correct version of the Compatibility Administrator tool. To use the Query tool to search for a 32-bit custom database, you must use the 32-bit version of Compatibility Administrator. To use the Query tool to search for a 64-bit custom database, you must use the 64-bit version of Compatibility Administrator. + +  + +## Querying by Using the Program Properties Tab + + +You can use the **Program Properties** tab of the Query tool to search for any compatibility fix, compatibility mode, or AppHelp for a specific application. + +**To query by using the Program Properties tab** + +1. On the Compatibility Administrator toolbar, click **Query**. + +2. In the **Look in** drop-down list, select the appropriate database type to search. + +3. Type the location of the application you are searching for into the **Search for the Application** field. + + This name should be the same as the name in the **Applications** area (left pane) of Compatibility Administrator. + +4. Type the application executable (.exe) file name into the **Search for the File** box. If you leave this box blank, the percent (%) sign appears as a wildcard to search for any file. + + You must designate the executable name that was given when the compatibility fix was added to the database. + +5. Optionally, select the check box for one of the following types of compatibility fix: + + - **Compatibility Modes** + + - **Compatibility Fixes** + + - **Application Helps** + + **Important**   + If you do not select any of the check boxes, the search will look for all types of compatibility fixes. Do not select multiple check boxes because only applications that match all of the requirements will appear. + +   + +6. Click **Find Now**. + + The query runs and the results of the query are displayed in the lower pane. + +## Querying by Using the Fix Properties Tab + + +You can use the **Fix Properties** tab of the Query tool to search for any application affected by a specific compatibility fix or a compatibility mode. For example, you can search for any application affected by the ProfilesSetup compatibility mode. + +**To query by using the Fix Properties tab** + +1. On the Compatibility Administrator toolbar, click **Query**. + +2. Click the **Fix Properties** tab. + +3. In the **Look in** drop-down list, select the appropriate database type to search. + +4. Type the name of the compatibility fix or compatibility mode into the **Search for programs fixed using** field. + + **Note**   + You can use the percent (%) symbol as a wildcard in your fix-properties query, as a substitute for any string of zero or more characters. + +   + +5. Select the check box for either **Search in Compatibility Fixes** or **Search in Compatibility Modes**. + + **Important**   + Your text must match the type of compatibility fix or mode for which you are performing the query. For example, entering the name of a compatibility fix and selecting the compatibility mode check box will not return any results. Additionally, if you select both check boxes, the query will search for the fix by compatibility mode and compatibility fix. Only applications that match both requirements appear. + +   + +6. Click **Find Now**. + + The query runs and the results of the query are displayed in the lower pane. + +## Querying by Using the Fix Description Tab + + +You can use the **Fix Description** tab of the Query tool to add parameters that enable you to search your compatibility databases by application title or solution description text. + +**To query by using the Fix Description tab** + +1. On the Compatibility Administrator toolbar, click **Query**. + +2. Click the **Fix Description** tab. + +3. In the **Look in** drop-down list, select the appropriate database type to search. + +4. Type your search keywords into the box **Words to look for**. Use commas to separate multiple keywords. + + **Important**   + You cannot use wildcards as part of the Fix Description search query because the default behavior is to search for any entry that meets your search criteria. + +   + +5. Refine your search by selecting **Match any word** or **Match all words** from the drop-down list. + +6. Click **Find Now**. + + The query runs and the results of the query are displayed in the lower pane. + +## Querying by Using the Fix Description Tab + + +You can use the **Fix Description** tab of the Query tool to add additional SQL Server SELECT and WHERE clauses to your search criteria. + +**To query by using the Advanced tab** + +1. On the Compatibility Administrator toolbar, click **Query**. + +2. Click the **Advanced** tab. + +3. In the **Look in** drop-down list, select the appropriate database type to search. + +4. Select the appropriate SELECT clause for your search from the **Select clauses** box. For example, **APP\_NAME**. + + The **APP\_NAME** clause appears in the **SELECT** field. You can add as many additional clauses as you require. They will appear as columns in your search results. + +5. Select the appropriate WHERE clause for your search from the **Where clauses** box. For example, **DATABASE\_NAME**. + + The **DATABASE\_NAME =** clause appears in the **WHERE** box. + +6. Type the appropriate clause criteria after the equal (=) sign in the **WHERE** box. For example, **DATABASE\_NAME = "Custom\_Database"**. + + You must surround your clause criteria text with quotation marks (") for the clause to function properly. + +7. Click **Find Now**. + + The query runs and the results of the query are displayed in the lower pane. + +## Exporting Your Search Results + + +You can export any of your search results into a tab-delimited text (.txt) file for later review or for archival purposes. + +**To export your results** + +1. After you have completed your search by using the Query tool, click **Export**. + + The **Save results to a file** dialog box appears. + +2. Browse to the location where you intend to store the search results file, and then click **Save**. + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/security-and-data-protection-considerations-for-windows-to-go.md b/windows/plan/security-and-data-protection-considerations-for-windows-to-go.md new file mode 100644 index 0000000000..0541523ece --- /dev/null +++ b/windows/plan/security-and-data-protection-considerations-for-windows-to-go.md @@ -0,0 +1,86 @@ +--- +title: Security and data protection considerations for Windows To Go (Windows 10) +description: One of the most important requirements to consider when you plan your Windows To Go deployment is to ensure that the data, content, and resources you work with in the Windows To Go workspace is protected and secure. +ms.assetid: 5f27339f-6761-44f4-8c29-9a25cf8e75fe +keywords: ["mobile, device, USB, secure, BitLocker"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Security and data protection considerations for Windows To Go + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Backup and restore](#backup_and_restore) +- [BitLocker](#bitlocker) +- [Disk discovery and data leakage](#disk_discovery_and_data_leakage) +- [Security certifications for Windows To Go](#security_certifications_for_windows_to_go) +- [Related topics](#related_topics) + +One of the most important requirements to consider when you plan your Windows To Go deployment is to ensure that the data, content, and resources you work with in the Windows To Go workspace is protected and secure. + +## Backup and restore + + +As long as you are not saving data on the Windows To Go drive, there is no need for a backup and restore solution for Windows To Go. If you are saving data on the drive and are not using folder redirection and offline files, you should back up all of your data to a network location, such as cloud storage or a network share after each work session. Review the new and improved features described in [Supporting Information Workers with Reliable File Services and Storage](http://go.microsoft.com/fwlink/p/?LinkId=619102) for different solutions you could implement. + +If the USB drive fails for any reason, the standard process to restore the drive to working condition is to reformat and re-provision the drive with Windows To Go, so all data and customization on the drive will be lost. This is another reason why using roaming user profiles, folder redirection and offline files with Windows To Go is strongly recommended. For more information, see [Folder Redirection, Offline Files, and Roaming User Profiles overview](http://go.microsoft.com/fwlink/p/?LinkId=618924). + +## BitLocker + + +We recommend that you use BitLocker with your Windows To Go drives to protect the drive from being compromised if the drive is lost or stolen. When BitLocker is enabled, the user must provide a password to unlock the drive and boot the Windows To Go workspace, this helps prevent unauthorized users from booting the drive and using it to gain access to your network resources and confidential data. Because Windows To Go drives are meant to be roamed between computers, the Trusted Platform Module (TPM) cannot be used by BitLocker to protect the drive. Instead, you will be specifying a password that BitLocker will use for disk encryption and decryption. By default, this password must be eight characters in length and can enforce more strict requirements depending on the password complexity requirements defined by your organizations domain controller. + +You can enable BitLocker while using the Windows To Go Creator wizard as part of the drive provisioning process before first use; or it can be enabled afterward by the user from within the Windows To Go workspace. + +**Tip**   +If the Windows To Go Creator wizard is not able to enable BitLocker, see [Why can't I enable BitLocker from Windows To Go Creator?](windows-to-go-frequently-asked-questions.md#wtg_faq_blfail) + +  + +If you are using a host computer running Windows 7 that has BitLocker enabled, you should suspend BitLocker before changing the BIOS settings to boot from USB and then resume BitLocker protection. If BitLocker is not suspended first, the next time the computer is started it will boot into recovery mode. + +## Disk discovery and data leakage + + +We recommend that you use the **NoDefaultDriveLetter** attribute when provisioning the USB drive to help prevent accidental data leakage. **NoDefaultDriveLetter** will prevent the host operating system from assigning a drive letter if a user inserts it into a running computer. This means the drive will not appear in Windows Explorer and an AutoPlay prompt will not be displayed to the user. This reduces the likelihood that an end-user will access the offline Windows To Go disk directly from another computer. If you use the Windows To Go Creator to provision a workspace, this attribute will automatically be set for you. + +To prevent accidental data leakage between Windows To Go and the host system Windows 8 has a new SAN policy—OFFLINE\_INTERNAL - “4” to prevent the operating system from automatically bringing online any internally connected disk. The default configuration for Windows To Go has this policy enabled. It is strongly recommended you do not change this policy to allow mounting of internal hard drives when booted into the Windows To Go workspace. If the internal drive contains a hibernated Windows 8 operating system, mounting the drive will lead to loss of hibernation state and therefor user state or any unsaved user data when the host operating system is booted. If the internal drive contains a hibernated Windows 7 or earlier operating system, mounting the drive will lead to corruption when the host operating system is booted. + +For more information, see [How to Configure Storage Area Network (SAN) Policy in Windows PE](http://go.microsoft.com/fwlink/p/?LinkId=619103). + +## Security certifications for Windows To Go + + +Windows to Go is a core capability of Windows when it is deployed on the drive and is configured following the guidance for the applicable security certification. Solutions built using Windows To Go can be submitted for additional certifications by the solution provider that cover the solution provider’s specific hardware environment. For more details about Windows security certifications, see the following topics. + +- [Windows Platform Common Criteria Certification](http://go.microsoft.com/fwlink/p/?LinkId=619104) + +- [FIPS 140 Evaluation](http://go.microsoft.com/fwlink/p/?LinkId=619107) + +## Related topics + + +[Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) + +[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) + +[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) + +  + +  + + + + + diff --git a/windows/plan/selecting-the-send-and-receive-status-for-an-application.md b/windows/plan/selecting-the-send-and-receive-status-for-an-application.md new file mode 100644 index 0000000000..0a8f1c3450 --- /dev/null +++ b/windows/plan/selecting-the-send-and-receive-status-for-an-application.md @@ -0,0 +1,97 @@ +--- +title: Selecting the Send and Receive Status for an Application (Windows 10) +description: For each application listed in Application Compatibility Manager (ACM), you can select whether to send and receive specific application data through the Microsoft Compatibility Exchange. +ms.assetid: ae139093-27cf-4ad8-882d-e0509e78d33a +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Selecting the Send and Receive Status for an Application + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +For each application listed in Application Compatibility Manager (ACM), you can select whether to send and receive specific application data through the Microsoft Compatibility Exchange + +. For information about how to send and receive data, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md). + +## Selecting the Send and Receive Status for an Application + + +**Note**   +The following example uses the **<Operating\_System> - Application Report** screen. You can alternatively use the **<Application\_Name>** dialog box. + +  + +**To change the send and receive status for an application** + +1. On the **<Operating\_System> - Application Report** screen, click the application name for which you want to select the send and receive status. + +2. On the **Actions** menu, click **Set Send and Receive Status**. + +3. Select one of the following: + + - **Do not send to Microsoft** + + - **Send to Microsoft** (default) + +4. Click **OK**. + +**To filter based on send and receive status** + +1. On the **<Operating\_System> - Application Report** screen, click **Toggle Filter**. + +2. In the **Query Builder**, enter your filter criteria, pressing the Tab key to add clauses. + + To delete a clause, right-click the row, and then click **Delete Clause**. + + The following example shows a query that filters for applications with a send and receive status of **Do not send to Microsoft**. + + + + + + + + + + + + + + + + + + + + + + + + +
And/OrFieldOperatorValue

And

Send and Receive Status

Equals

Do not send to Microsoft

+ +   + +3. Click **Refresh**. + + Your filtered results appear. + +  + +  + + + + + diff --git a/windows/plan/selecting-your-compatibility-rating.md b/windows/plan/selecting-your-compatibility-rating.md new file mode 100644 index 0000000000..3b64974c1d --- /dev/null +++ b/windows/plan/selecting-your-compatibility-rating.md @@ -0,0 +1,107 @@ +--- +title: Selecting Your Compatibility Rating (Windows 10) +description: You can rate the compatibility of your applications, installation packages, or websites, based on whether they run successfully on a 32-bit or 64-bit operating system. +ms.assetid: 959da499-8fd6-4f32-8771-a0580dd8e0d3 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Selecting Your Compatibility Rating + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can rate the compatibility of your applications, installation packages, or websites, based on whether they run successfully on a 32-bit or 64-bit operating system. Your rating applies to your entire organization and is based on your own testing results and organizational requirements. + +Possible ratings include: + +- **Works**. During your organization's testing phase, there were no issues with the application, installation package, or website. + +- **Works with minor issues or has solutions**. During your organization's testing phase, there were no Severity 1 or Severity 2 issues with the application, installation package, or website. For information about severity levels, see [Adding or Editing an Issue](adding-or-editing-an-issue.md). + +- **Does not work**. During your organization's testing phase, the application, installation package, or website experienced a Severity 1 or Severity 2 issue. + +- **No data**. You have no compatibility data to provide. + +## Selecting a Compatibility Rating + + +You can select your compatibility rating from the report screen or from the associated dialog box that shows report details. As an example, the following procedures use the **<Operating\_System> - Application Report** screen. You can alternatively use the **<Application\_Name>** dialog box. The procedure is the same on the report for websites. + +**To select your compatibility rating** + +1. On the **<Operating\_System> - Application Report** screen, click the application name. + +2. On the **Actions** menu, click **Set Assessment**. + +3. Choose your ratings. Select separate ratings for 32-bit operating systems and 64-bit operating systems, and then click **OK**. + + If your organization does not use a 32-bit operating system, or does not use a 64-bit operating system, you can hide the option in the **Customize Report Views** dialog box. If you hide the option, the associated column no longer appears in the **Set Assessment** dialog box. + +## Filtering By Your Compatibility Ratings + + +You can filter your applications, installation packages, or website data by your compatibility ratings. + +**To filter based on your compatibility ratings** + +1. On the **<Operating\_System> - Application Report** screen, click **Toggle Filter**. + +2. In the **Query Builder**, enter your filter criteria, pressing the Tab key to add additional clauses. + + For example, the following query will show applications with a rating of **Works** or a rating of **Works with minor issues or has solutions**. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
And/OrFieldOperatorValue

And

My Assessment

Equals

Works

Or

My Assessment

Equals

Works with minor issues or has solutions

+ +   + + To delete a clause, right-click the row, and then click **Delete Clause**. + +3. Click **Refresh**. + +  + +  + + + + + diff --git a/windows/plan/selecting-your-deployment-status.md b/windows/plan/selecting-your-deployment-status.md new file mode 100644 index 0000000000..4d47ec35fb --- /dev/null +++ b/windows/plan/selecting-your-deployment-status.md @@ -0,0 +1,116 @@ +--- +title: Selecting Your Deployment Status (Windows 10) +description: In Application Compatibility Manager (ACM), you can track the deployment status of your applications and websites. +ms.assetid: 7735d256-77eb-4498-93aa-c838ee6e00fc +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Selecting Your Deployment Status + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), you can track the deployment status of your applications and websites. + +## Selecting Your Deployment Status + + +You can change the deployment status from both the report screen and the associated report dialog box. + +**Note**   +The following examples use the **<Operating\_System> - Application Report** screen. You can alternatively use the **<Application\_Name>** dialog box. The procedure is the same for setting deployment status on the report for websites. + +  + +**To change the deployment status of an application** + +1. On the **<Operating\_System> - Application Report** screen, click the application name. + +2. On the **Actions** menu, click **Set Deployment Status**. + +3. Select one of the following options: + + - **Not Reviewed** (default) + + - **Testing** + + - **Mitigating** + + - **Ready to Deploy** + + - **Will Not Deploy** + +4. Click **OK**. + +## Filtering By Deployment Status + + +You can filter your applications and websites by your deployment status. + +**To filter based on deployment status** + +1. On the **<Operating\_System> - Application Report** screen, click **Toggle Filter**. + + The **Query Builder** appears with a blank row. + +2. In the **Query Builder**, enter your filter criteria, pressing the Tab key to add clauses. + + For example, the following query filters for applications with a deployment status of **Mitigating** or **Ready to Deploy**. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
And/OrFieldOperatorValue

And

Deployment Status

Equals

Mitigating

Or

Deployment Status

Equals

Ready to Deploy

+ +   + + To delete a clause, right-click the row, and then click **Delete Clause**. + +3. Click **Refresh**. + + Your filtered results appear. + +  + +  + + + + + diff --git a/windows/plan/sending-and-receiving-compatibility-data.md b/windows/plan/sending-and-receiving-compatibility-data.md new file mode 100644 index 0000000000..1a72d34bbe --- /dev/null +++ b/windows/plan/sending-and-receiving-compatibility-data.md @@ -0,0 +1,68 @@ +--- +title: Sending and Receiving Compatibility Data (Windows 10) +description: The Microsoft® Compatibility Exchange is a web service that propagates application compatibility issues between various data sources, for example Microsoft Corporation, independent software vendors (ISVs) and the ACT Community. +ms.assetid: b86d2431-1caa-4f95-baf9-52ff6af546cd +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Sending and Receiving Compatibility Data + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Microsoft® Compatibility Exchange is a web service that propagates application compatibility issues between various data sources, for example Microsoft Corporation, independent software vendors (ISVs) and the ACT Community. This process involves checking for updated compatibility information from Microsoft over the Internet. You can send and receive data to keep Application Compatibility Manager (ACM) updated with the latest compatibility information. + +The synchronization process includes only the changes made since the last synchronization. During the synchronization process, a dialog box displaying the synchronization status appears. You can continue to work during this process. If no new issues have occurred since your last synchronization, the Microsoft Compatibility Exchange uploads your issue information and notifies you that no updates exist. + +The synchronization process uses the Microsoft Compatibility Exchange to: + +- Download new information from Microsoft and ISVs, except for the applications for which you choose not to send application data to Microsoft. + +- Upload your compatibility issues to Microsoft. + +- Upload and download compatibility information from the ACT Community, if you are a member of the ACT Community and agree to share your data. For information about configuring your membership in the ACT Community, see [Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md). + +For information about which data is sent and received through the Microsoft Compatibility exchange, see [Data Sent Through the Microsoft Compatibility Exchange](data-sent-through-the-microsoft-compatibility-exchange.md). + +## Reviewing and Synchronizing Your Data + + +Prior to sending your application data to Microsoft, you can review your application list and view the exact data being sent as a text (.txt) file. After you are done reviewing the information, you can synchronize your data with Microsoft. + +**To review and synchronize your data** + +1. On the **Analyze** screen, click **Send and Receive**. + +2. Click **Review the data before sending**. + + The **Send and Receive Data** dialog box shows all of the application data that is to be sent to Microsoft during the synchronization process. To avoid sending application data for specific applications, see [Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md). + +3. Optionally, click **Review all data**, save the resulting .txt file locally, and then review the exact XML data that will be sent to Microsoft. + +4. After you finish reviewing the application list and XML data, click **Send**. + +## Related topics + + +[Data Sent Through the Microsoft Compatibility Exchange](data-sent-through-the-microsoft-compatibility-exchange.md) + +[ACT Community Ratings and Process](act-community-ratings-and-process.md) + +  + +  + + + + + diff --git a/windows/plan/settings-dialog-box---preferences-tab.md b/windows/plan/settings-dialog-box---preferences-tab.md new file mode 100644 index 0000000000..f0849a0e99 --- /dev/null +++ b/windows/plan/settings-dialog-box---preferences-tab.md @@ -0,0 +1,64 @@ +--- +title: Settings Dialog Box - Preferences Tab (Windows 10) +description: To display the Settings dialog box, in Application Compatibility Manager (ACM), on the Tools menu, click Settings. +ms.assetid: deae2100-4110-4d72-b5ee-7c167f80bfa4 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Settings Dialog Box - Preferences Tab + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +To display the **Settings** dialog box, in Application Compatibility Manager (ACM), on the **Tools** menu, click **Settings**. + +In the **Settings** dialog box, on the **Preferences** tab, use the following controls to join or leave the ACT Community, send ACT usage data to Microsoft, or be notified when there are updates available for ACT. + +**Yes, I want to join the ACT Community** +If this check box is selected, you are a member of the ACT Community and can share application compatibility data with other ACT users. + +If this check box is cleared, you still receive compatibility data from the Microsoft compatibility database, but not from other ACT users. + +For more information about the ACT Community, see [ACT Community Ratings and Process](act-community-ratings-and-process.md). + +**Send ACT usage data to Microsoft** +If this check box is selected, the following ACT usage data is sent to Microsoft: + +- The version of SQL Server being used by the ACT database. + +- The count of 32-bit or 64-bit computers in your organization. + +- The count of computers running a Windows operating system. + +- The operating systems you intend to deploy into your organization. + +- The count of computers to which you deployed data-collection packages. + +If this check box is cleared, your ACT usage data is not sent to Microsoft. + +**Notify me when a newer version of ACT is available (recommended)** +If this check box is selected, ACM notifies you when an update is available for ACT. + +## Related topics + + +[Settings Dialog Box - Settings Tab](settings-dialog-box---settings-tab.md) + +  + +  + + + + + diff --git a/windows/plan/settings-dialog-box---settings-tab.md b/windows/plan/settings-dialog-box---settings-tab.md new file mode 100644 index 0000000000..4d9773ed8c --- /dev/null +++ b/windows/plan/settings-dialog-box---settings-tab.md @@ -0,0 +1,65 @@ +--- +title: Settings Dialog Box - Settings Tab (Windows 10) +description: To display the Settings dialog box, in Application Compatibility Manager (ACM), on the Tools menu, click Settings. +ms.assetid: aeec1647-cf91-4f8b-9f6d-dbf4b898d901 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Settings Dialog Box - Settings Tab + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +To display the **Settings** dialog box, in Application Compatibility Manager (ACM), on the **Tools** menu, click **Settings**. + +In the **Settings** dialog box, on the **Settings** tab, use the following controls to modify the settings for your ACT database and ACT Log Processing Service. + +**SQL Server** +Lists the database server name for the SQL Server database server that contains your ACT database. + +Click **Browse** to search for available database servers. A **Select Server** dialog box appears from which you can select the database server that contains your ACT database. + +**Database** +Lists the database name of your ACT database. + +**Change** +Opens the user interface where you can create, open, or migrate an ACT database. + +**This computer is configured as a Log Processing Service** +If selected, indicates that this computer is used for the ACT Log Processing Service. Clear this check box to use a different computer to process the logs. + +If there is no designated ACT Log Processing Service, log processing defaults to the local computer. + +**Log Processing Service Account** +Specifies the account information, including the account type and account credentials, to be used to start the ACT Log Processing Service. + +The account must have read and write access to the ACT database. For information about setting up database permissions for the ACT Log Processing Service, see [Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md). + +**Log Share** +Specifies the absolute path to the ACT Log Processing Service share where log files are processed. Click **Browse** to search for a location. The **Share as** box automatically updates to show the directory name. + +For information about ensuring that all computers can access the share, see [Troubleshooting the ACT Log Processing Service](troubleshooting-the-act-log-processing-service.md). + +## Related topics + + +[Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md) + +  + +  + + + + + diff --git a/windows/plan/settings-for-acm.md b/windows/plan/settings-for-acm.md new file mode 100644 index 0000000000..fa9396220a --- /dev/null +++ b/windows/plan/settings-for-acm.md @@ -0,0 +1,69 @@ +--- +title: Settings for ACM (Windows 10) +description: This section provides information about settings that you can configure in Application Compatibility Manager (ACM). +ms.assetid: e0126284-4348-4708-8976-a1e404f35971 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Settings for ACM + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about settings that you can configure in Application Compatibility Manager (ACM). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Settings Dialog Box - Settings Tab](settings-dialog-box---settings-tab.md)

To display the Settings dialog box, in Application Compatibility Manager (ACM), on the Tools menu, click Settings.

[Settings Dialog Box - Preferences Tab](settings-dialog-box---preferences-tab.md)

To display the Settings dialog box, in Application Compatibility Manager (ACM), on the Tools menu, click Settings.

+ +  + +## Related topics + + +[Configuring ACT](configuring-act.md) + +[ACT Database Configuration](act-database-configuration.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +  + +  + + + + + diff --git a/windows/plan/setup-and-deployment.md b/windows/plan/setup-and-deployment.md new file mode 100644 index 0000000000..2bd004159d --- /dev/null +++ b/windows/plan/setup-and-deployment.md @@ -0,0 +1,204 @@ +--- +title: Setup and deployment (Windows 10) +description: This article describes the basic features of a Windows Update for Business deployment. +ms.assetid: E176BB36-3B1B-4707-9665-968D80050DD1 +keywords: ["update", "upgrade", "deployment"] +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Setup and deployment + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Configure your systems to receive updates on CBB](#configure_your_systems_to_receive_updates_on_cbb) +- [Defer OS upgrade and update deployments](#defer_OS_upgrade) +- [Pause upgrades and updates](#pause_upgrades_and_updates) +- [Create validation groups for deployments](#create_validation_groups_for_deployments) +- [Peer-to-peer networking for deployments](#peer-to-peer_networking_for_deployments_) +- [Use Group Policy to configure Windows Update Delivery Optimization](#use_group_policy_to_configure_windows_update_delivery_optimization_) +- [Related topics](#related_topics) + +This article describes the basic features of a Windows Update for Business deployment. Use this information to familiarize yourself with a simple deployment with a single group of machines connected to Windows Update, in addition to more complex scenarios such as the creation of Windows Update for Business validation groups that receive updates from Windows Update at different time intervals, as well as Windows Update for Business deployments integrated with existing management tools such as Windows Server Update Services (WSUS), System Center Configuration Manager, or Microsoft Intune. + +## Configure your systems to receive updates on CBB + + +To use Windows Update for Business, Windows 10-based devices must first be configured for the Current Branch for Business (CBB). You can configure devices manually, by using Group Policy, or by using mobile device management (MDM). + +![figure 1](images/wuforbus-fig1-manuallyset.png) + +![figure 2](images/wuforbusiness-fig2-gp.png) + +![figure 3](images/wuforbusiness-fig3-mdm.png) + +## Defer OS upgrade and update deployments + + +Windows Update for Business allows administrators to control when upgrades and updates are deployed to their Windows 10 clients by specifying deferral windows from when they are initially made available on the Windows Update service. As mentioned, there are restrictions as to how long you can delay upgrades and updates. The following table details these restrictions, per deployment category type: + +**Group Policy keys** + +HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate\\DeferUpgradePeriod + +- Values: 0-8 where each unit for upgrade is a month + +HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate\\DeferUpdatePeriod + +- Values: 0-4 where each unit for update is a week + +**MDM** + +*./Vendor/MSFT/Update/DeferUpgrade* + +Software\\Microsoft\\PolicyManager\\current\\Update\\RequireDeferUpgrade + +- Values: 0-8 where each unit for upgrade is a month + +Software\\Microsoft\\PolicyManager\\current\\Update\\RequireDeferUpdate + +- Values: 0-4 where each unit for update is a week + +  + +Administrators can control deferral periods with Group Policy Objects by using the [Local Group Policy Editor (GPEdit)](http://go.microsoft.com/fwlink/p/?LinkId=734030) or, for domain joined systems, [Group Policy Management Console (GPMC)](http://go.microsoft.com/fwlink/p/?LinkId=699325). For additional details on Group Policy management see [Group Policy management for IT pros](http://go.microsoft.com/fwlink/p/?LinkId=699282). + +**Set different deferrals based on update classification in GPedit.msc** + +![figure 4](images/wuforbusiness-fig4-localpoleditor.png) + +![figure 5](images/wuforbusiness-fig5-deferupgrade.png) + +## Pause upgrades and updates + + +Although administrators can use deferral periods to stagger the rate at which deployments go out to their organization (which provides time to verify quality and address any issues), there may be cases where additional time is needed before an update is set to deploy to a machine, or group of machines. Windows Update for Business provides a means for administrators to *pause* updates and upgrades on a per-machine basis. This pause functionality ensures that no updates or upgrades will be made available for the specified machine; the machine will remain in this state until the machine is specifically “unpaused”, or when a period of five weeks (35 days) has passed, at which point updates are auto-resumed. + +**Note**   +The five-week period ensures that pause functionality overlaps a possible subsequent Update Tuesday release. + +  + +**Note**   +Group Policy does not allow you to set a future "unpause” — administrators must actively select to unpause a deployment if they wish to do so before the time expiration. + +  + + ++++ + + + + + + + + + + +

Group Policy keys

HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\Pause

MDM

+

./Vendor/MSFT/Update/DeferUpgrade

Software\Microsoft\PolicyManager\current\Update\Pause

+
    +
  • Values (bool): 0, 1

  • +
+ +  + +![figure 6](images/wuforbusiness-fig6-pause.png) + +## Create validation groups for deployments + + +By grouping machines into similar deferral periods, administrators are able to cluster devices into deployment or validation groups which can be used as a quality control measure as updates are deployed in Windows 10. With deferral windows and the ability to pause, administrators can effectively control and measure update deployments by rolling out to a small pool of devices first to verify quality, prior to a broader roll-out to their organization. + +Administrators can establish validation groups to maintain a level of control over update/driver deployments which allows them to: + +- Control the date, time, and frequency updates will be applied and devices rebooted + +- Deploy a small set of machines to verify quality prior to broad roll-out + +- Stage broad roll-out in waves to continue quality verification and minimize disruptions + +- Manage membership of waves based on criteria defined by IT + +- Halt and roll-back deployment of updates/drivers that may be causing trouble + +![figure 7](images/wuforbusiness-fig7-validationgroup.png) + +## Peer-to-peer networking for deployments + + +Windows Update Delivery Optimization enables Windows Update for Business enrolled devices to download Windows updates and Windows Store apps from sources other than Microsoft. With multiple devices, Delivery Optimization can reduce the amount of Internet bandwidth that is required to keep all of your Windows Update for Business enrolled systems up to date. It can also help ensure that devices get updates and apps more quickly if they have a limited or unreliable Internet connection. + +In addition to downloading updates and apps from Microsoft, Windows will get updates and apps from other PCs that already have them. You can choose which PCs you get these updates from. + +### How Delivery Optimization works + +- **PCs on your local network.** When Windows downloads an update or app, it will look for other PCs on your local network that have already downloaded the update or app using Delivery Optimization. Windows then downloads parts of the file from those PCs and parts of the file from Microsoft. Windows doesn’t download the entire file from one place. Instead, the download is broken down into smaller parts. Windows uses the fastest, most reliable download source for each part of the file. + +- **PCs on your local network and PCs on the Internet.** Windows uses the same process as when getting updates and apps from PCs on your local network, and also looks for PCs on the Internet that can be used as a source to download parts of updates and apps. + +### Delivery Optimization settings + +Delivery Optimization is turned on by default for the Enterprise and Education editions of Windows 10, where the default option is that updates will only be pulled and shared from PCs on your LAN and not the Internet. + +Delivery Optimization configuration settings can be viewed by going to: Settings > Update and Security > Advanced Options > Choose how your updates are delivered + +![figure 8](images/wuforbusiness-fig8a-chooseupdates.png) + +## Use Group Policy to configure Windows Update Delivery Optimization + + +You can use Group Policy to configure Windows Update Delivery Optimization. To do this, use the following steps: + +1. Download the [Administrative Templates (.admx) file for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=699283) from the Microsoft Download Center. + +2. Copy the following files to the SYSVOL central store: + + - DeliveryOptimization.admx from C:\\Program Files (x86)\\Microsoft Group Policy\\Windows 10\\PolicyDefinitions + + - DeliveryOptimization.adml from C:\\Program Files (x86)\\Microsoft Group Policy\\Windows 10\\PolicyDefinitions\\en-US + +3. Start the Gpeditor tool. + +4. Browse to the following location: + + - Computer Configuration\\Administrative Templates\\Windows Components\\Delivery Optimization + +5. Make the following Windows Update Delivery Optimization settings, as appropriate. + + ![figure 9](images/wuforbusiness-fig9-dosettings.jpg) + +**Virus-scan claim** + +Microsoft scanned this file for viruses, using the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to it. + +For more information about Windows Update Delivery Optimization in Windows 10, see the [Windows Update Delivery Optimization FAQ](http://go.microsoft.com/fwlink/p/?LinkId=699284). + +For additional resources, see [How to use Group Policy to configure Windows Update Delivery Optimization in Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=699288). + +## Related topics + + +[Windows Update for Business](windows-update-for-business.md) + +[Integration with management solutions](integration-with-management-solutions-.md) + +  + +  + + + + + diff --git a/windows/plan/showing-messages-generated-by-the-sua-tool.md b/windows/plan/showing-messages-generated-by-the-sua-tool.md new file mode 100644 index 0000000000..1b34533117 --- /dev/null +++ b/windows/plan/showing-messages-generated-by-the-sua-tool.md @@ -0,0 +1,74 @@ +--- +title: Showing Messages Generated by the SUA Tool (Windows 10) +description: On the user interface for the Standard User Analyzer (SUA) tool, you can show the messages that the tool has generated. +ms.assetid: 767eb7f2-d6c4-414c-a7b3-a997337d904a +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Showing Messages Generated by the SUA Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +On the user interface for the Standard User Analyzer (SUA) tool, you can show the messages that the tool has generated. + +**To show the messages that the SUA tool has generated** + +1. Use the SUA tool to test an application. For more information, see [Using the SUA Tool](using-the-sua-tool.md). + +2. After you finish testing, in the SUA tool, click the **App Info** tab. + +3. On the **View** menu, click the command that corresponds to the messages that you want to see. The following table describes the commands. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
View menu commandDescription

Error Messages

When this command is selected, the user interface shows error messages that the SUA tool has generated. Error messages are highlighted in pink.

+

This command is selected by default.

Warning Messages

When this command is selected, the user interface shows warning messages that the SUA tool has generated. Warning messages are highlighted in yellow.

Information Messages

When this command is selected, the user interface shows informational messages that the SUA tool has generated. Informational messages are highlighted in green.

Detailed Information

When this command is selected, the user interface shows information that the SUA tool has generated, such as debug, stack trace, stop code, and severity information.

+ +   + +  + +  + + + + + diff --git a/windows/plan/software-requirements-for-act.md b/windows/plan/software-requirements-for-act.md new file mode 100644 index 0000000000..5b3047ffaf --- /dev/null +++ b/windows/plan/software-requirements-for-act.md @@ -0,0 +1,85 @@ +--- +title: Software Requirements for ACT (Windows 10) +description: The Application Compatibility Toolkit (ACT) has the following software requirements. +ms.assetid: 9bbc21d4-f2ac-4a91-8add-017b1eacdeee +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Software Requirements for ACT + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Application Compatibility Toolkit (ACT) has the following software requirements. + +## Operating Systems + + +ACT can be installed on the following operating systems: + +- Windows 10 + +- Windows 8.1 + +- Windows 8 + +- Windows 7 + +- Windows Server 2012 + +- Windows Server 2008 R2 + +You can deploy inventory collector packages to all of the operating systems where you can install ACT. In addition, you can also deploy inventory collector packages to Windows Server 2008, Windows Vista, and Windows XP. + +**Note**   +As of Update 2, there is a known issue where the inventory collector package fails on Windows Vista. + +  + +## Database Components + + +ACT requires one of the following database components: + +- Microsoft® SQL Server® 2012 + +- Microsoft® SQL Server® 2008 R2 + +- SQL Server 2008 + +- SQL Server 2005 + +- SQL Server 2008 Express + +- SQL Server 2005 Express Edition + +## .NET Framework + + +ACT requires .NET Framework 4. + +## Related topics + + +[What's New in Act 6.1](whats-new-in-act-60.md) + +[Software Requirements for RAP](software-requirements-for-rap.md) + +  + +  + + + + + diff --git a/windows/plan/software-requirements-for-rap.md b/windows/plan/software-requirements-for-rap.md new file mode 100644 index 0000000000..18462f9bd7 --- /dev/null +++ b/windows/plan/software-requirements-for-rap.md @@ -0,0 +1,69 @@ +--- +title: Software Requirements for RAP (Windows 10) +description: The runtime-analysis package (RAP) has the following software requirements. +ms.assetid: 0163ce70-f5ba-400c-bdd5-a25511aac91f +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Software Requirements for RAP + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The runtime-analysis package (RAP) has the following software requirements. + +## Compatibility Monitor Supported Operating Systems + + +The Microsoft Compatibility Monitor tool is included in the runtime-analysis package. You can use the Compatibility Monitor on the following operating systems: + +- Windows 10 + +- Windows 8.1 + +- Windows 8 + +- Windows 7 + +## SUA Tool and Compatibility Administrator Supported Operating Systems + + +The Standard User Analyzer (SUA) tool and wizard and the Compatibility Administrator tool are included in the runtime-analysis package. You can use the tools on the following operating systems: + +- Windows 10 + +- Windows 8.1 + +- Windows 8 + +- Windows 7 + +- Windows Server 2012 + +- Windows Server 2008 R2 + +## Related topics + + +[What's New in Act 6.1](whats-new-in-act-60.md) + +[Software Requirements for ACT](software-requirements-for-act.md) + +  + +  + + + + + diff --git a/windows/plan/sua-users-guide.md b/windows/plan/sua-users-guide.md new file mode 100644 index 0000000000..d907f4229d --- /dev/null +++ b/windows/plan/sua-users-guide.md @@ -0,0 +1,73 @@ +--- +title: SUA User's Guide (Windows 10) +description: You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. +ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# SUA User's Guide + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. + +You can use SUA in either of the following ways: + +- **Standard User Analyzer Wizard.** A wizard that guides you through a step-by-step process to locate and fix issues, without options for additional analysis. + +- **Standard User Analyzer Tool.** A full-function tool in which you can perform in-depth analysis and fix issues. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + +
TopicDescription

[Using the SUA Wizard](using-the-sua-wizard.md)

The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.

[Using the SUA Tool](using-the-sua-tool.md)

By using the Standard User Analyzer (SUA) tool, you can test your applications and monitor API calls to detect compatibility issues with the User Account Control (UAC) feature.

+ +  + +## Related topics + + +[Deciding Whether to Fix an Application or Deploy a Workaround](deciding-whether-to-fix-an-application-or-deploy-a-workaround.md) + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/tabs-on-the-sua-tool-interface.md b/windows/plan/tabs-on-the-sua-tool-interface.md new file mode 100644 index 0000000000..70a9ac7535 --- /dev/null +++ b/windows/plan/tabs-on-the-sua-tool-interface.md @@ -0,0 +1,99 @@ +--- +title: Tabs on the SUA Tool Interface (Windows 10) +description: The tabs in the Standard User Analyzer (SUA) tool show the User Account Control (UAC) issues for the applications that you analyze. +ms.assetid: 0d705321-1d85-4217-bf2c-0ca231ca303b +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Tabs on the SUA Tool Interface + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The tabs in the Standard User Analyzer (SUA) tool show the User Account Control (UAC) issues for the applications that you analyze. + +The following table provides a description of each tab on the user interface for the SUA tool. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Tab nameDescription

App Info

Provides the following information for the selected application:

+
    +
  • Debugging information

  • +
  • Error, warning, and informational messages (if they are enabled)

  • +
  • Options for running the application

  • +

File

Provides information about access to the file system.

+

For example, this tab might show an attempt to write to a file that only administrators can typically access.

Registry

Provides information about access to the system registry.

+

For example, this tab might show an attempt to write to a registry key that only administrators can typically access.

INI

Provides information about WriteProfile API issues.

+

For example, in the Calculator tool (Calc.exe) in Windows® XP, when you change the view from Standard to Scientific, Calc.exe calls the WriteProfile API to write to the Windows\Win.ini file. The Win.ini file is writable only for administrators.

Token

Provides information about access-token checking.

+

For example, this tab might show an explicit check for the Builtin\Administrators security identifier (SID) in the user's access token. This operation may not work for a standard user.

Privilege

Provides information about permissions.

+

For example, this tab might show an attempt to explicitly enable permissions that do not work for a standard user.

Name Space

Provides information about creation of system objects.

+

For example, this tab might show an attempt to create a new system object, such as an event or a memory map, in a restricted namespace. Applications that attempt this kind of operation do not function for a standard user.

Other Objects

Provides information related to applications accessing objects other than files and registry keys.

Process

Provides information about process elevation.

+

For example, this tab might show the use of the CreateProcess API to open an executable (.exe) file that, in turn, requires process elevation that will not function for a standard user.

+ +  + +  + +  + + + + + diff --git a/windows/plan/taking-inventory-of-your-organization.md b/windows/plan/taking-inventory-of-your-organization.md new file mode 100644 index 0000000000..d42fc430b2 --- /dev/null +++ b/windows/plan/taking-inventory-of-your-organization.md @@ -0,0 +1,75 @@ +--- +title: Taking Inventory of Your Organization (Windows 10) +description: This section provides information about how to use the Application Compatibility Toolkit (ACT) to identify applications and devices that are installed in your organization. +ms.assetid: d52f138d-c6b2-4ab1-bb38-5b036311a51d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Taking Inventory of Your Organization + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about how to use the Application Compatibility Toolkit (ACT) to identify applications and devices that are installed in your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Identifying Computers for Inventory Collection](identifying-computers-for-inventory-collection.md)

An inventory-collector package gathers inventory data from the computers on which it is installed. This data includes the following:

[Creating an Inventory-Collector Package](creating-an-inventory-collector-package.md)

You can use Application Compatibility Manager (ACM) to create an inventory-collector package. You can then deploy the inventory-collector package to other computers to gather inventory data. The package uploads inventory data to the Application Compatibility Toolkit (ACT) database.

[Deploying an Inventory-Collector Package](deploying-an-inventory-collector-package.md)

You can use the following methods to deploy an inventory-collector package to the destination computers:

+ +  + +## Related topics + + +[Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md) + +[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) + +[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) + +[Fixing Compatibility Issues](fixing-compatibility-issues.md) + +  + +  + + + + + diff --git a/windows/plan/testing-compatibility-on-the-target-platform.md b/windows/plan/testing-compatibility-on-the-target-platform.md new file mode 100644 index 0000000000..10111af439 --- /dev/null +++ b/windows/plan/testing-compatibility-on-the-target-platform.md @@ -0,0 +1,83 @@ +--- +title: Testing Compatibility on the Target Platform (Windows 10) +description: This section provides information about setting up a test environment for compatibility testing, and about creating and deploying runtime-analysis packages to the test environment. +ms.assetid: 8f3e9d58-37c2-41ea-a216-32712baf6cf4 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Testing Compatibility on the Target Platform + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about setting up a test environment for compatibility testing, and about creating and deploying runtime-analysis packages to the test environment. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Deciding Which Applications to Test](deciding-which-applications-to-test.md)

Before starting your compatibility testing on the version of Windows that you want to deploy, you can use the Application Compatibility Toolkit (ACT) to identify which applications should be the focus of your testing.

[Creating an Enterprise Environment for Compatibility Testing](creating-an-enterprise-environment-for-compatibility-testing.md)

The goal of the test environment is to model the operating system that you want to deploy and assess compatibility before deploying the operating system to your production environment. Your test environment is composed of computers on which the new operating system is installed. Your test environment can be a long-term investment. Consider retaining the test environment after deployment to assist in future deployment projects.

[Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md)

In Application Compatibility Manager (ACM), you can create runtime-analysis packages, which you can then deploy to computers for compatibility testing in your test environment.

[Deploying a Runtime-Analysis Package](deploying-a-runtime-analysis-package.md)

When you deploy a runtime-analysis package, you are deploying it to your test environment for compatibility testing.

[Compatibility Monitor User's Guide](compatibility-monitor-users-guide.md)

Compatibility Monitor is a tool in the runtime analysis package that you can use to monitor applications for compatibility issues. You can also use the Compatibility Monitor tool to submit compatibility feedback.

+ +  + +## Related topics + + +[Taking Inventory of Your Organization](taking-inventory-of-your-organization.md) + +[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md) + +[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md) + +[Fixing Compatibility Issues](fixing-compatibility-issues.md) + +  + +  + + + + + diff --git a/windows/plan/testing-your-application-mitigation-packages.md b/windows/plan/testing-your-application-mitigation-packages.md new file mode 100644 index 0000000000..df727951fd --- /dev/null +++ b/windows/plan/testing-your-application-mitigation-packages.md @@ -0,0 +1,97 @@ +--- +title: Testing Your Application Mitigation Packages (Windows 10) +description: This topic provides details about testing your application-mitigation packages, including recommendations about how to report your information and how to resolve any outstanding issues. +ms.assetid: ae946f27-d377-4db9-b179-e8875d454ccf +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Testing Your Application Mitigation Packages + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This topic provides details about testing your application-mitigation packages, including recommendations about how to report your information and how to resolve any outstanding issues. + +## Testing Your Application Mitigation Packages + + +Testing your application mitigation package strategies is an iterative process, whereby the mitigation strategies that prove unsuccessful will need to be revised and retested. The testing process includes a series of tests in the test environment and one or more pilot deployments in the production environment. + +**To test your mitigation strategies** + +1. Perform the following steps for each of the applications for which you have developed mitigations. + + 1. Test the mitigation strategy in your test environment. + + 2. If the mitigation strategy is unsuccessful, revise the mitigation strategy and perform step 1 again. + + At the end of this step, you will have successfully tested all of your mitigation strategies in your test environment and can move to your pilot deployment environment. + +2. Perform the following steps in the pilot deployments for each of the applications for which you have developed mitigations. + + 1. Test the mitigation strategy in your pilot deployment. + + 2. If the mitigation strategy is unsuccessful, revise the mitigation strategy and perform Step 2 again. + + At the end of this step, you will have successfully tested all of your mitigation strategies in your pilot environment. + +## Reporting the Compatibility Mitigation Status to Stakeholders + + +After testing your application mitigation package, you must communicate your status to the appropriate stakeholders before deployment begins. We recommend that you perform this communication by using the following status ratings. + +- **Resolved application compatibility issues**. This status indicates that the application compatibility issues are resolved and that these applications represent no risk to your environment. + +- **Unresolved application compatibility issues**. This status indicates that there are unresolved issues for the specifically defined applications. Because these applications are a risk to your environment, more discussion is required before you can resolve the compatibility issues. + +- **Changes to user experience**. This status indicates that the fix will change the user experience for the defined applications, possibly requiring your staff to receive further training. More investigation is required before you can resolve the compatibility issues. + +- **Changes in help desk procedures and processes**. This status indicates that the fix will require changes to your help desk's procedures and processes, possibly requiring your support staff to receive further training. More investigation is required before you can resolve the compatibility issues. + +## Resolving Outstanding Compatibility Issues + + +At this point, you probably cannot resolve any unresolved application compatibility issues by automated mitigation methods or by modifying the application. Resolve any outstanding application compatibility issues by using one of the following methods. + +- Apply specific compatibility modes, or run the program as an Administrator, by using the Compatibility Administrator tool. + + **Note**   + For more information about using Compatibility Administrator to apply compatibility fixes and compatibility modes, see [Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md). + +   + +- Run the application in a virtual environment. + + Run the application in a version of Windows supported by the application in a virtualized environment. This method ensures application compatibility, because the application is running on a supported operating system. + +- Resolve application compatibility by using non-Microsoft tools. + + If the application was developed in an environment other than Microsoft Visual Studio®, you must use non-Microsoft debugging and analysis tools to help resolve the remaining application compatibility issues. + +- Outsource the application compatibility mitigation. + + If your developers have insufficient resources to resolve the application compatibility issues, outsource the mitigation effort to another organization within your company. + +## Related topics + + +[Managing Application-Compatibility Fixes and Custom Fix Databases](managing-application-compatibility-fixes-and-custom-fix-databases.md) + +  + +  + + + + + diff --git a/windows/plan/toolbar-icons-in-acm-win-8.md b/windows/plan/toolbar-icons-in-acm-win-8.md new file mode 100644 index 0000000000..1620557d16 --- /dev/null +++ b/windows/plan/toolbar-icons-in-acm-win-8.md @@ -0,0 +1,232 @@ +--- +title: Toolbar Icons in ACM (Windows 10) +description: The following table shows icons that appear on toolbars and navigational elements in Application Compatibility Manager (ACM). +ms.assetid: 44872da1-c7ad-41b9-8323-d3c3f49b2706 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Toolbar Icons in ACM + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The following table shows icons that appear on toolbars and navigational elements in Application Compatibility Manager (ACM). + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IconDescriptionLocation
ACT home icon

Opens the Application Compatibility Manager Overview screen.

    +
  • Collect toolbar

  • +
  • Analyze toolbar

  • +
ACT Create new DCP

Opens the New Data Collection Package dialog box.

+

For more information, see [Creating a Runtime-Analysis Package](creating-a-runtime-analysis-package.md).

    +
  • Collect toolbar

  • +
ACT export DCP

Exports your data-collection package settings.

+

For more information, see [Exporting a Data-Collection Package](exporting-a-data-collection-package.md).

    +
  • Collect toolbar

  • +
ACT delete icon

Deletes a data-collection package that has not yet run on your client computers.

+

For more information, see [Deleting a Data-Collection Package](deleting-a-data-collection-package.md).

    +
  • Collect toolbar

  • +
ACT open icon

Imports an existing compatibility report.

+

For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md).

    +
  • Analyze toolbar

  • +
ACT save report

Saves a compatibility report, including your preferences and settings.

+

For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md).

    +
  • Analyze toolbar

  • +
ACT export report data

Exports your report data to a Microsoft® Excel® spreadsheet (.xls) file.

+

For more information, see [Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md).

    +
  • Analyze toolbar

  • +
ACT send and receive

Synchronizes your compatibility data with the Microsoft Compatibility Exchange.

+

For more information, see [Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md).

    +
  • Analyze toolbar

  • +
ACT filter data

Turns the query builder on or off.

+

For more information, see [Filtering Your Compatibility Data](filtering-your-compatibility-data.md).

    +
  • Analyze toolbar

  • +
ACT Risk Assessment

Opens the Set Assessment dialog box.

+

For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md).

    +
  • Analyze toolbar

  • +
  • Report Details toolbar

  • +
ACT deployment status

Opens the Set Deployment Status dialog box.

+

For more information, see [Selecting Your Deployment Status](selecting-your-deployment-status.md).

    +
  • Analyze toolbar

  • +
  • Report Details toolbar

  • +
ACT categorize icon

Opens the Assign Categories dialog box.

+

For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md).

    +
  • Analyze toolbar

  • +
  • Report Details toolbar

  • +
ACT prioritize icon

Opens the Assign Priorities dialog box.

+

For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md).

    +
  • Analyze toolbar

  • +
  • Report Details toolbar

  • +
ACT send and receive icon

Opens the Send and Receive Status dialog box.

+

For more information, see [Selecting the Send and Receive Status for an Application](selecting-the-send-and-receive-status-for-an-application.md).

    +
  • Analyze toolbar

  • +
  • Report Details toolbar

  • +
ACT Add issue icon

Opens the Add Issue dialog box.

+

For more information, see [Adding or Editing an Issue](adding-or-editing-an-issue.md).

    +
  • Report Details toolbar

  • +
ACT add solution

Opens the Add Solution dialog box.

+

For more information, see [Adding or Editing a Solution](adding-or-editing-a-solution.md).

    +
  • Report Details toolbar

  • +
ACT Save icon

Saves a compatibility issue.

    +
  • Add Issue dialog box

  • +
ACT Reactivate resolved issue icon

Reactivates a resolved compatibility issue.

+

For more information, see [Resolving an Issue](resolving-an-issue.md).

    +
  • Add Issue dialog box

  • +
ACT refresh icon

Refreshes the screen. If you are using the query builder, updates the screen with the query results.

    +
  • Collect toolbar

  • +
  • Analyze toolbar

  • +
  • Data Collection Package - Status toolbar

  • +
  • Report Details toolbar

  • +
ACT move up and down icons

Enables you to scroll up and down the screen or dialog box information, showing the related details.

+

This button may not be available for all issues or information.

    +
  • Report Details toolbar

  • +
  • Add Issue dialog box

  • +
  • New Data Collection Package dialog box

  • +
  • Data Collection Package - Status toolbar

  • +
ACT help icon

Opens the online Help system.

    +
  • All screens

  • +
+ +  + +## Related topics + + +[Ratings Icons in ACM](ratings-icons-in-acm.md) + +  + +  + + + + + diff --git a/windows/plan/troubleshooting-act-database-issues.md b/windows/plan/troubleshooting-act-database-issues.md new file mode 100644 index 0000000000..7e2111d90f --- /dev/null +++ b/windows/plan/troubleshooting-act-database-issues.md @@ -0,0 +1,164 @@ +--- +title: Troubleshooting ACT Database Issues (Windows 10) +description: The following solutions may help you resolve issues that are related to your Microsoft® SQL Server® database for the Application Compatibility Toolkit (ACT). +ms.assetid: c36ab5d8-cc82-4681-808d-3d491551b75e +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Troubleshooting ACT Database Issues + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Connecting to a SQL Server Database](#connecting_to_a_sql_server_database) +- [Verifying SQL Server Version](#verifying_sql_server_version) +- [Creating an ACT Database](#creating_an_act_database) +- [Granting ACT Database Permissions for the ACT Log Processing Service](#granting_act_database_permissions_for_the_act_log_processing_service) +- [Related topics](#related_topics) + +The following solutions may help you resolve issues that are related to your Microsoft® SQL Server® database for the Application Compatibility Toolkit (ACT). + +For information about how to set up the database, see [ACT Database Configuration](act-database-configuration.md). + +## Connecting to a SQL Server Database + + +When you attempt to connect to a SQL Server database, you may receive the following error message: + +The SQL Server you entered either does not exist or you do not have the required credentials for access. + +This error message indicates that the connection to the database is not valid. To investigate this error, do the following: + +1. Verify that the SQL Server database to which you are connecting is a valid database. + +2. Verify that you have read and write permissions to the database. If you do not have read and write permissions, contact your SQL Server administrator. For more information, see [Adding a Member to a SQL Server Database Role](http://go.microsoft.com/fwlink/p/?LinkId=64170). + +If you have read and write permissions to the database but cannot connect to it, you may be able to change the settings for your instance of SQL Server to resolve the issue. Namely, you can enable TCP/IP and firewall exceptions. + +**To enable TCP/IP and firewall exceptions for your instance of SQL Server** + +1. In a **Command Prompt** window, type the following command to stop your instance of SQL Server. + + ``` syntax + net stop + + ``` + + In the preceding command, *MSSQLSERVER* is the name of the instance of SQL Server. For SQL Server, the default name is MSSQLSERVER. For Microsoft SQL Server Express, the default name is MSSQL$SQLEXPRESS. + +2. Enable TCP/IP for your instance of SQL Server: + + 1. In the **Command Prompt** window, type `SQLServerManager.msc` + + 2. In SQL Server Configuration Manager, expand **SQL Server 2005 Network Configuration**, and then click **Protocols for MSSQLSERVER**. + + 3. Right-click **TCP/IP**, and then click **Enable**. + +3. Add firewall port exceptions for your instance of SQL Server: + + 1. In the **Command Prompt** window, type `firewall.cpl` + + 2. In the Windows® Firewall tool, click the **Exceptions** tab, and then click **Add Port**. + + 3. Add a firewall exception for TCP port 1433 (SQL Server) and for UDP port 1434 (SQL Server Browser), and then click **OK**. + + **Note**   + SQL Server Browser is the service that receives incoming SQL Server requests so that you can access the SQL Server Express database from a remote computer. By default, this service is disabled, which means that you can only access the database locally. If Application Compatibility Manager (ACM) or the ACT Log Processing Service is not installed on the same computer as the database, you must use the Services tool to manually start SQL Server Browser. + +   + +4. In the **Command Prompt** window, type `net start ` to start your instance of SQL Server, where *MSSQLSERVER* is the name of the instance. + +5. Type `sc config SQLBrowser start= auto` to change the configuration of SQL Server Browser. + +6. Type `net start SQLBrowser` to start SQL Server Browser. + +## Verifying SQL Server Version + + +If you attempt to connect to a SQL Server version that is not valid for ACT, you may receive the following error message: + +The SQL Server you are trying to connect to is not a supported version. Please check the Help documentation to find out about the supported versions of the SQL Server. + +To investigate this error, verify that ACT supports your version of SQL Server or SQL Server Express. For more information, see [Software Requirements for ACT](software-requirements-for-act.md). + +## Creating an ACT Database + + +You cannot create an ACT database by using ACM if you do not have database-creation permissions for the instance of SQL Server. To create the database, add the required permissions to the user account and then use ACM to create it. Alternatively, ask a SQL Server administrator to create the database. + +**To grant database-creation permissions to a user account** + +1. In SQL Server Management Studio, expand the **Security** folder, right-click **Logins**, and then click **New Logins**. + +2. On the **General** page, type the name of the user account that you will use to create the ACT database. + +3. Click **Server Roles**. + +4. Select the **sysadmin** or **dbcreator** check box, depending on your organization's policy. + +**To create an ACT database as a SQL Server administrator** + +1. Use SQL Server Management Studio to open and run the CreateDB.sql script against your instance of SQL Server. For information about the location of the CreateDB.sql file, see [ACT Database Configuration](act-database-configuration.md). + + - or - + + Use the OSQL tool, and run the command `osql -E -S -I CreateDB.sql` + +2. In ACM, in the **Settings** dialog box, update the **Database** box with the information for the newly created database. + + To use ACM with the ACT database, the user account must have read and write permissions to the database. + +## Granting ACT Database Permissions for the ACT Log Processing Service + + +The ACT Log Processing Service requires read and write access to the ACT database. + +**To grant permissions to the ACT database** + +1. In SQL Server Management Studio, expand the **Security** folder, right-click **Logins**, and then click **New Login**. + +2. Complete the following information on the **General** page: + + - **Login name**. Type the name of the account that requires permissions. If you are using the Local System account for the ACT Log Processing Service, provide access to the *<domain>*\\*<computer\_name>*$ account, where *<computer\_name>* is the name of the computer that is running the ACT Log Processing Service. + + - **Default database**. Select the ACT database to which your user account requires permissions. + +3. Click **User Mapping**. + +4. Select the check box next to your ACT database. + +5. Select the **db\_datareader** and **db\_datawriter** check boxes, and then click **OK**. + + **Important**   + If you continue to experience issues with the ACT Log Processing Service, even while you are using the Local System account, see [Troubleshooting Kerberos Delegation](http://go.microsoft.com/fwlink/p/?LinkId=65474). + +   + +## Related topics + + +[ACT Database Configuration](act-database-configuration.md) + +[Software Requirements for ACT](software-requirements-for-act.md) + +  + +  + + + + + diff --git a/windows/plan/troubleshooting-act.md b/windows/plan/troubleshooting-act.md new file mode 100644 index 0000000000..1dbfeee130 --- /dev/null +++ b/windows/plan/troubleshooting-act.md @@ -0,0 +1,71 @@ +--- +title: Troubleshooting ACT (Windows 10) +description: This section provides troubleshooting information for the Application Compatibility Toolkit (ACT). +ms.assetid: 5696b0c0-5db5-4111-a1e1-825129e683d8 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Troubleshooting ACT + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides troubleshooting information for the Application Compatibility Toolkit (ACT). + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Troubleshooting the ACT Configuration Wizard](troubleshooting-the-act-configuration-wizard.md)

When you start Application Compatibility Manager (ACM) for the first time, the Application Compatibility Toolkit (ACT) Configuration Wizard appears. The wizard helps you configure your ACT database, your shared folder for ACT log files, and your ACT Log Processing Service account.

[Troubleshooting the ACT Log Processing Service](troubleshooting-the-act-log-processing-service.md)

The following solutions may help you resolve issues that are related to the Application Compatibility Toolkit (ACT) Log Processing Service.

[Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md)

The following solutions may help you resolve issues that are related to your Microsoft® SQL Server® database for the Application Compatibility Toolkit (ACT).

+ +  + +## Related topics + + +[Using ACT](using-act.md) + +[ACT Product and Documentation Resources](act-product-and-documentation-resources.md) + +  + +  + + + + + diff --git a/windows/plan/troubleshooting-the-act-configuration-wizard.md b/windows/plan/troubleshooting-the-act-configuration-wizard.md new file mode 100644 index 0000000000..058b39db72 --- /dev/null +++ b/windows/plan/troubleshooting-the-act-configuration-wizard.md @@ -0,0 +1,75 @@ +--- +title: Troubleshooting the ACT Configuration Wizard (Windows 10) +description: When you start Application Compatibility Manager (ACM) for the first time, the Application Compatibility Toolkit (ACT) Configuration Wizard appears. +ms.assetid: f4f489c7-50b7-4b07-8b03-79777e1aaefd +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Troubleshooting the ACT Configuration Wizard + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +When you start Application Compatibility Manager (ACM) for the first time, the Application Compatibility Toolkit (ACT) Configuration Wizard appears. The wizard helps you configure your ACT database, your shared folder for ACT log files, and your ACT Log Processing Service account. + +## Selecting a Configuration for ACM + + +The **Enterprise configuration** option enables all ACT functionality. You must be an administrator on the local computer to select this option. + +The **View and manage reports only** option enables you to use ACM to create data-collection packages and analyze your data. You cannot access the ACT Log Processing Service. This option assumes that another computer in your organization is processing the logs and loading the compatibility data into the ACT database. + +## Configuring ACT Database Settings + + +To configure ACT database settings in the ACT Configuration Wizard, you must have read and write permissions to the ACT database. For more information, see [ACT Database Configuration](act-database-configuration.md). If you do not have the appropriate permissions, contact your Microsoft® SQL Server® administrator. For more information, see [Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md). + +## Configuring the ACT Log Processing Service + + +If you use the Local System account to run the ACT Log Processing Service, your user account must be an Administrator account. Your computer account *<domain>*\\*<computer>*$ must have read and write permissions to the ACT database. + +Your user account must also have **Log on as a service** permissions. For more information, see [Troubleshooting the ACT Log Processing Service](troubleshooting-the-act-log-processing-service.md). + +## Configuring the Share for the ACT Log Processing Service + + +For information about how to configure the share for the ACT Log Processing Service, see [ACT LPS Share Permissions](act-lps-share-permissions.md). + +## Changing Settings After You Finish the ACT Configuration Wizard + + +In the **Settings** dialog box in ACM, you can change some of the settings that you see in the ACT Configuration Wizard. You can also change other settings that are not available in the wizard. For more information, see [Settings for ACM](settings-for-acm.md). + +## Restarting the ACT Configuration Wizard + + +If you cancel the configuration process before you reach the final page of the ACT Configuration Wizard, your settings are deleted and the wizard restarts the next time that you start ACM. + +## Related topics + + +[Configuring ACT](configuring-act.md) + +[Using ACT](using-act.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +  + +  + + + + + diff --git a/windows/plan/troubleshooting-the-act-log-processing-service.md b/windows/plan/troubleshooting-the-act-log-processing-service.md new file mode 100644 index 0000000000..f4a138dc96 --- /dev/null +++ b/windows/plan/troubleshooting-the-act-log-processing-service.md @@ -0,0 +1,111 @@ +--- +title: Troubleshooting the ACT Log Processing Service (Windows 10) +description: The following solutions may help you resolve issues that are related to the Application Compatibility Toolkit (ACT) Log Processing Service. +ms.assetid: cb6f90c2-9f7d-4a34-a91e-8ed55b8c256d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Troubleshooting the ACT Log Processing Service + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +**In this article** + +- [Reviewing Files in ACT Log File Format](#reviewing_files_in_act_log_file_format) +- [Uploading Files to the ACT Log Processing Service Share After Setting Permissions](#uploading_files_to_the_act_log_processing_service_share_after_setting_permissions) +- [Working Around Windows Firewall on the Computer That Hosts the ACT Log Processing Service Share](#working_around_windows_firewall_on_the_computer_that_hosts_the_act_log_processing_service_share) +- [Viewing and Assigning "Log on as a service" Permissions](#viewing_and_assigning__log_on_as_a_service__permissions) +- [Starting the ACT Log Processing Service](#starting_the_act_log_processing_service) +- [Related topics](#related_topics) + +The following solutions may help you resolve issues that are related to the Application Compatibility Toolkit (ACT) Log Processing Service. + +For information about how to set up permissions for the service, see [ACT LPS Share Permissions](act-lps-share-permissions.md). + +## Reviewing Files in ACT Log File Format + + +When you are reviewing log files for ACT, be aware that the log files are in Unicode format. + +## Uploading Files to the ACT Log Processing Service Share After Setting Permissions + + +If you cannot upload files to the ACT Log Processing Service share, you must first verify that the account permissions are set correctly for the share. For more information, see [ACT LPS Share Permissions](act-lps-share-permissions.md). + +If the computers from which you are collecting data and the ACT Log Processing Service share are on different domains, or if the computers are not domain members, you must take additional steps. For the **Anonymous** group, provide explicit write permissions to the ACT Log Processing Service share. Alternatively, you can provide similar permissions to the **Authenticated users** group if you do not want to enable anonymous access. For more information, see [Everyone Group Does Not Include Anonymous Security Identifier](http://go.microsoft.com/fwlink/p/?LinkId=79830). + +If you are collecting data from computers that are running Microsoft® Windows® 2000 and you are uploading your collected data to a different domain, you must also explicitly enable null session access for the ACT Log Processing Service share. + +## Working Around Windows Firewall on the Computer That Hosts the ACT Log Processing Service Share + + +If your organization has configured Windows Firewall on the computer that hosts your ACT Log Processing Service share, log files will not be copied to your share. To work around this issue, you can use one of the following methods: + +- Before you set up the ACT Log Processing Service share, turn off Windows Firewall on the computer that will host the share. + +- Continue to use Windows Firewall, but enable the **File Sharing** option. + +## Viewing and Assigning "Log on as a service" Permissions + + +Starting the ACT Log Processing Service requires either a Local System account or a user account. For a user account to start the ACT Log Processing Service and complete the ACT Configuration Wizard, the *<domain>*\\*<user>* account must have **Log on as a service** permissions. By default, these permissions are assigned to built-in computer accounts, such as the Local System account. + +**To add rights to a user account for logging on as a service** + +1. In Control Panel, double-click **Administrative Tools**, and then double-click **Local Security Policy**. + +2. Expand the **Local Policies** folder, and then click **User Rights Assignment**. + +3. Double-click the **Log on as a service** policy. + +4. Verify that your *<domain>*\\*<user>* account appears. If it does not appear, click **Add User or Group**. + +5. Add your user account information, click **OK**, and then click **OK** again. + +## Starting the ACT Log Processing Service + + +If the ACT Log Processing Service does not start and log files are not being processed, the reason may be one of the following: + +- **A conflict exists between ACT and the Microsoft® SQL Server® database.** If both ACT and the SQL Server database are on the same computer, the ACT Log Processing Service might have started before the SQL Server service. + +- **The ACT Log Processing Service does not have the correct permissions to the ACT database.** To investigate, see [Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md). + +- **The account type is incorrect for the account that is running the ACT Log Processing Service.** The ACT Log Processing Service account must be an Administrator account. + +**To manually restart the ACT Log Processing Service** + +1. In Control Panel, double-click **Administrative Tools**, and then double-click **Services**. + +2. Right-click **ACT Log Processing Service**, and then click **Restart**. + +3. In the event log, verify that no issues occurred when the service restarted. + +## Related topics + + +[Troubleshooting ACT Database Issues](troubleshooting-act-database-issues.md) + +[Configuring ACT](configuring-act.md) + +[Software Requirements for ACT](software-requirements-for-act.md) + +  + +  + + + + + diff --git a/windows/plan/understanding-and-using-compatibility-fixes.md b/windows/plan/understanding-and-using-compatibility-fixes.md new file mode 100644 index 0000000000..bde6db5bc2 --- /dev/null +++ b/windows/plan/understanding-and-using-compatibility-fixes.md @@ -0,0 +1,106 @@ +--- +title: Understanding and Using Compatibility Fixes (Windows 10) +description: As the Windows operating system evolves to support new technology and functionality, the implementations of some functions may change. +ms.assetid: 84bf663d-3e0b-4168-99d6-a26e054821b7 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Understanding and Using Compatibility Fixes + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +As the Windows operating system evolves to support new technology and functionality, the implementations of some functions may change. This can cause problems for applications that relied upon the original implementation. You can avoid compatibility issues by using the Microsoft Windows Application Compatibility (Compatibility Fix) infrastructure to create a specific application fix for a particular version of an application. + +## How the Compatibility Fix Infrastructure Works + + +The Compatibility Fix infrastructure uses the linking ability of APIs to redirect an application from Windows code directly to alternative code that implements the compatibility fix. + +The Windows Portable Executable File Format includes headers that contain the data directories that are used to provide a layer of indirection between the application and the linked file. API calls to the external binary files take place through the Import Address Table (IAT), which then directly calls the Windows operating system, as shown in the following figure. + +![act app calls operating system through iat](images/dep-win8-l-act-appcallosthroughiat.jpg) + +Specifically, the process modifies the address of the affected Windows function in the IAT to point to the compatibility fix code, as shown in the following figure. + +![act app redirect with compatibility fix](images/dep-win8-l-act-appredirectwithcompatfix.jpg) + +**Note**   +For statically linked DLLs, the code redirection occurs as the application loads. You can also fix dynamically linked DLLs by hooking into the GetProcAddress API. + +  + +## Design Implications of the Compatibility Fix Infrastructure + + +There are important considerations to keep in mind when determining your application fix strategy, due to certain characteristics of the Compatibility Fix infrastructure. + +- The compatibility fix is not part of the Windows operating system (as shown in the previous figure). Therefore, the same security restrictions apply to the compatibility fix as apply to the application code, which means that you cannot use compatibility fixes to bypass any of the security mechanisms of the operating system. Therefore, compatibility fixes do not increase your security exposure, nor do you need to lower your security settings to accommodate compatibility fixes. + +- The Compatibility Fix infrastructure injects additional code into the application before it calls the operating system. This means that any remedy that can be accomplished by a compatibility fix can also be addressed by fixing the application code. + +- The compatibility fixes run as user-mode code inside of a user-mode application process. This means that you cannot use a compatibility fix to fix kernel-mode code issues. For example, you cannot use a compatibility fix to resolve device-driver issues. + + **Note**   + Some antivirus, firewall, and anti-spyware code runs in kernel mode. + +   + +## Determining When to Use a Compatibility Fix + + +The decision to use compatibility fixes to remedy your compatibility issues may involve more than just technical issues. The following scenarios reflect other common reasons for using a compatibility fix. + +### Scenario 1 + +**The compatibility issue exists on an application which is no longer supported by the vendor.** + +As in many companies, you may run applications for which the vendor has ended support. In this situation, you cannot have the vendor make the fix, nor can you access the source code to modify the issue yourself. However, it is possible that the use of a compatibility fix might resolve the compatibility issue. + +### Scenario 2 + +**The compatibility issue exists on an internally created application.** + +While it is preferable to fix the application code to resolve the issue, this is not always possible. Your internal team might not be able to fix all of the issues prior to the deployment of the new operating system. Instead, they might choose to employ a compatibility fix anywhere that it is possible. They can then fix the code only for issues that cannot be resolved in this manner. Through this method, your team can modify the application as time permits, without delaying the deployment of the new operating system into your environment. + +### Scenario 3 + +**The compatibility issue exists on an application for which a compatible version is to be released in the near future, or an application that is not critical to the organization, regardless of its version.** + +In the situation where an application is either unimportant to your organization, or for which a newer, compatible version is to be released shortly, you can use a compatibility fix as a temporary solution. This means that you can continue to use the application without delaying the deployment of a new operating system, with the intention of updating your configuration as soon as the new version is released. + +## Determining Which Version of an Application to Fix + + +You can apply a compatibility fix to a particular version of an application, either by using the "up to or including" clause or by selecting that specific version. This means that the next version of the application will not have the compatibility fix automatically applied. This is important, because it allows you to continue to use your application, but it also encourages the vendor to fix the application. + +## Support for Compatibility Fixes + + +Compatibility fixes are shipped as part of the Windows operating system and are updated by using Windows Update. Therefore, they receive the same level of support as Windows itself. + +You can apply the compatibility fixes to any of your applications. However, Microsoft does not provide the tools to use the Compatibility Fix infrastructure to create your own custom fixes. + +## Related topics + + +[Managing Application-Compatibility Fixes and Custom Fix Databases](managing-application-compatibility-fixes-and-custom-fix-databases.md) + +  + +  + + + + + diff --git a/windows/plan/using-act.md b/windows/plan/using-act.md new file mode 100644 index 0000000000..a091159a76 --- /dev/null +++ b/windows/plan/using-act.md @@ -0,0 +1,89 @@ +--- +title: Using ACT (Windows 10) +description: This section describes how to use the Application Compatibility Toolkit (ACT) in your organization. +ms.assetid: e6a68f44-7503-450d-a000-a04fbb93a146 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using ACT + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section describes how to use the Application Compatibility Toolkit (ACT) in your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Taking Inventory of Your Organization](taking-inventory-of-your-organization.md)

This section provides information about how to use the Application Compatibility Toolkit (ACT) to identify applications and devices that are installed in your organization.

[Testing Compatibility on the Target Platform](testing-compatibility-on-the-target-platform.md)

This section provides information about setting up a test environment for compatibility testing, and about creating and deploying runtime-analysis packages to the test environment.

[Managing Your Data-Collection Packages](managing-your-data-collection-packages.md)

This section provides information about using Application Compatibility Manager (ACM) to manage your data-collection packages. Data-collection packages include inventory-collector packages and runtime-analysis packages. The following procedures apply to both package types.

[Analyzing Your Compatibility Data](analyzing-your-compatibility-data.md)

This section provides information about viewing and working with your compatibility data in Application Compatibility Manager (ACM).

[Fixing Compatibility Issues](fixing-compatibility-issues.md)

This section provides step-by-step instructions and describes development tools that you can use to help fix your compatibility issues.

+ +  + +## Related topics + + +[Welcome to ACT](welcome-to-act.md) + +[Configuring ACT](configuring-act.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +[ACT User Interface Reference](act-user-interface-reference.md) + +[ACT Product and Documentation Resources](act-product-and-documentation-resources.md) + +[ACT Glossary](act-glossary.md) + +[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) + +  + +  + + + + + diff --git a/windows/plan/using-compatibility-monitor-to-send-feedback.md b/windows/plan/using-compatibility-monitor-to-send-feedback.md new file mode 100644 index 0000000000..4bf3abf7e8 --- /dev/null +++ b/windows/plan/using-compatibility-monitor-to-send-feedback.md @@ -0,0 +1,83 @@ +--- +title: Using Compatibility Monitor to Send Feedback (Windows 10) +description: The Microsoft Compatibility Monitor tool is installed as part of the runtime-analysis package. +ms.assetid: dc59193e-7ff4-4950-8c20-e90c246e469d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using Compatibility Monitor to Send Feedback + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Microsoft Compatibility Monitor tool is installed as part of the runtime-analysis package. From the computers in your test environment, you can use Compatibility Monitor to submit compatibility information to the Application Compatibility Toolkit (ACT) database for your organization. + +**To automatically monitor applications on your computer for compatibility issues** + +1. Start the Compatibility Monitor tool. + +2. In Compatibility Monitor, click **Start Monitoring**. + +3. Leave Compatibility Monitor running, and use the applications that you want to test for compatibility issues. + + Compatibility information is automatically detected during monitoring, and is silently submitted to the ACT database at regular intervals. + +4. After you finish testing applications, click **Stop Monitoring** to stop the automatic monitoring and submission of compatibility information. + +**To submit your compatibility rating for an application** + +1. Start the Compatibility Monitor tool. + +2. In Compatibility Monitor, click **Give Compatibility Feedback**. + + You can enter and submit compatibility ratings whether monitoring is on or off. The process of submitting your compatibility feedback is entirely independent of the monitoring process. + +3. Find your application in the list, and then select your compatibility rating for the application. + + You can select ratings for one or more applications. + +4. Click **Submit** to submit your compatibility ratings to the ACT database. + + A copy of your ratings is kept on your computer so that you can review and modify the ratings later. + +**To submit a description of a compatibility issue for an application** + +1. Start the Compatibility Monitor tool. + +2. In Compatibility Monitor, click **Give Compatibility Feedback**. + +3. Find your application in the list, and then click the **Add Details** link. + +4. In the **Title** box, enter a title for the compatibility issue. The title is typically a phrase that briefly describes the issue. Check with others in your organization to verify your organization’s preferred style for issue titles. + +5. In the **Description** box, enter a description of the compatibility issue. + +6. Optionally, attach a screen shot or a step-by-step recording of the compatibility issue. + +7. Click **Submit** to submit your compatibility issue to the ACT database. + + After submitting your compatibility issue, you cannot edit it later. To submit further compatibility issues, you will need to submit a new issue. + +## Related topics + + +[Common Compatibility Issues](common-compatibility-issues.md) + +  + +  + + + + + diff --git a/windows/plan/using-the-compatibility-administrator-tool.md b/windows/plan/using-the-compatibility-administrator-tool.md new file mode 100644 index 0000000000..09f3b30d05 --- /dev/null +++ b/windows/plan/using-the-compatibility-administrator-tool.md @@ -0,0 +1,88 @@ +--- +title: Using the Compatibility Administrator Tool (Windows 10) +description: This section provides information about using the Compatibility Administrator tool. +ms.assetid: 57271e47-b9b9-4018-a0b5-7115a533166d +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using the Compatibility Administrator Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section provides information about using the Compatibility Administrator tool. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[Available Data Types and Operators in Compatibility Administrator](available-data-types-and-operators-in-compatibility-administrator.md)

The Compatibility Administrator tool provides a way to query your custom-compatibility databases.

[Searching for Fixed Applications in Compatibility Administrator](searching-for-fixed-applications-in-compatibility-administrator.md)

With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages. This is particularly useful if you are trying to identify applications with a specific compatibility fix or identifying which fixes are applied to a specific application.

[Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator](searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md)

You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature.

[Creating a Custom Compatibility Fix in Compatibility Administrator](creating-a-custom-compatibility-fix-in-compatibility-administrator.md)

The Compatibility Administrator tool uses the term fix to describe the combination of compatibility information added to a customized database for a specific application. This combination can include single application fixes, groups of fixes that work together as a compatibility mode, and blocking and non-blocking AppHelp messages.

[Creating a Custom Compatibility Mode in Compatibility Administrator](creating-a-custom-compatibility-mode-in-compatibility-administrator.md)

Windows® provides several compatibility modes, groups of compatibility fixes found to resolve many common application-compatibility issues. While working with Compatibility Administrator, you might decide to group some of your individual compatibility fixes into a custom-compatibility mode, which you can then deploy and use on any of your compatibility databases.

[Creating an AppHelp Message in Compatibility Administrator](creating-an-apphelp-message-in-compatibility-administrator.md)

The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system.

[Viewing the Events Screen in Compatibility Administrator](viewing-the-events-screen-in-compatibility-administrator.md)

The Events screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities.

[Enabling and Disabling Compatibility Fixes in Compatibility Administrator](enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md)

You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes.

[Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator](installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md)

The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases. Both the custom databases and the standard databases store the known compatibility fixes, compatibility modes, and AppHelp messages. They also store the required application-matching information for installation on your local computers.

+ +  + +  + +  + + + + + diff --git a/windows/plan/using-the-sdbinstexe-command-line-tool.md b/windows/plan/using-the-sdbinstexe-command-line-tool.md new file mode 100644 index 0000000000..26fdc888d1 --- /dev/null +++ b/windows/plan/using-the-sdbinstexe-command-line-tool.md @@ -0,0 +1,95 @@ +--- +title: Using the Sdbinst.exe Command-Line Tool (Windows 10) +description: You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. +ms.assetid: c1945425-3f8d-4de8-9d2d-59f801f07034 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using the Sdbinst.exe Command-Line Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. You can deploy your customized database files in several ways, including by using a logon script, by using Group Policy, or by performing file copy operations. + +After you deploy and store the customized databases on each of your local computers, you must register the database files. Until you register the database files, the operating system is unable to identify the available compatibility fixes when starting an application. + +## Command-Line Options for Deploying Customized Database Files + + +The command-line options use the following conventions. + +Sdbinst.exe \[-q\] \[-u filepath\] \[-g *GUID*\] \[-n *"name"*\] \[-?\] + +The following table describes the available command-line options. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
OptionDescription

-q

Performs a silent installation with no visible window, status, or warning information. Fatal errors appear only in Event Viewer (Eventvwr.exe).

+

For example,

+

sdbinst.exe -q

-u filepath

Performs an uninstallation of the specified database.

+

For example,

+

sdbinst.exe -u C:\example.sdb

-g GUID

Specifies the customized database to uninstall by a globally unique identifier (GUID).

+

For example,

+

sdbinst.exe -g 6586cd8f-edc9-4ea8-ad94-afabea7f62e3

-n "name"

Specifies the customized database to uninstall by file name.

+

For example,

+

sdbinst.exe -n "My_Database"

-?

Displays the Help for the Sdbinst.exe tool.

+

For example,

+

sdbinst.exe -?

+ +  + +## Related topics + + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/using-the-sua-tool.md b/windows/plan/using-the-sua-tool.md new file mode 100644 index 0000000000..978389cd95 --- /dev/null +++ b/windows/plan/using-the-sua-tool.md @@ -0,0 +1,88 @@ +--- +title: Using the SUA Tool (Windows 10) +description: By using the Standard User Analyzer (SUA) tool, you can test your applications and monitor API calls to detect compatibility issues with the User Account Control (UAC) feature. +ms.assetid: ebe52061-3816-47f7-a865-07bc5f405f03 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using the SUA Tool + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +By using the Standard User Analyzer (SUA) tool, you can test your applications and monitor API calls to detect compatibility issues with the User Account Control (UAC) feature. + +The SUA Wizard also addresses UAC-related issues. In contrast to the SUA tool, the SUA Wizard guides you through the process step by step, without the in-depth analysis of the SUA tool. For information about the SUA Wizard, see [Using the SUA Wizard](using-the-sua-wizard.md). + +In the SUA tool, you can turn virtualization on and off. When you turn virtualization off, the tested application may function more like the way it does in earlier versions of Windows®. + +In the SUA tool, you can choose to run the application as **Administrator** or as **Standard User**. Depending on your selection, you may locate different types of UAC-related issues. + +## Testing an Application by Using the SUA Tool + + +Before you can use the SUA tool, you must install Application Verifier. You must also install the Microsoft® .NET Framework 3.5 or later. + +The following flowchart shows the process of using the SUA tool. + +![act sua flowchart](images/dep-win8-l-act-suaflowchart.jpg) + +**To collect UAC-related issues by using the SUA tool** + +1. Close any open instance of the SUA tool or SUA Wizard on your computer. + + If there is an existing SUA instance on the computer, the SUA tool opens in log viewer mode instead of normal mode. In log viewer mode, you cannot start applications, which prevents you from collecting UAC issues. + +2. Run the Standard User Analyzer. + +3. In the **Target Application** box, browse to the executable file for the application that you want to analyze, and then double-click to select it. + +4. Clear the **Elevate** check box, and then click **Launch**. + + If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning. + +5. Exercise the aspects of the application for which you want to gather information about UAC issues. + +6. Exit the application. + +7. Review the information from the various tabs in the SUA tool. For information about each tab, see [Tabs on the SUA Tool Interface](tabs-on-the-sua-tool-interface.md). + +**To review and apply the recommended mitigations** + +1. In the SUA tool, on the **Mitigation** menu, click **Apply Mitigations**. + +2. Review the recommended compatibility fixes. + +3. Click **Apply**. + + The SUA tool generates a custom compatibility-fix database and automatically applies it to the local computer, so that you can test the fixes to see whether they worked. + +## Related topics + + +[Tabs on the SUA Tool Interface](tabs-on-the-sua-tool-interface.md) + +[Showing Messages Generated by the SUA Tool](showing-messages-generated-by-the-sua-tool.md) + +[Applying Filters to Data in the SUA Tool](applying-filters-to-data-in-the-sua-tool.md) + +[Fixing Applications by Using the SUA Tool](fixing-applications-by-using-the-sua-tool.md) + +  + +  + + + + + diff --git a/windows/plan/using-the-sua-wizard.md b/windows/plan/using-the-sua-wizard.md new file mode 100644 index 0000000000..7571be582c --- /dev/null +++ b/windows/plan/using-the-sua-wizard.md @@ -0,0 +1,86 @@ +--- +title: Using the SUA Wizard (Windows 10) +description: The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions. +ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Using the SUA Wizard + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions. + +For information about the SUA tool, see [Using the SUA Tool](using-the-sua-tool.md). + +## Testing an Application by Using the SUA Wizard + + +You must install Application Verifier before you can use the SUA Wizard. If Application Verifier is not installed on the computer that is running the SUA Wizard, the SUA Wizard notifies you. You must also install the Microsoft® .NET Framework 3.5 or later before you can use the SUA Wizard. + +The following flowchart shows the process of using the SUA Wizard. + +![act sua wizard flowchart](images/dep-win8-l-act-suawizardflowchart.jpg) + +**To test an application by using the SUA Wizard** + +1. On the computer where the SUA Wizard is installed, log on by using a non-administrator account. + +2. Run the Standard User Analyzer Wizard. + +3. Click **Browse for Application**, browse to the folder that contains the application that you want to test, and then double-click the executable file for the application. + +4. Click **Launch**. + + If you are prompted, elevate your permissions. The SUA Wizard may require elevation of permissions to correctly diagnose the application. + + If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning. + +5. In the application, exercise the functionality that you want to test. + +6. After you finish testing, exit the application. + + The SUA Wizard displays a message that asks whether the application ran without any issues. + +7. Click **No**. + + The SUA Wizard shows a list of potential remedies that you might use to fix the application. + +8. Select the fixes that you want to apply, and then click **Launch**. + + The application appears again, with the fixes applied. + +9. Test the application again, and after you finish testing, exit the application. + + The SUA Wizard displays a message that asks whether the application ran without any issues. + +10. If the application ran correctly, click **Yes**. + + The SUA Wizard closes the issue as resolved on the local computer. + + If the remedies do not fix the issue with the application, click **No** again, and the wizard may offer additional remedies. If the additional remedies do not fix the issue, the wizard informs you that there are no more remedies available. For information about how to run the SUA tool for additional investigation, see [Using the SUA Tool](using-the-sua-tool.md). + +## Related topics + + +[SUA User's Guide](sua-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/viewing-the-events-screen-in-compatibility-administrator.md b/windows/plan/viewing-the-events-screen-in-compatibility-administrator.md new file mode 100644 index 0000000000..29d76d517d --- /dev/null +++ b/windows/plan/viewing-the-events-screen-in-compatibility-administrator.md @@ -0,0 +1,55 @@ +--- +title: Viewing the Events Screen in Compatibility Administrator (Windows 10) +description: The Events screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities. +ms.assetid: f2b2ada4-1b7b-4558-989d-5b52b40454b3 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Viewing the Events Screen in Compatibility Administrator + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The **Events** screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities. + +**Important**   +The **Events** screen only records your activities when the screen is open. If you perform an action before opening the **Events** screen, the action will not appear in the list. + +  + +**To open the Events screen** + +- On the **View** menu, click **Events**. + +## Handling Multiple Copies of Compatibility Fixes + + +Compatibility Administrator enables you to copy your compatibility fixes from one database to another, which can become confusing after adding multiple fixes, compatibility modes, and databases. For example, you can copy a fix called MyFix from Database 1 to Database 2. However, if there is already a fix called MyFix in Database 2, Compatibility Administrator renames the fix as MyFix (1) to avoid duplicate names. + +If you open the **Events** screen and then perform the copy operation, you can see a description of the action, along with the time stamp, which enables you to view your fix information without confusion. + +## Related topics + + +[Creating a Custom Compatibility Mode in Compatibility Administrator](creating-a-custom-compatibility-mode-in-compatibility-administrator.md) + +[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) + +  + +  + + + + + diff --git a/windows/plan/viewing-your-compatibility-reports.md b/windows/plan/viewing-your-compatibility-reports.md new file mode 100644 index 0000000000..6f347c8ca5 --- /dev/null +++ b/windows/plan/viewing-your-compatibility-reports.md @@ -0,0 +1,85 @@ +--- +title: Viewing Your Compatibility Reports (Windows 10) +description: This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports. +ms.assetid: a28bbfbe-5f05-4a1e-9397-0a3ceb585871 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Viewing Your Compatibility Reports + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[<OperatingSystem> - Application Report](operatingsystem---application-report.md)

This section describes the compatibility reports in Application Compatibility Manager (ACM) and how you can work with the reports.

[<OperatingSystem> - Computer Report](operatingsystem---computer-report.md)

The <OperatingSystem> - Computer Report screen shows the following information for each computer in your organization:

[<OperatingSystem> - Device Report](operatingsystem---device-report.md)

The <OperatingSystem> - Device Report screen shows the following information for each device installed in your organization:

[Internet Explorer - Web Site Report](internet-explorer---web-site-report.md)

The Internet Explorer - Web Site Report screen shows the following information for each of the websites visited in your organization:

[Saving, Opening, and Exporting Reports](saving-opening-and-exporting-reports.md)

You can perform several common reporting tasks from the Analyze screen, including saving a compatibility report, opening a saved compatibility report (.adq) file, and exporting your report data to a spreadsheet (.xls) file.

[Customizing Your Report Views](customizing-your-report-views.md)

You can customize how you view your report data in Application Compatibility Manager (ACM).

+ +  + +## Related topics + + +[Organizing Your Compatibility Data](organizing-your-compatibility-data.md) + +[Filtering Your Compatibility Data](filtering-your-compatibility-data.md) + +[Sending and Receiving Compatibility Data](sending-and-receiving-compatibility-data.md) + +  + +  + + + + + diff --git a/windows/plan/websiteurl-dialog-box.md b/windows/plan/websiteurl-dialog-box.md new file mode 100644 index 0000000000..b57ec7ab74 --- /dev/null +++ b/windows/plan/websiteurl-dialog-box.md @@ -0,0 +1,55 @@ +--- +title: <WebsiteURL> Dialog Box (Windows 10) +description: In Application Compatibility Manager (ACM), the <websiteURL> dialog box shows information about the selected website. +ms.assetid: 0dad26e1-4bba-4fef-b160-3fa1f4325da8 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# <WebsiteURL> Dialog Box + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +In Application Compatibility Manager (ACM), the *<websiteURL>* dialog box shows information about the selected website. + +**To open the <WebsiteURL> Dialog Box** + +1. In ACM, in the **Quick Reports** pane, click **Analyze**. + +2. Under the **Internet Explorer** heading, click **Web Sites**. + +3. Double-click the URL for a website. + +## Using the <WebsiteURL> Dialog Box + + +In the *<websiteURL>* dialog box, you can perform the following actions: + +- Select your compatibility rating for the website. For more information, see [Selecting Your Compatibility Rating](selecting-your-compatibility-rating.md). + +- Select your deployment status for the website. For more information, see [Selecting Your Deployment Status](selecting-your-deployment-status.md). + +- Assign categories and subcategories to the website. For more information, see [Categorizing Your Compatibility Data](categorizing-your-compatibility-data.md). + +- Specify the importance of the website to your organization. For more information, see [Prioritizing Your Compatibility Data](prioritizing-your-compatibility-data.md). + +- Add or edit an issue for the selected website, and add or edit a solution. For more information, see [Creating and Editing Issues and Solutions](creating-and-editing-issues-and-solutions.md). + +  + +  + + + + + diff --git a/windows/plan/welcome-to-act.md b/windows/plan/welcome-to-act.md new file mode 100644 index 0000000000..fdbbc6ad7d --- /dev/null +++ b/windows/plan/welcome-to-act.md @@ -0,0 +1,81 @@ +--- +title: Welcome to ACT (Windows 10) +description: The Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. +ms.assetid: 3963db88-83d2-4b9a-872e-31c275d1a321 +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# Welcome to ACT + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +The Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. With ACT, you can obtain compatibility information from Microsoft and software vendors, identify compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility issues before deploying a version of Windows to your organization. + +## In this section + + + ++++ + + + + + + + + + + + + + + + + + + + + +
TopicDescription

[What's New in ACT 6.1](whats-new-in-act-60.md)

Two major updates have been released since ACT 6.1. They are ACT 6.1 Update and ACT 6.1 Update 2. The following table lists changes made in the Application Compatibility Toolkit (ACT), which is included in the Windows Assessment and Deployment Kit (ADK) download.

[Software Requirements for ACT](software-requirements-for-act.md)

The Application Compatibility Toolkit (ACT) has the following software requirements.

[Software Requirements for RAP](software-requirements-for-rap.md)

The runtime-analysis package (RAP) has the following software requirements.

+ +  + +## Related topics + + +[Configuring ACT](configuring-act.md) + +[Using ACT](using-act.md) + +[Troubleshooting ACT](troubleshooting-act.md) + +[ACT User Interface Reference](act-user-interface-reference.md) + +[ACT Product and Documentation Resources](act-product-and-documentation-resources.md) + +[ACT Glossary](act-glossary.md) + +[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) + +  + +  + + + + + diff --git a/windows/plan/whats-new-in-act-60.md b/windows/plan/whats-new-in-act-60.md new file mode 100644 index 0000000000..c765ca62eb --- /dev/null +++ b/windows/plan/whats-new-in-act-60.md @@ -0,0 +1,83 @@ +--- +title: What's New in ACT 6.1 (Windows 10) +description: Two major updates have been released since ACT 6.1. +ms.assetid: f12e137d-0b55-4f7d-88e0-149302655d9b +ms.prod: W10 +ms.mktglfcycl: operate +ms.sitesec: library +author: TrudyHa +--- + +# What's New in ACT 6.1 + + +**Applies to** + +- Windows 10 +- Windows 8.1 +- Windows 8 +- Windows 7 +- Windows Server 2012 +- Windows Server 2008 R2 + +Two major updates have been released since ACT 6.1. They are ACT 6.1 Update and ACT 6.1 Update 2. The following table lists changes made in the Application Compatibility Toolkit (ACT), which is included in the Windows Assessment and Deployment Kit (ADK) download. + + ++++ + + + + + + + + + + + + + + +
VersionChanges
ACT 6.1 Update
    +
  • Support for Windows 10, including viewing Windows 10 reports on Application Compatibility Manager.
  • +
  • Bug fixes: this version of ACT fixed an issue where Inventory-Collector package would fail when it tried to inventory the system.
  • +
ACT 6.1 Update 2

Bug fixes: this version of ACT addresses the following bugs:

+
    +
  • Capability to create custom compatibility fixes for Windows versions other than the currently running version.

  • +
  • Fixed issue where Inventory-Collector Package crashes when running on some Windows 7 x86 systems.

  • +
  • Fixed issue where not specifying a tag for Inventory-Collector Package would cause an error in the log processing service. The result of this bug was that data collected by the Package would not be processed.

  • +
  • Fixed issue where Standard User Analyzer (SUA) returns an error when trying to apply mitigations to an app on Windows 7.

  • +
  • Fixed issue where ACT is unable to create custom compatibility fixes for 32-bit systems correctly.

  • +
+ +  + +**Note**   +The version numbers for ACT 6.1 Update and Update 2 are identical, so you will need to look at the product ID of ACT to tell them apart. To find the product ID, open ACT, go to **Help** > **About**, and compare the product ID to the following list. + +- **ACT 6.1 Update**: B264FCCB-3F1F-828F-CCF8-EDB93E860970 + +- **ACT 6.1 Update 2**: B2BC4686-29A9-9E9D-F2E4-7E20659EECE7 + +If you run into any of the bugs fixed in Update 2, you likely have ACT 6.1 Update or older. Please download the latest version in the Windows ADK. + +  + +## Related topics + + +[Software Requirements for ACT](software-requirements-for-act.md) + +[Software Requirements for RAP](software-requirements-for-rap.md) + +  + +  + + + + + diff --git a/windows/plan/windows-10-compatibility.md b/windows/plan/windows-10-compatibility.md new file mode 100644 index 0000000000..bd313c0ef8 --- /dev/null +++ b/windows/plan/windows-10-compatibility.md @@ -0,0 +1,59 @@ +--- +title: Windows 10 compatibility (Windows 10) +description: Windows 10 will be compatible with most existing PC hardware; most devices running Windows 7, Windows 8, or Windows 8.1 will meet the requirements for Windows 10. +ms.assetid: 829BE5B5-330A-4702-807A-8908B4FC94E8 +keywords: ["deploy", "upgrade", "update", "appcompat"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Windows 10 compatibility + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Recommended application testing process](#recommended_application_testing_process) +- [Related topics](#related_topics) + +Windows 10 will be compatible with most existing PC hardware; most devices running Windows 7, Windows 8, or Windows 8.1 will meet the requirements for Windows 10. + +For full system requirements, see [Windows 10 specifications](http://go.microsoft.com/fwlink/p/?LinkId=625077). Some driver updates may be required for Windows 10. + +Existing desktop (Win32) application compatibility is also expected to be strong, with most existing applications working without any changes. Some applications that interface with Windows at a low level, those that use undocumented APIs, or those that do not follow recommended coding practices could experience issues. + +Existing Windows Store (WinRT) apps created for Windows 8 and Windows 8.1 should also continue to work, because compatibility can be validated against all the apps that have been submitted to the Windows Store. + +For web apps and sites, modern HTML5-based sites should also have a high degree of compatibility and excellent performance through the new Microsoft Edge browser, while older web apps and sites can continue to use Internet Explorer 11 and the Enterprise Mode features that were first introduced in Windows 7 and Windows 8.1 and are still present in Windows 10. For more information about Internet Explorer and Enterprise Mode, see the [Internet Explorer 11 Deployment Guide for IT Pros.](http://go.microsoft.com/fwlink/p/?LinkId=734031) + +## Recommended application testing process + + +Historically, organizations have performed extensive, and often exhaustive, testing of the applications they use before deployment of a new Windows version, service pack, or any other significant update. With Windows 10, organizations are encouraged to leverage more optimized testing processes, which reflects the higher levels of compatibility that are expected. At a high level: + +- Identify mission-critical applications and websites, those that are absolutely essential to the organization’s operations. Focus testing efforts on this subset of applications, early in the Windows development cycle (for example, with Windows Insider Program builds) to identify potential issues. Report any issues you encounter with the Windows Feedback tool, so that these issues can be addressed prior to the next Windows release. + +- For less critical applications, leverage an “internal flighting” or pilot-based approach, by deploying new Windows upgrades to groups of machines, growing gradually in size and potential impact, to verify compatibility with hardware and software. Reactively address issues before you expand the pilot to more machines. + +## Related topics + + +[Windows 10 servicing options](windows-10-servicing-model.md) + +[Windows 10 deployment considerations](windows-10-deployment-considerations.md) + +[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) + +  + +  + + + + + diff --git a/windows/plan/windows-10-deployment-considerations.md b/windows/plan/windows-10-deployment-considerations.md new file mode 100644 index 0000000000..d6002441ce --- /dev/null +++ b/windows/plan/windows-10-deployment-considerations.md @@ -0,0 +1,148 @@ +--- +title: Windows 10 deployment considerations (Windows 10) +description: There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. +ms.assetid: A8DD6B37-1E11-4CD6-B588-92C2404219FE +keywords: ["deploy", "upgrade", "update", "in-place"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Windows 10 deployment considerations + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Migration from previous Windows versions](#migration_from_previous_windows_versions) +- [Setup of new computers](#setup_of_new_computers) +- [Stay up to date](#stay_up_to_date) +- [Related topics](#related_topics) + +There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. + +For many years, organizations have deployed new versions of Windows using a “wipe and load” deployment process. At a high level, this process captures existing data and settings from the existing device, deploys a new custom-built Windows image to a PC, injects hardware drivers, reinstalls applications, and finally restores the data and settings. With Windows 10, this process is still fully supported, and for some deployment scenarios is still necessary. + +Windows 10 also introduces two additional scenarios that organizations should consider: + +- **In-place upgrade**, which provides a simple, automated process that leverages the Windows setup process to automatically upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications. + +- **Dynamic provisioning**, which enables organizations to configure new Windows 10 devices for organization use without having to deploy a new custom organization image to the device. + + Both of these scenarios eliminate the image creation process altogether, which can greatly simplify the deployment process. + + So how do you choose? At a high level: + + ++++ + + + + + + + + + + + + + + + + + + + + +
Consider ...For these scenarios
In-place upgrade
    +
  • When you want to keep all (or at least most) existing applications

  • +
  • When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)

  • +
  • To migrate from Windows 10 to a later Windows 10 release

  • +
Traditional wipe-and-load
    +
  • When you upgrade significant numbers of applications along with the new Windows OS

  • +
  • When you make significant device or operating system configuration changes

  • +
  • When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs

  • +
  • When you migrate from Windows Vista or other previous operating system versions

  • +
Dynamic provisioning
    +
  • For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required

  • +
  • When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps

  • +
+ +  + +## Migration from previous Windows versions + + +For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall. + +Note that the original Windows 8 release is only supported until January 2016. Organizations that do not think they can complete a full Windows 10 migration by that date should deploy Windows 8.1 now and consider Windows 10 after Windows 8 has been removed from the environment. + +For existing Windows PCs running Windows Vista, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware. + +Note that to take advantage of the limited-time free upgrade offer for PCs running Windows 7, Windows 8, or Windows 8.1, you must leverage an in-place upgrade, either from Windows Update or by using the upgrade media available from the [Windows 10 software download page](http://go.microsoft.com/fwlink/p/?LinkId=625073) to acquire a new Windows 10 license from the Windows Store. For more information, refer to the [Windows 10 FAQ](http://go.microsoft.com/fwlink/p/?LinkId=625074). + +For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed). + +For organizations that do not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements. + +## Setup of new computers + + +For new computers acquired with Windows 10 preinstalled, you can leverage dynamic provisioning scenarios to transform the device from its initial state into a fully-configured organization PC. There are two primary dynamic provisioning scenarios you can use: + +- **User-driven, from the cloud.** By joining a device into Azure Active Directory and leveraging the automatic mobile device management (MDM) provisioning capabilities at the same time, an end user can initiate the provisioning process themselves just by entering the Azure Active Directory account and password (called their “work or school account” within Windows 10). The MDM service can then transform the device into a fully-configured organization PC. For more information, see [Azure Active Directory integration with MDM](http://go.microsoft.com/fwlink/p/?LinkId=625075). + +- **IT admin-driven, using new tools.** Using the new Windows Imaging and Configuration Designer (ICD) tool, IT administrators can create provisioning packages that can be applied to a computer to transform it into a fully-configured organization PC. For more information, see [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=625076). + +In either of these scenarios, you can make a variety of configuration changes to the PC: + +- Transform the edition (SKU) of Windows 10 that is in use. + +- Apply configuration and settings to the device (for example, security settings, device restrictions, policies, Wi-Fi and VPN profiles, certificates, and so on). + +- Install apps, language packs, and updates. + +- Enroll the device in a management solution (applicable for IT admin-driven scenarios, configuring the device just enough to allow the management tool to take over configuration and ongoing management). + +## Stay up to date + + +For computers already running Windows 10 on the Current Branch or Current Branch for Business, new upgrades will periodically be deployed, approximately two to three times per year. You can deploy these upgrades by using a variety of methods: + +- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet. + +- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update). Note that this will require updates to WSUS, which are only available for Windows Server 2012 and Windows Server 2012 R2, not previous versions. + +- System Center Configuration Manager task sequences (with Configuration Manager 2012, 2012 R2, and later versions). + +- System Center Configuration Manager vNext software update capabilities (deploying like an update). + +Note that these upgrades (which are installed differently than monthly updates) will leverage an in-place upgrade process. Unlike updates, which are relatively small, these upgrades will include a full operating system image (around 3 GB for 64-bit operating systems), which requires time (1-2 hours) and disk space (approximately 10 GB) to complete. Ensure that the deployment method you use can support the required network bandwidth and/or disk space requirements. + +Over time, this upgrade process will be optimized to reduce the overall time and network bandwidth consumed. + +## Related topics + + +[Windows 10 servicing options](windows-10-servicing-model.md) + +[Windows 10 compatibility](windows-10-compatibility.md) + +[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) + +  + +  + + + + + diff --git a/windows/plan/windows-10-infrastructure-requirements.md b/windows/plan/windows-10-infrastructure-requirements.md new file mode 100644 index 0000000000..d9398f8658 --- /dev/null +++ b/windows/plan/windows-10-infrastructure-requirements.md @@ -0,0 +1,134 @@ +--- +title: Windows 10 infrastructure requirements (Windows 10) +description: There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization. +ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64 +keywords: ["deploy", "upgrade", "update", "hardware"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Windows 10 infrastructure requirements + + +**Applies to** + +- Windows 10 + +**In this article** + +- [High-level requirements](#high-level_requirements) +- [Deployment tools](#deployment_tools) +- [Management tools](#management_tools) +- [Activation](#activation) +- [Related topics](#related_topics) + +There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization. + +## High-level requirements + + +For initial Windows 10 deployments, as well as subsequent Windows 10 upgrades, ensure that sufficient disk space is available for distribution of the Windows 10 installation files (about 3 GB for Windows 10 x64 images, slightly smaller for x86). Also, be sure to take into account the network impact of moving these large images to each PC; you may need to leverage local server storage. + +For persistent VDI environments, carefully consider the I/O impact from upgrading large numbers of PCs in a short period of time. Ensure that upgrades are performed in smaller numbers, or during off-peak time periods. (For pooled VDI environments, a better approach is to replace the base image with a new version.) + +## Deployment tools + + +A new version of the Assessment and Deployment Toolkit (ADK) has been released to support Windows 10. This new version, available for download [here](http://go.microsoft.com/fwlink/p/?LinkId=526740), is required for Windows 10; you should not use earlier versions of the ADK to deploy Windows 10. It also supports the deployment of Windows 7, Windows 8, and Windows 8.1. + +Significant enhancements in the ADK for Windows 10 include new runtime provisioning capabilities, which leverage the Windows Imaging and Configuration Designer (Windows ICD), as well as updated versions of existing deployment tools (DISM, USMT, Windows PE, and more). + +Microsoft Deployment Toolkit 2013 Update 1, available for download [here](http://go.microsoft.com/fwlink/p/?LinkId=625079), has also been updated to support Windows 10 and the new ADK; older versions do not support Windows 10. New in this release is task sequence support for Windows 10 in-place upgrades. + +For System Center Configuration Manager, Windows 10 support is offered with various releases: + +| Release | Windows 10 management? | Windows 10 deployment? | +|---------------------------------------------|------------------------|------------------------------------------------| +| System Center Configuration Manager 2007 | Yes, with a hotfix | No | +| System Center Configuration Manager 2012 | Yes, with SP2 and CU1 | Yes, with SP2, CU1, and the ADK for Windows 10 | +| System Center Configuration Manager 2012 R2 | Yes, with SP1 and CU1 | Yes, with SP1, CU1, and the ADK for Windows 10 | + +  + +For more details about System Center Configuration Manager support for Windows 10, see [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](../deploy/deploy-windows-81-with-system-center-2012-r2-configuration-manager.md). + +## Management tools + + +In addition to System Center Configuration Manager, Windows 10 also leverages other tools for management. For Windows Server and Active Directory, existing supported versions are fully supported for Windows 10. New Group Policy templates will be needed to configure new settings available in Windows 10; these templates are available in the Windows 10 media images, and are available as a separate download [here](http://go.microsoft.com/fwlink/p/?LinkId=625081). See [Group Policy settings reference](http://go.microsoft.com/fwlink/p/?LinkId=625082) for a list of the new and modified policy settings. If you are using a central policy store, follow the steps outlined [here](http://go.microsoft.com/fwlink/p/?LinkId=625083) to update the ADMX files stored in that central store. + +No new Active Directory schema updates or specific functional levels are currently required for core Windows 10 product functionality, although subsequent upgrades could require these to support new features. + +Microsoft Desktop Optimization Pack (MDOP) has been updated to support Windows 10. The minimum versions required to support Windows 10 are as follows: + +| Product | Required version | +|----------------------------------------------------------|--------------------------| +| Advanced Group Policy Management (AGPM) | AGPM 4.0 Service Pack 3 | +| Application Virtualization (App-V) | App-V 5.1 | +| Diagnostics and Recovery Toolkit (DaRT) | DaRT 10 | +| Microsoft BitLocker Administration and Monitoring (MBAM) | MBAM 2.5 SP1 (2.5 is OK) | +| User Experience Virtualization (UE-V) | UE-V 2.1 SP1 | + +  + +For more information, see the [MDOP TechCenter](http://go.microsoft.com/fwlink/p/?LinkId=625090). + +For devices you manage with mobile device management (MDM) solutions such as Microsoft Intune, existing capabilities (provided initially in Windows 8.1) are fully supported in Windows 10; new Windows 10 MDM settings and capabilities will require updates to the MDM services. See [Mobile device management](http://go.microsoft.com/fwlink/p/?LinkId=625084) for more information. + +Windows Server Update Services (WSUS) requires some additional configuration to receive updates for Windows 10. Use the Windows Server Update Services admin tool and follow these instructions: + +1. Select the **Options** node, and then click **Products and Classifications**. + +2. In the **Products** tree, select the **Windows 10** and **Windows 10 LTSB** products and any other Windows 10-related items that you want. Click **OK**. + +3. From the **Synchronizations** node, right-click and choose **Synchronize Now**. + +![figure 1](images/fig4-wsuslist.png) + +Figure 1. WSUS product list with Windows 10 choices + +Because Windows 10 updates are cumulative in nature, each month’s new update will supersede the previous month's. Consider leveraging “express installation” packages to reduce the size of the payload that needs to be sent to each PC each month; see [Express installation files](http://go.microsoft.com/fwlink/p/?LinkId=625086) for more information. (Note that this will increase the amount of disk storage needed by WSUS, and impacts all operating systems being managed with WSUS.) + +## Activation + + +Windows 10 volume license editions of Windows 10 will continue to support all existing activation methods (KMS, MAK, and AD-based activation). An update will be required for existing KMS servers: + +| Product | Required update | +|----------------------------------------|---------------------------------------------------------------------------------------------| +| Windows 10 | None | +| Windows Server 2012 R2 and Windows 8.1 | [https://support.microsoft.com/kb/3058168](http://go.microsoft.com/fwlink/p/?LinkId=625087) | +| Windows Server 2012 and Windows 8 | [https://support.microsoft.com/kb/3058168](http://go.microsoft.com/fwlink/p/?LinkId=625087) | +| Windows Server 2008 R2 and Windows 7 | Available by October 2015 | + +  + +Additionally, new product keys will be needed for all types of volume license activation (KMS, MAK, and AD-based Activation); these keys are available on the Volume Licensing Service Center (VLSC) for customers with rights to the Windows 10 operating system. To find the needed keys: + +- Sign into the [Volume Licensing Service Center (VLSC)](http://go.microsoft.com/fwlink/p/?LinkId=625088) at with a Microsoft account that has appropriate rights. + +- For KMS keys, click **Licenses** and then select **Relationship Summary**. Click the appropriate active license ID, and then select **Product Keys** near the right side of the page. For KMS running on Windows Server, find the **Windows Srv 2012R2 DataCtr/Std KMS for Windows 10** product key; for KMS running on client operating systems, find the **Windows 10** product key. + +- For MAK keys, click **Downloads and Keys**, and then filter the list by using **Windows 10** as a product. Click the **Key** link next to an appropriate list entry (for example, **Windows 10 Enterprise** or **Windows 10 Enterprise LTSB**) to view the available MAK keys. (You can also find keys for KMS running on Windows 10 in this list. These keys will not work on Windows servers running KMS.) + +Note that Windows 10 Enterprise and Windows 10 Enterprise LTSB installations use different MAK keys. But you can use the same KMS server or Active Directory-based activation environment for both; the KMS keys obtained from the Volume Licensing Service Center will work with both. + +## Related topics + + +[Windows 10 servicing options](windows-10-servicing-model.md) + +[Windows 10 deployment considerations](windows-10-deployment-considerations.md) + +[Windows 10 compatibility](windows-10-compatibility.md) + +  + +  + + + + + diff --git a/windows/plan/windows-10-servicing-model.md b/windows/plan/windows-10-servicing-model.md new file mode 100644 index 0000000000..14a2df977f --- /dev/null +++ b/windows/plan/windows-10-servicing-model.md @@ -0,0 +1,259 @@ +--- +title: Windows 10 servicing options (Windows 10) +description: Windows 10 provides a new model for organizations to deploy and upgrade Windows by providing updates to features and capabilities through a continual process. +ms.assetid: 6EF0792C-B587-497D-8489-4A7F5848D92A +keywords: ["deploy", "upgrade", "update", "servicing"] +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Windows 10 servicing options + + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +**In this article** + +- [Key terminology](#key_terminology) +- [Windows 10 branch overview](#windows_10_branch_overview) +- [Current Branch versus Current Branch for Business](#current_branch_versus_current_branch_for_business) +- [Long-Term Servicing Branch](#long-term_servicing_branch) +- [Windows Insider Program](#windows_insider_program) +- [Switching between branches](#switching_between_branches) +- [Related topics](#related_topics) + +Windows 10 provides a new model for organizations to deploy and upgrade Windows by providing updates to features and capabilities through a continual process. + +Traditionally, new versions of Windows have been released every few years. The deployment of those new versions within an organization would then become a project, either by leveraging a “wipe and load” process to deploy the new operating system version to existing machines, or by migrating to the new operating system version as part of the hardware replacement cycle. Either way, organizations would invest significant time and effort to complete the required tasks. + +With Windows 10, a new model is being adopted. Instead of new features being added only in new releases that happen every few years, the goal is to provide new features two to three times per year, continually providing new capabilities while maintaining a high level of hardware and application compatibility. This new model, referred to as Windows as a service, requires organizations to rethink how they deploy and upgrade Windows. It is no longer a project that happens “every few years”; it is a continual process. + +To support this process, you need to use simpler deployment methods. By combining these simpler methods (for example, in-place upgrade) with new techniques to deploy in phases to existing devices, you can reduce the amount of effort required overall, by taking the effort that used to be performed as part of a traditional deployment project and spreading it across a broad period of time. + +## Key terminology + + +With the shift to this new Windows as a service model, it is important to understand the distinction between two key terms: + +- **Upgrade**. A new Windows 10 release that contains additional features and capabilities, released two to three times per year. + +- **Update**. Packages of security fixes, reliability fixes, and other bug fixes that are released periodically, typically once a month on Update Tuesday (sometimes referred to as Patch Tuesday). With Windows 10, these are cumulative in nature. + +In addition to these terms, some additional concepts need to be understood: + +- **Branches**. The concept of “branching” goes back many years, and represents how Windows has traditionally been written and serviced: Each release was from a particular branch of the Windows code, and updates would be made to that release for the lifecycle of that release. This concept still applies now with Windows 10, but is much more visible because of the increased frequency of upgrades. + +- **Rings**. The concept of “rings” defines a mechanism for Windows 10 deployment to targeted groups of PCs; each ring represents another group. These are used as part of the release mechanism for new Windows 10 upgrades, and should be used internally by organizations to better control the upgrade rollout process. + +## Windows 10 branch overview + + +To support different needs and use cases within your organization, you can select among different branches: + +![branches](images/branch.png) + +- **Windows Insider Program**. To see new features before they are released, to provide feedback on those new features, and to initially validate compatibility with existing applications and hardware, small numbers of PCs can leverage the Windows Insider Program branch. These would typically be dedicated lab machines used for IT testing, secondary PCs used by IT administrators, and other non-critical devices. + +- **Current Branch**. For early adopters, IT teams, and other broader piloting groups, the Current Branch (CB) can be used to further validate application compatibility and newly-released features. + +- **Current Branch for Business**. For the majority of people in an organization, the Current Branch for Business (CBB) allows for a staged deployment of new features over a longer period of time. + +- **Long-Term Servicing Branch**. For critical or specialized devices (for example, operation of factory floor machinery, point-of-sale systems, automated teller machines), the Long-Term Servicing Branch (LTSB) provides a version of Windows 10 Enterprise that receives no new features, while continuing to be supported with security and other updates for a long time. (Note that the Long-Term Servicing Branch is a separate Windows 10 Enterprise image, with many in-box apps, including Microsoft Edge, Cortana, and Windows Store, removed.) + +Most organizations will leverage all of these choices, with the mix determined by how individual PCs are used. Some examples: + +| Industry | Windows Insider Program | Current Branch | Current Branch for Business | Long-Term Servicing Branch | +|--------------------|-------------------------|----------------|-----------------------------|----------------------------| +| Retail | <1% | 10% | 60% | 30% | +| Manufacturing | <1% | 10% | 55% | 45% | +| Pharmaceuticals | <1% | 10% | 50% | 40% | +| Consulting | 10% | 50% | 35% | 5% | +| Software developer | 30% | 60% | 5% | 5% | + +  + +Because every organization is different, the exact breakdown will vary even within a specific industry; these should be considered only examples, not specific recommendations. To determine the appropriate mix for a specific organization, profile how individual PCs are used within the organization, and target them with the appropriate branch. + +- Retailers often have critical devices (for example, point-of-sale systems) in stores which results in higher percentages of PCs on the Long-Term Servicing Branch. But those used by information workers in support of the retail operations would leverage Current Branch for Business to receive new features. + +- Manufacturers typically have critical devices (for example, control systems) in factories; these are also good candidates for the Long-Term Servicing Branch. But as with retailers, information workers that support those factories are better suited to the Current Branch for Business. + +- Pharmaceutical firms often have regulatory requirements for PCs used for the development of their products, which are best satisfied by using Long-Term Servicing Branch. But not all PCs are subject to these regulatory requirements; those that are not can use the Current Branch for Business. + +- Consulting firms want their employees to have the latest functionality so they can be as productive as possible. They also want to develop expertise with new capabilities as soon as possible, hence more emphasis on Current Branch. But they also have information workers that provide services to the consultants; these workers can leverage Current Branch for Business. + +- Software developers typically work on software that will release in conjunction with a new Windows upgrade. To enable that, a significant percentage of developers may use the Windows Insider Program preview branch for initial efforts, which shifts to Current Branch as development progresses. + +Note that there are few, if any, scenarios where an entire organization would use the Long-Term Servicing Branch for all PCs – or even for a majority of them. + +For more information about the Windows as a service model, refer to [Windows 10 servicing options for updates and upgrades](../manage/introduction-to-windows-10-servicing.md). + +## Current Branch versus Current Branch for Business + + +When the development of a new Windows 10 feature upgrade is complete, it is initially offered to Current Branch computers; those computers configured for Current Branch for Business will receive the feature upgrade (with additional fixes) at a later date, generally at least four months later. An additional deferral of at least eight months is available to organizations that use tools to control the update process. During this time, monthly security updates will continue to be made available to machines not yet upgraded. + +The process to configure a PC for Current Branch for Business is simple. The **Defer upgrades** setting needs to be configured, either manually (through the Settings app), by using Group Policy, or by using mobile device management (MDM). + +![figure 1](images/fig1-deferupgrades.png) + +Figure 1. Configure the **Defer upgrades** setting + +Most organizations today leverage Windows Server Update Services (WSUS) or System Center Configuration Manager to update their PCs. With Windows 10, this does not need to change; all updates are controlled through approvals or automatic deployment rules configured in those products, so new upgrades will not be deployed until the organization chooses. The **Defer upgrades** setting can function as an additional validation check, so that Current Branch for Business machines that are targeted with a new upgrade prior to the end of the initial four-month deferral period will decline to install it; they can install the upgrade any time within the eight-month window after that initial four-month deferral period. + +For computers configured to receive updates from Windows Update directly, the **Defer upgrades** setting directly controls when the PC will be upgraded. Computers that are not configured to defer upgrades will be upgraded at the time of the initial Current Branch release; computers that are configured to defer upgrades will be upgraded four months later. + +With Windows 10 it is now possible to manage updates for PCs and tablets that have a higher degree of mobility and are not joined to a domain. For these PCs, you can leverage mobile device management (MDM) services or Windows Update for Business to provide the same type of control provided today with WSUS or Configuration Manager. + +For PCs enrolled in a mobile device management (MDM) service, Windows 10 provides new update approval mechanisms that could be leveraged to delay the installation of a new feature upgrade or any other update. Windows Update for Business will eventually provide these and other capabilities to manage upgrades and updates; more details on these capabilities will be provided when they are available later in 2015. + +With the release of each Current Branch feature update, new ISO images will be made available. You can use these images to upgrade existing machines or to create new custom images. These feature upgrades will also be published with WSUS to enable simple deployment to devices already running Windows 10. + +Unlike previous versions of Windows, the servicing lifetime of Current Branch or Current Branch for Business is finite. You must install new feature upgrades on machines running these branches in order to continue receiving monthly security updates. This requires new ways of thinking about software deployment. It is best to align your deployment schedule with the Current Branch release schedule: + +- Begin your evaluation process with the Windows Insider Program releases. + +- Perform initial pilot deployments by using the Current Branch. + +- Expand to broad deployment after the Current Branch for Business is available. + +- Complete deployments by using that release in advance of the availability of the next Current Branch. + +![figure 2](images/fig2-deploymenttimeline.png) + +Figure 2. Deployment timeline + +Some organizations may require more than 12 months to deploy Windows 10 to all of their existing PCs. To address this, it may be necessary to deploy multiple Windows 10 releases, switching to these new releases during the deployment project. Notice how the timelines can overlap, with the evaluation of one release happening during the pilot and deployment of the previous release: + +![figure 3](images/fig3-overlaprelease.png) + +Figure 3. Overlapping releases + +As a result of these overlapping timelines, organizations can choose which release to deploy. Note though that by continuing for longer with one release, that gives you less time to deploy the subsequent release (to both existing Windows 10 PCs as well as newly-migrated ones), so staying with one release for the full lifetime of that release can be detrimental overall. + +## Long-Term Servicing Branch + + +For specialized devices, Windows 10 Enterprise Long Term Servicing Branch (LTSB) ISO images will be made available. These are expected to be on a variable schedule, less often than CB and CBB releases. Once released, these will be supported with security and reliability fixes for an extended period; no new features will be added over its servicing lifetime. Note that LTSB images will not contain most in-box Universal Windows Apps (for example, Microsoft Edge, Cortana, the Windows Store, the Mail and Calendar apps) because the apps or the services that they use will be frequently updated with new functionality and therefore cannot be supported on PCs running the LTSB OS. + +These LTSB images can be used to upgrade existing machines or to create new custom images. + +Note that Windows 10 Enterprise LTSB installations fully support the Universal Windows Platform, with the ability to run line-of-business apps created using the Windows SDK, Visual Studio, and related tools capable of creating Universal Windows apps. For apps from other ISVs (including those published in the Windows Store), contact the ISV to confirm if they will provide long-term support for their specific apps. + +As mentioned previously, there are few, if any, scenarios where an organization would use the Long-Term Servicing Branch for every PC – or even for a majority of them. + +## Windows Insider Program + + +During the development of a new Windows 10 feature update, preview releases will be made available to Windows Insider Program participants. This enables those participants to try out new features, check application compatibility, and provide feedback during the development process. + +To obtain Windows Insider Program builds, the Windows Insider Program participants must opt in through the Settings app, and specify their Microsoft account. + +Occasionally (typically as features are made available to those in the Windows Insider Program “slow” ring), new ISO images will be released to enable deployment validation, testing, and image creation. + +## Switching between branches + + +During the life of a particular PC, it may be necessary or desirable to switch between the available branches. Depending on the branch you are using, the exact mechanism for doing this can be different; some will be simple, others more involved. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
For a PC that uses…Changing to…You need to:
Windows Insider ProgramCurrent BranchWait for the final Current Branch release.
Current Branch for BusinessNot directly possible, because Windows Insider Program machines are automatically upgraded to the Current Branch release at the end of the development cycle.
Long-Term Servicing BranchNot directly possible (requires wipe-and-load).
Current BranchInsiderUse the Settings app to enroll the device in the Windows Insider Program.
Current Branch for BusinessSelect the Defer upgrade setting, or move the PC to a target group or flight that will not receive the next upgrade until it is business ready. Note that this change will not have any immediate impact; it only prevents the installation of the next Current Branch release.
Long-Term Servicing BranchNot directly possible (requires wipe-and-load).
Current Branch for BusinessInsiderUse the Settings app to enroll the device in the Windows Insider Program.
Current BranchDisable the Defer upgrade setting, or move the PC to a target group or flight that will receive the latest Current Branch release.
Long-Term Servicing BranchNot directly possible (requires wipe-and-load).
Long-Term Servicing BranchInsiderUse media to upgrade to the latest Windows Insider Program build.
Current BranchUse media to upgrade to a later Current Branch build. (Note that the Current Branch build must be a later build.)
Current Branch for BusinessUse media to upgrade to a later Current Branch for Business build (Current Branch build plus fixes). Note that it must be a later build.
+ +  + +## Related topics + + +[Windows 10 deployment considerations](windows-10-deployment-considerations.md) + +[Windows 10 compatibility](windows-10-compatibility.md) + +[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) + +  + +  + + + + + diff --git a/windows/plan/windows-to-go-feature-overview-scenario.md b/windows/plan/windows-to-go-feature-overview-scenario.md new file mode 100644 index 0000000000..4c02107052 --- /dev/null +++ b/windows/plan/windows-to-go-feature-overview-scenario.md @@ -0,0 +1,279 @@ +--- +title: Windows To Go-- feature overview (Windows 10) +description: Windows To Go is a feature in Windows 10 Enterprise and Windows 10 Education that enables the creation of a Windows To Go workspace that can be booted from a USB-connected external drive on PCs. +ms.assetid: 9df82b03-acba-442c-801d-56db241f8d42 +keywords: ["workspace, mobile, installation, image, USB, device, image"] +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Windows To Go: feature overview + + +**Applies to** + +- Windows 10 + +Windows To Go is a feature in Windows 10 Enterprise and Windows 10 Education that enables the creation of a Windows To Go workspace that can be booted from a USB-connected external drive on PCs. + +PCs that meet the Windows 7 or later [certification requirements](http://go.microsoft.com/fwlink/p/?LinkId=618711) can run Windows 10 in a Windows To Go workspace, regardless of the operating system running on the PC. Windows To Go workspaces can use the same image enterprises use for their desktops and laptops and can be managed the same way. Windows To Go is not intended to replace desktops, laptops or supplant other mobility offerings. Rather, it provides support for efficient use of resources for alternative workplace scenarios. There are some additional considerations that you should keep in mind before you start to use Windows To Go: + +- [Differences between Windows To Go and a typical installation of Windows](#BKMK_wtgdif) + +- [Roaming with Windows To Go](#BKMK_wtgroam) + +- [Prepare for Windows To Go](#wtg_prep_intro) + +- [Hardware considerations for Windows To Go](#wtg_hardware) + +**Note**   +Windows To Go is not supported on Windows RT. + +  + +## Differences between Windows To Go and a typical installation of Windows + + +Windows To Go workspace operates just like any other installation of Windows with a few exceptions. These exceptions are: + +- **Internal disks are offline.** To ensure data isn’t accidentally disclosed, internal hard disks on the host computer are offline by default when booted into a Windows To Go workspace. Similarly if a Windows To Go drive is inserted into a running system, the Windows To Go drive will not be listed in Windows Explorer. + +- **Trusted Platform Module (TPM) is not used.** When using BitLocker Drive Encryption a pre-operating system boot password will be used for security rather than the TPM since the TPM is tied to a specific computer and Windows To Go drives will move between computers. + +- **Hibernate is disabled by default.** To ensure that the Windows To Go workspace is able to move between computers easily, hibernation is disabled by default. Hibernation can be re-enabled by using Group Policy settings. + +- **Windows Recovery Environment is not available.** In the rare case that you need to recover your Windows To Go drive, you should re-image it with a fresh image of Windows. + +- **Refreshing or resetting a Windows To Go workspace is not supported.** Resetting to the manufacturer’s standard for the computer doesn’t apply when running a Windows To Go workspace, so the feature was disabled. + +- **Upgrading a Windows To Go workspace is not supported.** Older Windows 8 or Windows 8.1 Windows To Go workspaces cannot be upgraded to Windows 10 workspaces, nor can Windows 10 Windows To Go workspaces be upgraded to future versions of Windows 10. For new versions, the workspace needs to be re-imaged with a fresh image of Windows. + +## Roaming with Windows To Go + + +Windows To Go drives can be booted on multiple computers. When a Windows To Go workspace is first booted on a host computer it will detect all hardware on the computer and install any needed drivers. When the Windows To Go workspace is subsequently booted on that host computer it will be able to identify the host computer and load the correct set of drivers automatically. + +The applications that you want to use from the Windows To Go workspace should be tested to make sure they also support roaming. Some applications bind to the computer hardware which will cause difficulties if the workspace is being used with multiple host computers. + +## Prepare for Windows To Go + + +Enterprises install Windows on a large group of computers either by using configuration management software (such as System Center Configuration Manager), or by using standard Windows deployment tools such as DiskPart and the Deployment Image Servicing and Management (DISM) tool. + +These same tools can be used to provision Windows To Go drive, just as you would if you were planning for provisioning a new class of mobile PCs. You can use the [Windows Assessment and Deployment Kit](http://go.microsoft.com/fwlink/p/?LinkId=526803) to review deployment tools available. + +**Important**   +Make sure you use the versions of the deployment tools provided for the version of Windows you are deploying. There have been many enhancements made to support Windows To Go. Using versions of the deployment tools released for earlier versions of Windows to provision a Windows To Go drive is not supported. + +  + +As you decide what to include in your Windows To Go image, be sure to consider the following questions: + +Are there any drivers that you need to inject into the image? + +How will data be stored and synchronized to appropriate locations from the USB device? + +Are there any applications that are incompatible with Windows To Go roaming that should not be included in the image? + +What should be the architecture of the image - 32bit/64bit? + +What remote connectivity solution should be supported in the image if Windows To Go is used outside the corporate network? + +For more information about designing and planning your Windows To Go deployment, see [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md). + +## Hardware considerations for Windows To Go + + +**For USB drives** + +The devices listed in this section have been specially optimized and certified for Windows To Go and meet the necessary requirements for booting and running a full version of Windows 10 from a USB drive. The optimizations for Windows To Go include the following: + +- Windows To Go certified USB drives are built for high random read/write speeds and support the thousands of random access I/O operations per second required for running normal Windows workloads smoothly. + +- Windows To Go certified USB drives have been tuned to ensure they boot and run on hardware certified for use with Windows 7 and later. + +- Windows To Go certified USB drives are built to last. Certified USB drives are backed with manufacturer warranties and should continue operating under normal usage. Refer to the manufacturer websites for warranty details. + +As of the date of publication, the following are the USB drives currently certified for use as Windows To Go drives: + +**Warning**   +Using a USB drive that has not been certified is not supported + +  + +- IronKey Workspace W700 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w700.html](http://go.microsoft.com/fwlink/p/?LinkId=618714)) + +- IronKey Workspace W500 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w500.html](http://go.microsoft.com/fwlink/p/?LinkId=618717)) + +- IronKey Workspace W300 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w300.html](http://go.microsoft.com/fwlink/p/?LinkId=618718)) + +- Kingston DataTraveler Workspace for Windows To Go ([http://www.kingston.com/wtg/](http://go.microsoft.com/fwlink/p/?LinkId=618719)) + +- Spyrus Portable Workplace ([http://www.spyruswtg.com/](http://go.microsoft.com/fwlink/p/?LinkId=618720)) + + We recommend that you run the Spyrus Deployment Suite for Windows To Go to provision the Spyrus Portable Workplace. + +- Spyrus Secure Portable Workplace ([http://www.spyruswtg.com/](http://go.microsoft.com/fwlink/p/?LinkId=618720)) + + **Important**   + You must use the Spyrus Deployment Suite for Windows To Go to provision the Spyrus Secure Portable Workplace. For more information about the Spyrus Deployment Suite for Windows To Go please refer to [http://www.spyruswtg.com/](http://go.microsoft.com/fwlink/p/?LinkId=618720). + +   + +- Spyrus Worksafe ([http://www.spyruswtg.com/](http://go.microsoft.com/fwlink/p/?LinkId=618720)) + + **Tip**   + This device contains an embedded smart card. + +   + +- Super Talent Express RC4 for Windows To Go + + -and- + + Super Talent Express RC8 for Windows To Go + + ([http://www.supertalent.com/wtg/](http://go.microsoft.com/fwlink/p/?LinkId=618721)) + +- Western Digital My Passport Enterprise ([http://www.wd.com/wtg](http://go.microsoft.com/fwlink/p/?LinkId=618722)) + + We recommend that you run the WD Compass utility to prepare the Western Digital My Passport Enterprise drive for provisioning with Windows To Go.  For more information about the WD Compass utility please refer to [http://www.wd.com/wtg](http://go.microsoft.com/fwlink/p/?LinkId=618722) + +**For host computers** + +When assessing the use of a PC as a host for a Windows To Go workspace you should consider the following criteria: + +- Hardware that has been certified for use with Windows 7or later operating systems will work well with Windows To Go. + +- Running a Windows To Go workspace from a computer that is running Windows RT is not a supported scenario. + +- Running a Windows To Go workspace on a Mac computer is not a supported scenario. + +The following table details the characteristics that the host computer must have to be used with Windows To Go: + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ItemRequirement

Boot process

Capable of USB boot

Firmware

USB boot enabled. (PCs certified for use with Windows 7 or later can be configured to boot directly from USB, check with the hardware manufacturer if you are unsure of the ability of your PC to boot from USB)

Processor architecture

Must support the image on the Windows To Go drive

External USB Hubs

Not supported; connect the Windows To Go drive directly to the host machine

Processor

1 Ghz or faster

RAM

2 GB or greater

Graphics

DirectX 9 graphics device with WDDM 1.2 or greater driver

USB port

USB 2.0 port or greater

+ +  + +**Checking for architectural compatibility between the host PC and the Windows To Go drive** + +In addition to the USB boot support in the BIOS, the Windows 10 image on your Windows To Go drive must be compatible with the processor architecture and the firmware of the host PC as shown in the table below. + + +++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Host PC Firmware TypeHost PC Processor ArchitectureCompatible Windows To Go Image Architecture

Legacy BIOS

32-bit

32-bit only

Legacy BIOS

64-bit

32-bit and 64-bit

UEFI BIOS

32-bit

32-bit only

UEFI BIOS

64-bit

64-bit only

+ +  + +## Additional resources + + +- [Windows 10 forums](http://go.microsoft.com/fwlink/p/?LinkId=618949) + +- [Windows To Go Step by Step Wiki](http://go.microsoft.com/fwlink/p/?LinkId=618950) + +- [Tips for configuring your BIOS settings to work with Windows To Go](http://go.microsoft.com/fwlink/p/?LinkId=618951) + +## Related topics + + +- [Deploy Windows To Go in your organization](http://go.microsoft.com/fwlink/p/?LinkId=619975) + +- [Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) + +- [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) + +- [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +- [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) + +- [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md) + +  + +  + + + + + diff --git a/windows/plan/windows-to-go-frequently-asked-questions.md b/windows/plan/windows-to-go-frequently-asked-questions.md new file mode 100644 index 0000000000..f4066d339f --- /dev/null +++ b/windows/plan/windows-to-go-frequently-asked-questions.md @@ -0,0 +1,454 @@ +--- +title: Windows To Go-- frequently asked questions (Windows 10) +description: Windows To Go-- frequently asked questions +ms.assetid: bfdfb824-4a19-4401-b369-22c5e6ca9d6e +keywords: ["FAQ, mobile, device, USB"] +ms.prod: W10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: TrudyHa +--- + +# Windows To Go: frequently asked questions + + +**Applies to** + +- Windows 10 + +The following list identifies some commonly asked questions about Windows To Go. + +- [What is Windows To Go?](#wtg_faq_whatis) + +- [Does Windows To Go rely on virtualization?](#wtg_faq_virt) + +- [Who should use Windows To Go?](#wtg_faq_who) + +- [How can Windows To Go be deployed in an organization?](#wtg_faq_deploy) + +- [Is Windows To Go supported on both USB 2.0 and USB 3.0 drives?](#wtg_faq_usbvs) + +- [Is Windows To Go supported on USB 2.0 and USB 3.0 ports?](#wtg_faq_usbports) + +- [How do I identify a USB 3.0 port?](#wtg_faq_usb3port) + +- [Does Windows To Go run faster on a USB 3.0 port?](#wtg_faq_usb3speed) + +- [Can the user self-provision Windows To Go?](#wtg_faq_selfpro) + +- [How can Windows To Go be managed in an organization?](#wtg_faq_mng) + +- [How do I make my computer boot from USB?](#wtf_faq_startup) + +- [Why isn’t my computer booting from USB?](#wtg_faq_noboot) + +- [What happens if I remove my Windows To Go drive while it is running?](#wtg_faq_surprise) + +- [Can I use BitLocker to protect my Windows To Go drive?](#wtg_faq_bitlocker) + +- [Why can’t I enable BitLocker from Windows To Go Creator?](#wtg_faq_blfail) + +- [What power states does Windows To Go support?](#wtg_faq_power) + +- [Why is hibernation disabled in Windows To Go?](#wtg_faq_hibernate) + +- [Does Windows To Go support crash dump analysis?](#wtg_faq_crashdump) + +- [Do “Windows To Go Startup Options” work with dual boot computers?](#wtg_faq_dualboot) + +- [I plugged my Windows To Go drive into a running computer and I can’t see the partitions on the drive. Why not?](#wtg_faq_diskpart) + +- [I’m booted into Windows To Go, but I can’t browse to the internal hard drive of the host computer. Why not?](#wtg_faq_san4) + +- [Why does my Windows To Go drive have an MBR disk format with a FAT32 system partition?](#wtg_faq_fatmbr) + +- [Is Windows To Go secure if I use it on an untrusted machine?](#wtg_faq_malhost) + +- [Does Windows To Go work with ARM processors?](#wtg_faq_arm) + +- [Can I synchronize data from Windows To Go with my other computer?](#wtg_faq_datasync) + +- [What size USB Flash Drive do I need to make a Windows To Go drive?](#wtg_faq_usbsz) + +- [Do I need to activate Windows To Go every time I roam?](#wtg_faq_roamact) + +- [Can I use all Windows features on Windows To Go?](#wtg_faq_features) + +- [Can I use all my applications on Windows To Go?](#wtg_faq_approam) + +- [Does Windows To Go work slower than standard Windows?](#wtg_faq_slow) + +- [If I lose my Windows To Go drive, will my data be safe?](#wtg_faq_safeloss) + +- [Can I boot Windows To Go on a Mac?](#wtg_faq_mac) + +- [Are there any APIs that allow applications to identify a Windows To Go workspace?](#wtg_faq_api) + +- [How is Windows To Go licensed?](#wtg_faq_lic) + +- [Does Windows Recovery Environment work with Windows To Go? What’s the guidance for recovering a Windows To Go drive?](#wtg_faq_recovery) + +- [Why won’t Windows To Go work on a computer running Windows XP or Windows Vista?](#wtg_faq_oldos) + +- [Why does the operating system on the host computer matter?](#wtg_faq_oldos2) + +- [My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go?](#wtg_faq_blreckey) + +- [I decided to stop using a drive for Windows To Go and reformatted it – why doesn’t it have a drive letter assigned and how can I fix it?](#wtg_faq_reformat) + +- [Why do I keep on getting the message “Installing devices…” when I boot Windows To Go?](#BKMK_roamconflict) + +- [How do I upgrade the operating system on my Windows To Go drive?](#BKMK_upgradewtg) + +## What is Windows To Go? + + +Windows To Go is a feature for users of Windows 10 Enterprise and Windows 10 Education that enables users to boot a full version of Windows from external USB drives on host PCs. + +## Does Windows To Go rely on virtualization? + + +No. Windows To Go is a native instance of Windows 10 that runs from a USB device. It is just like a laptop hard drive with Windows 8 that has been put into a USB enclosure. + +## Who should use Windows To Go? + + +Windows To Go was designed for enterprise usage and targets scenarios such as continuance of operations, contractors, managed free seating, traveling workers, and work from home. + +## How can Windows To Go be deployed in an organization? + + +Windows To Go can be deployed using standard Windows deployment tools like Diskpart and DISM. The prerequisites for deploying Windows To Go are: + +- A Windows To Go recommended USB drive to provision; See the list of currently available USB drives at [Hardware considerations for Windows To Go](windows-to-go-feature-overview-scenario.md#wtg_hardware) + +- A Windows 10 Enterprise or Windows 10 Education image + +- A Windows 10 Enterprise or Windows 10 Education host PC that can be used to provision new USB keys + +You can use a Windows PowerShell script to target several drives and scale your deployment for a large number of Windows To Go drives. You can also use a USB duplicator to duplicate a Windows To Go drive after it has been provisioned if you are creating a large number of drives. See the [Windows To Go Step by Step](http://go.microsoft.com/fwlink/p/?LinkId=618950) article on the TechNet wiki for a walkthrough of the drive creation process. + +## Is Windows To Go supported on both USB 2.0 and USB 3.0 drives? + + +No. Windows To Go is supported on USB 3.0 drives that are certified for Windows To Go. + +## Is Windows To Go supported on USB 2.0 and USB 3.0 ports? + + +Yes. Windows To Go is fully supported on either USB 2.0 ports or USB 3.0 ports on PCs certified for Windows 7 or later. + +## How do I identify a USB 3.0 port? + + +USB 3.0 ports are usually marked blue or carry a SS marking on the side. + +## Does Windows To Go run faster on a USB 3.0 port? + + +Yes. Because USB 3.0 offers significantly faster speeds than USB 2.0, a Windows To Go drive running on a USB 3.0 port will operate considerably faster. This speed increase applies to both drive provisioning and when the drive is being used as a workspace. + +## Can the user self-provision Windows To Go? + + +Yes, if the user has administrator permissions they can self-provision a Windows To Go drive using the Windows To Go Creator wizard which is included in Windows 10 Enterprise and Windows 10 Education. Additionally, System Center 2012 Configuration Manager SP1 and later releases includes support for user self-provisioning of Windows To Go drives. Configuration Manager can be downloaded for evaluation from the [Microsoft TechNet Evaluation Center](http://go.microsoft.com/fwlink/p/?LinkID=618746). + +## How can Windows To Go be managed in an organization? + + +Windows To Go can be deployed and managed like a traditional desktop PC using standard Windows enterprise software distribution tools like System Center Configuration Manager. Computer and user settings for Windows To Go workspaces can be managed using Group Policy setting also in the same manner that you manage Group Policy settings for other PCs in your organization. Windows To Go workspaces can be configured to connect to the organizational resources remotely using DirectAccess or a virtual private network connection so that they can connect securely to your network. + +## How do I make my computer boot from USB? + + +For host computers running Windows 10 + +- Using Cortana, search for **Windows To Go startup options**, and then press Enter. +- In the **Windows To Go Startup Options** dialog box, select **Yes**, and then click **Save Changes** to configure the computer to boot from USB. + +For host computers running Windows 8 or Windows 8.1: + +Press **Windows logo key+W** and then search for **Windows To Go startup options** and then press Enter. + +In the **Windows To Go Startup Options** dialog box select **Yes** and then click **Save Changes** to configure the computer to boot from USB. + +**Note**   +Your IT department can use Group Policy to configure Windows To Go Startup Options in your organization. + +  + +If the host computer is running an earlier version of the Windows operating system need to configure the computer to boot from USB manually. + +To do this, early during boot time (usually when you see the manufacturer’s logo), enter your firmware/BIOS setup. (This method to enter firmware/BIOS setup differs with different computer manufacturers, but is usually entered by pressing one of the function keys, such as F12, F2, F1, Esc, and so forth. You should check the manufacturer’s site to be sure if you do not know which key to use to enter firmware setup.) + +After you have entered firmware setup, make sure that boot from USB is enabled. Then change the boot order to boot from USB drives first. + +Alternatively, if your computer supports it, you can try to use the one-time boot menu (often F12), to select USB boot on a per-boot basis. + +For more detailed instructions, see the wiki article, [Tips for configuring your BIOS settings to work with Windows To Go](http://go.microsoft.com/fwlink/p/?LinkID=618951). + +**Warning**   +Configuring a computer to boot from USB will cause your computer to attempt to boot from any bootable USB device connected to your computer. This potentially includes malicious devices. Users should be informed of this risk and instructed to not have any bootable USB storage devices plugged in to their computers except for their Windows To Go drive. + +  + +## Why isn’t my computer booting from USB? + + +Computers certified for Windows 7 and later are required to have support for USB boot. Check to see if any of the following items apply to your situation: + +1. Ensure that your computer has the latest BIOS installed and the BIOS is configured to boot from a USB device. + +2. Ensure that the Windows To Go drive is connected directly to a USB port on the computer. Many computers don’t support booting from a device connected to a USB 3 PCI add-on card or external USB hubs. + +3. If the computer is not booting from a USB 3.0 port, try to boot from a USB 2.0 port. + +If none of these items enable the computer to boot from USB, contact the hardware manufacturer for additional support. + +## What happens if I remove my Windows To Go drive while it is running? + + +If the Windows To Go drive is removed, the computer will freeze and the user will have 60 seconds to reinsert the Windows To Go drive. If the Windows To Go drive is reinserted into the same port it was removed from, Windows will resume at the point where the drive was removed. If the USB drive is not reinserted, or is reinserted into a different port, the host computer will turn off after 60 seconds. + +**Warning**   +You should never remove your Windows To Go drive when your workspace is running. The computer freeze is a safety measure to help mitigate the risk of accidental removal. Removing the Windows To Go drive without shutting down the Windows To Go workspace could result in corruption of the Windows To Go drive. + +  + +## Can I use BitLocker to protect my Windows To Go drive? + + +Yes. In Windows 8 and later, BitLocker has added support for using a password to protect operating system drives. This means that you can use a password to secure your Windows To Go workspace and you will be prompted to enter this password every time you use the Windows To Go workspace. + +## Why can’t I enable BitLocker from Windows To Go Creator? + + +Several different Group Policies control the use of BitLocker on your organizations computers. These policies are located in the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption** folder of the local Group Policy editor. The folder contains three sub-folders for fixed, operating system and removable data drive types. + +When you are using Windows To Go Creator, the Windows To Go drive is considered a removable data drive by BitLocker. Review the following setting to see if these settings apply in your situation: + +1. **Control use of BitLocker on removable drives** + + If this setting is disabled BitLocker cannot be used with removable drives, so the Windows To Go Creator wizard will fail if it attempts to enable BitLocker on the Windows To Go drive. + +2. **Configure use of smart cards on removable data drives** + + If this setting is enabled and the option **Require use of smart cards on removable data drives** is also selected the creator wizard might fail if you have not already signed on using your smart card credentials before starting the Windows To Go Creator wizard. + +3. **Configure use of passwords for removable data drives** + + If this setting is enabled and the **Require password complexity option** is selected the computer must be able to connect to the domain controller to verify that the password specified meets the password complexity requirements. If the connection is not available, the Windows To Go Creator wizard will fail to enable BitLocker. + +Additionally, the Windows To Go Creator will disable the BitLocker option if the drive does not have any volumes. In this situation, you should initialize the drive and create a volume using the Disk Management console before provisioning the drive with Windows To Go. + +## What power states does Windows To Go support? + + +Windows To Go supports all power states except the hibernate class of power states, which include hybrid boot, hybrid sleep, and hibernate. This default behavior can be modified by using Group Policy settings to enable hibernation of the Windows To Go workspace. + +## Why is hibernation disabled in Windows To Go? + + +When a Windows To Go workspace is hibernated, it will only successfully resume on the exact same hardware. Therefore, if a Windows To Go workspace is hibernated on one computer and roamed to another, the hibernation state (and therefore user state) will be lost. To prevent this from happening, the default settings for a Windows To Go workspace disable hibernation. If you are confident that you will only attempt to resume on the same computer, you can enable hibernation using the Windows To Go Group Policy setting, **Allow hibernate (S4) when started from a Windows To Go workspace** that is located at **\\\\Computer Configuration\\Administrative Templates\\Windows Components\\Portable Operating System\\** in the Local Group Policy Editor (gpedit.msc). + +## Does Windows To Go support crash dump analysis? + + +Yes. Windows 8 and later support crash dump stack analysis for both USB 2.0 and 3.0. + +## Do “Windows To Go Startup Options” work with dual boot computers? + + +Yes, if both operating systems are running the Windows 8 operating system. Enabling “Windows To Go Startup Options” should cause the computer to boot from the Windows To Go workspace when the drive is plugged in before the computer is turned on. + +If you have configured a dual boot computer with a Windows operating system and another operating system it might work occasionally and fail occasionally. Using this configuration is unsupported. + +## I plugged my Windows To Go drive into a running computer and I can’t see the partitions on the drive. Why not? + + +Windows To Go Creator and the recommended deployment steps for Windows To Go set the NO\_DEFAULT\_DRIVE\_LETTER flag on the Windows To Go drive. This flag prevents Windows from automatically assigning drive letters to the partitions on the Windows To Go drive. That’s why you can’t see the partitions on the drive when you plug your Windows To Go drive into a running computer. This helps prevent accidental data leakage between the Windows To Go drive and the host computer. If you really need to access the files on the Windows To Go drive from a running computer, you can use diskmgmt.msc or diskpart to assign a drive letter. + +**Warning**   +It is strongly recommended that you do not plug your Windows To Go drive into a running computer. If the computer is compromised, your Windows To Go workspace can also be compromised. + +  + +## I’m booted into Windows To Go, but I can’t browse to the internal hard drive of the host computer. Why not? + + +Windows To Go Creator and the recommended deployment steps for Windows To Go set SAN Policy 4 on Windows To Go drive. This policy prevents Windows from automatically mounting internal disk drives. That’s why you can’t see the internal hard drives of the host computer when you are booted into Windows To Go. This is done to prevent accidental data leakage between Windows To Go and the host system. This policy also prevents potential corruption on the host drives or data loss if the host operating system is in a hibernation state. If you really need to access the files on the internal hard drive, you can use diskmgmt.msc to mount the internal drive. + +**Warning**   +It is strongly recommended that you do not mount internal hard drives when booted into the Windows To Go workspace. If the internal drive contains a hibernated Windows 8 or later operating system, mounting the drive will lead to loss of hibernation state and therefor user state or any unsaved user data when the host operating system is booted. If the internal drive contains a hibernated Windows 7 or earlier operating system, mounting the drive will lead to corruption when the host operating system is booted. + +  + +## Why does my Windows To Go drive have an MBR disk format with a FAT32 system partition? + + +This is done to allow Windows To Go to boot from UEFI and legacy systems. + +## Is Windows To Go secure if I use it on an untrusted computer? + + +While you are more secure than if you use a completely untrusted operating system, you are still vulnerable to attacks from the firmware or anything that runs before Windows To Go starts. If you plug your Windows To Go drive into a running untrusted computer, your Windows To Go drive can be compromised because any malicious software that might be active on the computer can access the drive. + +## Does Windows To Go work with ARM processors? + + +No. Windows RT is a specialized version of Windows designed for ARM processors. Windows To Go is currently only supported on PCs with x86 or x64-based processors. + +## Can I synchronize data from Windows To Go with my other computer? + + +To get your data across all your computers, we recommend using folder redirection and client side caching to store copies of your data on a server while giving you offline access to the files you need. + +## What size USB flash drive do I need to make a Windows To Go drive? + + +The size constraints are the same as full Windows. To ensure that you have enough space for Windows, your data, and your applications, we recommend USB drives that are a minimum of 20 GB in size. + +## Do I need to activate Windows To Go every time I roam? + + +No, Windows To Go requires volume activation; either using the [Key Management Service](http://go.microsoft.com/fwlink/p/?LinkId=619051) (KMS) server in your organization or using [Active Directory](http://go.microsoft.com/fwlink/p/?LinkId=619053) based volume activation. The Windows To Go workspace will not need to be reactivated every time you roam. KMS activates Windows on a local network, eliminating the need for individual computers to connect to Microsoft. To remain activated, KMS client computers must renew their activation by connecting to the KMS host on periodic basis. This typically occurs as soon as the user has access to the corporate network (either through a direct connection on-premises or a through remote connection using DirectAccess or a virtual private network connection), once activated the machine will not need to be activated again until the activation validity interval has passed. In a KMS configuration the activation validity interval is 180 days. + +## Can I use all Windows features on Windows To Go? + + +Yes, with some minor exceptions, you can use all Windows features with your Windows To Go workspace. The only currently unsupported features are using the Windows Recovery Environment and PC Reset & Refresh. + +## Can I use all my applications on Windows To Go? + + +Yes. Because your Windows To Go workspace is a full Windows 10 environment, all applications that work with Windows 10 should work in your Windows To Go workspace. However, any applications that use hardware binding (usually for licensing and/or digital rights management reasons) may not run when you roam your Windows To Go drive between different host computers, and you may have to use those applications on the same host computer every time. + +## Does Windows To Go work slower than standard Windows? + + +If you are using a USB 3.0 port and a Windows To Go certified device, there should be no perceivable difference between standard Windows and Windows To Go. However, if you are booting from a USB 2.0 port, you may notice some slowdown since USB 2.0 transfer speeds are slower than SATA speeds. + +## If I lose my Windows To Go drive, will my data be safe? + + +Yes! If you enable BitLocker on your Windows To Go drive, all your data will be encrypted and protected and a malicious user will not be able to access your data without your password. If you don’t enable BitLocker, your data will be vulnerable if you lose your Windows To Go drive. + +## Can I boot Windows To Go on a Mac? + + +We are committed to give customers a consistent and quality Windows 10 experience with Windows To Go. Windows To Go supports host devices certified for use with Windows 7 or later. Because Mac computers are not certified for use with Windows 7 or later, using Windows To Go is not supported on a Mac. + +## Are there any APIs that allow applications to identify a Windows To Go workspace? + + +Yes. You can use a combination of identifiers to determine if the currently running operating system is a Windows To Go workspace. First, check if the **PortableOperatingSystem** property is true. When that value is true it means that the operating system was booted from an external USB device. + +Next, check if the **OperatingSystemSKU** property is equal to **4** (for Windows 10 Enterprise) or **121** (for Windows 10 Education). The combination of those two properties represents a Windows To Go workspace environment. + +For more information, see the MSDN article on the [Win32\_OperatingSystem class](http://go.microsoft.com/fwlink/p/?LinkId=619059). + +## How is Windows To Go licensed? + + +Windows To Go allows organization to support the use of privately owned PCs at the home or office with more secure access to their organizational resources. With Windows To Go use rights under [Software Assurance](http://go.microsoft.com/fwlink/p/?LinkId=619062), an employee will be able to use Windows To Go on any company PC licensed with Software Assurance as well as from their home PC. + +## Does Windows Recovery Environment work with Windows To Go? What’s the guidance for recovering a Windows To Go drive? + + +No, use of Windows Recovery Environment is not supported on Windows To Go. It is recommended that you implement user state virtualization technologies like Folder Redirection to centralize and back up user data in the data center. If any corruption occurs on a Windows To Go drive, you should re-provision the workspace. + +## Why won’t Windows To Go work on a computer running Windows XP or Windows Vista? + + +Actually it might. If you have purchased a computer certified for Windows 7 or later and then installed an older operating system, Windows To Go will boot and run as expected as long as you have configured the firmware to boot from USB. However, if the computer was certified for Windows XP or Windows Vista, it might not meet the hardware requirements for Windows To Go to run. Typically computers certified for Windows Vista and earlier operating systems have less memory, less processing power, reduced video rendering, and slower USB ports. + +## Why does the operating system on the host computer matter? + + +It doesn’t other than to help visually identify if the PC has compatible hardware. For a PC to be certified for Windows 7 or later it had to support booting from USB. If a computer cannot boot from USB there is no way that it can be used with Windows To Go. The Windows To Go workspace is a full Windows 10 environment, so all of the hardware requirements of Windows 10 with respect to processing speed, memory usage, and graphics rendering need to be supported to be assured that it will work as expected. + +## My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go? + + +The default BitLocker protection profile in Windows 7 monitors the host computer for changes to the boot order as part of protecting the computer from tampering. When you change the boot order of the host computer to enable it to boot from the Windows To Go drive, the BitLocker system measurements will reflect that change and boot into recovery mode so that the computer can be inspected if necessary. + +You can reset the BitLocker system measurements to incorporate the new boot order using the following steps: + +1. Log on to the host computer using an account with administrator privileges. + +2. Click **Start**, click **Control Panel**, click **System and Security**, and then click **BitLocker Drive Encryption**. + +3. Click **Suspend Protection** for the operating system drive. + + A message is displayed, informing you that your data will not be protected while BitLocker is suspended and asking if you want to suspend BitLocker Drive Encryption. Click **Yes** to continue and suspend BitLocker on the drive. + +4. Restart the computer and enter the firmware settings to reset the boot order to boot from USB first. For more information on changing the boot order in the BIOS, see [Tips for configuring your BIOS settings to work with Windows To Go](http://go.microsoft.com/fwlink/p/?LinkId=618951) on the TechNet wiki. + +5. Restart the computer again and then log on to the host computer using an account with administrator privileges. (Neither your Windows To Go drive nor any other USB drive should be inserted.) + +6. Click **Start**, click **Control Panel**, click **System and Security**, and then click **BitLocker Drive Encryption**. + +7. Click **Resume Protection** to re-enable BitLocker protection. + +The host computer will now be able to be booted from a USB drive without triggering recovery mode. + +**Note**   +The default BitLocker protection profile in Windows 8 or later does not monitor the boot order. + +  + +## I decided to stop using a drive for Windows To Go and reformatted it – why doesn’t it have a drive letter assigned and how can I fix it? + + +Reformatting the drive erases the data on the drive, but doesn’t reconfigure the volume attributes. When a drive is provisioned for use as a Windows To Go drive the NODEFAULTDRIVELETTER attribute is set on the volume. To remove this attribute, use the following steps: + +1. Open a command prompt with full administrator permissions. + + **Note**   + If your user account is a member of the Administrators group, but is not the Administrator account itself, then, by default, the programs that you run only have standard user permissions unless you explicitly choose to elevate them. + +   + +2. Start the [diskpart](http://go.microsoft.com/fwlink/p/?LinkId=619070) command interpreter, by typing `diskpart` at the command prompt. + +3. Use the `select disk` command to identify the drive. If you do not know the drive number, use the `list` command to display the list of disks available. + +4. After selecting the disk, run the `clean` command to remove all data, formatting, and initialization information from the drive. + +## Why do I keep on getting the message “Installing devices…” when I boot Windows To Go? + + +One of the challenges involved in moving the Windows To Go drive between PCs while seamlessly booting Windows with access to all of their applications and data is that for Windows to be fully functional, specific drivers need to be installed for the hardware in each machine that runs Windows. Windows 8 or later has a process called respecialize which will identify new drivers that need to be loaded for the new PC and disable drivers which are not present on the new configuration. In general this feature is reliable and efficient when roaming between PCs of widely varying hardware configurations. + +In certain cases, third party drivers for different hardware models or versions can reuse device ID’s, driver file names, registry keys (or any other operating system constructs which do not support side-by-side storage) for similar hardware. For example, Touchpad drivers on different laptops often reuse the same device ID’s, and video cards from the same manufacturer may often reuse service names. Windows handles these situations by marking the non-present device node with a flag that indicates the existing driver needs to be reinstalled before continuing to install the new driver. + +This process will occur on any boot that a new driver is found and a driver conflict is detected. In some cases that will result in a respecialize progress message “Installing devices…” displaying every time that a Windows to Go drive is roamed between two PCs which require conflicting drivers. + +## How do I upgrade the operating system on my Windows To Go drive? + + +There is no support in Windows for upgrading a Windows To Go drive. Deployed Windows To Go drives with older versions of Windows will need to be re-imaged with a new version of Windows in order to transition to the new operating system version. + +## Additional resources + + +- [Windows 10 forums](http://go.microsoft.com/fwlink/p/?LinkId=618949) + +- [Windows To Go Step by Step Wiki](http://go.microsoft.com/fwlink/p/?LinkId=618950) + +- [Windows To Go: feature overview](windows-to-go-feature-overview-scenario.md) + +- [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) + +- [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) + +- [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) + +  + +  + + + + + diff --git a/windows/plan/windows-update-for-business.md b/windows/plan/windows-update-for-business.md new file mode 100644 index 0000000000..b1b949c1be --- /dev/null +++ b/windows/plan/windows-update-for-business.md @@ -0,0 +1,118 @@ +--- +title: Windows Update for Business (Windows 10) +description: Get an overview of how you can implement and deploy a Windows Update for Business solution and how to maintain enrolled systems. +ms.assetid: DF61F8C9-A8A6-4E83-973C-8ABE090DB8C6 +keywords: ["update", "upgrade", "deployment", "WSUS"] +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +author: TrudyHa +--- + +# Windows Update for Business + + +**Applies to** + +- Windows 10 + +**In this article** + +- [Introduction](#introduction) +- [Deploy Windows Update for Business in your organization](#deploy_windows_update_for_business_in_your_organization) +- [Eligible devices](#eligible_devices) +- [OS upgrades and updates](#os_upgrades_and_updates) +- [Related topics](#related_topics) + +Get an overview of how you can implement and deploy a Windows Update for Business solution and how to maintain enrolled systems. + +## Introduction + + +Windows Update for Business enables information technology administrators to keep the Windows 10-based devices in their organization always up to date with the latest security defenses and Windows features by directly connecting these systems to Microsoft’s Windows Update service. By using [Group Policy Objects](http://go.microsoft.com/fwlink/p/?LinkId=699279), Windows Update for Business is an easily established and implemented system which enables organizations and administrators to exercise control on how their Windows 10-based devices are updated, by allowing: + +- **Deployment and validation groups**; where administrators can specify which devices go first in an update wave, and which devices will come later (to ensure any quality bars are met). + +- **Peer-to-peer delivery**, which administrators can enable to make delivery of updates to branch offices and remote sites with limited bandwidth very efficient. + +- **Use with existing tools** such as System Center Configuration Manager and the [Enterprise Mobility Suite](http://go.microsoft.com/fwlink/p/?LinkId=699281). + +Together, these Windows Update for Business features help reduce device management costs, provide controls over update deployment, offer quicker access to security updates, as well as provide access to the latest innovations from Microsoft on an ongoing basis. Windows Update for Business is a free service for all Windows 10 Pro, Enterprise, and Education editions, and can be used independent of, or in conjunction with, existing device management solutions such as [Windows Server Update Services (WSUS)](http://go.microsoft.com/fwlink/p/?LinkId=734043) and [System Center Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=734044). + +## Deploy Windows Update for Business in your organization + + +For Windows 10, Version 1511, Windows Update for Business is enabled using a set of client-side configurations, allowing you to manage how and when Windows-based devices receive updates and upgrades. These capabilities use the Windows Update service like any other Windows 10 clients, but provides controls to help businesses validate update quality as well as time their update deployments to machines through the use of Group Policy Objects. Windows Update for Business also incorporates smart peer-to-peer networking for distribution of Windows updates, which will help maintain bandwidth efficiency in the absence of a WSUS solution. + +## Eligible devices + + +All devices running Windows 10 Pro, Enterprise, and Education on the Current Branch for Business (CBB) are Windows Update for Business eligible. + +## OS upgrades and updates + + +In Windows 10, Windows Update for Business recognizes three deployment categories that clients receive from Windows Update: + +- **Upgrades** + + - Examples: Windows 10 (Build 10240) to Windows 10, Version 1511; CBB 1 to CBB 2 + + **Note**   + In the Windows 10 servicing model, new CBBs will be declared 2-3 times per year. + +   + +- **Updates** + + - General OS updates, typically released the second Tuesday of each month. These include Security, Critical, and Driver updates. + +- **Other/non-deferrable** + + - Definition updates (these cannot be deferred) + +Both upgrades and updates can be deferred from deployment to client machines by a Windows Update for Business administrator within a bounded rage of time from when those updates are first made available on the Windows Update service. This deferral capability allows administrators to validate deployments as they are pushed to all their Windows Update for Business enrolled clients. The following table defines maximum deferral periods allowed by deployment type: + +Category +Maximum deferral +Deferral increments +Classification type +Classification GUID +OS upgrades +8 months +1 month +Upgrade +3689BDC8-B205-4AF4-8D4A-A63924C5E9D5 +OS updates +4 weeks +1 week +Security updates +0FA1201D-4330-4FA8-8AE9-B877473B6441 +Drivers +EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0 +Updates +CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83 +Other/non-deferrable +No deferral +No deferral +Definition updates +E0789628-CE08-4437-BE74-2495B842F43B +  + +## Related topics + + +[Setup and deployment](setup-and-deployment.md) + +[Integration with management solutions](integration-with-management-solutions-.md) + +[Windows 10 servicing options for updates and upgrades](../manage/introduction-to-windows-10-servicing.md) + +  + +  + + + + + diff --git a/windows/whats-new/applocker.md b/windows/whats-new/applocker.md index eb01656b8e..01fb0969aa 100644 --- a/windows/whats-new/applocker.md +++ b/windows/whats-new/applocker.md @@ -29,7 +29,7 @@ In Windows 10, AppLocker has added some improvements. - You can manage Windows 10 Mobile devices by using the new [AppLocker CSP](http://msdn.microsoft.com/library/windows/hardware/dn920019.aspx). -[Learn how to manage AppLocker within your organization](/windows/keep-secure/applocker-overview-server.md). +[Learn how to manage AppLocker within your organization](../keep-secure/applocker-overview-server.md).   diff --git a/windows/whats-new/bitlocker.md b/windows/whats-new/bitlocker.md index 9543ed8a9b..48a670fb52 100644 --- a/windows/whats-new/bitlocker.md +++ b/windows/whats-new/bitlocker.md @@ -41,14 +41,14 @@ BitLocker Drive Encryption is a data protection feature that integrates with the - **DMA port protection**. You can use the [DataProtection/AllowDirectMemoryAccess](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) MDM policy to block DMA ports when the device is starting up. Also, when a device is locked, all unused DMA ports are turned off, but any devices that are already plugged into a DMA port will continue to work. When the device is unlocked, all DMA ports are turned back on. -- **New Group Policy for configuring pre-boot recovery**. You can now configure the pre-boot recovery message and recover URL that is shown on the pre-boot recovery screen. For more info, see the "Configure pre-boot recovery message and URL" section in [BitLocker Group Policy settings](/windows/keep-secure/bitlocker-group-policy-settings.md). +- **New Group Policy for configuring pre-boot recovery**. You can now configure the pre-boot recovery message and recover URL that is shown on the pre-boot recovery screen. For more info, see the "Configure pre-boot recovery message and URL" section in [BitLocker Group Policy settings](../keep-secure/bitlocker-group-policy-settings.md). -[Learn how to deploy and manage BitLocker within your organization](/windows/keep-secure/bitlocker-overview-roletech-overview.md). +[Learn how to deploy and manage BitLocker within your organization](../keep-secure/bitlocker-overview-roletech-overview.md). ## Related topics -[Trusted Platform Module](/windows/keep-secure/trusted-platform-module-technology-overview.md) +[Trusted Platform Module](../keep-secure/trusted-platform-module-technology-overview.md)   diff --git a/windows/whats-new/business-store-for-windows-10.md b/windows/whats-new/business-store-for-windows-10.md index 187c998fb7..06133f7f07 100644 --- a/windows/whats-new/business-store-for-windows-10.md +++ b/windows/whats-new/business-store-for-windows-10.md @@ -81,7 +81,7 @@ While not required, you can use a management tool to distribute and manage apps. The first step for getting your organization started with the Store for Business is signing up. To sign up for the Business store, you need an Azure AD account and you must be a Global Administrator for your organization. -For more information, see [Sign up for the Store for Business](/windows/manage/sign-up-for-windows-store-for-business.md). +For more information, see [Sign up for the Store for Business](../manage/sign-up-for-windows-store-for-business.md). ### Set up @@ -131,7 +131,7 @@ After your admin signs up for the Store for Business, they can assign roles to o   -In some cases, admins will need to add Azure Active Directory (AD) accounts for their employees. For more information, see [Manage user accounts and groups](/windows/manage/manage-users-and-groups-in-the-windows-store-for-business.md). +In some cases, admins will need to add Azure Active Directory (AD) accounts for their employees. For more information, see [Manage user accounts and groups](../manage/manage-users-and-groups-in-the-windows-store-for-business.md). Also, if your organization plans to use a management tool, you’ll need to configure your management tool to sync with the Store for Business. @@ -153,7 +153,7 @@ Line-of-business (LOB) apps are also supported via the Business store. You can i The Business store supports two options to license apps: online and offline. **Online** licensing is the default licensing model and is similar to the Windows Store. Online licensed apps require users and devices to connect to the Store for Business service to acquire an app and its license. **Offline** licensing is a new licensing option for Windows 10. With offline licenses, organizations can cache apps and their licenses to deploy within their network. ISVs or devs can opt-in their apps for offline licensing when they submit them to the developer center. -For more information, see [Apps in the Store for Business](/windows/manage/apps-in-the-windows-store-for-business.md#licensing_model). +For more information, see [Apps in the Store for Business](../manage/apps-in-the-windows-store-for-business.md#licensing_model). ### Distribute apps and content @@ -175,7 +175,7 @@ App distribution is handled through two channels, either through the Store for B Management tools can synchronize content that has been acquired in the Store for Business. If an offline application has been purchased this will also include the app package, license and metadata for the app (like, icons, count, or localized product descriptions). Using the metadata, management tools can enable portals or apps as a destination for employees to acquire apps. -For more information, see [Distribute apps to your employees from the Store for Business](/windows/manage/distribute-apps-to-your-employees-from-the-windows-store-for-business.md). +For more information, see [Distribute apps to your employees from the Store for Business](../manage/distribute-apps-to-your-employees-from-the-windows-store-for-business.md). ### Manage Store for Business settings and content @@ -205,7 +205,7 @@ Once you are signed up with the Business store and have purchased apps, Admins c - Download apps for offline installs -For more information, see [Manage settings in the Store for Business](/windows/manage/manage-settings-in-the-windows-store-for-business.md) and [Manage apps](/windows/manage/manage-apps.md). +For more information, see [Manage settings in the Store for Business](../manage/manage-settings-in-the-windows-store-for-business.md) and [Manage apps](../manage/manage-apps.md). ## Supported markets @@ -315,7 +315,7 @@ Developers in your organization, or ISVs can create content specific to your org Once the app is in inventory, admins can choose how to distribute the app. ISVs creating apps through the dev center can make their apps available in the Store for Business. ISVs can opt-in their apps to make them available for offline licensing. Apps purchased in the Store for Business will work only on Windows 10. -For more information on line-of-business apps, see [Working with Line-of-Business apps](/windows/manage/working-with-line-of-business-apps.md). +For more information on line-of-business apps, see [Working with Line-of-Business apps](../manage/working-with-line-of-business-apps.md).   diff --git a/windows/whats-new/change-history-for-what-s-new-in-windows-10.md b/windows/whats-new/change-history-for-what-s-new-in-windows-10.md index 20f753122a..9c2591f22b 100644 --- a/windows/whats-new/change-history-for-what-s-new-in-windows-10.md +++ b/windows/whats-new/change-history-for-what-s-new-in-windows-10.md @@ -91,13 +91,13 @@ This topic lists new and updated topics in the [What's new in Windows 10](what-s ## Related topics -[Change history for Plan for Windows 10 deployment](/windows/plan/change-history-for-plan-for-windows-10-deployment.md) +[Change history for Plan for Windows 10 deployment](../plan/change-history-for-plan-for-windows-10-deployment.md) -[Change history for Deploy Windows 10](/windows/deploy/change-history-for-deploy-windows-10.md) +[Change history for Deploy Windows 10](../deploy/change-history-for-deploy-windows-10.md) -[Change history for Keep Windows 10 secure](/windows/keep-secure/change-history-for-keep-windows-10-secure.md) +[Change history for Keep Windows 10 secure](../keep-secure/change-history-for-keep-windows-10-secure.md) -[Change history for Manage and update Windows 10](/windows/manage/change-history-for-manage-and-update-windows-10.md) +[Change history for Manage and update Windows 10](../manage/change-history-for-manage-and-update-windows-10.md)   diff --git a/windows/whats-new/credential-guard.md b/windows/whats-new/credential-guard.md index 6dbbf8335f..d293ee989d 100644 --- a/windows/whats-new/credential-guard.md +++ b/windows/whats-new/credential-guard.md @@ -32,7 +32,7 @@ Credential Guard uses virtualization-based security to isolate secrets so that o - **CredSSP/TsPkg credential delegation**. CredSSP/TsPkg cannot delegate default credentials when Credential Guard is enabled. -[Learn how to deploy and manage Credential Guard within your organization](/windows/keep-secure/credential-guard.md). +[Learn how to deploy and manage Credential Guard within your organization](../keep-secure/credential-guard.md).   diff --git a/windows/whats-new/device-guard-overview.md b/windows/whats-new/device-guard-overview.md index adc27a49b9..50626e7b3f 100644 --- a/windows/whats-new/device-guard-overview.md +++ b/windows/whats-new/device-guard-overview.md @@ -21,7 +21,7 @@ Device Guard is a combination of enterprise-related hardware and software securi Device Guard uses the new virtualization-based security in Windows 10 Enterprise to isolate the Code Integrity service from the Microsoft Windows kernel itself, letting the service use signatures defined by your enterprise-controlled policy to help determine what is trustworthy. In effect, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container. -For details on how to implement Device Guard, see [Device Guard deployment guide](/windows/keep-secure/device-guard-deployment-guide.md). +For details on how to implement Device Guard, see [Device Guard deployment guide](../keep-secure/device-guard-deployment-guide.md). ## Why use Device Guard diff --git a/windows/whats-new/device-management.md b/windows/whats-new/device-management.md index 8b8c04e9ca..97e1081acd 100644 --- a/windows/whats-new/device-management.md +++ b/windows/whats-new/device-management.md @@ -76,7 +76,7 @@ With Windows 10, your enterprise will have more choice and flexibility in apply While Windows Update provides updates to unmanaged devices, most enterprises prefer to manage and control the flow of updates using their device management solution. You can choose to apply the latest updates as soon as they are available, or you can set a source and schedule for updates that works for your specific requirements. -For more information about updating Windows 10, see [Windows 10 servicing options for updates and upgrades](/windows/manage/introduction-to-windows-10-servicing.md). +For more information about updating Windows 10, see [Windows 10 servicing options for updates and upgrades](../manage/introduction-to-windows-10-servicing.md). ## Easier certificate management @@ -107,7 +107,7 @@ Active Directory blog posts on Azure AD and Windows 10: ## Related topics -[Manage corporate devices](/windows/manage/manage-corporate-devices.md) +[Manage corporate devices](../manage/manage-corporate-devices.md) [Microsoft Passport](microsoft-passport.md) diff --git a/windows/whats-new/lockdown-features-from-windows-embedded-industry-8-1.md b/windows/whats-new/lockdown-features-from-windows-embedded-industry-8-1.md index 1eeb142e4a..788a239d0b 100644 --- a/windows/whats-new/lockdown-features-from-windows-embedded-industry-8-1.md +++ b/windows/whats-new/lockdown-features-from-windows-embedded-industry-8-1.md @@ -61,7 +61,7 @@ Many of the lockdown features available in Windows Embedded 8.1 Industry have be

[Dialog Filter](http://go.microsoft.com/fwlink/p/?LinkId=626762): suppress system dialogs and control which processes can run

-[AppLocker](/windows/keep-secure/applocker-overview-server.md) +[AppLocker](../keep-secure/applocker-overview-server.md)

Dialog Filter has been deprecated for Windows 10. Dialog Filter provided two capabilities; the ability to control which processes were able to run, and the ability to prevent dialogs (in practice, system dialogs) from appearing.

  • Control over which processes are able to run will now be provided by AppLocker.

  • diff --git a/windows/whats-new/microsoft-passport.md b/windows/whats-new/microsoft-passport.md index 5ff80aaab9..e684f2be3b 100644 --- a/windows/whats-new/microsoft-passport.md +++ b/windows/whats-new/microsoft-passport.md @@ -30,12 +30,12 @@ Microsoft Passport also enables Windows 10 Mobile devices to be used as a remot - **Security**. Microsoft Passport helps protect user identities and user credentials. Because no passwords are used, it helps circumvent phishing and brute force attacks. It also helps prevent server breaches because Microsoft Passport credentials are an asymmetric key pair, which helps prevent replay attacks when these keys are generated within isolated environments of Trusted Platform Modules (TPMs). -[Learn how to implement and manage Microsoft Passport in your organization.](/windows/keep-secure/implement-microsoft-passport-in-your-organization.md) +[Learn how to implement and manage Microsoft Passport in your organization.](../keep-secure/implement-microsoft-passport-in-your-organization.md) ## Learn more -[Why a PIN is better than a password](/windows/keep-secure/why-a-pin-is-better-than-a-password.md) +[Why a PIN is better than a password](../keep-secure/why-a-pin-is-better-than-a-password.md) [Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!](http://go.microsoft.com/fwlink/p/?LinkId=533890) diff --git a/windows/whats-new/provisioning-and-upgrade.md b/windows/whats-new/provisioning-and-upgrade.md index cd4848c2e9..676106047c 100644 --- a/windows/whats-new/provisioning-and-upgrade.md +++ b/windows/whats-new/provisioning-and-upgrade.md @@ -93,9 +93,9 @@ Provisioning packages can be applied both during image deployment and during run ## Related topics -[Update Windows 10 images with provisioning packages](/windows/deploy/update-windows-10-images-with-provisioning-packages.md) +[Update Windows 10 images with provisioning packages](../deploy/update-windows-10-images-with-provisioning-packages.md) -[Configure devices without MDM](/windows/manage/configure-devices-without-mdm.md) +[Configure devices without MDM](../manage/configure-devices-without-mdm.md)   diff --git a/windows/whats-new/security-auditing.md b/windows/whats-new/security-auditing.md index 7667144023..3368032ca3 100644 --- a/windows/whats-new/security-auditing.md +++ b/windows/whats-new/security-auditing.md @@ -35,11 +35,11 @@ In Windows 10, security auditing has added some improvements: In Windows 10, two new audit subcategories were added to the Advanced Audit Policy Configuration to provide greater granularity in audit events: -- [Audit Group Membership](/windows/keep-secure/audit-group-membership.md) Found in the Logon/Logoff audit category, the Audit Group Membership subcategory allows you to audit the group membership information in a user's logon token. Events in this subcategory are generated when group memberships are enumerated or queried on the PC where the logon session was created. For an interactive logon, the security audit event is generated on the PC that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the PC hosting the resource. +- [Audit Group Membership](../keep-secure/audit-group-membership.md) Found in the Logon/Logoff audit category, the Audit Group Membership subcategory allows you to audit the group membership information in a user's logon token. Events in this subcategory are generated when group memberships are enumerated or queried on the PC where the logon session was created. For an interactive logon, the security audit event is generated on the PC that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the PC hosting the resource. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the **Audit Logon** setting under **Advanced Audit Policy Configuration\\System Audit Policies\\Logon/Logoff**. Multiple events are generated if the group membership information cannot fit in a single security audit event. -- [Audit PNP Activity](/windows/keep-secure/audit-pnp-activity.md) Found in the Detailed Tracking category, the Audit PNP Activity subcategory allows you to audit when plug and play detects an external device. +- [Audit PNP Activity](../keep-secure/audit-pnp-activity.md) Found in the Detailed Tracking category, the Audit PNP Activity subcategory allows you to audit when plug and play detects an external device. Only Success audits are recorded for this category. If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play. @@ -166,7 +166,7 @@ Event ID 4826 has been added to track the following changes to the Boot Configur Event ID 6416 has been added to track when an external device is detected through Plug and Play. One important scenario is if an external device that contains malware is inserted into a high-value machine that doesn’t expect this type of action, such as a domain controller. -[Learn how to manage your security audit policies within your organization](/windows/keep-secure/security-auditing-overview-glbl.md). +[Learn how to manage your security audit policies within your organization](../keep-secure/security-auditing-overview-glbl.md).   diff --git a/windows/whats-new/security.md b/windows/whats-new/security.md index cc2dccc49f..8250797922 100644 --- a/windows/whats-new/security.md +++ b/windows/whats-new/security.md @@ -68,7 +68,7 @@ New desktops and laptops will be available to expedite your Device Guard impleme - **Not supported for Device Guard**. Many current devices cannot take advantage of all Device Guard features because they don’t have the required hardware components or HVCI-compatible drivers. However, most of these devices can enable some Device Guard features, such as configurable code integrity. -For more information about how to prepare for, manage, and deploy Device Guard, see the [Device Guard deployment guide](/windows/keep-secure/device-guard-deployment-guide.md). +For more information about how to prepare for, manage, and deploy Device Guard, see the [Device Guard deployment guide](../keep-secure/device-guard-deployment-guide.md). ### Configurable code integrity @@ -86,7 +86,7 @@ Configurable code integrity is not intended to replace technologies that allow o Configurable code integrity is not limited to Windows Store applications. In fact, it is not even limited to existing signed applications. Windows 10 gives you a way to sign line-of-business or third-party applications without having to repackage them: you can monitor the application’s installation and initial execution to create a list of binaries called a catalog file. When created, you sign these catalog files and add the signing certificate to the code integrity policy so that those binaries contained within the catalog files are allowed to execute. Then, you can use Group Policy, Configuration Manager, or any other familiar management tool to distribute these catalog files to your client machines. Historically, most malware has been unsigned; simply by deploying code integrity policies, your organization can immediately protect itself against unsigned malware, which is responsible for most modern attacks. **Note**   -For detailed deployment and planning information about configurable code integrity, see the [Device Guard deployment guide](/windows/keep-secure/device-guard-deployment-guide.md). +For detailed deployment and planning information about configurable code integrity, see the [Device Guard deployment guide](../keep-secure/device-guard-deployment-guide.md).   @@ -107,7 +107,7 @@ Configurable code integrity is available in Windows 10 Enterprise and Windows    -You can enable configurable code integrity as part of a Device Guard deployment or as a stand-alone component. In addition, you can run configurable code integrity on hardware that is compatible with the Windows 7 operating system, even if such hardware is not Device Guard ready. Code integrity policies can align with an existing application catalog, existing corporate imaging strategy, or with any other method that provides the organization’s desired levels of restriction. For more information about configurable code integrity with Device Guard, see the [Device Guard deployment guide](/windows/keep-secure/device-guard-deployment-guide.md). +You can enable configurable code integrity as part of a Device Guard deployment or as a stand-alone component. In addition, you can run configurable code integrity on hardware that is compatible with the Windows 7 operating system, even if such hardware is not Device Guard ready. Code integrity policies can align with an existing application catalog, existing corporate imaging strategy, or with any other method that provides the organization’s desired levels of restriction. For more information about configurable code integrity with Device Guard, see the [Device Guard deployment guide](../keep-secure/device-guard-deployment-guide.md). ### Measured Boot and remote attestation @@ -210,7 +210,7 @@ Because it requires isolated user mode and a Hyper-V hypervisor, you cannot conf   -The Credential Guard feature is targeted at resisting the use of pass-the-hash and pass-the-ticket techniques. By employing a MFA option such as Microsoft Passport with Credential Guard, you can gain additional protection against such threats. For more in-depth information about how Credential Guard works and the specific mitigations it provides, see [Protect derived domain credentials with Credential Guard](/windows/keep-secure/credential-guard.md). +The Credential Guard feature is targeted at resisting the use of pass-the-hash and pass-the-ticket techniques. By employing a MFA option such as Microsoft Passport with Credential Guard, you can gain additional protection against such threats. For more in-depth information about how Credential Guard works and the specific mitigations it provides, see [Protect derived domain credentials with Credential Guard](../keep-secure/credential-guard.md). ## Windows 10 hardware considerations @@ -247,13 +247,13 @@ In this table, **R** stands for *recommended*, **Y** means that the hardware com [Making Windows 10 More Personal and More Secure with Windows Hello](http://go.microsoft.com/fwlink/p/?LinkId=717551) -[Protect BitLocker from pre-boot attacks](/windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md) +[Protect BitLocker from pre-boot attacks](../keep-secure/protect-bitlocker-from-pre-boot-attacks.md) -[BitLocker Countermeasures](/windows/keep-secure/bitlocker-countermeasures.md) +[BitLocker Countermeasures](../keep-secure/bitlocker-countermeasures.md) -[Device Guard deployment guide](/windows/keep-secure/device-guard-deployment-guide.md) +[Device Guard deployment guide](../keep-secure/device-guard-deployment-guide.md) -[Protect derived domain credentials with Credential Guard](/windows/keep-secure/credential-guard.md) +[Protect derived domain credentials with Credential Guard](../keep-secure/credential-guard.md)   diff --git a/windows/whats-new/trusted-platform-module.md b/windows/whats-new/trusted-platform-module.md index 43b2c111d7..1cde0948c8 100644 --- a/windows/whats-new/trusted-platform-module.md +++ b/windows/whats-new/trusted-platform-module.md @@ -48,7 +48,7 @@ Some things that you can check on the device are:   -[Learn how to deploy and manage TPM within your organization](/windows/keep-secure/trusted-platform-module-technology-overview.md). +[Learn how to deploy and manage TPM within your organization](../keep-secure/trusted-platform-module-technology-overview.md).   diff --git a/windows/whats-new/user-account-control.md b/windows/whats-new/user-account-control.md index de2d2ddfd7..911bd1fcba 100644 --- a/windows/whats-new/user-account-control.md +++ b/windows/whats-new/user-account-control.md @@ -24,7 +24,7 @@ In Windows 10, User Account Control has added some improvements. - **Integration with the Antimalware Scan Interface (AMSI)**. The [AMSI](http://msdn.microsoft.com/library/windows/desktop/dn889587.aspx) scans all UAC elevation requests for malware. If malware is detected, the admin privilege is blocked. -[Learn how to manage User Account Control within your organization](/windows/keep-secure/user-account-control-overview.md). +[Learn how to manage User Account Control within your organization](../keep-secure/user-account-control-overview.md).   diff --git a/windows/whats-new/windows-spotlight.md b/windows/whats-new/windows-spotlight.md index e659d8726c..304f847ce9 100644 --- a/windows/whats-new/windows-spotlight.md +++ b/windows/whats-new/windows-spotlight.md @@ -59,7 +59,7 @@ Pay attention to the checkbox in **Options**. In addition to providing the path ## Related topics -[Manage Windows 10 Start layout options](/windows/manage/windows-10-start-layout-options-and-policies.md) +[Manage Windows 10 Start layout options](../manage/windows-10-start-layout-options-and-policies.md)   diff --git a/windows/whats-new/windows-update-for-busines.md b/windows/whats-new/windows-update-for-busines.md index 5c10a0289c..e18fe862c7 100644 --- a/windows/whats-new/windows-update-for-busines.md +++ b/windows/whats-new/windows-update-for-busines.md @@ -33,11 +33,11 @@ Together, these Windows Update for Business features help reduce device manageme ## Learn more -[Windows Update for Business](/windows/plan/windows-update-for-business.md) +[Windows Update for Business](../plan/windows-update-for-business.md) -[Setup and deployment](/windows/plan/setup-and-deployment.md) +[Setup and deployment](../plan/setup-and-deployment.md) -[Integration with management solutions](/windows/plan/integration-with-management-solutions-.md) +[Integration with management solutions](../plan/integration-with-management-solutions-.md)