mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' of https://github.com/MicrosoftDocs/windows-docs-pr into dep-nplogon-8787264
This commit is contained in:
commit
b2085637f1
@ -51,19 +51,16 @@
|
||||
},
|
||||
"titleSuffix": "Windows Education",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"claydetels19",
|
||||
"Kellylorenebaker",
|
||||
"jborsecnik",
|
||||
"dstrome",
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {
|
||||
|
@ -55,19 +55,17 @@
|
||||
}
|
||||
},
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"claydetels19",
|
||||
"Kellylorenebaker",
|
||||
"jborsecnik",
|
||||
"dstrome",
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"alekyaj"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
@ -52,17 +52,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows Application Management",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"beccarobins"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -58,17 +58,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows Client Management",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"american-dipper",
|
||||
"v-stsavell",
|
||||
"stacyrch140",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"beccarobins"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ADMX_ICM Policy CSP
|
||||
description: Learn more about the ADMX_ICM Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 02/28/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -843,7 +843,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa
|
||||
<!-- Description-Source-ADMX -->
|
||||
This policy setting allows you to remove access to Windows Update.
|
||||
|
||||
- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at <https://windowsupdate.microsoft.com>, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
|
||||
- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at `https://windowsupdate.microsoft.com`, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
|
||||
|
||||
- If you disable or don't configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update.
|
||||
|
||||
|
@ -712,7 +712,9 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
|
||||
|
||||
<!-- AllowScanningNetworkFiles-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
This policy setting allows you to configure real-time scanning for files that are accessed over the network. It is recommended to enable this setting.
|
||||
This policy setting allows you to configure scheduled scans and on-demand (manually initiated) scans for files that are accessed over the network. It is recommended to enable this setting.
|
||||
>[!NOTE]
|
||||
> Real-time protection (on-access) scanning is not impacted by this policy.
|
||||
|
||||
- If you enable this setting or do not configure this setting, network files will be scanned.
|
||||
- If you disable this setting, network files will not be scanned.
|
||||
|
@ -56,17 +56,18 @@
|
||||
},
|
||||
"titleSuffix": "Configure Windows",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"beccarobins",
|
||||
"alekyaj"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -11,7 +11,7 @@ ms.topic: how-to
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.date: 02/13/2024
|
||||
ms.date: 03/04/2024
|
||||
zone_pivot_groups: windows-versions-11-10
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
@ -65,7 +65,7 @@ To update contact information and resend the activation email, use the following
|
||||
|
||||
1. Update the contact information, then select **Update Contact Details**. This action triggers a new email.
|
||||
|
||||
## Preparing for deployment: reviewing requirements
|
||||
## Prepare for deployment: reviewing requirements
|
||||
|
||||
- Devices must be running a supported version of Windows Pro.
|
||||
- Microsoft Entra joined, or hybrid domain joined with Microsoft Entra Connect. Customers who are federated with Microsoft Entra ID are also eligible.
|
||||
@ -82,7 +82,7 @@ For more information about integrating on-premises AD DS domains with Microsoft
|
||||
- [What is hybrid identity with Microsoft Entra ID?](/azure/active-directory/hybrid/whatis-hybrid-identity)
|
||||
- [Microsoft Entra Connect and Microsoft Entra Connect Health installation roadmap](/azure/active-directory/hybrid/how-to-connect-install-roadmap)
|
||||
|
||||
## Assigning licenses to users
|
||||
## Assign licenses to users
|
||||
|
||||
After the Windows subscription is ordered, an email is sent with guidance on how to use Windows as an online service. The following methods are available to assign licenses:
|
||||
|
||||
@ -353,11 +353,11 @@ A device is healthy when both the subscription and activation are active. If the
|
||||
License Status: Licensed
|
||||
```
|
||||
|
||||
To instead get detailed licensing information, run the following command:
|
||||
To instead get detailed licensing information, run the following command:
|
||||
|
||||
```cmd
|
||||
slmgr /dlv
|
||||
```
|
||||
```cmd
|
||||
slmgr /dlv
|
||||
```
|
||||
|
||||
For more information on **Slmgr**, see [Slmgr.vbs options for obtaining volume activation information](/windows-server/get-started/activation-slmgr-vbs-options).
|
||||
|
||||
@ -368,11 +368,11 @@ In some instances, users might experience problems with activation of the Window
|
||||
- The Windows Enterprise E3 or E5 subscription has lapsed, was removed, or isn't applied.
|
||||
- Windows Pro was never activated.
|
||||
|
||||
When there are problems with Windows Enterprise E3 or E5 subscription activation, the following are errors can occur in the [Activation](ms-settings:activation) pane:
|
||||
When there are problems with Windows Enterprise E3 or E5 subscription activation, the following are errors can occur in the [**Activation**](ms-settings:activation) pane:
|
||||
|
||||
- **Windows Pro isn't activated**
|
||||
|
||||
When Windows Pro isn't activated on a device, the following message is displayed for **Activation** in the [Activation](ms-settings:activation) pane:
|
||||
When Windows Pro isn't activated on a device, the following message is displayed for **Activation** in the [**Activation**](ms-settings:activation) pane:
|
||||
|
||||
`Windows is not activated`
|
||||
|
||||
@ -389,7 +389,7 @@ When there are problems with Windows Enterprise E3 or E5 subscription activation
|
||||
|
||||
- **Windows Enterprise subscription isn't active**
|
||||
|
||||
When a device with a Windows Enterprise subscription has lapsed or has been removed, the following message is displayed for **Subscription** in the [Activation](ms-settings:activation) pane:
|
||||
When a device with a Windows Enterprise subscription has lapsed or has been removed, the following message is displayed for **Subscription** in the [**Activation**](ms-settings:activation) pane:
|
||||
|
||||
`Windows Enterprise subscription isn't valid.`
|
||||
|
||||
@ -482,13 +482,43 @@ Use the following guides to verify each one of these requirements:
|
||||
|
||||
- **Make sure the Microsoft Entra user has been assigned a license**.
|
||||
|
||||
For more information, see [Assigning licenses to users](#assigning-licenses-to-users).
|
||||
For more information, see [Assigning licenses to users](#assign-licenses-to-users).
|
||||
|
||||
## Known issues
|
||||
## Recommended practices
|
||||
|
||||
- If a device isn't able to connect to Windows Update, it can lose activation status or be blocked from upgrading to Windows Enterprise. Make sure that Windows Update isn't blocked on the device:
|
||||
### Adding Conditional Access policy
|
||||
|
||||
- Using `gpedit.msc` or group policy editor in the domain, make sure that the following group policy setting is set to **Disabled** or **Not Configured**:
|
||||
When a device has been offline for an extended period of time, the Subscription Activation might not reactivate automatically on the device. To resolve this issue, use Conditional Access policies to control access by excluding one of the following cloud apps from their Conditional Access policies using **Select Excluded Cloud Apps**:
|
||||
|
||||
- [Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
|
||||
- [Windows Store for Business, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
|
||||
Although the app ID is the same in both instances, the name of the cloud app depends on the tenant.
|
||||
|
||||
For more information about configuring exclusions in Conditional Access policies, see [Application exclusions](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa#application-exclusions).
|
||||
|
||||
<!-- 8605089 -->
|
||||
|
||||
Setting this Conditional Access policy ensures that Subscription Activation continues to work seamlessly.
|
||||
|
||||
Starting with Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later, users are prompted for authentication with a toast notification when Subscription Activation needs to reactivate. The toast notification will show the following message:
|
||||
|
||||
> **Your account requires authentication**
|
||||
>
|
||||
> **Please sign in to your work or school account to verify your information.**
|
||||
|
||||
Additionally, in the [**Activation**](ms-settings:activation) pane, the following message might appear:
|
||||
|
||||
> **Please sign in to your work or school account to verify your information.**
|
||||
|
||||
The prompt for authentication usually occurs when a device has been offline for an extended period of time. This change eliminates the need for an exclusion in the Conditional Access policy for Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later. A Conditional Access policy can still be used with Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later if the prompt for user authentication via a toast notification isn't desired.
|
||||
|
||||
### Make sure Windows Update isn't blocked
|
||||
|
||||
If a device isn't able to connect to Windows Update, it can lose activation status or be blocked from upgrading to Windows Enterprise. Make sure that Windows Update isn't blocked on the device:
|
||||
|
||||
- Using `gpedit.msc` or group policy editor in the domain, make sure that the following group policy setting is set to **Disabled** or **Not Configured**:
|
||||
|
||||
::: zone pivot="windows-11"
|
||||
|
||||
@ -504,7 +534,7 @@ Use the following guides to verify each one of these requirements:
|
||||
|
||||
If this policy is set to **Enabled**, it must be changed to **Disabled** or **Not Configured**.
|
||||
|
||||
- In the following registry key:
|
||||
- In the following registry key of the registry:
|
||||
|
||||
`HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate`
|
||||
|
||||
@ -518,9 +548,9 @@ Use the following guides to verify each one of these requirements:
|
||||
>
|
||||
> Make sure to first check the group policy of **Do not connect to any Windows Update Internet locations**. If the policy is **Enabled**, then this registry key will eventually be reset back to `1` even after it's manually set to `0` via `reg.exe`. Setting the policy of **Do not connect to any Windows Update Internet locations** to **Disabled** or **Not Configured** will make sure the registry value remains as `0`.
|
||||
|
||||
- Delay in the activation of Enterprise license of Windows.
|
||||
### Delay in the activation of Enterprise license of Windows
|
||||
|
||||
There might be a delay in the activation of the Enterprise license in Windows. This delay is by design. Windows uses a built-in cache when determining upgrade eligibility. This behavior includes processing responses that indicate that the device isn't eligible for an upgrade. It can take up to four days after a qualifying purchase before the upgrade eligibility is enabled and the cache expires.
|
||||
There might be a delay in the activation of the Enterprise license in Windows. This delay is by design. Windows uses a built-in cache when determining upgrade eligibility. This behavior includes processing responses that indicate that the device isn't eligible for an upgrade. It can take up to four days after a qualifying purchase before the upgrade eligibility is enabled and the cache expires.
|
||||
|
||||
## Virtual Desktop Access (VDA)
|
||||
|
||||
@ -528,6 +558,7 @@ Subscriptions to Windows Enterprise are also available for virtualized clients.
|
||||
|
||||
Virtual machines (VMs) must be configured to enable Windows Enterprise subscriptions for VDA. Active Directory-joined and Microsoft Entra joined clients are supported. For more information, see [Enable VDA for Enterprise subscription activation](vda-subscription-activation.md).
|
||||
|
||||
## Related articles
|
||||
## Related content
|
||||
|
||||
- [Windows subscription activation](windows-subscription-activation.md).
|
||||
- [MDM enrollment of Windows devices](/windows/client-management/mdm-enrollment-of-windows-devices).
|
||||
|
@ -51,17 +51,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows Deployment",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"alekyaj"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -62,7 +62,7 @@ An [Microsoft Entra dual state](/azure/active-directory/devices/hybrid-azuread-j
|
||||
|
||||
In the dual state, you end up having two Microsoft Entra device records with different join types for the same device. In this case, the Hybrid Microsoft Entra device record takes precedence over the Microsoft Entra registered device record for any type of authentication in Microsoft Entra ID, which makes the Microsoft Entra registered device record stale.
|
||||
|
||||
It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage state devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
|
||||
It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage stale devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
|
||||
|
||||
> [!WARNING]
|
||||
> If you don't clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, you might end up seeing devices failing to meet the **Intune or Cloud-Attached (Device must be either Intune-managed or Co-managed)** pre-requisite check in the **Not ready** tab because it's expected that these stale Microsoft Entra devices aren't enrolled into the Intune service anymore.
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows subscription activation
|
||||
description: Learn how to dynamically enable Windows Enterprise or Education subscriptions.
|
||||
description: Learn how to step up from Windows Pro to a Windows Enterprise subscription or from Windows Eduction Pro to a Windows Education subscription.
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-fundamentals
|
||||
ms.localizationpriority: medium
|
||||
@ -10,8 +10,9 @@ manager: aaroncz
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/13/2024
|
||||
ms.topic: concept-article
|
||||
zone_pivot_groups: windows-versions-11-10
|
||||
ms.date: 03/04/2024
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
@ -33,17 +34,6 @@ The subscription activation feature eliminates the need to manually deploy Enter
|
||||
|
||||
For more information on how to deploy Enterprise licenses, see [Deploy Windows Enterprise licenses](deploy-enterprise-licenses.md).
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> Organizations that use the Subscription Activation feature to enable users to upgrade from one version of Windows to another and use Conditional Access policies to control access need to exclude one of the following cloud apps from their Conditional Access policies using **Select Excluded Cloud Apps**:
|
||||
>
|
||||
> - [Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
> - [Windows Store for Business, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
>
|
||||
> Although the app ID is the same in both instances, the name of the cloud app depends on the tenant.
|
||||
>
|
||||
> For more information about configuring exclusions in Conditional Access policies, see [Application exclusions](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa#application-exclusions).
|
||||
|
||||
## Subscription activation for Enterprise
|
||||
|
||||
Windows Enterprise E3 and E5 are available as online services via subscription. Windows Enterprise can be deployed in an organization without keys and reboots.
|
||||
@ -57,6 +47,34 @@ Organizations that have an enterprise agreement can also benefit from the servic
|
||||
>
|
||||
> Subscription activation is available for qualifying devices running currently supported versions of Windows. Subscription activation can't be used to upgrade to a newer version of Windows.
|
||||
|
||||
### Adding Conditional Access policy
|
||||
|
||||
Organizations that use the Subscription Activation feature to enable users to "step-up" from one version of Windows to another and use Conditional Access policies to control access need to exclude one of the following cloud apps from their Conditional Access policies using **Select Excluded Cloud Apps**:
|
||||
|
||||
- [Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
|
||||
- [Windows Store for Business, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f](/troubleshoot/azure/active-directory/verify-first-party-apps-sign-in#application-ids-of-commonly-used-microsoft-applications).
|
||||
|
||||
Although the app ID is the same in both instances, the name of the cloud app depends on the tenant.
|
||||
|
||||
For more information about configuring exclusions in Conditional Access policies, see [Application exclusions](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa#application-exclusions).
|
||||
|
||||
<!-- 8605089 -->
|
||||
|
||||
When a device has been offline for an extended period of time, the device might not reactivate automatically if this Conditional Access exclusion isn't in place. Setting this Conditional Access exclusion ensures that Subscription Activation continues to work seamlessly.
|
||||
|
||||
Starting with Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later, users are prompted for authentication with a toast notification when Subscription Activation needs to reactivate. The toast notification will show the following message:
|
||||
|
||||
> **Your account requires authentication**
|
||||
>
|
||||
> **Please sign in to your work or school account to verify your information.**
|
||||
|
||||
Additionally, in the [**Activation**](ms-settings:activation) pane, the following message might appear:
|
||||
|
||||
> **Please sign in to your work or school account to verify your information.**
|
||||
|
||||
The prompt for authentication usually occurs when a device has been offline for an extended period of time. This change eliminates the need for an exclusion in the Conditional Access policy for Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later. A Conditional Access policy can still be used with Windows 11, version 23H2 with [KB5034848](https://support.microsoft.com/help/5034848) or later if the prompt for user authentication via a toast notification isn't desired.
|
||||
|
||||
## Subscription activation for Education
|
||||
|
||||
Subscription activation for Education works the same as the Enterprise edition. However, in order to use subscription activation for Education, the device must have Windows Pro Education and an active subscription plan with an Enterprise license. For more information, see the [requirements](#windows-education-requirements) section.
|
||||
@ -71,14 +89,6 @@ To support inherited activation, both the host computer and the VM must be runni
|
||||
|
||||
### Windows Enterprise requirements
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> The following requirements don't apply to general Windows client activation on Azure. Azure activation requires a connection to Azure KMS only. It supports workgroup, hybrid, and Microsoft Entra joined VMs. In most scenarios, activation of Azure VMs happens automatically. For more information, see [Understanding Azure KMS endpoints for Windows product activation of Azure virtual machines](/troubleshoot/azure/virtual-machines/troubleshoot-activation-problems#understanding-azure-kms-endpoints-for-windows-product-activation-of-azure-virtual-machines).
|
||||
|
||||
> [!IMPORTANT]
|
||||
>
|
||||
> As of October 1, 2022, subscription activation is available for *commercial* and *GCC* tenants. It's currently not available on GCC High or DoD tenants. <!-- 6783128 --> For more information, see [Enable subscription activation with an existing EA](deploy-enterprise-licenses.md#enable-subscription-activation-with-an-existing-ea).
|
||||
|
||||
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), the following requirements must be met:
|
||||
|
||||
- A supported version of Windows Pro or Enterprise edition installed on the devices to be upgraded.
|
||||
@ -87,11 +97,32 @@ For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products &
|
||||
|
||||
For Microsoft customers that don't have EA or MPSA, Windows Enterprise E3/E5 or A3/A5 licenses can be obtained through a cloud solution provider (CSP). Identity management and device requirements are the same when using CSP to manage licenses. For more information about getting Windows Enterprise E3 through a CSP, see [Windows Enterprise E3 in CSP](windows-enterprise-e3-overview.md).
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> These requirements don't apply to general Windows client activation on Azure. Azure activation requires a connection to Azure KMS only. Azure KMS supports workgroup, hybrid, and Microsoft Entra joined VMs. In most scenarios, activation of Azure VMs happens automatically. For more information, see [Understanding Azure KMS endpoints for Windows product activation of Azure virtual machines](/troubleshoot/azure/virtual-machines/troubleshoot-activation-problems#understanding-azure-kms-endpoints-for-windows-product-activation-of-azure-virtual-machines).
|
||||
|
||||
> [!IMPORTANT]
|
||||
>
|
||||
> As of October 1, 2022, subscription activation is available for *commercial* and *GCC* tenants. It's currently not available on GCC High or DoD tenants. <!-- 6783128 --> For more information, see [Enable subscription activation with an existing EA](deploy-enterprise-licenses.md#enable-subscription-activation-with-an-existing-ea).
|
||||
|
||||
### Windows Education requirements
|
||||
|
||||
- A supported version of Windows Pro Education installed on the devices to be upgraded.
|
||||
- A device with a Windows Pro Education digital license. This information can be confirmed under **Settings > System > Activation** or under **Settings > Update & Security > Activation**.
|
||||
|
||||
::: zone pivot="windows-11"
|
||||
|
||||
- A device with a Windows Pro Education digital license. This information can be confirmed in the [**Activation**](ms-settings:activation)pane of the **Settings** app under **Settings > System > Activation**.
|
||||
|
||||
::: zone-end
|
||||
|
||||
::: zone pivot="windows-10"
|
||||
|
||||
- A device with a Windows Pro Education digital license. This information can be confirmed in the [**Activation**](ms-settings:activation)pane of the **Settings** app under **Settings > Update & Security > Activation**.
|
||||
|
||||
::: zone-end
|
||||
|
||||
- The Education tenant must have an active subscription to Microsoft 365 with a Windows Enterprise license, or a Windows Enterprise or Education subscription.
|
||||
|
||||
- Devices must be Microsoft Entra joined or Microsoft Entra hybrid joined. Workgroup-joined or Microsoft Entra registered devices aren't supported.
|
||||
|
||||
> [!IMPORTANT]
|
||||
@ -104,8 +135,8 @@ With Windows Enterprise or Education editions, an organization can benefit from
|
||||
|
||||
To compare Windows editions and review pricing, see the following sites:
|
||||
|
||||
- [Compare Windows editions](https://www.microsoft.com/en-us/windows/business/windows-10-pro-vs-windows-11-pro)
|
||||
- [Enterprise Mobility + Security Pricing Options](https://www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing)
|
||||
- [Compare Windows editions](https://www.microsoft.com/en-us/windows/business/windows-10-pro-vs-windows-11-pro) <!-- Leaving in language reference in URL because URL without it doesn't redirect properly>
|
||||
- [Enterprise Mobility + Security Pricing Options](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing)
|
||||
|
||||
Benefits of moving to Windows as an online service include:
|
||||
|
||||
@ -121,7 +152,7 @@ Benefits of moving to Windows as an online service include:
|
||||
|
||||
## How it works
|
||||
|
||||
The device is Microsoft Entra joined, for example from **Settings** > **Accounts** > **Access work or school**.
|
||||
The device is Microsoft Entra joined, for example from the [Access work or school](ms-settings:workplace) pane in the **Settings** app that can be found under **Settings** > **Accounts** > **Access work or school**.
|
||||
|
||||
Windows Enterprise is assigned to a user, for example through the Microsoft 365 admin center. When a licensed user signs in to a device that meets requirements using their Microsoft Entra credentials, Windows steps up from Pro edition to Enterprise, or from Pro Education to Education. Once the edition is stepped up, Enterprise/Education features are unlocked. When a user's subscription expires or is transferred to another user, the device reverts seamlessly to Windows Pro or Windows Pro Education edition, once the current subscription validity expires.
|
||||
|
||||
@ -167,7 +198,7 @@ With a Microsoft Entra subscription, group-based licensing is the preferred meth
|
||||
|
||||
### Existing Enterprise deployments
|
||||
|
||||
With currently supported version of Windows, subscription activation automatically pulls the firmware-embedded Windows activation key and activates the underlying Pro license. The license then steps up to Enterprise using subscription activation. This behavior automatically migrates devices from KMS or MAK activated Enterprise to subscription activated Enterprise.
|
||||
With currently supported versions of Windows, subscription activation automatically pulls the firmware-embedded Windows activation key and activates the underlying Pro license. The license then steps up to Enterprise using subscription activation. This behavior automatically migrates devices from KMS or MAK activated Enterprise to subscription activated Enterprise.
|
||||
|
||||
Subscription activation doesn't remove the need to activate the underlying OS. This requirement still exists for running a genuine installation of Windows.
|
||||
|
||||
@ -193,7 +224,7 @@ If an organization has an Enterprise Agreement (EA) or Software Assurance (SA):
|
||||
|
||||
If an organization has a Microsoft Products & Services Agreement (MPSA):
|
||||
|
||||
- New customers are automatically emailed the details of the service. Take steps to process the instructions.
|
||||
- New customers are automatically emailed the details of the service. Follow the instructions and steps found in the email.
|
||||
|
||||
- Existing MPSA customers receive service activation emails that allow their customer administrator to assign users to the service.
|
||||
|
||||
@ -209,8 +240,9 @@ Subscriptions to Windows Enterprise are also available for virtualized clients.
|
||||
|
||||
Virtual machines (VMs) must be configured to enable Windows Enterprise subscriptions for VDA. Active Directory-joined and Microsoft Entra joined clients are supported. See [Enable VDA for Subscription Activation](vda-subscription-activation.md).
|
||||
|
||||
## Related sites
|
||||
## Related content
|
||||
|
||||
- Connect domain-joined devices to Microsoft Entra ID for Windows experiences. For more information, see [Plan your Microsoft Entra hybrid join implementation](/entra/identity/devices/hybrid-join-plan).
|
||||
- [Deploy Windows Enterprise licenses](deploy-enterprise-licenses.md).
|
||||
- [Plan your Microsoft Entra hybrid join implementation](/entra/identity/devices/hybrid-join-plan).
|
||||
- [Compare Windows editions](https://www.microsoft.com/windows/business/compare-windows-11).
|
||||
- [Windows for business](https://www.microsoft.com/windows/business).
|
||||
|
@ -54,17 +54,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows for IT Pros",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"alekyaj"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -49,17 +49,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows Privacy",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"alekyaj"
|
||||
]
|
||||
},
|
||||
"searchScope": [
|
||||
|
@ -4,12 +4,13 @@ title: Required diagnostic events and fields for Windows 11, versions 23H2 and 2
|
||||
keywords: privacy, telemetry
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-privacy
|
||||
localizationpriority: high
|
||||
ms.localizationpriority: high
|
||||
author: DHB-MSFT
|
||||
ms.author: danbrown
|
||||
manager: laurawi
|
||||
ms.date: 10/31/2023
|
||||
ms.date: 02/29/2024
|
||||
ms.topic: reference
|
||||
ms.collection: privacy-windows
|
||||
---
|
||||
|
||||
# Required diagnostic events and fields for Windows 11, versions 23H2 and 22H2
|
||||
@ -130,7 +131,6 @@ The following fields are available:
|
||||
|
||||
- **AppraiserVersion** The version of the appraiser binary generating the events.
|
||||
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove
|
||||
|
||||
This event indicates that the DatasourceApplicationFile object is no longer present. The data collected with this event is used to help keep Windows up to date.
|
||||
@ -783,7 +783,6 @@ The following fields are available:
|
||||
|
||||
- **AppraiserVersion** Appraiser version.
|
||||
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.SystemProcessorPrefetchWAdd
|
||||
|
||||
This event sends data indicating whether the system supports the PrefetchW CPU requirement, to help keep Windows up to date.
|
||||
@ -1328,6 +1327,7 @@ The following fields are available:
|
||||
- **objectType** Indicates the object type that the event applies to.
|
||||
- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object.
|
||||
|
||||
|
||||
## Component-based servicing events
|
||||
|
||||
### CbsServicingProvider.CbsCapabilitySessionFinalize
|
||||
@ -2163,6 +2163,7 @@ The following fields are available:
|
||||
- **SystemStateTransition** State transition information.
|
||||
- **Watchdog** Watchdog information.
|
||||
|
||||
|
||||
## Microsoft Edge events
|
||||
|
||||
### Aria.af397ef28e484961ba48646a5d38cf54.Microsoft.WebBrowser.Installer.EdgeUpdate.Ping
|
||||
@ -2290,6 +2291,92 @@ The following fields are available:
|
||||
- **process_type** The type of the hanging browser process, for example, gpu-process, renderer, etc.
|
||||
- **stack_hash** A hash of the hanging stack. Currently not used or set to zero.
|
||||
|
||||
|
||||
### Microsoft.Gaming.Critical.Error
|
||||
|
||||
Common error event used by the Gaming Telemetry Library to provide centralized monitoring for critical errors logged by callers using the library.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **callStack** List of active subroutines running during error occurrence.
|
||||
- **componentName** Friendly name meant to represent what feature area this error should be attributed to. Used for aggregations and pivots of data.
|
||||
- **customAttributes** List of custom attributes.
|
||||
- **errorCode** Error code.
|
||||
- **extendedData** JSON blob representing additional, provider-level properties common to the component.
|
||||
- **featureName** Friendly name meant to represent which feature this should be attributed to.
|
||||
- **identifier** Error identifier.
|
||||
- **message** Error message.
|
||||
- **properties** List of properties attributed to the error.
|
||||
|
||||
### Microsoft.Gaming.Critical.ProviderRegistered
|
||||
|
||||
Indicates that a telemetry provider has been registered with the Gaming Telemetry Library.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **providerNamespace** The telemetry Namespace for the registered provider.
|
||||
|
||||
### Microsoft.Gaming.OOBE.HDDBackup
|
||||
|
||||
This event describes whether an External HDD back up has been found.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **backupVersion** version number of backup.
|
||||
- **extendedData** JSON blob representing additional, provider-level properties common to the component.
|
||||
- **hasConsoleSettings** Indicates whether the console settings stored.
|
||||
- **hasUserSettings** Indicates whether the user settings stored.
|
||||
- **hasWirelessProfile** Indicates whether the wireless profile stored.
|
||||
- **hddBackupFound** Indicates whether hdd backup is found.
|
||||
- **osVersion** Operating system version.
|
||||
|
||||
### Microsoft.Gaming.OOBE.OobeComplete
|
||||
|
||||
This event is triggered when OOBE activation is complete.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **allowAutoUpdate** Allows auto update.
|
||||
- **allowAutoUpdateApps** Allows auto update for apps.
|
||||
- **appliedTransferToken** Applied transfer token.
|
||||
- **connectionType** Connection type.
|
||||
- **curSessionId** Current session id.
|
||||
- **extendedData** JSON blob representing additional, provider-level properties common to the component.
|
||||
- **instantOn** Instant on.
|
||||
- **moobeAcceptedState** Moobe accepted state.
|
||||
- **phaseOneElapsedTimeMs** Total elapsed time in milliseconds for phase 1.
|
||||
- **phaseOneVersion** Version of phase 1.
|
||||
- **phaseTwoElapsedTimeMs** Total elapsed time in milliseconds for phase 2.
|
||||
- **phaseTwoVersion** Version of phase 2.
|
||||
- **systemUpdateRequired** Indicates whether a system update required.
|
||||
- **totalElapsedTimeMs** Total elapsed time in milliseconds of all phases.
|
||||
- **usedCloudBackup** Indicates whether cloud backup is used.
|
||||
- **usedHDDBackup** Indicates whether HDD backup is used.
|
||||
- **usedOffConsole** Indicates whether off console is used.
|
||||
|
||||
|
||||
### Microsoft.Gaming.OOBE.SessionStarted
|
||||
|
||||
This event is sent at the start of OOBE session.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **customAttributes** customAttributes.
|
||||
- **extendedData** extendedData.
|
||||
|
||||
### Microsoft.Surface.Mcu.Prod.CriticalLog
|
||||
|
||||
Error information from Surface device firmware.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CrashLog** MCU crash log
|
||||
- **criticalLogSize** Log size
|
||||
- **CUtility::GetTargetNameA(target)** Product identifier.
|
||||
- **productId** Product identifier
|
||||
- **uniqueId** Correlation ID that can be used with Watson to get more details about the failure.
|
||||
|
||||
|
||||
### Microsoft.Windows.Defender.Engine.Maps.Heartbeat
|
||||
|
||||
Heartbeat is sent once a day to indicate Defender is running and functional. Event includes necessary information to understand health of Defender on the device.
|
||||
@ -2315,6 +2402,26 @@ The following fields are available:
|
||||
- **SignatureRing** Signature ring used for deployments
|
||||
- **SigVersion** Version of signature VDMs
|
||||
|
||||
|
||||
### Microsoft.Windows.Security.SBServicing.ApplySecureBootUpdateFveAction
|
||||
|
||||
Event that indicates BitLocker TPM reseal action was triggered during Secure boot update
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **Action** Action string indicating place of failure
|
||||
- **hr** Return HRESULT code
|
||||
|
||||
### Microsoft.Windows.Security.SBServicing.ApplySecureBootUpdateStarted
|
||||
|
||||
Event that indicates secure boot update has started.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **AvailableUpdates** Number of available secure boot updates.
|
||||
- **SecureBootUpdateCaller** Enum value indicating if this is a servicing or an upgrade.
|
||||
|
||||
|
||||
### Microsoft.Windows.UpdateAssistantApp.UpdateAssistantStartState
|
||||
|
||||
This event marks the start of an Update Assistant State. The data collected with this event is used to help keep Windows up to date.
|
||||
@ -2335,8 +2442,6 @@ The following fields are available:
|
||||
|
||||
This event fires when HVCI is already enabled so no need to continue auto-enablement.
|
||||
|
||||
|
||||
|
||||
### ShellWNSRegistration.SLSChannelRegistrationFailed
|
||||
|
||||
This event is logged when the upload of a channel URI to the SLS service fails.
|
||||
@ -2384,8 +2489,6 @@ The following fields are available:
|
||||
- **RetryAttempt** The retry attempt number for attempting to open and register the channel.
|
||||
- **RetryTimeInMilliseconds** The amount of time taken to retry the channel request in milliseconds.
|
||||
|
||||
|
||||
|
||||
## Privacy consent logging events
|
||||
|
||||
### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted
|
||||
@ -3592,6 +3695,8 @@ The following fields are available:
|
||||
|
||||
Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CallerName** Name of the application making the Windows Update Request. Used to identify context of the request.
|
||||
- **EndpointUrl** Ensures Windows Updates are secure and complete. Event helps to identify whether update content has been tampered with and protects against man-in-the-middle attack.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode wasn't specific enough.
|
||||
@ -3656,3 +3761,6 @@ The following fields are available:
|
||||
- **SessionId** The UpdateAgent “SessionId” value.
|
||||
- **UpdateId** Unique identifier for the Update.
|
||||
- **WuId** Unique identifier for the Windows Update client.
|
||||
|
||||
|
||||
|
||||
|
@ -3,12 +3,12 @@ description: Learn more about the Windows 11 diagnostic data gathered at the bas
|
||||
title: Required diagnostic events and fields for Windows 11, version 21H2
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-privacy
|
||||
localizationpriority: high
|
||||
ms.localizationpriority: high
|
||||
author: DHB-MSFT
|
||||
ms.author: danbrown
|
||||
manager: laurawi
|
||||
ms.date: 09/26/2023
|
||||
ms.collection: highpri
|
||||
ms.date: 02/29/2024
|
||||
ms.collection: privacy-windows
|
||||
ms.topic: reference
|
||||
---
|
||||
|
||||
@ -51,8 +51,8 @@ The following fields are available:
|
||||
- **ContentId** The Content ID of the package. Key for content updates.
|
||||
- **ContentType** The type of content being installed, mapped from XVD_CONTENT_TYPE.
|
||||
- **Cv** The correlation vector for this install or action. If this is the Cv to a specific action, the RelatedCv field will contain the Cv for the install.
|
||||
- **DestinationHardwareID** The hardware ID of the destination device, if it is external storage. Empty if not an external storage device.
|
||||
- **DestinationPath** The path to the destination we are installing to.
|
||||
- **DestinationHardwareID** The hardware ID of the destination device, if it's external storage. Empty if not an external storage device.
|
||||
- **DestinationPath** The path to the destination we're installing to.
|
||||
- **DownloadSize** The size in bytes needed to download the package.
|
||||
- **ErrorText** Optional text describing any errors.
|
||||
- **InstallationActionId** The type of action ( 0 - Unknown, 1 - Install Started, 2 - Install Paused, 3 - Install Resumed, 4 - Installation Ready to Play, 5 - Change Source (Merged Install), 6 - Install Error, 7 - Install Complete, 8 - Install Aborted, 9 - Change Source (Auto Select), 10 - Change Source (Apply Update))
|
||||
@ -68,8 +68,8 @@ The following fields are available:
|
||||
- **ProductId** The product ID of the application associated with this event.
|
||||
- **RelatedCv** The related correlation vector. This optional value contains the correlation vector for this install if the Cv value is representing an action tracked by a correlation vector.
|
||||
- **RequestSpecifiers** The map of Intelligent Delivery region specifiers requested by the system/user/title as a part of the install activity.
|
||||
- **SourceHardwareID** The hardware ID of the source device, if it is external storage. Empty if not an external storage device.
|
||||
- **SourcePath** The source path we are installing from. May be a CDN (Content Delivery Network) or a local disk drive.
|
||||
- **SourceHardwareID** The hardware ID of the source device, if it's external storage. Empty if not an external storage device.
|
||||
- **SourcePath** The source path we're installing from. May be a CDN (Content Delivery Network) or a local disk drive.
|
||||
- **TotalPercentComplete** The percent of install that is complete.
|
||||
- **XvddType** The type of the streaming operation as determined by the XVDD driver.
|
||||
|
||||
@ -205,7 +205,7 @@ The following fields are available:
|
||||
- **AppraiserVersion** The version of the appraiser file generating the events.
|
||||
- **IsBootCritical** Indicates whether the device boot is critical.
|
||||
- **SdbEntries** Deprecated in RS3.
|
||||
- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update.
|
||||
- **WuDriverCoverage** Indicates whether there's a driver uplevel for this device, according to Windows Update.
|
||||
- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver.
|
||||
- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update.
|
||||
|
||||
@ -268,7 +268,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd
|
||||
|
||||
This event sends blocking data about any compatibility blocking entries on the system that are not directly related to specific applications or devices, to help keep Windows up to date.
|
||||
This event sends blocking data about any compatibility blocking entries on the system that aren't directly related to specific applications or devices, to help keep Windows up to date.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -303,7 +303,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd
|
||||
|
||||
This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
||||
This event sends compatibility database information about non-blocking compatibility entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -394,8 +394,8 @@ The following fields are available:
|
||||
- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB,
|
||||
- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade.
|
||||
- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed.
|
||||
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade.
|
||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade.
|
||||
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It doesn't block upgrade.
|
||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It doesn't block upgrade.
|
||||
- **SoftBlock** The file is softblocked in the SDB and has a warning.
|
||||
|
||||
|
||||
@ -434,14 +434,14 @@ The following fields are available:
|
||||
- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate?
|
||||
- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked?
|
||||
- **BlockingDevice** Is this PNP device blocking upgrade?
|
||||
- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS?
|
||||
- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and doesn't have a driver included with the OS?
|
||||
- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device?
|
||||
- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device?
|
||||
- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device.
|
||||
- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device?
|
||||
- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update?
|
||||
- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device?
|
||||
- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden?
|
||||
- **DriverBlockOverridden** Is there's a driver block on the device that has been overridden?
|
||||
- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device?
|
||||
- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS?
|
||||
- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade?
|
||||
@ -511,7 +511,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd
|
||||
|
||||
This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
||||
This event sends compatibility decision data about blocking entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -525,7 +525,7 @@ The following fields are available:
|
||||
- **SdbBlockUpgrade** Is a matching info block blocking upgrade?
|
||||
- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag?
|
||||
- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag?
|
||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade.
|
||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It doesn't block upgrade.
|
||||
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove
|
||||
@ -552,7 +552,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd
|
||||
|
||||
This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
||||
This event sends compatibility decision data about non-blocking entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -875,7 +875,7 @@ The following fields are available:
|
||||
- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64.
|
||||
- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets.
|
||||
- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets.
|
||||
- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata.
|
||||
- **BoeProgramId** If there's no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata.
|
||||
- **CompanyName** The company name of the vendor who developed this file.
|
||||
- **FileId** A hash that uniquely identifies a file.
|
||||
- **FileVersion** The File version field from the file metadata under Properties -> Details.
|
||||
@ -1019,7 +1019,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd
|
||||
|
||||
This event runs only during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. It is critical in understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. The data collected with this event is used to help keep Windows up to date.
|
||||
This event runs only during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. It's critical in understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. The data collected with this event is used to help keep Windows up to date.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -1387,7 +1387,7 @@ The following fields are available:
|
||||
- **PCFP** An ID for the system calculated by hashing hardware identifiers.
|
||||
- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal.
|
||||
- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row.
|
||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device.
|
||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it's understood that data events won't be received from this device.
|
||||
- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime.
|
||||
- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic.
|
||||
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and therefore is making decisions using up-to-date driver coverage information.
|
||||
@ -1404,7 +1404,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.WmdrmAdd
|
||||
|
||||
This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place.
|
||||
This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data doesn't indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place.
|
||||
|
||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||
|
||||
@ -1416,7 +1416,7 @@ The following fields are available:
|
||||
- **WmdrmApiResult** Raw value of the API used to gather DRM state.
|
||||
- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs.
|
||||
- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased.
|
||||
- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed.
|
||||
- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup wasn't dismissed.
|
||||
- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses.
|
||||
- **WmdrmPurchased** Indicates if the system has any files with permanent licenses.
|
||||
|
||||
@ -1446,7 +1446,7 @@ The following fields are available:
|
||||
|
||||
### Census.Azure
|
||||
|
||||
This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that are not part of the “Azure fleet”) return empty data sets. The data collected with this event is used to help keep Windows secure.
|
||||
This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that aren't part of the “Azure fleet”) return empty data sets. The data collected with this event is used to help keep Windows secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -1540,7 +1540,7 @@ The following fields are available:
|
||||
- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass).
|
||||
- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.)
|
||||
- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device.
|
||||
- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date.
|
||||
- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device isn't reprocessed even if the clean OEM name is changed at a later date.
|
||||
- **OEMModelBaseBoard** The baseboard model used by the OEM.
|
||||
- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices.
|
||||
- **OEMModelNumber** The device model number.
|
||||
@ -1567,7 +1567,7 @@ This event sends data about the memory on the device, including ROM and RAM. The
|
||||
The following fields are available:
|
||||
|
||||
- **TotalPhysicalRAM** Represents the physical memory (in MB).
|
||||
- **TotalVisibleMemory** Represents the memory that is not reserved by the system.
|
||||
- **TotalVisibleMemory** Represents the memory that isn't reserved by the system.
|
||||
|
||||
|
||||
### Census.Network
|
||||
@ -1577,8 +1577,8 @@ This event sends data about the mobile and cellular network used by the device (
|
||||
The following fields are available:
|
||||
|
||||
- **CellularModemHWInstanceId0** HardwareInstanceId of the embedded Mobile broadband modem, as reported and used by PnP system to identify the WWAN modem device in Windows system. Empty string (null string) indicates that this property is unknown for telemetry.
|
||||
- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||
- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||
- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft doesn't have access to mobile operator billing data so collecting this data doesn't expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||
- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft doesn't have access to mobile operator billing data so collecting this data doesn't expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||
- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||
- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||
- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||
@ -1595,7 +1595,7 @@ The following fields are available:
|
||||
|
||||
### Census.OS
|
||||
|
||||
This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it's a virtual device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -1612,7 +1612,7 @@ The following fields are available:
|
||||
- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go
|
||||
- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI.
|
||||
- **LanguagePacks** The list of language packages installed on the device.
|
||||
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store.
|
||||
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we're running an OS License granted by the MS store.
|
||||
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
||||
- **OSEdition** Retrieves the version of the current OS.
|
||||
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc
|
||||
@ -1629,14 +1629,14 @@ The following fields are available:
|
||||
- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy.
|
||||
- **ServiceProductKeyID** Retrieves the License key of the KMS
|
||||
- **SharedPCMode** Returns Boolean for devices that have enabled the configuration EnableSharedPCMode.
|
||||
- **Signature** Retrieves if it is a signature machine sold by Microsoft store.
|
||||
- **Signature** Retrieves if it's a signature machine sold by Microsoft store.
|
||||
- **SLICStatus** Whether a SLIC table exists on the device.
|
||||
- **SLICVersion** Returns OS type/version from SLIC table.
|
||||
|
||||
|
||||
### Census.PrivacySettings
|
||||
|
||||
This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent wasn't configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -1807,7 +1807,7 @@ The following fields are available:
|
||||
|
||||
### Census.UserPrivacySettings
|
||||
|
||||
This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent wasn't configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -1860,7 +1860,7 @@ The following fields are available:
|
||||
- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor.
|
||||
- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present.
|
||||
- **IsVDI** Is the device using Virtual Desktop Infrastructure?
|
||||
- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors.
|
||||
- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field shouldn't be relied upon for non-Hv#1 Hypervisors.
|
||||
- **IsWVDSessionHost** Indicates if this is a Windows Virtual Device session host.
|
||||
- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware.
|
||||
- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware.
|
||||
@ -1880,11 +1880,11 @@ The following fields are available:
|
||||
- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting
|
||||
- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades.
|
||||
- **IsHotPatchEnrolled** Represents the current state of the device in relation to enrollment in the hotpatch program.
|
||||
- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it?
|
||||
- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device didn't install it?
|
||||
- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update?
|
||||
- **OSAssessmentForQualityUpdate** Is the device on the latest quality update?
|
||||
- **OSAssessmentForSecurityUpdate** Is the device on the latest security update?
|
||||
- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it?
|
||||
- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device didn't install it?
|
||||
- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment.
|
||||
- **OSRollbackCount** The number of times feature updates have rolled back on the device.
|
||||
- **OSRolledBack** A flag that represents when a feature update has rolled back during setup.
|
||||
@ -1967,7 +1967,7 @@ Fires when driver scanning fails to get results.
|
||||
|
||||
### Microsoft.Windows.Security.CodeIntegrity.HVCISysprep.HvciScanningDriverInSdbError
|
||||
|
||||
Fires when there is an error checking the SDB for a particular driver.
|
||||
Fires when there's an error checking the SDB for a particular driver.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2076,7 +2076,7 @@ Describes the device-related fields.
|
||||
The following fields are available:
|
||||
|
||||
- **deviceClass** The device classification. For example, Desktop, Server, or Mobile.
|
||||
- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId
|
||||
- **localId** A locally-defined unique ID for the device. This isn't the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId
|
||||
- **make** Device manufacturer.
|
||||
- **model** Device model.
|
||||
|
||||
@ -2146,7 +2146,7 @@ The following fields are available:
|
||||
|
||||
- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token.
|
||||
- **locale** The language and region.
|
||||
- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID.
|
||||
- **localId** Represents a unique user identity that is created locally and added by the client. This isn't the user's account ID.
|
||||
|
||||
|
||||
### Common Data Extensions.utc
|
||||
@ -2169,7 +2169,7 @@ The following fields are available:
|
||||
- **popSample** Represents the effective sample rate for this event at the time it was generated by a client.
|
||||
- **providerGuid** The ETW provider ID associated with the provider name.
|
||||
- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW.
|
||||
- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server.
|
||||
- **seq** Represents the sequence field used to track absolute order of uploaded events. It's an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server.
|
||||
- **sqmId** The Windows SQM (Software Quality Metrics—a precursor of Windows 10 Diagnostic Data collection) device identifier.
|
||||
- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID.
|
||||
- **wcmp** The Windows Shell Composer ID.
|
||||
@ -2386,12 +2386,12 @@ The following fields are available:
|
||||
|
||||
### TelClientSynthetic.AbnormalShutdown_0
|
||||
|
||||
This event sends data about boot IDs for which a normal clean shutdown was not observed. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
This event sends data about boot IDs for which a normal clean shutdown wasn't observed. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event.
|
||||
- **AbsCausedbyAutoChk** This flag is set when AutoCheck forces a device restart to indicate that the shutdown was not an abnormal shutdown.
|
||||
- **AbsCausedbyAutoChk** This flag is set when AutoCheck forces a device restart to indicate that the shutdown wasn't an abnormal shutdown.
|
||||
- **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in.
|
||||
- **BatteryLevelAtLastShutdown** The last recorded battery level.
|
||||
- **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown.
|
||||
@ -2432,7 +2432,7 @@ The following fields are available:
|
||||
- **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on.
|
||||
- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press.
|
||||
- **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API.
|
||||
- **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition.
|
||||
- **SleepCheckpoint** Provides the last checkpoint when there's a failure during a sleep transition.
|
||||
- **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file.
|
||||
- **SleepCheckpointStatus** Indicates whether the checkpoint information is valid.
|
||||
- **StaleBootStatData** Identifies if the data from bootstat is stale.
|
||||
@ -2458,50 +2458,50 @@ The following fields are available:
|
||||
|
||||
### TelClientSynthetic.AuthorizationInfo_RuntimeTransition
|
||||
|
||||
This event is fired by UTC at state transitions to signal what data we are allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
This event is fired by UTC at state transitions to signal what data we're allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
||||
- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise.
|
||||
- **CanCollectClearUserIds** True if we are allowed to collect clear user IDs, false if we can only collect omitted IDs.
|
||||
- **CanCollectAnyTelemetry** True if we're allowed to collect partner telemetry, false otherwise.
|
||||
- **CanCollectClearUserIds** True if we're allowed to collect clear user IDs, false if we can only collect omitted IDs.
|
||||
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
||||
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
||||
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
||||
- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise.
|
||||
- **CanIncludeDeviceNameInDiagnosticData** True if we are allowed to add the device name to diagnostic data, false otherwise.
|
||||
- **CanIncludeDeviceNameInDiagnosticData** True if we're allowed to add the device name to diagnostic data, false otherwise.
|
||||
- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise.
|
||||
- **CanPerformSiufEscalations** True if we can perform SIUF escalation collection, false otherwise.
|
||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||
- **CanReportUifEscalations** True if we can report UIF escalation, false otherwise.
|
||||
- **CanUseAuthenticatedProxy** True if we can use authenticated proxy, false otherwise.
|
||||
- **IsProcessorMode** True if it is Processor Mode, false otherwise.
|
||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
||||
- **TransitionFromEverythingOff** True if we're transitioning from all telemetry being disabled, false otherwise.
|
||||
|
||||
|
||||
### TelClientSynthetic.AuthorizationInfo_Startup
|
||||
|
||||
This event is fired by UTC at startup to signal what data we are allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
This event is fired by UTC at startup to signal what data we're allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
||||
- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise.
|
||||
- **CanCollectClearUserIds** True if we are allowed to collect clear user IDs, false if we can only collect omitted IDs.
|
||||
- **CanCollectAnyTelemetry** True if we're allowed to collect partner telemetry, false otherwise.
|
||||
- **CanCollectClearUserIds** True if we're allowed to collect clear user IDs, false if we can only collect omitted IDs.
|
||||
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
||||
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
||||
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
||||
- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise.
|
||||
- **CanIncludeDeviceNameInDiagnosticData** True if we are allowed to add the device name to diagnostic data, false otherwise.
|
||||
- **CanIncludeDeviceNameInDiagnosticData** True if we're allowed to add the device name to diagnostic data, false otherwise.
|
||||
- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise.
|
||||
- **CanPerformSiufEscalations** True if we can perform System Initiated User Feedback escalation collection, false otherwise.
|
||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||
- **CanReportUifEscalations** True if we can perform User Initiated Feedback escalation collection, false otherwise.
|
||||
- **CanUseAuthenticatedProxy** True if we can use an authenticated proxy to send data, false otherwise.
|
||||
- **IsProcessorMode** True if it is Processor Mode, false otherwise.
|
||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
||||
- **TransitionFromEverythingOff** True if we're transitioning from all telemetry being disabled, false otherwise.
|
||||
|
||||
|
||||
### TelClientSynthetic.ConnectivityHeartBeat_0
|
||||
@ -2569,7 +2569,7 @@ The following fields are available:
|
||||
- **VortexHttpAttempts** Number of attempts to contact Vortex.
|
||||
- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex.
|
||||
- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex.
|
||||
- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400.
|
||||
- **VortexHttpResponseFailures** Number of Vortex responses that aren't 2XX or 400.
|
||||
- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event.
|
||||
|
||||
|
||||
@ -2723,7 +2723,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd
|
||||
|
||||
This event sends data about the driver installation once it is completed. The data collected with this event is used to help keep Windows up to date and performing properly.
|
||||
This event sends data about the driver installation once it's completed. The data collected with this event is used to help keep Windows up to date and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2832,7 +2832,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.FaultReporting.AppCrashEvent
|
||||
|
||||
This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event.
|
||||
This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It doesn't contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2842,7 +2842,7 @@ The following fields are available:
|
||||
- **AppVersion** The version of the app that has crashed.
|
||||
- **ExceptionCode** The exception code returned by the process that has crashed.
|
||||
- **ExceptionOffset** The address where the exception had occurred.
|
||||
- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting.
|
||||
- **Flags** Flags indicating how reporting is done. For example, queue the report, don't offer JIT debugging, or don't terminate the process after reporting.
|
||||
- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name.
|
||||
- **IsFatal** True/False to indicate whether the crash resulted in process termination.
|
||||
- **ModName** Exception module name (e.g. bar.dll).
|
||||
@ -2914,7 +2914,7 @@ This event indicates that the uninstall was properly configured and that a syste
|
||||
|
||||
### Microsoft.Windows.HangReporting.AppHangEvent
|
||||
|
||||
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events.
|
||||
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It doesn't contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and won't produce AppHang events.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2933,8 +2933,8 @@ The following fields are available:
|
||||
- **TargetAsId** The sequence number for the hanging process.
|
||||
- **TypeCode** Bitmap describing the hang type.
|
||||
- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application.
|
||||
- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting.
|
||||
- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting.
|
||||
- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it's waiting.
|
||||
- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it's waiting.
|
||||
- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package.
|
||||
|
||||
|
||||
@ -2988,7 +2988,6 @@ The following fields are available:
|
||||
- **PreviousExecutionState** Windows Mixed Reality Portal app prior execution state.
|
||||
- **wilActivity** Windows Mixed Reality Portal app wilActivity ID.
|
||||
|
||||
|
||||
### Microsoft.Windows.Shell.HolographicFirstRun.AppLifecycleService_Resuming
|
||||
|
||||
This event indicates Windows Mixed Reality Portal app resuming. This event is also used to count WMR device. The data collected with this event is used to keep Windows performing properly.
|
||||
@ -3060,7 +3059,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum
|
||||
|
||||
This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. The data collected with this event is used to keep Windows performing properly.
|
||||
This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they'll always represent a count of a given object. The data collected with this event is used to keep Windows performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -3141,7 +3140,7 @@ The following fields are available:
|
||||
- **RootDirPath** The path to the root directory where the program was installed.
|
||||
- **Source** How the program was installed (for example, ARP, MSI, Appx).
|
||||
- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp.
|
||||
- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen.
|
||||
- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it's a service. Application and BOE are the ones most likely seen.
|
||||
- **Version** The version number of the program.
|
||||
|
||||
|
||||
@ -3712,7 +3711,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Kernel.Power.PreviousShutdownWasThermalShutdown
|
||||
|
||||
This event sends Product and Service Performance data on which area of the device exceeded safe temperature limits and caused the device to shutdown. This information is used to ensure devices are behaving as they are expected to. The data collected with this event is used to keep Windows performing properly.
|
||||
This event sends Product and Service Performance data on which area of the device exceeded safe temperature limits and caused the device to shutdown. This information is used to ensure devices are behaving as they're expected to. The data collected with this event is used to keep Windows performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -3730,16 +3729,16 @@ The following fields are available:
|
||||
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [ExperimentationAndConfigurationServiceControl](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -3765,15 +3764,15 @@ The following fields are available:
|
||||
- **appCohortHint** A machine-readable enum indicating that the client has a desire to switch to a different release cohort. The exact legal values are app-specific and should be shared between the server and app implementations. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value is not known. Please see the wiki for additional information. Default: '-2'.
|
||||
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client should not transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. Please see the wiki for additional information. Default: '-2'.
|
||||
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client shouldn't transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
||||
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
||||
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
||||
- **appLang** The language of the product install, in IETF BCP 47 representation. Default: ''.
|
||||
- **appLastLaunchTime** The time when browser was last launched.
|
||||
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event was not completed before OOBE finishes; -1 means the field does not apply.
|
||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field doesn't apply.
|
||||
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
||||
- **appPingEventDownloadMetricsCdnCID** Numeric value used to internally track the origins of the updated binaries. For example, 2.
|
||||
- **appPingEventDownloadMetricsDownloadedBytes** For events representing a download, the number of bytes expected to be downloaded. For events representing an entire update flow, the sum of all such expected bytes over the course of the update flow. Default: '0'.
|
||||
@ -3790,26 +3789,26 @@ The following fields are available:
|
||||
- **appPingEventExtraCode1** Additional numeric information about the operation's result, encoded as a signed, base-10 integer. Default: '0'.
|
||||
- **appPingEventInstallTimeMs** For events representing an install, the time elapsed between the start of the install and the end of the install, in milliseconds. For events representing an entire update flow, the sum of all such durations. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||
- **appPingEventNumBytesDownloaded** The number of bytes downloaded for the specified application. Default: '0'.
|
||||
- **appPingEventPackageCacheResult** Whether there is an existing package cached in the system to update or install. 1 means that there's a cache hit under the expected key, 2 means there's a cache hit under a different key, 0 means that there's a cache miss. -1 means the field does not apply.
|
||||
- **appPingEventPackageCacheResult** Whether there's an existing package cached in the system to update or install. 1 means that there's a cache hit under the expected key, 2 means there's a cache hit under a different key, 0 means that there's a cache miss. -1 means the field doesn't apply.
|
||||
- **appPingEventSequenceId** An id that uniquely identifies particular events within one requestId. Since a request can contain multiple ping events, this field is necessary to uniquely identify each possible event.
|
||||
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a "urls" tag.
|
||||
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||
- **appReferralHash** The hash of the referral code used to install the product. '0' if unknown. Default: '0'.
|
||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they have not.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server should not return an update instruction to a version number that does not match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it is not a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they haven't.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server shouldn't return an update instruction to a version number that doesn't match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
||||
- **appVersion** The version of the product install. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **eventType** A string indicating the type of the event. Please see the wiki for additional information.
|
||||
- **expETag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
||||
- **hwDiskType** Device’s hardware disk type.
|
||||
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware does not support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware does not support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware does not support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware does not support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware does not support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware does not support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware does not support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware doesn't support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware doesn't support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware doesn't support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware doesn't support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware doesn't support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware doesn't support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware doesn't support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||
- **hwLogicalCpus** Number of logical CPUs of the device.
|
||||
- **hwPhysmemory** The physical memory available to the client, truncated down to the nearest gibibyte. '-1' if unknown. This value is intended to reflect the maximum theoretical storage capacity of the client, not including any hard drive or paging to a hard drive or peripheral. Default: '-1'.
|
||||
- **isMsftDomainJoined** '1' if the client is a member of a Microsoft domain. '0' otherwise. Default: '0'.
|
||||
@ -3830,7 +3829,7 @@ The following fields are available:
|
||||
- **requestRequestId** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha request. Each request attempt should have (with high probability) a unique request id. Default: ''.
|
||||
- **requestSessionCorrelationVectorBase** A client generated random MS Correlation Vector base code used to correlate the update session with update and CDN servers. Default: ''.
|
||||
- **requestSessionId** A randomly-generated (uniformly distributed) GUID. Each single update flow (e.g. update check, update application, event ping sequence) should have (with high probability) a single unique session ID. Default: ''.
|
||||
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and should not be counted toward normal metrics. Default: ''.
|
||||
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and shouldn't be counted toward normal metrics. Default: ''.
|
||||
- **requestUid** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha user. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
||||
|
||||
|
||||
@ -3963,6 +3962,55 @@ The following fields are available:
|
||||
|
||||
## Other events
|
||||
|
||||
### Microsoft.Gaming.Install.MinecraftMigration
|
||||
|
||||
Minecraft specific event to track updates from one app version to another.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **FailurePhase** Failure phase.
|
||||
- **MigrationHr** Migration HResult.
|
||||
- **TimeTakenMs** Total migration time in milliseconds.
|
||||
- **UWPPackageFullName** Full name of the UWP package.
|
||||
|
||||
|
||||
### Microsoft.Gaming.PurchaseExperience.Error
|
||||
|
||||
Event fired when an error is encountered during the Purchase Experience.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **callstack** The callstack where the error occurred.
|
||||
- **customAttributes** GTL custom attributes section for each app to add its own additional data.
|
||||
- **errorCode** errorCode indicating the error.
|
||||
- **extendedData** GTL extended data section for each app to add its own extensions.
|
||||
- **identifier** error identifier.
|
||||
- **message** error message.
|
||||
|
||||
|
||||
### Microsoft.Gaming.PurchaseExperience.PageAction
|
||||
|
||||
Event fired when the user interacts with any CTAs during the Purchase Experience.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **countsAsFeatureUsage** GTL flag to help attribute page action to a feature.
|
||||
- **customAttributes** GTL custom attributes section for each app to add its own additional data.
|
||||
- **extendedData** GTL extended data section for each app to add its own extensions.
|
||||
- **timeToActionMs** Time in MS for this Page Action.
|
||||
|
||||
|
||||
### Microsoft.Surface.Mcu.Prod.CriticalLog
|
||||
|
||||
Error information from Surface device firmware.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CUtility::GetTargetNameA(target)** Product identifier.
|
||||
- **productId** Product identifier
|
||||
- **uniqueId** Correlation ID that can be used with Watson to get more details about the failure.
|
||||
|
||||
|
||||
### Microsoft.Windows.Defender.Engine.Maps.Heartbeat
|
||||
|
||||
Heartbeat is sent once a day to indicate Defender is running and functional. Event includes necessary information to understand health of Defender on the device.
|
||||
@ -3988,6 +4036,25 @@ The following fields are available:
|
||||
- **SignatureRing** Signature ring used for deployments
|
||||
- **SigVersion** Version of signature VDMs
|
||||
|
||||
|
||||
### Microsoft.Windows.SecureBootTelemetry.SecureBootEncodeUEFI
|
||||
|
||||
Information about Secure Boot configuration including the PK, KEKs, DB and DBX files on the device.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **SecureBootUEFIEncoding** Information about the PK, KEKs, DB and DBX files on the device.
|
||||
|
||||
|
||||
### XboxSystemFlightRecorder.SmcErrorLog
|
||||
|
||||
This event collects critical log files related to Xbox hardware failures.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **SmcerrLog** Binary payload of the error log from the Xbox console.
|
||||
|
||||
|
||||
## Privacy consent logging events
|
||||
|
||||
### Microsoft.Windows.Shell.PrivacyConsentLogging.PrivacyConsentCompleted
|
||||
@ -4026,7 +4093,7 @@ The following fields are available:
|
||||
|
||||
- **Action** It indicates phase/stage of operation.
|
||||
- **Detail** It indicates details about the phase/stage of the operation.
|
||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
||||
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||
- **Status** It indicates details about the status for getting the disk device object during boot.
|
||||
|
||||
|
||||
@ -4038,7 +4105,7 @@ The following fields are available:
|
||||
|
||||
- **Action** It indicates phase/stage of operation.
|
||||
- **Detail** It indicates details about the phase/stage of the operation.
|
||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
||||
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||
- **Status** It indicates details about the status for getting the disk device object during boot.
|
||||
|
||||
|
||||
@ -4050,7 +4117,7 @@ The following fields are available:
|
||||
|
||||
- **Action** It indicates phase/stage of operation. As success event fires on exiting the operation, this value must be 'Exiting'.
|
||||
- **Duration(ms)** Duration of filter setup instance operation in milliseconds.
|
||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
||||
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||
|
||||
|
||||
### Microsoft.Windows.Setup.WinSetupBoot.Warning
|
||||
@ -4138,7 +4205,7 @@ The following fields are available:
|
||||
- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion.
|
||||
- **AllowCachedResults** Indicates if the scan allowed using cached results.
|
||||
- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable
|
||||
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null.
|
||||
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine doesn't exist, the value is null.
|
||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||
- **ClientVersion** The version number of the software distribution client.
|
||||
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0.
|
||||
@ -4159,7 +4226,7 @@ The following fields are available:
|
||||
- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan
|
||||
- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down.
|
||||
- **Online** Indicates if this was an online scan.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||
- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one
|
||||
- **ScanDurationInSeconds** The number of seconds a scan took
|
||||
@ -4180,7 +4247,7 @@ This event sends tracking data about the software distribution client download o
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found.
|
||||
- **BundleId** Identifier associated with the specific content bundle; shouldn't be all zeros if the bundleID was found.
|
||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||
- **ClientVersion** The version number of the software distribution client.
|
||||
@ -4198,7 +4265,7 @@ The following fields are available:
|
||||
- **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device.
|
||||
- **IsWUfBTargetVersionEnabled** Flag that indicates if the Windows Update for Business target version policy is enabled on the device.
|
||||
- **PackageFullName** The package name of the content.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||
- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background.
|
||||
- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content.
|
||||
@ -4302,7 +4369,7 @@ The following fields are available:
|
||||
- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request.
|
||||
- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments.
|
||||
- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode wasn't specific enough.
|
||||
- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed.
|
||||
- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce
|
||||
- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID).
|
||||
@ -4315,7 +4382,7 @@ The following fields are available:
|
||||
- **SignatureAlgorithm** The hash algorithm for the metadata signature.
|
||||
- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast
|
||||
- **StatusCode** Result code of the event (success, cancellation, failure code HResult).
|
||||
- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed.
|
||||
- **TimestampTokenId** The time this was created. It's encoded in a timestamp blob and will be zero if the token is malformed.
|
||||
- **UpdateId** The update ID for a specific piece of content.
|
||||
|
||||
|
||||
@ -4920,7 +4987,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsPushNotificationStatus
|
||||
|
||||
This event is received when there is status on a push notification. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
This event is received when there's status on a push notification. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -4946,7 +5013,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsServiceStarted
|
||||
|
||||
This event is sent when the service first starts. It is a heartbeat indicating that the service is available on the device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
This event is sent when the service first starts. It's a heartbeat indicating that the service is available on the device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -5201,7 +5268,7 @@ The following fields are available:
|
||||
- **FlightId** Unique ID for the flight (test instance version).
|
||||
- **IsSuspendable** Indicates whether the update has the ability to be suspended and resumed at the time of reboot. When the machine is rebooted and the update is in middle of Predownload or Install and Setup.exe is running, this field is TRUE, if not its FALSE.
|
||||
- **ObjectId** The unique value for each Update Agent mode.
|
||||
- **Reason** Indicates the HResult why the machine could not be suspended. If it is successfully suspended, the result is 0.
|
||||
- **Reason** Indicates the HResult why the machine couldn't be suspended. If it's successfully suspended, the result is 0.
|
||||
- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan.
|
||||
- **ScenarioId** The ID of the update scenario.
|
||||
- **SessionId** The ID of the update attempt.
|
||||
@ -5604,8 +5671,8 @@ The following fields are available:
|
||||
- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on.
|
||||
- **usingBackupFeatureAssessment** Relying on backup feature assessment.
|
||||
- **usingBackupQualityAssessment** Relying on backup quality assessment.
|
||||
- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run.
|
||||
- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run.
|
||||
- **usingCachedFeatureAssessment** WaaS Medic run didn't get OS build age from the network on the previous run.
|
||||
- **usingCachedQualityAssessment** WaaS Medic run didn't get OS revision age from the network on the previous run.
|
||||
- **versionString** Version of the WaaSMedic engine.
|
||||
- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter.
|
||||
|
||||
@ -5707,6 +5774,17 @@ The following fields are available:
|
||||
- **WUContentId** The Windows Update content ID.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.BeginGetFreeEntitlement
|
||||
|
||||
Tracks the beginning of the call to get a free app entitlement.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CampaignId** Marketing Campaign Identifier.
|
||||
- **StoreId** App Store Catalog Id.
|
||||
- **UseDeviceId** Boolean value to select whether the entitlement should be a device versus a user entitlement.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds
|
||||
|
||||
This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure.
|
||||
@ -5789,13 +5867,25 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate
|
||||
|
||||
This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure.
|
||||
This event is sent when an app update requires an updated Framework package and the process starts to download it. It's used to help keep Windows up-to-date and secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **HResult** The result code of the last action performed before this operation.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndGetFreeEntitlement
|
||||
|
||||
Telemetry is fired at the end of the call to request an free app entitlement, which will make a server call to get the entitlement.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CampaignId** Campaign marketing Id.
|
||||
- **HResult** Error result.
|
||||
- **StoreId** Store Catalog Id of item requesting ownership.
|
||||
- **UseDeviceId** Boolean value to select whether the entitlement should be a device versus a user entitlement.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds
|
||||
|
||||
This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure.
|
||||
@ -5847,7 +5937,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages
|
||||
|
||||
This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure.
|
||||
This event is sent after searching for update packages to install. It's used to help keep Windows up-to-date and secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -5873,7 +5963,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData
|
||||
|
||||
This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure.
|
||||
This event is sent after restoring user data (if any) that needs to be restored following a product install. It's used to keep Windows up-to-date and secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -6026,7 +6116,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.StateTransition
|
||||
|
||||
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there is a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure.
|
||||
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there's a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -6213,7 +6303,7 @@ This event collects information regarding the state of devices and drivers on th
|
||||
The following fields are available:
|
||||
|
||||
- **activated** Whether the entire device manifest update is considered activated and in use.
|
||||
- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis.
|
||||
- **analysisErrorCount** The number of driver packages that couldn't be analyzed because errors occurred during analysis.
|
||||
- **flightId** Unique ID for each flight.
|
||||
- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system.
|
||||
- **missingUpdateCount** The number of updates in the device manifest that are missing from the system.
|
||||
@ -6224,8 +6314,8 @@ The following fields are available:
|
||||
- **sessionId** Unique value for each update session.
|
||||
- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match.
|
||||
- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string.
|
||||
- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string.
|
||||
- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string.
|
||||
- **truncatedDeviceCount** The number of devices missing from the summary string because there isn't enough room in the string.
|
||||
- **truncatedDriverCount** The number of driver packages missing from the summary string because there isn't enough room in the string.
|
||||
- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices.
|
||||
- **updateId** The unique ID for each update.
|
||||
|
||||
@ -6403,7 +6493,7 @@ This event signifies an update being approved around the OOBE time period. The d
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **approved** Flag to determine if it is approved or not.
|
||||
- **approved** Flag to determine if it's approved or not.
|
||||
- **provider** The provider related to which the update is approved.
|
||||
- **publisherIntent** The publisher intent of the Update.
|
||||
- **update** Additional information about the Update.
|
||||
@ -6527,9 +6617,9 @@ The following fields are available:
|
||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||
- **MountedImageCount** The number of mounted images.
|
||||
- **MountedImageMatches** The number of mounted image matches.
|
||||
- **MountedImagesFailed** The number of mounted images that could not be removed.
|
||||
- **MountedImagesFailed** The number of mounted images that couldn't be removed.
|
||||
- **MountedImagesRemoved** The number of mounted images that were successfully removed.
|
||||
- **MountedImagesSkipped** The number of mounted images that were not found.
|
||||
- **MountedImagesSkipped** The number of mounted images that weren't found.
|
||||
- **RelatedCV** The correlation vector value generated from the latest USO scan.
|
||||
- **Result** HResult of this operation.
|
||||
- **ScenarioId** ID indicating the mitigation scenario.
|
||||
@ -6573,7 +6663,7 @@ The following fields are available:
|
||||
- **RelatedCV** Correlation vector value generated from the latest USO scan.
|
||||
- **ReparsePointsFailed** Number of reparse points that are corrupted but we failed to fix them.
|
||||
- **ReparsePointsFixed** Number of reparse points that were corrupted and were fixed by this mitigation.
|
||||
- **ReparsePointsSkipped** Number of reparse points that are not corrupted and no action is required.
|
||||
- **ReparsePointsSkipped** Number of reparse points that aren't corrupted and no action is required.
|
||||
- **Result** HResult of this operation.
|
||||
- **ScenarioId** ID indicating the mitigation scenario.
|
||||
- **ScenarioSupported** Indicates whether the scenario was supported.
|
||||
@ -6754,3 +6844,6 @@ The following fields are available:
|
||||
- **Flags** The flags passed to the hard reserve adjustment function.
|
||||
- **PendingHardReserveAdjustment** The final change to the hard reserve size.
|
||||
- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve.
|
||||
|
||||
|
||||
|
||||
|
@ -3,12 +3,12 @@ description: Learn more about the required Windows 10 diagnostic data gathered.
|
||||
title: Required diagnostic events and fields for Windows 10 (versions 22H2, 21H2, 21H1, 20H2, and 2004)
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-privacy
|
||||
localizationpriority: high
|
||||
ms.localizationpriority: high
|
||||
author: DHB-MSFT
|
||||
ms.author: danbrown
|
||||
manager: laurawi
|
||||
ms.date: 09/26/2023
|
||||
ms.collection: highpri
|
||||
ms.date: 02/29/2024
|
||||
ms.collection: privacy-windows
|
||||
ms.topic: reference
|
||||
---
|
||||
|
||||
@ -1036,7 +1036,7 @@ The following fields are available:
|
||||
- **NeedsInstallPostUpgradeData** Will the file have a notification after upgrade to install a replacement for the app?
|
||||
- **NeedsNotifyPostUpgradeData** Should a notification be shown for this file after upgrade?
|
||||
- **NeedsReinstallPostUpgradeData** Will the file have a notification after upgrade to reinstall the app?
|
||||
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but is not blocking upgrade).
|
||||
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the compatibility database (but isn't blocking upgrade).
|
||||
|
||||
|
||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPostUpgradeRemove
|
||||
@ -1869,7 +1869,7 @@ The following fields are available:
|
||||
- **PCFP** An ID for the system calculated by hashing hardware identifiers.
|
||||
- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal.
|
||||
- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row.
|
||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device.
|
||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it's understood that data events won't be received from this device.
|
||||
- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime.
|
||||
- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic.
|
||||
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information.
|
||||
@ -1898,7 +1898,7 @@ The following fields are available:
|
||||
- **WmdrmApiResult** Raw value of the API used to gather DRM state.
|
||||
- **WmdrmCdRipped** Indicates if the system has any files encrypted with personal DRM, which was used for ripped CDs.
|
||||
- **WmdrmIndicators** WmdrmCdRipped OR WmdrmPurchased.
|
||||
- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup was not dismissed.
|
||||
- **WmdrmInUse** WmdrmIndicators AND dismissible block in setup wasn't dismissed.
|
||||
- **WmdrmNonPermanent** Indicates if the system has any files with non-permanent licenses.
|
||||
- **WmdrmPurchased** Indicates if the system has any files with permanent licenses.
|
||||
|
||||
@ -2081,7 +2081,7 @@ The following fields are available:
|
||||
- **Magnetometer** Indicates whether the device has a magnetometer (a mechanical component that works like a compass).
|
||||
- **NFCProximity** Indicates whether the device supports NFC (a set of communication protocols that helps establish communication when applicable devices are brought close together.)
|
||||
- **OEMDigitalMarkerFileName** The name of the file placed in the \Windows\system32\drivers directory that specifies the OEM and model name of the device.
|
||||
- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device is not reprocessed even if the clean OEM name is changed at a later date.
|
||||
- **OEMManufacturerName** The device manufacturer name. The OEMName for an inactive device isn't reprocessed even if the clean OEM name is changed at a later date.
|
||||
- **OEMModelBaseBoard** The baseboard model used by the OEM.
|
||||
- **OEMModelBaseBoardVersion** Differentiates between developer and retail devices.
|
||||
- **OEMModelName** The device model name.
|
||||
@ -2111,7 +2111,7 @@ This event sends data about the memory on the device, including ROM and RAM. The
|
||||
The following fields are available:
|
||||
|
||||
- **TotalPhysicalRAM** Represents the physical memory (in MB).
|
||||
- **TotalVisibleMemory** Represents the memory that is not reserved by the system.
|
||||
- **TotalVisibleMemory** Represents the memory that isn't reserved by the system.
|
||||
|
||||
|
||||
### Census.Network
|
||||
@ -2142,7 +2142,7 @@ The following fields are available:
|
||||
|
||||
### Census.OS
|
||||
|
||||
This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it is a virtual device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
This event sends data about the operating system such as the version, locale, update service configuration, when and how it was originally installed, and whether it's a virtual device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2177,14 +2177,14 @@ The following fields are available:
|
||||
- **ServiceMachinePort** Retrieves the port of the KMS host used for anti-piracy.
|
||||
- **ServiceProductKeyID** Retrieves the License key of the KMS
|
||||
- **SharedPCMode** Returns Boolean for devices that have enabled the configuration EnableSharedPCMode.
|
||||
- **Signature** Retrieves if it is a signature machine sold by Microsoft store.
|
||||
- **Signature** Retrieves if it's a signature machine sold by Microsoft store.
|
||||
- **SLICStatus** Whether a SLIC table exists on the device.
|
||||
- **SLICVersion** Returns OS type/version from SLIC table.
|
||||
|
||||
|
||||
### Census.PrivacySettings
|
||||
|
||||
This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
This event provides information about the device level privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represent the authority that set the value. The effective consent (first 8 bits) is one of the following values: -3 = unexpected consent value, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority (last 8 bits) is one of the following values: -3 = unexpected authority, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = system, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent wasn't configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2356,7 +2356,7 @@ The following fields are available:
|
||||
|
||||
### Census.UserPrivacySettings
|
||||
|
||||
This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value was not requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent was not configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
This event provides information about the current users privacy settings and whether device-level access was granted to these capabilities. Not all settings are applicable to all devices. Each field records the consent state for the corresponding privacy setting. The consent state is encoded as a 16-bit signed integer, where the first 8 bits represents the effective consent value, and the last 8 bits represents the authority that set the value. The effective consent is one of the following values: -3 = unexpected consent value, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = undefined, 1 = allow, 2 = deny, 3 = prompt. The consent authority is one of the following values: -3 = unexpected authority, -2 = value wasn't requested, -1 = an error occurred while attempting to retrieve the value, 0 = user, 1 = a higher authority (a gating setting, the system-wide setting, or a group policy), 2 = advertising ID group policy, 3 = advertising ID policy for child account, 4 = privacy setting provider doesn't know the actual consent authority, 5 = consent wasn't configured and a default set in code was used, 6 = system default, 7 = organization policy, 8 = OneSettings. The data collected with this event is used to help keep Windows secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -2409,7 +2409,7 @@ The following fields are available:
|
||||
- **HyperVisor** Retrieves whether the current OS is running on top of a Hypervisor.
|
||||
- **IOMMUPresent** Represents if an input/output memory management unit (IOMMU) is present.
|
||||
- **IsVDI** Is the device using Virtual Desktop Infrastructure?
|
||||
- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field should not be relied upon for non-Hv#1 Hypervisors.
|
||||
- **IsVirtualDevice** Retrieves that when the Hypervisor is Microsoft's Hyper-V Hypervisor or other Hv#1 Hypervisor, this field will be set to FALSE for the Hyper-V host OS and TRUE for any guest OS's. This field shouldn't be relied upon for non-Hv#1 Hypervisors.
|
||||
- **IsWVDSessionHost** Indicates if this is a Windows Virtual Device session host.
|
||||
- **SLATSupported** Represents whether Second Level Address Translation (SLAT) is supported by the hardware.
|
||||
- **VirtualizationFirmwareEnabled** Represents whether virtualization is enabled in the firmware.
|
||||
@ -2483,7 +2483,6 @@ The following fields are available:
|
||||
- **IsRecommended** Denotes whether all compatibility checks have passed and, if so, returns true. Otherwise returns false.
|
||||
- **Issues** If compatibility checks failed, provides bit indexed indicators of issues detected. Table located here: [Check results of HVCI default enablement](/windows-hardware/design/device-experiences/oem-hvci-enablement#check-results-of-hvci-default-enablement).
|
||||
|
||||
|
||||
### Microsoft.Windows.Security.CodeIntegrity.HVCISysprep.Enabled
|
||||
|
||||
Fires when auto-enablement is successful and HVCI is being enabled on the device.
|
||||
@ -2572,7 +2571,7 @@ Describes the device-related fields.
|
||||
The following fields are available:
|
||||
|
||||
- **deviceClass** The device classification. For example, Desktop, Server, or Mobile.
|
||||
- **localId** A locally-defined unique ID for the device. This is not the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId
|
||||
- **localId** A locally-defined unique ID for the device. This isn't the human-readable device name. Most likely equal to the value stored at HKLM\Software\Microsoft\SQMClient\MachineId
|
||||
- **make** Device manufacturer.
|
||||
- **model** Device model.
|
||||
|
||||
@ -2642,7 +2641,7 @@ The following fields are available:
|
||||
|
||||
- **authId** This is an ID of the user associated with this event that is deduced from a token such as a Microsoft Account ticket or an XBOX token.
|
||||
- **locale** The language and region.
|
||||
- **localId** Represents a unique user identity that is created locally and added by the client. This is not the user's account ID.
|
||||
- **localId** Represents a unique user identity that is created locally and added by the client. This isn't the user's account ID.
|
||||
|
||||
|
||||
### Common Data Extensions.utc
|
||||
@ -2960,12 +2959,12 @@ The following fields are available:
|
||||
|
||||
### TelClientSynthetic.AbnormalShutdown_0
|
||||
|
||||
This event sends data about boot IDs for which a normal clean shutdown was not observed. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
This event sends data about boot IDs for which a normal clean shutdown wasn't observed. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **AbnormalShutdownBootId** BootId of the abnormal shutdown being reported by this event.
|
||||
- **AbsCausedbyAutoChk** This flag is set when AutoCheck forces a device restart to indicate that the shutdown was not an abnormal shutdown.
|
||||
- **AbsCausedbyAutoChk** This flag is set when AutoCheck forces a device restart to indicate that the shutdown wasn't an abnormal shutdown.
|
||||
- **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in.
|
||||
- **BatteryLevelAtLastShutdown** The last recorded battery level.
|
||||
- **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown.
|
||||
@ -3043,7 +3042,7 @@ The following fields are available:
|
||||
- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise.
|
||||
- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise.
|
||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||
- **IsProcessorMode** True if it is Processor Mode, false otherwise.
|
||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
||||
|
||||
@ -3062,7 +3061,7 @@ The following fields are available:
|
||||
- **CanCollectWindowsAnalyticsEvents** True if we can collect Windows Analytics data, false otherwise.
|
||||
- **CanPerformDiagnosticEscalations** True if we can perform diagnostic escalation collection, false otherwise.
|
||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||
- **IsProcessorMode** True if it is Processor Mode, false otherwise.
|
||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
||||
|
||||
@ -3856,7 +3855,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.DriverInstall.NewDevInstallDeviceEnd
|
||||
|
||||
This event sends data about the driver installation once it is completed. The data collected with this event is used to help keep Windows up to date and performing properly.
|
||||
This event sends data about the driver installation once it's completed. The data collected with this event is used to help keep Windows up to date and performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -4115,7 +4114,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.HangReporting.AppHangEvent
|
||||
|
||||
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and will not produce AppHang events.
|
||||
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and won't produce AppHang events.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -4134,8 +4133,8 @@ The following fields are available:
|
||||
- **TargetAsId** The sequence number for the hanging process.
|
||||
- **TypeCode** Bitmap describing the hang type.
|
||||
- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application.
|
||||
- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting.
|
||||
- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting.
|
||||
- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it's waiting.
|
||||
- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it's waiting.
|
||||
- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package.
|
||||
|
||||
|
||||
@ -4340,7 +4339,6 @@ The following fields are available:
|
||||
|
||||
- **InventoryVersion** The version of the inventory binary generating the events.
|
||||
|
||||
|
||||
### Microsoft.Windows.Inventory.Core.InventoryAcpiPhatHealthRecordAdd
|
||||
|
||||
This event sends basic metadata about ACPI PHAT Health Record structure on the machine. The data collected with this event is used to help keep Windows up to date.
|
||||
@ -4418,7 +4416,7 @@ The following fields are available:
|
||||
- **RootDirPath** The path to the root directory where the program was installed.
|
||||
- **Source** How the program was installed (for example, ARP, MSI, Appx).
|
||||
- **StoreAppType** A sub-classification for the type of Microsoft Store app, such as UWP or Win8StoreApp.
|
||||
- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it is a service. Application and BOE are the ones most likely seen.
|
||||
- **Type** One of ("Application", "Hotfix", "BOE", "Service", "Unknown"). Application indicates Win32 or Appx app, Hotfix indicates app updates (KBs), BOE indicates it's an app with no ARP or MSI entry, Service indicates that it's a service. Application and BOE are the ones most likely seen.
|
||||
- **Version** The version number of the program.
|
||||
|
||||
|
||||
@ -4615,7 +4613,6 @@ The following fields are available:
|
||||
|
||||
- **InventoryVersion** The version of the inventory file generating the events.
|
||||
|
||||
|
||||
### Microsoft.Windows.Inventory.Core.InventoryDevicePnpAdd
|
||||
|
||||
This event sends basic metadata about a PNP device and its associated driver to help keep Windows up to date. This information is used to assess if the PNP device and driver will remain compatible when upgrading Windows.
|
||||
@ -4991,7 +4988,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Kernel.Power.PreviousShutdownWasThermalShutdown
|
||||
|
||||
This event sends Product and Service Performance data on which area of the device exceeded safe temperature limits and caused the device to shutdown. This information is used to ensure devices are behaving as they are expected to. The data collected with this event is used to keep Windows performing properly.
|
||||
This event sends Product and Service Performance data on which area of the device exceeded safe temperature limits and caused the device to shutdown. This information is used to ensure devices are behaving as they're expected to. The data collected with this event is used to keep Windows performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -5022,21 +5019,21 @@ The following fields are available:
|
||||
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **AppSessionGuid** An identifier of a particular application session starting at process creation time and persisting until process end.
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **container_client_id** The client ID of the container, if in WDAG mode. This will be different from the UMA log client ID, which is the client ID of the host in WDAG mode.
|
||||
- **container_localId** If the device is using Windows Defender Application Guard, this is the Software Quality Metrics (SQM) ID of the container.
|
||||
- **container_session_id** The session ID of the container, if in WDAG mode. This will be different from the UMA log session ID, which is the session ID of the host in WDAG mode.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client is not on a UTC-enabled platform, then this value will not be set.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client isn't on a UTC-enabled platform, then this value won't be set.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event, where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -5056,21 +5053,21 @@ The following fields are available:
|
||||
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **AppSessionGuid** An identifier of a particular application session starting at process creation time and persisting until process end.
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **container_client_id** The client ID of the container, if in WDAG mode. This will be different from the UMA log client ID, which is the client ID of the host in WDAG mode.
|
||||
- **container_localId** If the device is using Windows Defender Application Guard, this is the Software Quality Metrics (SQM) ID of the container.
|
||||
- **container_session_id** The session ID of the container, if in WDAG mode. This will be different from the UMA log session ID, which is the session ID of the host in WDAG mode.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client is not on a UTC-enabled platform, then this value will not be set.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client isn't on a UTC-enabled platform, then this value won't be set.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -5090,21 +5087,21 @@ The following fields are available:
|
||||
- **app_env** The environment from which the event was logged when testing; otherwise, the field is omitted or left blank.
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **AppSessionGuid** An identifier of a particular application session starting at process creation time and persisting until process end.
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **container_client_id** The client ID of the container, if in WDAG mode. This will be different from the UMA log client ID, which is the client ID of the host in WDAG mode.
|
||||
- **container_localId** If the device is using Windows Defender Application Guard, this is the Software Quality Metrics (SQM) ID of the container.
|
||||
- **container_session_id** The session ID of the container, if in WDAG mode. This will be different from the UMA log session ID, which is the session ID of the host in WDAG mode.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client is not on a UTC-enabled platform, then this value will not be set.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client isn't on a UTC-enabled platform, then this value won't be set.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -5124,21 +5121,21 @@ The following fields are available:
|
||||
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **AppSessionGuid** An identifier of a particular application session starting at process creation time and persisting until process end.
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **container_client_id** The client ID of the container, if in WDAG mode. This will be different from the UMA log client ID, which is the client ID of the host in WDAG mode.
|
||||
- **container_localId** If the device is using Windows Defender Application Guard, this is the Software Quality Metrics (SQM) ID of the container.
|
||||
- **container_session_id** The session ID of the container, if in WDAG mode. This will be different from the UMA log session ID, which is the session ID of the host in WDAG mode.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client is not on a UTC-enabled platform, then this value will not be set.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client isn't on a UTC-enabled platform, then this value won't be set.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -5164,7 +5161,7 @@ The following fields are available:
|
||||
- **appCohortHint** A machine-readable enum indicating that the client has a desire to switch to a different release cohort. The exact legal values are app-specific and should be shared between the server and app implementations. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value is not known. Please see the wiki for additional information. Default: '-2'.
|
||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. Please see the wiki for additional information. Default: '-2'.
|
||||
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client should not transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
||||
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
||||
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
||||
@ -5172,7 +5169,7 @@ The following fields are available:
|
||||
- **appLastLaunchTime** The time when browser was last launched.
|
||||
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event was not completed before OOBE finishes; -1 means the field does not apply.
|
||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field does not apply.
|
||||
- **appPingEventDownloadMetricsCdnAzureRefOriginShield** Provides a unique reference string that identifies a request served by Azure Front Door. It's used to search access logs and is critical for troubleshooting. For example, Ref A: E172B39D19774147B0EFCC8E3E823D9D Ref B: BL2EDGE0215 Ref C: 2021-05-11T22:25:48Z.
|
||||
- **appPingEventDownloadMetricsCdnCache** Corresponds to the result, whether the proxy has served the result from cache (HIT for yes, and MISS for no) For example, HIT from proxy.domain.tld, MISS from proxy.local.
|
||||
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
||||
@ -5201,7 +5198,7 @@ The following fields are available:
|
||||
- **appUpdateCheckIsRollbackAllowed** Check for status showing whether or not rollback is allowed.
|
||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they have not.
|
||||
- **appUpdateCheckTargetChannel** Check for status showing the target release channel.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server should not return an update instruction to a version number that does not match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it is not a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server should not return an update instruction to a version number that does not match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
||||
- **appVersion** The version of the product install. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
@ -5251,20 +5248,20 @@ The following fields are available:
|
||||
- **app_env** The environment from which the event was logged when testing; otherwise, the field is omitted or left blank.
|
||||
- **app_sample_rate** A number representing how often the client sends telemetry, expressed as a percentage. Low values indicate that said client sends more events and high values indicate that said client sends fewer events.
|
||||
- **app_version** The internal Edge build version string, taken from the UMA metrics field system_profile.app_version.
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state was not retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **appConsentState** Bit flags describing consent for data collection on the machine or zero if the state wasn't retrieved. The following are true when the associated bit is set: consent was granted (0x1), consent was communicated at install (0x2), diagnostic data consent granted (0x20000), browsing data consent granted (0x40000).
|
||||
- **AppSessionGuid** An identifier of a particular application session starting at process creation time and persisting until process end.
|
||||
- **brandCode** Contains the 4 character brand code or distribution tag that has been assigned to a partner. Not every Windows install will have a brand code.
|
||||
- **Channel** An integer indicating the channel of the installation (Canary or Dev).
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id is not durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **client_id** A unique identifier with which all other diagnostic client data is associated, taken from the UMA metrics provider. This ID is effectively unique per device, per OS user profile, per release channel (e.g. Canary/Dev/Beta/Stable). client_id isn't durable, based on user preferences. client_id is initialized on the first application launch under each OS user profile. client_id is linkable, but not unique across devices or OS user profiles. client_id is reset whenever UMA data collection is disabled, or when the application is uninstalled.
|
||||
- **ConnectionType** The first reported type of network connection currently connected. This can be one of Unknown, Ethernet, WiFi, 2G, 3G, 4G, None, or Bluetooth.
|
||||
- **container_client_id** The client ID of the container, if in WDAG mode. This will be different from the UMA log client ID, which is the client ID of the host in WDAG mode.
|
||||
- **container_session_id** The session ID of the container, if in WDAG mode. This will be different from the UMA log session ID, which is the session ID of the host in WDAG mode.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client is not on a UTC-enabled platform, then this value will not be set.
|
||||
- **device_sample_rate** A number representing how often the device sends telemetry, expressed as a percentage. Low values indicate that device sends more events and high values indicate that device sends fewer events. The value is rounded to 5 significant figures for privacy reasons and if an error is hit in getting the device sample number value from the registry then this will be -1; and if client isn't on a UTC-enabled platform, then this value won't be set.
|
||||
- **Etag** Etag is an identifier representing all service applied configurations and experiments for the current browser session. This field is left empty when Windows diagnostic level is set to Basic or lower or when consent for diagnostic data has been denied.
|
||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||
- **experimentation_mode** A number representing the value set for the ExperimentationAndConfigurationServiceControl group policy. See [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies#experimentationandconfigurationservicecontrol) for more details on this policy.
|
||||
- **install_date** The date and time of the most recent installation in seconds since midnight on January 1, 1970 UTC, rounded down to the nearest hour.
|
||||
- **installSource** An enumeration representing the source of this installation: source was not retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSource** An enumeration representing the source of this installation: source wasn't retrieved (0), unspecified source (1), website installer (2), enterprise MSI (3), Windows update (4), Edge updater (5), scheduled or timed task (6, 7), uninstall (8), Edge about page (9), self-repair (10), other install command line (11), reserved (12), unknown source (13).
|
||||
- **installSourceName** A string representation of the installation source.
|
||||
- **PayloadClass** The base class used to serialize and deserialize the Protobuf binary payload.
|
||||
- **PayloadGUID** A random identifier generated for each original monolithic Protobuf payload, before the payload is potentially broken up into manageably-sized chunks for transmission.
|
||||
@ -5351,7 +5348,7 @@ The following fields are available:
|
||||
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a tag.
|
||||
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they have not.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it is not a lexical prefix (for example, '1.2.3' MUST match '1.2.3.4' but MUST NOT match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' MUST match '1.2.3.4' but MUST NOT match '1.2.34'). Default: ''.
|
||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request is sent over SSL or another secure protocol. This field is unused by Edge Update and always empty. Default: ''.
|
||||
- **appVersion** The version of the product install. Default: '0.0.0.0'.
|
||||
- **eventType** A string representation of appPingEventEventType indicating the type of the event.
|
||||
@ -5616,6 +5613,40 @@ The following fields are available:
|
||||
|
||||
## Other events
|
||||
|
||||
### Microsoft.Surface.Mcu.Prod.CriticalLog
|
||||
|
||||
Error information from Surface device firmware.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CrashLog** MCU crash log
|
||||
- **criticalLogSize** Log size
|
||||
- **CUtility::GetTargetNameA(target)** Product identifier.
|
||||
- **productId** Product identifier
|
||||
- **uniqueId** Correlation ID that can be used with Watson to get more details about the failure.
|
||||
|
||||
|
||||
### Microsoft.Surface.SMLS.Pcc.PccTelemetry
|
||||
|
||||
Surface SMLS telemetry data
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ModelData** Surface SMLS Telemetry data
|
||||
- **ModelIndex** Machine Learning Model number
|
||||
- **smlsVersion** SMLS (Surface Machine Learning Service) version
|
||||
- **Time** DateTime of event
|
||||
|
||||
|
||||
### Microsoft.Surface.SystemInfo.Prod.OsImageName
|
||||
|
||||
This event sends information about the Operating System image name to Microsoft. It enables the Surface team to improve our customer's experience.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **szOsImageName** This is the image name that is running on the device.
|
||||
|
||||
|
||||
### Microsoft.Windows.Defender.Engine.Maps.Heartbeat
|
||||
|
||||
Heartbeat is sent once a day to indicate Defender is running and functional. Event includes necessary information to understand health of Defender on the device.
|
||||
@ -5662,9 +5693,67 @@ The following fields are available:
|
||||
- **hr** Error code in HRESULT
|
||||
- **IsResealNeeded** BOOL value to indicate if TPM Reseal was needed
|
||||
- **SecureBootUpdateCaller** Scenario in which function was called. Could be Update or Upgrade
|
||||
- **UpdateType** Indicates if it is DB or DBX update
|
||||
- **UpdateType** Indicates if it's DB or DBX update
|
||||
- **WillResealSucceed** Indicates if TPM reseal operation is expected to succeed
|
||||
|
||||
### Microsoft.Windows.Security.SBServicing.ApplySecureBootUpdateStarted
|
||||
|
||||
Event that indicates secure boot update has started.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **AvailableUpdates** Number of available secure boot updates.
|
||||
- **SecureBootUpdateCaller** Enum value indicating if this is a servicing or an upgrade.
|
||||
|
||||
|
||||
### Microsoft.Windows.Shell.StateCapture.TrayStateCapture
|
||||
|
||||
Captures numerous global settings and state involving how user has configured their Taskbar.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **autoHideDesktop** Auto Hide Desktop
|
||||
- **autoHideTablet** Auto Hide Tablet
|
||||
- **cortanaButtonState** Cortana button state
|
||||
- **decoupledCortanaButtonState** Decoupled Cortana button state
|
||||
- **feedsDisabledReason** Feeds disabled reason
|
||||
- **feedsState** Feeds state
|
||||
- **firstPartyToolbarsInUse** First Party toolbars in Use
|
||||
- **lockedMoveTaskbar** Locked Move Taskbar
|
||||
- **lockedSizeTaskbar** Locked Size Taskbar
|
||||
- **monitorCount** Monitor count
|
||||
- **multiDisplayButtonPlacement** Multi display button placement
|
||||
- **multiDisplayTaskbar** Multi display taskbar
|
||||
- **overflowAllowed** Overflow allowed
|
||||
- **overflowItemCount** Overflow item content
|
||||
- **peekToPreviewDesktop** Peek to Preview Desktop
|
||||
- **shellFeedsHoverMode** ShellFeeds Hover mode
|
||||
- **shellFeedsTaskbarDisplayMode** ShellFeeds Taskbar Display mode
|
||||
- **shellFeedsUpdateMode** ShellFeeds Update mode
|
||||
- **showAppsInTablet** Shows apps in tablet
|
||||
- **showClock** Show Clock
|
||||
- **showInkWorkspace** Show Ink workspace
|
||||
- **showInputIndicator** Show Input indicator
|
||||
- **showLocation** Show Location
|
||||
- **showMeetNow** Show Meet Now
|
||||
- **showMicrophone** Show Microphone
|
||||
- **showNetwork** Show Network
|
||||
- **showNotificationCenter** Show Notification Center
|
||||
- **showPower** Show Power
|
||||
- **showVolume** Show Volume
|
||||
- **smallIcons** Small icons
|
||||
- **taskbarBadging** Taskbar badging
|
||||
- **taskViewButtonState** Task View button state
|
||||
- **thirdPartyToolbarsInUse** Third part toolbars in use
|
||||
- **toolbarsCount** Toolbars count
|
||||
- **toolbarsShowing** Toolbars showing
|
||||
- **toolbarsThirdPartyDefined** Toolbars third party defined
|
||||
- **touchKeyboardDesktop** Touch keyboard desktop
|
||||
- **touchKeyboardTablet** Touch keyboard tablet
|
||||
- **triggerType** Trigger type
|
||||
- **usePowershell** Use PowerShell
|
||||
|
||||
|
||||
|
||||
## Privacy consent logging events
|
||||
|
||||
@ -5873,7 +5962,7 @@ The following fields are available:
|
||||
- **PauseQualityUpdatesEndTime** If quality OS updates are paused on the device, this is the date and time for the end of the pause time window.
|
||||
- **PauseQualityUpdatesStartTime** If quality OS updates are paused on the device, this is the date and time for the beginning of the pause time window.
|
||||
- **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting (pre-release builds) being introduced.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
||||
- **QualityUpdateDeferral** The deferral period configured for quality OS updates on the device (in days).
|
||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||
- **QualityUpdatePausePeriod** The pause duration configured for quality OS updates on the device (in days).
|
||||
@ -5911,7 +6000,7 @@ The following fields are available:
|
||||
- **DeploymentProviderMode** The mode of operation of the update deployment provider.
|
||||
- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc.
|
||||
- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver".
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode wasn't specific enough.
|
||||
- **FlightId** The specific id of the flight the device is getting
|
||||
- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.)
|
||||
- **RevisionNumber** Identifies the revision number of this specific piece of content
|
||||
@ -5980,7 +6069,7 @@ The following fields are available:
|
||||
- **PackageFullName** The package name of the content.
|
||||
- **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced.
|
||||
- **PostDnldTime** Time taken (in seconds) to signal download completion after the last job has completed downloading payload.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||
- **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background.
|
||||
- **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content.
|
||||
@ -6082,7 +6171,7 @@ The following fields are available:
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed.
|
||||
- **EventType** Possible values are Child, Bundle, or Driver.
|
||||
- **ExtendedErrorCode** The extended error code.
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode is not specific enough.
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode isn't specific enough.
|
||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||
- **FlightBuildNumber** If this installation was for a Windows Insider build, this is the build number of that build.
|
||||
- **FlightId** The specific ID of the Windows Insider build the device is getting.
|
||||
@ -6100,7 +6189,7 @@ The following fields are available:
|
||||
- **MsiAction** The stage of MSI installation where it failed.
|
||||
- **MsiProductCode** The unique identifier of the MSI installer.
|
||||
- **PackageFullName** The package name of the content being installed.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided.
|
||||
- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName wasn't provided.
|
||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||
- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one
|
||||
- **RepeatFailCount** Indicates whether this specific piece of content has previously failed.
|
||||
@ -6138,7 +6227,7 @@ The following fields are available:
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.).
|
||||
- **EventType** Event type (Child, Bundle, Release, or Driver).
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode isn't specific enough.
|
||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||
- **FlightBuildNumber** Indicates the build number of the flight.
|
||||
- **FlightId** The specific ID of the flight the device is getting.
|
||||
@ -6203,7 +6292,7 @@ The following fields are available:
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventScenario** Indicates the purpose of the event (a scan started, succeded, failed, etc.).
|
||||
- **EventType** Indicates the event type. Possible values are "Child", "Bundle", "Release" or "Driver".
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode is not specific enough.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode isn't specific enough.
|
||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||
- **FlightBuildNumber** Indicates the build number of the flight.
|
||||
- **FlightId** The specific ID of the flight the device is getting.
|
||||
@ -6255,7 +6344,7 @@ The following fields are available:
|
||||
- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request.
|
||||
- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments.
|
||||
- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough.
|
||||
- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode wasn't specific enough.
|
||||
- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed.
|
||||
- **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate.
|
||||
- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce
|
||||
@ -6523,7 +6612,7 @@ The following fields are available:
|
||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this device.
|
||||
- **KBNumber** KBNumber of the update being installed.
|
||||
- **PackageVersion** Current package version of quality update assistant.
|
||||
- **Reason** Provides information on reasons why the update is not applicable to the device.
|
||||
- **Reason** Provides information on reasons why the update isn't applicable to the device.
|
||||
- **Result** Applicability check for quality update assistant.
|
||||
|
||||
|
||||
@ -6647,7 +6736,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.RecommendedTroubleshootingService.MitigationRejected
|
||||
|
||||
This event is raised when a targeted mitigation is rejected by the device based on the device's preference, or if it has already been applied. This enables us to find out why an applicable mitigation was not executed by the device. Data from this event is used to measure the health of mitigations service stack used by engineers to solve in-market problems on internal, insider, and retail devices. The data collected with this event is used to keep Windows performing properly.
|
||||
This event is raised when a targeted mitigation is rejected by the device based on the device's preference, or if it has already been applied. This enables us to find out why an applicable mitigation wasn't executed by the device. Data from this event is used to measure the health of mitigations service stack used by engineers to solve in-market problems on internal, insider, and retail devices. The data collected with this event is used to keep Windows performing properly.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -7052,7 +7141,7 @@ The following fields are available:
|
||||
- **CV** Correlation vector.
|
||||
- **GlobalEventCounter** Counts the number of events for this provider.
|
||||
- **PackageVersion** The package version of the label.
|
||||
- **UpdateHealthToolsBlobNotificationNotEmpty** True if the blob notification is not empty.
|
||||
- **UpdateHealthToolsBlobNotificationNotEmpty** True if the blob notification isn't empty.
|
||||
|
||||
|
||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsCachedNotificationRetrieved
|
||||
@ -7157,7 +7246,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsServiceBlockedByNoDSSJoin
|
||||
|
||||
This event is sent when the device is not Microsoft Entra joined. The data collected with this event is used to help keep Windows up to date and secure.
|
||||
This event is sent when the device isn't Microsoft Entra joined. The data collected with this event is used to help keep Windows up to date and secure.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -7456,7 +7545,7 @@ The following fields are available:
|
||||
- **FlightId** Unique ID for the flight (test instance version).
|
||||
- **IsSuspendable** Indicates whether the update has the ability to be suspended and resumed at the time of reboot. When the machine is rebooted and the update is in middle of Predownload or Install and Setup.exe is running, this field is TRUE, if not its FALSE.
|
||||
- **ObjectId** The unique value for each Update Agent mode.
|
||||
- **Reason** Indicates the HResult why the machine could not be suspended. If it is successfully suspended, the result is 0.
|
||||
- **Reason** Indicates the HResult why the machine could not be suspended. If it's successfully suspended, the result is 0.
|
||||
- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan.
|
||||
- **Result** The HResult of the event.
|
||||
- **ScenarioId** The ID of the update scenario.
|
||||
@ -8032,6 +8121,17 @@ The following fields are available:
|
||||
- **WUContentId** The Windows Update content ID.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.BeginGetFreeEntitlement
|
||||
|
||||
Tracks the beginning of the call to get a free app entitlement.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CampaignId** Marketing Campaign Identifier.
|
||||
- **StoreId** App Store Catalog Id.
|
||||
- **UseDeviceId** Boolean value to select whether the entitlement should be a device versus a user entitlement.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.BeginGetInstalledContentIds
|
||||
|
||||
This event is sent when an inventory of the apps installed is started to determine whether updates for those apps are available. It's used to help keep Windows up-to-date and secure.
|
||||
@ -8121,6 +8221,18 @@ The following fields are available:
|
||||
- **HResult** The result code of the last action performed before this operation.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndGetFreeEntitlement
|
||||
|
||||
Telemetry is fired at the end of the call to request an free app entitlement, which will make a server call to get the entitlement.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **CampaignId** Campaign marketing Id.
|
||||
- **HResult** Error result.
|
||||
- **StoreId** Store Catalog Id of item requesting ownership.
|
||||
- **UseDeviceId** Boolean value to select whether the entitlement should be a device versus a user entitlement.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.EndGetInstalledContentIds
|
||||
|
||||
This event is sent after sending the inventory of the products installed to determine whether updates for those products are available. It's used to help keep Windows up-to-date and secure.
|
||||
@ -8695,8 +8807,8 @@ The following fields are available:
|
||||
- **sessionId** Unique value for each update session.
|
||||
- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match.
|
||||
- **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string.
|
||||
- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string.
|
||||
- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string.
|
||||
- **truncatedDeviceCount** The number of devices missing from the summary string because there isn't enough room in the string.
|
||||
- **truncatedDriverCount** The number of driver packages missing from the summary string because there isn't enough room in the string.
|
||||
- **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices.
|
||||
- **updateId** The unique ID for each update.
|
||||
|
||||
@ -9184,7 +9296,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.Update.Orchestrator.UniversalOrchestratorInvalidSignature
|
||||
|
||||
This event is sent when an updater has attempted to register a binary that is not signed by Microsoft. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
This event is sent when an updater has attempted to register a binary that isn't signed by Microsoft. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -9275,6 +9387,19 @@ The following fields are available:
|
||||
- **update** Update for which EULA has been accepted.
|
||||
|
||||
|
||||
### Microsoft.Windows.Update.PolicyReader.GPPolicyRefresh
|
||||
|
||||
This event enables us to harden the accuracy of the Windows update Group Policies configured by better tracking policy changes.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ExecutionTimeMs** This is the execution time in milliseconds
|
||||
- **PoliciesConfigured** This shows if the Windows update policies are configured.
|
||||
- **PolicyHashChanged** This shows if a policy hash has changed.
|
||||
- **RefreshedPolicies** This is a list of all of the policies that changed since the last configuration.
|
||||
- **StatusCode** This is the status of the overall group policy refresh.
|
||||
|
||||
|
||||
### Microsoft.Windows.Update.Ux.MusNotification.EnhancedEngagedRebootUxState
|
||||
|
||||
This event sends information about the configuration of Enhanced Direct-to-Engaged (eDTE), which includes values for the timing of how eDTE will progress through each phase of the reboot. The data collected with this event is used to help keep Windows secure and up to date.
|
||||
@ -9542,7 +9667,7 @@ The following fields are available:
|
||||
- **InteractionCampaignID** The user interaction we processed.
|
||||
- **IsChanged** True if the stored state has been modified in the registry (by creating it or by modifying one or more fields).
|
||||
- **IsComplete** True if the interaction campaign is marked as complete.
|
||||
- **IsNew** True if the stored state was not previously in the registry and was just initialized.
|
||||
- **IsNew** True if the stored state wasn't previously in the registry and was just initialized.
|
||||
- **LastEvaluationTime** Last time the interaction campaign was evaluated.
|
||||
- **LastPresentationTime** Last time the interaction campaign was presented.
|
||||
- **PresentationCount** Number of times the interaction campaign has been presented.
|
||||
@ -9831,7 +9956,6 @@ The following fields are available:
|
||||
- **pfn** A package full name.
|
||||
- **reasonNumber** A number associated with reason.
|
||||
|
||||
|
||||
### Microsoft.Xbox.XceBridge.CS.1.0.0.9.0.1.SFR.XvdStreamingStart
|
||||
|
||||
This event indicates that the XVDD streaming engine encountered an error when attempting to start streaming.
|
||||
@ -9900,3 +10024,6 @@ The following fields are available:
|
||||
- **virtualMachineName** VM name.
|
||||
- **waitForClientConnection** True if we should wait for client connection.
|
||||
- **wp81NetworkStackDisabled** WP 8.1 networking stack disabled.
|
||||
|
||||
|
||||
|
||||
|
@ -55,18 +55,17 @@
|
||||
},
|
||||
"titleSuffix": "Windows Security",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"dstrome",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"alekyaj"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -51,17 +51,17 @@
|
||||
},
|
||||
"titleSuffix": "What's new in Windows",
|
||||
"contributors_to_exclude": [
|
||||
"dstrome2",
|
||||
"rjagiewich",
|
||||
"American-Dipper",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"v-stchambers",
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
"Stacyrch140",
|
||||
"garycentric",
|
||||
"dstrome",
|
||||
"beccarobins"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -8,7 +8,7 @@ ms.author: mstewart
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.subservice: itpro-fundamentals
|
||||
ms.date: 01/30/2024
|
||||
ms.date: 02/28/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
@ -48,7 +48,7 @@ The following features and functionalities have been removed from the installed
|
||||
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 |
|
||||
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
|
||||
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 |
|
||||
| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was removed in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. | 1909 |
|
||||
| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. </br></br> **[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. <!--8786119--> | 1909 |
|
||||
| Taskbar settings roaming | Roaming of taskbar settings is removed in this release. This feature was announced as no longer being developed in Windows 10, version 1903. | 1909 |
|
||||
| Desktop messaging app doesn't offer messages sync | The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. The sync feature has been removed from all devices. Due to this change, you'll only be able to access messages from the device that received the message. | 1903 |
|
||||
|Business Scanning also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| 1809 |
|
||||
|
Loading…
x
Reference in New Issue
Block a user