From 8fa804acfd061cfcf5604153e02d2eb83374544f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 28 Sep 2016 13:17:14 -0700 Subject: [PATCH 1/2] fixed typos --- .../keep-secure/change-history-for-keep-windows-10-secure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 6dc8ea8b8c..db02131f0c 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -20,7 +20,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md) |Updated the networking table to clarify details around Enterprise Cloud Resources and Enterprise Proxy Servers. | |[Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) |Updated the networking table to clarify details around Enterprise Cloud Resources and Enterprise Proxy Servers. | | [Implement Windows Hello for Business in your organization](implement-microsoft-passport-in-your-organization.md) | Clarified how convenience PIN works in Windows 10, version 1607, on domain-joined PCs | -| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | Corrected certreq ezxample and added a new Windows PowerShell example for creating a self-signed certficate | +| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | Corrected certreq example and added a new Windows PowerShell example for creating a self-signed certificate | ## August 2016 |New or changed topic | Description | From 06c944213eabbe03ff1c1cc9b8d9bd48c030d85b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 28 Sep 2016 13:54:06 -0700 Subject: [PATCH 2/2] Fixing issue #44 --- windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md b/windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md index 637b6aaaca..546035f735 100644 --- a/windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md +++ b/windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md @@ -92,9 +92,10 @@ By default MDT stores the log files locally on the client. In order to capture a 1. On MDT01, log on as **CONTOSO\\Administrator**. 2. Create and share the **E:\\Logs** folder by running the following commands in an elevated Windows PowerShell prompt: + ``` syntax New-Item -Path E:\Logs -ItemType directory - New-SmbShare ?Name Logs$ ?Path E:\Logs -ChangeAccess EVERYONE + New-SmbShare -Name Logs$ -Path E:\Logs -ChangeAccess EVERYONE icacls E:\Logs /grant '"MDT_BA":(OI)(CI)(M)' ```