From 0ebb8751f67a9e83a64f0a0f3dfa877e52a69abf Mon Sep 17 00:00:00 2001 From: Corrine Horvath Date: Thu, 23 May 2019 11:52:59 -0700 Subject: [PATCH 01/30] Latest updates for 1903 and 1607 (#288) (#289) --- .../status-windows-10-1607-and-windows-server-2016.yml | 4 ++-- windows/release-information/status-windows-10-1903.yml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index b482491798..6ac43dc23c 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -85,7 +85,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Machines running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some machines running Windows Server with Hyper-V enabled may boot into Bitlocker recovery

See details >
N/A

Investigating
May 21, 2019
09:21 AM PT
Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some devices running Windows Server with Hyper-V enabled may start into Bitlocker recovery with error 0xC0210000

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Mitigated
May 23, 2019
09:57 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
Machines running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
We are investigating reports that some machines running Windows Server 2016 with Hyper-V enabled may enter Bitlocker recovery mode with an error 0xC0210000 after installing KB4494440 and rebooting.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Workaround: You can reboot machines successfully after suspending Bitlocker from Windows Recovery Environment. Below steps can be followed to suspend Bitlocker
  • Retrieve the 48 digit Bitlocker recovery password for the OS volume (From organization portal/key storage).
  • From the recovery screen, press the enter key to get to the recovery password entry screen and enter the recovery password.
  • If machine boots to windows recovery environment and asks for recovery key again, press “skip the drive” to enter Windows Recovery Environment
  • Click on “Advanced options”->”Troubleshoot”->”Advanced options”->”Command Prompt”
  • Unlock OS drive using the following command
  • Mange-bde -unlock c: -rp <48 digit numerical recovery password separated by “-“ in 6 digit group>
  • Suspend Bitlocker using the following command
  • Manage-bde -protectors -disable c:
  • Exit the command Window using the following command
  • exit
  • Click on “Continue” from recovery environment
  • This should boot system to Windows
  • Once booted, launch an Administrator command prompt and resume the Bitlocker to ensure the system remains protected.
  • Mange-bde -protectors -enable c:
The workaround needs to be followed on every system boot. To prevent hitting the issue, execute following command to temporarily suspend Bitlocker just before rebooting the system:
  • Manage-bde -protectors -disable c: -rc 1
  • This command will suspend Bitlocker until 1 reboot of the machine (-rc 1 option only works inside OS and does not work from recovery environment).
 Next steps: Microsoft is presently investigating this issue and will provide an update when available.

Back to top
N/A

Investigating
Last updated:
May 21, 2019
09:21 AM PT

Opened:
May 21, 2019
08:50 AM PT
Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some devices running Windows Server 2016 with Hyper-V enabled may enter Bitlocker recovery mode and receive an error, \"0xC0210000\" after installing KB4494440 and restarting.

Note Windows 10, version 1607 may also be affected when Bitlocker and Hyper-V are both enabled.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Workaround: If your device is already in this state, you can successfully start Windows after suspending Bitlocker from the Windows Recovery Environment (WinRE) using the following steps:
  1. Retrieve the 48 digit Bitlocker recovery password for the OS volume from your organization's portal or from wherever the key was stored when Bitlocker was first enabled.
  2. From the recovery screen, press the enter key and enter the recovery password when prompted.
  3. If your device starts in the Windows Recovery Environment and asks for recovery key again, select Skip the drive to continue to WinRE.
  4. select Advanced options then Troubleshoot then Advanced options then Command Prompt.
  5. Unlock OS drive using the command: Manage-bde -unlock c: -rp <48 digit numerical recovery password separated by “-“ in 6 digit group>
  6. Suspend Bitlocker using the command: Manage-bde -protectors -disable c:
  7. Exit the command window using the command: exit
  8. Select Continue from recovery environment.
  9. The device should now start Windows.
  10. Once started, launch an Administrator Command Prompt and resume the Bitlocker to ensure the system remains protected, using the command: Manage-bde -protectors -enable c:
Note The workaround needs to be followed on every system restart unless Bitlocker is suspended before restarting.

To prevent this issue, execute the following command to temporarily suspend Bitlocker just before restarting the system: Manage-bde -protectors -disable c: -rc 1
Note This command will suspend Bitlocker for 1 restart of the device (-rc 1 option only works inside OS and does not work from recovery environment).

Next steps: Microsoft is presently investigating this issue and will provide an update when available.

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Mitigated
Last updated:
May 23, 2019
09:57 AM PT

Opened:
May 21, 2019
08:50 AM PT
Unable to access some gov.uk websites
After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505052) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505052 from Windows Update and then restarting your device.

This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505052, search for it in the Microsoft Update Catalog.
 

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4505052
Resolved:
May 19, 2019
02:00 PM PT

Opened:
May 16, 2019
01:57 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue has been resolved.

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
Resolved:
May 14, 2019
10:00 AM PT

Opened:
May 10, 2019
10:35 AM PT
diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 0c22040811..d38140c25f 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -68,13 +68,13 @@ sections:
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
04:47 PM PT
Audio not working with Dolby Atmos headphones and home theater
Users may experience audio loss with Dolby Atmos headphones or Dolby Atmos home theater.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
07:17 AM PT
Duplicate folders and documents showing in user profile directory
If known folders (e.g. Desktop, Documents, or Pictures folders) are redirected, an empty folder with that same name may be created.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
07:16 AM PT +
AMD RAID driver incompatibility
Installation process may stop when trying to install Windows 10, version 1903 update on computers that run certain versions of AMD RAID drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 23, 2019
09:28 AM PT
Error attempting to update with external USB device or memory card attached
PCs with an external USB device or SD memory card attached may get error: \"This PC can't be upgraded to Windows 10.\"

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:49 PM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:48 PM PT
Night light settings do not apply in some cases
Microsoft has identified some scenarios where night light settings may stop working.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:48 PM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:47 PM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 or Intel RealSense S200 camera apps.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:47 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:46 PM PT -
AMD RAID driver incompatibility
Installation process may stop when trying to install Windows 10, version 1903 update on computers that run certain versions of AMD RAID drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:45 PM PT
D3D applications and games may fail to enter full-screen mode on rotated displays
Some Direct3D (D3D) applications and games may fail to enter full-screen mode on rotated displays.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:45 PM PT
Older versions of BattlEye anti-cheat software incompatible
Microsoft and BattlEye have identified a compatibility issue with some games that use older versions of BattlEye anti-cheat software.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
07:34 AM PT @@ -95,13 +95,13 @@ sections:
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Window 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: Restart your device to apply changes to brightness.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution that will be made available in upcoming release.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:56 AM PT
Audio not working with Dolby Atmos headphones and home theater
After updating to Windows 10, version 1903, you may experience loss of audio with Dolby Atmos for home theater (free extension) or Dolby Atmos for headphones (paid extension) acquired through the Microsoft Store due to a licensing configuration error.
 
This occurs due to an issue with a Microsoft Store licensing component, where license holders are not able to connect to the Dolby Access app and enable Dolby Atmos extensions.
 
To safeguard your update experience, we have applied protective hold on devices from being offered Windows 10, version 1903 until this issue is resolved. This configuration error will not result in loss of access for the acquired license once the problem is resolved.

Affected platforms:
Next steps: We are working on a resolution for Microsoft Store and estimate a solution will be available in mid-June.
Note We recommend you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved. 

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
07:17 AM PT

Opened:
May 21, 2019
07:16 AM PT
Duplicate folders and documents showing in user profile directory
If you have redirected known folders (e.g. Desktop, Documents, or Pictures folders) you may see an empty folder with the same name in your %userprofile% directories after updating to Windows 10, version 1903. This may occur if known folders were redirected when you chose to back up your content to OneDrive using the OneDrive wizard, or if you chose to back up your content during the Windows Out-of-Box-Experience (OOBE). This may also occur if you redirected your known folders manually through the Properties dialog box in File Explorer. ​This issue does not cause any user files to be deleted and a solution is in progress.

To safeguard your update experience, we have applied a quality hold on devices with redirected known folders from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Next steps: Microsoft is working on a resolution and estimates a solution will be available in late May.
Note We recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
07:16 AM PT

Opened:
May 21, 2019
07:16 AM PT +
AMD RAID driver incompatibility
Microsoft and AMD have identified an incompatibility with AMD RAID driver versions earlier than 9.2.0.105. When you attempt to install the Windows 10, version 1903 update on a Windows 10-based computer with an affected driver version, the installation process stops and you get a message like the following:

AMD Ryzen™ or AMD Ryzen™ Threadripper™ configured in SATA or NVMe RAID mode.

“A driver is installed that causes stability problems on Windows. This driver will be disabled. Check with your software/driver provider for an updated version that runs on this version of Windows.”

 
To safeguard your update experience, we have applied a compatibility hold on devices with these AMD drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: To resolve this issue, download the latest AMD RAID drivers directly from AMD at https://www.amd.com/en/support/chipsets/amd-socket-tr4/x399. The drivers must be version 9.2.0.105 or later. Install the drivers on the affected computer, and then restart the installation process for the Windows 10, version 1903 feature update.
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.
 

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 23, 2019
09:28 AM PT

Opened:
May 21, 2019
07:12 AM PT
Error attempting to update with external USB device or memory card attached
If you have an external USB device or SD memory card attached when installing Windows 10, version 1903, you may get an error message stating \"This PC can't be upgraded to Windows 10.\" This is caused by inappropriate drive reassignment during installation.

Sample scenario: An update to Windows 10, version 1903 is attempted on a computer that has a thumb drive inserted into its USB port. Before the update, the thumb drive is mounted in the system as drive G based on the existing drive configuration. After the feature update is installed; however, the device is reassigned a different drive letter (e.g., drive H).

Note The drive reassignment is not limited to removable drives. Internal hard drives may also be affected.

To safeguard your update experience, we have applied a hold on devices with an external USB device or SD memory card attached from being offered Windows 10, version 1903 until this issue is resolved.

Affected platforms:
Workaround: To work around this issue, remove all external media, such as USB devices and SD cards, from your computer and restart installation of the Windows 10, version 1903 feature update. The update should then proceed normally.
Note If you need to keep your external device, SD memory card, or other devices attached to your computer while updating, we recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: Microsoft is working on a resolution and estimate a solution will be available in late May.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:49 PM PT

Opened:
May 21, 2019
07:38 AM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some driver versions for Bluetooth radios made by Realtek and Qualcomm. To safeguard your update experience, we have applied a compatibility hold on devices with affected driver versions for Realtek or Qualcomm Bluetooth radios from being offered Windows 10, version 1903 or Windows Server, version 1903 until the driver has been updated.

Affected platforms:
Workaround: Check with your device manufacturer (OEM) to see if an updated driver is available and install it.

Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

Next steps: Microsoft is working with Realtek and Qualcomm to release new drivers for all affected system via Windows Update.  


Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:29 AM PT
Night light settings do not apply in some cases
Microsoft has identified some scenarios where night light settings may stop working, for example:
Affected platforms:
Workaround: If you find that your night light settings have stopped working, try turning the night light on and off, or restart your computer.  

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.


Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:28 AM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in higher than normal battery drain. If you see an intcdaud.sys notification or “What needs your attention” notification when trying to update to Windows 10, version 1903, you have an affected Intel Audio Display device driver installed on your machine (intcdaud.sys, versions 10.25.0.3 through 10.25.0.8).
  
To safeguard your update experience, we have applied a compatibility hold on devices with drivers from being offered Windows 10, version 1903 until updated device drivers have been installed.

Affected platforms:
Workaround:
On the “What needs your attention\" notification, click the Back button to remain on your current version of Windows 10. (Do not click Confirm as this will proceed with the update and you may experience compatibility issues.) Affected devices will automatically revert to the previous working configuration.

For more information, see Intel's customer support guidance and the Microsoft knowledge base article KB4465877.

Note We recommend you do not attempt to update your devices until newer device drivers are installed.

Next steps: You can opt to wait for newer drivers to be installed automatically through Windows Update or check with the computer manufacturer for the latest device driver software availability and installation procedures.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:22 AM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 and Intel RealSense S200 cameras when using the Camera app. After updating to the Windows 10 May 2019 Update and launching the Camera app, you may get an error message stating:

\"Close other apps, error code: 0XA00F4243.”


To safeguard your update experience, we have applied a protective hold on machines with Intel RealSense SR300 or Intel RealSense S200 cameras installed from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: To temporarily resolve this issue, perform one of the following:

or

or

Note This workaround will only resolve the issue until your next system restart.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:20 AM PT
Intermittent loss of Wi-Fi connectivity
Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

Affected platforms:
Workaround: Download and install an updated Wi-Fi driver from your device manufacturer (OEM).
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:46 PM PT

Opened:
May 21, 2019
07:13 AM PT -
AMD RAID driver incompatibility
Microsoft and AMD have identified an incompatibility with AMD RAID driver versions lower than 9.2.0.105. When you attempt to install the Windows 10, version 1903 update on a Windows 10-based computer with an affected driver version, the installation process stops and you get a message like the following:

AMD Ryzen™ or AMD Ryzen™ Threadripper™ configured in SATA or NVMe RAID mode.

“A driver is installed that causes stability problems on Windows. This driver will be disabled. Check with your software/driver provider for an updated version that runs on this version of Windows.”

 
To safeguard your update experience, we have applied a compatibility hold on devices with these AMD drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: To resolve this issue, download the latest AMD RAID drivers directly from AMD at https://www.amd.com/en/support/chipsets/amd-socket-tr4/x399. The drivers must be version 9.2.0.105 or later. Install the drivers on the affected computer, and then restart the installation process for the Windows 10, version 1903 feature update.
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.
 

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:45 PM PT

Opened:
May 21, 2019
07:12 AM PT
D3D applications and games may fail to enter full-screen mode on rotated displays
Some Direct3D (D3D) applications and games (e.g., 3DMark) may fail to enter full-screen mode on displays where the display orientation has been changed from the default (e.g., a landscape display in portrait mode).

Affected platforms:
Workaround: To work around this issue, do one of the following:
Next steps: Microsoft is working on a resolution and estimates a solution will be available in late May.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:45 PM PT

Opened:
May 21, 2019
07:05 AM PT
Older versions of BattlEye anti-cheat software incompatible
Microsoft and BattlEye have identified a compatibility issue with some games that use older versions of BattlEye anti-cheat software. When launching a game that uses an older, impacted version of BattlEye anti-cheat software on a device running Windows 10, version 1903, the device may experience a system crash.

To safeguard your gaming experience, we have applied a compatibility hold on devices with the impacted versions of BattlEye software used by games installed on your PC. This will prevent Windows 10, version 1903 from being offered until the incompatible version of BattlEye software is no longer installed on the device. 

Affected platforms:
Mitigated: BattlEye has provided an updated patch to known impacted games. For a list of recent games that use BattlEye, go to https://www.battleye.com/.

Workaround: Before updating your machine, we recommend you do one or more of the following:

For more troubleshooting options, see https://www.battleye.com/support/faq/.

Next steps: We are working with BattlEye and gaming partners to ensure games are automatically updated with the latest BattlEye software. We have confirmed the latest version of impacted games do not exhibit this issue. To minimize the chance of hitting this upgrade compatibility hold, please make sure you are running the latest version of your games before attempting to update the operating system.  
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until you have installed an updated version of BattlEye software that resolves this issue.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
07:34 AM PT

Opened:
May 21, 2019
07:34 AM PT From fbe7ea1507dcba5028f5b2618d072c5aa9b69fa7 Mon Sep 17 00:00:00 2001 From: Corrine Horvath Date: Fri, 24 May 2019 12:41:02 -0700 Subject: [PATCH 02/30] Latest updates for 1903 product version issues (#298) (#299) --- windows/release-information/status-windows-10-1507.yml | 2 +- .../status-windows-10-1607-and-windows-server-2016.yml | 2 +- windows/release-information/status-windows-10-1703.yml | 2 +- windows/release-information/status-windows-10-1709.yml | 2 +- windows/release-information/status-windows-10-1803.yml | 2 +- .../status-windows-10-1809-and-windows-server-2019.yml | 2 +- windows/release-information/status-windows-10-1903.yml | 6 +++--- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 2 +- .../status-windows-8.1-and-windows-server-2012-r2.yml | 2 +- .../release-information/status-windows-server-2008-sp2.yml | 2 +- windows/release-information/status-windows-server-2012.yml | 2 +- 11 files changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index dd98581223..ce1f513a1a 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1507 metadata: document_id: title: Windows 10, version 1507 - description: View annoucements and review known issues and fixes for Windows 10 version 1507 + description: View announcements and review known issues and fixes for Windows 10 version 1507 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 6ac43dc23c..6ab0ab998a 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1607 and Windows Server 2016 metadata: document_id: title: Windows 10, version 1607 and Windows Server 2016 - description: View annoucements and review known issues and fixes for Windows 10 version 1607 and Windows Server 2016 + description: View announcements and review known issues and fixes for Windows 10 version 1607 and Windows Server 2016 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 7190ce8dc6..9b9ae8bc5c 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1703 metadata: document_id: title: Windows 10, version 1703 - description: View annoucements and review known issues and fixes for Windows 10 version 1703 + description: View announcements and review known issues and fixes for Windows 10 version 1703 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 165d1cbd86..2dcfa87bc9 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1709 and Windows Server, version 1709 metadata: document_id: title: Windows 10, version 1709 and Windows Server, version 1709 - description: View annoucements and review known issues and fixes for Windows 10 version 1709 and Windows Server 1709 + description: View announcements and review known issues and fixes for Windows 10 version 1709 and Windows Server 1709 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 102e57aef1..bf573328bb 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1803 metadata: document_id: title: Windows 10, version 1803 - description: View annoucements and review known issues and fixes for Windows 10 version 1803 + description: View announcements and review known issues and fixes for Windows 10 version 1803 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 0a80e53db1..c19588480c 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1809 and Windows Server 2019 metadata: document_id: title: Windows 10, version 1809 and Windows Server 2019 - description: View annoucements and review known issues and fixes for Windows 10 version 1809 and Windows Server 2019 + description: View announcements and review known issues and fixes for Windows 10 version 1809 and Windows Server 2019 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index d38140c25f..8c8426c932 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -5,7 +5,7 @@ title: Windows 10, version 1903 and Windows Server, version 1903 metadata: document_id: title: Windows 10, version 1903 and Windows Server, version 1903 - description: View annoucements and review known issues and fixes for Windows 10 version 1903 and Windows Server 1903 + description: View announcements and review known issues and fixes for Windows 10 version 1903 and Windows Server 1903 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay @@ -68,10 +68,10 @@ sections:
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
04:47 PM PT
Audio not working with Dolby Atmos headphones and home theater
Users may experience audio loss with Dolby Atmos headphones or Dolby Atmos home theater.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
07:17 AM PT
Duplicate folders and documents showing in user profile directory
If known folders (e.g. Desktop, Documents, or Pictures folders) are redirected, an empty folder with that same name may be created.

See details >OS Build 18362.116

May 21, 2019
KB4505057Investigating
May 21, 2019
07:16 AM PT +
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 24, 2019
11:02 AM PT
AMD RAID driver incompatibility
Installation process may stop when trying to install Windows 10, version 1903 update on computers that run certain versions of AMD RAID drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 23, 2019
09:28 AM PT
Error attempting to update with external USB device or memory card attached
PCs with an external USB device or SD memory card attached may get error: \"This PC can't be upgraded to Windows 10.\"

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:49 PM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:48 PM PT -
Night light settings do not apply in some cases
Microsoft has identified some scenarios where night light settings may stop working.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:48 PM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:47 PM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 or Intel RealSense S200 camera apps.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:47 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >OS Build 18362.116

May 21, 2019
KB4505057Mitigated
May 21, 2019
04:46 PM PT @@ -95,10 +95,10 @@ sections:
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Window 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: Restart your device to apply changes to brightness.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution that will be made available in upcoming release.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:56 AM PT
Audio not working with Dolby Atmos headphones and home theater
After updating to Windows 10, version 1903, you may experience loss of audio with Dolby Atmos for home theater (free extension) or Dolby Atmos for headphones (paid extension) acquired through the Microsoft Store due to a licensing configuration error.
 
This occurs due to an issue with a Microsoft Store licensing component, where license holders are not able to connect to the Dolby Access app and enable Dolby Atmos extensions.
 
To safeguard your update experience, we have applied protective hold on devices from being offered Windows 10, version 1903 until this issue is resolved. This configuration error will not result in loss of access for the acquired license once the problem is resolved.

Affected platforms:
Next steps: We are working on a resolution for Microsoft Store and estimate a solution will be available in mid-June.
Note We recommend you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved. 

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
07:17 AM PT

Opened:
May 21, 2019
07:16 AM PT
Duplicate folders and documents showing in user profile directory
If you have redirected known folders (e.g. Desktop, Documents, or Pictures folders) you may see an empty folder with the same name in your %userprofile% directories after updating to Windows 10, version 1903. This may occur if known folders were redirected when you chose to back up your content to OneDrive using the OneDrive wizard, or if you chose to back up your content during the Windows Out-of-Box-Experience (OOBE). This may also occur if you redirected your known folders manually through the Properties dialog box in File Explorer. ​This issue does not cause any user files to be deleted and a solution is in progress.

To safeguard your update experience, we have applied a quality hold on devices with redirected known folders from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Next steps: Microsoft is working on a resolution and estimates a solution will be available in late May.
Note We recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Investigating
Last updated:
May 21, 2019
07:16 AM PT

Opened:
May 21, 2019
07:16 AM PT +
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

Microsoft has identified some scenarios where night light settings may stop working, for example:
Affected platforms:
Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 24, 2019
11:02 AM PT

Opened:
May 21, 2019
07:28 AM PT
AMD RAID driver incompatibility
Microsoft and AMD have identified an incompatibility with AMD RAID driver versions earlier than 9.2.0.105. When you attempt to install the Windows 10, version 1903 update on a Windows 10-based computer with an affected driver version, the installation process stops and you get a message like the following:

AMD Ryzen™ or AMD Ryzen™ Threadripper™ configured in SATA or NVMe RAID mode.

“A driver is installed that causes stability problems on Windows. This driver will be disabled. Check with your software/driver provider for an updated version that runs on this version of Windows.”

 
To safeguard your update experience, we have applied a compatibility hold on devices with these AMD drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: To resolve this issue, download the latest AMD RAID drivers directly from AMD at https://www.amd.com/en/support/chipsets/amd-socket-tr4/x399. The drivers must be version 9.2.0.105 or later. Install the drivers on the affected computer, and then restart the installation process for the Windows 10, version 1903 feature update.
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.
 

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 23, 2019
09:28 AM PT

Opened:
May 21, 2019
07:12 AM PT
Error attempting to update with external USB device or memory card attached
If you have an external USB device or SD memory card attached when installing Windows 10, version 1903, you may get an error message stating \"This PC can't be upgraded to Windows 10.\" This is caused by inappropriate drive reassignment during installation.

Sample scenario: An update to Windows 10, version 1903 is attempted on a computer that has a thumb drive inserted into its USB port. Before the update, the thumb drive is mounted in the system as drive G based on the existing drive configuration. After the feature update is installed; however, the device is reassigned a different drive letter (e.g., drive H).

Note The drive reassignment is not limited to removable drives. Internal hard drives may also be affected.

To safeguard your update experience, we have applied a hold on devices with an external USB device or SD memory card attached from being offered Windows 10, version 1903 until this issue is resolved.

Affected platforms:
Workaround: To work around this issue, remove all external media, such as USB devices and SD cards, from your computer and restart installation of the Windows 10, version 1903 feature update. The update should then proceed normally.
Note If you need to keep your external device, SD memory card, or other devices attached to your computer while updating, we recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: Microsoft is working on a resolution and estimate a solution will be available in late May.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:49 PM PT

Opened:
May 21, 2019
07:38 AM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some driver versions for Bluetooth radios made by Realtek and Qualcomm. To safeguard your update experience, we have applied a compatibility hold on devices with affected driver versions for Realtek or Qualcomm Bluetooth radios from being offered Windows 10, version 1903 or Windows Server, version 1903 until the driver has been updated.

Affected platforms:
Workaround: Check with your device manufacturer (OEM) to see if an updated driver is available and install it.

Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

Next steps: Microsoft is working with Realtek and Qualcomm to release new drivers for all affected system via Windows Update.  


Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:29 AM PT -
Night light settings do not apply in some cases
Microsoft has identified some scenarios where night light settings may stop working, for example:
Affected platforms:
Workaround: If you find that your night light settings have stopped working, try turning the night light on and off, or restart your computer.  

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.


Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:28 AM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in higher than normal battery drain. If you see an intcdaud.sys notification or “What needs your attention” notification when trying to update to Windows 10, version 1903, you have an affected Intel Audio Display device driver installed on your machine (intcdaud.sys, versions 10.25.0.3 through 10.25.0.8).
  
To safeguard your update experience, we have applied a compatibility hold on devices with drivers from being offered Windows 10, version 1903 until updated device drivers have been installed.

Affected platforms:
Workaround:
On the “What needs your attention\" notification, click the Back button to remain on your current version of Windows 10. (Do not click Confirm as this will proceed with the update and you may experience compatibility issues.) Affected devices will automatically revert to the previous working configuration.

For more information, see Intel's customer support guidance and the Microsoft knowledge base article KB4465877.

Note We recommend you do not attempt to update your devices until newer device drivers are installed.

Next steps: You can opt to wait for newer drivers to be installed automatically through Windows Update or check with the computer manufacturer for the latest device driver software availability and installation procedures.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:22 AM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 and Intel RealSense S200 cameras when using the Camera app. After updating to the Windows 10 May 2019 Update and launching the Camera app, you may get an error message stating:

\"Close other apps, error code: 0XA00F4243.”


To safeguard your update experience, we have applied a protective hold on machines with Intel RealSense SR300 or Intel RealSense S200 cameras installed from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
Workaround: To temporarily resolve this issue, perform one of the following:

or

or

Note This workaround will only resolve the issue until your next system restart.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:20 AM PT
Intermittent loss of Wi-Fi connectivity
Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

Affected platforms:
Workaround: Download and install an updated Wi-Fi driver from your device manufacturer (OEM).
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

Back to topOS Build 18362.116

May 21, 2019
KB4505057Mitigated
Last updated:
May 21, 2019
04:46 PM PT

Opened:
May 21, 2019
07:13 AM PT diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 0a772954f6..43dd738aa0 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -5,7 +5,7 @@ title: Windows 7 and Windows Server 2008 R2 SP1 metadata: document_id: title: Windows 7 and Windows Server 2008 R2 SP1 - description: View annoucements and review known issues and fixes for Windows 7 and Windows Server 2008 R2 SP1 + description: View announcements and review known issues and fixes for Windows 7 and Windows Server 2008 R2 SP1 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 95074ee9dd..0dc714d139 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -5,7 +5,7 @@ title: Windows 8.1 and Windows Server 2012 R2 metadata: document_id: title: Windows 8.1 and Windows Server 2012 R2 - description: View annoucements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2 + description: View announcements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 09c429ca4b..a38199a095 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -5,7 +5,7 @@ title: Windows Server 2008 SP2 metadata: document_id: title: Windows Server 2008 SP2 - description: View annoucements and review known issues and fixes for Windows Server 2008 SP2 + description: View announcements and review known issues and fixes for Windows Server 2008 SP2 keywords: Windows, Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 3e8ed1b555..e98321c34c 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -5,7 +5,7 @@ title: Windows Server 2012 metadata: document_id: title: Windows Server 2012 - description: View annoucements and review known issues and fixes for Windows Server 2012 + description: View announcements and review known issues and fixes for Windows Server 2012 keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay From 716919732f13528d31f0cf7847e3daa9dfbfac56 Mon Sep 17 00:00:00 2001 From: Corrine Horvath Date: Fri, 24 May 2019 18:01:28 -0700 Subject: [PATCH 03/30] Windows to go and Windows 10 Known issue content updates (#304) * update author * add new issues (#303) --- ...ystem-image-using-configuration-manager.md | 3 +-- ...e-boot-image-with-configuration-manager.md | 3 +-- ...-windows-10-using-configuration-manager.md | 3 +-- ...-10-using-pxe-and-configuration-manager.md | 3 +-- ...em-center-2012-r2-configuration-manager.md | 3 +-- ...0-deployment-with-configuration-manager.md | 3 +-- ...0-deployment-with-configuration-manager.md | 3 +-- ...f-windows-10-with-configuration-manager.md | 3 +-- ...-windows-10-using-configuration-manager.md | 3 +-- ...-windows-10-using-configuration-manager.md | 3 +-- ...ctice-recommendations-for-windows-to-go.md | 25 +++++++------------ ...oyment-considerations-for-windows-to-go.md | 6 +++-- ...ection-considerations-for-windows-to-go.md | 6 +++-- .../planning/windows-10-compatibility.md | 3 +-- .../windows-10-deployment-considerations.md | 3 +-- .../windows-10-infrastructure-requirements.md | 3 +-- ...indows-to-go-frequently-asked-questions.md | 6 +++-- windows/deployment/upgrade/log-files.md | 1 - windows/deployment/upgrade/quick-fixes.md | 1 - .../upgrade/resolution-procedures.md | 1 - .../resolve-windows-10-upgrade-errors.md | 1 - windows/deployment/upgrade/submit-errors.md | 1 - .../deployment/upgrade/upgrade-error-codes.md | 1 - ...with-system-center-configuraton-manager.md | 3 +-- ...0-with-the-microsoft-deployment-toolkit.md | 3 +-- ...de-readiness-to-manage-windows-upgrades.md | 1 - .../upgrade/windows-error-reporting.md | 1 - ...ws-upgrade-and-migration-considerations.md | 1 - .../windows-deployment-scenarios-and-tools.md | 3 +-- .../resolved-issues-windows-10-1607.yml | 2 ++ ...indows-10-1607-and-windows-server-2016.yml | 2 ++ .../status-windows-10-1903.yml | 4 +++ 32 files changed, 45 insertions(+), 63 deletions(-) diff --git a/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md index 9935a8a53c..4581484ae3 100644 --- a/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md index e5da6f79dd..c8324e1658 100644 --- a/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md index 96d8d3f119..b925e01e72 100644 --- a/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md b/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md index d06a6f7dc7..6e4fefc40a 100644 --- a/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md b/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md index 936611965a..bedd7988b2 100644 --- a/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md index 5765cc0355..2b616d34ce 100644 --- a/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md index b0878d4298..c025496608 100644 --- a/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md index 05a4969529..9cbc4421c2 100644 --- a/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md index 1585e2bf48..248bf84a0d 100644 --- a/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md index 93e54633fa..b8be3c7760 100644 --- a/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/planning/best-practice-recommendations-for-windows-to-go.md b/windows/deployment/planning/best-practice-recommendations-for-windows-to-go.md index aece2d16f5..8d88d7e3ab 100644 --- a/windows/deployment/planning/best-practice-recommendations-for-windows-to-go.md +++ b/windows/deployment/planning/best-practice-recommendations-for-windows-to-go.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: plan ms.pagetype: mobility ms.sitesec: library -author: mtniehaus -ms.date: 04/19/2017 +author: greg-lindsay ms.topic: article --- @@ -19,18 +18,16 @@ ms.topic: article - Windows 10 +>[!IMPORTANT] +>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs. + The following are the best practice recommendations for using Windows To Go: - Always shut down Windows and wait for shutdown to complete before removing the Windows To Go drive. - - Do not insert the Windows To Go drive into a running computer. - - Do not boot the Windows To Go drive from a USB hub. Always insert the Windows To Go drive directly into a port on the computer. - - If available, use a USB 3.0 port with Windows To Go. - - Do not install non-Microsoft core USB drivers on Windows To Go. - - Suspend BitLocker on Windows host computers before changing the BIOS settings to boot from USB and then resume BitLocker protection. Additionally, we recommend that when you plan your deployment you should also plan a standard operating procedure for answering questions about which USB drives can be used for Windows To Go and how to enable booting from USB to assist your IT department or help desk in supporting users and work groups that want to use Windows To Go. It may be very helpful for your organization to work with your hardware vendors to create an IT standard for USB drives for use with Windows To Go, so that if groups within your organization want to purchase drives they can quickly determine which ones they should obtain. @@ -38,15 +35,11 @@ Additionally, we recommend that when you plan your deployment you should also pl ## More information -[Windows To Go: feature overview](windows-to-go-overview.md) - -[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) - -[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) - -[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) - -[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) +[Windows To Go: feature overview](windows-to-go-overview.md)
+[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md)
+[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md)
+[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md)
+[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md)
  diff --git a/windows/deployment/planning/deployment-considerations-for-windows-to-go.md b/windows/deployment/planning/deployment-considerations-for-windows-to-go.md index 9730a3defb..ebc102b50f 100644 --- a/windows/deployment/planning/deployment-considerations-for-windows-to-go.md +++ b/windows/deployment/planning/deployment-considerations-for-windows-to-go.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: plan ms.pagetype: mobility ms.sitesec: library -author: mtniehaus -ms.date: 04/19/2017 +author: greg-lindsay ms.topic: article --- @@ -19,6 +18,9 @@ ms.topic: article - Windows 10 +>[!IMPORTANT] +>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs. + From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB drive. Given that Windows To Go was designed as an enterprise solution, extra consideration was given to the deployment workflows that enterprises already have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs. **Note**   diff --git a/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go.md b/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go.md index 683018e1d1..46b875752d 100644 --- a/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go.md +++ b/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: plan ms.pagetype: mobility, security ms.sitesec: library -author: mtniehaus -ms.date: 04/19/2017 +author: greg-lindsay ms.topic: article --- @@ -19,6 +18,9 @@ ms.topic: article - Windows 10 +>[!IMPORTANT] +>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs. + One of the most important requirements to consider when you plan your Windows To Go deployment is to ensure that the data, content, and resources you work with in the Windows To Go workspace is protected and secure. ## Backup and restore diff --git a/windows/deployment/planning/windows-10-compatibility.md b/windows/deployment/planning/windows-10-compatibility.md index 1fe897263a..d93e7a14a8 100644 --- a/windows/deployment/planning/windows-10-compatibility.md +++ b/windows/deployment/planning/windows-10-compatibility.md @@ -8,8 +8,7 @@ ms.mktglfcycl: plan ms.pagetype: appcompat ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/planning/windows-10-deployment-considerations.md b/windows/deployment/planning/windows-10-deployment-considerations.md index 99f0aa2457..6537ed94e3 100644 --- a/windows/deployment/planning/windows-10-deployment-considerations.md +++ b/windows/deployment/planning/windows-10-deployment-considerations.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: plan ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/planning/windows-10-infrastructure-requirements.md b/windows/deployment/planning/windows-10-infrastructure-requirements.md index f1a6b4ae5c..6633bec7a7 100644 --- a/windows/deployment/planning/windows-10-infrastructure-requirements.md +++ b/windows/deployment/planning/windows-10-infrastructure-requirements.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: plan ms.localizationpriority: medium ms.sitesec: library -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/planning/windows-to-go-frequently-asked-questions.md b/windows/deployment/planning/windows-to-go-frequently-asked-questions.md index 235406b45a..bef1ea2050 100644 --- a/windows/deployment/planning/windows-to-go-frequently-asked-questions.md +++ b/windows/deployment/planning/windows-to-go-frequently-asked-questions.md @@ -7,8 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.pagetype: mobility ms.sitesec: library -author: mtniehaus -ms.date: 04/19/2017 +author: greg-lindsay ms.topic: article --- @@ -19,6 +18,9 @@ ms.topic: article - Windows 10 +>[!IMPORTANT] +>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs. + The following list identifies some commonly asked questions about Windows To Go. - [What is Windows To Go?](#wtg-faq-whatis) diff --git a/windows/deployment/upgrade/log-files.md b/windows/deployment/upgrade/log-files.md index a966f7ad8e..34e613e06a 100644 --- a/windows/deployment/upgrade/log-files.md +++ b/windows/deployment/upgrade/log-files.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 03/30/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/quick-fixes.md b/windows/deployment/upgrade/quick-fixes.md index d8b5c9b9e4..dd4f34cf81 100644 --- a/windows/deployment/upgrade/quick-fixes.md +++ b/windows/deployment/upgrade/quick-fixes.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 05/03/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 3b660307e8..d017fb37d3 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 03/30/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index 3193a41095..90038e88cf 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 04/18/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/submit-errors.md b/windows/deployment/upgrade/submit-errors.md index a3241982d6..09c55dda74 100644 --- a/windows/deployment/upgrade/submit-errors.md +++ b/windows/deployment/upgrade/submit-errors.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 03/16/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-error-codes.md b/windows/deployment/upgrade/upgrade-error-codes.md index 398c6de350..376e24d7dc 100644 --- a/windows/deployment/upgrade/upgrade-error-codes.md +++ b/windows/deployment/upgrade/upgrade-error-codes.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 08/18/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md b/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md index d9763887fe..66be7de286 100644 --- a/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md +++ b/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md @@ -6,8 +6,7 @@ keywords: upgrade, update, task sequence, deploy ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md b/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md index 7986e2b587..b72077d3c3 100644 --- a/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md +++ b/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md @@ -8,8 +8,7 @@ ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt -author: mtniehaus -ms.date: 07/27/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index e3ad02a8ae..8cbc00b791 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -6,7 +6,6 @@ ms.localizationpriority: medium ms.prod: w10 author: jaimeo ms.author: jaimeo -ms.date: 07/31/2018 ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-error-reporting.md b/windows/deployment/upgrade/windows-error-reporting.md index 3b2cb8c678..7c39de2e38 100644 --- a/windows/deployment/upgrade/windows-error-reporting.md +++ b/windows/deployment/upgrade/windows-error-reporting.md @@ -7,7 +7,6 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 03/30/2018 ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md index b2bade848b..9299c644fc 100644 --- a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md +++ b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md @@ -6,7 +6,6 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: greg-lindsay -ms.date: 11/17/2017 ms.topic: article --- diff --git a/windows/deployment/windows-deployment-scenarios-and-tools.md b/windows/deployment/windows-deployment-scenarios-and-tools.md index 2682bbad0b..18511a429a 100644 --- a/windows/deployment/windows-deployment-scenarios-and-tools.md +++ b/windows/deployment/windows-deployment-scenarios-and-tools.md @@ -6,8 +6,7 @@ keywords: deploy, volume activation, BitLocker, recovery, install, installation, ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: mtniehaus -ms.date: 07/12/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 9606bb5208..05e0114961 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -68,6 +69,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Update not showing as applicable through WSUS or SCCM or when manually installed
Update not showing as applicable through WSUS or SCCM or when manually installed

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4498947
May 14, 2019
10:00 AM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4505052
May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
May 14, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
May 14, 2019
10:00 AM PT
+
DetailsOriginating updateStatusHistory
Update not showing as applicable through WSUS or SCCM or when manually installed
KB4494440 or later updates may not show as applicable through WSUS or SCCM to the affected platforms. When manually installing the standalone update from Microsoft Update Catalog, it may fail to install with the error, \"The update is not applicable to your computer.\"


Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016

Resolution: The servicing stack update (SSU) (KB4498947) must be installed before installing the latest cumulative update (LCU). The LCU will not be reported as applicable until the SSU is installed. For more information, see Servicing stack updates.

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4498947
Resolved:
May 14, 2019
10:00 AM PT

Opened:
May 24, 2019
04:20 PM PT
Unable to access some gov.uk websites
After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505052) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505052 from Windows Update and then restarting your device.

This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505052, search for it in the Microsoft Update Catalog.
 

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4505052
Resolved:
May 19, 2019
02:00 PM PT

Opened:
May 16, 2019
01:57 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue has been resolved.

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
Resolved:
May 14, 2019
10:00 AM PT

Opened:
May 10, 2019
10:35 AM PT
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 6ab0ab998a..9d8c343d5d 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -66,6 +66,7 @@ sections:
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT +
Update not showing as applicable through WSUS or SCCM or when manually installed
Update not showing as applicable through WSUS or SCCM or when manually installed

See details >OS Build 14393.2969

May 14, 2019
KB4494440Resolved
KB4498947May 14, 2019
10:00 AM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >OS Build 14393.2969

May 14, 2019
KB4494440Resolved
KB4505052May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >OS Build 14393.2941

April 25, 2019
KB4493473Resolved
KB4494440May 14, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >OS Build 14393.2941

April 25, 2019
KB4493473Resolved
KB4494440May 14, 2019
10:00 AM PT @@ -86,6 +87,7 @@ sections: text: " +
DetailsOriginating updateStatusHistory
Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some devices running Windows Server 2016 with Hyper-V enabled may enter Bitlocker recovery mode and receive an error, \"0xC0210000\" after installing KB4494440 and restarting.

Note Windows 10, version 1607 may also be affected when Bitlocker and Hyper-V are both enabled.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Workaround: If your device is already in this state, you can successfully start Windows after suspending Bitlocker from the Windows Recovery Environment (WinRE) using the following steps:
  1. Retrieve the 48 digit Bitlocker recovery password for the OS volume from your organization's portal or from wherever the key was stored when Bitlocker was first enabled.
  2. From the recovery screen, press the enter key and enter the recovery password when prompted.
  3. If your device starts in the Windows Recovery Environment and asks for recovery key again, select Skip the drive to continue to WinRE.
  4. select Advanced options then Troubleshoot then Advanced options then Command Prompt.
  5. Unlock OS drive using the command: Manage-bde -unlock c: -rp <48 digit numerical recovery password separated by “-“ in 6 digit group>
  6. Suspend Bitlocker using the command: Manage-bde -protectors -disable c:
  7. Exit the command window using the command: exit
  8. Select Continue from recovery environment.
  9. The device should now start Windows.
  10. Once started, launch an Administrator Command Prompt and resume the Bitlocker to ensure the system remains protected, using the command: Manage-bde -protectors -enable c:
Note The workaround needs to be followed on every system restart unless Bitlocker is suspended before restarting.

To prevent this issue, execute the following command to temporarily suspend Bitlocker just before restarting the system: Manage-bde -protectors -disable c: -rc 1
Note This command will suspend Bitlocker for 1 restart of the device (-rc 1 option only works inside OS and does not work from recovery environment).

Next steps: Microsoft is presently investigating this issue and will provide an update when available.

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Mitigated
Last updated:
May 23, 2019
09:57 AM PT

Opened:
May 21, 2019
08:50 AM PT
Update not showing as applicable through WSUS or SCCM or when manually installed
KB4494440 or later updates may not show as applicable through WSUS or SCCM to the affected platforms. When manually installing the standalone update from Microsoft Update Catalog, it may fail to install with the error, \"The update is not applicable to your computer.\"


Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016

Resolution: The servicing stack update (SSU) (KB4498947) must be installed before installing the latest cumulative update (LCU). The LCU will not be reported as applicable until the SSU is installed. For more information, see Servicing stack updates.

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4498947
Resolved:
May 14, 2019
10:00 AM PT

Opened:
May 24, 2019
04:20 PM PT
Unable to access some gov.uk websites
After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505052) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505052 from Windows Update and then restarting your device.

This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505052, search for it in the Microsoft Update Catalog.
 

Back to top
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4505052
Resolved:
May 19, 2019
02:00 PM PT

Opened:
May 16, 2019
01:57 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue has been resolved.

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
Resolved:
May 14, 2019
10:00 AM PT

Opened:
May 10, 2019
10:35 AM PT
diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 8c8426c932..af33cd8bed 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,6 +65,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + @@ -92,6 +94,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.113

May 14, 2019
KB4497936
Acknowledged
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
After updating to Windows 10, version 1903, you may experience a loss of functionality when using the Dynabook Smartphone Link application.

See details >
OS Build 18362.113

May 14, 2019
KB4497936
Investigating
May 24, 2019
03:10 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
04:47 PM PT
Audio not working with Dolby Atmos headphones and home theater
Users may experience audio loss with Dolby Atmos headphones or Dolby Atmos home theater.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
07:17 AM PT
Duplicate folders and documents showing in user profile directory
If known folders (e.g. Desktop, Documents, or Pictures folders) are redirected, an empty folder with that same name may be created.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
07:16 AM PT
+ + From edea56c9fc79fdaea20ef2eaf420784da74bdfda Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Wed, 29 May 2019 13:33:40 -0700 Subject: [PATCH 04/30] latest update for 1903 (#315) (#316) --- .../status-windows-10-1607-and-windows-server-2016.yml | 2 -- windows/release-information/status-windows-10-1703.yml | 10 ---------- windows/release-information/status-windows-10-1709.yml | 10 ---------- windows/release-information/status-windows-10-1803.yml | 2 -- windows/release-information/status-windows-10-1903.yml | 8 ++++---- ...status-windows-7-and-windows-server-2008-r2-sp1.yml | 2 -- .../status-windows-8.1-and-windows-server-2012-r2.yml | 2 -- 7 files changed, 4 insertions(+), 32 deletions(-) diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9d8c343d5d..65f77cb12b 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -70,7 +70,6 @@ sections: -
DetailsOriginating updateStatusHistory
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimate a solution will be available in late June.

Back to top
OS Build 18362.113

May 14, 2019
KB4497936
Acknowledged
Last updated:
May 24, 2019
04:20 PM PT

Opened:
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
Some users may experience a loss of functionality after updating to Windows 10, version 1903 when using the Dynabook Smartphone Link application on Windows devices. Loss of functionality may affect the display of phone numbers in the Call menu and the ability to answer phone calls on the Windows PC.

To safeguard your update experience, we have applied a compatibility hold on devices with Dynabook Smartphone Link from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: Microsoft and Dynabook are working on a resolution; the Dynabook Smartphone Link application may have a loss of functionality until this issue is resolved.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 18362.113

May 14, 2019
KB4497936
Investigating
Last updated:
May 24, 2019
03:10 PM PT

Opened:
May 24, 2019
03:10 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Window 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: Restart your device to apply changes to brightness.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution that will be made available in upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:56 AM PT
Audio not working with Dolby Atmos headphones and home theater
After updating to Windows 10, version 1903, you may experience loss of audio with Dolby Atmos for home theater (free extension) or Dolby Atmos for headphones (paid extension) acquired through the Microsoft Store due to a licensing configuration error.
 
This occurs due to an issue with a Microsoft Store licensing component, where license holders are not able to connect to the Dolby Access app and enable Dolby Atmos extensions.
 
To safeguard your update experience, we have applied protective hold on devices from being offered Windows 10, version 1903 until this issue is resolved. This configuration error will not result in loss of access for the acquired license once the problem is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution for Microsoft Store and estimate a solution will be available in mid-June.
Note We recommend you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved. 

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
07:17 AM PT

Opened:
May 21, 2019
07:16 AM PT
Duplicate folders and documents showing in user profile directory
If you have redirected known folders (e.g. Desktop, Documents, or Pictures folders) you may see an empty folder with the same name in your %userprofile% directories after updating to Windows 10, version 1903. This may occur if known folders were redirected when you chose to back up your content to OneDrive using the OneDrive wizard, or if you chose to back up your content during the Windows Out-of-Box-Experience (OOBE). This may also occur if you redirected your known folders manually through the Properties dialog box in File Explorer. ​This issue does not cause any user files to be deleted and a solution is in progress.

To safeguard your update experience, we have applied a quality hold on devices with redirected known folders from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: Microsoft is working on a resolution and estimates a solution will be available in late May.
Note We recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
07:16 AM PT

Opened:
May 21, 2019
07:16 AM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Resolved
KB4505052
May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
May 14, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Resolved
KB4494440
May 14, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
" @@ -109,7 +108,6 @@ sections: -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489882, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment:
  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension

Restart the WDSServer service after disabling the Variable Window Extension.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489882, Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493473

Back to top
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 9b9ae8bc5c..0b291ebc3c 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -63,7 +63,6 @@ sections:
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 15063.1563

January 08, 2019
KB4480973Mitigated
April 25, 2019
02:00 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >OS Build 15063.1805

May 14, 2019
KB4499181Resolved
KB4505055May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >OS Build 15063.1784

April 25, 2019
KB4493436Resolved
KB4499181May 14, 2019
10:00 AM PT -
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 15063.1689

March 12, 2019
KB4489871Resolved
KB4493436April 25, 2019
02:00 PM PT " @@ -84,15 +83,6 @@ sections: " -- title: March 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489871, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493436

Back to top
OS Build 15063.1689

March 12, 2019
KB4489871
Resolved
KB4493436
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 2dcfa87bc9..e2195cb7e2 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -64,7 +64,6 @@ sections:
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >OS Build 16299.1143

May 14, 2019
KB4498946Resolved
KB4505062May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >OS Build 16299.1127

April 25, 2019
KB4493440Resolved
KB4499179May 14, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >OS Build 16299.1127

April 25, 2019
KB4493440Resolved
KB4499179May 14, 2019
10:00 AM PT -
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 16299.1029

March 12, 2019
KB4489886Resolved
KB4493440April 25, 2019
02:00 PM PT " @@ -94,15 +93,6 @@ sections: " -- title: March 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Custom URI schemes may not start corresponding application
After installing KB4489886, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493440

Back to top
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493440
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index bf573328bb..1c68256e88 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,7 +65,6 @@ sections:
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >OS Build 17134.765

May 14, 2019
KB4499167Resolved
KB4505064May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >OS Build 17134.753

April 25, 2019
KB4493437Resolved
KB4499167May 14, 2019
10:00 AM PT
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >OS Build 17134.753

April 25, 2019
KB4493437Resolved
KB4499167May 14, 2019
10:00 AM PT -
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493437April 25, 2019
02:00 PM PT " @@ -102,7 +101,6 @@ sections: -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489868, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1: 
Open an Administrator Command prompt and type the following:  
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No
 

 Option 2: 
Use the Windows Deployment Services UI to make the following adjustment:  
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.  
Option 3: 
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 
 
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489868, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493437

Back to top
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
Resolved:
April 25, 2019
02:00 PM PT

Opened:
March 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index af33cd8bed..ec803d2fa7 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,8 +65,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- - + + @@ -94,8 +94,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.113

May 14, 2019
KB4497936
Acknowledged
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
After updating to Windows 10, version 1903, you may experience a loss of functionality when using the Dynabook Smartphone Link application.

See details >
OS Build 18362.113

May 14, 2019
KB4497936
Investigating
May 24, 2019
03:10 PM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Acknowledged
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
After updating to Windows 10, version 1903, you may experience a loss of functionality when using the Dynabook Smartphone Link application.

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
May 24, 2019
03:10 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
04:47 PM PT
Audio not working with Dolby Atmos headphones and home theater
Users may experience audio loss with Dolby Atmos headphones or Dolby Atmos home theater.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
07:17 AM PT
Duplicate folders and documents showing in user profile directory
If known folders (e.g. Desktop, Documents, or Pictures folders) are redirected, an empty folder with that same name may be created.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
May 21, 2019
07:16 AM PT
- - + + diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 43dd738aa0..70bb640684 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -66,7 +66,6 @@ sections: -
DetailsOriginating updateStatusHistory
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimate a solution will be available in late June.

Back to top
OS Build 18362.113

May 14, 2019
KB4497936
Acknowledged
Last updated:
May 24, 2019
04:20 PM PT

Opened:
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
Some users may experience a loss of functionality after updating to Windows 10, version 1903 when using the Dynabook Smartphone Link application on Windows devices. Loss of functionality may affect the display of phone numbers in the Call menu and the ability to answer phone calls on the Windows PC.

To safeguard your update experience, we have applied a compatibility hold on devices with Dynabook Smartphone Link from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: Microsoft and Dynabook are working on a resolution; the Dynabook Smartphone Link application may have a loss of functionality until this issue is resolved.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 18362.113

May 14, 2019
KB4497936
Investigating
Last updated:
May 24, 2019
03:10 PM PT

Opened:
May 24, 2019
03:10 PM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimate a solution will be available in late June.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Acknowledged
Last updated:
May 24, 2019
04:20 PM PT

Opened:
May 24, 2019
04:20 PM PT
Loss of functionality in Dynabook Smartphone Link app
Some users may experience a loss of functionality after updating to Windows 10, version 1903 when using the Dynabook Smartphone Link application on Windows devices. Loss of functionality may affect the display of phone numbers in the Call menu and the ability to answer phone calls on the Windows PC.

To safeguard your update experience, we have applied a compatibility hold on devices with Dynabook Smartphone Link from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: Microsoft and Dynabook are working on a resolution; the Dynabook Smartphone Link application may have a loss of functionality until this issue is resolved.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
Last updated:
May 24, 2019
03:10 PM PT

Opened:
May 24, 2019
03:10 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Window 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: Restart your device to apply changes to brightness.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution that will be made available in upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:56 AM PT
Audio not working with Dolby Atmos headphones and home theater
After updating to Windows 10, version 1903, you may experience loss of audio with Dolby Atmos for home theater (free extension) or Dolby Atmos for headphones (paid extension) acquired through the Microsoft Store due to a licensing configuration error.
 
This occurs due to an issue with a Microsoft Store licensing component, where license holders are not able to connect to the Dolby Access app and enable Dolby Atmos extensions.
 
To safeguard your update experience, we have applied protective hold on devices from being offered Windows 10, version 1903 until this issue is resolved. This configuration error will not result in loss of access for the acquired license once the problem is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution for Microsoft Store and estimate a solution will be available in mid-June.
Note We recommend you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved. 

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
07:17 AM PT

Opened:
May 21, 2019
07:16 AM PT
Duplicate folders and documents showing in user profile directory
If you have redirected known folders (e.g. Desktop, Documents, or Pictures folders) you may see an empty folder with the same name in your %userprofile% directories after updating to Windows 10, version 1903. This may occur if known folders were redirected when you chose to back up your content to OneDrive using the OneDrive wizard, or if you chose to back up your content during the Windows Out-of-Box-Experience (OOBE). This may also occur if you redirected your known folders manually through the Properties dialog box in File Explorer. ​This issue does not cause any user files to be deleted and a solution is in progress.

To safeguard your update experience, we have applied a quality hold on devices with redirected known folders from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: Microsoft is working on a resolution and estimates a solution will be available in late May.
Note We recommend that you do not attempt to manually update to Windows 10, version 1903 using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Investigating
Last updated:
May 21, 2019
07:16 AM PT

Opened:
May 21, 2019
07:16 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Resolved
May 14, 2019
01:22 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Resolved
May 14, 2019
01:21 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Resolved
KB4499164
May 14, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
" @@ -95,7 +94,6 @@ sections:
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
May 14, 2019
01:23 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
May 14, 2019
01:22 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
May 14, 2019
01:21 PM PT

Opened:
April 09, 2019
10:00 AM PT -
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493472 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493472Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 0dc714d139..e76412be72 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -69,7 +69,6 @@ sections:
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Resolved
May 14, 2019
01:22 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Resolved
May 14, 2019
01:22 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493446Resolved
May 14, 2019
01:21 PM PT -
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT " @@ -100,7 +99,6 @@ sections:
System may be unresponsive after restart if ArcaBit antivirus software installed
Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
May 14, 2019
01:22 PM PT

Opened:
April 09, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
May 14, 2019
01:22 PM PT

Opened:
April 09, 2019
10:00 AM PT
System may be unresponsive after restart if Avira antivirus software installed
Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
May 14, 2019
01:21 PM PT

Opened:
April 09, 2019
10:00 AM PT -
Devices may not respond at login or Welcome screen if running certain Avast software
Microsoft and Avast have identified an issue on devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software after you install KB4493446 and restart. Devices may become unresponsive at the login or Welcome screen. Additionally, you may be unable to log in or log in after an extended period of time.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: Avast has released emergency updates to address this issue. For more information and AV update schedule, see the Avast support KB article.

Back to topApril 09, 2019
KB4493446Resolved
Resolved:
April 25, 2019
02:00 PM PT

Opened:
April 09, 2019
10:00 AM PT " From 96159d931fcf2efe52d6be804d0c86d3b7164743 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Tue, 4 Jun 2019 20:13:08 -0700 Subject: [PATCH 05/30] Latest update for 1607 issues (#351) (#352) --- .../status-windows-10-1607-and-windows-server-2016.yml | 10 ++++++++++ .../status-windows-10-1809-and-windows-server-2019.yml | 2 -- 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 65f77cb12b..d360349da1 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -80,6 +81,15 @@ sections:
" +- title: June 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
Some applications may fail to run as expected on clients of AD FS 2016
Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Mitigated
June 04, 2019
05:55 PM PT
Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some devices running Windows Server with Hyper-V enabled may start into Bitlocker recovery with error 0xC0210000

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Mitigated
May 23, 2019
09:57 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
Issue using PXE to start a device from WDS
There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
Some applications may fail to run as expected on clients of AD FS 2016
Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of KB4493473 on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X-Frame Options set to DENY.

Affected platforms:
  • Server: Windows Server 2016
Workaround: You can use the Allow-From value of the header if the IFRAME is only accessing pages from a single-origin URL. On the affected server, open a PowerShell window as an administrator and run the following command: set-AdfsResponseHeaders -SetHeaderName X-Frame-Options -SetHeaderValue \"allow-from https://example.com\"

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Mitigated
Last updated:
June 04, 2019
05:55 PM PT

Opened:
June 04, 2019
05:55 PM PT
+ " + - title: May 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index c19588480c..5b4036e0c0 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -76,7 +76,6 @@ sections:
Zone transfers over TCP may fail
Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

See details >OS Build 17763.475

May 03, 2019
KB4495667Resolved
KB4494441May 14, 2019
10:00 AM PT
Latest cumulative update (KB 4495667) installs automatically
Reports that the optional cumulative update (KB 4495667) installs automatically.

See details >OS Build 17763.475

May 03, 2019
KB4495667Resolved
May 08, 2019
03:37 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
After further investigation ArcaBit has confirmed this issue is not applicable to Windows 10, version 1809

See details >OS Build 17763.437

April 09, 2019
KB4493509Resolved
May 08, 2019
03:30 PM PT -
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17763.379

March 12, 2019
KB4489899Resolved
KB4495667May 03, 2019
10:00 AM PT " @@ -118,7 +117,6 @@ sections: -
DetailsOriginating updateStatusHistory
Issue using PXE to start a device from WDS
After installing KB4489899, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:
Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No 
 

Option 2:
Use the Windows Deployment Services UI to make the following adjustment: 
  1. Open Windows Deployment Services from Windows Administrative Tools. 
  2. Expand Servers and right-click a WDS server. 
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.
Option 3:
Set the following registry value to 0:
HKLM\\System\\CurrentControlSet\\Services\\WDSServer\\Providers\\WDSTFTP\\EnableVariableWindowExtension  

Restart the WDSServer service after disabling the Variable Window Extension. 

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. 

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
Last updated:
April 09, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
After installing KB4489899, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Workaround: Right-click the URL link to open it in a new window or tab, or enable Protected Mode in Internet Explorer for local intranet and trusted sites
  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view of change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted Sites and then select Enable Protected Mode
  4. Select OK.
You must restart the browser after making these changes.

Resolution: This issue is resolved in KB4495667.

Back to top
OS Build 17763.379

March 12, 2019
KB4489899
Resolved
KB4495667
Resolved:
May 03, 2019
10:00 AM PT

Opened:
March 12, 2019
10:00 AM PT
" From b9320aeb8c1f691f4ee19f385b518fc91cfa8e51 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Wed, 5 Jun 2019 20:00:11 -0700 Subject: [PATCH 06/30] Latest updates on issues (#364) (#365) --- .../status-windows-10-1607-and-windows-server-2016.yml | 2 ++ windows/release-information/status-windows-10-1703.yml | 10 ++++++++++ windows/release-information/status-windows-10-1709.yml | 10 ++++++++++ windows/release-information/status-windows-10-1803.yml | 10 ++++++++++ .../status-windows-10-1809-and-windows-server-2019.yml | 10 ++++++++++ 5 files changed, 42 insertions(+) diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index d360349da1..1eca3ca4f5 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -86,6 +87,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

See details >
OS Build 14393.2999

May 23, 2019
KB4499177
Mitigated
June 05, 2019
05:54 PM PT
Some applications may fail to run as expected on clients of AD FS 2016
Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)

See details >
OS Build 14393.2941

April 25, 2019
KB4493473
Mitigated
June 04, 2019
05:55 PM PT
Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
Some devices running Windows Server with Hyper-V enabled may start into Bitlocker recovery with error 0xC0210000

See details >
OS Build 14393.2969

May 14, 2019
KB4494440
Mitigated
May 23, 2019
09:57 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2019; Windows Server 2016
Workaround: To set the Default Search Provider, use the following steps:
  1. Open an Administrator Command prompt and type the following: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://microsoft.com
  2. After Internet Explorer has opened, go to the Settings menu and select Manage add-ons.
  3. Select Search Providers in left pane.
  4. Select the link Find more search providers in the bottom left of the dialog.
  5. A new Internet Explorer window should open, allowing you to select a search provider.
  6. Select Add under the Search Provider you prefer.
  7. The Add Search Provider dialog should open, select Add.
  8. You should now be able to open Internet Explorer 11 normally.

Next steps: We are working on a resolution and estimate a solution will be available in mid-June.

Back to top
OS Build 14393.2999

May 23, 2019
KB4499177
Mitigated
Last updated:
June 05, 2019
05:54 PM PT

Opened:
June 05, 2019
05:49 PM PT
Some applications may fail to run as expected on clients of AD FS 2016
Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of KB4493473 on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X-Frame Options set to DENY.

Affected platforms:
  • Server: Windows Server 2016
Workaround: You can use the Allow-From value of the header if the IFRAME is only accessing pages from a single-origin URL. On the affected server, open a PowerShell window as an administrator and run the following command: set-AdfsResponseHeaders -SetHeaderName X-Frame-Options -SetHeaderValue \"allow-from https://example.com\"

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2941

April 25, 2019
KB4493473
Mitigated
Last updated:
June 04, 2019
05:55 PM PT

Opened:
June 04, 2019
05:55 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 0b291ebc3c..d2bbefcfbd 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -73,6 +74,15 @@ sections:
" +- title: June 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

See details >
OS Build 15063.1839

May 28, 2019
KB4499162
Mitigated
June 05, 2019
05:54 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 15063.1805

May 14, 2019
KB4499181
Resolved
KB4505055
May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 15063.1784

April 25, 2019
KB4493436
Resolved
KB4499181
May 14, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2019; Windows Server 2016
Workaround: To set the Default Search Provider, use the following steps:
  1. Open an Administrator Command prompt and type the following: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://microsoft.com
  2. After Internet Explorer has opened, go to the Settings menu and select Manage add-ons.
  3. Select Search Providers in left pane.
  4. Select the link Find more search providers in the bottom left of the dialog.
  5. A new Internet Explorer window should open, allowing you to select a search provider.
  6. Select Add under the Search Provider you prefer.
  7. The Add Search Provider dialog should open, select Add.
  8. You should now be able to open Internet Explorer 11 normally.

Next steps: We are working on a resolution and estimate a solution will be available in mid-June.

Back to top
OS Build 15063.1839

May 28, 2019
KB4499162
Mitigated
Last updated:
June 05, 2019
05:54 PM PT

Opened:
June 05, 2019
05:49 PM PT
+ " + - title: May 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index e2195cb7e2..3e277103e3 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -74,6 +75,15 @@ sections:
" +- title: June 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

See details >
OS Build 16299.1182

May 28, 2019
KB4499147
Mitigated
June 05, 2019
05:54 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 16299.1143

May 14, 2019
KB4498946
Resolved
KB4505062
May 19, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
OS Build 16299.1127

April 25, 2019
KB4493440
Resolved
KB4499179
May 14, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2019; Windows Server 2016
Workaround: To set the Default Search Provider, use the following steps:
  1. Open an Administrator Command prompt and type the following: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://microsoft.com
  2. After Internet Explorer has opened, go to the Settings menu and select Manage add-ons.
  3. Select Search Providers in left pane.
  4. Select the link Find more search providers in the bottom left of the dialog.
  5. A new Internet Explorer window should open, allowing you to select a search provider.
  6. Select Add under the Search Provider you prefer.
  7. The Add Search Provider dialog should open, select Add.
  8. You should now be able to open Internet Explorer 11 normally.

Next steps: We are working on a resolution and estimate a solution will be available in mid-June.

Back to top
OS Build 16299.1182

May 28, 2019
KB4499147
Mitigated
Last updated:
June 05, 2019
05:54 PM PT

Opened:
June 05, 2019
05:49 PM PT
+ " + - title: May 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 1c68256e88..b1d61c3a2b 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -75,6 +76,15 @@ sections:
" +- title: June 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

See details >
OS Build 17134.799

May 21, 2019
KB4499183
Mitigated
June 05, 2019
05:54 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Mitigated
April 25, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 17134.765

May 14, 2019
KB4499167
Resolved
KB4505064
May 19, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2019; Windows Server 2016
Workaround: To set the Default Search Provider, use the following steps:
  1. Open an Administrator Command prompt and type the following: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://microsoft.com
  2. After Internet Explorer has opened, go to the Settings menu and select Manage add-ons.
  3. Select Search Providers in left pane.
  4. Select the link Find more search providers in the bottom left of the dialog.
  5. A new Internet Explorer window should open, allowing you to select a search provider.
  6. Select Add under the Search Provider you prefer.
  7. The Add Search Provider dialog should open, select Add.
  8. You should now be able to open Internet Explorer 11 normally.

Next steps: We are working on a resolution and estimate a solution will be available in mid-June.

Back to top
OS Build 17134.799

May 21, 2019
KB4499183
Mitigated
Last updated:
June 05, 2019
05:54 PM PT

Opened:
June 05, 2019
05:49 PM PT
+ " + - title: May 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5b4036e0c0..637ed14d71 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -86,6 +87,15 @@ sections:
" +- title: June 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

See details >
OS Build 17763.529

May 21, 2019
KB4497934
Mitigated
June 05, 2019
05:54 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
May 02, 2019
04:47 PM PT
Issue using PXE to start a device from WDS
Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

See details >
OS Build 17763.379

March 12, 2019
KB4489899
Mitigated
April 09, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
opening Internet Explorer 11 may fail
Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2019; Windows Server 2016
Workaround: To set the Default Search Provider, use the following steps:
  1. Open an Administrator Command prompt and type the following: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://microsoft.com
  2. After Internet Explorer has opened, go to the Settings menu and select Manage add-ons.
  3. Select Search Providers in left pane.
  4. Select the link Find more search providers in the bottom left of the dialog.
  5. A new Internet Explorer window should open, allowing you to select a search provider.
  6. Select Add under the Search Provider you prefer.
  7. The Add Search Provider dialog should open, select Add.
  8. You should now be able to open Internet Explorer 11 normally.

Next steps: We are working on a resolution and estimate a solution will be available in mid-June.

Back to top
OS Build 17763.529

May 21, 2019
KB4497934
Mitigated
Last updated:
June 05, 2019
05:54 PM PT

Opened:
June 05, 2019
05:49 PM PT
+ " + - title: May 2019 - items: - type: markdown From ce500fde9bac815e2e63096beb20ab4c44160c79 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Thu, 6 Jun 2019 15:54:17 -0700 Subject: [PATCH 07/30] Latest updates for issues content (#379) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Updated deployment-vdi-windows-defender-antivirus.md * Updated deployment-vdi-windows-defender-antivirus.md * Updated deployment-vdi-windows-defender-antivirus.md * updates for new vdi stuff * Adding important note to solve #3493 * Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Typo "<"→"<", ">"→">" https://docs.microsoft.com/en-us/windows/application-management/manage-windows-mixed-reality * Issue #2297 * Update windows/security/identity-protection/hello-for-business/hello-identity-verification.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Clarification * Update windows/security/identity-protection/hello-for-business/hello-identity-verification.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update windows/security/identity-protection/hello-for-business/hello-identity-verification.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * update troubleshoot-np.md * update configure-endpoints-gp.md * Removing a part which is not supported * Name change * update troubleshoot-np.md * removed on-premises added -hello * Added link into Domain controller guide * Line corections * corrected formatting of xml code samples When viewing the page in Win 10/Edge, the xml code samples stretched across the page, running into the side menu. The lack of line breaks also made it hard to read. This update adds line breaks and syntax highlighting, replaces curly double quotes with standard double quotes, and adds a closing tag for for each code sample * Update windows/security/identity-protection/hello-for-business/hello-identity-verification.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update windows/deployment/update/waas-delivery-optimization-reference.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update windows/deployment/update/waas-delivery-optimization-reference.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * corrected formating of XML examples The XML samples here present the same formatting problems as in about-the-connection-group-file51.md (see https://github.com/MicrosoftDocs/windows-itpro-docs/pull/3847/) Perhaps we should open an issue to see if we have more versions of this code sample in the docs * corrected formatting of XML example section In the XML example on this page, the whitespace had been stripped out, so there were no spaces between adjacent attribute values or keys. This made it hard to read, though the original formatting allowed for a scroll bar, so the text was not running into the side of the page (compare to https://github.com/MicrosoftDocs/windows-itpro-docs/pull/3847 and https://github.com/MicrosoftDocs/windows-itpro-docs/pull/3850, where the uncorrected formatting forced the text to run into the side menu). * update configure-endpoints-gp.md * Fixed error in registry path and improved description * Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Removing extra line in 25 Suggested by * update windows-analytics-azure-portal.md * re: broken links, credential-guard-considerations Context: * #3513, MVA is being retired and producing broken links * #3860 Microsoft Virtual Academy video links This page contains two links to deprecated video content on Microsoft Virtual Academy (MVA). MVA is being retired. In addition, the Deep Dive course the two links point to is already retired, and no replacement course exists. I removed the first link, as I could not find a similar video available describing which credentials are covered by credential guard. I replaced the second link with a video containing similar material, though it is not a "deep dive". Suggestions on handling this problem, as many pages contain similar links, would be appreciated,. * removed link to retired video re: #3867 Context: * #3513, MVA is being retired and producing broken links * #3867, Microsoft Virtual Academy video links This page contains a broken link to deprecated video content on Microsoft Virtual Academy (MVA). MVA is being retired. In addition, the Deep Dive course is already retired, and no replacement course exists. I removed the whole _See Also_ section, as I could not find a video narrowly or deeply addressing how to protect privelaged users with Credential Guard. The most likely candidate is too short and general: https://www.linkedin.com/learning/cism-cert-prep-1-information-security-governance/privileged-account-management * addressing broken mva links, #3817 Context: * #3513, MVA is being retired and producing broken links * #3817, Another broken link This page contains two links to deprecated video content on Microsoft Virtual Academy (MVA). MVA is being retired. In addition, the Deep Dive course the two links point to is already retired, and no replacement course exists. I removed the first link, as we no longer have a video with similar content for a similar audience. The most likely candidate is https://www.linkedin.com/learning/programming-foundations-web-security-2/types-of-credential-attacks, which is more general and for a less technical audience. I removed the second link and the _See Also_ section, as I could not find a similar video narrowly focused on which credentials are covered by Credential Guard. Most of the related material available now describes how to perform a task. * Update deployment-vdi-windows-defender-antivirus.md * typo fix re: #3876; DMSA -> DSMA * Addressing dead MVA links, #3818 This page, like its fellows in the mva-links label, contains links to a retired video course on a website that is retiring soon. The links listed by the user in issue #3818 were also on several other pages, related to Credentials Guard. These links were addressed in the pull requests #3875, #3872, and #3871 Credentials threat & lateral threat link: removed (see PR #3875 for reasoning) Virtualization link: replaced (see #3871 for reasoning) Credentials protected link: removed (see #3872 for reasoning) * Adding notes for known issue in script Solves #3869 * Updated the download link admx files Windows 10 Added link for April 2018 and Oct 2018 ADMX files. * added event logs path Referenced : https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard * Update browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md Suggestions applied. Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update deployment-vdi-windows-defender-antivirus.md * screenshot update * Add files via upload * update 4 scrrenshots * Update deployment-vdi-windows-defender-antivirus.md * Update browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Re: #3909 Top link is broken, #3909 > The link here does not work: > Applies to: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) The link to the pdf describing MDATP was broken. Thankfully, PR #2897 updated the same link in another page some time ago, so I didn't have to go hunting for an equivalent * CI Update * Updated as per task 3405344 * Updated author * Update windows-analytics-azure-portal.md * added the example query * Updated author fields * Update office-csp.md * update video for testing * update video * Update surface-hub-site-readiness-guide.md line 134 Fixed video link MD formatting * fixing video url * updates from Albert * Bulk replaced author to manikadhiman * Bulk replaced ms.author to v-madhi * Latest content is published (#371) * Added 1903 policy DDF link and fixed a typo * Reverted the DDF version * Latest update (#375) * Update deployment-vdi-windows-defender-antivirus.md * Update deployment-vdi-windows-defender-antivirus.md --- browsers/edge/about-microsoft-edge.md | 254 +-- .../edge/change-history-for-microsoft-edge.md | 59 +- browsers/edge/docfx.json | 63 +- browsers/edge/edge-technical-demos.md | 4 +- .../security-privacy-management-gp.md | 27 +- .../allow-address-bar-suggestions-include.md | 9 +- .../includes/allow-adobe-flash-include.md | 9 +- .../allow-clearing-browsing-data-include.md | 9 +- .../allow-config-updates-books-include.md | 9 +- .../edge/includes/allow-cortana-include.md | 11 +- .../edge/includes/allow-dev-tools-include.md | 13 +- .../allow-enable-book-library-include.md | 9 +- .../allow-ext-telemetry-books-tab-include.md | 9 +- .../edge/includes/allow-extensions-include.md | 9 +- .../includes/allow-full-screen-include.md | 9 +- .../allow-inprivate-browsing-include.md | 9 +- ...ow-microsoft-compatibility-list-include.md | 9 +- .../edge/includes/allow-prelaunch-include.md | 9 +- .../edge/includes/allow-printing-include.md | 9 +- .../includes/allow-saving-history-include.md | 9 +- ...low-search-engine-customization-include.md | 9 +- .../allow-shared-folder-books-include.md | 10 +- .../allow-sideloading-extensions-include.md | 9 +- .../includes/allow-tab-preloading-include.md | 9 +- .../allow-web-content-new-tab-page-include.md | 9 +- .../always-enable-book-library-include.md | 9 +- ...igure-additional-search-engines-include.md | 9 +- ...figure-adobe-flash-click-to-run-include.md | 9 +- .../includes/configure-autofill-include.md | 11 +- ...er-telemetry-for-m365-analytics-include.md | 25 +- .../includes/configure-cookies-include.md | 11 +- .../configure-do-not-track-include.md | 11 +- ...e-edge-kiosk-reset-idle-timeout-include.md | 2 +- ...igure-enterprise-mode-site-list-include.md | 11 +- .../includes/configure-home-button-include.md | 15 +- ...ure-kiosk-mode-supported-values-include.md | 10 +- .../configure-open-edge-with-include.md | 15 +- .../configure-password-manager-include.md | 11 +- .../configure-pop-up-blocker-include.md | 11 +- ...-search-suggestions-address-bar-include.md | 11 +- .../includes/configure-start-pages-include.md | 9 +- ...re-windows-defender-smartscreen-include.md | 11 +- ...disable-lockdown-of-start-pages-include.md | 11 +- .../do-not-sync-browser-settings-include.md | 9 +- browsers/edge/includes/do-not-sync-include.md | 9 +- .../includes/keep-fav-sync-ie-edge-include.md | 9 +- .../prevent-access-about-flag-include.md | 9 +- ...nt-bypassing-win-defender-files-include.md | 9 +- ...nt-bypassing-win-defender-sites-include.md | 9 +- ...ent-certificate-error-overrides-include.md | 9 +- .../prevent-changes-to-favorites-include.md | 9 +- .../prevent-first-run-webpage-open-include.md | 11 +- ...prevent-live-tile-pinning-start-include.md | 9 +- ...nt-localhost-address-for-webrtc-include.md | 9 +- ...turning-off-required-extensions-include.md | 9 +- ...sers-to-turn-on-browser-syncing-include.md | 10 +- .../includes/provision-favorites-include.md | 9 +- .../send-all-intranet-sites-ie-include.md | 9 +- .../set-default-search-engine-include.md | 11 +- .../includes/set-home-button-url-include.md | 9 +- .../edge/includes/set-new-tab-url-include.md | 11 +- .../show-message-opening-sites-ie-include.md | 11 +- .../includes/unlock-home-button-include.md | 11 +- browsers/edge/microsoft-edge-forrester.md | 2 +- .../edge/microsoft-edge-kiosk-mode-deploy.md | 28 +- browsers/internet-explorer/docfx.json | 69 +- ...rsion-1-schema-and-enterprise-mode-tool.md | 10 +- ...rsion-2-schema-and-enterprise-mode-tool.md | 8 +- ...sing-the-version-1-enterprise-mode-tool.md | 16 +- ...sing-the-version-2-enterprise-mode-tool.md | 42 +- .../administrative-templates-and-ie11.md | 8 +- ...ation-and-auto-proxy-problems-with-ie11.md | 28 +- .../auto-configuration-settings-for-ie11.md | 6 +- .../auto-detect-settings-for-ie11.md | 22 +- .../blocked-out-of-date-activex-controls.md | 2 + .../choose-how-to-deploy-ie11.md | 9 +- ...ct-data-using-enterprise-site-discovery.md | 4 +- ...multiple-operating-systems-or-languages.md | 14 +- ...g-automatic-version-synchronization-avs.md | 6 +- .../enterprise-mode-overview-for-ie11.md | 21 +- ...terprise-mode-schema-version-1-guidance.md | 30 +- ...terprise-mode-schema-version-2-guidance.md | 54 +- .../group-policy-and-ie11.md | 6 +- .../group-policy-objects-and-ie11.md | 6 +- ...ie11-delivery-through-automatic-updates.md | 38 +- ...o-the-enterprise-mode-site-list-manager.md | 4 +- .../install-and-deploy-ie11.md | 6 +- .../install-ie11-using-the-network.md | 14 +- ...ing-windows-server-update-services-wsus.md | 30 +- .../ie11-deploy-guide/manage-ie11-overview.md | 4 +- ...-explorer-maintenance-settings-for-ie11.md | 2 +- .../new-group-policy-settings-for-ie11.md | 63 +- .../out-of-date-activex-control-blocking.md | 14 +- .../problems-after-installing-ie11.md | 24 +- ...n-the-enterprise-mode-site-list-manager.md | 4 +- ...n-the-enterprise-mode-site-list-manager.md | 8 +- ...rprise-mode-logging-and-data-collection.md | 78 +- ...uirements-and-language-support-for-ie11.md | 22 +- .../turn-off-enterprise-mode.md | 44 +- .../turn-off-natural-metrics.md | 6 +- ...-on-enterprise-mode-and-use-a-site-list.md | 30 +- ...control-and-logging-for-enterprise-mode.md | 28 +- .../user-interface-problems-with-ie11.md | 18 +- ...ng-inf-files-to-create-install-packages.md | 20 +- .../ie11-faq/faq-for-it-pros-ie11.md | 47 +- .../internet-explorer/ie11-faq/faq-ieak11.md | 5 +- ...to-detection-dhcp-or-dns-servers-ieak11.md | 30 +- .../ie11-ieak/browser-ui-ieak11-wizard.md | 24 +- .../connection-settings-ieak11-wizard.md | 12 +- .../custombranding-ins-file-setting.md | 7 +- .../customize-automatic-search-for-ie.md | 14 +- .../ie11-ieak/hidecustom-ins-file-setting.md | 6 +- .../licensing-version-and-features-ieak11.md | 61 +- .../user-experience-ieak11-wizard.md | 34 +- devices/hololens/docfx.json | 36 +- devices/hololens/hololens-insider.md | 2 +- devices/hololens/hololens-kiosk.md | 18 +- devices/hololens/hololens-provisioning.md | 14 +- devices/hololens/hololens-whats-new.md | 16 +- devices/hololens/index.md | 2 +- .../connect-and-display-with-surface-hub.md | 20 +- ...reate-a-device-account-using-office-365.md | 10 +- devices/surface-hub/docfx.json | 75 +- .../first-run-program-surface-hub.md | 34 +- ...-deployment-surface-hub-device-accounts.md | 16 +- devices/surface-hub/index.md | 42 +- ...anage-settings-with-mdm-for-surface-hub.md | 171 +- ...-deployment-surface-hub-device-accounts.md | 166 +- ...-deployment-surface-hub-device-accounts.md | 170 +- ...repare-your-environment-for-surface-hub.md | 10 +- .../provisioning-packages-for-surface-hub.md | 26 +- .../surface-hub/set-up-your-surface-hub.md | 14 +- devices/surface-hub/skype-hybrid-voice.md | 74 +- .../surface-hub/surface-hub-recovery-tool.md | 6 +- .../surface-hub-site-readiness-guide.md | 2 +- devices/surface-hub/surface-hub-start-menu.md | 2 - ...fully-qualified-domain-name-surface-hub.md | 4 +- ...se-room-control-system-with-surface-hub.md | 16 +- devices/surface/assettag.md | 2 +- ...ace-app-with-windows-store-for-business.md | 48 +- ...-windows-10-to-surface-devices-with-mdt.md | 306 ++-- devices/surface/docfx.json | 67 +- ...and-configure-surface-devices-with-semm.md | 34 +- .../surface/manage-surface-uefi-settings.md | 14 +- .../surface/microsoft-surface-data-eraser.md | 72 +- ...-by-step-surface-deployment-accelerator.md | 115 +- devices/surface/support-solutions-surface.md | 6 +- .../surface-enterprise-management-mode.md | 4 +- .../unenroll-surface-devices-from-semm.md | 46 +- devices/surface/update.md | 6 +- ...-surface-devices-to-windows-10-with-mdt.md | 72 +- ...ion-manager-to-manage-devices-with-semm.md | 32 +- .../surface/using-the-sda-deployment-share.md | 54 +- .../wake-on-lan-for-surface-devices.md | 8 +- education/docfx.json | 67 +- ...configure-microsoft-store-for-education.md | 24 +- .../get-started/enable-microsoft-teams.md | 16 +- .../finish-setup-and-other-tasks.md | 60 +- .../get-started-with-microsoft-education.md | 18 +- .../inclusive-classroom-it-admin.md | 176 +- .../set-up-office365-edu-tenant.md | 20 +- .../set-up-windows-10-education-devices.md | 8 +- .../set-up-windows-education-devices.md | 8 +- .../get-started/use-intune-for-education.md | 130 +- education/get-started/use-school-data-sync.md | 134 +- .../educator-tib-get-started.md | 86 +- .../trial-in-a-box/itadmin-tib-get-started.md | 28 +- education/trial-in-a-box/support-options.md | 18 +- education/windows/autopilot-reset.md | 14 +- education/windows/change-to-pro-education.md | 6 +- .../windows/chromebook-migration-guide.md | 84 +- .../configure-windows-for-education.md | 44 +- .../deploy-windows-10-in-a-school-district.md | 122 +- .../windows/deploy-windows-10-in-a-school.md | 215 +-- .../windows/edu-deployment-recommendations.md | 18 +- .../education-scenarios-store-for-business.md | 2 +- .../enable-s-mode-on-surface-go-devices.md | 34 +- .../windows/get-minecraft-for-education.md | 6 +- education/windows/index.md | 26 +- education/windows/school-get-minecraft.md | 4 +- .../set-up-school-pcs-azure-ad-join.md | 2 +- .../set-up-school-pcs-provisioning-package.md | 56 +- .../windows/set-up-school-pcs-technical.md | 2 +- .../set-up-students-pcs-to-join-domain.md | 32 +- education/windows/take-a-test-multiple-pcs.md | 108 +- education/windows/take-a-test-single-pc.md | 58 +- education/windows/take-tests-in-windows-10.md | 22 +- education/windows/test-windows10s-for-edu.md | 2 +- .../windows/use-set-up-school-pcs-app.md | 4 +- mdop/agpm/agpm-server-tab-agpm30ops.md | 6 +- mdop/agpm/agpm-server-tab-agpm40.md | 6 +- ...ve-or-reject-a-pending-action-agpm30ops.md | 6 +- ...prove-or-reject-a-pending-action-agpm40.md | 6 +- .../approve-or-reject-a-pending-action.md | 6 +- mdop/agpm/back-up-the-archive-agpm40.md | 6 +- mdop/agpm/back-up-the-archive.md | 6 +- ...ster-the-agpm-server-and-archive-agpm40.md | 24 +- ...-administer-the-agpm-server-and-archive.md | 24 +- ...-create-edit-and-deploy-a-gpo-agpm30ops.md | 20 +- ...ist-create-edit-and-deploy-a-gpo-agpm40.md | 22 +- .../checklist-create-edit-and-deploy-a-gpo.md | 20 +- ...oosing-which-version-of-agpm-to-install.md | 16 +- ...gure-e-mail-security-for-agpm-agpm30ops.md | 6 +- ...nfigure-e-mail-security-for-agpm-agpm40.md | 6 +- mdop/agpm/create-a-template-agpm30ops.md | 6 +- mdop/agpm/create-a-template-agpm40.md | 6 +- mdop/agpm/create-a-template.md | 6 +- ...nd-setting-a-default-template-agpm30ops.md | 6 +- ...e-and-setting-a-default-template-agpm40.md | 6 +- ...template-and-setting-a-default-template.md | 6 +- ...individual-gpo-in-the-archive-agpm30ops.md | 8 +- ...an-individual-gpo-in-the-archive-agpm40.md | 8 +- ...n-level-access-to-the-archive-agpm30ops.md | 6 +- ...main-level-access-to-the-archive-agpm40.md | 6 +- mdop/agpm/delegate-domain-level-access.md | 6 +- ...anagement-of-a-controlled-gpo-agpm30ops.md | 8 +- ...e-management-of-a-controlled-gpo-agpm40.md | 8 +- mdop/agpm/deploy-a-gpo-agpm30ops.md | 6 +- mdop/agpm/deploy-a-gpo-agpm40.md | 6 +- mdop/agpm/deploy-a-gpo.md | 6 +- mdop/agpm/edit-a-gpo-offline-agpm30ops.md | 6 +- mdop/agpm/edit-a-gpo-offline-agpm40.md | 6 +- mdop/agpm/history-window-agpm30ops.md | 19 +- mdop/agpm/history-window-agpm40.md | 19 +- mdop/agpm/index.md | 10 +- ...limit-the-gpo-versions-stored-agpm30ops.md | 6 +- .../limit-the-gpo-versions-stored-agpm40.md | 6 +- .../managing-the-agpm-service-agpm30ops.md | 6 +- mdop/agpm/managing-the-agpm-service-agpm40.md | 6 +- mdop/agpm/managing-the-agpm-service.md | 6 +- mdop/agpm/modify-the-agpm-service-account.md | 8 +- .../agpm/modify-the-agpm-service-agpm30ops.md | 14 +- mdop/agpm/modify-the-agpm-service-agpm40.md | 14 +- mdop/agpm/modify-the-archive-path.md | 6 +- ...-port-on-which-the-agpm-service-listens.md | 6 +- ...-the-agpm-server-and-the-archive-agpm40.md | 10 +- .../move-the-agpm-server-and-the-archive.md | 10 +- ...forming-agpm-administrator-tasks-agpm40.md | 6 +- .../performing-approver-tasks-agpm30ops.md | 8 +- mdop/agpm/performing-approver-tasks-agpm40.md | 8 +- mdop/agpm/performing-approver-tasks.md | 8 +- .../agpm/performing-editor-tasks-agpm30ops.md | 8 +- mdop/agpm/performing-editor-tasks-agpm40.md | 8 +- mdop/agpm/performing-editor-tasks.md | 8 +- ...-restoration-of-a-deleted-gpo-agpm30ops.md | 6 +- ...est-restoration-of-a-deleted-gpo-agpm40.md | 6 +- mdop/agpm/restore-a-deleted-gpo-agpm30ops.md | 6 +- mdop/agpm/restore-a-deleted-gpo-agpm40.md | 6 +- mdop/agpm/restore-a-deleted-gpo.md | 6 +- ...o-a-previous-version-of-a-gpo-agpm30ops.md | 6 +- ...oll-back-to-a-previous-version-of-a-gpo.md | 6 +- ...k-to-an-earlier-version-of-a-gpo-agpm40.md | 6 +- mdop/agpm/set-a-default-template-agpm30ops.md | 6 +- mdop/agpm/set-a-default-template-agpm40.md | 6 +- mdop/agpm/set-a-default-template.md | 6 +- ...art-and-stop-the-agpm-service-agpm30ops.md | 8 +- .../start-and-stop-the-agpm-service-agpm40.md | 8 +- mdop/agpm/start-and-stop-the-agpm-service.md | 8 +- ...oft-advanced-group-policy-management-25.md | 22 +- ...oft-advanced-group-policy-management-30.md | 44 +- ...oft-advanced-group-policy-management-40.md | 46 +- mdop/agpm/technical-overview-of-agpm.md | 12 +- mdop/agpm/template-commands-agpm30ops.md | 14 +- mdop/agpm/template-commands-agpm40.md | 14 +- mdop/agpm/templates-tab.md | 14 +- mdop/agpm/using-a-test-environment.md | 6 +- ...p-v-package-accelerators--app-v-46-sp1-.md | 8 +- ...bout-application-virtualization-servers.md | 6 +- ...osoft-application-virtualization-46-sp2.md | 10 +- ...microsoft-application-virtualization-46.md | 6 +- mdop/appv-v4/about-publishing.md | 6 +- mdop/appv-v4/about-sequencing-phases.md | 6 +- ...he-application-virtualization-sequencer.md | 8 +- mdop/appv-v4/about-the-deployment-tab.md | 21 +- mdop/appv-v4/about-the-properties-tab.md | 6 +- .../appv-v4/about-the-virtual-registry-tab.md | 8 +- .../about-using-the-sequencer-command-line.md | 6 +- mdop/appv-v4/add-app.md | 10 +- ...virus-running-dialog-box--app-v-46-sp1-.md | 6 +- mdop/appv-v4/app-v-45-sp2-release-notes.md | 8 +- mdop/appv-v4/app-v-46-release-notes.md | 8 +- mdop/appv-v4/app-v-46-sp1-release-notes.md | 6 +- mdop/appv-v4/app-v-46-sp2-release-notes.md | 8 +- .../app-v-client-registry-values-sp1.md | 347 ++-- mdop/appv-v4/app-v-desktop-client-security.md | 12 +- mdop/appv-v4/app-v-installation-checklist.md | 28 +- ...interoperability-with-windows-applocker.md | 6 +- .../app-v-postinstallation-checklist.md | 16 +- .../app-v-pre-installation-checklist.md | 23 +- mdop/appv-v4/app-v-upgrade-checklist.md | 73 +- ...ient-hardware-and-software-requirements.md | 16 +- ...lient-installer-command-line-parameters.md | 64 +- ...n-virtualization-properties-general-tab.md | 6 +- ...ncer-hardware-and-software-requirements.md | 24 +- ...sequencing-wizard-advanced-options-page.md | 21 +- ...encing-wizard-monitor-installation-page.md | 24 +- ...lization-server-based-scenario-overview.md | 10 +- ...tion-virtualization-system-requirements.md | 14 +- mdop/appv-v4/applications-licenses-node.md | 6 +- .../applications-results-pane-columns.md | 6 +- ...pplication-virtualization-sequencer-sp1.md | 6 +- mdop/appv-v4/command-line-errors.md | 8 +- mdop/appv-v4/command-line-parameters.md | 6 +- ...v-management-server-or-streaming-server.md | 8 +- ...ertificates-to-support-secure-streaming.md | 6 +- ...upport-the-app-v-web-management-service.md | 6 +- .../configuring-iis-for-secure-streaming.md | 6 +- .../create-package-page--app-v-46-sp1.md | 6 +- mdop/appv-v4/delete-package.md | 10 +- mdop/appv-v4/delete-server.md | 10 +- .../determine-your-streaming-method.md | 16 +- ...re-distribution-based-scenario-overview.md | 6 +- mdop/appv-v4/exclusion-item-dialog-box.md | 6 +- ...e-type-association-results-pane-columns.md | 6 +- mdop/appv-v4/how-to-add-a-package-version.md | 6 +- mdop/appv-v4/how-to-add-a-package.md | 8 +- mdop/appv-v4/how-to-add-a-server.md | 6 +- .../how-to-add-an-administrator-group.md | 8 +- ...ual-application-package---app-v-46-sp1-.md | 76 +- ...n-app-v-project-template--app-v-46-sp1-.md | 6 +- ...he-proper-credentials-for-windows-vista.md | 6 +- ...--the-proper-credentials-for-windows-xp.md | 6 +- ...ate-an-application-with-a-license-group.md | 10 +- mdop/appv-v4/how-to-branch-a-package.md | 16 +- .../how-to-change-package-properties.md | 6 +- ...e-size-and-the-drive-letter-designation.md | 26 +- ...eporting-levels-and-reset-the-log-files.md | 8 +- .../how-to-change-the-server-cache-size.md | 6 +- ...gging-level-and-the-database-parameters.md | 8 +- mdop/appv-v4/how-to-change-the-server-port.md | 6 +- .../how-to-change-user-access-permissions.md | 6 +- mdop/appv-v4/how-to-clear-an-application.md | 6 +- ...nly-cache-on-the-app-v-client--rds--sp1.md | 122 +- ...ad-only-cache-on-the-app-v-client--vdi-.md | 120 +- ...ement-server-security-post-installation.md | 6 +- ...-sql-server-mirroring-support-for-app-v.md | 30 +- ...-file-type-association-behavior-46-only.md | 8 +- ...stry-settings-by-using-the-command-line.md | 8 +- ...ation-virtualization-management-servers.md | 8 +- ...cation-virtualization-streaming-servers.md | 6 +- ...lient-for-application-package-retrieval.md | 176 +- ...-client-for-disconnected-operation-mode.md | 6 +- .../how-to-configure-the-client-log-file.md | 8 +- .../how-to-configure-the-file-server.md | 10 +- .../how-to-configure-the-server-for-iis.md | 6 +- ...the-server-to-be-trusted-for-delegation.md | 8 +- ...-windows-server-2003-firewall-for-app-v.md | 10 +- ...-windows-server-2008-firewall-for-app-v.md | 6 +- ...to-an-application-virtualization-system.md | 40 +- mdop/appv-v4/how-to-create-a-reportserver.md | 8 +- ...n-app-v-project-template--app-v-46-sp1-.md | 6 +- ...p-v-package-accelerators--app-v-46-sp1-.md | 58 +- ...ow-to-create-the-package-root-directory.md | 6 +- ...te-the-sequencer-package-root-directory.md | 6 +- .../how-to-delete-a-package-version.md | 8 +- mdop/appv-v4/how-to-delete-a-packageserver.md | 6 +- ...-applications-by-using-the-command-line.md | 8 +- .../how-to-delete-an-application-server.md | 6 +- mdop/appv-v4/how-to-delete-an-application.md | 6 +- .../how-to-deny-access-to-an-application.md | 6 +- ...application-to-sequence---app-v-46-sp1-.md | 16 +- ...to-edit-an-osd-file-using-a-text-editor.md | 6 +- mdop/appv-v4/how-to-edit-an-osd-file.md | 10 +- .../how-to-grant-access-to-an-application.md | 6 +- mdop/appv-v4/how-to-import-an-application.md | 6 +- .../how-to-import-an-applicationserver.md | 16 +- mdop/appv-v4/how-to-install-a-database.md | 18 +- ...t-console-for-a-more-secure-environment.md | 6 +- ...l-and-configure-the-default-application.md | 14 +- ...cation-virtualization-management-server.md | 68 +- ...-the-app-v-client-by-using-setupmsi-new.md | 24 +- ...he-application-virtualization-sequencer.md | 6 +- ...ication-virtualization-streaming-server.md | 18 +- ...he-client-by-using-the-command-line-new.md | 10 +- .../how-to-install-the-management-console.md | 8 +- ...w-to-install-the-management-web-service.md | 12 +- ...o-install-the-sequencer---app-v-46-sp1-.md | 30 +- ...stall-the-servers-and-system-components.md | 6 +- .../appv-v4/how-to-load-files-and-packages.md | 8 +- .../how-to-load-or-unload-an-application.md | 6 +- ...ions-from-the-desktop-notification-area.md | 6 +- ...groups-in-the-server-management-console.md | 6 +- ...censes-in-the-server-management-console.md | 6 +- ...client-cache-using-performance-counters.md | 6 +- ...to-manage-virtual-applications-manually.md | 12 +- ...l-the-application-virtualization-client.md | 112 +- ...-sql-database-to-a-different-sql-server.md | 6 +- ...tual-application-package--app-v-46-sp1-.md | 16 +- ...t-management-server-or-streaming-server.md | 6 +- ...ow-to-modify-the-log-directory-location.md | 6 +- ...with-an-existing-windows-installer-file.md | 6 +- ...o-modify-the-scratch-directory-location.md | 6 +- .../how-to-move-an-application-group.md | 6 +- mdop/appv-v4/how-to-move-an-application.md | 8 +- ...nced-application-using-the-command-line.md | 6 +- ...ish-a-virtual-application-on-the-client.md | 6 +- .../how-to-refresh-the-publishing-servers.md | 8 +- ...ove-an-application-from-a-license-group.md | 8 +- .../how-to-remove-an-application-group.md | 8 +- ...-to-remove-an-application-license-group.md | 6 +- mdop/appv-v4/how-to-rename-an-application.md | 6 +- mdop/appv-v4/how-to-run-a-reportserver.md | 6 +- ...n-or-plug-in-application--app-v-46-sp1-.md | 62 +- ...o-sequence-a-new-application--app-v-46-.md | 38 +- ...w-application-by-using-the-command-line.md | 74 +- ...lication-package-using-the-command-line.md | 74 +- .../how-to-sequence-a-new-application.md | 26 +- ...w-middleware-application--app-v-46-sp1-.md | 40 +- ...new-standard-application--app-v-46-sp1-.md | 60 +- .../appv-v4/how-to-sequence-an-application.md | 28 +- ...up-and-enable-or-disable-authentication.md | 8 +- .../how-to-set-up-or-disable-database-size.md | 6 +- ...ow-to-set-up-or-disable-usage-reporting.md | 8 +- ...w-to-set-up-periodic-publishing-refresh.md | 8 +- .../how-to-uninstall-the-app-v-client.md | 10 +- ...-package-using-the-open-package-command.md | 6 +- mdop/appv-v4/how-to-upgrade-a-package.md | 6 +- ...lication-package-using-the-command-line.md | 78 +- ...a-sequenced-virtual-application-package.md | 8 +- ...l-application-by-using-the-command-line.md | 78 +- ...-virtual-application-package--app-v-46-.md | 6 +- ...e-the-application-virtualization-client.md | 22 +- ...grade-the-servers-and-system-components.md | 8 +- .../how-to-use-dynamic-suite-composition.md | 50 +- ...-use-the-cache-space-management-feature.md | 8 +- .../how-to-use-the-differential-sft-file.md | 8 +- ...-online-with-application-virtualization.md | 6 +- ...roving-security-during-app-v-sequencing.md | 6 +- mdop/appv-v4/installation-files-page.md | 6 +- ...ent-server-or-streaming-server-securely.md | 8 +- ...server-scenarios-for-perimeter-networks.md | 10 +- ...plication-virtualization-security-guide.md | 8 +- mdop/appv-v4/load-app.md | 10 +- mdop/appv-v4/load-package.md | 10 +- ...ion-46-service-pack-2-privacy-statement.md | 6 +- ...-management-system-release-notes-45-sp1.md | 12 +- ...ization-management-system-release-notes.md | 22 +- .../package-name-page---learn-more-.md | 6 +- mdop/appv-v4/planning-for-client-security.md | 12 +- ...ng-for-migration-from-previous-versions.md | 14 +- .../planning-for-sequencer-security.md | 22 +- mdop/appv-v4/planning-for-server-security.md | 10 +- ...virtualization-sequencer-implementation.md | 8 +- ...tualization-server-based-implementation.md | 16 +- ...ic-software-distribution-implementation.md | 14 +- mdop/appv-v4/publish-package.md | 10 +- ...publishing-servers-results-pane-columns.md | 6 +- ...ation-virtualization-management-servers.md | 8 +- mdop/appv-v4/query-obj.md | 12 +- .../sequencer-command-line-error-codes.md | 6 +- ...ncer-hardware-and-software-requirements.md | 14 +- ...-application-virtualization-system-node.md | 18 +- mdop/appv-v4/sfttray-command-reference.md | 44 +- ...-for-application-virtualization-clients.md | 6 +- mdop/appv-v4/streaming-page-learn-more.md | 6 +- .../system-utilization-reportserver.md | 6 +- mdop/appv-v4/target-os-page-learn-more.md | 6 +- mdop/appv-v4/unpublish-package.md | 10 +- ...ns-in-application-virtualization-client.md | 8 +- ...ervers-as-a-package-management-solution.md | 6 +- .../about-app-v-50-dynamic-configuration.md | 824 +++++----- mdop/appv-v5/about-app-v-50-reporting.md | 42 +- mdop/appv-v5/about-app-v-50-sp1.md | 6 +- mdop/appv-v5/about-app-v-50-sp2.md | 10 +- mdop/appv-v5/about-app-v-50-sp3.md | 107 +- mdop/appv-v5/about-app-v-50.md | 10 +- .../about-app-v-51-dynamic-configuration.md | 121 +- mdop/appv-v5/about-app-v-51-reporting.md | 42 +- mdop/appv-v5/about-app-v-51.md | 60 +- .../about-client-configuration-settings.md | 116 +- .../about-the-connection-group-file.md | 66 +- .../about-the-connection-group-file51.md | 66 +- mdop/appv-v5/accessibility-for-app-v-50.md | 14 +- mdop/appv-v5/accessibility-for-app-v-51.md | 16 +- ...inistering-app-v-51-by-using-powershell.md | 30 +- ...cations-by-using-the-management-console.md | 8 +- ...administering-app-v-by-using-powershell.md | 28 +- mdop/appv-v5/app-v-50-capacity-planning.md | 44 +- mdop/appv-v5/app-v-50-deployment-checklist.md | 27 +- mdop/appv-v5/app-v-50-planning-checklist.md | 20 +- mdop/appv-v5/app-v-50-prerequisites.md | 185 +-- .../app-v-50-security-considerations.md | 37 +- mdop/appv-v5/app-v-50-sp3-prerequisites.md | 101 +- .../app-v-50-sp3-supported-configurations.md | 24 +- .../app-v-50-supported-configurations.md | 139 +- mdop/appv-v5/app-v-51-capacity-planning.md | 44 +- mdop/appv-v5/app-v-51-deployment-checklist.md | 27 +- mdop/appv-v5/app-v-51-planning-checklist.md | 20 +- mdop/appv-v5/app-v-51-prerequisites.md | 108 +- .../app-v-51-security-considerations.md | 37 +- .../app-v-51-supported-configurations.md | 26 +- ...ation-publishing-and-client-interaction.md | 100 +- ...ion-publishing-and-client-interaction51.md | 100 +- ...aging-app-v-50-virtualized-applications.md | 18 +- ...aging-app-v-51-virtualized-applications.md | 2 +- ...ng-microsoft-office-2010-by-using-app-v.md | 10 +- ...-microsoft-office-2010-by-using-app-v51.md | 10 +- ...ng-microsoft-office-2013-by-using-app-v.md | 567 +++---- ...-microsoft-office-2013-by-using-app-v51.md | 527 +++--- ...ng-microsoft-office-2016-by-using-app-v.md | 496 +++--- ...-microsoft-office-2016-by-using-app-v51.md | 494 +++--- ...oying-the-app-v-50-sequencer-and-client.md | 8 +- mdop/appv-v5/deploying-the-app-v-50-server.md | 8 +- ...oying-the-app-v-51-sequencer-and-client.md | 8 +- mdop/appv-v5/deploying-the-app-v-51-server.md | 8 +- .../getting-started-with-app-v-50--rtm.md | 10 +- mdop/appv-v5/getting-started-with-app-v-51.md | 10 +- .../high-level-architecture-for-app-v-50.md | 8 +- .../high-level-architecture-for-app-v-51.md | 8 +- ...to-access-the-client-management-console.md | 8 +- ...-access-the-client-management-console51.md | 8 +- ...using-the-management-console-51-gb18030.md | 6 +- ...ing-the-management-console-beta-gb18030.md | 6 +- ...inistrators-to-enable-connection-groups.md | 8 +- ...istrators-to-enable-connection-groups51.md | 8 +- ...-configuration-file-by-using-powershell.md | 14 +- ...onfiguration-file-by-using-powershell51.md | 14 +- ...ages-by-using-the-management-console-50.md | 6 +- ...ages-by-using-the-management-console-51.md | 6 +- ...s-updates-from-the-publishing-server-51.md | 6 +- ...updates-from-the-publishing-server-beta.md | 6 +- ...-created-in-a-previous-version-of-app-v.md | 44 +- ...reated-in-a-previous-version-of-app-v51.md | 34 +- .../how-to-create-a-connection-group.md | 6 +- .../how-to-create-a-connection-group51.md | 6 +- ...y-using-the-app-v-51-management-console.md | 14 +- .../how-to-create-a-package-accelerator.md | 76 +- .../how-to-create-a-package-accelerator51.md | 76 +- ...kage-using-an-app-v-package-accelerator.md | 52 +- ...ge-using-an-app-v-package-accelerator51.md | 52 +- ...ow-to-create-and-use-a-project-template.md | 6 +- ...-to-create-and-use-a-project-template51.md | 38 +- ...-using-electronic-software-distribution.md | 8 +- ...-using-electronic-software-distribution.md | 8 +- ...how-to-deploy-the-app-v-50-server-50sp3.md | 216 +-- ...ploy-the-app-v-50-server-using-a-script.md | 18 +- ...ploy-the-app-v-51-server-using-a-script.md | 1418 +++++++++-------- .../how-to-deploy-the-app-v-51-server.md | 216 +-- ...ow-to-deploy-the-app-v-client-51gb18030.md | 340 ++-- .../how-to-deploy-the-app-v-client-gb18030.md | 128 +- ...he-app-v-databases-by-using-sql-scripts.md | 79 +- ...-app-v-databases-by-using-sql-scripts51.md | 30 +- ...the-app-v-50-client-by-using-powershell.md | 115 +- ...the-app-v-51-client-by-using-powershell.md | 115 +- ...50-client-for-shared-content-store-mode.md | 8 +- ...51-client-for-shared-content-store-mode.md | 8 +- ...curity-identifiers--by-using-powershell.md | 502 +++--- ...rity-identifiers--by-using-powershell51.md | 502 +++--- ...m-the-management-and-reporting-services.md | 34 +- ...the-management-and-reporting-services51.md | 34 +- ...computer-and-connect-it-to-the-database.md | 26 +- ...mputer-and-connect-it-to-the-database51.md | 26 +- ...-publishing-server-on-a-remote-computer.md | 52 +- ...ublishing-server-on-a-remote-computer51.md | 52 +- ...computer-and-connect-it-to-the-database.md | 30 +- ...mputer-and-connect-it-to-the-database51.md | 30 +- ...to-install-the-sequencer-51beta-gb18030.md | 8 +- ...w-to-install-the-sequencer-beta-gb18030.md | 8 +- ...hell-cmdlets-and-get-cmdlet-help-50-sp3.md | 22 +- ...wershell-cmdlets-and-get-cmdlet-help-51.md | 18 +- ...ection-group-ignore-the-package-version.md | 12 +- ...tion-group-ignore-the-package-version51.md | 12 +- ...tand-alone-computer-by-using-powershell.md | 22 +- ...tand-alone-computer-by-using-powershell.md | 22 +- ...nd-alone-computer-by-using-powershell51.md | 12 +- ...ge-for-all-users-on-a-specific-computer.md | 40 +- ...ge-for-all-users-on-a-specific-computer.md | 40 +- ...package-to-app-v-50-for-a-specific-user.md | 30 +- ...package-to-app-v-51-for-a-specific-user.md | 30 +- ...existing-virtual-application-package-51.md | 4 +- ...isting-virtual-application-package-beta.md | 4 +- ...sing-the-admx-template-and-group-policy.md | 6 +- ...sing-the-admx-template-and-group-policy.md | 6 +- ...kage-by-using-the-management-console-50.md | 6 +- ...kage-by-using-the-management-console-51.md | 6 +- ...an-app-v-46-package-for-a-specific-user.md | 18 +- ...ge-for-all-users-on-a-specific-computer.md | 22 +- ...an-app-v-46-package-for-a-specific-user.md | 18 +- ...ge-for-all-users-on-a-specific-computer.md | 22 +- ...-application-with-app-v-50-beta-gb18030.md | 226 +-- ...-application-with-app-v-51-beta-gb18030.md | 200 +-- ...uence-a-package--by-using-powershell-50.md | 6 +- ...uence-a-package--by-using-powershell-51.md | 6 +- .../how-to-uninstall-the-app-v-50-client.md | 22 +- .../how-to-uninstall-the-app-v-51-client.md | 22 +- ...pplication-from-an-app-v-51-application.md | 4 +- ...-optional-packages-in-connection-groups.md | 22 +- ...ptional-packages-in-connection-groups51.md | 22 +- mdop/appv-v5/managing-connection-groups.md | 20 +- mdop/appv-v5/managing-connection-groups51.md | 20 +- ...rating-from-a-previous-version-app-v-50.md | 32 +- ...ing-to-app-v-51-from-a-previous-version.md | 36 +- ...dance-for-application-virtualization-50.md | 80 +- ...dance-for-application-virtualization-51.md | 80 +- ...ing-for-high-availability-with-app-v-50.md | 10 +- ...ing-for-high-availability-with-app-v-51.md | 10 +- ...rating-from-a-previous-version-of-app-v.md | 12 +- ...ting-from-a-previous-version-of-app-v51.md | 14 +- ...pp-v-50-sequencer-and-client-deployment.md | 8 +- ...ning-for-the-app-v-50-server-deployment.md | 8 +- ...pp-v-51-sequencer-and-client-deployment.md | 8 +- ...ning-for-the-app-v-51-server-deployment.md | 8 +- .../planning-for-using-app-v-with-office.md | 22 +- .../planning-for-using-app-v-with-office51.md | 22 +- ...ng-to-use-folder-redirection-with-app-v.md | 29 +- ...-to-use-folder-redirection-with-app-v51.md | 29 +- .../appv-v5/release-notes-for-app-v-50-sp1.md | 6 +- .../appv-v5/release-notes-for-app-v-50-sp2.md | 8 +- mdop/appv-v5/release-notes-for-app-v-50.md | 6 +- mdop/appv-v5/release-notes-for-app-v-51.md | 8 +- ...vironment-with-virtualized-applications.md | 12 +- ...ronment-with-virtualized-applications51.md | 12 +- ...iewing-app-v-server-publishing-metadata.md | 23 +- ...wing-app-v-server-publishing-metadata51.md | 23 +- mdop/appv-v5/whats-new-in-app-v-50.md | 10 +- mdop/dart-v10/about-dart-10.md | 8 +- mdop/dart-v10/accessibility-for-dart-10.md | 10 +- .../creating-the-dart-10-recovery-image.md | 16 +- mdop/dart-v10/dart-10-deployment-checklist.md | 14 +- mdop/dart-v10/dart-10-planning-checklist.md | 14 +- .../dart-10-supported-configurations.md | 18 +- ...ploying-the-dart-recovery-image-dart-10.md | 6 +- mdop/dart-v10/getting-started-with-dart-10.md | 6 +- mdop/dart-v10/how-to-deploy-dart-10.md | 8 +- ...ery-image-as-a-remote-partition-dart-10.md | 6 +- ...as-part-of-a-recovery-partition-dart-10.md | 6 +- ...y-using-the-dart-recovery-image-dart-10.md | 85 +- ...y-using-the-dart-recovery-image-dart-10.md | 157 +- .../overview-of-the-tools-in-dart-10.md | 18 +- ...e-and-deploy-the-dart-10-recovery-image.md | 8 +- ...ng-to-create-the-dart-10-recovery-image.md | 10 +- .../recovering-computers-using-dart-10.md | 8 +- .../security-considerations-for-dart-10.md | 8 +- mdop/dart-v7/accessibility-for-dart-70.md | 10 +- ...ating-the-dart-70-recovery-image-dart-7.md | 8 +- .../dart-70-deployment-checklist-dart-7.md | 14 +- .../dart-70-planning-checklist-dart-7.md | 14 +- ...oying-the-dart-70-recovery-image-dart-7.md | 6 +- .../getting-started-with-dart-70-new-ia.md | 6 +- mdop/dart-v7/how-to-deploy-dart-70.md | 8 +- ...very-image-as-a-remote-partition-dart-7.md | 6 +- ...-as-part-of-a-recovery-partition-dart-7.md | 6 +- ...ry-image-using-a-usb-flash-drive-dart-7.md | 8 +- ...rs-using-the-dart-recovery-image-dart-7.md | 95 +- ...rs-using-the-dart-recovery-image-dart-7.md | 151 +- ...-other-than-an-end-user-computer-dart-7.md | 6 +- ...analyzer-on-an-end-user-computer-dart-7.md | 6 +- ...ard-to-create-the-recovery-image-dart-7.md | 18 +- ...overview-of-the-tools-in-dart-70-new-ia.md | 16 +- ...e-and-deploy-the-dart-70-recovery-image.md | 8 +- mdop/dart-v7/planning-to-deploy-dart-70.md | 6 +- ...covering-computers-using-dart-70-dart-7.md | 8 +- .../release-notes-for-dart-70-new-ia.md | 4 +- ...urity-considerations-for-dart-70-dart-7.md | 8 +- mdop/dart-v8/about-dart-80-dart-8.md | 6 +- mdop/dart-v8/about-dart-81.md | 24 +- .../accessibility-for-dart-80-dart-8.md | 10 +- ...ating-the-dart-80-recovery-image-dart-8.md | 18 +- .../dart-80-deployment-checklist-dart-8.md | 14 +- .../dart-80-planning-checklist-dart-8.md | 14 +- ...dart-80-supported-configurations-dart-8.md | 18 +- ...eploying-the-dart-recovery-image-dart-8.md | 6 +- .../getting-started-with-dart-80-dart-8.md | 6 +- mdop/dart-v8/how-to-deploy-dart-80-dart-8.md | 8 +- ...very-image-as-a-remote-partition-dart-8.md | 6 +- ...-as-part-of-a-recovery-partition-dart-8.md | 6 +- ...by-using-the-dart-recovery-image-dart-8.md | 85 +- ...by-using-the-dart-recovery-image-dart-8.md | 157 +- ...overview-of-the-tools-in-dart-80-dart-8.md | 20 +- ...eploy-the-dart-80-recovery-image-dart-8.md | 8 +- ...reate-the-dart-80-recovery-image-dart-8.md | 10 +- ...covering-computers-using-dart-80-dart-8.md | 8 +- .../release-notes-for-dart-80--dart-8.md | 6 +- ...rity-considerations-for-dart-80--dart-8.md | 8 +- mdop/docfx.json | 69 +- mdop/index.md | 124 +- mdop/mbam-v1/about-mbam-10.md | 6 +- mdop/mbam-v1/accessibility-for-mbam-10.md | 10 +- .../mbam-v1/administering-mbam-10-features.md | 6 +- ...oying-the-mbam-10-server-infrastructure.md | 6 +- mdop/mbam-v1/evaluating-mbam-10.md | 53 +- mdop/mbam-v1/getting-started-with-mbam-10.md | 6 +- .../high-level-architecture-for-mbam-10.md | 6 +- ...nfigure-network-load-balancing-for-mbam.md | 16 +- ...-as-part-of-a-windows-deployment-mbam-1.md | 36 +- ...t-to-desktop-or-laptop-computers-mbam-1.md | 10 +- ...yption-state-of-a-lost-computers-mbam-1.md | 8 +- .../how-to-edit-mbam-10-gpo-settings.md | 16 +- .../how-to-generate-mbam-reports-mbam-1.md | 14 +- ...onfigure-mbam-on-a-single-server-mbam-1.md | 60 +- ...gure-mbam-on-distributed-servers-mbam-1.md | 168 +- ...stall-the-mbam-10-group-policy-template.md | 8 +- ...nguage-update-on-a-single-server-mbam-1.md | 8 +- ...ge-update-on-distributed-servers-mbam-1.md | 8 +- ...omputer-bitlocker-encryption-exemptions.md | 6 +- ...to-manage-hardware-compatibility-mbam-1.md | 10 +- ...tions-by-using-the-control-panel-mbam-1.md | 6 +- ...-bitlocker-encryption-exemptions-mbam-1.md | 14 +- ...ve-mbam-10-features-to-another-computer.md | 158 +- ...how-to-recover-a-corrupted-drive-mbam-1.md | 8 +- ...recover-a-drive-in-recovery-mode-mbam-1.md | 10 +- .../how-to-recover-a-moved-drive-mbam-1.md | 6 +- .../how-to-reset-a-tpm-lockout-mbam-1.md | 6 +- mdop/mbam-v1/mbam-10-deployment-checklist.md | 31 +- .../mbam-10-deployment-prerequisites.md | 18 +- mdop/mbam-v1/mbam-10-planning-checklist.md | 24 +- .../mbam-10-supported-configurations.md | 47 +- ...lanning-for-mbam-10-administrator-roles.md | 6 +- .../planning-for-mbam-10-client-deployment.md | 10 +- ...g-for-mbam-10-group-policy-requirements.md | 36 +- .../planning-for-mbam-10-server-deployment.md | 8 +- .../preparing-your-environment-for-mbam-10.md | 8 +- mdop/mbam-v1/release-notes-for-mbam-10.md | 24 +- .../security-considerations-for-mbam-10.md | 14 +- .../understanding-mbam-reports-mbam-1.md | 20 +- mdop/mbam-v2/about-mbam-20-mbam-2.md | 6 +- mdop/mbam-v2/about-mbam-20-sp1.md | 71 +- mdop/mbam-v2/about-the-computer-tpm-chip.md | 6 +- .../accessibility-for-mbam-20-mbam-2.md | 10 +- .../administering-mbam-20-features-mbam-2.md | 6 +- .../mbam-v2/edit-the-configurationmof-file.md | 6 +- mdop/mbam-v2/evaluating-mbam-20-mbam-2.md | 34 +- ...--using-mbam-with-configuration-manager.md | 6 +- .../helping-end-users-manage-bitlocker.md | 6 +- ...h-level-architecture-for-mbam-20-mbam-2.md | 6 +- .../how-to-brand-the-self-service-portal.md | 112 +- ...-as-part-of-a-windows-deployment-mbam-2.md | 40 +- ...t-to-desktop-or-laptop-computers-mbam-2.md | 8 +- ...cryption-state-of-lost-computers-mbam-2.md | 8 +- ...how-to-edit-mbam-20-gpo-settings-mbam-2.md | 16 +- .../how-to-generate-mbam-reports-mbam-2.md | 14 +- ...onfigure-mbam-on-a-single-server-mbam-2.md | 88 +- ...gure-mbam-on-distributed-servers-mbam-2.md | 182 ++- ...install-mbam-with-configuration-manager.md | 18 +- ...he-mbam-20-group-policy-template-mbam-2.md | 8 +- ...-bitlocker-encryption-exemptions-mbam-2.md | 14 +- ...-20-features-to-another-computer-mbam-2.md | 158 +- ...how-to-recover-a-corrupted-drive-mbam-2.md | 10 +- ...recover-a-drive-in-recovery-mode-mbam-2.md | 36 +- .../how-to-recover-a-moved-drive-mbam-2.md | 6 +- .../how-to-reset-a-tpm-lockout-mbam-2.md | 24 +- ...command-line-to-install-the-mbam-server.md | 12 +- .../how-to-use-the-help-desk-portal.md | 6 +- ...e-portal-to-regain-access-to-a-computer.md | 10 +- ...installation-with-configuration-manager.md | 6 +- .../mbam-20-deployment-checklist-mbam-2.md | 31 +- ...mbam-20-deployment-prerequisites-mbam-2.md | 59 +- .../mbam-20-planning-checklist-mbam-2.md | 24 +- .../mbam-20-security-considerations-mbam-2.md | 16 +- ...mbam-20-supported-configurations-mbam-2.md | 22 +- ...-for-mbam-20-administrator-roles-mbam-2.md | 6 +- ...ng-for-mbam-20-client-deployment-mbam-2.md | 10 +- ...bam-20-group-policy-requirements-mbam-2.md | 33 +- ...ng-for-mbam-20-server-deployment-mbam-2.md | 8 +- .../planning-to-deploy-mbam-20-mbam-2.md | 6 +- ...eploy-mbam-with-configuration-manager-2.md | 59 +- ...ing-your-environment-for-mbam-20-mbam-2.md | 8 +- .../release-notes-for-mbam-20-mbam-2.md | 40 +- mdop/mbam-v2/release-notes-for-mbam-20-sp1.md | 42 +- ...g-mbam-reports-in-configuration-manager.md | 18 +- .../understanding-mbam-reports-mbam-2.md | 20 +- ...pgrading-from-previous-versions-of-mbam.md | 8 +- .../using-mbam-with-configuration-manager.md | 6 +- mdop/mbam-v2/using-your-pin-or-password.md | 6 +- mdop/mbam-v25/about-mbam-25-sp1.md | 8 +- mdop/mbam-v25/about-mbam-25.md | 116 +- mdop/mbam-v25/accessibility-for-mbam-25.md | 10 +- .../administering-mbam-25-features.md | 6 +- ...er-features-by-using-windows-powershell.md | 32 +- ...configuring-the-mbam-25-server-features.md | 28 +- ...ying-the-mbam-25-group-policy-templates.md | 126 +- ...lf-service-portal-for-your-organization.md | 14 +- .../deploying-mbam-25-group-policy-objects.md | 6 +- mdop/mbam-v25/deploying-mbam-25.md | 18 +- mdop/mbam-v25/deploying-the-mbam-25-client.md | 6 +- ...oying-the-mbam-25-server-infrastructure.md | 12 +- ...iting-the-mbam-25-group-policy-settings.md | 14 +- ...valuating-mbam-25-in-a-test-environment.md | 608 ++++--- .../generating-mbam-25-stand-alone-reports.md | 6 +- mdop/mbam-v25/getting-started-with-mbam-25.md | 18 +- ...ncryption-item-in-control-panel-mbam-25.md | 6 +- ...figuration-manager-integration-topology.md | 18 +- ...re-of-mbam-25-with-stand-alone-topology.md | 8 +- .../how-to-configure-the-mbam-25-databases.md | 247 ++- .../how-to-configure-the-mbam-25-reports.md | 152 +- ...enter-configuration-manager-integration.md | 29 +- ...-configure-the-mbam-25-web-applications.md | 404 +++-- ...-the-microsoft-content-delivery-network.md | 34 +- ...the-mbam-client-by-using-a-command-line.md | 10 +- ...-to-desktop-or-laptop-computers-mbam-25.md | 4 +- ...ryption-state-of-lost-computers-mbam-25.md | 6 +- ...-as-part-of-a-windows-deploymentmbam-25.md | 210 +-- ...to-more-self-service-portal-information.md | 6 +- ...ize-the-self-service-portal-helpdeskurl.md | 6 +- ...ize-the-self-service-portal-notice-text.md | 8 +- ...bitlocker-encryption-exemptions-mbam-25.md | 30 +- .../how-to-move-the-mbam-25-databases.md | 97 +- .../how-to-move-the-mbam-25-reports.md | 10 +- .../how-to-move-the-mbam-25-websites.md | 4 +- ...ow-to-recover-a-corrupted-drive-mbam-25.md | 14 +- ...ecover-a-drive-in-recovery-mode-mbam-25.md | 28 +- .../how-to-recover-a-moved-drive-mbam-25.md | 4 +- .../how-to-reset-a-tpm-lockout-mbam-25.md | 6 +- ...ce-portal-branding-and-session-time-out.md | 198 +-- ...lf-service-portal-notice-text-on-or-off.md | 6 +- ...e-administration-and-monitoring-website.md | 20 +- ...-to-regain-access-to-a-computer-mbam-25.md | 8 +- ...rated-features-of-an-mbam-25-deployment.md | 45 +- .../installing-the-mbam-25-server-software.md | 12 +- mdop/mbam-v25/mbam-25-deployment-checklist.md | 29 +- mdop/mbam-v25/mbam-25-planning-checklist.md | 36 +- .../mbam-25-security-considerations.md | 18 +- ...guration-manager-integration-topologies.md | 84 +- .../mbam-25-supported-configurations.md | 62 +- .../planning-for-mbam-25-client-deployment.md | 12 +- ...g-for-mbam-25-group-policy-requirements.md | 93 +- ...lanning-for-mbam-25-groups-and-accounts.md | 23 +- .../planning-for-mbam-25-server-deployment.md | 10 +- ...lanning-how-to-secure-the-mbam-websites.md | 52 +- mdop/mbam-v25/planning-to-deploy-mbam-25.md | 6 +- .../prerequisites-for-mbam-25-clients.md | 21 +- ...nfiguration-manager-integration-feature.md | 39 +- mdop/mbam-v25/release-notes-for-mbam-25.md | 20 +- ...moving-mbam-server-features-or-software.md | 6 +- mdop/mbam-v25/server-event-logs.md | 52 +- ...derstanding-mbam-25-stand-alone-reports.md | 31 +- ...drive-encryption-items-in-control-panel.md | 15 +- ...5-or-mbam-25-sp1-from-previous-versions.md | 14 +- .../upgrading-to-mbam-25-sp1-from-mbam-25.md | 8 +- ...indows-powershell-to-administer-mbam-25.md | 14 +- ...he-mbam-25-server-feature-configuration.md | 74 +- ...figuration-manager-integration-topology.md | 18 +- ...25-reports-for-the-stand-alone-topology.md | 12 +- ...ent-installation-command-line-reference.md | 15 +- .../configuring-med-v-for-remote-networks.md | 6 +- ...nfiguring-med-v-server-for-cluster-mode.md | 6 +- .../configuring-med-v-workspace-policies.md | 6 +- mdop/medv-v1/creating-a-med-v-image.md | 6 +- .../creating-a-virtual-pc-image-for-med-v.md | 96 +- ...-v-workspace-using-a-deployment-package.md | 6 +- ...enterprise-software-distribution-system.md | 8 +- ...les-of-virtual-machine-configurationsv2.md | 6 +- ...y-general-settings-to-a-med-v-workspace.md | 10 +- ...l-machine-settings-to-a-med-v-workspace.md | 20 +- ...w-to-back-up-and-restore-a-med-v-server.md | 8 +- .../how-to-configure-a-deployment-package.md | 90 +- ...-configure-a-domain-user-or-groupmedvv2.md | 34 +- .../how-to-configure-image-pre-staging.md | 28 +- ...-configure-published-applicationsmedvv2.md | 61 +- ...chine-setup-for-a-med-v-workspacemedvv2.md | 32 +- ...-computer-name-pattern-propertiesmedvv2.md | 30 +- ...gure-web-settings-for-a-med-v-workspace.md | 19 +- .../how-to-create-and-test-a-med-v-image.md | 12 +- ...shed-application-with-advanced-settings.md | 46 +- .../medv-v1/how-to-generate-reports-medvv2.md | 49 +- ...nd-configure-the-med-v-server-component.md | 42 +- ...d-v-client-and-med-v-management-console.md | 44 +- ...-install-med-v-clientdeployment-package.md | 34 +- mdop/medv-v1/how-to-localize-a-med-v-image.md | 6 +- mdop/medv-v1/how-to-pack-a-med-v-image.md | 33 +- mdop/medv-v1/how-to-set-up-script-actions.md | 44 +- ...etween-the-host-and-the-med-v-workspace.md | 8 +- .../how-to-start-and-exit-the-med-v-client.md | 6 +- ...tart-stop-and-restart-a-med-v-workspace.md | 8 +- mdop/medv-v1/how-to-update-a-med-v-image.md | 8 +- ...w-to-upload-a-med-v-image-to-the-server.md | 17 +- .../med-v-10-installation-checklist.md | 18 +- ...10-sp1-and-sp2-release-notesmedv-10-sp1.md | 6 +- ...sp1-supported-configurationsmedv-10-sp1.md | 135 +- ...d-v-10-sp1-upgrade-checklistmedv-10-sp1.md | 6 +- ...ed-v-10-supported-configurationsmedv-10.md | 103 +- mdop/medv-v1/med-v-client-toolsv2.md | 6 +- .../med-v-installation-prerequisites.md | 8 +- .../updating-a-med-v-workspace-image.md | 6 +- ...med-v-management-console-user-interface.md | 8 +- .../authentication-of-med-v-end-users.md | 26 +- .../compacting-the-med-v-virtual-hard-disk.md | 6 +- .../configure-environment-prerequisites.md | 8 +- .../configure-installation-prerequisites.md | 12 +- ...ng-a-windows-virtual-pc-image-for-med-v.md | 132 +- ...ed-settings-by-using-windows-powershell.md | 6 +- .../create-a-med-v-workspace-package.md | 428 ++--- ...ng-a-windows-virtual-pc-image-for-med-v.md | 18 +- .../deploying-the-med-v-workspace-package.md | 8 +- ...cting-network-changes-that-affect-med-v.md | 56 +- .../determining-how-med-v-will-be-deployed.md | 6 +- ...le-med-v-environment-planning-checklist.md | 14 +- ...ample-med-v-image-preparation-checklist.md | 12 +- ...xample-med-v-project-planning-checklist.md | 14 +- ...ple-med-v-system-installation-checklist.md | 14 +- ...le-med-v-workspace-deployment-checklist.md | 14 +- mdop/medv-v2/high-level-architecturemedv2.md | 8 +- ...formation-in-a-deployed-med-v-workspace.md | 8 +- .../how-to-create-a-test-environment.md | 12 +- ...-a-med-v-workspace-in-a-windows-7-image.md | 8 +- ...ow-to-deploy-a-med-v-workspace-manually.md | 44 +- ...electronic-software-distribution-system.md | 65 +- ...electronic-software-distribution-system.md | 39 +- ...to-install-the-med-v-workspace-packager.md | 6 +- ...n-by-using-the-med-v-workspace-packager.md | 32 +- ...o-manually-install-the-med-v-host-agent.md | 10 +- ...h-an-application-on-the-med-v-workspace.md | 14 +- .../how-to-test-application-publishing.md | 4 +- mdop/medv-v2/how-to-test-url-redirection.md | 4 +- .../how-to-uninstall-the-med-v-components.md | 12 +- ...how-to-verify-first-time-setup-settings.md | 10 +- ...he-number-and-types-of-med-v-workspaces.md | 10 +- ...g-an-application-on-the-med-v-workspace.md | 14 +- ...lications-on-a-windows-virtual-pc-image.md | 8 +- ...-automatic-updates-for-med-v-workspaces.md | 12 +- ...-med-v-workspace-configuration-settings.md | 246 ++- ...med-v-workspace-settings-by-using-a-wmi.md | 112 +- ...s-by-using-the-med-v-workspace-packager.md | 114 +- .../managing-printers-on-a-med-v-workspace.md | 10 +- ...g-software-updates-for-med-v-workspaces.md | 8 +- mdop/medv-v2/med-v-20-best-practices.md | 6 +- mdop/medv-v2/med-v-20-deployment-overview.md | 52 +- mdop/medv-v2/med-v-20-release-notes.md | 6 +- ...tarting-and-resetting-a-med-v-workspace.md | 6 +- .../viewing-and-configuring-med-v-logs.md | 8 +- ...ows-virtual-pc-application-exclude-list.md | 6 +- ...-app-v-45-databases-using-sql-scripting.md | 36 +- ...ploy-mdop-group-policy--admx--templates.md | 120 +- ...t-user-experience-virtualization-10-sp1.md | 10 +- mdop/uev-v1/accessibility-for-ue-v.md | 10 +- ...figuring-ue-v-with-group-policy-objects.md | 10 +- ...ation-templates-with-the-ue-v-generator.md | 8 +- ...e-settings-storage-location-for-ue-v-10.md | 10 +- mdop/uev-v1/deploying-the-ue-v-agent.md | 28 +- mdop/uev-v1/deploying-ue-v-10.md | 6 +- ...-with-user-experience-virtualization-10.md | 6 +- mdop/uev-v1/installing-the-ue-v-generator.md | 6 +- ...nt-and-packages-with-powershell-and-wmi.md | 24 +- ...tion-templates-using-powershell-and-wmi.md | 10 +- ...-virtualization--ue-v--10-release-notes.md | 4 +- .../migrating-ue-v-settings-packages.md | 6 +- ...-custom-template-deployment-for-ue-v-10.md | 8 +- ...planning-for-ue-v-configuration-methods.md | 6 +- ...pplications-to-synchronize-with-ue-v-10.md | 10 +- .../supported-configurations-for-ue-v-10.md | 10 +- .../uev-v1/ue-v-10-security-considerations.md | 228 +-- mdop/uev-v1/ue-v-checklist.md | 26 +- ...rience-virtualization-privacy-statement.md | 4 +- .../accessibility-for-ue-v-2x-both-uevv2.md | 8 +- ...h-windows-powershell-and-wmi-both-uevv2.md | 6 +- ...schema-reference-for-ue-v-2x-both-uevv2.md | 84 +- ...y-of-ue-v-2x-scheduled-tasks-both-uevv2.md | 20 +- ...-settings-center-for-ue-v-2x-both-uevv2.md | 6 +- ...2x-with-group-policy-objects-both-uevv2.md | 14 +- ...r-configuration-manager-2012-both-uevv2.md | 6 +- ...required-features-for-ue-v-2x-new-uevv2.md | 76 +- ...-v-2x-for-custom-applications-new-uevv2.md | 26 +- .../get-started-with-ue-v-2x-new-uevv2.md | 10 +- mdop/uev-v2/index.md | 31 +- ...and-restore-in-ue-v-2x-new-topic-for-21.md | 22 +- ...h-windows-powershell-and-wmi-both-uevv2.md | 338 ++-- ...g-windows-powershell-and-wmi-both-uevv2.md | 24 +- ...ualization--ue-v--20-release-notesuevv2.md | 34 +- ...alization--ue-v--21-release-notesuevv21.md | 32 +- ...tualization--ue-v--21-sp1-release-notes.md | 32 +- ...ng-ue-v-2x-settings-packages-both-uevv2.md | 6 +- .../prepare-a-ue-v-2x-deployment-new-uevv2.md | 114 +- ...y-considerations-for-ue-v-2x-both-uevv2.md | 10 +- ...c-trigger-events-for-ue-v-2x-both-uevv2.md | 17 +- ...-virtualization-applications-both-uevv2.md | 6 +- mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md | 6 +- mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md | 10 +- .../whats-new-in-ue-v-21-sp1uevv21-sp1.md | 8 +- ...tes-and-the-ue-v-2x-generator-new-uevv2.md | 8 +- smb/cloud-mode-business-setup.md | 272 ++-- smb/docfx.json | 28 +- smb/index.md | 4 +- ...d-unsigned-app-to-code-integrity-policy.md | 8 +- .../device-guard-signing-portal.md | 4 +- store-for-business/docfx.json | 40 +- ...or-business-education-powershell-module.md | 10 +- .../microsoft-store-for-business-overview.md | 15 +- ...requisites-microsoft-store-for-business.md | 26 +- ...ermissions-microsoft-store-for-business.md | 2 +- store-for-business/sfb-change-history.md | 8 +- ...-new-microsoft-store-business-education.md | 1 + .../working-with-line-of-business-apps.md | 10 +- windows/access-protection/docfx.json | 29 +- .../app-v/appv-about-appv.md | 4 +- ...ation-publishing-and-client-interaction.md | 30 +- ...ment-configuration-file-with-powershell.md | 14 +- ...user-configuration-file-with-powershell.md | 12 +- .../app-v/appv-capacity-planning.md | 20 +- .../appv-client-configuration-settings.md | 160 +- ...pv-connection-group-virtual-environment.md | 15 +- ...e-created-in-a-previous-version-of-appv.md | 20 +- ...e-a-package-accelerator-with-powershell.md | 20 +- ...ploying-microsoft-office-2013-with-appv.md | 98 +- ...ploying-microsoft-office-2016-with-appv.md | 76 +- .../app-v/appv-deploying-the-appv-server.md | 2 +- ...ting-on-the-appv-client-with-powershell.md | 107 +- ...porting-databases-on-separate-computers.md | 20 +- ...agement-server-on-a-standalone-computer.md | 10 +- ...-publishing-server-on-a-remote-computer.md | 8 +- .../app-v/appv-managing-connection-groups.md | 22 +- ...grating-to-appv-from-a-previous-version.md | 18 +- .../app-v/appv-performance-guidance.md | 44 +- ...lanning-for-high-availability-with-appv.md | 4 +- ...ppv-planning-for-using-appv-with-office.md | 6 +- ...release-notes-for-appv-for-windows-1703.md | 111 +- ...appv-release-notes-for-appv-for-windows.md | 2 +- .../app-v/appv-reporting.md | 8 +- ...appv-sequence-a-package-with-powershell.md | 2 +- ...ppv-using-the-client-management-console.md | 4 +- .../apps-in-windows-10.md | 58 +- windows/application-management/docfx.json | 34 +- .../manage-windows-mixed-reality.md | 49 +- .../remove-provisioned-apps-during-update.md | 12 +- .../administrative-tools-in-windows-10.md | 4 +- .../advanced-troubleshooting-boot-problems.md | 14 +- ...eshooting-wireless-network-connectivity.md | 3 +- .../connect-to-remote-aadj-pc.md | 22 +- .../data-collection-for-802-authentication.md | 14 +- windows/client-management/docfx.json | 32 +- .../mandatory-user-profile.md | 54 +- windows/client-management/mdm/accounts-csp.md | 1 + .../client-management/mdm/activesync-csp.md | 12 +- ...ure-ad-tenant-and-azure-ad-subscription.md | 40 +- .../mdm/alljoynmanagement-csp.md | 14 +- .../client-management/mdm/applocker-csp.md | 80 +- .../mdm/assignedaccess-csp.md | 92 +- ...e-active-directory-integration-with-mdm.md | 28 +- .../client-management/mdm/bitlocker-csp.md | 519 +++--- .../client-management/mdm/bootstrap-csp.md | 12 +- .../mdm/browserfavorite-csp.md | 12 +- ...bulk-assign-and-reclaim-seats-from-user.md | 10 +- ...ollment-using-windows-provisioning-tool.md | 98 +- .../mdm/cellularsettings-csp.md | 6 +- .../mdm/certificatestore-csp.md | 32 +- windows/client-management/mdm/cleanpc-csp.md | 2 +- windows/client-management/mdm/cleanpc-ddf.md | 2 +- .../mdm/clientcertificateinstall-csp.md | 40 +- .../mdm/clientcertificateinstall-ddf-file.md | 2 +- .../mdm/cm-cellularentries-csp.md | 72 +- .../mdm/cm-proxyentries-csp.md | 16 +- windows/client-management/mdm/cmpolicy-csp.md | 18 +- .../mdm/cmpolicyenterprise-csp.md | 18 +- .../mdm/cmpolicyenterprise-ddf-file.md | 2 +- ...onfiguration-service-provider-reference.md | 6 +- ...a-custom-configuration-service-provider.md | 8 +- .../mdm/customdeviceui-csp.md | 8 +- .../mdm/customdeviceui-ddf.md | 2 +- ...a-structures-windows-store-for-business.md | 130 +- windows/client-management/mdm/defender-csp.md | 6 +- windows/client-management/mdm/defender-ddf.md | 2 +- .../mdm/design-a-custom-windows-csp.md | 14 +- .../client-management/mdm/devdetail-csp.md | 22 +- .../mdm/devdetail-ddf-file.md | 2 +- .../mdm/developersetup-csp.md | 6 +- .../mdm/developersetup-ddf.md | 2 +- .../mdm/device-update-management.md | 44 +- .../mdm/deviceinstanceservice-csp.md | 8 +- .../client-management/mdm/devicelock-csp.md | 2 +- .../mdm/devicelock-ddf-file.md | 2 +- .../mdm/devicemanageability-csp.md | 2 +- .../mdm/devicemanageability-ddf.md | 2 +- .../client-management/mdm/devicestatus-csp.md | 8 +- .../client-management/mdm/devicestatus-ddf.md | 2 +- windows/client-management/mdm/devinfo-csp.md | 2 +- .../client-management/mdm/devinfo-ddf-file.md | 2 +- .../diagnose-mdm-failures-in-windows-10.md | 2 +- .../mdm/diagnosticlog-csp.md | 32 +- .../mdm/diagnosticlog-ddf.md | 2 +- .../disconnecting-from-mdm-unenrollment.md | 2 +- windows/client-management/mdm/dmacc-csp.md | 16 +- .../client-management/mdm/dmacc-ddf-file.md | 2 +- windows/client-management/mdm/dmclient-csp.md | 30 +- .../mdm/dmclient-ddf-file.md | 2 +- .../mdm/dmprocessconfigxmlfiltered.md | 70 +- .../mdm/dmsessionactions-csp.md | 12 +- .../mdm/dmsessionactions-ddf.md | 2 +- .../mdm/dynamicmanagement-csp.md | 2 +- .../mdm/dynamicmanagement-ddf.md | 2 +- .../mdm/eap-configuration.md | 2 +- windows/client-management/mdm/email2-csp.md | 2 +- .../client-management/mdm/email2-ddf-file.md | 2 +- .../mdm/enable-admx-backed-policies-in-mdm.md | 220 +-- ...dded-8-1-handheld-devices-to-windows-10.md | 2 +- ...device-automatically-using-group-policy.md | 2 +- .../mdm/enterprise-app-management.md | 34 +- .../mdm/enterpriseapn-csp.md | 12 +- .../mdm/enterpriseapn-ddf.md | 2 +- .../mdm/enterpriseappmanagement-csp.md | 24 +- .../mdm/enterpriseappvmanagement-csp.md | 35 +- .../mdm/enterpriseappvmanagement-ddf.md | 2 +- .../mdm/enterpriseassignedaccess-csp.md | 282 ++-- .../mdm/enterpriseassignedaccess-ddf.md | 2 +- .../mdm/enterpriseassignedaccess-xsd.md | 2 +- .../mdm/enterprisedataprotection-csp.md | 208 +-- .../mdm/enterprisedataprotection-ddf-file.md | 2 +- .../mdm/enterprisedesktopappmanagement-csp.md | 26 +- ...enterprisedesktopappmanagement-ddf-file.md | 2 +- .../enterprisedesktopappmanagement2-xsd.md | 2 +- .../mdm/enterpriseext-csp.md | 2 +- .../mdm/enterpriseext-ddf.md | 2 +- .../mdm/enterpriseextfilessystem-csp.md | 28 +- .../mdm/enterpriseextfilesystem-ddf.md | 2 +- .../mdm/enterprisemodernappmanagement-csp.md | 65 +- .../mdm/enterprisemodernappmanagement-ddf.md | 2 +- .../mdm/enterprisemodernappmanagement-xsd.md | 2 +- windows/client-management/mdm/euiccs-csp.md | 2 +- .../client-management/mdm/euiccs-ddf-file.md | 2 +- ...erated-authentication-device-enrollment.md | 22 +- .../client-management/mdm/filesystem-csp.md | 14 +- windows/client-management/mdm/firewall-csp.md | 60 +- .../mdm/firewall-ddf-file.md | 2 +- .../client-management/mdm/get-inventory.md | 8 +- .../mdm/get-localized-product-details.md | 2 +- .../mdm/get-offline-license.md | 2 +- .../mdm/get-product-details.md | 2 +- .../mdm/get-product-package.md | 2 +- .../mdm/get-product-packages.md | 2 +- windows/client-management/mdm/get-seat.md | 2 +- .../mdm/get-seats-assigned-to-a-user.md | 2 +- windows/client-management/mdm/get-seats.md | 2 +- .../mdm/healthattestation-csp.md | 381 +++-- .../mdm/healthattestation-ddf.md | 2 +- windows/client-management/mdm/hotspot-csp.md | 28 +- .../mdm/iconfigserviceprovider2.md | 10 +- ...rviceprovider2configmanagernotification.md | 6 +- .../mdm/iconfigserviceprovider2getnode.md | 14 +- windows/client-management/mdm/icspnode.md | 34 +- windows/client-management/mdm/icspnodeadd.md | 8 +- .../client-management/mdm/icspnodeclear.md | 2 +- windows/client-management/mdm/icspnodecopy.md | 6 +- .../mdm/icspnodedeletechild.md | 2 +- .../mdm/icspnodedeleteproperty.md | 2 +- .../client-management/mdm/icspnodeexecute.md | 2 +- .../mdm/icspnodegetchildnodenames.md | 6 +- .../mdm/icspnodegetproperty.md | 4 +- .../mdm/icspnodegetpropertyidentifiers.md | 6 +- .../client-management/mdm/icspnodegetvalue.md | 6 +- windows/client-management/mdm/icspnodemove.md | 6 +- .../mdm/icspnodesetproperty.md | 4 +- .../client-management/mdm/icspnodesetvalue.md | 6 +- .../mdm/icspnodetransactioning.md | 2 +- windows/client-management/mdm/icspvalidate.md | 2 +- ...rver-side-mobile-application-management.md | 28 +- windows/client-management/mdm/index.md | 4 +- ...ent-tool-for-windows-store-for-business.md | 40 +- windows/client-management/mdm/maps-csp.md | 12 +- .../client-management/mdm/maps-ddf-file.md | 2 +- .../mdm/mdm-enrollment-of-windows-devices.md | 44 +- .../client-management/mdm/messaging-csp.md | 4 +- .../client-management/mdm/messaging-ddf.md | 2 +- .../mdm/mobile-device-enrollment.md | 2 +- windows/client-management/mdm/multisim-csp.md | 2 +- windows/client-management/mdm/multisim-ddf.md | 2 +- windows/client-management/mdm/nap-csp.md | 2 +- windows/client-management/mdm/napdef-csp.md | 18 +- .../client-management/mdm/networkproxy-csp.md | 2 +- .../client-management/mdm/networkproxy-ddf.md | 2 +- .../mdm/networkqospolicy-csp.md | 16 +- .../mdm/networkqospolicy-ddf.md | 2 +- ...ew-in-windows-mdm-enrollment-management.md | 558 +++---- .../client-management/mdm/nodecache-csp.md | 8 +- .../mdm/nodecache-ddf-file.md | 2 +- windows/client-management/mdm/office-csp.md | 8 +- windows/client-management/mdm/office-ddf.md | 2 +- .../mdm/oma-dm-protocol-support.md | 23 +- ...remise-authentication-device-enrollment.md | 2 +- .../mdm/passportforwork-csp.md | 2 +- .../mdm/passportforwork-ddf.md | 2 +- .../mdm/personalization-csp.md | 2 +- .../mdm/personalization-ddf.md | 2 +- .../policy-configuration-service-provider.md | 77 +- .../mdm/policy-csp-abovelock.md | 2 +- .../mdm/policy-csp-accounts.md | 2 +- .../mdm/policy-csp-activexcontrols.md | 6 +- .../mdm/policy-csp-applicationdefaults.md | 2 +- .../mdm/policy-csp-applicationmanagement.md | 2 +- .../mdm/policy-csp-appruntime.md | 6 +- .../mdm/policy-csp-appvirtualization.md | 114 +- .../mdm/policy-csp-attachmentmanager.md | 14 +- .../mdm/policy-csp-authentication.md | 10 +- .../mdm/policy-csp-autoplay.md | 14 +- .../mdm/policy-csp-bitlocker.md | 2 +- .../client-management/mdm/policy-csp-bits.md | 2 +- .../mdm/policy-csp-bluetooth.md | 6 +- .../mdm/policy-csp-browser.md | 10 +- .../mdm/policy-csp-camera.md | 14 +- .../mdm/policy-csp-cellular.md | 18 +- .../mdm/policy-csp-connectivity.md | 24 +- .../mdm/policy-csp-controlpolicyconflict.md | 2 +- .../mdm/policy-csp-credentialproviders.md | 16 +- .../mdm/policy-csp-credentialsdelegation.md | 6 +- .../mdm/policy-csp-credentialsui.md | 10 +- .../mdm/policy-csp-cryptography.md | 10 +- .../mdm/policy-csp-dataprotection.md | 8 +- .../mdm/policy-csp-datausage.md | 6 +- .../mdm/policy-csp-defender.md | 86 +- .../mdm/policy-csp-deliveryoptimization.md | 48 +- .../mdm/policy-csp-desktop.md | 10 +- .../mdm/policy-csp-deviceguard.md | 2 +- .../mdm/policy-csp-deviceinstallation.md | 28 +- .../mdm/policy-csp-devicelock.md | 20 +- .../mdm/policy-csp-display.md | 2 +- .../mdm/policy-csp-dmaguard.md | 2 +- .../mdm/policy-csp-education.md | 2 +- .../mdm/policy-csp-enterprisecloudprint.md | 2 +- .../mdm/policy-csp-errorreporting.md | 22 +- .../mdm/policy-csp-eventlogservice.md | 18 +- .../mdm/policy-csp-experience.md | 2 +- .../mdm/policy-csp-exploitguard.md | 2 +- .../mdm/policy-csp-fileexplorer.md | 10 +- .../client-management/mdm/policy-csp-games.md | 2 +- .../mdm/policy-csp-handwriting.md | 2 +- .../mdm/policy-csp-internetexplorer.md | 1012 ++++++------ .../mdm/policy-csp-kerberos.md | 22 +- .../mdm/policy-csp-kioskbrowser.md | 2 +- .../mdm/policy-csp-lanmanworkstation.md | 2 +- .../mdm/policy-csp-licensing.md | 2 +- ...policy-csp-localpoliciessecurityoptions.md | 2 +- .../mdm/policy-csp-lockdown.md | 2 +- .../client-management/mdm/policy-csp-maps.md | 2 +- .../mdm/policy-csp-messaging.md | 2 +- .../mdm/policy-csp-mssecurityguide.md | 26 +- .../mdm/policy-csp-msslegacy.md | 18 +- .../mdm/policy-csp-networkisolation.md | 2 +- .../mdm/policy-csp-notifications.md | 2 +- .../client-management/mdm/policy-csp-power.md | 42 +- .../mdm/policy-csp-printers.md | 14 +- .../mdm/policy-csp-privacy.md | 2 +- .../mdm/policy-csp-remoteassistance.md | 18 +- .../mdm/policy-csp-remotedesktopservices.md | 26 +- .../mdm/policy-csp-remotemanagement.md | 62 +- .../mdm/policy-csp-remoteprocedurecall.md | 10 +- .../mdm/policy-csp-remoteshell.md | 30 +- .../mdm/policy-csp-restrictedgroups.md | 2 +- .../mdm/policy-csp-search.md | 2 +- .../mdm/policy-csp-security.md | 2 +- .../mdm/policy-csp-servicecontrolmanager.md | 4 +- .../mdm/policy-csp-settings.md | 2 +- .../mdm/policy-csp-smartscreen.md | 2 +- .../mdm/policy-csp-speech.md | 2 +- .../client-management/mdm/policy-csp-start.md | 2 +- .../mdm/policy-csp-storage.md | 6 +- .../mdm/policy-csp-system.md | 18 +- .../mdm/policy-csp-systemservices.md | 2 +- .../mdm/policy-csp-taskmanager.md | 2 +- .../mdm/policy-csp-taskscheduler.md | 2 +- .../mdm/policy-csp-textinput.md | 26 +- .../mdm/policy-csp-timelanguagesettings.md | 2 +- .../mdm/policy-csp-troubleshooting.md | 73 +- .../mdm/policy-csp-update.md | 52 +- .../mdm/policy-csp-userrights.md | 44 +- .../client-management/mdm/policy-csp-wifi.md | 8 +- .../policy-csp-windowsconnectionmanager.md | 6 +- ...olicy-csp-windowsdefendersecuritycenter.md | 2 +- .../mdm/policy-csp-windowsinkworkspace.md | 2 +- .../mdm/policy-csp-windowslogon.md | 22 +- .../mdm/policy-csp-windowspowershell.md | 6 +- .../mdm/policy-csp-wirelessdisplay.md | 2 +- .../client-management/mdm/policy-ddf-file.md | 3 +- .../mdm/policymanager-csp.md | 2 +- .../client-management/mdm/provisioning-csp.md | 10 +- windows/client-management/mdm/proxy-csp.md | 14 +- .../mdm/push-notification-windows-mdm.md | 2 +- .../client-management/mdm/pxlogical-csp.md | 2 +- windows/client-management/mdm/reboot-csp.md | 6 +- .../client-management/mdm/reboot-ddf-file.md | 2 +- .../mdm/reclaim-seat-from-user.md | 2 +- ...ree-azure-active-directory-subscription.md | 2 +- windows/client-management/mdm/registry-csp.md | 2 +- .../mdm/registry-ddf-file.md | 2 +- .../client-management/mdm/remotefind-csp.md | 2 +- .../mdm/remotefind-ddf-file.md | 2 +- .../client-management/mdm/remotelock-csp.md | 2 +- .../mdm/remotelock-ddf-file.md | 2 +- .../client-management/mdm/remotering-csp.md | 2 +- .../mdm/remotering-ddf-file.md | 2 +- .../client-management/mdm/remotewipe-csp.md | 2 +- .../mdm/remotewipe-ddf-file.md | 2 +- .../client-management/mdm/reporting-csp.md | 2 +- .../mdm/reporting-ddf-file.md | 2 +- ...pi-reference-windows-store-for-business.md | 2 +- .../mdm/rootcacertificates-csp.md | 2 +- .../mdm/rootcacertificates-ddf-file.md | 2 +- ...a-custom-configuration-service-provider.md | 2 +- .../mdm/secureassessment-csp.md | 12 +- .../mdm/secureassessment-ddf-file.md | 2 +- .../mdm/securitypolicy-csp.md | 2 +- .../mdm/server-requirements-windows-mdm.md | 2 +- windows/client-management/mdm/sharedpc-csp.md | 2 +- .../mdm/sharedpc-ddf-file.md | 2 +- windows/client-management/mdm/storage-csp.md | 2 +- .../client-management/mdm/storage-ddf-file.md | 2 +- .../structure-of-oma-dm-provisioning-files.md | 2 +- windows/client-management/mdm/supl-csp.md | 2 +- .../client-management/mdm/supl-ddf-file.md | 2 +- .../client-management/mdm/surfacehub-csp.md | 22 +- .../mdm/surfacehub-ddf-file.md | 2 +- .../mdm/tenantlockdown-csp.md | 2 +- .../mdm/tenantlockdown-ddf.md | 2 +- .../client-management/mdm/tpmpolicy-csp.md | 30 +- .../mdm/tpmpolicy-ddf-file.md | 2 +- windows/client-management/mdm/uefi-csp.md | 2 +- windows/client-management/mdm/uefi-ddf.md | 2 +- .../mdm/understanding-admx-backed-policies.md | 2 +- .../mdm/unifiedwritefilter-csp.md | 20 +- .../mdm/unifiedwritefilter-ddf.md | 2 +- windows/client-management/mdm/update-csp.md | 20 +- .../client-management/mdm/update-ddf-file.md | 2 +- ...-scripting-with-the-wmi-bridge-provider.md | 2 +- windows/client-management/mdm/vpn-csp.md | 2 +- windows/client-management/mdm/vpn-ddf-file.md | 2 +- windows/client-management/mdm/vpnv2-csp.md | 186 +-- .../client-management/mdm/vpnv2-ddf-file.md | 2 +- .../mdm/vpnv2-profile-xsd.md | 2 +- .../mdm/w4-application-csp.md | 2 +- .../mdm/w7-application-csp.md | 2 +- windows/client-management/mdm/wifi-csp.md | 8 +- .../client-management/mdm/wifi-ddf-file.md | 2 +- ...and-centennial-app-policy-configuration.md | 10 +- .../mdm/win32appinventory-csp.md | 24 +- .../mdm/win32appinventory-ddf-file.md | 2 +- .../mdm/win32compatibilityappraiser-csp.md | 2 +- .../mdm/win32compatibilityappraiser-ddf.md | 2 +- .../mdm/windows-mdm-enterprise-settings.md | 2 +- .../windowsadvancedthreatprotection-csp.md | 6 +- .../windowsadvancedthreatprotection-ddf.md | 2 +- .../windowsdefenderapplicationguard-csp.md | 2 +- ...indowsdefenderapplicationguard-ddf-file.md | 2 +- .../mdm/windowslicensing-csp.md | 20 +- .../mdm/windowslicensing-ddf-file.md | 2 +- .../mdm/windowssecurityauditing-csp.md | 2 +- .../mdm/windowssecurityauditing-ddf-file.md | 2 +- .../client-management/mdm/wirednetwork-csp.md | 2 +- .../mdm/wirednetwork-ddf-file.md | 2 +- .../mdm/wmi-providers-supported-in-windows.md | 76 +- .../troubleshoot-inaccessible-boot-device.md | 64 +- .../troubleshoot-stop-errors.md | 42 +- .../troubleshoot-tcpip-port-exhaust.md | 10 +- .../troubleshoot-tcpip-rpc-errors.md | 38 +- .../troubleshoot-windows-freeze.md | 134 +- .../windows-10-mobile-and-mdm.md | 20 +- ...change-history-for-configure-windows-10.md | 9 +- ...changes-to-start-policies-in-windows-10.md | 8 +- .../configure-windows-10-taskbar.md | 19 +- .../cortana-at-work-scenario-1.md | 20 +- .../customize-and-export-start-layout.md | 2 +- ...-10-start-screens-by-using-group-policy.md | 38 +- ...reens-by-using-mobile-device-management.md | 8 +- ...-by-using-provisioning-packages-and-icd.md | 4 +- windows/configuration/docfx.json | 34 +- .../guidelines-for-assigned-access-app.md | 63 +- windows/configuration/kiosk-prepare.md | 50 +- windows/configuration/kiosk-single-app.md | 20 +- .../lock-down-windows-10-applocker.md | 2 +- .../lock-down-windows-10-to-specific-apps.md | 185 ++- .../lockdown-features-windows-10.md | 60 +- .../manage-wifi-sense-in-enterprise.md | 20 +- .../mobile-devices/lockdown-xml.md | 197 ++- .../provisioning-configure-mobile.md | 14 +- .../mobile-devices/provisioning-nfc.md | 16 +- .../provisioning-package-splitter.md | 14 +- ...kiosk-for-windows-10-for-mobile-edition.md | 6 +- ...can-use-configuration-service-providers.md | 6 +- .../provision-pcs-for-initial-deployment.md | 18 +- ...rovision-pcs-with-apps-and-certificates.md | 42 +- .../provision-pcs-with-apps.md | 38 +- .../provisioning-create-package.md | 72 +- .../provisioning-multivariant.md | 54 +- .../provisioning-packages.md | 62 +- .../provisioning-powershell.md | 18 +- .../set-up-shared-or-guest-pc.md | 110 +- .../start-layout-troubleshoot.md | 2 +- .../configuration/start-layout-xml-desktop.md | 4 +- .../configuration/start-secondary-tiles.md | 48 +- ...v-application-template-schema-reference.md | 40 +- ...nfiguring-uev-with-group-policy-objects.md | 14 +- ...ith-system-center-configuration-manager.md | 8 +- .../uev-deploy-uev-for-custom-applications.md | 2 +- ...anage-administrative-backup-and-restore.md | 16 +- ...plates-using-windows-powershell-and-wmi.md | 4 +- ...ackages-with-windows-powershell-and-wmi.md | 322 ++-- .../ue-v/uev-migrating-settings-packages.md | 2 +- .../ue-v/uev-prepare-for-deployment.md | 2 +- .../ue-v/uev-sync-trigger-events.md | 17 +- ...application-virtualization-applications.md | 6 +- ...-custom-templates-and-the-uev-generator.md | 6 +- windows/configuration/wcd/wcd-browser.md | 2 +- windows/configuration/wcd/wcd-cellcore.md | 134 +- windows/configuration/wcd/wcd-kioskbrowser.md | 16 +- windows/configuration/wcd/wcd-policies.md | 99 +- windows/configuration/wcd/wcd-takeatest.md | 2 +- ...ws-10-start-layout-options-and-policies.md | 6 +- windows/configure/docfx.json | 17 +- windows/deploy/docfx.json | 17 +- .../deployment/deploy-enterprise-licenses.md | 18 +- ...d-environment-for-windows-10-deployment.md | 106 +- .../configure-mdt-for-userexit-scripts.md | 2 +- ...ence-with-configuration-manager-and-mdt.md | 2 +- .../create-a-windows-10-reference-image.md | 52 +- .../deploy-a-windows-10-image-using-mdt.md | 298 ++-- .../mdt-lite-touch-components.md | 4 +- ...prepare-for-windows-deployment-with-mdt.md | 20 +- ...sh-a-windows-7-computer-with-windows-10.md | 34 +- ...s-7-computer-with-a-windows-10-computer.md | 38 +- .../set-up-mdt-for-bitlocker.md | 8 +- ...ows-10-deployment-in-a-test-environment.md | 36 +- .../use-orchestrator-runbooks-with-mdt.md | 60 +- .../use-web-services-in-mdt.md | 42 +- ...-windows-pe-using-configuration-manager.md | 4 +- ...-windows-10-using-configuration-manager.md | 4 +- ...0-deployment-with-configuration-manager.md | 80 +- ...f-windows-10-with-configuration-manager.md | 60 +- ...-windows-10-using-configuration-manager.md | 4 +- ...-windows-10-using-configuration-manager.md | 32 +- windows/deployment/deploy-windows-to-go.md | 188 +-- windows/deployment/docfx.json | 34 +- windows/deployment/mbr-to-gpt.md | 8 +- ...perators-in-compatibility-administrator.md | 27 +- ...tory-for-plan-for-windows-10-deployment.md | 11 +- ...compatibility-administrator-users-guide.md | 14 +- ...se-management-strategies-and-deployment.md | 32 +- ...r-windows-8-windows-7-and-windows-vista.md | 303 ++-- ...lity-fix-in-compatibility-administrator.md | 8 +- ...ity-mode-in-compatibility-administrator.md | 38 +- ...-message-in-compatibility-administrator.md | 2 +- ...oyment-considerations-for-windows-to-go.md | 52 +- ...ty-fixes-in-compatibility-administrator.md | 4 +- ...atabases-in-compatibility-administrator.md | 2 +- ...tibility-fixes-and-custom-fix-databases.md | 8 +- ...are-your-organization-for-windows-to-go.md | 8 +- ...ications-in-compatibility-administrator.md | 6 +- ...ery-tool-in-compatibility-administrator.md | 14 +- ...ection-considerations-for-windows-to-go.md | 6 +- .../deployment/planning/sua-users-guide.md | 8 +- ...ng-your-application-mitigation-packages.md | 2 +- ...rstanding-and-using-compatibility-fixes.md | 4 +- ...ng-the-compatibility-administrator-tool.md | 24 +- ...s-screen-in-compatibility-administrator.md | 6 +- .../windows-10-1903-removed-features.md | 11 +- ...indows-to-go-frequently-asked-questions.md | 18 +- .../planning/windows-to-go-overview.md | 18 +- .../deployment/update/device-health-using.md | 40 +- .../feature-update-maintenance-window.md | 96 +- .../update/feature-update-user-install.md | 112 +- .../azure-portal-LA-wkspcsumm_sterile.png | Bin 105839 -> 59988 bytes .../update/images/azure-portal-LAfav1.png | Bin 31872 -> 74355 bytes ...re-portal-LAmain-wkspc-subname-sterile.png | Bin 165711 -> 148632 bytes .../images/azure-portal-UR-settings.png | Bin 60114 -> 67670 bytes .../temp-azure-portal-soltn-setting.png | Bin 103185 -> 87693 bytes .../update/update-compliance-get-started.md | 22 +- .../update/update-compliance-using.md | 1 + .../waas-delivery-optimization-reference.md | 6 +- .../waas-delivery-optimization-setup.md | 2 +- .../deployment/update/waas-integrate-wufb.md | 6 +- .../update/waas-manage-updates-wsus.md | 38 +- windows/deployment/update/waas-morenews.md | 6 +- windows/deployment/update/waas-overview.md | 12 +- .../update/waas-servicing-differences.md | 6 +- .../update/waas-wufb-group-policy.md | 102 +- windows/deployment/update/waas-wufb-intune.md | 36 +- .../windows-analytics-FAQ-troubleshooting.md | 35 +- .../update/windows-analytics-azure-portal.md | 6 +- .../update/windows-analytics-get-started.md | 17 +- .../update/windows-update-error-reference.md | 356 ++--- .../update/windows-update-errors.md | 36 +- .../update/windows-update-overview.md | 16 +- .../update/windows-update-resources.md | 6 +- .../deployment/update/wufb-manageupdate.md | 4 +- windows/deployment/upgrade/log-files.md | 4 +- ...windows-upgrades-with-upgrade-readiness.md | 2 +- windows/deployment/upgrade/quick-fixes.md | 20 +- .../upgrade/resolution-procedures.md | 54 +- .../upgrade-readiness-additional-insights.md | 6 +- .../upgrade/upgrade-readiness-architecture.md | 2 +- .../upgrade/upgrade-readiness-data-sharing.md | 4 +- .../upgrade-readiness-deployment-script.md | 48 +- .../upgrade-readiness-resolve-issues.md | 40 +- ...with-system-center-configuraton-manager.md | 6 +- ...0-with-the-microsoft-deployment-toolkit.md | 30 +- .../upgrade/windows-10-edition-upgrades.md | 6 +- .../upgrade/windows-10-upgrade-paths.md | 18 +- .../usmt/migrate-application-settings.md | 12 +- .../usmt/migration-store-types-overview.md | 6 +- .../usmt/offline-migration-reference.md | 12 +- .../usmt/understanding-migration-xml-files.md | 98 +- .../deployment/usmt/usmt-best-practices.md | 10 +- .../usmt/usmt-choose-migration-store-type.md | 16 +- .../usmt/usmt-command-line-syntax.md | 12 +- windows/deployment/usmt/usmt-common-issues.md | 32 +- .../deployment/usmt/usmt-configxml-file.md | 20 +- .../usmt/usmt-conflicts-and-precedence.md | 66 +- .../usmt/usmt-custom-xml-examples.md | 20 +- .../usmt/usmt-customize-xml-files.md | 10 +- .../usmt/usmt-determine-what-to-migrate.md | 14 +- .../usmt-estimate-migration-store-size.md | 8 +- .../usmt/usmt-exclude-files-and-settings.md | 4 +- .../usmt/usmt-general-conventions.md | 38 +- .../usmt/usmt-hard-link-migration-store.md | 18 +- windows/deployment/usmt/usmt-how-it-works.md | 62 +- ...usmt-identify-operating-system-settings.md | 6 +- .../deployment/usmt/usmt-identify-users.md | 20 +- .../deployment/usmt/usmt-loadstate-syntax.md | 145 +- windows/deployment/usmt/usmt-log-files.md | 18 +- ...usmt-migrate-efs-files-and-certificates.md | 6 +- .../usmt/usmt-migrate-user-accounts.md | 6 +- .../usmt/usmt-migration-store-encryption.md | 8 +- .../usmt/usmt-plan-your-migration.md | 16 +- windows/deployment/usmt/usmt-reference.md | 20 +- windows/deployment/usmt/usmt-requirements.md | 6 +- windows/deployment/usmt/usmt-return-codes.md | 22 +- .../deployment/usmt/usmt-scanstate-syntax.md | 128 +- .../usmt/usmt-test-your-migration.md | 12 +- .../deployment/usmt/usmt-troubleshooting.md | 16 +- windows/deployment/usmt/usmt-utilities.md | 18 +- .../usmt/usmt-what-does-usmt-migrate.md | 18 +- .../usmt/usmt-xml-elements-library.md | 1390 ++++++++-------- windows/deployment/usmt/usmt-xml-reference.md | 24 +- .../deployment/vda-subscription-activation.md | 2 +- ...ivate-using-key-management-service-vamt.md | 44 +- .../add-manage-products-vamt.md | 6 +- .../add-remove-computers-vamt.md | 4 +- .../configure-client-computers-vamt.md | 4 +- .../install-product-key-vamt.md | 4 +- .../volume-activation/install-vamt.md | 4 +- .../volume-activation/introduction-vamt.md | 4 +- .../manage-activations-vamt.md | 6 +- .../manage-product-keys-vamt.md | 6 +- .../plan-for-volume-activation-client.md | 4 +- .../proxy-activation-vamt.md | 6 +- .../scenario-online-activation-vamt.md | 18 +- .../scenario-proxy-activation-vamt.md | 18 +- .../update-product-status-vamt.md | 2 +- .../use-vamt-in-windows-powershell.md | 70 +- .../volume-activation-management-tool.md | 2 +- .../windows-10-enterprise-e3-overview.md | 24 +- windows/deployment/windows-10-poc-mdt.md | 78 +- .../windows-10-poc-sc-config-mgr.md | 86 +- windows/deployment/windows-10-poc.md | 202 +-- .../windows-autopilot/administer.md | 6 +- .../windows-autopilot/autopilot-faq.md | 51 +- .../windows-autopilot/autopilot-support.md | 36 +- .../demonstrate-deployment-on-vm.md | 28 +- .../windows-autopilot/existing-devices.md | 98 +- .../windows-autopilot/white-glove.md | 4 +- .../windows-autopilot-requirements.md | 2 +- .../windows-autopilot-reset-local.md | 6 +- .../windows-deployment-scenarios-and-tools.md | 10 +- windows/device-security/docfx.json | 31 +- windows/hub/docfx.json | 38 +- windows/keep-secure/docfx.json | 17 +- windows/manage/docfx.json | 17 +- windows/plan/docfx.json | 17 +- .../resolved-issues-windows-10-1507.yml | 10 - .../resolved-issues-windows-10-1607.yml | 12 - .../resolved-issues-windows-10-1703.yml | 4 - .../resolved-issues-windows-10-1709.yml | 2 - .../resolved-issues-windows-10-1803.yml | 16 - ...indows-10-1809-and-windows-server-2019.yml | 8 - ...indows-10-1607-and-windows-server-2016.yml | 4 +- .../status-windows-10-1703.yml | 4 +- .../status-windows-10-1709.yml | 4 +- .../status-windows-10-1803.yml | 4 +- ...indows-10-1809-and-windows-server-2019.yml | 4 +- .../status-windows-10-1903.yml | 28 +- windows/security/docfx.json | 32 +- .../access-control/access-control.md | 6 +- .../active-directory-accounts.md | 81 +- .../active-directory-security-groups.md | 384 ++--- .../access-control/local-accounts.md | 30 +- .../access-control/service-accounts.md | 2 +- .../additional-mitigations.md | 6 - .../credential-guard-considerations.md | 7 +- .../credential-guard-how-it-works.md | 10 +- .../credential-guard-known-issues.md | 24 +- .../credential-guard-manage.md | 59 +- .../credential-guard-requirements.md | 10 +- .../credential-guard/credential-guard.md | 9 - .../enterprise-certificate-pinning.md | 33 +- .../feature-multifactor-unlock.md | 8 +- .../hello-biometrics-in-enterprise.md | 6 +- .../hello-cert-trust-adfs.md | 14 +- .../hello-cert-trust-deploy-mfa.md | 20 +- .../hello-errors-during-pin-creation.md | 20 +- .../hello-for-business/hello-event-300.md | 12 +- .../hello-for-business/hello-features.md | 8 +- .../hello-how-it-works-provisioning.md | 78 +- .../hello-how-it-works-technology.md | 4 +- .../hello-hybrid-aadj-sso-base.md | 46 +- .../hello-hybrid-aadj-sso-cert.md | 100 +- .../hello-hybrid-cert-new-install.md | 4 +- .../hello-hybrid-cert-trust-devreg.md | 476 +++--- .../hello-hybrid-cert-whfb-provision.md | 4 +- .../hello-hybrid-cert-whfb-settings-ad.md | 8 +- .../hello-hybrid-cert-whfb-settings-adfs.md | 10 +- ...ello-hybrid-cert-whfb-settings-dir-sync.md | 12 +- .../hello-hybrid-cert-whfb-settings-pki.md | 8 +- .../hello-hybrid-cert-whfb-settings-policy.md | 6 +- .../hello-hybrid-cert-whfb-settings.md | 2 +- .../hello-hybrid-key-new-install.md | 4 +- .../hello-hybrid-key-whfb-settings-ad.md | 8 +- ...hello-hybrid-key-whfb-settings-dir-sync.md | 7 +- .../hello-hybrid-key-whfb-settings-pki.md | 8 +- .../hello-hybrid-key-whfb-settings-policy.md | 6 +- .../hello-hybrid-key-whfb-settings.md | 2 +- .../hello-identity-verification.md | 3 + .../hello-key-trust-deploy-mfa.md | 20 +- .../hello-manage-in-organization.md | 8 +- .../hello-planning-guide.md | 16 +- ...gital-certificates-on-windows-10-mobile.md | 8 +- .../remote-credential-guard.md | 22 +- ...ertificate-requirements-and-enumeration.md | 103 +- .../smart-card-debugging-information.md | 4 +- ...card-group-policy-and-registry-settings.md | 23 +- .../how-user-account-control-works.md | 24 +- .../user-account-control-overview.md | 9 +- .../virtual-smart-card-get-started.md | 52 +- .../bitlocker/bitlocker-and-adds-faq.md | 2 +- .../bitlocker/bitlocker-basic-deployment.md | 32 +- .../bitlocker/bitlocker-countermeasures.md | 2 +- .../bitlocker-group-policy-settings.md | 527 +++--- .../bitlocker-how-to-enable-network-unlock.md | 36 +- .../bitlocker/bitlocker-key-management-faq.md | 2 +- ...bitlocker-overview-and-requirements-faq.md | 2 +- .../bitlocker-recovery-guide-plan.md | 38 +- .../bitlocker/bitlocker-security-faq.md | 2 +- .../bitlocker/bitlocker-upgrading-faq.md | 2 +- ...ve-encryption-tools-to-manage-bitlocker.md | 24 +- ...bitlocker-using-with-other-programs-faq.md | 2 +- ...ion-for-bitlocker-planning-and-policies.md | 6 +- ...nd-storage-area-networks-with-bitlocker.md | 18 +- .../encrypted-hard-drive.md | 4 +- ...lize-and-configure-ownership-of-the-tpm.md | 12 +- .../tpm/manage-tpm-lockout.md | 14 +- ...m-module-services-group-policy-settings.md | 6 +- .../collect-wip-audit-event-logs.md | 4 +- .../create-wip-policy-using-sccm.md | 272 ++-- .../enlightened-microsoft-apps-and-wip.md | 42 +- .../limitations-with-wip.md | 23 +- .../testing-scenarios-for-wip.md | 43 +- ...advanced-security-audit-policy-settings.md | 16 +- .../basic-audit-account-logon-events.md | 6 +- .../basic-audit-account-management.md | 99 +- .../basic-audit-directory-service-access.md | 8 +- .../auditing/basic-audit-logon-events.md | 8 +- .../auditing/basic-audit-object-access.md | 97 +- .../auditing/basic-audit-policy-change.md | 6 +- .../auditing/basic-audit-privilege-use.md | 6 +- .../auditing/basic-audit-process-tracking.md | 6 +- .../auditing/basic-security-audit-policies.md | 4 +- .../basic-security-audit-policy-settings.md | 6 +- .../threat-protection/auditing/event-4625.md | 5 +- .../threat-protection/auditing/event-4626.md | 3 +- .../threat-protection/auditing/event-4661.md | 11 +- .../threat-protection/auditing/event-4662.md | 11 +- .../threat-protection/auditing/event-4670.md | 13 +- .../threat-protection/auditing/event-4672.md | 3 +- .../threat-protection/auditing/event-4673.md | 71 +- .../threat-protection/auditing/event-4674.md | 75 +- .../threat-protection/auditing/event-4688.md | 17 +- .../threat-protection/auditing/event-4715.md | 7 +- .../threat-protection/auditing/event-4720.md | 27 +- .../threat-protection/auditing/event-4732.md | 11 +- .../threat-protection/auditing/event-4733.md | 11 +- .../threat-protection/auditing/event-4735.md | 3 +- .../threat-protection/auditing/event-4741.md | 21 +- .../threat-protection/auditing/event-4742.md | 13 +- .../threat-protection/auditing/event-4750.md | 5 +- .../threat-protection/auditing/event-4751.md | 11 +- .../threat-protection/auditing/event-4752.md | 11 +- .../threat-protection/auditing/event-4768.md | 5 +- .../threat-protection/auditing/event-4769.md | 76 +- .../threat-protection/auditing/event-4770.md | 19 +- .../threat-protection/auditing/event-4771.md | 1 - .../threat-protection/auditing/event-4817.md | 7 +- .../threat-protection/auditing/event-4907.md | 11 +- .../threat-protection/auditing/event-4911.md | 7 +- .../threat-protection/auditing/event-4913.md | 7 +- .../threat-protection/auditing/event-4928.md | 11 +- .../threat-protection/auditing/event-4929.md | 11 +- .../threat-protection/auditing/event-4930.md | 11 +- .../threat-protection/auditing/event-4931.md | 11 +- .../threat-protection/auditing/event-4932.md | 11 +- .../threat-protection/auditing/event-4933.md | 11 +- .../threat-protection/auditing/event-5136.md | 13 +- .../threat-protection/auditing/event-5137.md | 11 +- .../threat-protection/auditing/event-5138.md | 11 +- .../threat-protection/auditing/event-5139.md | 11 +- .../threat-protection/auditing/event-5140.md | 11 +- .../threat-protection/auditing/event-5141.md | 11 +- .../threat-protection/auditing/event-5142.md | 5 +- .../threat-protection/auditing/event-5143.md | 9 +- .../threat-protection/auditing/event-5144.md | 5 +- .../threat-protection/auditing/event-5145.md | 7 +- .../threat-protection/auditing/event-5632.md | 1 - .../threat-protection/auditing/event-5633.md | 1 - ...tral-access-policy-and-rule-definitions.md | 2 +- .../auditing/monitor-claim-types.md | 2 +- .../monitor-resource-attribute-definitions.md | 2 +- ...icies-associated-with-files-and-folders.md | 4 +- ...esource-attributes-on-files-and-folders.md | 2 +- ...or-the-use-of-removable-storage-devices.md | 6 +- ...r-user-and-device-claims-during-sign-in.md | 2 +- ...loying-advanced-security-audit-policies.md | 26 +- .../auditing/security-auditing-overview.md | 9 +- ...-monitor-dynamic-access-control-objects.md | 4 +- .../block-untrusted-fonts-in-enterprise.md | 20 +- .../threat-protection/fips-140-validation.md | 44 +- .../get-support-for-security-baselines.md | 21 +- .../intelligence/safety-scanner-download.md | 2 +- .../intelligence/support-scams.md | 2 +- .../microsoft-defender-atp/api-hello-world.md | 86 +- .../api-portal-mapping.md | 67 +- .../microsoft-defender-atp/apis-intro.md | 22 +- .../assign-portal-access.md | 10 +- .../attack-simulations.md | 16 +- .../basic-permissions.md | 12 +- .../configure-and-manage-tvm.md | 4 +- .../configure-arcsight.md | 113 +- .../configure-conditional-access.md | 8 +- .../configure-endpoints-gp.md | 4 +- .../configure-endpoints-mdm.md | 4 +- .../configure-endpoints-non-windows.md | 6 +- .../configure-endpoints-sccm.md | 2 +- .../configure-microsoft-threat-experts.md | 4 +- .../configure-proxy-internet.md | 34 +- .../configure-server-endpoints.md | 4 +- .../configure-splunk.md | 134 +- .../custom-detection-rules.md | 12 +- .../microsoft-defender-atp/custom-ti-api.md | 44 +- .../microsoft-defender-atp/deprecate.md | 6 +- .../enable-custom-ti.md | 16 +- .../enable-siem-integration.md | 14 +- .../event-error-codes.md | 102 +- .../exposed-apis-create-app-nativeapp.md | 42 +- .../exposed-apis-create-app-webapp.md | 131 +- .../exposed-apis-full-sample-powershell.md | 41 +- .../exposed-apis-list.md | 9 +- .../exposed-apis-odata-samples.md | 95 +- .../get-domain-related-alerts.md | 83 +- ...nformation-protection-in-windows-config.md | 12 +- .../microsoft-defender-atp/licensing.md | 46 +- .../microsoft-defender-atp/machine-tags.md | 10 +- .../microsoft-defender-atp/machineaction.md | 49 +- .../minimum-requirements.md | 16 +- .../microsoft-defender-atp/powerbi-reports.md | 48 +- .../powershell-example-code.md | 2 - .../respond-file-alerts.md | 14 +- .../run-advanced-query-api.md | 22 +- .../run-advanced-query-sample-ms-flow.md | 28 +- .../run-advanced-query-sample-powershell.md | 23 +- .../threat-and-vuln-mgt-scenarios.md | 8 +- .../troubleshoot-onboarding.md | 64 +- .../troubleshoot-siem.md | 6 +- .../microsoft-defender-atp/use-apis.md | 2 +- .../microsoft-defender-atp/use-custom-ti.md | 8 +- .../microsoft-defender-atp/user-roles.md | 2 +- ...tions-for-app-related-security-policies.md | 8 +- ...-the-health-of-windows-10-based-devices.md | 247 ++- ...-credential-manager-as-a-trusted-caller.md | 4 +- .../access-this-computer-from-the-network.md | 8 +- .../account-lockout-duration.md | 6 +- .../account-lockout-policy.md | 6 +- .../account-lockout-threshold.md | 8 +- .../account-policies.md | 4 +- .../accounts-block-microsoft-accounts.md | 6 +- .../accounts-guest-account-status.md | 6 +- ...f-blank-passwords-to-console-logon-only.md | 2 +- .../accounts-rename-administrator-account.md | 6 +- .../accounts-rename-guest-account.md | 6 +- .../act-as-part-of-the-operating-system.md | 4 +- .../adjust-memory-quotas-for-a-process.md | 6 +- .../administer-security-policy-settings.md | 50 +- .../allow-log-on-locally.md | 8 +- ...-log-on-through-remote-desktop-services.md | 6 +- ...dit-the-access-of-global-system-objects.md | 4 +- ...the-use-of-backup-and-restore-privilege.md | 6 +- ...policy-subcategory-settings-to-override.md | 8 +- ...iately-if-unable-to-log-security-audits.md | 8 +- .../back-up-files-and-directories.md | 6 +- .../bypass-traverse-checking.md | 6 +- .../change-the-system-time.md | 2 +- .../change-the-time-zone.md | 2 +- .../create-a-pagefile.md | 2 +- .../create-a-token-object.md | 4 +- .../create-global-objects.md | 2 +- .../create-permanent-shared-objects.md | 2 +- .../create-symbolic-links.md | 2 +- ...criptor-definition-language-sddl-syntax.md | 6 +- ...criptor-definition-language-sddl-syntax.md | 2 +- .../debug-programs.md | 2 +- ...ccess-to-this-computer-from-the-network.md | 2 +- .../deny-log-on-as-a-batch-job.md | 2 +- .../deny-log-on-as-a-service.md | 2 +- .../deny-log-on-locally.md | 2 +- ...-log-on-through-remote-desktop-services.md | 2 +- ...s-allow-undock-without-having-to-log-on.md | 4 +- ...wed-to-format-and-eject-removable-media.md | 2 +- ...t-users-from-installing-printer-drivers.md | 2 +- ...m-access-to-locally-logged-on-user-only.md | 2 +- ...y-access-to-locally-logged-on-user-only.md | 2 +- ...llow-server-operators-to-schedule-tasks.md | 4 +- ...roller-ldap-server-signing-requirements.md | 4 +- ...refuse-machine-account-password-changes.md | 2 +- ...rypt-or-sign-secure-channel-data-always.md | 28 +- ...crypt-secure-channel-data-when-possible.md | 4 +- ...-sign-secure-channel-data-when-possible.md | 12 +- ...isable-machine-account-password-changes.md | 2 +- ...er-maximum-machine-account-password-age.md | 2 +- ...trong-windows-2000-or-later-session-key.md | 31 +- ...r-accounts-to-be-trusted-for-delegation.md | 4 +- .../enforce-password-history.md | 4 +- .../enforce-user-logon-restrictions.md | 2 +- .../force-shutdown-from-a-remote-system.md | 2 +- .../generate-security-audits.md | 2 +- ...w-to-configure-security-policy-settings.md | 10 +- ...personate-a-client-after-authentication.md | 2 +- .../increase-a-process-working-set.md | 2 +- ...ive-logon-do-not-display-last-user-name.md | 2 +- ...ctive-logon-do-not-require-ctrl-alt-del.md | 2 +- ...-logon-dont-display-username-at-sign-in.md | 2 +- ...logon-machine-account-lockout-threshold.md | 2 +- ...eractive-logon-machine-inactivity-limit.md | 2 +- ...age-text-for-users-attempting-to-log-on.md | 14 +- ...ge-title-for-users-attempting-to-log-on.md | 4 +- ...case-domain-controller-is-not-available.md | 2 +- ...er-to-change-password-before-expiration.md | 2 +- ...er-authentication-to-unlock-workstation.md | 2 +- .../interactive-logon-require-smart-card.md | 2 +- ...ctive-logon-smart-card-removal-behavior.md | 2 +- .../kerberos-policy.md | 16 +- .../load-and-unload-device-drivers.md | 4 +- .../lock-pages-in-memory.md | 4 +- .../log-on-as-a-batch-job.md | 2 +- .../log-on-as-a-service.md | 2 +- .../manage-auditing-and-security-log.md | 4 +- .../maximum-lifetime-for-service-ticket.md | 2 +- ...aximum-lifetime-for-user-ticket-renewal.md | 2 +- .../maximum-lifetime-for-user-ticket.md | 2 +- .../maximum-password-age.md | 4 +- ...ance-for-computer-clock-synchronization.md | 2 +- ...nt-digitally-sign-communications-always.md | 16 +- ...ted-password-to-third-party-smb-servers.md | 2 +- ...time-required-before-suspending-session.md | 21 +- ...pt-s4u2self-to-obtain-claim-information.md | 2 +- ...er-digitally-sign-communications-always.md | 16 +- ...connect-clients-when-logon-hours-expire.md | 2 +- ...server-spn-target-name-validation-level.md | 4 +- .../minimum-password-age.md | 2 +- .../minimum-password-length.md | 4 +- .../modify-an-object-label.md | 2 +- .../modify-firmware-environment-values.md | 2 +- ...ess-allow-anonymous-sidname-translation.md | 2 +- ...-enumeration-of-sam-accounts-and-shares.md | 2 +- ...w-anonymous-enumeration-of-sam-accounts.md | 2 +- ...-credentials-for-network-authentication.md | 4 +- ...ne-permissions-apply-to-anonymous-users.md | 2 +- ...-pipes-that-can-be-accessed-anonymously.md | 4 +- ...-accessible-registry-paths-and-subpaths.md | 4 +- ...cess-remotely-accessible-registry-paths.md | 4 +- ...nymous-access-to-named-pipes-and-shares.md | 2 +- ...lients-allowed-to-make-remote-sam-calls.md | 4 +- ...shares-that-can-be-accessed-anonymously.md | 2 +- ...g-and-security-model-for-local-accounts.md | 4 +- ...ystem-to-use-computer-identity-for-ntlm.md | 4 +- ...allow-localsystem-null-session-fallback.md | 2 +- ...-this-computer-to-use-online-identities.md | 4 +- ...e-encryption-types-allowed-for-kerberos.md | 34 +- ...ager-hash-value-on-next-password-change.md | 2 +- ...ty-force-logoff-when-logon-hours-expire.md | 2 +- ...curity-lan-manager-authentication-level.md | 4 +- ...curity-ldap-client-signing-requirements.md | 2 +- ...-ssp-based-including-secure-rpc-clients.md | 2 +- ...-ssp-based-including-secure-rpc-servers.md | 2 +- ...rver-exceptions-for-ntlm-authentication.md | 2 +- ...lm-add-server-exceptions-in-this-domain.md | 2 +- ...strict-ntlm-audit-incoming-ntlm-traffic.md | 2 +- ...udit-ntlm-authentication-in-this-domain.md | 2 +- ...ity-restrict-ntlm-incoming-ntlm-traffic.md | 2 +- ...ntlm-ntlm-authentication-in-this-domain.md | 2 +- ...outgoing-ntlm-traffic-to-remote-servers.md | 4 +- ...sword-must-meet-complexity-requirements.md | 2 +- .../password-policy.md | 6 +- .../perform-volume-maintenance-tasks.md | 2 +- .../profile-single-process.md | 2 +- .../profile-system-performance.md | 2 +- ...le-allow-automatic-administrative-logon.md | 2 +- ...py-and-access-to-all-drives-and-folders.md | 2 +- .../remove-computer-from-docking-station.md | 2 +- .../replace-a-process-level-token.md | 2 +- .../reset-account-lockout-counter-after.md | 2 +- .../restore-files-and-directories.md | 4 +- .../security-options.md | 2 +- .../security-policy-settings-reference.md | 4 +- .../security-policy-settings.md | 6 +- .../shut-down-the-system.md | 2 +- ...o-be-shut-down-without-having-to-log-on.md | 2 +- .../shutdown-clear-virtual-memory-pagefile.md | 4 +- ...nt-digitally-sign-communications-always.md | 4 +- ...ly-sign-communications-if-server-agrees.md | 4 +- ...er-digitally-sign-communications-always.md | 4 +- ...ly-sign-communications-if-client-agrees.md | 25 +- ...e-passwords-using-reversible-encryption.md | 4 +- .../synchronize-directory-service-data.md | 2 +- ...on-for-user-keys-stored-on-the-computer.md | 2 +- ...thms-for-encryption-hashing-and-signing.md | 4 +- ...nsensitivity-for-non-windows-subsystems.md | 2 +- ...-permissions-of-internal-system-objects.md | 2 +- .../system-settings-optional-subsystems.md | 2 +- ...ables-for-software-restriction-policies.md | 2 +- ...ake-ownership-of-files-or-other-objects.md | 2 +- ...-for-the-built-in-administrator-account.md | 4 +- ...vation-without-using-the-secure-desktop.md | 4 +- ...r-administrators-in-admin-approval-mode.md | 4 +- ...the-elevation-prompt-for-standard-users.md | 2 +- ...-installations-and-prompt-for-elevation.md | 2 +- ...ecutables-that-are-signed-and-validated.md | 2 +- ...-that-are-installed-in-secure-locations.md | 4 +- ...l-administrators-in-admin-approval-mode.md | 4 +- ...re-desktop-when-prompting-for-elevation.md | 2 +- ...ry-write-failures-to-per-user-locations.md | 2 +- .../user-rights-assignment.md | 2 +- ...arding-to-assist-in-intrusion-detection.md | 120 +- ...e-worm-targets-out-of-date-systems-wdsi.md | 8 +- ...ne-arguments-windows-defender-antivirus.md | 32 +- ...-first-sight-windows-defender-antivirus.md | 12 +- ...e-exclusions-windows-defender-antivirus.md | 26 +- ...-remediation-windows-defender-antivirus.md | 12 +- ...ployment-vdi-windows-defender-antivirus.md | 347 ++-- ...tion-updates-windows-defender-antivirus.md | 22 +- ...troubleshoot-windows-defender-antivirus.md | 103 +- ...indows-defender-antivirus-compatibility.md | 20 +- .../applocker/administer-applocker.md | 16 +- .../applocker/applocker-functions.md | 6 +- .../applocker/applocker-overview.md | 4 +- .../applocker/applocker-settings.md | 2 +- ...e-an-applocker-policy-for-enforce-rules.md | 2 +- ...onfigure-the-appLocker-reference-device.md | 8 +- ...figure-the-application-identity-service.md | 2 +- ...reate-a-rule-that-uses-a-path-condition.md | 4 +- .../create-applocker-default-rules.md | 2 +- ...cations-deployed-to-each-business-group.md | 6 +- .../applocker/create-your-applocker-rules.md | 2 +- .../applocker/delete-an-applocker-rule.md | 8 +- ...cies-by-using-the-enforce-rules-setting.md | 6 +- ...p-policy-structure-and-rule-enforcement.md | 2 +- ...ine-your-application-control-objectives.md | 6 +- .../applocker/dll-rules-in-applocker.md | 10 +- ...tructure-and-applocker-rule-enforcement.md | 8 +- .../document-your-application-list.md | 10 +- .../document-your-applocker-rules.md | 4 +- .../executable-rules-in-applocker.md | 2 +- ...-applocker-policy-from-another-computer.md | 2 +- .../import-an-applocker-policy-into-a-gpo.md | 2 +- .../manage-packaged-apps-with-applocker.md | 4 +- .../merge-applocker-policies-manually.md | 4 +- ...onitor-application-usage-with-applocker.md | 2 +- .../plan-for-applocker-policy-management.md | 10 +- ...ements-for-deploying-applocker-policies.md | 12 +- .../requirements-to-use-applocker.md | 4 +- ...the-automatically-generate-rules-wizard.md | 26 +- .../applocker/script-rules-in-applocker.md | 2 +- .../security-considerations-for-applocker.md | 4 +- .../select-types-of-rules-to-create.md | 2 +- ...derstand-applocker-enforcement-settings.md | 2 +- ...stand-applocker-policy-design-decisions.md | 77 +- ...plocker-allow-and-deny-actions-on-rules.md | 4 +- .../understanding-applocker-default-rules.md | 4 +- ...nderstanding-applocker-rule-collections.md | 2 +- ...e-file-hash-rule-condition-in-applocker.md | 2 +- ...ng-the-path-rule-condition-in-applocker.md | 23 +- ...e-publisher-rule-condition-in-applocker.md | 4 +- ...-create-and-maintain-applocker-policies.md | 8 +- .../using-event-viewer-with-applocker.md | 6 +- ...riction-policies-and-applocker-policies.md | 6 +- .../applocker/what-is-applocker.md | 23 +- .../windows-installer-rules-in-applocker.md | 6 +- .../applocker/working-with-applocker-rules.md | 30 +- ...s-defender-application-control-policies.md | 56 +- .../create-initial-default-policy.md | 42 +- ...r-application-control-planning-document.md | 30 +- ...rt-windows-defender-application-control.md | 68 +- ...pplication-control-management-processes.md | 14 +- ...s-defender-application-control-policies.md | 30 +- ...th-windows-defender-application-control.md | 22 +- ...s-defender-application-control-policies.md | 24 +- .../signing-policies-with-signtool.md | 36 +- ...ication-control-policy-design-decisions.md | 18 +- ...r-application-control-against-tampering.md | 36 +- ...er-application-control-deployment-guide.md | 20 +- ...fender-application-control-design-guide.md | 4 +- .../configure-wd-app-guard.md | 10 +- .../faq-wd-app-guard.md | 105 +- .../test-scenarios-wd-app-guard.md | 38 +- .../wd-app-guard-overview.md | 87 +- .../controlled-folders-exploit-guard.md | 7 + ...tomize-controlled-folders-exploit-guard.md | 2 +- .../customize-exploit-protection.md | 58 +- .../enable-attack-surface-reduction.md | 14 +- ...enable-controlled-folders-exploit-guard.md | 10 +- .../evaluate-controlled-folder-access.md | 2 +- ...evaluate-windows-defender-exploit-guard.md | 6 +- .../event-views-exploit-guard.md | 3 +- .../network-protection-exploit-guard.md | 14 +- .../troubleshoot-np.md | 10 +- .../wdsc-windows-10-in-s-mode.md | 2 +- ...ender-smartscreen-set-individual-device.md | 24 +- ...ices-to-the-membership-group-for-a-zone.md | 6 +- ...rs-in-a-standalone-isolated-server-zone.md | 2 +- ...nfiguring-rules-for-the-isolated-domain.md | 2 +- .../configure-authentication-methods.md | 48 +- ...nfigure-the-rules-to-require-encryption.md | 20 +- .../copy-a-gpo-to-create-a-new-gpo.md | 18 +- .../create-a-group-policy-object.md | 20 +- ...e-an-authentication-exemption-list-rule.md | 2 +- .../create-an-inbound-port-rule.md | 30 +- .../windows-firewall/encryption-zone.md | 2 +- ...with-advanced-security-deployment-goals.md | 14 +- ...agement-console-to-ip-security-policies.md | 6 +- ...windows-firewall-with-advanced-security.md | 6 +- ...to-end-ipsec-connections-by-using-ikev2.md | 12 +- .../get-support-for-security-baselines.md | 21 +- windows/threat-protection/docfx.json | 31 +- windows/update/docfx.json | 17 +- windows/whats-new/contribute-to-a-topic.md | 22 +- windows/whats-new/docfx.json | 34 +- .../ltsc/whats-new-windows-10-2015.md | 4 +- .../ltsc/whats-new-windows-10-2016.md | 10 +- .../ltsc/whats-new-windows-10-2019.md | 40 +- ...ts-new-windows-10-version-1507-and-1511.md | 20 +- .../whats-new-windows-10-version-1903.md | 16 +- 2030 files changed, 29054 insertions(+), 28875 deletions(-) diff --git a/browsers/edge/about-microsoft-edge.md b/browsers/edge/about-microsoft-edge.md index f58beeac0b..b38cf78717 100644 --- a/browsers/edge/about-microsoft-edge.md +++ b/browsers/edge/about-microsoft-edge.md @@ -1,6 +1,6 @@ --- title: Microsoft Edge system and language requirements -description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics. +description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics. ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb ms.reviewer: manager: dansimp @@ -18,7 +18,7 @@ ms.date: 10/02/2018 # Microsoft Edge system and language requirements >Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile -Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools. +Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools. >[!IMPORTANT] @@ -29,136 +29,138 @@ Microsoft Edge is the new, default web browser for Windows 10, helping you to e Some of the components might also need additional system resources. Check the component's documentation for more information. -| Item | Minimum requirements | -| ------------------ | -------------------------------------------- | -| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) | -| Operating system |
  • Windows 10 (32-bit or 64-bit)
  • Windows 10 Mobile

**Note**
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. | -| Memory |

  • Windows 10 (32-bit) - 1 GB
  • Windows 10 (64-bit) - 2 GB
| -| Hard drive space |
  • Windows 10 (32-bit) - 16 GB
  • Windows 10 (64-bit) - 20 GB
| -| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) | -| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | -| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver | -| Peripherals | Internet connection and a compatible pointing device | +| Item | Minimum requirements | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) | +| Operating system |
  • Windows 10 (32-bit or 64-bit)
  • Windows 10 Mobile

Note
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. | +| Memory |

  • Windows 10 (32-bit) - 1 GB
  • Windows 10 (64-bit) - 2 GB
| +| Hard drive space |
  • Windows 10 (32-bit) - 16 GB
  • Windows 10 (64-bit) - 20 GB
| +| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) | +| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | +| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver | +| Peripherals | Internet connection and a compatible pointing device | + --- -  + ## Supported languages -Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/en-us/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages. +Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/en-us/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages. If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub. -| Language | Country/Region | Code | -| ------------------------ | -------------- | ------ | -| Afrikaans (South Africa) | South Africa | af-ZA | -| Albanian (Albania) | Albania | sq-AL | -| Amharic | Ethiopia | am-ET | -| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA | -| Armenian | Armenia | hy-AM | -| Assamese | India | as-IN | -| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ | -| Bangla (Bangladesh) | Bangladesh | bn-BD | -| Bangla (India) | India | bn-IN | -| Basque (Basque) | Spain | eu-ES | -| Belarusian (Belarus) | Belarus | be-BY | -| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA | -| Bulgarian (Bulgaria) | Bulgaria | bg-BG | -| Catalan (Catalan) | Spain | ca-ES | -| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ | -| Cherokee (Cherokee) | United States | chr-Cher-US | -| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK | -| Chinese (Simplified, China) | People's Republic of China | zh-CN | -| Chinese (Traditional, Taiwan) | Taiwan | zh-TW | -| Croatian (Croatia) | Croatia | hr-HR | -| Czech (Czech Republic) | Czech Republic | cs-CZ | -| Danish (Denmark) | Denmark | da-DK | -| Dari | Afghanistan | prs-AF | -| Dutch (Netherlands) | Netherlands | nl-NL | -| English (United Kingdom) | United Kingdom | en-GB | -| English (United States) | United States | en-US | -| Estonian (Estonia) | Estonia | et-EE | -| Filipino (Philippines) | Philippines | fil-PH | -| Finnish (Finland) | Finland | fi_FI | -| French (Canada) | Canada | fr-CA | -| French (France) | France | fr-FR | -| Galician (Galician) | Spain | gl-ES | -| Georgian | Georgia | ka-GE | -| German (Germany) | Germany | de-DE | -| Greek (Greece) | Greece | el-GR | -| Gujarati | India | gu-IN | -| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG | -| Hebrew (Israel) | Israel | he-IL | -| Hindi (India) | India | hi-IN | -| Hungarian (Hungary) | Hungary | hu-HU | -| Icelandic | Iceland | is-IS | -| Igbo | Nigeria | ig-NG | -| Indonesian (Indonesia) | Indonesia | id-ID | -| Irish | Ireland | ga-IE | -| isiXhosa | South Africa | xh-ZA | -| isiZulu | South Africa | zu-ZA | -| Italian (Italy) | Italy | it-IT | -| Japanese (Japan) | Japan | ja-JP | -| Kannada | India | kn-IN | -| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ | -| Khmer (Cambodia) | Cambodia | km-KH | -| K'iche' | Guatemala | quc-Latn-GT | -| Kinyarwanda | Rwanda | rw-RW | -| KiSwahili | Kenya, Tanzania | sw-KE | -| Konkani | India | kok-IN | -| Korean (Korea) | Korea | ko-KR | -| Kyrgyz | Kyrgyzstan | ky-KG | -| Lao (Laos) | Lao P.D.R. | lo-LA | -| Latvian (Latvia) | Latvia | lv-LV | -| Lithuanian (Lithuania) | Lithuania | lt-LT | -| Luxembourgish (Luxembourg) | Luxembourg | lb-LU | -| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK | -| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY | -| Malayalam | India | ml-IN | -| Maltese | Malta | mt-MT | -| Maori | New Zealand | mi-NZ | -| Marathi | India | mr-IN | -| Mongolian (Cyrillic) | Mongolia | mn-MN | -| Nepali | Federal Democratic Republic of Nepal | ne-NP | -| Norwegian (Nynorsk) | Norway | nn-NO | -| Norwegian, Bokmål (Norway) | Norway | nb-NO | -| Odia | India | or-IN | -| Polish (Poland) | Poland | pl-PL | -| Portuguese (Brazil) | Brazil | pt-BR | -| Portuguese (Portugal) | Portugal | pt-PT | -| Punjabi | India | pa-IN | -| Punjabi (Arabic) | Pakistan | pa-Arab-PK | -| Quechua | Peru | quz-PE | -| Romanian (Romania) | Romania | ro-RO | -| Russian (Russia) | Russia | ru-RU | -| Scottish Gaelic | United Kingdom | gd-GB | -| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA | -| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS | -| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS | -| Sesotho sa Leboa | South Africa | nso-ZA | -| Setswana (South Africa) | South Africa and Botswana | tn-ZA | -| Sindhi (Arabic) | Pakistan | sd-Arab-PK | -| Sinhala | Sri Lanka | si-LK | -| Slovak (Slovakia) | Slovakia | sk-SK | -| Slovenian (Slovenia) | Slovenia | sl-SL | -| Spanish (Mexico) | Mexico | es-MX | -| Spanish (Spain, International Sort) | Spain | en-ES | -| Swedish (Sweden) | Sweden | sv-SE | -| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ | -| Tamil (India) | India and Sri Lanka | ta-IN | -| Tatar | Russia | tt-RU | -| Telugu | India | te-IN | -| Thai (Thailand) | Thailand | th-TH | -| Tigrinya (Ethiopia) | Ethiopia | ti-ET | -| Turkish (Turkey) | Turkey | tr-TR | -| Turkmen | Turkmenistan | tk-TM | -| Ukrainian (Ukraine) | Ukraine | uk-UA | -| Urdu | Pakistan | ur-PK | -| Uyghur | People's Republic of China | ug-CN | -| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ | -| Valencian | Spain | ca-ES-valencia | -| Vietnamese | Vietnam | vi-VN | -| Welsh | United Kingdom | cy-GB | -| Wolof | Senegal | wo-SN | -| Yoruba | Nigeria | yo-NG | +| Language | Country/Region | Code | +|----------------------------------------------------|-----------------------------------------|----------------| +| Afrikaans (South Africa) | South Africa | af-ZA | +| Albanian (Albania) | Albania | sq-AL | +| Amharic | Ethiopia | am-ET | +| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA | +| Armenian | Armenia | hy-AM | +| Assamese | India | as-IN | +| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ | +| Bangla (Bangladesh) | Bangladesh | bn-BD | +| Bangla (India) | India | bn-IN | +| Basque (Basque) | Spain | eu-ES | +| Belarusian (Belarus) | Belarus | be-BY | +| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA | +| Bulgarian (Bulgaria) | Bulgaria | bg-BG | +| Catalan (Catalan) | Spain | ca-ES | +| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ | +| Cherokee (Cherokee) | United States | chr-Cher-US | +| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK | +| Chinese (Simplified, China) | People's Republic of China | zh-CN | +| Chinese (Traditional, Taiwan) | Taiwan | zh-TW | +| Croatian (Croatia) | Croatia | hr-HR | +| Czech (Czech Republic) | Czech Republic | cs-CZ | +| Danish (Denmark) | Denmark | da-DK | +| Dari | Afghanistan | prs-AF | +| Dutch (Netherlands) | Netherlands | nl-NL | +| English (United Kingdom) | United Kingdom | en-GB | +| English (United States) | United States | en-US | +| Estonian (Estonia) | Estonia | et-EE | +| Filipino (Philippines) | Philippines | fil-PH | +| Finnish (Finland) | Finland | fi_FI | +| French (Canada) | Canada | fr-CA | +| French (France) | France | fr-FR | +| Galician (Galician) | Spain | gl-ES | +| Georgian | Georgia | ka-GE | +| German (Germany) | Germany | de-DE | +| Greek (Greece) | Greece | el-GR | +| Gujarati | India | gu-IN | +| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG | +| Hebrew (Israel) | Israel | he-IL | +| Hindi (India) | India | hi-IN | +| Hungarian (Hungary) | Hungary | hu-HU | +| Icelandic | Iceland | is-IS | +| Igbo | Nigeria | ig-NG | +| Indonesian (Indonesia) | Indonesia | id-ID | +| Irish | Ireland | ga-IE | +| isiXhosa | South Africa | xh-ZA | +| isiZulu | South Africa | zu-ZA | +| Italian (Italy) | Italy | it-IT | +| Japanese (Japan) | Japan | ja-JP | +| Kannada | India | kn-IN | +| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ | +| Khmer (Cambodia) | Cambodia | km-KH | +| K'iche' | Guatemala | quc-Latn-GT | +| Kinyarwanda | Rwanda | rw-RW | +| KiSwahili | Kenya, Tanzania | sw-KE | +| Konkani | India | kok-IN | +| Korean (Korea) | Korea | ko-KR | +| Kyrgyz | Kyrgyzstan | ky-KG | +| Lao (Laos) | Lao P.D.R. | lo-LA | +| Latvian (Latvia) | Latvia | lv-LV | +| Lithuanian (Lithuania) | Lithuania | lt-LT | +| Luxembourgish (Luxembourg) | Luxembourg | lb-LU | +| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK | +| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY | +| Malayalam | India | ml-IN | +| Maltese | Malta | mt-MT | +| Maori | New Zealand | mi-NZ | +| Marathi | India | mr-IN | +| Mongolian (Cyrillic) | Mongolia | mn-MN | +| Nepali | Federal Democratic Republic of Nepal | ne-NP | +| Norwegian (Nynorsk) | Norway | nn-NO | +| Norwegian, Bokmål (Norway) | Norway | nb-NO | +| Odia | India | or-IN | +| Polish (Poland) | Poland | pl-PL | +| Portuguese (Brazil) | Brazil | pt-BR | +| Portuguese (Portugal) | Portugal | pt-PT | +| Punjabi | India | pa-IN | +| Punjabi (Arabic) | Pakistan | pa-Arab-PK | +| Quechua | Peru | quz-PE | +| Romanian (Romania) | Romania | ro-RO | +| Russian (Russia) | Russia | ru-RU | +| Scottish Gaelic | United Kingdom | gd-GB | +| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA | +| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS | +| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS | +| Sesotho sa Leboa | South Africa | nso-ZA | +| Setswana (South Africa) | South Africa and Botswana | tn-ZA | +| Sindhi (Arabic) | Pakistan | sd-Arab-PK | +| Sinhala | Sri Lanka | si-LK | +| Slovak (Slovakia) | Slovakia | sk-SK | +| Slovenian (Slovenia) | Slovenia | sl-SL | +| Spanish (Mexico) | Mexico | es-MX | +| Spanish (Spain, International Sort) | Spain | en-ES | +| Swedish (Sweden) | Sweden | sv-SE | +| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ | +| Tamil (India) | India and Sri Lanka | ta-IN | +| Tatar | Russia | tt-RU | +| Telugu | India | te-IN | +| Thai (Thailand) | Thailand | th-TH | +| Tigrinya (Ethiopia) | Ethiopia | ti-ET | +| Turkish (Turkey) | Turkey | tr-TR | +| Turkmen | Turkmenistan | tk-TM | +| Ukrainian (Ukraine) | Ukraine | uk-UA | +| Urdu | Pakistan | ur-PK | +| Uyghur | People's Republic of China | ug-CN | +| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ | +| Valencian | Spain | ca-ES-valencia | +| Vietnamese | Vietnam | vi-VN | +| Welsh | United Kingdom | cy-GB | +| Wolof | Senegal | wo-SN | +| Yoruba | Nigeria | yo-NG | + --- diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md index 6fe890772a..888b51a3bc 100644 --- a/browsers/edge/change-history-for-microsoft-edge.md +++ b/browsers/edge/change-history-for-microsoft-edge.md @@ -17,8 +17,7 @@ ms.reviewer: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. -# [2018](#tab/2018) - +#### [2018](#tab/2018/) ## October 2018 The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable @@ -32,45 +31,45 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi -| **New or updated** | **Group Policy** | **Description** | -|------------|-----------------|--------------------| -| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] | -| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] | -| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] | -| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] | -| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] | -| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] | -| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] | -| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] | -| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] | -| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] | -| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) |[!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] | -| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] | -| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] | -| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] | -| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] | -| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] | -| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] | -| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] | -| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] | - - -# [2017](#tab/2017) +| **New or updated** | **Group Policy** | **Description** | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------| +| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] | +| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] | +| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] | +| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] | +| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] | +| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] | +| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] | +| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] | +| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] | +| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] | +| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) | [!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] | +| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] | +| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] | +| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] | +| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] | +| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] | +| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] | +| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] | +| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] | +#### [2017](#tab/2017/) ## September 2017 + |New or changed topic | Description | |---------------------|-------------| |[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New | ## February 2017 + |New or changed topic | Description | |----------------------|-------------| |[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. | -# [2016](#tab/2016) - +#### [2016](#tab/2016/) ## November 2016 + |New or changed topic | Description | |----------------------|-------------| |[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.| @@ -80,6 +79,7 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi |[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. | ## July 2016 + |New or changed topic | Description | |----------------------|-------------| |[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). | @@ -88,6 +88,7 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi ## June 2016 + |New or changed topic | Description | |----------------------|-------------| |[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New | @@ -98,4 +99,4 @@ We have discontinued the **Configure Favorites** group policy, so use the [Provi |----------------------|-------------| |[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. | ---- +* * * diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index 981615d98b..aecc8b6828 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -1,38 +1,45 @@ { "build": { - "content": - [ - { - "files": ["**/*.md","**/*.yml"], - "exclude": ["**/obj/**"] - } - ], + "content": [ + { + "files": [ + "**/*.md", + "**/*.yml" + ], + "exclude": [ + "**/obj/**" + ] + } + ], "resource": [ - { - "files": ["**/images/**"], - "exclude": ["**/obj/**"] - } + { + "files": [ + "**/images/**" + ], + "exclude": [ + "**/obj/**" + ] + } ], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/microsoft-edge/deploy/breadcrumb/toc.json", - "ROBOTS": "INDEX, FOLLOW", - "ms.technology": "microsoft-edge", - "ms.topic": "article", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.microsoft-edge", - "folder_relative_path_in_docset": "./" - } - } + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/microsoft-edge/deploy/breadcrumb/toc.json", + "ROBOTS": "INDEX, FOLLOW", + "ms.technology": "microsoft-edge", + "ms.topic": "article", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.microsoft-edge", + "folder_relative_path_in_docset": "./" + } + } }, - "externalReference": [ - ], + "externalReference": [], "template": "op.html", "dest": "browsers/edge", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/browsers/edge/edge-technical-demos.md b/browsers/edge/edge-technical-demos.md index 7bcda6fb62..5e6a3bbd9f 100644 --- a/browsers/edge/edge-technical-demos.md +++ b/browsers/edge/edge-technical-demos.md @@ -29,10 +29,10 @@ Find out more about new and improved features of Microsoft Edge, and how you can Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient. -![VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14] +> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player] ### Building a safer browser: Four guards to keep users safe Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet. -![VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03] +> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player] diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md index a01c5de255..d2322bf7dc 100644 --- a/browsers/edge/group-policies/security-privacy-management-gp.md +++ b/browsers/edge/group-policies/security-privacy-management-gp.md @@ -57,17 +57,18 @@ Another method thieves often use _hacking_ to attack a system through malformed Microsoft Edge addresses these threats to help make browsing the web a safer experience. -| Feature | Description | -|---|---| -| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). | -| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. | -| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include
  • Certificate Reputation system: Protects users from fraudulent certificates.
  • Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
| -| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
  • Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
  • Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.

**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. | -| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. | -| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | -| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. | -| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. | -| **All web content runs in an app container sandbox** |Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. | -| **Extension model and HTML5 support** |Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). | -| **Reduced attack surfaces** |Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.

It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. | +| Feature | Description | +|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). | +| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. | +| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include

  • Certificate Reputation system: Protects users from fraudulent certificates.
  • Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
| +| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
  • Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
  • Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.

**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. | +| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. | +| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | +| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. | +| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. | +| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. | +| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). | +| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.

It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. | + --- diff --git a/browsers/edge/includes/allow-address-bar-suggestions-include.md b/browsers/edge/includes/allow-address-bar-suggestions-include.md index a6508f582f..f929fb7f8f 100644 --- a/browsers/edge/includes/allow-address-bar-suggestions-include.md +++ b/browsers/edge/includes/allow-address-bar-suggestions-include.md @@ -18,10 +18,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented. Hide the Address bar drop-down list and disable the _Show search and site suggestions as I type_ toggle in Settings. |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured **(default)** |1 |1 |Allowed. Show the Address bar drop-down list and make it available. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|-----------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented. Hide the Address bar drop-down list and disable the *Show search and site suggestions as I type* toggle in Settings. | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured **(default)** | 1 | 1 | Allowed. Show the Address bar drop-down list and make it available. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-adobe-flash-include.md b/browsers/edge/includes/allow-adobe-flash-include.md index 4ba4f118cc..6747a07952 100644 --- a/browsers/edge/includes/allow-adobe-flash-include.md +++ b/browsers/edge/includes/allow-adobe-flash-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled |0 |0 |Prevented | -|Enabled **(default)** |1 |1 |Allowed | +| Group Policy | MDM | Registry | Description | +|-----------------------|:---:|:--------:|-------------| +| Disabled | 0 | 0 | Prevented | +| Enabled **(default)** | 1 | 1 | Allowed | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-clearing-browsing-data-include.md b/browsers/edge/includes/allow-clearing-browsing-data-include.md index dd501d8938..5c3ce25d1e 100644 --- a/browsers/edge/includes/allow-clearing-browsing-data-include.md +++ b/browsers/edge/includes/allow-clearing-browsing-data-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured **(default)** |0 |0 |Prevented. Users can configure the _Clear browsing data_ option in Settings. | | -|Enabled |1 |1 |Allowed. Clear the browsing data upon exit automatically. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|------------------------------------------|:---:|:--------:|------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured **(default)** | 0 | 0 | Prevented. Users can configure the *Clear browsing data* option in Settings. | | +| Enabled | 1 | 1 | Allowed. Clear the browsing data upon exit automatically. | ![Most restricted value](../images/check-gn.png) | + --- diff --git a/browsers/edge/includes/allow-config-updates-books-include.md b/browsers/edge/includes/allow-config-updates-books-include.md index 536b7cd59d..345cc3f9b9 100644 --- a/browsers/edge/includes/allow-config-updates-books-include.md +++ b/browsers/edge/includes/allow-config-updates-books-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented. |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed. Microsoft Edge updates the configuration data for the Books Library automatically. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented. | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed. Microsoft Edge updates the configuration data for the Books Library automatically. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-cortana-include.md b/browsers/edge/includes/allow-cortana-include.md index 6cd445255d..afd31cd7e8 100644 --- a/browsers/edge/includes/allow-cortana-include.md +++ b/browsers/edge/includes/allow-cortana-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented. Users can still search to find items on their device. |![Most restricted value](../images/check-gn.png) | -|Enabled
**(default)** |1 |1 |Allowed. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------|:---:|:--------:|------------------------------------------------------------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented. Users can still search to find items on their device. | ![Most restricted value](../images/check-gn.png) | +| Enabled
**(default)** | 1 | 1 | Allowed. | | + --- ### ADMX info and settings @@ -35,7 +36,7 @@ ms:topic: include - **Supported devices:** Mobile - **URI full path:** ./Vendor/MSFT/Policy/Config/Experience/AllowCortana - **Data type:** Integer - + #### Registry settings - **Path:** HKLM\Software\Policies\Microsoft\Windows\Windows Search - **Value name:** AllowCortana diff --git a/browsers/edge/includes/allow-dev-tools-include.md b/browsers/edge/includes/allow-dev-tools-include.md index f3b1aa0082..be5ef149fb 100644 --- a/browsers/edge/includes/allow-dev-tools-include.md +++ b/browsers/edge/includes/allow-dev-tools-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Allowed | | + --- @@ -35,12 +36,12 @@ ms:topic: include #### MDM settings - **MDM name:** Browser/[AllowDeveloperTools](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowdevelopertools) - **Supported devices:** Desktop -- **URI full Path:** ./Vendor/MSFT/Policy/Config/Browser/AllowDeveloperTools +- **URI full Path:** ./Vendor/MSFT/Policy/Config/Browser/AllowDeveloperTools - **Data type:** Integer #### Registry settings - **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\F12 -- **Value name:** AllowDeveloperTools +- **Value name:** AllowDeveloperTools - **Value type:** REG_DWORD


diff --git a/browsers/edge/includes/allow-enable-book-library-include.md b/browsers/edge/includes/allow-enable-book-library-include.md index 5ca32757c9..71fb486b11 100644 --- a/browsers/edge/includes/allow-enable-book-library-include.md +++ b/browsers/edge/includes/allow-enable-book-library-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Show the Books Library only in countries or regions where supported. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Show the Books Library, regardless of the device’s country or region. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Show the Books Library only in countries or regions where supported. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Show the Books Library, regardless of the device’s country or region. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md index 437f65b18f..2af0ce9447 100644 --- a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md +++ b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Gather and send only basic diagnostic data. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Gather all diagnostic data. For this policy to work correctly, you must set the diagnostic data in _Settings > Diagnostics & feedback_ to **Full**. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Gather and send only basic diagnostic data. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Gather all diagnostic data. For this policy to work correctly, you must set the diagnostic data in *Settings > Diagnostics & feedback* to **Full**. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-extensions-include.md b/browsers/edge/includes/allow-extensions-include.md index 3d12e5f90c..88e44401f9 100644 --- a/browsers/edge/includes/allow-extensions-include.md +++ b/browsers/edge/includes/allow-extensions-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled |0 |0 |Prevented | -|Enabled or not configured
**(default)** |1 |1 |Allowed | +| Group Policy | MDM | Registry | Description | +|--------------------------------------------|:---:|:--------:|-------------| +| Disabled | 0 | 0 | Prevented | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-full-screen-include.md b/browsers/edge/includes/allow-full-screen-include.md index 8ff63f3232..1554d6cbd9 100644 --- a/browsers/edge/includes/allow-full-screen-include.md +++ b/browsers/edge/includes/allow-full-screen-include.md @@ -18,10 +18,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-inprivate-browsing-include.md b/browsers/edge/includes/allow-inprivate-browsing-include.md index 9fe4fb4177..b7789c77a2 100644 --- a/browsers/edge/includes/allow-inprivate-browsing-include.md +++ b/browsers/edge/includes/allow-inprivate-browsing-include.md @@ -18,10 +18,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md index 9e965f5074..acefcbd014 100644 --- a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md +++ b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-prelaunch-include.md b/browsers/edge/includes/allow-prelaunch-include.md index 4e24776b6f..3762725027 100644 --- a/browsers/edge/includes/allow-prelaunch-include.md +++ b/browsers/edge/includes/allow-prelaunch-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restrictive value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:-------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restrictive value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- diff --git a/browsers/edge/includes/allow-printing-include.md b/browsers/edge/includes/allow-printing-include.md index 0e0e7dafa6..2a1743d2e2 100644 --- a/browsers/edge/includes/allow-printing-include.md +++ b/browsers/edge/includes/allow-printing-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restrictive value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:-------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restrictive value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-saving-history-include.md b/browsers/edge/includes/allow-saving-history-include.md index 60b91e3ff4..46d3314710 100644 --- a/browsers/edge/includes/allow-saving-history-include.md +++ b/browsers/edge/includes/allow-saving-history-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-search-engine-customization-include.md b/browsers/edge/includes/allow-search-engine-customization-include.md index d35e08c39e..05eed1a7ca 100644 --- a/browsers/edge/includes/allow-search-engine-customization-include.md +++ b/browsers/edge/includes/allow-search-engine-customization-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-shared-folder-books-include.md b/browsers/edge/includes/allow-shared-folder-books-include.md index 05b6d2c669..d1db5f5f93 100644 --- a/browsers/edge/includes/allow-shared-folder-books-include.md +++ b/browsers/edge/includes/allow-shared-folder-books-include.md @@ -17,10 +17,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Prevented. Microsoft Edge downloads book files to a per-user folder for each user. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Allowed. Microsoft Edge downloads book files to a shared folder. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy, which you can find:

**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**

Also, the users must be signed in with a school or work account.| | + +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Prevented. Microsoft Edge downloads book files to a per-user folder for each user. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Allowed. Microsoft Edge downloads book files to a shared folder. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy, which you can find:

**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**

Also, the users must be signed in with a school or work account. | | + --- ![Allow a shared books folder](../images/allow-shared-books-folder_sm.png) diff --git a/browsers/edge/includes/allow-sideloading-extensions-include.md b/browsers/edge/includes/allow-sideloading-extensions-include.md index 955f16982a..bb8637ba79 100644 --- a/browsers/edge/includes/allow-sideloading-extensions-include.md +++ b/browsers/edge/includes/allow-sideloading-extensions-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured |0 |0 |Prevented. Disabling does not prevent sideloading of extensions using Add-AppxPackage via PowerShell. To prevent this, you must enable the **Allows development of Windows Store apps and installing them from an integrated development environment (IDE)** group policy, which you can find:

**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**

For the MDM setting, set the **ApplicationManagement/AllowDeveloperUnlock** policy to 1 (enabled). |![Most restricted value](../images/check-gn.png) | -|Enabled
**(default)** |1 |1 |Allowed. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|----------------------------|:---:|:--------:|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured | 0 | 0 | Prevented. Disabling does not prevent sideloading of extensions using Add-AppxPackage via PowerShell. To prevent this, you must enable the **Allows development of Windows Store apps and installing them from an integrated development environment (IDE)** group policy, which you can find:

**Computer Configuration\\Administrative Templates\\Windows Components\\App Package Deployment\\**

For the MDM setting, set the **ApplicationManagement/AllowDeveloperUnlock** policy to 1 (enabled). | ![Most restricted value](../images/check-gn.png) | +| Enabled
**(default)** | 1 | 1 | Allowed. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-tab-preloading-include.md b/browsers/edge/includes/allow-tab-preloading-include.md index c9e8f9e4f0..c691d20211 100644 --- a/browsers/edge/includes/allow-tab-preloading-include.md +++ b/browsers/edge/includes/allow-tab-preloading-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Prevented. |![Most restricted value](../images/check-gn.png) | -|Enabled or not configured
**(default)** |1 |1 |Allowed. Preload Start and New Tab pages. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|-------------------------------------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Prevented. | ![Most restricted value](../images/check-gn.png) | +| Enabled or not configured
**(default)** | 1 | 1 | Allowed. Preload Start and New Tab pages. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-web-content-new-tab-page-include.md b/browsers/edge/includes/allow-web-content-new-tab-page-include.md index 335c4f9fdb..ac9e26abee 100644 --- a/browsers/edge/includes/allow-web-content-new-tab-page-include.md +++ b/browsers/edge/includes/allow-web-content-new-tab-page-include.md @@ -18,10 +18,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled |0 |0 |Load a blank page instead of the default New Tab page and prevent users from making changes. | -|Enabled or not configured **(default)** |1 |1 |Load the default New Tab page and the users make changes. | +| Group Policy | MDM | Registry | Description | +|-----------------------------------------|:---:|:--------:|----------------------------------------------------------------------------------------------| +| Disabled | 0 | 0 | Load a blank page instead of the default New Tab page and prevent users from making changes. | +| Enabled or not configured **(default)** | 1 | 1 | Load the default New Tab page and the users make changes. | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/always-enable-book-library-include.md b/browsers/edge/includes/always-enable-book-library-include.md index 452ba46a6c..b248006ae5 100644 --- a/browsers/edge/includes/always-enable-book-library-include.md +++ b/browsers/edge/includes/always-enable-book-library-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Show the Books Library only in countries or regions where supported. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Show the Books Library, regardless of the device’s country or region. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Show the Books Library only in countries or regions where supported. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Show the Books Library, regardless of the device’s country or region. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-additional-search-engines-include.md b/browsers/edge/includes/configure-additional-search-engines-include.md index d7361434c1..42bd2950bd 100644 --- a/browsers/edge/includes/configure-additional-search-engines-include.md +++ b/browsers/edge/includes/configure-additional-search-engines-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Prevented. Use the search engine specified in App settings.

If you enabled this policy and now want to disable it, all previously configured search engines get removed. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Allowed. Add up to five additional search engines and set any one of them as the default.

For each search engine added you must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Prevented. Use the search engine specified in App settings.

If you enabled this policy and now want to disable it, all previously configured search engines get removed. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Allowed. Add up to five additional search engines and set any one of them as the default.

For each search engine added you must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md index 38af855aea..4b312f4e12 100644 --- a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md +++ b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled |0 |0 |Load and run Adobe Flash content automatically. | | -|Enabled or not configured
**(default)** |1 |1 |Do not load or run Adobe Flash content and require action from the user. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled | 0 | 0 | Load and run Adobe Flash content automatically. | | +| Enabled or not configured
**(default)** | 1 | 1 | Do not load or run Adobe Flash content and require action from the user. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-autofill-include.md b/browsers/edge/includes/configure-autofill-include.md index 63e3cfe42b..463319afbe 100644 --- a/browsers/edge/includes/configure-autofill-include.md +++ b/browsers/edge/includes/configure-autofill-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured
**(default)** | Blank |Blank |Users can choose to use Autofill. | | -|Disabled | 0 | no | Prevented. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |yes | Allowed. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------|:-----:|:--------:|-----------------------------------|:------------------------------------------------:| +| Not configured
**(default)** | Blank | Blank | Users can choose to use Autofill. | | +| Disabled | 0 | no | Prevented. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | yes | Allowed. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md index 765f774561..9b5202659a 100644 --- a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md +++ b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md @@ -15,24 +15,25 @@ ms:topic: include [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](../shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] ->[!IMPORTANT] ->For this policy to work, enable the **Allow Telemetry** group policy with the _Enhanced_ option and enable the **Configure the Commercial ID** group policy by providing the Commercial ID. -> ->You can find these policies in the following location of the Group Policy Editor: +> [!IMPORTANT] +> For this policy to work, enable the **Allow Telemetry** group policy with the _Enhanced_ option and enable the **Configure the Commercial ID** group policy by providing the Commercial ID. > ->**Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection and Preview Builds\\** ->

  • Allow Telemetry = Enabled and set to _Enhanced_
  • Configure the Commercial ID = String of the Commercial ID
  • Configure collection of browsing data for Microsoft 365 Analytics = _Enabled_
+> You can find these policies in the following location of the Group Policy Editor: +> +> **Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection and Preview Builds\\** +>
  • Allow Telemetry = Enabled and set to Enhanced
  • Configure the Commercial ID = String of the Commercial ID
  • Configure collection of browsing data for Microsoft 365 Analytics = Enabled
### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |No data collected or sent |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Send intranet history only | | -|Enabled |2 |2 |Send Internet history only | | -|Enabled |3 |3 |Send both intranet and Internet history | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | No data collected or sent | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Send intranet history only | | +| Enabled | 2 | 2 | Send Internet history only | | +| Enabled | 3 | 3 | Send both intranet and Internet history | | + --- diff --git a/browsers/edge/includes/configure-cookies-include.md b/browsers/edge/includes/configure-cookies-include.md index 1b8c916461..a4b9740cfc 100644 --- a/browsers/edge/includes/configure-cookies-include.md +++ b/browsers/edge/includes/configure-cookies-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Enabled |0 |0 |Block all cookies from all sites. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Block only coddies from third party websites. | | -|Disabled or not configured
**(default)** |2 |2 |Allow all cookies from all sites. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------|:------------------------------------------------:| +| Enabled | 0 | 0 | Block all cookies from all sites. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Block only coddies from third party websites. | | +| Disabled or not configured
**(default)** | 2 | 2 | Allow all cookies from all sites. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-do-not-track-include.md b/browsers/edge/includes/configure-do-not-track-include.md index d13f5ae1c6..0270133a94 100644 --- a/browsers/edge/includes/configure-do-not-track-include.md +++ b/browsers/edge/includes/configure-do-not-track-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured
**(default)** |Blank |Blank |Do not send tracking information but let users choose to send tracking information to sites they visit. | | -|Disabled |0 |0 |Never send tracking information. | | -|Enabled |1 |1 |Send tracking information. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------|:-----:|:--------:|---------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Not configured
**(default)** | Blank | Blank | Do not send tracking information but let users choose to send tracking information to sites they visit. | | +| Disabled | 0 | 0 | Never send tracking information. | | +| Enabled | 1 | 1 | Send tracking information. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md index 4ac2d35ec2..bb5cb307bb 100644 --- a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md +++ b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md @@ -39,7 +39,7 @@ You must set the Configure kiosk mode policy to enabled (1 - InPrivate public br #### Registry settings - **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode -- **Value name:**ConfigureKioskResetAfterIdleTimeout +- Value name:ConfigureKioskResetAfterIdleTimeout - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-enterprise-mode-site-list-include.md b/browsers/edge/includes/configure-enterprise-mode-site-list-include.md index aeb849adf4..65c68c67e1 100644 --- a/browsers/edge/includes/configure-enterprise-mode-site-list-include.md +++ b/browsers/edge/includes/configure-enterprise-mode-site-list-include.md @@ -9,10 +9,11 @@ ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |0 |0 |Turned off. Microsoft Edge does not check the Enterprise Mode Site List, and in this case, users might experience problems while using legacy apps. | -|Enabled |1 |1 |Turned on. Microsoft Edge checks the Enterprise Mode Site List if configured. If an XML file exists in the cache container, IE11 waits 65 seconds and then checks the local cache for a new version from the server. If the server has a different version, Microsoft Edge uses the server file and stores it in the cache container. If you already use a site list, Enterprise Mode continues to work during the 65 seconds, but uses the existing file. To add the location to your site list, enter it in the **{URI}** box.

For details on how to configure the Enterprise Mode Site List, see [Interoperability and enterprise guidance](../group-policies/interoperability-enterprise-guidance-gp.md). | +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Disabled or not configured
**(default)** | 0 | 0 | Turned off. Microsoft Edge does not check the Enterprise Mode Site List, and in this case, users might experience problems while using legacy apps. | +| Enabled | 1 | 1 | Turned on. Microsoft Edge checks the Enterprise Mode Site List if configured. If an XML file exists in the cache container, IE11 waits 65 seconds and then checks the local cache for a new version from the server. If the server has a different version, Microsoft Edge uses the server file and stores it in the cache container. If you already use a site list, Enterprise Mode continues to work during the 65 seconds, but uses the existing file. To add the location to your site list, enter it in the **{URI}** box.

For details on how to configure the Enterprise Mode Site List, see [Interoperability and enterprise guidance](../group-policies/interoperability-enterprise-guidance-gp.md). | + --- ### ADMX info and settings @@ -29,7 +30,7 @@ - **Supported devices:** Desktop and Mobile - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/EnterpriseModeSiteList - **Data type:** String - + #### Registry settings - **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main\EnterpriseMode - **Value name:** SiteList diff --git a/browsers/edge/includes/configure-home-button-include.md b/browsers/edge/includes/configure-home-button-include.md index cb98dc3b03..9796369a9f 100644 --- a/browsers/edge/includes/configure-home-button-include.md +++ b/browsers/edge/includes/configure-home-button-include.md @@ -18,12 +18,13 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |0 |0 |Load the Start page. | -|Enabled |1 |1 |Load the New Tab page. | -|Enabled |2 |2 |Load the custom URL defined in the Set Home Button URL policy. | -|Enabled |3 |3 |Hide the home button. | +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:---:|:--------:|----------------------------------------------------------------| +| Disabled or not configured
**(default)** | 0 | 0 | Load the Start page. | +| Enabled | 1 | 1 | Load the New Tab page. | +| Enabled | 2 | 2 | Load the custom URL defined in the Set Home Button URL policy. | +| Enabled | 3 | 3 | Hide the home button. | + --- @@ -53,7 +54,7 @@ ms:topic: include ### Related policies - [Set Home Button URL](../available-policies.md#set-home-button-url): [!INCLUDE [set-home-button-url-shortdesc](../shortdesc/set-home-button-url-shortdesc.md)] - + - [Unlock Home Button](../available-policies.md#unlock-home-button): [!INCLUDE [unlock-home-button-shortdesc](../shortdesc/unlock-home-button-shortdesc.md)] diff --git a/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md b/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md index 7a6b1bcf78..cfbcfccd50 100644 --- a/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md +++ b/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md @@ -8,8 +8,10 @@ ms.prod: edge ms:topic: include --- -| | | -|---|---| -| **Single-app**

![thumbnail](../images/Picture1-sm.png)

**Digital/interactive signage**

Displays a specific site in full-screen mode, running Microsoft Edge InPrivate protecting user data.

  • **Digital signage** does not require user interaction.

    _**Example.**_ Use digital signage for things like a rotating advertisement or menu.

  • **Interactive signage**, on the other hand, requires user interaction within the page but doesn’t allow for any other uses, such as browsing the internet.

    _**Example.**_ Use interactive signage for things like a building business directory or restaurant order/pay station.

**Policy setting** = Not configured (0 default)

|

 

![thumbnail](../images/Picture2-sm.png)

**Public browsing**

Runs a limited multi-tab version of Microsoft Edge, protecting user data. Microsoft Edge is the only app users can use on the device, preventing them from customizing Microsoft Edge. Users can only browse publically or end their browsing session.

The single-app public browsing mode is the only kiosk mode that has an **End session** button. Microsoft Edge also resets the session after a specified time of user inactivity. Both restart Microsoft Edge and clear the user’s session.

_**Example.**_ A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.

**Policy setting** = Enabled (1) | -| **Multi-app**

![thumbnail](../images/Picture5-sm.png)

**Normal browsing**

Runs a full-version of Microsoft Edge with all browsing features and preserves the user data and state between sessions.

Some features may not work depending on what other apps you have configured in assigned access. For example, installing extensions or books from the Microsoft store are not allowed if the store is not available. Also, if Internet Explorer 11 is set up in assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.

**Policy setting** = Not configured (0 default) |

 

![thumbnail](../images/Picture6-sm.png)

**Public browsing**

Runs a multi-tab version of Microsoft Edge InPrivate with a tailored experience for kiosks that runs in full-screen mode. Users can open and close Microsoft Edge and launch other apps if allowed by assigned access. Instead of an End session button to clear their browsing session, the user closes Microsoft Edge normally.

In this configuration, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.

_**Example.**_ A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.

**Policy setting** = Enabled (1) | + +| | | +|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| **Single-app**

![thumbnail](../images/Picture1-sm.png)

**Digital/interactive signage**

Displays a specific site in full-screen mode, running Microsoft Edge InPrivate protecting user data.

  • **Digital signage** does not require user interaction.

    ***Example.*** Use digital signage for things like a rotating advertisement or menu.

  • **Interactive signage**, on the other hand, requires user interaction within the page but doesn’t allow for any other uses, such as browsing the internet.

    ***Example.*** Use interactive signage for things like a building business directory or restaurant order/pay station.

**Policy setting** = Not configured (0 default)

|

 

![thumbnail](../images/Picture2-sm.png)

Public browsing

Runs a limited multi-tab version of Microsoft Edge, protecting user data. Microsoft Edge is the only app users can use on the device, preventing them from customizing Microsoft Edge. Users can only browse publically or end their browsing session.

The single-app public browsing mode is the only kiosk mode that has an End session button. Microsoft Edge also resets the session after a specified time of user inactivity. Both restart Microsoft Edge and clear the user’s session.

Example. A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.

Policy setting = Enabled (1) | +| **Multi-app**

![thumbnail](../images/Picture5-sm.png)

**Normal browsing**

Runs a full-version of Microsoft Edge with all browsing features and preserves the user data and state between sessions.

Some features may not work depending on what other apps you have configured in assigned access. For example, installing extensions or books from the Microsoft store are not allowed if the store is not available. Also, if Internet Explorer 11 is set up in assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.

**Policy setting** = Not configured (0 default) |

 

![thumbnail](../images/Picture6-sm.png)

Public browsing

Runs a multi-tab version of Microsoft Edge InPrivate with a tailored experience for kiosks that runs in full-screen mode. Users can open and close Microsoft Edge and launch other apps if allowed by assigned access. Instead of an End session button to clear their browsing session, the user closes Microsoft Edge normally.

In this configuration, Microsoft Edge can interact with other applications. For example, if Internet Explorer 11 is set up in multi-app assigned access, you can enable [EnterpriseModeSiteList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisemodesitelist) to automatically switch users to Internet Explorer 11 for sites that need backward compatibility support.

Example. A public library or hotel concierge desk are two examples of public browsing that provides access to Microsoft Edge and other apps.

Policy setting = Enabled (1) | + --- diff --git a/browsers/edge/includes/configure-open-edge-with-include.md b/browsers/edge/includes/configure-open-edge-with-include.md index 85b00f84eb..966a8be23e 100644 --- a/browsers/edge/includes/configure-open-edge-with-include.md +++ b/browsers/edge/includes/configure-open-edge-with-include.md @@ -21,13 +21,14 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Not configured |Blank |Blank |If you don't configure this policy and you enable the Disable Lockdown of Start Pages policy, users can change or customize the Start page. | -|Enabled |0 |0 |Load the Start page. | -|Enabled |1 |1 |Load the New Tab page. | -|Enabled |2 |2 |Load the previous pages. | -|Enabled
**(default)** |3 |3 |Load a specific page or pages. | +| Group Policy | MDM | Registry | Description | +|--------------------------|:-----:|:--------:|---------------------------------------------------------------------------------------------------------------------------------------------| +| Not configured | Blank | Blank | If you don't configure this policy and you enable the Disable Lockdown of Start Pages policy, users can change or customize the Start page. | +| Enabled | 0 | 0 | Load the Start page. | +| Enabled | 1 | 1 | Load the New Tab page. | +| Enabled | 2 | 2 | Load the previous pages. | +| Enabled
**(default)** | 3 | 3 | Load a specific page or pages. | + --- diff --git a/browsers/edge/includes/configure-password-manager-include.md b/browsers/edge/includes/configure-password-manager-include.md index 833c1be142..ab0e78ca5b 100644 --- a/browsers/edge/includes/configure-password-manager-include.md +++ b/browsers/edge/includes/configure-password-manager-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured |Blank |Blank |Users can choose to save and manage passwords locally. | | -|Disabled |0 |no |Not allowed. |![Most restricted value](../images/check-gn.png) | -|Enabled
**(default)** |1 |yes |Allowed. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|--------------------------|:-----:|:--------:|--------------------------------------------------------|:------------------------------------------------:| +| Not configured | Blank | Blank | Users can choose to save and manage passwords locally. | | +| Disabled | 0 | no | Not allowed. | ![Most restricted value](../images/check-gn.png) | +| Enabled
**(default)** | 1 | yes | Allowed. | | + --- Verify not allowed/disabled settings: diff --git a/browsers/edge/includes/configure-pop-up-blocker-include.md b/browsers/edge/includes/configure-pop-up-blocker-include.md index 8b68bb7b70..5355cbae5f 100644 --- a/browsers/edge/includes/configure-pop-up-blocker-include.md +++ b/browsers/edge/includes/configure-pop-up-blocker-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured |Blank |Blank |Users can choose to use Pop-up Blocker. | | -|Disabled
**(default)** |0 |0 |Turned off. Allow pop-up windows to open. | | -|Enabled |1 |1 |Turned on. Prevent pop-up windows from opening. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------|:-----:|:--------:|-------------------------------------------------|:------------------------------------------------:| +| Not configured | Blank | Blank | Users can choose to use Pop-up Blocker. | | +| Disabled
**(default)** | 0 | 0 | Turned off. Allow pop-up windows to open. | | +| Enabled | 1 | 1 | Turned on. Prevent pop-up windows from opening. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md index 37c141db0a..f12debc9ab 100644 --- a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md +++ b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured
**(default)** |Blank |Blank |Users can choose to see search suggestions. | | -|Disabled |0 |0 |Prevented. Hide the search suggestions. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Allowed. Show the search suggestions. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------|:-----:|:--------:|---------------------------------------------|:------------------------------------------------:| +| Not configured
**(default)** | Blank | Blank | Users can choose to see search suggestions. | | +| Disabled | 0 | 0 | Prevented. Hide the search suggestions. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Allowed. Show the search suggestions. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-start-pages-include.md b/browsers/edge/includes/configure-start-pages-include.md index 5708f60d6a..04b7eeddd9 100644 --- a/browsers/edge/includes/configure-start-pages-include.md +++ b/browsers/edge/includes/configure-start-pages-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Not configured |Blank |Blank |Load the pages specified in App settings as the default Start pages. | -|Enabled |String |String |Enter the URLs of the pages you want to load as the Start pages, separating each page using angle brackets:

    \\

**Version 1703 or later:**
If you do not want to send traffic to Microsoft, use the \ value, which honors both domain and non-domain-joined devices when it's the only configured URL.

**Version 1809:**
When you enable the Configure Open Microsoft Edge With policy with any option selected, and you enable the Configure Start Pages policy, the Configure Open Microsoft Edge With policy takes precedence, ignoring the Configure Start Pages policy. | +| Group Policy | MDM | Registry | Description | +|----------------|:------:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Not configured | Blank | Blank | Load the pages specified in App settings as the default Start pages. | +| Enabled | String | String | Enter the URLs of the pages you want to load as the Start pages, separating each page using angle brackets:

    \\

**Version 1703 or later:**
If you do not want to send traffic to Microsoft, use the \ value, which honors both domain and non-domain-joined devices when it's the only configured URL.

**Version 1809:**
When you enable the Configure Open Microsoft Edge With policy with any option selected, and you enable the Configure Start Pages policy, the Configure Open Microsoft Edge With policy takes precedence, ignoring the Configure Start Pages policy. | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/configure-windows-defender-smartscreen-include.md b/browsers/edge/includes/configure-windows-defender-smartscreen-include.md index 7874743f5c..fcc95b0d57 100644 --- a/browsers/edge/includes/configure-windows-defender-smartscreen-include.md +++ b/browsers/edge/includes/configure-windows-defender-smartscreen-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured |Blank |Blank |Users can choose to use Windows Defender SmartScreen. | | -|Disabled |0 |0 |Turned off. Do not protect users from potential threats and prevent users from turning it on. | | -|Enabled |1 |1 |Turned on. Protect users from potential threats and prevent users from turning it off. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|----------------|:-----:|:--------:|-----------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Not configured | Blank | Blank | Users can choose to use Windows Defender SmartScreen. | | +| Disabled | 0 | 0 | Turned off. Do not protect users from potential threats and prevent users from turning it on. | | +| Enabled | 1 | 1 | Turned on. Protect users from potential threats and prevent users from turning it off. | ![Most restricted value](../images/check-gn.png) | + --- To verify Windows Defender SmartScreen is turned off (disabled): diff --git a/browsers/edge/includes/disable-lockdown-of-start-pages-include.md b/browsers/edge/includes/disable-lockdown-of-start-pages-include.md index 817a291655..e240862638 100644 --- a/browsers/edge/includes/disable-lockdown-of-start-pages-include.md +++ b/browsers/edge/includes/disable-lockdown-of-start-pages-include.md @@ -13,13 +13,14 @@ ms:topic: include >*Default setting: Enabled (Start pages are not editable)* [!INCLUDE [disable-lockdown-of-start-pages-shortdesc](../shortdesc/disable-lockdown-of-start-pages-shortdesc.md)] - + ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured |0 |0 |Locked. Start pages configured in either the Configure Open Microsoft Edge With policy and Configure Start Pages policy are not editable. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Unlocked. Users can make changes to all configured start pages.

When you enable this policy and define a set of URLs in the Configure Start Pages policy, Microsoft Edge uses the URLs defined in the Configure Open Microsoft Edge With policy. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|----------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Not configured | 0 | 0 | Locked. Start pages configured in either the Configure Open Microsoft Edge With policy and Configure Start Pages policy are not editable. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Unlocked. Users can make changes to all configured start pages.

When you enable this policy and define a set of URLs in the Configure Start Pages policy, Microsoft Edge uses the URLs defined in the Configure Open Microsoft Edge With policy. | | + --- diff --git a/browsers/edge/includes/do-not-sync-browser-settings-include.md b/browsers/edge/includes/do-not-sync-browser-settings-include.md index f97e8b0c13..2ec6bea84d 100644 --- a/browsers/edge/includes/do-not-sync-browser-settings-include.md +++ b/browsers/edge/includes/do-not-sync-browser-settings-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |0 |0 |Allowed/turned on. The “browser” group syncs automatically between user’s devices and lets users to make changes. | -|Enabled |2 |2 |Prevented/turned off. The “browser” group does not use the _Sync your Settings_ option. | +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:---:|:--------:|-------------------------------------------------------------------------------------------------------------------| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/turned on. The “browser” group syncs automatically between user’s devices and lets users to make changes. | +| Enabled | 2 | 2 | Prevented/turned off. The “browser” group does not use the *Sync your Settings* option. | + --- diff --git a/browsers/edge/includes/do-not-sync-include.md b/browsers/edge/includes/do-not-sync-include.md index 7d9388b660..96aa814d4b 100644 --- a/browsers/edge/includes/do-not-sync-include.md +++ b/browsers/edge/includes/do-not-sync-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed/turned on. Users can choose what to sync to their device. | | -|Enabled |2 |2 |Prevented/turned off. Disables the _Sync your Settings_ toggle and prevents syncing. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/turned on. Users can choose what to sync to their device. | | +| Enabled | 2 | 2 | Prevented/turned off. Disables the *Sync your Settings* toggle and prevents syncing. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/keep-fav-sync-ie-edge-include.md b/browsers/edge/includes/keep-fav-sync-ie-edge-include.md index 7de128d758..7e9bb90bc1 100644 --- a/browsers/edge/includes/keep-fav-sync-ie-edge-include.md +++ b/browsers/edge/includes/keep-fav-sync-ie-edge-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Turned off/not syncing | | -|Enabled |1 |1 |Turned on/syncing |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Turned off/not syncing | | +| Enabled | 1 | 1 | Turned on/syncing | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-access-about-flag-include.md b/browsers/edge/includes/prevent-access-about-flag-include.md index 595c2cc771..d6ca2253e6 100644 --- a/browsers/edge/includes/prevent-access-about-flag-include.md +++ b/browsers/edge/includes/prevent-access-about-flag-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed | | -|Enabled |1 |1 |Prevented |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed | | +| Enabled | 1 | 1 | Prevented | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md b/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md index 47cd4f63ad..a16217ae07 100644 --- a/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md +++ b/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed/turned off. Users can ignore the warning and continue to download the unverified file(s). | | -|Enabled |1 |1 |Prevented/turned on. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to download the unverified file(s). | | +| Enabled | 1 | 1 | Prevented/turned on. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md b/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md index 0d8461017b..beca20210f 100644 --- a/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md +++ b/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed/turned off. Users can ignore the warning and continue to the site.| | -|Enabled |1 |1 |Prevented/turned on. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|----------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to the site. | | +| Enabled | 1 | 1 | Prevented/turned on. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-certificate-error-overrides-include.md b/browsers/edge/includes/prevent-certificate-error-overrides-include.md index 0a36924b36..a0a47406eb 100644 --- a/browsers/edge/includes/prevent-certificate-error-overrides-include.md +++ b/browsers/edge/includes/prevent-certificate-error-overrides-include.md @@ -15,10 +15,11 @@ ms:topic: include [!INCLUDE [prevent-certificate-error-overrides-shortdesc](../shortdesc/prevent-certificate-error-overrides-shortdesc.md)] -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed/turned on. Override the security warning to sites that have SSL errors. | | -|Enabled |1 |1 |Prevented/turned on. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|---------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/turned on. Override the security warning to sites that have SSL errors. | | +| Enabled | 1 | 1 | Prevented/turned on. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-changes-to-favorites-include.md b/browsers/edge/includes/prevent-changes-to-favorites-include.md index 4c2b951cc4..71476b4e98 100644 --- a/browsers/edge/includes/prevent-changes-to-favorites-include.md +++ b/browsers/edge/includes/prevent-changes-to-favorites-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed/unlocked. Users can add, import, and make changes to the Favorites list. | | -|Enabled |1 |1 |Prevented/locked down. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed/unlocked. Users can add, import, and make changes to the Favorites list. | | +| Enabled | 1 | 1 | Prevented/locked down. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-first-run-webpage-open-include.md b/browsers/edge/includes/prevent-first-run-webpage-open-include.md index 8cc0ad81cf..e28cd73fb5 100644 --- a/browsers/edge/includes/prevent-first-run-webpage-open-include.md +++ b/browsers/edge/includes/prevent-first-run-webpage-open-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed. Load the First Run webpage. | | -|Enabled |1 |1 |Prevented. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed. Load the First Run webpage. | | +| Enabled | 1 | 1 | Prevented. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings @@ -35,7 +36,7 @@ ms:topic: include - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventFirstRunPage - **Data type:** Integer -####Registry +#### Registry - **Path:** HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\Main - **Value name:** PreventFirstRunPage - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/prevent-live-tile-pinning-start-include.md b/browsers/edge/includes/prevent-live-tile-pinning-start-include.md index 60ec4453f1..36535b4ccc 100644 --- a/browsers/edge/includes/prevent-live-tile-pinning-start-include.md +++ b/browsers/edge/includes/prevent-live-tile-pinning-start-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Collect and send Live Tile metadata. | | -|Enabled |1 |1 |Do not collect data. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Collect and send Live Tile metadata. | | +| Enabled | 1 | 1 | Do not collect data. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md b/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md index c5cd71a6b5..8314edbe14 100644 --- a/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md +++ b/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |Allowed. Show localhost IP addresses. | | -|Enabled |1 |1 |Prevented. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|---------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | Allowed. Show localhost IP addresses. | | +| Enabled | 1 | 1 | Prevented. | ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md index 2fa95014b3..68042aad34 100644 --- a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md +++ b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md @@ -17,10 +17,11 @@ ms:topic: include ### Supported values -|Group Policy |Description | -|---|---| -|Disabled or not configured
**(default)** |Allowed. Users can uninstall extensions. If you previously enabled this policy and you decide to disable it, the list of extension PFNs defined in this policy get ignored. | -|Enabled |Provide a semi-colon delimited list of extension PFNs. For example, adding the following OneNote Web Clipper extension prevents users from turning it off:

_Microsoft.OneNoteWebClipper8wekyb3d8bbwe_

After defining the list of extensions, you deploy them through any available enterprise deployment channel, such as Microsoft Intune.

Removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. If you enable the [Allow Developer Tools](../group-policies/developer-settings-gp.md#allow-developer-tools) policy, then this policy does not prevent users from debugging and altering the logic on an extension. | +| Group Policy | Description | +|---------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Disabled or not configured
**(default)** | Allowed. Users can uninstall extensions. If you previously enabled this policy and you decide to disable it, the list of extension PFNs defined in this policy get ignored. | +| Enabled | Provide a semi-colon delimited list of extension PFNs. For example, adding the following OneNote Web Clipper and Office Online extension prevents users from turning it off:

*Microsoft.OneNoteWebClipper8wekyb3d8bbwe;Microsoft.OfficeOnline8wekyb3d8bbwe*

After defining the list of extensions, you deploy them through any available enterprise deployment channel, such as Microsoft Intune.

Removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. If you enable the [Allow Developer Tools](../group-policies/developer-settings-gp.md#allow-developer-tools) policy, then this policy does not prevent users from debugging and altering the logic on an extension. | + --- diff --git a/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md b/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md index 403d70ff30..3a06e77d5d 100644 --- a/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md +++ b/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md @@ -15,10 +15,12 @@ ms:topic: include [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](../shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled |0 |0 |Allowed/turned on. Users can sync the browser settings. | -|Enabled or not configured
**(default)** |1 |1 |Prevented/turned off. | + +| Group Policy | MDM | Registry | Description | +|--------------------------------------------|:---:|:--------:|---------------------------------------------------------| +| Disabled | 0 | 0 | Allowed/turned on. Users can sync the browser settings. | +| Enabled or not configured
**(default)** | 1 | 1 | Prevented/turned off. | + --- diff --git a/browsers/edge/includes/provision-favorites-include.md b/browsers/edge/includes/provision-favorites-include.md index 7e999d423d..33df41bb77 100644 --- a/browsers/edge/includes/provision-favorites-include.md +++ b/browsers/edge/includes/provision-favorites-include.md @@ -20,10 +20,11 @@ ms:topic: include ### Supported values -|Group Policy |Description |Most restricted | -|---|---|:---:| -|Disabled or not configured
**(default)** |Users can customize the favorites list, such as adding folders, or adding and removing favorites. | | -|Enabled |Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.

To define a default list of favorites, do the following:

  1. In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.
  2. Click **Import from another browser**, click **Export to file** and save the file.
  3. In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as:
    • HTTP location: "SiteList"=https://localhost:8080/URLs.html
    • Local network: "SiteList"="\network\shares\URLs.html"
    • Local file: "SiteList"=file:///c:/Users/Documents/URLs.html
|![Most restricted value](../images/check-gn.png) | +| Group Policy | Description | Most restricted | +|---------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | Users can customize the favorites list, such as adding folders, or adding and removing favorites. | | +| Enabled | Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.

To define a default list of favorites, do the following:

  1. In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.
  2. Click **Import from another browser**, click **Export to file** and save the file.
  3. In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as:
    • HTTP location: "SiteList"=
    • Local network: "SiteList"="\network\shares\URLs.html"
    • Local file: "SiteList"=file:///c:/Users/Documents/URLs.html
| ![Most restricted value](../images/check-gn.png) | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/send-all-intranet-sites-ie-include.md b/browsers/edge/includes/send-all-intranet-sites-ie-include.md index 22737a2490..7cc7123258 100644 --- a/browsers/edge/includes/send-all-intranet-sites-ie-include.md +++ b/browsers/edge/includes/send-all-intranet-sites-ie-include.md @@ -20,10 +20,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |All sites, including intranet sites, open in Microsoft Edge automatically. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Only intranet sites open in Internet Explorer 11 automatically.

Enabling this policy opens all intranet sites in IE11 automatically, even if the users have Microsoft Edge as their default browser.

  1. In Group Policy Editor, navigate to:

    **Computer Configuration\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file**

  2. Click **Enable** and then refresh the policy to view the affected sites in Microsoft Edge.

    A message opens stating that the page needs to open in IE. At the same time, the page opens in IE11 automatically; in a new frame if it is not yet running, or in a new tab.

| | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | All sites, including intranet sites, open in Microsoft Edge automatically. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Only intranet sites open in Internet Explorer 11 automatically.

Enabling this policy opens all intranet sites in IE11 automatically, even if the users have Microsoft Edge as their default browser.

  1. In Group Policy Editor, navigate to:

    **Computer Configuration\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file**

  2. Click **Enable** and then refresh the policy to view the affected sites in Microsoft Edge.

    A message opens stating that the page needs to open in IE. At the same time, the page opens in IE11 automatically; in a new frame if it is not yet running, or in a new tab.

| | + --- diff --git a/browsers/edge/includes/set-default-search-engine-include.md b/browsers/edge/includes/set-default-search-engine-include.md index a1bef8ac09..4a3ddd44fa 100644 --- a/browsers/edge/includes/set-default-search-engine-include.md +++ b/browsers/edge/includes/set-default-search-engine-include.md @@ -16,11 +16,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Not configured
**(default)** |Blank |Blank |Use the search engine specified in App settings. If you don't configure this policy and disable the [Allow search engine customization](../group-policies/search-engine-customization-gp.md#allow-search-engine-customization) policy, users cannot make changes. | | -|Disabled |0 |0 |Remove or don't use the policy-set search engine and use the search engine for the market, letting users make changes. | | -|Enabled |1 |1 |Use the policy-set search engine specified in the OpenSearch XML file, preventing users from making changes.

Specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://docs.microsoft.com/microsoft-edge/dev-guide/browser/search-provider-discovery). Use this format to specify the link you want to add.

If you want your users to use the default Microsoft Edge settings for each market, then set the string to **EDGEDEFAULT**.

If you would like your users to use Microsoft Bing as the default search engine, then set the string to **EDGEBING**. |![Most restricted value](../images/check-gn.png) | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------|:-----:|:--------:|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Not configured
**(default)** | Blank | Blank | Use the search engine specified in App settings. If you don't configure this policy and disable the [Allow search engine customization](../group-policies/search-engine-customization-gp.md#allow-search-engine-customization) policy, users cannot make changes. | | +| Disabled | 0 | 0 | Remove or don't use the policy-set search engine and use the search engine for the market, letting users make changes. | | +| Enabled | 1 | 1 | Use the policy-set search engine specified in the OpenSearch XML file, preventing users from making changes.

Specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://docs.microsoft.com/microsoft-edge/dev-guide/browser/search-provider-discovery). Use this format to specify the link you want to add.

If you want your users to use the default Microsoft Edge settings for each market, then set the string to **EDGEDEFAULT**.

If you would like your users to use Microsoft Bing as the default search engine, then set the string to **EDGEBING**. | ![Most restricted value](../images/check-gn.png) | + --- diff --git a/browsers/edge/includes/set-home-button-url-include.md b/browsers/edge/includes/set-home-button-url-include.md index 8e55ec69ab..355240ff1a 100644 --- a/browsers/edge/includes/set-home-button-url-include.md +++ b/browsers/edge/includes/set-home-button-url-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |Blank |Blank |Show the home button, load the Start pages, and lock down the home button to prevent users from changing what page loads. | -|Enabled - String |String |String |Enter a URL in string format, for example, https://www.msn.com.

For this policy to work, you must also enable the [Configure Home Button](../available-policies.md#configure-home-button) policy and select the _Show home button & set a specific page_ option. | +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:------:|:--------:|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Disabled or not configured
**(default)** | Blank | Blank | Show the home button, load the Start pages, and lock down the home button to prevent users from changing what page loads. | +| Enabled - String | String | String | Enter a URL in string format, for example, https://www.msn.com.

For this policy to work, you must also enable the [Configure Home Button](../available-policies.md#configure-home-button) policy and select the *Show home button & set a specific page* option. | + --- diff --git a/browsers/edge/includes/set-new-tab-url-include.md b/browsers/edge/includes/set-new-tab-url-include.md index 6f8b68e0b4..a53dd93220 100644 --- a/browsers/edge/includes/set-new-tab-url-include.md +++ b/browsers/edge/includes/set-new-tab-url-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |Blank |Blank |Load the default New Tab page. | -|Enabled - String |String |String |Enter a URL in string format, for example, https://www.msn.com.

Enabling this policy prevents users from making changes.

| +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:------:|:--------:|----------------------------------------------------------------------------------------------------------------------------------| +| Disabled or not configured
**(default)** | Blank | Blank | Load the default New Tab page. | +| Enabled - String | String | String | Enter a URL in string format, for example, https://www.msn.com.

Enabling this policy prevents users from making changes.

| + --- ### ADMX info and settings @@ -44,7 +45,7 @@ ms:topic: include ### Related policies [Allow web content on New Tab page](../available-policies.md#allow-web-content-on-new-tab-page): [!INCLUDE [allow-web-content-on-new-tab-page-shortdesc](../shortdesc/allow-web-content-on-new-tab-page-shortdesc.md)] - +


diff --git a/browsers/edge/includes/show-message-opening-sites-ie-include.md b/browsers/edge/includes/show-message-opening-sites-ie-include.md index 849b1e17a3..fe01511d36 100644 --- a/browsers/edge/includes/show-message-opening-sites-ie-include.md +++ b/browsers/edge/includes/show-message-opening-sites-ie-include.md @@ -19,11 +19,12 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description |Most restricted | -|---|:---:|:---:|---|:---:| -|Disabled or not configured
**(default)** |0 |0 |No additional message displays. |![Most restricted value](../images/check-gn.png) | -|Enabled |1 |1 |Show an additional message stating that a site has opened in IE11. | | -|Enabled |2 |2 |Show an additional message with a _Keep going in Microsoft Edge_ link to allow users to open the site in Microsoft Edge. | | +| Group Policy | MDM | Registry | Description | Most restricted | +|---------------------------------------------|:---:|:--------:|--------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------:| +| Disabled or not configured
**(default)** | 0 | 0 | No additional message displays. | ![Most restricted value](../images/check-gn.png) | +| Enabled | 1 | 1 | Show an additional message stating that a site has opened in IE11. | | +| Enabled | 2 | 2 | Show an additional message with a *Keep going in Microsoft Edge* link to allow users to open the site in Microsoft Edge. | | + --- ### ADMX info and settings diff --git a/browsers/edge/includes/unlock-home-button-include.md b/browsers/edge/includes/unlock-home-button-include.md index 812908d86f..bf30d5d9ed 100644 --- a/browsers/edge/includes/unlock-home-button-include.md +++ b/browsers/edge/includes/unlock-home-button-include.md @@ -16,10 +16,11 @@ ms:topic: include ### Supported values -|Group Policy |MDM |Registry |Description | -|---|:---:|:---:|---| -|Disabled or not configured
**(default)** |0 |0 |Locked, preventing users from making changes. | -|Enabled |1 |1 |Unlocked, letting users make changes. | +| Group Policy | MDM | Registry | Description | +|---------------------------------------------|:---:|:--------:|-----------------------------------------------| +| Disabled or not configured
**(default)** | 0 | 0 | Locked, preventing users from making changes. | +| Enabled | 1 | 1 | Unlocked, letting users make changes. | + --- ### ADMX info and settings @@ -43,7 +44,7 @@ ms:topic: include ### Related policies - [Configure Home Button](../available-policies.md#configure-home-button): [!INCLUDE [configure-home-button-shortdesc](../shortdesc/configure-home-button-shortdesc.md)] - + - [Set Home Button URL](../available-policies.md#set-home-button-url): [!INCLUDE [set-home-button-url-shortdesc](../shortdesc/set-home-button-url-shortdesc.md)] diff --git a/browsers/edge/microsoft-edge-forrester.md b/browsers/edge/microsoft-edge-forrester.md index 5b4dc702fb..a68908bb52 100644 --- a/browsers/edge/microsoft-edge-forrester.md +++ b/browsers/edge/microsoft-edge-forrester.md @@ -16,7 +16,7 @@ Forrester Research measures the return on investment (ROI) of Microsoft Edge in ## Forrester report video summary View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge: ->![VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE26zQm] +> ![VIDEO ] ## Forrester Study report diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md index b2442289ca..b1d69471cd 100644 --- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md +++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md @@ -234,21 +234,21 @@ Make sure to check with your provider for instructions. ## Feature comparison of kiosk mode and kiosk browser app In the following table, we show you the features available in both Microsoft Edge kiosk mode and Kiosk Browser app available in Microsoft Store. Both kiosk mode and kiosk browser app work in assigned access. -| **Feature** | **Microsoft Edge kiosk mode** | **Microsoft Kiosk browser app** | -|---------------|:----------------:|:---------------:| -| Print support | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | -| Multi-tab support | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | -| Allow/Block URL support | ![Supported](images/148767.png)

*\*For Microsoft Edge kiosk mode use* Windows Defender Firewall*. Microsoft kiosk browser has custom policy support.* | ![Supported](images/148767.png) | -| Configure Home Button | ![Supported](images/148767.png) | ![Supported](images/148767.png) | -| Set Start page(s) URL | ![Supported](images/148767.png) | ![Supported](images/148767.png)

*Same as Home button URL* | -| Set New Tab page URL | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | -| Favorites management | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | -| End session button | ![Supported](images/148767.png) | ![Supported](images/148767.png)

*In Microsoft Intune, you must create a custom URI to enable. Dedicated UI configuration introduced in version 1808.* | -| Reset on inactivity | ![Supported](images/148767.png) | ![Supported](images/148767.png) | -| Internet Explorer integration (Enterprise Mode site list) | ![Supported](images/148767.png)

*Multi-app mode only* | ![Not supported](images/148766.png) | -| Available in Microsoft Store | ![Not supported](images/148766.png) | ![Supported](images/148767.png) | -|SKU availability | Windows 10 October 2018 Update
Professional, Enterprise, and Education | Windows 10 April 2018 Update
Professional, Enterprise, and Education | +| **Feature** | **Microsoft Edge kiosk mode** | **Microsoft Kiosk browser app** | +|-----------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------:|:-------------------------------------------------------------------------------------------------------------------------------------------------------:| +| Print support | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | +| Multi-tab support | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | +| Allow/Block URL support | ![Supported](images/148767.png)

*\*For Microsoft Edge kiosk mode use* Windows Defender Firewall. Microsoft kiosk browser has custom policy support. | ![Supported](images/148767.png) | +| Configure Home Button | ![Supported](images/148767.png) | ![Supported](images/148767.png) | +| Set Start page(s) URL | ![Supported](images/148767.png) | ![Supported](images/148767.png)

*Same as Home button URL* | +| Set New Tab page URL | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | +| Favorites management | ![Supported](images/148767.png) | ![Not supported](images/148766.png) | +| End session button | ![Supported](images/148767.png) | ![Supported](images/148767.png)

*In Microsoft Intune, you must create a custom URI to enable. Dedicated UI configuration introduced in version 1808.* | +| Reset on inactivity | ![Supported](images/148767.png) | ![Supported](images/148767.png) | +| Internet Explorer integration (Enterprise Mode site list) | ![Supported](images/148767.png)

*Multi-app mode only* | ![Not supported](images/148766.png) | +| Available in Microsoft Store | ![Not supported](images/148766.png) | ![Supported](images/148767.png) | +| SKU availability | Windows 10 October 2018 Update
Professional, Enterprise, and Education | Windows 10 April 2018 Update
Professional, Enterprise, and Education | **\*Windows Defender Firewall**

To prevent access to unwanted websites on your kiosk device, use Windows Defender Firewall to configure a list of allowed websites, blocked websites or both. For more details, see [Windows Defender Firewall with Advanced Security Deployment](https://docs.microsoft.com/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide). diff --git a/browsers/internet-explorer/docfx.json b/browsers/internet-explorer/docfx.json index 4446936eb1..7590327773 100644 --- a/browsers/internet-explorer/docfx.json +++ b/browsers/internet-explorer/docfx.json @@ -1,41 +1,48 @@ { "build": { - "content": - [ - { - "files": ["**/*.md","**/*.yml"], - "exclude": ["**/obj/**"] - } - ], + "content": [ + { + "files": [ + "**/*.md", + "**/*.yml" + ], + "exclude": [ + "**/obj/**" + ] + } + ], "resource": [ - { - "files": ["**/images/**"], - "exclude": ["**/obj/**"] - } + { + "files": [ + "**/images/**" + ], + "exclude": [ + "**/obj/**" + ] + } ], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/internet-explorer/breadcrumb/toc.json", - "ROBOTS": "INDEX, FOLLOW", - "ms.author": "shortpatti", - "author": "eross-msft", - "ms.technology": "internet-explorer", - "ms.topic": "article", - "ms.date": "04/05/2017", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.internet-explorer", - "folder_relative_path_in_docset": "./" - } - } + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/internet-explorer/breadcrumb/toc.json", + "ROBOTS": "INDEX, FOLLOW", + "ms.author": "shortpatti", + "author": "eross-msft", + "ms.technology": "internet-explorer", + "ms.topic": "article", + "ms.date": "04/05/2017", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.internet-explorer", + "folder_relative_path_in_docset": "./" + } + } }, - "externalReference": [ - ], + "externalReference": [], "template": "op.html", "dest": "edges/internet-explorer", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md index e93bc7fdf4..ab6bed0da5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md @@ -47,11 +47,11 @@ You can create and use a custom XML file with the Enterprise Mode Site List Mana Each XML file must include: -- **Version number.** This number must be incremented with each version of the Enterprise Mode site list, letting Internet Explorer know whether the list is new. Approximately 65 seconds after Internet Explorer 11 starts, it compares your site list version to the stored version number. If your file has a higher number, the newer version is loaded.

**Important**
After this check, IE11 won’t look for an updated list again until you restart the browser. +- **Version number.** This number must be incremented with each version of the Enterprise Mode site list, letting Internet Explorer know whether the list is new. Approximately 65 seconds after Internet Explorer 11 starts, it compares your site list version to the stored version number. If your file has a higher number, the newer version is loaded.

**Important**
After this check, IE11 won’t look for an updated list again until you restart the browser. -- **<emie> tag.** This tag specifies the domains and domain paths that must be rendered using IE7 Enterprise Mode, IE8 Enterprise Mode, or the default IE11 browser environment.

**Important**
If you decide a site requires IE7 Enterprise Mode, you must add `forceCompatView=”true”` to your XML file. That code tells Enterprise Mode to check for a `DOCTYPE` tag on the specified webpage. If there is, the site renders using Windows Internet Explorer 7. If there’s no tag, the site renders using Microsoft Internet Explorer 5. +- **<emie> tag.** This tag specifies the domains and domain paths that must be rendered using IE7 Enterprise Mode, IE8 Enterprise Mode, or the default IE11 browser environment.

**Important**
If you decide a site requires IE7 Enterprise Mode, you must add `forceCompatView=”true”` to your XML file. That code tells Enterprise Mode to check for a `DOCTYPE` tag on the specified webpage. If there is, the site renders using Windows Internet Explorer 7. If there’s no tag, the site renders using Microsoft Internet Explorer 5. -- **<docMode> tag.**This tag specifies the domains and domain paths that need either to appear using the specific doc mode you assigned to the site. Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. For more specific info about using document modes, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). +- <docMode> tag.This tag specifies the domains and domain paths that need either to appear using the specific doc mode you assigned to the site. Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. For more specific info about using document modes, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). ### Enterprise Mode v.1 XML schema example The following is an example of what your XML file should look like when you’re done adding your sites. For more info about how to create your XML file, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). @@ -104,9 +104,9 @@ After you’ve added all of your sites to the tool and saved the file to XML, yo ## Related topics - [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md index 4b3ef6fd4e..6286b356ea 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md @@ -87,9 +87,9 @@ The following is an example of what your XML file should look like when you’re ``` In the above example, the following is true: -- www.cpandl.com, as the main domain, must use IE8 Enterprise Mode. However, www.cpandl.com/images must use IE7 Enterprise Mode. +- www.cpandl.com, as the main domain, must use IE8 Enterprise Mode. However, www.cpandl.com/images must use IE7 Enterprise Mode. -- contoso.com, and all of its domain paths, can use the default compatibility mode for the site. +- contoso.com, and all of its domain paths, can use the default compatibility mode for the site. To make sure your site list is up-to-date; wait 65 seconds after opening IE and then check that the `CurrentVersion` value in the `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode\` registry key matches the version number in your file.

**Important**
If `CurrentVersion` is not set or is wrong, it means that the XML parsing failed. This can mean that the XML file isn’t there, that there are access problems, or that the XML file format is wrong. Don’t manually change the `CurrentVersion` registry setting. You must make your changes to your site list and then update the list using the import function in the Enterprise Mode Site List Manager (schema v.2). @@ -114,9 +114,9 @@ After you’ve added all of your sites to the tool and saved the file to XML, yo ## Related topics - [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) - [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md index f75680f2fb..06f0afe48d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md @@ -25,11 +25,11 @@ ms.date: 07/27/2017 Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.

**Important**
You can only add specific URLs, not Internet or Intranet Zones. -

**Note**
If you need to include a lot of sites, instead of adding them one at a time, you can create a list of websites and add them all at the same time. For more information, see [Add multiple sites to the Enterprise Mode site list using a file and the Windows 7 and 8.1 Enterprise Mode Site List Manager](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md). +

Note
If you need to include a lot of sites, instead of adding them one at a time, you can create a list of websites and add them all at the same time. For more information, see Add multiple sites to the Enterprise Mode site list using a file and the Windows 7 and 8.1 Enterprise Mode Site List Manager. ## Adding a site to your compatibility list You can add individual sites to your compatibility list by using the Enterprise Mode Site List Manager. -

**Note**
If you're using the v.2 version of the Enterprise Mode schema, you'll need to use the Enterprise Mode Site List Manager (schema v.1). For more info, see [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md). +

Note
If you're using the v.2 version of the Enterprise Mode schema, you'll need to use the Enterprise Mode Site List Manager (schema v.1). For more info, see Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2). **To add a site to your compatibility list using the Enterprise Mode Site List Manager (schema v.1)** @@ -47,20 +47,20 @@ The path within a domain can require a different compatibility mode from the dom Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. For more specific info about using document modes, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). -5. Click **Save** to validate your website and to add it to the site list for your enterprise.

-If your site passes validation, it’s added to the global compatibility list. If the site doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the site or ignore the validation problem and add it to your list anyway. +5. Click **Save** to validate your website and to add it to the site list for your enterprise.

+ If your site passes validation, it’s added to the global compatibility list. If the site doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the site or ignore the validation problem and add it to your list anyway. -6. On the **File** menu, go to where you want to save the file, and then click **Save to XML**.

-You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). +6. On the **File** menu, go to where you want to save the file, and then click **Save to XML**.

+ You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). ## Next steps After you’ve added all of your sites to the tool and saved the file to XML, you can configure the rest of the Enterprise Mode functionality to use it. You can also turn Enterprise Mode on locally, so your users have the option to use Enterprise Mode on individual websites from the **Tools** menu. For more information, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). ## Related topics - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md index 710cff8a0a..481ddaa91a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md @@ -25,7 +25,7 @@ ms.date: 07/27/2017 Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.

**Important**
You can only add specific URLs, not Internet or Intranet Zones. -

**Note**
If you need to include a lot of sites, instead of adding them one at a time, you can create a list of websites and add them all at the same time. For more information, see the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) topic, based on your operating system. +

Note
If you need to include a lot of sites, instead of adding them one at a time, you can create a list of websites and add them all at the same time. For more information, see the Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2) or the Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1) topic, based on your operating system. ## Adding a site to your compatibility list You can add individual sites to your compatibility list by using the Enterprise Mode Site List Manager.

@@ -33,50 +33,50 @@ You can add individual sites to your compatibility list by using the Enterprise **To add a site to your compatibility list using the Enterprise Mode Site List Manager (schema v.2)** -1. In the Enterprise Mode Site List Manager (schema v.2), click **Add**. +1. In the Enterprise Mode Site List Manager (schema v.2), click **Add**. -2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

-Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. +2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

+ Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. -3. Type any comments about the website into the **Notes about URL** box.

-Administrators can only see comments while they’re in this tool. +3. Type any comments about the website into the **Notes about URL** box.

+ Administrators can only see comments while they’re in this tool. -4. In the **Compat Mode** box, choose one of the following: +4. In the **Compat Mode** box, choose one of the following: - - **IE8Enterprise**. Loads the site in IE8 Enterprise Mode. + - **IE8Enterprise**. Loads the site in IE8 Enterprise Mode. - - **IE7Enterprise**. Loads the site in IE7 Enterprise Mode. + - **IE7Enterprise**. Loads the site in IE7 Enterprise Mode. - - **IE\[*x*\]**. Where \[x\] is the document mode number and the site loads in the specified document mode. + - **IE\[*x*\]**. Where \[x\] is the document mode number and the site loads in the specified document mode. - - **Default Mode**. Loads the site using the default compatibility mode for the page. + - **Default Mode**. Loads the site using the default compatibility mode for the page. The path within a domain can require a different compatibility mode from the domain itself. For example, the domain might look fine in the default IE11 browser, but the path might have problems and require the use of Enterprise Mode. If you added the domain previously, your original compatibility choice is still selected. However, if the domain is new, **IE8 Enterprise Mode** is automatically selected. Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. For more specific info about using document modes, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). -5. In conjunction with the compatibility mode, you'll need to use the **Open in** box to pick which browser opens the site. +5. In conjunction with the compatibility mode, you'll need to use the **Open in** box to pick which browser opens the site. - - **IE11**. Opens the site in IE11, regardless of which browser is opened by the employee. + - **IE11**. Opens the site in IE11, regardless of which browser is opened by the employee. - - **MSEdge**. Opens the site in Microsoft Edge, regardless of which browser is opened by the employee. + - **MSEdge**. Opens the site in Microsoft Edge, regardless of which browser is opened by the employee. - - **None**. Opens in whatever browser the employee chooses. + - **None**. Opens in whatever browser the employee chooses. -6. Click **Save** to validate your website and to add it to the site list for your enterprise.

-If your site passes validation, it’s added to the global compatibility list. If the site doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the site or ignore the validation problem and add it to your list anyway. +6. Click **Save** to validate your website and to add it to the site list for your enterprise.

+ If your site passes validation, it’s added to the global compatibility list. If the site doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the site or ignore the validation problem and add it to your list anyway. -7. On the **File** menu, go to where you want to save the file, and then click **Save to XML**.

-You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). +7. On the **File** menu, go to where you want to save the file, and then click **Save to XML**.

+ You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). ## Next steps After you’ve added all of your sites to the tool and saved the file to XML, you can configure the rest of the Enterprise Mode functionality to use it. You can also turn Enterprise Mode on locally, so your users have the option to use Enterprise Mode on individual websites from the **Tools** menu. For more information, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). ## Related topics - [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md index 18ef7efc43..4ad92662d8 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/administrative-templates-and-ie11.md @@ -38,11 +38,11 @@ Administrative Templates are XML-based, multi-language files that define the reg ## How do I store Administrative Templates? As an admin, you can create a central store folder on your SYSVOL directory, named **PolicyDefinitions**. For example, %*SystemRoot*%\\PolicyDefinitions. This folder provides a single, centralized storage location for your Administrative Templates (both ADMX and ADML) files, so they can be used by your domain-based Group Policy Objects (GPOs). -

**Important**
Your Group Policy tools use the ADMX files in your store, ignoring any local copies. For more information about creating a central store, see [Scenario 1: Editing the Local GPO Using ADMX Files](https://go.microsoft.com/fwlink/p/?LinkId=276810). +

Important
Your Group Policy tools use the ADMX files in your store, ignoring any local copies. For more information about creating a central store, see Scenario 1: Editing the Local GPO Using ADMX Files. ## Administrative Templates-related Group Policy settings When you install Internet Explorer 11, it updates the local administrative files, Inetres.admx and Inetres.adml, both located in the **PolicyDefinitions** folder. -

**Note**
You won't see the new policy settings if you try to view or edit your policy settings on a computer that isn't running IE11. To fix this, you can either install IE11, or you can copy the updated Inetres.admx and Inetres.adml files from another computer to the **PolicyDefinitions** folder on this computer. +

Note
You won't see the new policy settings if you try to view or edit your policy settings on a computer that isn't running IE11. To fix this, you can either install IE11, or you can copy the updated Inetres.admx and Inetres.adml files from another computer to the PolicyDefinitions folder on this computer. IE11 provides these new policy settings, which are editable in the Local Group Policy Editor, and appear in the following policy paths: @@ -77,6 +77,6 @@ Regardless which tool you're using to edit your Group Policy settings, you'll ne - **If you're using GPMC with Advanced Group Policy Management (AGPM).** See [Checklist: Create, Edit, and Deploy a GPO](https://go.microsoft.com/fwlink/p/?LinkId=214522) for step-by-step instructions about how to check out a GPO from the AGPM archive, edit it, and request deployment. ## Related topics -- [Administrative templates (.admx) for Windows 10 download](https://go.microsoft.com/fwlink/p/?LinkId=746579) +- [Administrative templates (.admx) for Windows 10 April 2018 Update](https://www.microsoft.com/download/details.aspx?id=56880) +- [Administrative templates (.admx) for Windows 10 October 2018 Update](https://www.microsoft.com/download/details.aspx?id=57576) - [Administrative Templates (.admx) for Windows 8.1 and Windows Server 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=746580) - diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md index c7a1ebbebd..d109a8971f 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md @@ -30,33 +30,33 @@ If you experience issues while setting up your proxy server, you can try these t - Check that the browser is pointing to the right automatic configuration script location. - **To check your proxy server address** + **To check your proxy server address** -1. On the **Tools** menu, click **Internet Options**, and then **Connections**. +1. On the **Tools** menu, click **Internet Options**, and then **Connections**. -2. Click **Settings** or **LAN Settings**, and then look at your proxy server address. +2. Click **Settings** or **LAN Settings**, and then look at your proxy server address. -3. If you have multiple proxy servers, click **Advanced** to look at all of the additional addresses.

**Note**
If IE11 uses a proxy server for local IP addresses, regardless whether you turned on the **Bypass Proxy Server for Local Addresses** option, see [Internet Explorer Uses Proxy Server for Local IP Address Even if the "Bypass Proxy Server for Local Addresses" Option Is Turned On](https://go.microsoft.com/fwlink/p/?LinkId=85652). +3. If you have multiple proxy servers, click **Advanced** to look at all of the additional addresses.

**Note**
If IE11 uses a proxy server for local IP addresses, regardless whether you turned on the **Bypass Proxy Server for Local Addresses** option, see [Internet Explorer Uses Proxy Server for Local IP Address Even if the "Bypass Proxy Server for Local Addresses" Option Is Turned On](https://go.microsoft.com/fwlink/p/?LinkId=85652). - **To check that you've turned on the correct settings** + **To check that you've turned on the correct settings** -1. On the **Tools** menu, click **Internet Options**, and then click **Connections**. +4. On the **Tools** menu, click **Internet Options**, and then click **Connections**. -2. Click **Settings** or **LAN Settings**. +5. Click **Settings** or **LAN Settings**. -3. In the **Automatic configuration** area, check that you've clicked the **Automatically detect settings** box. If you've turned on automatic configuration, check to make sure that you've also clicked the **Use automatic configuration script** box.

**Note**
If at this point everything is set up correctly, but the proxy server still isn't behaving properly, click the **Detect my network settings** box in the **Error** dialog box to try to detect the proxy server, again. +6. In the **Automatic configuration** area, check that you've clicked the **Automatically detect settings** box. If you've turned on automatic configuration, check to make sure that you've also clicked the **Use automatic configuration script** box.

**Note**
If at this point everything is set up correctly, but the proxy server still isn't behaving properly, click the **Detect my network settings** box in the **Error** dialog box to try to detect the proxy server, again. - **To check that you're pointing to the correct automatic configuration script location** + **To check that you're pointing to the correct automatic configuration script location** -1. On the **Tools** menu, click **Internet Options**, and then click **Connections**. +7. On the **Tools** menu, click **Internet Options**, and then click **Connections**. -2. Click **Settings** or **LAN Settings**. +8. Click **Settings** or **LAN Settings**. -3. In the **Automatic configuration** area, check that you've chosen the **Use automatic configuration script** box, and that it has the correct location to your automatic configuration script or for your automatic proxy URL. +9. In the **Automatic configuration** area, check that you've chosen the **Use automatic configuration script** box, and that it has the correct location to your automatic configuration script or for your automatic proxy URL. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md index 08f17b9b1b..1e912f54d0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md @@ -41,7 +41,7 @@ For custom graphics and branding, add the `FEATURE\AUTOCONFIG\BRANDING` registry ## Updating your automatic configuration settings After adding the `FEATURE\AUTOCONFIG\BRANDING` registry key, you can change your automatic configuration settings to pick up the updated branding. -

**Important**
Your branding changes won't be added or updated if you've previously chosen the **Disable external branding of IE** setting in the `User Configuration\Administrative Templates\Windows Components\Internet Explorer` Group Policy object. This setting is intended to prevent branding by a third-party, like an Internet service or content provider. For more information about Group Policy, including videos and the latest technical documentation, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). +

Important
Your branding changes won't be added or updated if you've previously chosen the Disable external branding of IE setting in the User Configuration\Administrative Templates\Windows Components\Internet Explorer Group Policy object. This setting is intended to prevent branding by a third-party, like an Internet service or content provider. For more information about Group Policy, including videos and the latest technical documentation, see the Group Policy TechCenter. **To update your settings** @@ -66,9 +66,9 @@ You have two options to restrict your users' ability to override the automatic c - **Not Using Active Directory.** Choose the **Disable changing Automatic Configuration settings** setting in the `User Configuration\Administrative Templates\Windows Components\Internet Explorer` Group Policy object. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md index 6eb98e9842..508da17224 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md @@ -29,27 +29,27 @@ To use automatic detection, you have to set up your DHCP and DNS servers.

**No **To turn on automatic detection for DHCP servers** -1. Open the Internet Explorer Customization Wizard 11, and go to the **Automatic Configuration** page. +1. Open the Internet Explorer Customization Wizard 11, and go to the **Automatic Configuration** page. -2. Choose the **Automatically detect configuration settings** box to automatically detect your browser settings. For more information about the **Automatic Configuration** page, see [Use the Automatic Configuration page in the IEAK 11 Wizard](../ie11-ieak/auto-config-ieak11-wizard.md). +2. Choose the **Automatically detect configuration settings** box to automatically detect your browser settings. For more information about the **Automatic Configuration** page, see [Use the Automatic Configuration page in the IEAK 11 Wizard](../ie11-ieak/auto-config-ieak11-wizard.md). -3. Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649). +3. Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649). - **To turn on automatic detection for DNS servers** + **To turn on automatic detection for DNS servers** -1. Open the IE Customization Wizard 11, and go to the **Automatic Configuration** page. +4. Open the IE Customization Wizard 11, and go to the **Automatic Configuration** page. -2. Choose the **Automatically detect configuration settings** box to automatically detect your browser settings. +5. Choose the **Automatically detect configuration settings** box to automatically detect your browser settings. -3. In your DNS database file, create a host record named, **WPAD**. This record has the IP address of the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

**-OR-**

Create a canonical name (CNAME) alias record named, **WPAD**. This record has the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

**Note**
For more information about creating a **WPAD** entry, see [Creating a WPAD entry in DNS](https://go.microsoft.com/fwlink/p/?LinkId=294651).  +6. In your DNS database file, create a host record named, **WPAD**. This record has the IP address of the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

**-OR-**

Create a canonical name (CNAME) alias record named, **WPAD**. This record has the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

**Note**
For more information about creating a **WPAD** entry, see [Creating a WPAD entry in DNS](https://go.microsoft.com/fwlink/p/?LinkId=294651). -4. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.

**Note**
Internet Explorer 11 creates a default URL template based on the host name, **wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. +7. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.

**Note**
Internet Explorer 11 creates a default URL template based on the host name, **wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. -   + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls.md b/browsers/internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls.md index bc8dbcd54c..eee4b1425c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls.md +++ b/browsers/internet-explorer/ie11-deploy-guide/blocked-out-of-date-activex-controls.md @@ -35,7 +35,9 @@ You will receive a notification if a webpage tries to load one of the following **Silverlight** + | Everything below (but not including) Silverlight 5.1.50907.0 | |--------------------------------------------------------------| +| | For more information, see [Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md) and [Internet Explorer begins blocking out-of-date ActiveX controls](https://blogs.msdn.com/b/ie/archive/2014/08/06/internet-explorer-begins-blocking-out-of-date-activex-controls.aspx). You can also view Microsoft's complete list of out-of-date ActiveX controls in the XML-based [version list](https://go.microsoft.com/fwlink/?LinkId=403864). diff --git a/browsers/internet-explorer/ie11-deploy-guide/choose-how-to-deploy-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/choose-how-to-deploy-ie11.md index e97747ee2f..4e6630b0f1 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/choose-how-to-deploy-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/choose-how-to-deploy-ie11.md @@ -18,13 +18,14 @@ ms.date: 07/27/2017 In this section, you can learn about how to deploy your custom version of Internet Explorer using Automatic Version Synchronization (AVS) or using your software distribution tools. ## In this section + | Topic | Description | |------------------------------------------------------------- | ------------------------------------------------------ | |[Deploy IE11 using Automatic Version Synchronization (AVS)](deploy-ie11-using-automatic-version-synchronization-avs.md) |Guidance about how to deploy your custom browser packages using Automatic Version Synchronization (AVS). | -|[Deploy IE11 using software distribution tools](deploy-ie11-using-software-distribution-tools.md) |Guidance about how to deploy your custom browser packages using System Center 2012 R2, Windows Server Update Services (WSUS), Group Policy software installation, or Microsoft Deployment toolkit (MDT). | -  - -  +|[Deploy IE11 using software distribution tools](deploy-ie11-using-software-distribution-tools.md) |Guidance about how to deploy your custom browser packages using System Center 2012 R2, Windows Server Update Services (WSUS), Group Policy software installation, or Microsoft Deployment toolkit (MDT). | + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md index db879fca5c..e1bd5ba5d6 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md +++ b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md @@ -248,7 +248,7 @@ You can use both the WMI and XML settings individually or together: -**To turn on both WMI and XML recording** +To turn on both WMI and XML recording @@ -476,7 +476,7 @@ You can completely remove the data stored on your employee’s computers. ## Related topics * [Enterprise Mode Site List Manager (schema v.2) download](https://go.microsoft.com/fwlink/?LinkId=746562) * [Enterprise Mode for Internet Explorer 11 (IE11)](enterprise-mode-overview-for-ie11.md) -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md index b12889bdeb..090b718581 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md @@ -17,13 +17,13 @@ ms.date: 07/27/2017 # Create packages for multiple operating systems or languages You'll create multiple versions of your custom browser package if: -- You support more than 1 version of Windows®. +- You support more than 1 version of Windows®. -- You support more than 1 language. +- You support more than 1 language. -- You have custom installation packages with only minor differences. Like, having a different phone number. +- You have custom installation packages with only minor differences. Like, having a different phone number. - **To create a new package** + **To create a new package** 1. Create an installation package using the Internet Explorer Customization Wizard 11, as described in the [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md) topic. @@ -33,11 +33,11 @@ You'll create multiple versions of your custom browser package if: **Important**
Except for the **Title bar** text, **Favorites**, **Links bar**, **Home page**, and **Search bar**, keep all of your wizard settings the same for all of your build computers. -   + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md index 6b7fa1df4c..e964d84927 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md @@ -22,14 +22,14 @@ Automatic Version Synchronization (AVS) lets you use the Internet Explorer Admin You must synchronize the setup files at least once on the local computer, for each language and operating system combination, before proceeding through the rest of the wizard. If your packages have more than one version of IE, you need to keep the versions in separate component download folders, which can be pointed to from the **File Locations** page of the IEAK 11. For more information about using the AVS feature, see [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](../ie11-ieak/auto-version-sync-ieak11-wizard.md) . -##Related topics +## Related topics - [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) - [Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md index e6fc523907..f3ffd4bf9f 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md @@ -19,15 +19,16 @@ ms.date: 07/27/2017 **Applies to:** -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) Use the topics in this section to learn how to set up and use Enterprise Mode and the Enterprise Mode Site List Manager in your company. ## In this section + |Topic |Description | |---------------------------------------------------------------|-----------------------------------------------------------------------------------| |[Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)|Includes descriptions of the features of Enterprise Mode. | @@ -44,11 +45,11 @@ Use the topics in this section to learn how to set up and use Enterprise Mode an |[Remove sites from a local Enterprise Mode site list](remove-sites-from-a-local-enterprise-mode-site-list.md) |Guidance about how to remove websites from a device's local Enterprise Mode site list. | |[Remove sites from a local compatibility view list](remove-sites-from-a-local-compatibililty-view-list.md) |Guidance about how to remove websites from a device's local compatibility view list. | |[Turn off Enterprise Mode](turn-off-enterprise-mode.md) |Guidance about how to stop using your site list and how to turn off local control, using Group Policy or the registry. | -  - -  - -  + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index c5d717cf66..72522b17ec 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -75,7 +75,7 @@ This table includes the elements used by the Enterprise Mode schema. - @@ -134,11 +134,11 @@ This table includes the elements used by the Enterprise Mode schema.

Example

 <emie>
-  <domain exclude="true">fabrikam.com
-    <path exclude="false">/products</path>
+  <domain exclude="true">fabrikam.com
+    <path exclude="false">/products</path>
   </domain>
 </emie>

-Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. +Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does.

Setting nameRoot node for the schema.

Example

-<rules version="205">
+<rules version="205">
   <emie>
     <domain>contoso.com</domain>
   </emie>
@@ -87,19 +87,19 @@ This table includes the elements used by the Enterprise Mode schema.
 
The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.

Example

-<rules version="205">
+<rules version="205">
   <emie>
     <domain>contoso.com</domain>
   </emie>
 </rules>
-or- -

For IPv6 ranges:

<rules version="205">
+

For IPv6 ranges:

<rules version="205">
   <emie>
     <domain>[10.122.34.99]:8080</domain>
   </emie>
   </rules>
-or- -

For IPv4 ranges:

<rules version="205">
+

For IPv4 ranges:

<rules version="205">
   <emie>
     <domain>10.122.34.99:8080</domain>
   </emie>
@@ -108,12 +108,12 @@ This table includes the elements used by the Enterprise Mode schema.
 
<docMode>The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied. +The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied.

Example

-<rules version="205">
+<rules version="205">
   <docMode>
-    <domain docMode="7">contoso.com</domain>
+    <domain docMode="7">contoso.com</domain>
   </docMode>
 </rules>
Internet Explorer 11Internet Explorer 11 and Microsoft Edge
@@ -166,11 +166,11 @@ This table includes the attributes used by the Enterprise Mode schema.

Example

 <emie>
-  <domain exclude="false">fabrikam.com
-    <path exclude="true">/products</path>
+  <domain exclude="false">fabrikam.com
+    <path exclude="true">/products</path>
   </domain>
 </emie>

-Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. +Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. Internet Explorer 11 and Microsoft Edge @@ -179,8 +179,8 @@ Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/pr

Example

 <docMode>
-  <domain exclude="false">fakrikam.com
-    <path docMode="7">/products</path>
+  <domain exclude="false">fakrikam.com
+    <path docMode="7">/products</path>
   </domain>
 </docMode>
Internet Explorer 11 diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index c0e9084fb7..187ba67198 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -42,7 +42,7 @@ The following is an example of the v.2 version of the Enterprise Mode schema. **Important**
Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both https://contoso.com and https://contoso.com. -  + ``` xml @@ -106,8 +106,8 @@ This table includes the elements used by the v.2 version of the Enterprise Mode A new root node with this text is using the updated v.2 version of the schema. It replaces <rules>.

Example

-<site-list version="205">
-  <site url="contoso.com">
+<site-list version="205">
+  <site url="contoso.com">
     <compat-mode>IE8Enterprise</compat-mode>
     <open-in>IE11</open-in>
   </site>
@@ -119,19 +119,19 @@ This table includes the elements used by the v.2 version of the Enterprise Mode
 A unique entry added for each site you want to put on the Enterprise Mode site list. The first <site> element will overrule any additional <site> elements that use the same value for the <url> element.
 

Example

-<site url="contoso.com">
+<site url="contoso.com">
   <compat-mode>default</compat-mode>
   <open-in>none</open-in>
 </site>
-or- -

For IPv4 ranges:

<site url="10.122.34.99:8080">
+

For IPv4 ranges:

<site url="10.122.34.99:8080">
   <compat-mode>IE8Enterprise</compat-mode>
 <site>

-or- -

For IPv6 ranges:

<site url="[10.122.34.99]:8080">
+

For IPv6 ranges:

<site url="[10.122.34.99]:8080">
   <compat-mode>IE8Enterprise</compat-mode>
 <site>

-You can also use the self-closing version, <url="contoso.com" />, which also sets: +You can also use the self-closing version, <url="contoso.com" />, which also sets:

  • <compat-mode>default</compat-mode>
  • <open-in>none</open-in>
  • @@ -143,21 +143,21 @@ You can also use the self-closing version, <url="contoso.com" />, which al A child element that controls what compatibility setting is used for specific sites or domains. This element is only supported in IE11.

    Example

    -<site url="contoso.com">
    +<site url="contoso.com">
       <compat-mode>IE8Enterprise</compat-mode>
     </site>
    -or- -

    For IPv4 ranges:

    <site url="10.122.34.99:8080">
    +

    For IPv4 ranges:

    <site url="10.122.34.99:8080">
       <compat-mode>IE8Enterprise</compat-mode>
     <site>

    -or- -

    For IPv6 ranges:

    <site url="[10.122.34.99]:8080">
    +

    For IPv6 ranges:

    <site url="[10.122.34.99]:8080">
       <compat-mode>IE8Enterprise</compat-mode>
     <site>

    Where:

    • IE8Enterprise. Loads the site in IE8 Enterprise Mode.
      This element is required for sites included in the EmIE section of the v.1 schema and is needed to load in IE8 Enterprise Mode.
    • -

    • IE7Enterprise. Loads the site in IE7 Enterprise Mode.
      This element is required for sites included in the EmIE section of the v.1 schema and is needed to load in IE7 Enterprise Mode.

      Important
      This tag replaces the combination of the `"forceCompatView"="true"` attribute and the list of sites specified in the EmIE section of the v.1 version of the schema.

    • +

    • IE7Enterprise. Loads the site in IE7 Enterprise Mode.
      This element is required for sites included in the EmIE section of the v.1 schema and is needed to load in IE7 Enterprise Mode.

      Important
      This tag replaces the combination of the "forceCompatView"="true" attribute and the list of sites specified in the EmIE section of the v.1 version of the schema.

    • IE[x]. Where [x] is the document mode number into which the site loads.
    • Default or not specified. Loads the site using the default compatibility mode for the page. In this situation, X-UA-compatible meta tags or HTTP headers are honored.
    @@ -168,7 +168,7 @@ Where: A child element that controls what browser is used for sites. This element supports the Open in IE11 or Open in Microsoft Edge experiences, for devices running Windows 10.

    Example

    -<site url="contoso.com">
    +<site url="contoso.com">
       <open-in>none</open-in>
     </site>

    Where: @@ -195,13 +195,13 @@ The <url> attribute, as part of the <site> element in the v.2 versio allow-redirect -A boolean attribute of the <open-in> element that controls the behavior for redirected sites. Setting this attribute to "true" indicates that the site will open in IE11 or Microsoft Edge even if the site is navigated to as part of a HTTP or meta refresh redirection chain. Omitting the attribute is equivalent to "false" (sites in redirect chain will not open in another browser). +A boolean attribute of the <open-in> element that controls the behavior for redirected sites. Setting this attribute to "true" indicates that the site will open in IE11 or Microsoft Edge even if the site is navigated to as part of a HTTP or meta refresh redirection chain. Omitting the attribute is equivalent to "false" (sites in redirect chain will not open in another browser).

    Example

    -<site url="contoso.com/travel">
    -  <open-in allow-redirect="true">IE11</open-in>
    +<site url="contoso.com/travel">
    +  <open-in allow-redirect="true">IE11</open-in>
     </site>
    -In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. +In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. Internet Explorer 11 and Microsoft Edge @@ -213,14 +213,14 @@ In this example, if https://contoso.com/travel is encountered in a redirect chai url Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
    Note
    -Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both https://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both https://contoso.com and https://contoso.com.

    Example

    -<site url="contoso.com:8080">
    +<site url="contoso.com:8080">
       <compat-mode>IE8Enterprise</compat-mode>
       <open-in>IE11</open-in>
     </site>
    -In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. +In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. Internet Explorer 11 and Microsoft Edge @@ -240,17 +240,17 @@ These v.1 version schema attributes have been deprecated in the v.2 version of t <forceCompatView> <compat-mode> -Replace <forceCompatView="true"> with <compat-mode>IE7Enterprise</compat-mode> +Replace <forceCompatView="true"> with <compat-mode>IE7Enterprise</compat-mode> <docMode> <compat-mode> -Replace <docMode="IE5"> with <compat-mode>IE5</compat-mode> +Replace <docMode="IE5"> with <compat-mode>IE5</compat-mode> <doNotTransition> <open-in> -Replace <doNotTransition="true"> with <open-in>none</open-in> +Replace <doNotTransition="true"> with <open-in>none</open-in> <domain> and <path> @@ -258,24 +258,24 @@ These v.1 version schema attributes have been deprecated in the v.2 version of t Replace:
     <emie>
    -  <domain exclude="false">contoso.com</domain>
    +  <domain exclude="false">contoso.com</domain>
     </emie>
    With:
    -<site url="contoso.com"/>
    +<site url="contoso.com"/>
       <compat-mode>IE8Enterprise</compat-mode>
     </site>
    -AND-

    Replace:

     <emie>
    -  <domain exclude="true">contoso.com
    -     <path exclude="false" forceCompatView="true">/about</path>
    +  <domain exclude="true">contoso.com
    +     <path exclude="false" forceCompatView="true">/about</path>
       </domain>
     </emie>
    With:
    -<site url="contoso.com/about">
    +<site url="contoso.com/about">
       <compat-mode>IE7Enterprise</compat-mode>
     </site>
    diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md index 61ea34d333..3c8c913f1f 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md @@ -38,11 +38,11 @@ Use the topics in this section to learn about Group Policy and how to use it to |[Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) |Info about Group Policy preferences, as compared to Group Policy settings. | |[Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) |Info about Administrative Templates, including where to store them and the related Group Policy settings. | |[Enable and disable add\-ons using administrative templates and group policy](enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md) |Guidance about how to use your local Group Policy editor or the CLSID and Administrative Templates to manage your Group Policy objects. -  + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md index eb04a4a464..247e023667 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md @@ -33,7 +33,7 @@ After deploying IE11 to your organization, you can continue to manage the browse **Note**
    Whenever possible, we recommend that you manage IE11 using Administrative Templates, because these settings are always written to secure policy branches in the registry. In addition, we recommend that you deploy using standard user accounts instead of letting your users log on to their computers as administrators. This helps to prevent your users from making unwanted changes to their systems or overriding Group Policy settings. -   + Users won't be able to use the IE11 user interface or the registry to change any managed settings on their computers. However, they will be able to change many of the preferences associated with the settings you set up using the Internet Explorer Administration Kit 11 (IEAK 11). ## Which GPO tool should I use? @@ -47,9 +47,9 @@ You can use any of these tools to create, manage, view, and troubleshoot Group P - [Group Policy, Windows Powershell, and Internet Explorer 11](group-policy-windows-powershell-ie11.md). A command-line shell and scripting language that helps automate Windows and application administration on a single computer locally, or across many computers remotely. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md index 67ff23ab52..0b4e605611 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md +++ b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md @@ -70,39 +70,39 @@ Automatic Updates will start to distribute Internet Explorer 11 shortly after th Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to: -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft - Windows Server Update Services 3.0**. +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft + Windows Server Update Services 3.0**. -2. Expand *ComputerName*, and then click **Options**. +2. Expand *ComputerName*, and then click **Options**. -3. Click **Automatic Approvals**. +3. Click **Automatic Approvals**. -4. Click the rule that automatically approves an update that is classified as - Update Rollup, and then click **Edit.** +4. Click the rule that automatically approves an update that is classified as + Update Rollup, and then click **Edit.** - >[!Note] - >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. + >[!Note] + >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. -5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. +5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. - >[!Note] - >The properties for this rule will resemble the following:
    • When an update is in Update Rollups
    • Approve the update for all computers
    + >[!Note] + >The properties for this rule will resemble the following:
    • When an update is in Update Rollups
    • Approve the update for all computers
    -6. Clear the **Update Rollup** check box, and then click **OK**. +6. Clear the **Update Rollup** check box, and then click **OK**. -7. Click **OK** to close the **Automatic Approvals** dialog box.

    After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. +7. Click **OK** to close the **Automatic Approvals** dialog box.

    After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. -8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. +8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. -9. Expand *ComputerName*, and then click **Synchronizations**. +9. Expand *ComputerName*, and then click **Synchronizations**. -10. Click **Synchronize Now**. +10. Click **Synchronize Now**. -11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. +11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. -12. Choose **Unapproved** in the **Approval**drop down box. +12. Choose **Unapproved** in the **Approval**drop down box. -13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. +13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. >[!Note] >There may be multiple updates, depending on the imported language and operating system updates. diff --git a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md index ab7cdcd98b..a84fbae316 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md @@ -42,9 +42,9 @@ Importing your file overwrites everything that’s currently in the tool, so mak - [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md index ba02ed0210..3f147df80e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md @@ -34,11 +34,11 @@ Use the topics in this section to learn how to customize your Internet Explorer |[Choose how to install Internet Explorer 11 (IE11)](choose-how-to-install-ie11.md) |Guidance for the different ways you can install IE, including using System Center 2012 R2 Configuration Manager, Windows Server Update Services (WSUS), Microsoft Intune, your network, the operating system deployment system, or third-party tools. | |[Choose how to deploy Internet Explorer 11 (IE11)](choose-how-to-deploy-ie11.md) |Guidance about how to deploy your custom version of IE using Automatic Version Synchronization (AVS) or using your software distribution tools. | |[Virtualization and compatibility with Internet Explorer 11](virtualization-and-compatibility-with-ie11.md) |Info about the Microsoft-supported options for virtualizing web apps. | -  + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md index a84212c6a5..7816ad8190 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md @@ -21,22 +21,22 @@ You can install Internet Explorer 11 (IE11) over your network by putting your c **To manually create the folder structure** -- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees. +- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees. - **To create the folder structure using IEAK 11** + **To create the folder structure using IEAK 11** -- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.

    -The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files. +- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.

    + The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files. **Note**
    Use the localized versions of the IE Customization Wizard 11 to create localized IE11 installation packages. ## Related topics - [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) -   + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md index 2d390c0f69..3bc741dbc0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md @@ -19,34 +19,34 @@ Windows Server Update Services (WSUS) lets you download a single copy of the Mic **To import from Windows Update to WSUS** -1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.

    -Where `` is the name of your WSUS server. +1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.

    + Where `` is the name of your WSUS server. -2. Choose the top server node or the **Updates** node, and then click **Import Updates**. +2. Choose the top server node or the **Updates** node, and then click **Import Updates**. -3. To get the updates, install the Microsoft Update Catalog ActiveX control. +3. To get the updates, install the Microsoft Update Catalog ActiveX control. -4. Search for Internet Explorer 11 and add its contents to your basket. +4. Search for Internet Explorer 11 and add its contents to your basket. -5. After you're done browsing, go to your basket and click **Import**. +5. After you're done browsing, go to your basket and click **Import**. - You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box. + You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box. - **To approve Internet Explorer in WSUS for installation** + **To approve Internet Explorer in WSUS for installation** -1. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list. +6. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list. -2. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar. +7. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar. -3. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**. +8. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**. -4. Choose the right version of IE11 for your operating system, and click **Approve for installation**. +9. Choose the right version of IE11 for your operating system, and click **Approve for installation**. -5. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**. +10. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md index 89dd3179d4..3a9b502928 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md +++ b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md @@ -34,9 +34,9 @@ Use the topics in this section to learn about how to auto detect your settings, |[Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md) |Guidance about how to add, update and lock your auto configuration settings. | |[Auto proxy configuration settings for Internet Explorer 11](auto-proxy-configuration-settings-for-ie11.md) |Guidance about how to add, update, and lock your auto-proxy settings. |  -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md index 76393fbbba..42ffd10dc8 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md @@ -64,7 +64,7 @@ The IEM settings have replacements you can use in either Group Policy Preference |Automatic browser configuration |Lets you update your employee's computer after you've deployed IE11, by specifying a URL to an .ins file, an auto-proxy URL, or both. You can decide when the update occurs, in minutes. Typing zero, or not putting in any number, means that automatic configuration only happens after the browser is started and used to go to a page. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Automatic Configuration** tab, and then add your URL.

    On the **Automatic Configuration** page of IEAK 11, modify the configuration settings, including providing the URL to an .ins file or an auto-proxy site. | |Proxy settings |Lets you specify your proxy servers. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, click **LAN Settings**, and then choose whether to turn on automatic detection of your configuration settings and if you want to use proxy servers.

    -OR-

    On the **Proxy Settings** page of IEAK 11, turn on your proxy settings, adding your proxy server addresses and exceptions. | |User Agent string |Lets the browser provide identification to visited servers. This string is often used to keep Internet traffic statistics. |This setting isn't available anymore. | -  + ### URLs replacements |IEM setting |Description |Replacement tool | diff --git a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md index 0c31d97187..5098fab9f0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md @@ -16,42 +16,43 @@ ms.date: 07/27/2017 # New group policy settings for Internet Explorer 11 -Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including: +Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including: -|Policy |Category Path |Supported on |Explanation | -|-------|--------------|-------------|------------| -|Allow IE to use the HTTP2 network protocol |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |IE11 on Windows 10 |This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.

    If you enable this policy setting, IE uses the HTTP2 network protocol.

    If you disable this policy setting, IE won't use the HTTP2 network protocol.

    If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. | -|Allow IE to use the SPDY/3 network protocol |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |IE11 on Windows 10 |This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.

    If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.

    If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.

    If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced* tab of the **Internet Options** dialog box. The default is on.

    **Note**
    We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. | -|Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar |Administrative Templates\Windows Components\Internet Explorer |IE11 on Windows 10 |This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.

    If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

    If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

    If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. | -|Allow only approved domains to use the TDC ActiveX control |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
    |IE11 in Windows 10 |This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.

    If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.

    If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. | -|Allow SSL3 Fallback |Administrative Templates\Windows Components\Internet Explorer\Security Features |Internet Explorer 11 on Windows 10 |This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.

    If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.

    If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.

    **Important:**
    By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. | -|Allow VBScript to run in Internet Explorer|

    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
    |Internet Explorer 11|This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.

    If you enable this policy setting (default), you must also pick one of the following options from the Options box:

    • Enable. VBScript runs on pages in specific zones, without any interaction.
    • Prompt. Employees are prompted whether to allow VBScript to run in the zone.
    • Disable. VBScript is prevented from running in the zone.

    If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone.| -|Always send Do Not Track header |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |At least Internet Explorer 10 |This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.

    If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.

    **In Internet Explorer 9 and 10:**
    If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.

    **In at least IE11:**
    If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.

    If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced* tab of the **Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. | -|Don't run antimalware programs against ActiveX controls
    (Internet, Restricted Zones) |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
    |IE11 on Windows 10 |This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

    If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. | -|Don't run antimalware programs against ActiveX controls
    (Intranet, Trusted, Local Machine Zones) |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
    |IE11 on Windows 10 |This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

    If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. | -|Hide the button (next to the New Tab button) that opens Microsoft Edge |User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ |IE11 on Windows 10, version 1703|This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.

    If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.

    If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.

    If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. | -|Let users turn on and use Enterprise Mode from the **Tools** menu |Administrative Templates\Windows Components\Internet Explorer |IE11 on Windows 10 |This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.

    If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.

    If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. | -|Limit Site Discovery output by Domain |Administrative Templates\Windows Components\Internet Explorer |At least Internet Explorer 8 |This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.

    **Note:**
    You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | -|Limit Site Discovery output by Zone |Administrative Templates\Windows Components\Internet Explorer |At least Internet Explorer 8 |This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.

    To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:

    • 0 – Restricted Sites zone
    • 0 – Internet zone
    • 0 – Trusted Sites zone
    • 0 – Local Intranet zone
    • 0 – Local Machine zone

    **Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
    • 0 – Restricted Sites zone
    • 0 – Internet zone
    • 0 – Trusted Sites zone
    • 1 – Local Intranet zone
    • 0 – Local Machine zone

    **Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
    • 1 – Restricted Sites zone
    • 0 – Internet zone
    • 1 – Trusted Sites zone
    • 1 – Local Intranet zone
    • 1 – Local Machine zone

    **Note:**
    You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | -|Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data |Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History |At least Windows Internet Explorer 9 |**In Internet Explorer 9 and Internet Explorer 10:**
    This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.

    **In IE11:**
    This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.

    If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.

    If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.

    If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. | -|Send all sites not included in the Enterprise Mode Site List to Microsoft Edge |Administrative Templates\Windows Components\Internet Explorer |IE11 on Windows 10, version 1607 |This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.

    If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.

    If you disable or don't configure this policy setting, all sites will open based on the currently active browser.

    **Note:**
    If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. | -|Show message when opening sites in Microsoft Edge using Enterprise Mode |Administrative Templates\Windows Components\Internet Explorer |IE11 on Windows 10, version 1607 |This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

    If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

    If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. | -|Turn off automatic download of the ActiveX VersionList |Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management |At least Windows Internet Explorer 8 |This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.

    If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.

    If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.

    **Important:**
    Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking (https://technet.microsoft.com/itpro/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking) topic. | -|Turn off loading websites and content in the background to optimize performance |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |IE11 on Windows 10 |This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.

    If you enable this policy setting, IE doesn't load any websites or content in the background.

    If you disable this policy setting, IE preemptively loads websites and content in the background.

    If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. | -|Turn off phone number detection |Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing |IE11 on Windows 10 |This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.

    If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.

    If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.

    If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. | -|Turn off sending URL path as UTF-8 |User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding |At least Windows Internet Explorer 7 |This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.

    If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.

    If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.

    If you don't configure this policy setting, users can turn this behavior on or off. | -|Turn off sending UTF-8 query strings for URLs |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |IE11 on Windows 10 |This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.

    If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:

    • **0.** Never encode query strings.
    • **1.** Only encode query strings for URLs that aren't in the Intranet zone.
    • **2.** Only encode query strings for URLs that are in the Intranet zone.
    • **3.** Always encode query strings.

    If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. | -|Turn off the ability to launch report site problems using a menu option |Administrative Templates\Windows Components\Internet Explorer\Browser menus |Internet Explorer 11 |This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.

    If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.

    If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. | -|Turn off the flip ahead with page prediction feature |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |At least Internet Explorer 10 on Windows 8 |This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.

    If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.

    If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.

    If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.

    **Note**
    Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. | -|Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows |Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page |IE11 on Windows 10 |This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.

    **Important**
    When using 64-bit processes, some ActiveX controls and toolbars might not be available. | -|Turn on Site Discovery WMI output |Administrative Templates\Windows Components\Internet Explorer |At least Internet Explorer 8 |This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.

    **Note:**
    Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | -|Turn on Site Discovery XML output |Administrative Templates\Windows Components\Internet Explorer |At least Internet Explorer 8 |This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.

    **Note:**
    Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | -|Use the Enterprise Mode IE website list |Administrative Templates\Windows Components\Internet Explorer |IE11 on Windows 10, version 1511 |This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.

    If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.

    If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. | + +| Policy | Category Path | Supported on | Explanation | +|-----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Allow IE to use the HTTP2 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.

    If you enable this policy setting, IE uses the HTTP2 network protocol.

    If you disable this policy setting, IE won't use the HTTP2 network protocol.

    If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. | +| Allow IE to use the SPDY/3 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.

    If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.

    If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.

    If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced\* tab of the \*\*Internet Options** dialog box. The default is on.

    **Note**
    We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. | +| Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.

    If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

    If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

    If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. | +| Allow only approved domains to use the TDC ActiveX control |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
    | IE11 in Windows 10 | This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.

    If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.

    If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. | +| Allow SSL3 Fallback | Administrative Templates\Windows Components\Internet Explorer\Security Features | Internet Explorer 11 on Windows 10 | This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.

    If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.

    If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.

    **Important:**
    By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. | +| Allow VBScript to run in Internet Explorer |

    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
    • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
    | Internet Explorer 11 | This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.

    If you enable this policy setting (default), you must also pick one of the following options from the Options box:

    • Enable. VBScript runs on pages in specific zones, without any interaction.
    • Prompt. Employees are prompted whether to allow VBScript to run in the zone.
    • Disable. VBScript is prevented from running in the zone.

    If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone. | +| Always send Do Not Track header | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 | This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.

    If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.

    **In Internet Explorer 9 and 10:**
    If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.

    **In at least IE11:**
    If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.

    If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced\* tab of the \*\*Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. | +| Don't run antimalware programs against ActiveX controls
    (Internet, Restricted Zones) |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
    | IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

    If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. | +| Don't run antimalware programs against ActiveX controls
    (Intranet, Trusted, Local Machine Zones) |

    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
    • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
    | IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

    If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

    If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. | +| Hide the button (next to the New Tab button) that opens Microsoft Edge | User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ | IE11 on Windows 10, version 1703 | This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.

    If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.

    If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.

    If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. | +| Let users turn on and use Enterprise Mode from the **Tools** menu | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.

    If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.

    If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. | +| Limit Site Discovery output by Domain | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.

    **Note:**
    You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | +| Limit Site Discovery output by Zone | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.

    To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:

    • 0 – Restricted Sites zone
    • 0 – Internet zone
    • 0 – Trusted Sites zone
    • 0 – Local Intranet zone
    • 0 – Local Machine zone

    **Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
    • 0 – Restricted Sites zone
    • 0 – Internet zone
    • 0 – Trusted Sites zone
    • 1 – Local Intranet zone
    • 0 – Local Machine zone

    **Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
    • 1 – Restricted Sites zone
    • 0 – Internet zone
    • 1 – Trusted Sites zone
    • 1 – Local Intranet zone
    • 1 – Local Machine zone

    **Note:**
    You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | +| Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data | Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History | At least Windows Internet Explorer 9 | **In Internet Explorer 9 and Internet Explorer 10:**
    This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.

    **In IE11:**
    This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.

    If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.

    If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.

    If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. | +| Send all sites not included in the Enterprise Mode Site List to Microsoft Edge | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.

    If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.

    If you disable or don't configure this policy setting, all sites will open based on the currently active browser.

    **Note:**
    If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. | +| Show message when opening sites in Microsoft Edge using Enterprise Mode | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

    If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

    If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. | +| Turn off automatic download of the ActiveX VersionList | Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management | At least Windows Internet Explorer 8 | This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.

    If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.

    If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.

    **Important:**
    Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking () topic. | +| Turn off loading websites and content in the background to optimize performance | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.

    If you enable this policy setting, IE doesn't load any websites or content in the background.

    If you disable this policy setting, IE preemptively loads websites and content in the background.

    If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. | +| Turn off phone number detection | Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing | IE11 on Windows 10 | This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.

    If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.

    If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.

    If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. | +| Turn off sending URL path as UTF-8 | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding | At least Windows Internet Explorer 7 | This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.

    If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.

    If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.

    If you don't configure this policy setting, users can turn this behavior on or off. | +| Turn off sending UTF-8 query strings for URLs | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.

    If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:

    • **0.** Never encode query strings.
    • **1.** Only encode query strings for URLs that aren't in the Intranet zone.
    • **2.** Only encode query strings for URLs that are in the Intranet zone.
    • **3.** Always encode query strings.

    If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. | +| Turn off the ability to launch report site problems using a menu option | Administrative Templates\Windows Components\Internet Explorer\Browser menus | Internet Explorer 11 | This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.

    If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.

    If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. | +| Turn off the flip ahead with page prediction feature | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 on Windows 8 | This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.

    If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.

    If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.

    If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.

    **Note**
    Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. | +| Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

    If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.

    **Important**
    When using 64-bit processes, some ActiveX controls and toolbars might not be available. | +| Turn on Site Discovery WMI output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.

    **Note:**
    Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | +| Turn on Site Discovery XML output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.

    If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.

    If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.

    **Note:**
    Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | +| Use the Enterprise Mode IE website list | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1511 | This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.

    If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.

    If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. | ## Removed Group Policy settings IE11 no longer supports these Group Policy settings: -- Turn on Internet Explorer 7 Standards Mode +- Turn on Internet Explorer 7 Standards Mode - Turn off Compatibility View button diff --git a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md index 94a29994eb..825f199730 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md +++ b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md @@ -191,15 +191,15 @@ Before running the PowerShell script, you must copy both the .ps1 and .mof file **To configure IE to use WMI logging** -1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting. +1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting. -2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command: -``` -powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1 -``` -For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460). +2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command: + ``` + powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1 + ``` + For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460). -3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). +3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). The inventory info appears in the WMI class, `IEAXControlBlockingAuditInfo`, located in the WMI namespace, *root\\cimv2\\IETelemetry*. To collect the inventory info from your client computers, we recommend using System Center 2012 R2 Configuration Manager or any agent that can access the WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). diff --git a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md index c1bd69ef92..dfa4a9576b 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md @@ -45,29 +45,29 @@ If you notice that CPU usage is running higher than normal, or that IE is freque **To check your browser add-ons** -1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box. +1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box. -2. Check if IE still crashes.

    -If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**. +2. Check if IE still crashes.

    + If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**. -3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars. +3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars. -4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.

    -After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer. +4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.

    + After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer. - **To check for Software Rendering mode** + **To check for Software Rendering mode** -1. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. +5. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. -2. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.

    -If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588). +6. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.

    + If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588). ## Adaptive streaming and DRM playback don’t work with Windows Server 2012 R2 IE11 in Windows Server 2012 R2 doesn’t include media features like adaptive streaming or Digital Rights Management (DRM) playback. To add these features, you’ll need to download and install the Media Feature Pack from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=320789), as well as an app that uses PlayReady DRM from the Microsoft Store, such as the Xbox Music app or Xbox Video app. The app must be installed to specifically turn on DRM features, while all other media features are installed with the Media Feature Pack. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index 76b1854096..40db70828c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -40,9 +40,9 @@ This is a permanent removal and erases everything. However, if you determine it - [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index 263df4b50c..f78022cc56 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -29,16 +29,16 @@ You can search to see if a specific site already appears in your global Enterpri **To search your compatibility list** -- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.

    -The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported. +- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.

    + The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported. ## Related topics - [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md index 7e1eaa1a80..3d3726d938 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md @@ -40,33 +40,33 @@ When you turn logging on, you need a valid URL that points to a server that can **To set up an endpoint server** -1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609). +1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609). -2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.

    -This lets you create an ASP form that accepts the incoming POST messages. +2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.

    + This lets you create an ASP form that accepts the incoming POST messages. -3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port. +3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port. - ![IIS Manager, editing website bindings](images/ie-emie-editbindings.png) + ![IIS Manager, editing website bindings](images/ie-emie-editbindings.png) -4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box. +4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box. - ![IIS Manager, setting logging options](images/ie-emie-logging.png) + ![IIS Manager, setting logging options](images/ie-emie-logging.png) -5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.

    -Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users. +5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.

    + Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users. -6. Apply these changes to your default website and close the IIS Manager. +6. Apply these changes to your default website and close the IIS Manager. -7. Put your EmIE.asp file into the root of the web server, using this command: +7. Put your EmIE.asp file into the root of the web server, using this command: ``` - <% @ LANGUAGE=javascript %> - <% - Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode")); - %> - ``` -This code logs your POST fields to your IIS log file, where you can review all of the collected data. + <% @ LANGUAGE=javascript %> + <% + Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode")); + %> + ``` + This code logs your POST fields to your IIS log file, where you can review all of the collected data. ### IIS log file information @@ -86,47 +86,47 @@ For logging, you’re going to need a valid URL that points to a server that can **To set up the sample** -1. Set up a server to collect your Enterprise Mode information from your users. +1. Set up a server to collect your Enterprise Mode information from your users. -2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project. +2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project. -3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file. +3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file. -4. On the **Build** menu, tap or click **Build Solution**.

    -The required packages are automatically downloaded and included in the solution. +4. On the **Build** menu, tap or click **Build Solution**.

    + The required packages are automatically downloaded and included in the solution. - **To set up your endpoint server** + **To set up your endpoint server** -1. Right-click on the name, PhoneHomeSample, and click **Publish**. +5. Right-click on the name, PhoneHomeSample, and click **Publish**. - ![Visual Studio, Publish menu](images/ie-emie-publishsolution.png) + ![Visual Studio, Publish menu](images/ie-emie-publishsolution.png) -2. In the **Publish Web** wizard, pick the publishing target and options that work for your organization. +6. In the **Publish Web** wizard, pick the publishing target and options that work for your organization. **Important**
    Make sure you have a database associated with your publishing target. Otherwise, your reports won’t be collected and you’ll have problems deploying the website.  - ![Visual Studio, Publish Web wizard](images/ie-emie-publishweb.png) + ![Visual Studio, Publish Web wizard](images/ie-emie-publishweb.png) After you finish the publishing process, you need to test to make sure the app deployed successfully. - **To test, deploy, and use the app** + **To test, deploy, and use the app** -1. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: +7. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: - ``` "Enable"="https:///api/records/" - ``` - Where `` points to your deployment URL. + ``` "Enable"="https:///api/records/" + ``` + Where `` points to your deployment URL. -2. After you’re sure your deployment works, you can deploy it to your users using one of the following: +8. After you’re sure your deployment works, you can deploy it to your users using one of the following: - - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box. + - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box. - - Deploy the registry key in Step 3 using System Center or other management software. + - Deploy the registry key in Step 3 using System Center or other management software. -3. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary. +9. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary. - **To view the report results** + **To view the report results** - Go to `https:///List` to see the report results.

    If you’re already on the webpage, you’ll need to refresh the page to see the results. @@ -152,9 +152,9 @@ You may need to do some additional package cleanup to remove older package versi - [What is Enterprise Mode?](what-is-enterprise-mode.md) - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md index 5adbf749fc..b04869b6fe 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md @@ -34,16 +34,16 @@ IE11 isn't supported on Windows 8 or Windows Server 2012. Some of the components in this table might also need additional system resources. Check the component's documentation for more information. -|Item |Minimum requirements | -|----------------------------|--------------------------------------------------------| -|Computer/processor |1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) | -|Operating system |

    • Windows 10 (32-bit or 64-bit)
    • Windows 8.1 Update (32-bit or 64-bit)
    • Windows 7 with SP1 (32-bit or 64-bit)
    • Windows Server 2012 R2
    • Windows Server 2008 R2 with SP1 (64-bit only)
    | -|Memory |
    • Windows 10 (32-bit)-1 GB
    • Windows 10 (64-bit)-2 GB
    • Windows 8.1 Update (32-bit)-1 GB
    • Windows 8.1 Update (64-bit)-2 GB
    • Windows 7 with SP1 (32-bit or 64-bit)-512 MB
    • Windows Server 2012 R2-512 MB
    • Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
    | -|Hard drive space |
    • Windows 10 (32-bit)-16 GB
    • Windows 10 (64-bit)-20 GB
    • Windows 8.1 Update (32-bit)-16 GB
    • Windows 8.1 Update (64-bit)-20 GB
    • Windows 7 with SP1 (32-bit)-70 MB
    • Windows 7 with SP1 (64-bit)-120 MB
    • Windows Server 2012 R2-32 GB
    • Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
      • | -|Drive |CD-ROM drive (if installing from a CD-ROM) | -|Display |Super VGA (800 x 600) or higher-resolution monitor with 256 colors | -|Peripherals |Internet connection and a compatible pointing device | +| Item | Minimum requirements | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Computer/processor | 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) | +| Operating system |
        • Windows 10 (32-bit or 64-bit)
        • Windows 8.1 Update (32-bit or 64-bit)
        • Windows 7 with SP1 (32-bit or 64-bit)
        • Windows Server 2012 R2
        • Windows Server 2008 R2 with SP1 (64-bit only)
        | +| Memory |
        • Windows 10 (32-bit)-1 GB
        • Windows 10 (64-bit)-2 GB
        • Windows 8.1 Update (32-bit)-1 GB
        • Windows 8.1 Update (64-bit)-2 GB
        • Windows 7 with SP1 (32-bit or 64-bit)-512 MB
        • Windows Server 2012 R2-512 MB
        • Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
        | +| Hard drive space |
        • Windows 10 (32-bit)-16 GB
        • Windows 10 (64-bit)-20 GB
        • Windows 8.1 Update (32-bit)-16 GB
        • Windows 8.1 Update (64-bit)-20 GB
        • Windows 7 with SP1 (32-bit)-70 MB
        • Windows 7 with SP1 (64-bit)-120 MB
        • Windows Server 2012 R2-32 GB
        • Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
          • | +| Drive | CD-ROM drive (if installing from a CD-ROM) | +| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | +| Peripherals | Internet connection and a compatible pointing device | ## Support for .NET Framework You might experience start up issues where IE11 fails to launch an application that uses managed browser hosting controls with your legacy apps. This is because, starting with Internet Explorer 10, the browser started blocking legacy apps from using the .NET Framework 1.1 and 2.0. To fix this problem, see [.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md). @@ -53,9 +53,9 @@ IE11 is available in 108 languages for Windows 8.1 and Windows 10 and in 97 lan Computers running localized versions of Windows should run the same version of IE11. For example, if your employees use the Spanish edition of Windows, you should deploy the Spanish version of IE11. On the other hand, if your employees use multiple localized versions of Windows, like Spanish, French, and Catalan, you should install IE11 in one of the languages, and then install language packs for the others. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md index 70e872d6e8..ae44dfb1ef 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md @@ -32,49 +32,49 @@ In addition, if you no longer want your users to be able to turn Enterprise Mode **Important**
            Turning off both of these features turns off Enterprise Mode for your company. Turning off Enterprise Mode also causes any websites included in your employee’s manual site lists to not appear in Enterprise Mode. -  **To turn off the site list using Group Policy** + **To turn off the site list using Group Policy** -1. Open your Group Policy editor, like Group Policy Management Console (GPMC). +1. Open your Group Policy editor, like Group Policy Management Console (GPMC). -2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.

            -Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately. +2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.

            + Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately. - **To turn off local control using Group Policy** + **To turn off local control using Group Policy** -1. Open your Group Policy editor, like Group Policy Management Console (GPMC). +3. Open your Group Policy editor, like Group Policy Management Console (GPMC). -2. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**. +4. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**. -3. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality. +5. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality. - **To turn off the site list using the registry** + **To turn off the site list using the registry** -1. Open a registry editor, such as regedit.exe. +6. Open a registry editor, such as regedit.exe. -2. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.

            -You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers. +7. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.

            + You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers. -3. Close all and restart all instances of Internet Explorer.

            -IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on). +8. Close all and restart all instances of Internet Explorer.

            + IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on). - **To turn off local control using the registry** + **To turn off local control using the registry** -1. Open a registry editor, such as regedit.exe. +9. Open a registry editor, such as regedit.exe. -2. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.

            -You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers. +10. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.

            + You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers. -3. Close and restart all instances of IE.

            -Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on). +11. Close and restart all instances of IE.

            + Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on). ## Related topics - [What is Enterprise Mode?](what-is-enterprise-mode.md) - [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) - [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md index 3db018d21c..c562b6862a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md @@ -23,15 +23,15 @@ However, you might find that many intranet sites need you to use Windows Graphic - Add the following HTTP header to each site: `X-UA-TextLayoutMetrics: gdi` -

            **-OR-**

            +

            -OR-

            - Add the following <meta> tag to each site: `` Turning off natural metrics automatically turns on GDI metrics. -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md index 13237f05a6..ba48d04b38 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md @@ -37,28 +37,28 @@ Before you can use a site list with Enterprise Mode, you need to turn the functi **To turn on Enterprise Mode using Group Policy** -1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.

            -Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. +1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.

            + Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. - ![local group policy editor for using a site list](images/ie-emie-grouppolicysitelist.png) + ![local group policy editor for using a site list](images/ie-emie-grouppolicysitelist.png) -2. Click **Enabled**, and then in the **Options** area, type the location to your site list. +2. Click **Enabled**, and then in the **Options** area, type the location to your site list. - **To turn on Enterprise Mode using the registry** + **To turn on Enterprise Mode using the registry** -1. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. -

            -OR-

            -**For all users on the device:** Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. +3. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. +

            -OR-

            + For all users on the device: Open a registry editor, like regedit.exe and go to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode. -2. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example: +4. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example: - ![enterprise mode with site list in the registry](images/ie-emie-registrysitelist.png) + ![enterprise mode with site list in the registry](images/ie-emie-registrysitelist.png) - - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"` + - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"` - - **Local network:** `"SiteList"="\\network\shares\sites.xml"` + - **Local network:** `"SiteList"="\\network\shares\sites.xml"` - - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"` + - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"` All of your managed devices must have access to this location if you want them to be able to access and use Enterprise Mode and your site list. For information about how to create and use an Enterprise Mode site list, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). @@ -67,9 +67,9 @@ Turning this setting on also requires you to create and store a site list. For m - [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) - [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) - [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md index cab96d7e77..830bb995d5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md @@ -31,34 +31,34 @@ Besides turning on this feature, you also have the option to provide a URL for E **To turn on local control of Enterprise Mode using Group Policy** -1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting. +1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting. - ![group policy editor with emie setting](images/ie-emie-editpolicy.png) + ![group policy editor with emie setting](images/ie-emie-editpolicy.png) -2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu. +2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu. - **To turn on local control of Enterprise Mode using the registry** + **To turn on local control of Enterprise Mode using the registry** -1. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. +3. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. -2. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**. +4. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**. -3. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates. +5. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates. - ![edit registry string for data collection location](images/ie-emie-editregistrystring.png) + ![edit registry string for data collection location](images/ie-emie-editregistrystring.png) Your **Value data** location can be any of the following types: -- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

            **Important**
            -The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. -- **Local network location (like, https://*emieposturl*/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. -- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. +- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

            **Important**
            + The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. +- **Local network location (like, https://emieposturl/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. +- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md). -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md index ee54df987f..41c083dc6e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md @@ -32,15 +32,15 @@ For IE11, the UI has been changed to provide just the controls needed to support **To turn the toolbars back on** -- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu. -

            -OR-

            -In IE, press **ALT+V** to show the **View** menu, press **T** to enter the **Toolbars** menu, and then press: +- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu. +

            -OR-

            + In IE, press ALT+V to show the View menu, press T to enter the Toolbars menu, and then press: - - **C** to turn on the **Command Bar** + - **C** to turn on the **Command Bar** - - **F** to turn on the **Favorites Bar** + - **F** to turn on the **Favorites Bar** - - **S** to turn on the **Status Bar** + - **S** to turn on the **Status Bar** ## Where did the search box go? IE11 uses the **One Box** feature, which lets users type search terms directly into the **Address bar**. Any text entered into the **Address bar** that doesn't appear to be a URL is automatically sent to the currently selected search provider. @@ -48,11 +48,11 @@ IE11 uses the **One Box** feature, which lets users type search terms directly i >[!NOTE] >Depending on how you've set up your intranet search, the text entry might resolve to an intranet site. For more information about this, see [Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md). -  + -  + -  + diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md index 1599b24aa4..6c1dd0c421 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md @@ -19,14 +19,14 @@ IEAK 11 uses Setup information (.inf) files to provide uninstallation instructi **To add uninstallation instructions to the .inf files** -- Open the Registry Editor (regedit.exe) and add these registry keys: -``` -HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description" -HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line" -``` -Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked. -

            **Note**
            -Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the **Uninstall or change a program**. +- Open the Registry Editor (regedit.exe) and add these registry keys: + ``` + HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description" + HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line" + ``` + Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked. +

            Note
            + Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the Uninstall or change a program. ## Limitations .Inf files have limitations: @@ -37,9 +37,9 @@ Make sure your script removes the uninstallation registry key, too. Otherwise, t - You can't use **CopyFiles** to copy a file to another place on your hard drive, it can only copy files from the source disk to the destination directory. For information, see [INF CopyFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298510). -  + -  + diff --git a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md index 1712939781..0eb0c067b3 100644 --- a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md +++ b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md @@ -15,31 +15,31 @@ ms.date: 10/16/2017 # Internet Explorer 11 - FAQ for IT Pros -Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration. +Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration. ## Frequently Asked Questions **Q: What operating system does IE11 run on?** -- Windows 10 +- Windows 10 -- Windows 8.1 +- Windows 8.1 -- Windows Server 2012 R2 +- Windows Server 2012 R2 -- Windows 7 with Service Pack 1 (SP1) +- Windows 7 with Service Pack 1 (SP1) -- Windows Server 2008 R2 with Service Pack 1 (SP1) +- Windows Server 2008 R2 with Service Pack 1 (SP1) -**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
            -IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required. +**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
            +IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required. -**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
            -You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956). +**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
            +You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956). -**Q: How does IE11 integrate with Windows 8.1?**
            -IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences. +**Q: How does IE11 integrate with Windows 8.1?**
            +IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences. **Q: What are the new or improved security features?**
            IE11 offers improvements to Enhanced Protected Mode, password manager, and other security features. IE11 also turns on Transport Layer Security (TLS) 1.2 by default. @@ -65,9 +65,9 @@ Supported web standards include: For more information about specific changes and additions, see the [IE11 guide for developers](https://go.microsoft.com/fwlink/p/?LinkId=313188). **Q: What test tools exist to test for potential application compatibility issues?**
            -The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge. +The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge. -**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
            +**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
            It’s most likely because IE no longer starts apps that use managed browser hosting controls, like in the .NET Framework 1.1 and 2.0. You can get IE11 to use managed browser hosting controls again, by: - **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. @@ -80,7 +80,7 @@ For more information, see the [Web Applications](https://go.microsoft.com/fwlink Yes. You can review the XML-based [compatibility version list](https://go.microsoft.com/fwlink/p/?LinkId=403864). **Q: What is Enterprise Mode?**
            -Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.

            +Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.

            For more information, see [Turn on Enterprise Mode and use a site list](../ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md). **Q: What is the Enterprise Mode Site List Manager tool?**
            @@ -88,18 +88,18 @@ Enterprise Mode Site List Manager tool gives you a way to add websites to your E For more information, see all of the topics in [Use the Enterprise Mode Site List Manager](../ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md). **Q: Are browser plug-ins supported in IE11?**
            -The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight. +The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight. **Q: Is Adobe Flash supported on IE11?**
            -Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.

            +Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.

            **Important**
            -The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in. +The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in. -**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
            -No. Windows 8.1 doesn't support any of the previous versions of IE. +**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
            +No. Windows 8.1 doesn't support any of the previous versions of IE. **Q: Are there any new Group Policy settings in IE11?**
            -IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features: +IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features: - Turn off Page Prediction @@ -123,14 +123,14 @@ Visit the [Springboard Series for Microsoft Browsers](https://go.microsoft.com/f -**Q: Can I customize settings for IE on Windows 8.1?**
            +**Q: Can I customize settings for IE on Windows 8.1?**
            Settings can be customized in the following ways: - IE11 **Settings** charm. - IE11-related Group Policy settings. -- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop. +- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop. **Q: Can I make Internet Explorer for the desktop my default browsing experience?**
            Group Policy settings can be set to open either IE or Internet Explorer for the desktop as the default browser experience. Individual users can configure their own settings in the **Programs** tab of **Internet Options**. The following table shows the settings and results:

            @@ -146,6 +146,7 @@ Group Policy settings can be set to open either IE or Internet Explorer for the Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: + | | | | |---------|---------|---------| |[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | diff --git a/browsers/internet-explorer/ie11-faq/faq-ieak11.md b/browsers/internet-explorer/ie11-faq/faq-ieak11.md index 90b6b07077..da2478e9e8 100644 --- a/browsers/internet-explorer/ie11-faq/faq-ieak11.md +++ b/browsers/internet-explorer/ie11-faq/faq-ieak11.md @@ -37,7 +37,7 @@ You can customize and install IEAK 11 on the following supported operating syste >[!Note] >IEAK 11 does not support building custom packages for Windows RT. -   + **What can I customize with IEAK 11?** @@ -53,7 +53,7 @@ Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of >IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. To download IEAK 11, see [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md). **Q: Is there a version of the Internet Explorer Administration Kit (IEAK) supporting IE11?**
            -Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources: +Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources: - [Internet Explorer Administration Kit Information and Downloads](https://go.microsoft.com/fwlink/p/?LinkId=214250) on the Internet Explorer TechCenter. @@ -99,6 +99,7 @@ The following table displays which pages are available in IEAK 11, based on the Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: + | | | | |---------|---------|---------| |[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | diff --git a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md index 45c8e74ea4..3c1997587f 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md @@ -26,13 +26,13 @@ Before you can set up your environment to use automatic detection, you need to t ## Automatic detection on DHCP and DNS servers Automatic detection works even if the browser wasn't originally set up or installed by the administrator. -- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts. -

            **Note**
            -Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options.   +- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts. +

            Note
            + Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options. -- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file. -

            **Note**
            -DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen. +- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file. +

            Note
            + DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen. **To set up automatic detection for DHCP servers** @@ -46,16 +46,16 @@ DHCP has a higher priority than DNS for automatic configuration. If DHCP provide **To set up automatic detection for DNS servers** -1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

            The syntax is:
            -` IN A `
            -`corserv IN A 192.55.200.143`
            -`nameserver2 IN A 192.55.200.2`
            -`mailserver1 IN A 192.55.200.51` -

            **-OR-**

            -Create a canonical name (CNAME) alias record, named **WPAD**. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

            -**Note**
            For more info about creating a **WPAD** entry, see [Creating a WPAD entry in DNS](https://go.microsoft.com/fwlink/p/?LinkId=294651).  +1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

            The syntax is:
            + ` IN A `
            + `corserv IN A 192.55.200.143`
            + `nameserver2 IN A 192.55.200.2`
            + `mailserver1 IN A 192.55.200.51` +

            -OR-

            + Create a canonical name (CNAME) alias record, named WPAD. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

            + Note
            For more info about creating a WPAD entry, see Creating a WPAD entry in DNS. -2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file. +2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file. **Note**
            IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. diff --git a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md index 963033b456..5b332edf14 100644 --- a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md @@ -19,7 +19,7 @@ The **Browser User Interface** page of the Internet Explorer Customization Wizar **Note**
            The customizations you make on this page apply only to Internet Explorer for the desktop. - **To use the Browser User Interface page** + **To use the Browser User Interface page** 1. Check the **Customize Title Bars** box so you can add your custom text to the **Title Bar Text** box.

            The text shows up in the title bar as **IE provided by** <*your_custom_text*>. @@ -28,27 +28,27 @@ The text shows up in the title bar as **IE provided by** <*your_custom_text*& **Note**
            Only Administrators can use this option. -3. Click **Add** to add new toolbar buttons.

            -The **Browser Toolbar Button Information** box appears. +3. Click **Add** to add new toolbar buttons.

            + The **Browser Toolbar Button Information** box appears. -4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters. +4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters. -5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button. +5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button. -6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels. +6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels. -7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.

            -This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**. +7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.

            + This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**. -8. Click **OK.** +8. Click **OK.** -9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed. +9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed. 10. Click **Next** to go to the [Search Providers](search-providers-ieak11-wizard.md) page or **Back** to go to the [User Experience](user-experience-ieak11-wizard.md) page. -  + -  + diff --git a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md index 5a75d7fb4e..4ef7b729f2 100644 --- a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md @@ -27,15 +27,15 @@ The **Connection Settings** page of the Internet Explorer Administration Kit (IE **To use the Connection Settings page** -1. Decide if you want to customize your connection settings. You can pick: +1. Decide if you want to customize your connection settings. You can pick: - - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings. + - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings. - - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings. + - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings. - **Note**
            If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes. + **Note**
            If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes. -2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers. +2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers. -3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page. +3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page. diff --git a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md index b7f442d8e2..ecca772d78 100644 --- a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md @@ -17,7 +17,8 @@ ms.date: 07/27/2017 # Use the CustomBranding .INS file to create custom branding and setup info Provide the URL to your branding cabinet (.cab) file. -|Name |Value | Description | -|-----------|--------------------------------|--------------------------------------------------------------| -|Branding |`` |The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab.| + +| Name | Value | Description | +|----------|------------------|------------------------------------------------------------------------------------------------------------------------| +| Branding | `` | The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab. | diff --git a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md index 6ef3d733a3..20a747a5db 100644 --- a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md +++ b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md @@ -24,13 +24,13 @@ You can customize Automatic Search so that your employees can type a single word **To set up Automatic Search** -1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.

            -For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).

            -**Important**
            If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location. +1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.

            + For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).

            + **Important**
            If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location. -2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**. +2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**. -3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box. +3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box. **To redirect to a different site than the one provided by the search results** @@ -93,9 +93,9 @@ end if %> ``` -  + -  + diff --git a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md index 258d927770..705f4822e4 100644 --- a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md @@ -20,11 +20,11 @@ Info about whether to hide the globally unique identifier (GUID) for each of you |Name |Value |Description | |------|-------------------------------------------------------------------------------------|-----------------------------------------------| |GUID |

            • **0.** Component isn't hidden.
            • **1.** Component is hidden.
            |Determines whether this is a hidden component. | -  + -  + -  + diff --git a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md index 3bbd0b4a27..2631d361e7 100644 --- a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md @@ -17,44 +17,45 @@ ms.date: 10/23/2018 # Determine the licensing version and features to use in IEAK 11 In addition to the Software License Terms for the Internet Explorer Administration Kit 11 (IEAK 11, referred to as the "software"), these Guidelines further define how you may and may not use the software to create versions of Internet Explorer 11 with optional customizations (referred to as the "customized browser") for internal use and distribution in accordance with the IEAK 11 Software License Terms. IEAK 11 is for testing purposes only and is not intended to be used in a production environment. -During installation, you must pick a version of IEAK 11, either **External** or **Internal**, based on your license agreement. Your version selection decides the options you can chose, the steps you follow to deploy your Internet Explorer 11 package, and how you manage the browser after deployment. +During installation, you must pick a version of IEAK 11, either **External** or **Internal**, based on your license agreement. Your version selection decides the options you can chose, the steps you follow to deploy your Internet Explorer 11 package, and how you manage the browser after deployment. - **External Distribution as an Internet Service Provider (ISP), Internet Content Provider (ICP), or Developer.** If you are an ISP or an ICP, your license agreement also states that you must show the Internet Explorer logo on your packaging and promotional goods, as well as on your website. >[!IMPORTANT] - >Original Equipment Manufacturers (OEMs) that install IEAK 11 as part of a Windows product, under an OEM license agreement with Microsoft, must use their appropriate Windows OEM Preinstallation document (OPD) as the guide for allowable customizations. + >Original Equipment Manufacturers (OEMs) that install IEAK 11 as part of a Windows product, under an OEM license agreement with Microsoft, must use their appropriate Windows OEM Preinstallation document (OPD) as the guide for allowable customizations. - **Internal Distribution via a Corporate Intranet.** This version is for network admins that plan to directly deploy IE11 into a corporate environment. ## Available features by version -| Feature | Internal | External | -| ---------------------------------------- | :---------------------------------------------: | :----------------------------------------------: | -|Welcome screen | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|File locations | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Platform selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Language selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Package type selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Feature selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Automatic Version Synchronization (AVS) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Custom components | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Internal install | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|User experience | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|Browser user interface | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Search providers | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Important URLs – Home page and support | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Accelerators | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Favorites, Favorites bar, and feeds | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Browsing options | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|First Run wizard and Welcome page options | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Connection manager | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Connection settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Automatic configuration | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|Proxy settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Security and privacy settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|Add a root certificate | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|Programs | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | -|Additional settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | -|Wizard complete | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Feature | Internal | External | +|-------------------------------------------|:--------------------------------------------------------------------------------:|:------------------------------------------------------------------------------------:| +| Welcome screen | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| File locations | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Platform selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Language selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Package type selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Feature selection | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Automatic Version Synchronization (AVS) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Custom components | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Internal install | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| User experience | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| Browser user interface | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Search providers | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Important URLs – Home page and support | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Accelerators | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Favorites, Favorites bar, and feeds | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Browsing options | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| First Run wizard and Welcome page options | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Connection manager | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Connection settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Automatic configuration | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| Proxy settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Security and privacy settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| Add a root certificate | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| Programs | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | +| Additional settings | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Not available](https://docs.microsoft.com/microsoft-edge/deploy/images/148766.png) | +| Wizard complete | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | ![Available](https://docs.microsoft.com/microsoft-edge/deploy/images/148767.png) | + --- diff --git a/browsers/internet-explorer/ie11-ieak/user-experience-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/user-experience-ieak11-wizard.md index dbcebe65ca..b9d51e17e5 100644 --- a/browsers/internet-explorer/ie11-ieak/user-experience-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/user-experience-ieak11-wizard.md @@ -21,38 +21,38 @@ The **User Experience** page of the Internet Explorer Customization Wizard 11 le **To use the User Experience page** -1. Choose how your employee should interact with Setup, including: +1. Choose how your employee should interact with Setup, including: - - **Interactive installation**. Lets your employees change installation options while installing your custom package. This experience shows all of the progress and error messages throughout the process. + - **Interactive installation**. Lets your employees change installation options while installing your custom package. This experience shows all of the progress and error messages throughout the process. - - **Hands-free installation**. Lets you make all of the decisions for your employees. However, they’ll still see all of the progress and error messages throughout the process. + - **Hands-free installation**. Lets you make all of the decisions for your employees. However, they’ll still see all of the progress and error messages throughout the process. - - **Completely silent installation**. Lets you make all of the decisions for your employees and hides all of the progress and error messages. Because this mode is completely silent, if the installation fails, your employees won’t know and they won’t be able to run the installation package again. -

            Both the hands-free and completely silent installation options will: + - **Completely silent installation**. Lets you make all of the decisions for your employees and hides all of the progress and error messages. Because this mode is completely silent, if the installation fails, your employees won’t know and they won’t be able to run the installation package again. +

            Both the hands-free and completely silent installation options will: - - Answer prompts so Setup can continue. + - Answer prompts so Setup can continue. - - Accept the license agreement. + - Accept the license agreement. - - Determine that Internet Explorer 11 is installed and not just downloaded. + - Determine that Internet Explorer 11 is installed and not just downloaded. - - Perform your specific installation type. + - Perform your specific installation type. - - Install IE in the default location, unless it is already installed. In that case, the new version of the browser is installed in the same location as the previous version. + - Install IE in the default location, unless it is already installed. In that case, the new version of the browser is installed in the same location as the previous version. -2. Choose if your employee’s device will restart at the end of Setup. +2. Choose if your employee’s device will restart at the end of Setup. - - **Default**. Prompts your employees to restart after installing IE. + - **Default**. Prompts your employees to restart after installing IE. - - **No restart**. Doesn’t restart the computer after installing IE. The employee will have to manually restart later. + - **No restart**. Doesn’t restart the computer after installing IE. The employee will have to manually restart later. - - **Force restart**. Automatically restarts the computer after installing IE. + - **Force restart**. Automatically restarts the computer after installing IE. -3. Click **Next** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page or **Back** to go to the [Internal Install](internal-install-ieak11-wizard.md) page. +3. Click **Next** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page or **Back** to go to the [Internal Install](internal-install-ieak11-wizard.md) page. -  + -  + diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json index dddf3dbe50..0652ccd8b0 100644 --- a/devices/hololens/docfx.json +++ b/devices/hololens/docfx.json @@ -4,7 +4,7 @@ { "files": [ "**/*.md", - "**/**.yml" + "**/**.yml" ], "exclude": [ "**/obj/**", @@ -29,27 +29,27 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/hololens/breadcrumb/toc.json", - "ms.technology": "windows", - "ms.topic": "article", - "ms.author": "jdecker", - "ms.date": "04/05/2017", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.itpro-hololens", - "folder_relative_path_in_docset": "./" - } - } - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/hololens/breadcrumb/toc.json", + "ms.technology": "windows", + "ms.topic": "article", + "ms.author": "jdecker", + "ms.date": "04/05/2017", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.itpro-hololens", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [ null ], "dest": "devices/hololens", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/devices/hololens/hololens-insider.md b/devices/hololens/hololens-insider.md index 20f745c009..bb56182d56 100644 --- a/devices/hololens/hololens-insider.md +++ b/devices/hololens/hololens-insider.md @@ -21,7 +21,7 @@ Welcome to the latest Insider Preview builds for HoloLens! It’s simple to get ## How do I install the Insider builds? -On a device running the Windows 10 April 2018 Update, go to **Settings -> Update & Security -> Windows Insider Program** and select **Get started**. Link the account you used to register as a Windows Insider. +On a device running the Windows 10 April 2018 Update, go to Settings -> Update & Security -> Windows Insider Program and select Get started. Link the account you used to register as a Windows Insider. Then, select **Active development of Windows**, choose whether you’d like to receive **Fast** or **Slow** builds, and review the program terms. diff --git a/devices/hololens/hololens-kiosk.md b/devices/hololens/hololens-kiosk.md index f0ad55c2f1..01dcda9e51 100644 --- a/devices/hololens/hololens-kiosk.md +++ b/devices/hololens/hololens-kiosk.md @@ -155,23 +155,23 @@ Use the following snippet in your kiosk configuration XML to enable the **Guest* 6. Expand **Runtime settings** > **AssignedAccess** > **MultiAppAssignedAccessSettings**. 7. In the center pane, click **Browse** to locate and select the kiosk configuration XML file that you created. - ![Screenshot of the MultiAppAssignedAccessSettings field in Windows Configuration Designer](images/multiappassignedaccesssettings.png) + ![Screenshot of the MultiAppAssignedAccessSettings field in Windows Configuration Designer](images/multiappassignedaccesssettings.png) 8. (**Optional**: If you want to apply the provisioning package after device initial setup and there is an admin user already available on the kiosk device, skip this step.) Create an admin user account in **Runtime settings** > **Accounts** > **Users**. Provide a **UserName** and **Password**, and select **UserGroup** as **Administrators**. With this account, you can view the provisioning status and logs if needed. -8. (**Optional**: If you already have a non-admin account on the kiosk device, skip this step.) Create a local standard user account in **Runtime settings** > **Accounts** > **Users**. Make sure the **UserName** is the same as the account that you specify in the configuration XML. Select **UserGroup** as **Standard Users**. -8. On the **File** menu, select **Save.** -9. On the **Export** menu, select **Provisioning package**. -10. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** +9. (**Optional**: If you already have a non-admin account on the kiosk device, skip this step.) Create a local standard user account in **Runtime settings** > **Accounts** > **Users**. Make sure the **UserName** is the same as the account that you specify in the configuration XML. Select **UserGroup** as **Standard Users**. +10. On the **File** menu, select **Save.** +11. On the **Export** menu, select **Provisioning package**. +12. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** -11. On the **Provisioning package security** page, do not select **Enable package encryption** or provisioning will fail on HoloLens. You can choose to enable package signing. +13. On the **Provisioning package security** page, do not select **Enable package encryption** or provisioning will fail on HoloLens. You can choose to enable package signing. - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Browse** and choosing the certificate you want to use to sign the package. -12. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Configuration Designer uses the project folder as the output location. Optionally, you can click **Browse** to change the default output location. +14. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Configuration Designer uses the project folder as the output location. Optionally, you can click **Browse** to change the default output location. -13. Click **Next**. +15. Click **Next**. -14. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. +16. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. diff --git a/devices/hololens/hololens-provisioning.md b/devices/hololens/hololens-provisioning.md index 6e658e8ddb..5e85f10bec 100644 --- a/devices/hololens/hololens-provisioning.md +++ b/devices/hololens/hololens-provisioning.md @@ -61,7 +61,7 @@ Use the Windows Configuration Designer tool to create a provisioning package. 2. Click **Provision HoloLens devices**. - ![ICD start options](images/icd-create-options-1703.png) + ![ICD start options](images/icd-create-options-1703.png) 3. Name your project and click **Finish**. @@ -74,12 +74,12 @@ Use the Windows Configuration Designer tool to create a provisioning package. - - - - - - + + + + + +
            ![step one](images/one.png)![set up device](images/set-up-device.png)

            Browse to and select the enterprise license file to upgrade the HoloLens edition.

            You can also toggle **Yes** or **No** to hide parts of the first experience.

            To set up the device without the need to connect to a Wi-Fi network, toggle **Skip Wi-Fi setup** to **On**.

            Select a region and timezone in which the device will be used.
            ![Select enterprise licence file and configure OOBE](images/set-up-device-details.png)
            ![step two](images/two.png) ![set up network](images/set-up-network.png)

            In this section, you can enter the details of the Wi-Fi wireless network that the device should connect to automatically. To do this, select **On**, enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.
            ![Enter network SSID and type](images/set-up-network-details-desktop.png)
            ![step three](images/three.png) ![account management](images/account-management.png)

            You can enroll the device in Azure Active Directory, or create a local account on the device

            Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

            To create a local account, select that option and enter a user name and password.

            **Important:** (For Windows 10, version 1607 only) If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
            ![join Azure AD or create a local account](images/account-management-details.png)
            ![step four](images/four.png) ![add certificates](images/add-certificates.png)

            To provision the device with a certificate, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.
            ![add a certificate](images/add-certificates-details.png)
            ![step five](images/five.png) ![Developer Setup](images/developer-setup.png)

            Toggle **Yes** or **No** to enable Developer Mode on the HoloLens. [Learn more about Developer Mode.](https://docs.microsoft.com/windows/uwp/get-started/enable-your-device-for-development#developer-mode)
            ![Enable Developer Mode](images/developer-setup-details.png)
            ![step six](images/six.png) ![finish](images/finish.png)

            Do not set a password to protect your provisioning package. If the provisioning package is protected by a password, provisioning the HoloLens device will fail.
            ![Protect your package](images/finish-details.png)
            step oneset up device

            Browse to and select the enterprise license file to upgrade the HoloLens edition.

            You can also toggle Yes or No to hide parts of the first experience.

            To set up the device without the need to connect to a Wi-Fi network, toggle Skip Wi-Fi setup to On.

            Select a region and timezone in which the device will be used.
            Select enterprise licence file and configure OOBE
            step two set up network

            In this section, you can enter the details of the Wi-Fi wireless network that the device should connect to automatically. To do this, select On, enter the SSID, the network type (Open or WPA2-Personal), and (if WPA2-Personal) the password for the wireless network.
            Enter network SSID and type
            step three account management

            You can enroll the device in Azure Active Directory, or create a local account on the device

            Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, set up Azure AD join in your organization. The maximum number of devices per user setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click Get bulk token. In the Let's get you signed in window, enter an account that has permissions to join a device to Azure AD, and then the password. Click Accept to give Windows Configuration Designer the necessary permissions.

            To create a local account, select that option and enter a user name and password.

            Important: (For Windows 10, version 1607 only) If you create a local account in the provisioning package, you must change the password using the Settings app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
            join  Azure AD or create a local  account
            step four add certificates

            To provision the device with a certificate, click Add a certificate. Enter a name for the certificate, and then browse to and select the certificate to be used.
            add a certificate
            step five Developer Setup

            Toggle Yes or No to enable Developer Mode on the HoloLens. Learn more about Developer Mode.
            Enable Developer Mode
            step six finish

            Do not set a password to protect your provisioning package. If the provisioning package is protected by a password, provisioning the HoloLens device will fail.
            Protect your package
            After you're done, click **Create**. It only takes a few seconds. When the package is built, the location where the package is stored is displayed as a hyperlink at the bottom of the page. diff --git a/devices/hololens/hololens-whats-new.md b/devices/hololens/hololens-whats-new.md index 52001e1cc3..c250d1c12c 100644 --- a/devices/hololens/hololens-whats-new.md +++ b/devices/hololens/hololens-whats-new.md @@ -35,14 +35,14 @@ Share from Microsoft Edge | Share button is now available on Microsoft Edge wind ### For administrators -Feature | Details ---- | --- -[Enable post-setup provisioning](hololens-provisioning.md) | You can now apply a runtime provisioning package at any time using **Settings**. -Assigned access with Azure AD groups | You can now use Azure AD groups for configuration of Windows assigned access to set up single or multi-app kiosk configuration. -PIN sign-in on profile switch from sign-in screen | PIN sign-in is now available for **Other User**.  | When signing in as **Other User**, the PIN option is now available under **Sign-In options**. -Sign in with Web Credential Provider using password | You can now select the Globe sign-in option to launch web sign-in with your password. From the sign-in screen, select **Sign-In options** and select the Globe option to launch web sign-in. Enter your user name if needed, then your password.
            **Note:** You can choose to bypass any PIN/Smartcard options when prompted during web sign-in.  -Read device hardware info through MDM so devices can be tracked by serial # | IT administrators can see and track HoloLens by device serial number in their MDM console. Refer to your MDM documentation for feature availability and instructions. -Set HoloLens device name through MDM (rename) |  IT administrators can see and rename HoloLens devices in their MDM console. Refer to your MDM documentation for feature availability and instructions. +| Feature | Details | +|-----------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| [Enable post-setup provisioning](hololens-provisioning.md) | You can now apply a runtime provisioning package at any time using **Settings**. | +| Assigned access with Azure AD groups | You can now use Azure AD groups for configuration of Windows assigned access to set up single or multi-app kiosk configuration. | +| PIN sign-in on profile switch from sign-in screen | PIN sign-in is now available for **Other User**.  | +| Sign in with Web Credential Provider using password | You can now select the Globe sign-in option to launch web sign-in with your password. From the sign-in screen, select **Sign-In options** and select the Globe option to launch web sign-in. Enter your user name if needed, then your password.
            **Note:** You can choose to bypass any PIN/Smartcard options when prompted during web sign-in.  | +| Read device hardware info through MDM so devices can be tracked by serial # | IT administrators can see and track HoloLens by device serial number in their MDM console. Refer to your MDM documentation for feature availability and instructions. | +| Set HoloLens device name through MDM (rename) |  IT administrators can see and rename HoloLens devices in their MDM console. Refer to your MDM documentation for feature availability and instructions. | ### For international customers diff --git a/devices/hololens/index.md b/devices/hololens/index.md index 9b7ed69845..e3790fbfb5 100644 --- a/devices/hololens/index.md +++ b/devices/hololens/index.md @@ -14,7 +14,7 @@ ms.date: 07/27/2018 - +

            Microsoft HoloLens is the first fully self-contained holographic computer running Windows 10.

            Microsoft HoloLens is available in the **Development Edition**, which runs Windows Holographic (an edition of Windows 10 designed for HoloLens), and in the **Commercial Suite**, which runs Windows Holographic for Business when you apply the Enterprise license file to the device.

            ![Hololens](images/hololens.png)

            Microsoft HoloLens is the first fully self-contained holographic computer running Windows 10.

            Microsoft HoloLens is available in the Development Edition, which runs Windows Holographic (an edition of Windows 10 designed for HoloLens), and in the Commercial Suite, which runs Windows Holographic for Business when you apply the Enterprise license file to the device.

            Hololens
            ## In this section diff --git a/devices/surface-hub/connect-and-display-with-surface-hub.md b/devices/surface-hub/connect-and-display-with-surface-hub.md index 1edb01f238..86d6848826 100644 --- a/devices/surface-hub/connect-and-display-with-surface-hub.md +++ b/devices/surface-hub/connect-and-display-with-surface-hub.md @@ -109,7 +109,7 @@ Use these ports on the Surface Hub for Guest Mode. -  + ### Port locations @@ -224,7 +224,7 @@ Your choice of video cable will be determined by what is available from your sou -  + Source audio is provided by DisplayPort and HDMI cables. If you must use VGA, Surface Hub has an audio input port that uses a 3.5 mm plug. Surface Hub also uses a USB cable that provides Touchback and Inkback from the Surface Hub to compatible Windows 10 devices. The USB cable can be used with any video input that is already connected with a cable. @@ -275,20 +275,20 @@ Check directly with graphics card vendors for the latest drivers.

            NVIDIA

            -

            [http://nvidia.com/Download/index.aspx](http://nvidia.com/Download/index.aspx)

            +

            http://nvidia.com/Download/index.aspx

            AMD

            -

            [http://support.amd.com/en-us/download](http://support.amd.com/en-us/download)

            +

            http://support.amd.com/en-us/download

            Intel

            -

            [https://downloadcenter.intel.com/](https://downloadcenter.intel.com/)

            +

            https://downloadcenter.intel.com/

            -  + ### Ports @@ -347,7 +347,7 @@ Replacement PC ports on 55" Surface Hub -  + Replacement PC ports on 84" Surface Hub @@ -404,7 +404,7 @@ Replacement PC ports on 84" Surface Hub -  + ### Replacement PC setup instructions @@ -439,9 +439,9 @@ You can switch the Surface Hub to use the internal PC. 3. Turn on the Surface Hub using the power switch next to the power cable. -  + ## Video Out -  + The Surface Hub includes a Video Out port for mirroring visual content from the Surface Hub to another display. ### Ports diff --git a/devices/surface-hub/create-a-device-account-using-office-365.md b/devices/surface-hub/create-a-device-account-using-office-365.md index f38240fe4d..6c133e978d 100644 --- a/devices/surface-hub/create-a-device-account-using-office-365.md +++ b/devices/surface-hub/create-a-device-account-using-office-365.md @@ -245,7 +245,7 @@ You can use the Exchange Admin Center to create a device account: >[!NOTE] >If you want to create and assign a policy to the account you created, and are using Exchange 2010, look up the corresponding information regarding policy creation and policy assignment when using the EMC (Exchange management console). -  + 1. Go to the Exchange Admin Center. @@ -373,11 +373,11 @@ If you aren't sure what value to use for the `RegistrarPool` parameter in your e Get-CsOnlineUser -Identity ‘alice@contoso.microsoft.com’| fl *registrarpool* ``` -3. To enable your Surface Hub account for Skype for Business Server, run this cmdlet: +3. To enable your Surface Hub account for Skype for Business Server, run this cmdlet: - ```PowerShell - Enable-CsMeetingRoom -Identity $strEmail -RegistrarPool "sippoolbl20a04.infra.lync.com" -SipAddressType EmailAddress - ``` + ```PowerShell + Enable-CsMeetingRoom -Identity $strEmail -RegistrarPool "sippoolbl20a04.infra.lync.com" -SipAddressType EmailAddress + ``` diff --git a/devices/surface-hub/docfx.json b/devices/surface-hub/docfx.json index 9feee3c192..c5b96ab0fe 100644 --- a/devices/surface-hub/docfx.json +++ b/devices/surface-hub/docfx.json @@ -1,43 +1,50 @@ { "build": { - "content": - [ - { - "files": ["**/**.md", "**/**.yml"], - "exclude": ["**/obj/**"] - } - ], + "content": [ + { + "files": [ + "**/**.md", + "**/**.yml" + ], + "exclude": [ + "**/obj/**" + ] + } + ], "resource": [ - { - "files": ["**/images/**"], - "exclude": ["**/obj/**"] + { + "files": [ + "**/images/**" + ], + "exclude": [ + "**/obj/**" + ] + } + ], + "globalMetadata": { + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/surface-hub/breadcrumb/toc.json", + "ROBOTS": "INDEX, FOLLOW", + "ms.technology": "windows", + "ms.topic": "article", + "ms.mktglfcycl": "manage", + "author": "jdeckerms", + "ms.sitesec": "library", + "ms.author": "jdecker", + "ms.date": "05/23/2017", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.surface-hub", + "folder_relative_path_in_docset": "./" } - ], - "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/surface-hub/breadcrumb/toc.json", - "ROBOTS": "INDEX, FOLLOW", - "ms.technology": "windows", - "ms.topic": "article", - "ms.mktglfcycl": "manage", - "author": "jdeckerms", - "ms.sitesec": "library", - "ms.author": "jdecker", - "ms.date": "05/23/2017", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.surface-hub", - "folder_relative_path_in_docset": "./" - } - } + } }, - "externalReference": [ - ], + "externalReference": [], "template": "op.html", "dest": "devices/surface-hub", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/devices/surface-hub/first-run-program-surface-hub.md b/devices/surface-hub/first-run-program-surface-hub.md index 6ac1859c6c..375ee1686d 100644 --- a/devices/surface-hub/first-run-program-surface-hub.md +++ b/devices/surface-hub/first-run-program-surface-hub.md @@ -40,7 +40,7 @@ Each of these sections also contains information about paths you might take when >[!NOTE] >You should have the separate keyboard that came with your Surface Hub set up and ready before beginning. See the Surface Hub Setup Guide for details. -  + ## Hi there page @@ -50,7 +50,7 @@ This is the first screen you'll see when you power up the Surface Hub for the fi >[!NOTE] >This is also where you begin the optional process of deploying a provisioning package. See [Create provisioning packages](provisioning-packages-for-certificates-surface-hub.md) if that's what you're doing. - Select a language and the initial setup options are displayed. + Select a language and the initial setup options are displayed. ![Image showing ICD options checklist.](images/setuplocale.png) @@ -68,7 +68,7 @@ If the default values shown are correct, then you can click **Next** to go on. O >[!NOTE] > Once the settings on this page are entered, you can't come back to this screen unless you reset the device (see [Device reset](device-reset-surface-hub.md)). Make sure that the settings are properly configured before proceeding. -  + When the settings are accepted, the device will check for a wired network connection. If the connection is fine, it will display the [Set up for you page](#set-up-for-you). If there is a problem with the wired connection, the device will display the [Network setup page](#network-setup). @@ -90,7 +90,7 @@ This screen is shown only if the device fails to detect a wired network. If you >[!NOTE] >If you skip this, the device will not have a network connection, and nothing that requires a network connection will work on your Surface Hub, including system updates and email and calendar synchronization. You can connect to a wireless network later using Settings (see [Wireless network managment](wireless-network-management-for-surface-hub.md)). -   + - You can plug in a network cable while this screen is visible. The device will detect it, and will add **Next** to the screen. Click **Next** to continue with making the wired connection. @@ -125,7 +125,7 @@ This page will be shown when the device detects a wired connection with limited - You can skip connecting to a network by selecting **Skip this step**. You'll be taken to the [Set up for you page](#set-up-for-you). **Note**  If you skip this, the device will not have a network connection, and nothing that requires a network connection will work on your Surface Hub, including things like email and calendar synchronization. You can connect to a wireless network later using Settings (see [Wireless network managment](wireless-network-management-for-surface-hub.md)). -   + - You can select **Enter proxy settings** which will allow you to specify how to use the network proxy. You'll be taken to the next screen. @@ -151,7 +151,7 @@ You can skip connecting to a network by selecting **Skip this step**. You'll be >[!NOTE] >If you skip this, the device will not have a network connection, and nothing that requires a network connection will work on your Surface Hub, including things like email and calendar synchronization. You can connect to a wireless network later using Settings (see [Wireless network managment](wireless-network-management-for-surface-hub.md)). -  + ## Set up for you page @@ -185,12 +185,12 @@ On this page, the Surface Hub will ask for credentials for the device account th Use either a **user principal name (UPN)** or a **domain\\user name** as the account identifier in the first entry field. Use the format that matches your environment, and enter the password. -| Environment | Required format for device account| -| ------------ | ----------------------------------| -| Device account is hosted only online. | username@domain.com| -| Device account is hosted only on-prem. | DOMAIN\username| -| Device account is hosted online and on-prem (hybrid). | DOMAIN\username| +| Environment | Required format for device account | +|-------------------------------------------------------|------------------------------------| +| Device account is hosted only online. | username@domain.com | +| Device account is hosted only on-prem. | DOMAIN\username | +| Device account is hosted online and on-prem (hybrid). | DOMAIN\username | Click **Skip setting up a device account** to skip setting up a device account. However, if you don't set up a device account, the device will not be fully integrated into your infrastructure. For example, people won't be able to: @@ -319,7 +319,7 @@ Because every Surface Hub can be used by any number of authenticated employees, >[!NOTE] >The purpose of this page is primarily to determine who can configure the device from the device’s UI; that is, who can actually visit a device, log in, open up the Settings app, and make changes to the Settings. -  + ![Image showing Set up admins for this device page.](images/setupsetupadmins.png) @@ -357,7 +357,7 @@ This is what happens when you choose an option. >[!NOTE] >After you finish this process, you won't be able to change the device's admin option unless you reset the device. -  + ### Use Microsoft Azure Active Directory @@ -416,7 +416,7 @@ If the join is successful, you'll see the **Enter a security group** page. When >[!NOTE] >If you domain join the Surface Hub, you can't unjoin the device without resetting it. -  + ### Use a local admin @@ -442,7 +442,7 @@ This page will attempt to create a new admin account using the credentials that >[!IMPORTANT] >Before you do the updates, make sure you read [Save your BitLocker key](save-bitlocker-key-surface-hub.md) in order to make sure you have a backup of the key. -  + In order to get the latest features and fixes, you should update your Surface Hub as soon as you finish all of the preceding first-run steps. @@ -451,9 +451,9 @@ In order to get the latest features and fixes, you should update your Surface Hu 3. If updates are available, they will be downloaded. Once downloading is complete, click the **Update now** button to install the updates. 4. Follow the onscreen prompts after the updates are installed. You may need to restart the device. -  + -  + diff --git a/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md b/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md index b94c860539..ab66d2931a 100644 --- a/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md @@ -184,20 +184,20 @@ The following table lists the Office 365 plans and Skype for Business options. Once you've completed the preceding steps to enable your Surface Hub account in Skype for Business Online, you need to assign a license to the Surface Hub. Using the O365 administrative portal, assign either a Skype for Business Online (Plan 2) or a Skype for Business Online (Plan 3) to the device. - - Login as a tenant administrator, open the O365 Administrative Portal, and click on the Admin app. + - Login as a tenant administrator, open the O365 Administrative Portal, and click on the Admin app. - - Click on **Users and Groups** and then **Add users, reset passwords, and more**. + - Click on **Users and Groups** and then **Add users, reset passwords, and more**. - - Click the Surface Hub account, and then click the pen icon to edit the account information. + - Click the Surface Hub account, and then click the pen icon to edit the account information. - - Click **Licenses**. + - Click **Licenses**. - - In **Assign licenses**, select Skype for Business (Plan 1) or Skype for Business (Plan 2), depending on your licensing and Enterprise Voice requirements. You'll have to use a Plan 2 license if you want to use Enterprise Voice on your Surface Hub. + - In **Assign licenses**, select Skype for Business (Plan 1) or Skype for Business (Plan 2), depending on your licensing and Enterprise Voice requirements. You'll have to use a Plan 2 license if you want to use Enterprise Voice on your Surface Hub. - - Click **Save**. + - Click **Save**. - >[!NOTE] - >You can also use the Windows Azure Active Directory Module for Windows Powershell to run the cmdlets needed to assign one of these licenses, but that's not covered here. + >[!NOTE] + >You can also use the Windows Azure Active Directory Module for Windows Powershell to run the cmdlets needed to assign one of these licenses, but that's not covered here. For validation, you should be able to use any Skype for Business client (PC, Android, etc.) to sign in to this account. diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index 82f19b1a90..87ed316360 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -13,17 +13,17 @@ ms.localizationpriority: medium # Microsoft Surface Hub admin guide ->[Looking for the Surface Hub admin guide for Windows 10, version 1607?](https://download.microsoft.com/download/7/2/5/7252051B-7E97-4781-B5DF-58D4B1A4BB88/surface-hub-admin-guide-1607.pdf) - ->[Looking for the user's guide for Surface Hub?](https://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) +> [Looking for the Surface Hub admin guide for Windows 10, version 1607?](https://download.microsoft.com/download/7/2/5/7252051B-7E97-4781-B5DF-58D4B1A4BB88/surface-hub-admin-guide-1607.pdf) +> +> [Looking for the user's guide for Surface Hub?](https://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) -
            Microsoft Surface Hub is an all-in-one productivity device that is intended for brainstorming, collaboration, and presentations. In order to get the maximum benefit from Surface Hub, your organization’s infrastructure and the Surface Hub itself must be properly set up and integrated. The documentation in this library describes what needs to be done both before and during setup in order to help you optimize your use of the device.![image of a Surface Hub](images/surfacehub.png)
            -  +
            Microsoft Surface Hub is an all-in-one productivity device that is intended for brainstorming, collaboration, and presentations. In order to get the maximum benefit from Surface Hub, your organization’s infrastructure and the Surface Hub itself must be properly set up and integrated. The documentation in this library describes what needs to be done both before and during setup in order to help you optimize your use of the device.image of a Surface Hub
            + ## Surface Hub setup process -In some ways, adding your new Surface Hub is just like adding any other Microsoft Windows-based device to your network. However, in order to get your Surface Hub up and running at its full capacity, there are some very specific requirements. Here are the next topics you'll need: +In some ways, adding your new Surface Hub is just like adding any other Microsoft Windows-based device to your network. However, in order to get your Surface Hub up and running at its full capacity, there are some very specific requirements. Here are the next topics you'll need: 1. [Prepare your environment for Surface Hub](prepare-your-environment-for-surface-hub.md) 2. [Gather the information listed in the Setup worksheet](setup-worksheet-surface-hub.md) @@ -34,22 +34,20 @@ In some ways, adding your new Surface Hub is just like adding any other Microsof ## In this section -| Topic | Description | -| --- | --- | -| [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) | Discover the changes and improvements for Microsoft Surface Hub in the Windows 10, version 1703 release (also known as Creators Update). | -| [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) | This topic explains the differences between the operating system on Surface Hub and Windows 10 Enterprise. | -| [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) | This section contains an overview of the steps required to prepare your environment so that you can use all of the features of Surface Hub. See [Intro to Surface Hub](intro-to-surface-hub.md) for a description of how the device and its features interact with your IT environment. | -| [Set up Microsoft Surface Hub](set-up-your-surface-hub.md) | Set up instructions for Surface Hub include a setup worksheet, and a walkthrough of the first-run program. | -| [Manage Microsoft Surface Hub](manage-surface-hub.md) | How to manage your Surface Hub after finishing the first-run program. | -| [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) | -| [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) | This topic provides guidance on Wi-Fi Direct security risks, how the Surface Hub has addressed those risks, and how Surface Hub administrators can configure the device for the highest level of security. | PowerShell scripts to help set up and manage your Surface Hub. | -| [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | These are the top Microsoft Support solutions for common issues experienced using Surface Hub. | -| [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. | -| [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. | -| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents. | -| [Change history for Surface Hub](change-history-surface-hub.md) | This topic lists new and updated topics in the Surface Hub documentation library. | - - +| Topic | Description | +|---------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) | Discover the changes and improvements for Microsoft Surface Hub in the Windows 10, version 1703 release (also known as Creators Update). | +| [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) | This topic explains the differences between the operating system on Surface Hub and Windows 10 Enterprise. | +| [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) | This section contains an overview of the steps required to prepare your environment so that you can use all of the features of Surface Hub. See [Intro to Surface Hub](intro-to-surface-hub.md) for a description of how the device and its features interact with your IT environment. | +| [Set up Microsoft Surface Hub](set-up-your-surface-hub.md) | Set up instructions for Surface Hub include a setup worksheet, and a walkthrough of the first-run program. | +| [Manage Microsoft Surface Hub](manage-surface-hub.md) | How to manage your Surface Hub after finishing the first-run program. | +| [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) | | +| [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) | This topic provides guidance on Wi-Fi Direct security risks, how the Surface Hub has addressed those risks, and how Surface Hub administrators can configure the device for the highest level of security. | +| [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | These are the top Microsoft Support solutions for common issues experienced using Surface Hub. | +| [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. | +| [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. | +| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents. | +| [Change history for Surface Hub](change-history-surface-hub.md) | This topic lists new and updated topics in the Surface Hub documentation library. | ## Additional resources diff --git a/devices/surface-hub/manage-settings-with-mdm-for-surface-hub.md b/devices/surface-hub/manage-settings-with-mdm-for-surface-hub.md index ad894a91c1..a7c90874f6 100644 --- a/devices/surface-hub/manage-settings-with-mdm-for-surface-hub.md +++ b/devices/surface-hub/manage-settings-with-mdm-for-surface-hub.md @@ -58,30 +58,32 @@ You can configure the Surface Hub settings in the following table using MDM. The For more information, see [SurfaceHub configuration service provider](https://msdn.microsoft.com/library/windows/hardware/mt608323). -| Setting | Node in the SurfaceHub CSP | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| ---- | --- | --- | --- | --- | -| Maintenance hours | MaintenanceHoursSimple/Hours/StartTime
            MaintenanceHoursSimple/Hours/Duration | Yes | Yes | Yes | -| Automatically turn on the screen using motion sensors | InBoxApps/Welcome/AutoWakeScreen | Yes | Yes | Yes | -| Require a pin for wireless projection | InBoxApps/WirelessProjection/PINRequired | Yes | Yes | Yes | -| Enable wireless projection | InBoxApps/WirelessProjection/Enabled | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Miracast channel to use for wireless projection | InBoxApps/WirelessProjection/Channel | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Connect to your Operations Management Suite workspace | MOMAgent/WorkspaceID
            MOMAgent/WorkspaceKey | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Welcome screen background image | InBoxApps/Welcome/CurrentBackgroundPath | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Meeting information displayed on the welcome screen | InBoxApps/Welcome/MeetingInfoOption | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Friendly name for wireless projection | Properties/FriendlyName | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Device account, including password rotation | DeviceAccount/*``*
            See [SurfaceHub CSP](https://msdn.microsoft.com/library/windows/hardware/mt608323.aspx). | No | No | Yes | -| Specify Skype domain | InBoxApps/SkypeForBusiness/DomainName | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Auto launch Connect App when projection is initiated | InBoxApps/Connect/AutoLaunch | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set default volume | Properties/DefaultVolume | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set screen timeout | Properties/ScreenTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set session timeout | Properties/SessionTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set sleep timeout | Properties/SleepTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow session to resume after screen is idle | Properties/AllowSessionResume | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow device account to be used for proxy authentication | Properties/AllowAutoProxyAuth | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Disable auto-populating the sign-in dialog with invitees from scheduled meetings | Properties/DisableSignInSuggestions | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Disable "My meetings and files" feature in Start menu | Properties/DoNotShowMyMeetingsAndFiles | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set the LanProfile for 802.1x Wired Auth | Dot3/LanProfile | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Set the EapUserData for 802.1x Wired Auth | Dot3/EapUserData | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + +| Setting | Node in the SurfaceHub CSP | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|----------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Maintenance hours | MaintenanceHoursSimple/Hours/StartTime
            MaintenanceHoursSimple/Hours/Duration | Yes | Yes | Yes | +| Automatically turn on the screen using motion sensors | InBoxApps/Welcome/AutoWakeScreen | Yes | Yes | Yes | +| Require a pin for wireless projection | InBoxApps/WirelessProjection/PINRequired | Yes | Yes | Yes | +| Enable wireless projection | InBoxApps/WirelessProjection/Enabled | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Miracast channel to use for wireless projection | InBoxApps/WirelessProjection/Channel | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Connect to your Operations Management Suite workspace | MOMAgent/WorkspaceID
            MOMAgent/WorkspaceKey | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Welcome screen background image | InBoxApps/Welcome/CurrentBackgroundPath | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Meeting information displayed on the welcome screen | InBoxApps/Welcome/MeetingInfoOption | Yes | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Friendly name for wireless projection | Properties/FriendlyName | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Device account, including password rotation | DeviceAccount/*``*
            See [SurfaceHub CSP](https://msdn.microsoft.com/library/windows/hardware/mt608323.aspx). | No | No | Yes | +| Specify Skype domain | InBoxApps/SkypeForBusiness/DomainName | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Auto launch Connect App when projection is initiated | InBoxApps/Connect/AutoLaunch | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set default volume | Properties/DefaultVolume | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set screen timeout | Properties/ScreenTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set session timeout | Properties/SessionTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set sleep timeout | Properties/SleepTimeout | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow session to resume after screen is idle | Properties/AllowSessionResume | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow device account to be used for proxy authentication | Properties/AllowAutoProxyAuth | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Disable auto-populating the sign-in dialog with invitees from scheduled meetings | Properties/DisableSignInSuggestions | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Disable "My meetings and files" feature in Start menu | Properties/DoNotShowMyMeetingsAndFiles | Yes
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set the LanProfile for 802.1x Wired Auth | Dot3/LanProfile | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Set the EapUserData for 802.1x Wired Auth | Dot3/EapUserData | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. ### Supported Windows 10 settings @@ -91,66 +93,73 @@ In addition to Surface Hub-specific settings, there are numerous settings common The following tables include info on Windows 10 settings that have been validated with Surface Hub. There is a table with settings for these areas: security, browser, Windows Updates, Windows Defender, remote reboot, certificates, and logs. Each table identifies if the setting is supported with Microsoft Intune, System Center Configuration Manager, or SyncML. #### Security settings -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| --- | --- | --- |---- | --- | --- | -| Allow Bluetooth | Keep this enabled to support Bluetooth peripherals. | [Connectivity/AllowBluetooth](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Connectivity_AllowBluetooth) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Bluetooth policies | Use to set the Bluetooth device name, and block advertising, discovery, and automatic pairing. | Bluetooth/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow camera | Keep this enabled for Skype for Business. | [Camera/AllowCamera](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Camera_AllowCamera) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow location | Keep this enabled to support apps such as Maps. | [System/AllowLocation](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#System_AllowLocation) | Yes.
            . | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow telemetry | Keep this enabled to help Microsoft improve Surface Hub. | [System/AllowTelemetry](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#System_AllowTelemetry) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow USB Drives | Keep this enabled to support USB drives on Surface Hub | [System/AllowStorageCard](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowstoragecard) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|--------------------|------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Allow Bluetooth | Keep this enabled to support Bluetooth peripherals. | [Connectivity/AllowBluetooth](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Connectivity_AllowBluetooth) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Bluetooth policies | Use to set the Bluetooth device name, and block advertising, discovery, and automatic pairing. | Bluetooth/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow camera | Keep this enabled for Skype for Business. | [Camera/AllowCamera](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Camera_AllowCamera) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow location | Keep this enabled to support apps such as Maps. | [System/AllowLocation](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#System_AllowLocation) | Yes.
            . | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow telemetry | Keep this enabled to help Microsoft improve Surface Hub. | [System/AllowTelemetry](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#System_AllowTelemetry) | Yes.
            | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow USB Drives | Keep this enabled to support USB drives on Surface Hub | [System/AllowStorageCard](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowstoragecard) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Browser settings -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| --- | --- | --- |---- | --- | --- | -| Homepages | Use to configure the default homepages in Microsoft Edge. | [Browser/Homepages](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_Homepages) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow cookies | Surface Hub automatically deletes cookies at the end of a session. Use this to block cookies within a session. | [Browser/AllowCookies](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowCookies) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow developer tools | Use to stop users from using F12 Developer Tools. | [Browser/AllowDeveloperTools](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowDeveloperTools) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow Do Not Track | Use to enable Do Not Track headers. | [Browser/AllowDoNotTrack](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowDoNotTrack) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow pop-ups | Use to block pop-up browser windows. | [Browser/AllowPopups](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowPopups) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow search suggestions | Use to block search suggestions in the address bar. | [Browser/AllowSearchSuggestionsinAddressBar](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowSearchSuggestionsinAddressBar) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Allow SmartScreen | Keep this enabled to turn on SmartScreen. | [Browser/AllowSmartScreen](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowSmartScreen) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Prevent ignoring SmartScreen Filter warnings for websites | For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from accessing potentially malicious websites. | [Browser/PreventSmartScreenPromptOverride](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_PreventSmartScreenPromptOverride) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Prevent ignoring SmartScreen Filter warnings for files | For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from downloading unverified files from Microsoft Edge. | [Browser/PreventSmartScreenPromptOverrideForFiles](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_PreventSmartScreenPromptOverrideForFiles) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|-----------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Homepages | Use to configure the default homepages in Microsoft Edge. | [Browser/Homepages](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_Homepages) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow cookies | Surface Hub automatically deletes cookies at the end of a session. Use this to block cookies within a session. | [Browser/AllowCookies](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowCookies) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow developer tools | Use to stop users from using F12 Developer Tools. | [Browser/AllowDeveloperTools](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowDeveloperTools) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow Do Not Track | Use to enable Do Not Track headers. | [Browser/AllowDoNotTrack](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowDoNotTrack) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow pop-ups | Use to block pop-up browser windows. | [Browser/AllowPopups](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowPopups) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow search suggestions | Use to block search suggestions in the address bar. | [Browser/AllowSearchSuggestionsinAddressBar](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowSearchSuggestionsinAddressBar) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Allow SmartScreen | Keep this enabled to turn on SmartScreen. | [Browser/AllowSmartScreen](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_AllowSmartScreen) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Prevent ignoring SmartScreen Filter warnings for websites | For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from accessing potentially malicious websites. | [Browser/PreventSmartScreenPromptOverride](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_PreventSmartScreenPromptOverride) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Prevent ignoring SmartScreen Filter warnings for files | For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from downloading unverified files from Microsoft Edge. | [Browser/PreventSmartScreenPromptOverrideForFiles](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Browser_PreventSmartScreenPromptOverrideForFiles) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Windows Update settings -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML*? | -| --- | --- | --- |---- | --- | --- | -| Use Current Branch or Current Branch for Business | Use to configure Windows Update for Business – see [Windows updates](manage-windows-updates-for-surface-hub.md). | [Update/BranchReadinessLevel](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_BranchReadinessLevel) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Defer feature updates| See above. | [Update/ DeferFeatureUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferFeatureUpdatesPeriodInDays) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Defer quality updates | See above. | [Update/DeferQualityUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferQualityUpdatesPeriodInDays) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Pause feature updates | See above. | [Update/PauseFeatureUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseFeatureUpdates) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Pause quality updates | See above. | [Update/PauseQualityUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseQualityUpdates) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes| -| Configure device to use WSUS| Use to connect your Surface Hub to WSUS instead of Windows Update – see [Windows updates](manage-windows-updates-for-surface-hub.md). | [Update/UpdateServiceUrl](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_UpdateServiceUrl) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Delivery optimization | Use peer-to-peer content sharing to reduce bandwidth issues during updates. See [Configure Delivery Optimization for Windows 10](https://technet.microsoft.com/itpro/windows/manage/waas-delivery-optimization) for details. | DeliveryOptimization/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|---------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Use Current Branch or Current Branch for Business | Use to configure Windows Update for Business – see [Windows updates](manage-windows-updates-for-surface-hub.md). | [Update/BranchReadinessLevel](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_BranchReadinessLevel) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Defer feature updates | See above. | [Update/ DeferFeatureUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferFeatureUpdatesPeriodInDays) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Defer quality updates | See above. | [Update/DeferQualityUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferQualityUpdatesPeriodInDays) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Pause feature updates | See above. | [Update/PauseFeatureUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseFeatureUpdates) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Pause quality updates | See above. | [Update/PauseQualityUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseQualityUpdates) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Configure device to use WSUS | Use to connect your Surface Hub to WSUS instead of Windows Update – see [Windows updates](manage-windows-updates-for-surface-hub.md). | [Update/UpdateServiceUrl](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_UpdateServiceUrl) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Delivery optimization | Use peer-to-peer content sharing to reduce bandwidth issues during updates. See [Configure Delivery Optimization for Windows 10](https://technet.microsoft.com/itpro/windows/manage/waas-delivery-optimization) for details. | DeliveryOptimization/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Windows Defender settings -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| --- | --- | --- |---- | --- | --- | -| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Defender status | Use to initiate a Defender scan, force a Security intelligence update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|-------------------|----------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*``*
            See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Defender status | Use to initiate a Defender scan, force a Security intelligence update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Remote reboot -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| --- | --- | --- |---- | --- | --- | -| Reboot the device immediately | Use in conjunction with OMS to minimize support costs – see [Monitor your Microsoft Surface Hub](monitor-surface-hub.md). | ./Vendor/MSFT/Reboot/RebootNow
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes | No | Yes | -| Reboot the device at a scheduled date and time | See above. | ./Vendor/MSFT/Reboot/Schedule/Single
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | -| Reboot the device daily at a scheduled date and time | See above. | ./Vendor/MSFT/Reboot/Schedule/DailyRecurrent
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Reboot the device immediately | Use in conjunction with OMS to minimize support costs – see [Monitor your Microsoft Surface Hub](monitor-surface-hub.md). | ./Vendor/MSFT/Reboot/RebootNow
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes | No | Yes | +| Reboot the device at a scheduled date and time | See above. | ./Vendor/MSFT/Reboot/Schedule/Single
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Reboot the device daily at a scheduled date and time | See above. | ./Vendor/MSFT/Reboot/Schedule/DailyRecurrent
            See [Reboot CSP](https://msdn.microsoft.com/library/windows/hardware/mt720802.aspx) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Install certificates -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | -| --- | --- | --- |---- | --- | --- | -| Install trusted CA certificates | Use to deploy trusted root and intermediate CA certificates. | [RootCATrustedCertificates CSP](https://msdn.microsoft.com/library/windows/hardware/dn904970.aspx) | Yes.
            See [Configure Intune certificate profiles](https://docs.microsoft.com/intune/deploy-use/configure-intune-certificate-profiles). | Yes.
            See [How to create certificate profiles in System Center Configuration Manager](https://docs.microsoft.com/sccm/protect/deploy-use/create-certificate-profiles). | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|---------------------------------|--------------------------------------------------------------|----------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------| +| Install trusted CA certificates | Use to deploy trusted root and intermediate CA certificates. | [RootCATrustedCertificates CSP](https://msdn.microsoft.com/library/windows/hardware/dn904970.aspx) | Yes.
            See [Configure Intune certificate profiles](https://docs.microsoft.com/intune/deploy-use/configure-intune-certificate-profiles). | Yes.
            See [How to create certificate profiles in System Center Configuration Manager](https://docs.microsoft.com/sccm/protect/deploy-use/create-certificate-profiles). | Yes | + @@ -158,32 +167,36 @@ The following tables include info on Windows 10 settings that have been validate #### Collect logs -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML*? | -| --- | --- | --- |---- | --- | --- | -| Collect ETW logs | Use to remotely collect ETW logs from Surface Hub. | [DiagnosticLog CSP](https://msdn.microsoft.com/library/windows/hardware/mt219118.aspx) | No | No | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|------------------|----------------------------------------------------|----------------------------------------------------------------------------------------|---------------------------|------------------------------------------|-----------------------------| +| Collect ETW logs | Use to remotely collect ETW logs from Surface Hub. | [DiagnosticLog CSP](https://msdn.microsoft.com/library/windows/hardware/mt219118.aspx) | No | No | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Set network quality of service (QoS) policy -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML*? | -| --- | --- | --- |--- | --- | ---- | -| Set Network QoS Policy | Use to set a QoS policy to perform a set of actions on network traffic. This is useful for prioritizing Skype network packets. | [NetworkQoSPolicy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkqospolicy-csp) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|------------------------|--------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Set Network QoS Policy | Use to set a QoS policy to perform a set of actions on network traffic. This is useful for prioritizing Skype network packets. | [NetworkQoSPolicy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkqospolicy-csp) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Set network proxy -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML*? | -| --- | ---- | --- |---- | --- | --- | -| Set Network proxy | Use to configure a proxy server for ethernet and Wi-Fi connections. | [NetworkProxy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkproxy-csp) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|-------------------|---------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Set Network proxy | Use to configure a proxy server for ethernet and Wi-Fi connections. | [NetworkProxy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkproxy-csp) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. #### Configure Start menu -| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML*? | -| --- | ---- | --- |---- | --- | --- | -| Configure Start menu | Use to configure which apps are displayed on the Start menu. For more information, see [Configure Surface Hub Start menu](surface-hub-start-menu.md) | [Policy CSP: Start/StartLayout](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-startlayout) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | +| Setting | Details | CSP reference | Supported with
            Intune? | Supported with
            Configuration Manager? | Supported with
            SyncML\*? | +|----------------------|------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------|-------------------------------------------------|-----------------------------| +| Configure Start menu | Use to configure which apps are displayed on the Start menu. For more information, see [Configure Surface Hub Start menu](surface-hub-start-menu.md) | [Policy CSP: Start/StartLayout](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-startlayout) | Yes
            [Use a custom policy.](#example-intune) | Yes.
            [Use a custom setting.](#example-sccm) | Yes | + \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. ### Generate OMA URIs for settings @@ -258,9 +271,9 @@ For more information, see [Create configuration items for Windows 8.1 and Window -  - -  + + + diff --git a/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md b/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md index 7d9e789c50..5bea64a216 100644 --- a/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md @@ -20,94 +20,94 @@ This topic explains how you add a device account for your Microsoft Surface Hub If you have a single-forest on-premises deployment with Microsoft Exchange 2013 or later and Skype for Business 2013 or later, then you can [use the provided PowerShell scripts](appendix-a-powershell-scripts-for-surface-hub.md#create-on-premises-ps-scripts) to create device accounts. If you’re using a multi-forest deployment, see [On-premises deployment for Surface Hub in a multi-forest environment](on-premises-deployment-surface-hub-multi-forest.md). -1. Start a remote PowerShell session from a PC and connect to Exchange. +1. Start a remote PowerShell session from a PC and connect to Exchange. - Be sure you have the right permissions set to run the associated cmdlets. + Be sure you have the right permissions set to run the associated cmdlets. - Note here that `$strExchangeServer` is the fully qualified domain name (FQDN) of your Exchange server, and `$strLyncFQDN` is the FQDN of your Skype for Business server. - - ```PowerShell - Set-ExecutionPolicy Unrestricted - $org='contoso.microsoft.com' - $cred=Get-Credential $admin@$org - $sessExchange = New-PSSession -ConfigurationName microsoft.exchange -Credential $cred -AllowRedirection -Authentication Kerberos -ConnectionUri "http://$strExchangeServer/powershell" -WarningAction SilentlyContinue - $sessLync = New-PSSession -Credential $cred -ConnectionURI "https://$strLyncFQDN/OcsPowershell" -AllowRedirection -WarningAction SilentlyContinue - Import-PSSession $sessExchange - Import-PSSession $sessLync - ``` - -2. After establishing a session, you’ll either create a new mailbox and enable it as a RoomMailboxAccount, or change the settings for an existing room mailbox. This will allow the account to authenticate into the Surface Hub. - - If you're changing an existing resource mailbox: - - ```PowerShell - Set-Mailbox -Identity 'HUB01' -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) - ``` - - If you’re creating a new resource mailbox: - - ```PowerShell - New-Mailbox -UserPrincipalName HUB01@contoso.com -Alias HUB01 -Name "Hub-01" -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) - ``` - -3. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. - - Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to False. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. - - If you haven’t created a compatible policy yet, use the following cmdlet—this one creates a policy called "Surface Hubs". Once it’s created, you can apply the same policy to other device accounts. - - ```PowerShell - $easPolicy = New-MobileDeviceMailboxPolicy -Name “SurfaceHubs” -PasswordEnabled $false - ``` - - Once you have a compatible policy, then you will need to apply the policy to the device account. However, policies can only be applied to user accounts and not resource mailboxes. You need to convert the mailbox into a user type, apply the policy, and then convert it back into a mailbox—you may need to re-enable it and set the password again too. - - ```PowerShell - Set-Mailbox $acctUpn -Type Regular - Set-CASMailbox $acctUpn -ActiveSyncMailboxPolicy $easPolicy - Set-Mailbox $acctUpn -Type Room - Set-Mailbox $credNewAccount.UserName -RoomMailboxPassword $credNewAccount.Password -EnableRoomMailboxAccount $true - ``` - -4. Various Exchange properties can be set on the device account to improve the meeting experience for people. You can see which properties need to be set in the [Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) section. - - ```PowerShell - Set-CalendarProcessing -Identity $acctUpn -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false - Set-CalendarProcessing -Identity $acctUpn -AddAdditionalResponse $true -AdditionalResponse "This is a Surface Hub room!" - ``` - -5. If you decide to have the password not expire, you can set that with PowerShell cmdlets too. See [Password management](password-management-for-surface-hub-device-accounts.md) for more information. - - ```PowerShell - Set-AdUser $acctUpn -PasswordNeverExpires $true - ``` - -6. Enable the account in Active Directory so it will authenticate to the Surface Hub. - - ```PowerShell - Set-AdUser $acctUpn -Enabled $true - ``` - -7. Enable the device account with Skype for Business by enabling your Surface Hub AD account on a Skype for Business Server pool: - - ```PowerShell - Enable-CsMeetingRoom -SipAddress "sip:HUB01@contoso.com" - -DomainController DC-ND-001.contoso.com -RegistrarPool LYNCPool15.contoso.com - -Identity HUB01 - ``` - - You'll need to use the Session Initiation Protocol (SIP) address and domain controller for the Surface Hub, along with your own Skype for Business Server pool identifier and user identity. - -8. OPTIONAL: You can also allow your Surface Hub to make and receive public switched telephone network (PSTN) phone calls by enabling Enterprise Voice for your account. Enterprise Voice isn't a requirement for Surface Hub, but if you want PSTN dialing functionality for the Surface Hub client, here's how to enable it: + Note here that `$strExchangeServer` is the fully qualified domain name (FQDN) of your Exchange server, and `$strLyncFQDN` is the FQDN of your Skype for Business server. ```PowerShell - Set-CsMeetingRoom -Identity HUB01 -DomainController DC-ND-001.contoso.com -LineURI "tel:+14255550555;ext=50555" -EnterpriseVoiceEnabled $true - ``` + Set-ExecutionPolicy Unrestricted + $org='contoso.microsoft.com' + $cred=Get-Credential $admin@$org + $sessExchange = New-PSSession -ConfigurationName microsoft.exchange -Credential $cred -AllowRedirection -Authentication Kerberos -ConnectionUri "http://$strExchangeServer/powershell" -WarningAction SilentlyContinue + $sessLync = New-PSSession -Credential $cred -ConnectionURI "https://$strLyncFQDN/OcsPowershell" -AllowRedirection -WarningAction SilentlyContinue + Import-PSSession $sessExchange + Import-PSSession $sessLync + ``` - Again, you need to replace the provided domain controller and phone number examples with your own information. The parameter value `$true` stays the same. +2. After establishing a session, you’ll either create a new mailbox and enable it as a RoomMailboxAccount, or change the settings for an existing room mailbox. This will allow the account to authenticate into the Surface Hub. + + If you're changing an existing resource mailbox: + + ```PowerShell + Set-Mailbox -Identity 'HUB01' -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) + ``` + + If you’re creating a new resource mailbox: + + ```PowerShell + New-Mailbox -UserPrincipalName HUB01@contoso.com -Alias HUB01 -Name "Hub-01" -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) + ``` + +3. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. + + Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to False. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. + + If you haven’t created a compatible policy yet, use the following cmdlet—this one creates a policy called "Surface Hubs". Once it’s created, you can apply the same policy to other device accounts. + + ```PowerShell + $easPolicy = New-MobileDeviceMailboxPolicy -Name “SurfaceHubs” -PasswordEnabled $false + ``` + + Once you have a compatible policy, then you will need to apply the policy to the device account. However, policies can only be applied to user accounts and not resource mailboxes. You need to convert the mailbox into a user type, apply the policy, and then convert it back into a mailbox—you may need to re-enable it and set the password again too. + + ```PowerShell + Set-Mailbox $acctUpn -Type Regular + Set-CASMailbox $acctUpn -ActiveSyncMailboxPolicy $easPolicy + Set-Mailbox $acctUpn -Type Room + Set-Mailbox $credNewAccount.UserName -RoomMailboxPassword $credNewAccount.Password -EnableRoomMailboxAccount $true + ``` + +4. Various Exchange properties can be set on the device account to improve the meeting experience for people. You can see which properties need to be set in the [Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) section. + + ```PowerShell + Set-CalendarProcessing -Identity $acctUpn -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false + Set-CalendarProcessing -Identity $acctUpn -AddAdditionalResponse $true -AdditionalResponse "This is a Surface Hub room!" + ``` + +5. If you decide to have the password not expire, you can set that with PowerShell cmdlets too. See [Password management](password-management-for-surface-hub-device-accounts.md) for more information. + + ```PowerShell + Set-AdUser $acctUpn -PasswordNeverExpires $true + ``` + +6. Enable the account in Active Directory so it will authenticate to the Surface Hub. + + ```PowerShell + Set-AdUser $acctUpn -Enabled $true + ``` + +7. Enable the device account with Skype for Business by enabling your Surface Hub AD account on a Skype for Business Server pool: + + ```PowerShell + Enable-CsMeetingRoom -SipAddress "sip:HUB01@contoso.com" + -DomainController DC-ND-001.contoso.com -RegistrarPool LYNCPool15.contoso.com + -Identity HUB01 + ``` + + You'll need to use the Session Initiation Protocol (SIP) address and domain controller for the Surface Hub, along with your own Skype for Business Server pool identifier and user identity. + +8. OPTIONAL: You can also allow your Surface Hub to make and receive public switched telephone network (PSTN) phone calls by enabling Enterprise Voice for your account. Enterprise Voice isn't a requirement for Surface Hub, but if you want PSTN dialing functionality for the Surface Hub client, here's how to enable it: + + ```PowerShell + Set-CsMeetingRoom -Identity HUB01 -DomainController DC-ND-001.contoso.com -LineURI "tel:+14255550555;ext=50555" -EnterpriseVoiceEnabled $true + ``` + + Again, you need to replace the provided domain controller and phone number examples with your own information. The parameter value `$true` stays the same. - ## Disable anonymous email and IM + ## Disable anonymous email and IM @@ -143,7 +143,7 @@ To change the policy entry: ``` $policyEntry = New-CsClientPolicyEntry -Name AllowResourceAccountSendMessage -value $true $clientPolicy | Set-CsClientPolicy -PolicyEntry @{Replace = $policyEntry} -``` +``` To remove the policy entry: @@ -152,7 +152,7 @@ $policyEntry = New-CsClientPolicyEntry -Name AllowResourceAccountSendMessage -va $clientPolicy | Set-CsClientPolicy -PolicyEntry @{Remove = $policyEntry} ``` -  + diff --git a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md index f6fac6968a..df1bf821b4 100644 --- a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md @@ -21,129 +21,129 @@ This topic has instructions for adding a device account for your Microsoft Surfa If you have a pure, online (O365) deployment, then you can [use the provided PowerShell scripts](appendix-a-powershell-scripts-for-surface-hub.md#create-os356-ps-scripts) to create device accounts. -1. Start a remote PowerShell session on a PC and connect to Exchange. +1. Start a remote PowerShell session on a PC and connect to Exchange. - Be sure you have the right permissions set to run the associated cmdlets. + Be sure you have the right permissions set to run the associated cmdlets. - ```PowerShell - Set-ExecutionPolicy RemoteSigned - $org='contoso.microsoft.com' - $cred=Get-Credential admin@$org - $sess= New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic -AllowRedirection - Import-PSSession $sess - ``` + ```PowerShell + Set-ExecutionPolicy RemoteSigned + $org='contoso.microsoft.com' + $cred=Get-Credential admin@$org + $sess= New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic -AllowRedirection + Import-PSSession $sess + ``` -2. After establishing a session, you’ll either create a new mailbox and enable it as a RoomMailboxAccount, or change the settings for an existing room mailbox. This will allow the account to authenticate into the Surface Hub. +2. After establishing a session, you’ll either create a new mailbox and enable it as a RoomMailboxAccount, or change the settings for an existing room mailbox. This will allow the account to authenticate into the Surface Hub. - If you're changing an existing resource mailbox: + If you're changing an existing resource mailbox: - ```PowerShell - Set-Mailbox -Identity 'HUB01' -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) - ``` + ```PowerShell + Set-Mailbox -Identity 'HUB01' -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) + ``` - If you’re creating a new resource mailbox: + If you’re creating a new resource mailbox: - ```PowerShell - New-Mailbox -MicrosoftOnlineServicesID HUB01@contoso.com -Alias HUB01 -Name "Hub-01" -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) - ``` + ```PowerShell + New-Mailbox -MicrosoftOnlineServicesID HUB01@contoso.com -Alias HUB01 -Name "Hub-01" -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) + ``` -3. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. +3. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. - Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to False. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. + Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to False. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. - If you haven’t created a compatible policy yet, use the following cmdlet—this one creates a policy called "Surface Hubs". Once it’s created, you can apply the same policy to other device accounts. + If you haven’t created a compatible policy yet, use the following cmdlet—this one creates a policy called "Surface Hubs". Once it’s created, you can apply the same policy to other device accounts. - ```PowerShell - $easPolicy = New-MobileDeviceMailboxPolicy -Name "SurfaceHubs" -PasswordEnabled $false -AllowNonProvisionableDevices $True - ``` + ```PowerShell + $easPolicy = New-MobileDeviceMailboxPolicy -Name "SurfaceHubs" -PasswordEnabled $false -AllowNonProvisionableDevices $True + ``` - Once you have a compatible policy, then you will need to apply the policy to the device account. + Once you have a compatible policy, then you will need to apply the policy to the device account. - ```PowerShell - Set-CASMailbox 'HUB01@contoso.com' -ActiveSyncMailboxPolicy $easPolicy.Id - ``` + ```PowerShell + Set-CASMailbox 'HUB01@contoso.com' -ActiveSyncMailboxPolicy $easPolicy.Id + ``` -4. Various Exchange properties must be set on the device account to improve the meeting experience. You can see which properties need to be set in the [Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) section. +4. Various Exchange properties must be set on the device account to improve the meeting experience. You can see which properties need to be set in the [Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) section. - ```PowerShell - Set-CalendarProcessing -Identity 'HUB01@contoso.com' -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false - Set-CalendarProcessing -Identity 'HUB01@contoso.com' -AddAdditionalResponse $true -AdditionalResponse "This is a Surface Hub room!" - ``` + ```PowerShell + Set-CalendarProcessing -Identity 'HUB01@contoso.com' -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false + Set-CalendarProcessing -Identity 'HUB01@contoso.com' -AddAdditionalResponse $true -AdditionalResponse "This is a Surface Hub room!" + ``` -5. Connect to Azure AD. +5. Connect to Azure AD. - You first need to install Azure AD module for PowerShell version 2. In an elevated powershell prompt run the following command : + You first need to install Azure AD module for PowerShell version 2. In an elevated powershell prompt run the following command : - ```PowerShell - Install-Module -Name AzureAD - ``` - You need to connect to Azure AD to apply some account settings. You can run this cmdlet to connect. + ```PowerShell + Install-Module -Name AzureAD + ``` + You need to connect to Azure AD to apply some account settings. You can run this cmdlet to connect. - ```PowerShell - Import-Module AzureAD - Connect-AzureAD -Credential $cred - ``` + ```PowerShell + Import-Module AzureAD + Connect-AzureAD -Credential $cred + ``` -6. If you decide to have the password not expire, you can set that with PowerShell cmdlets too. See [Password management](password-management-for-surface-hub-device-accounts.md) for more information. +6. If you decide to have the password not expire, you can set that with PowerShell cmdlets too. See [Password management](password-management-for-surface-hub-device-accounts.md) for more information. - ```PowerShell - Set-AzureADUser -ObjectId "HUB01@contoso.com" -PasswordPolicies "DisablePasswordExpiration" - ``` + ```PowerShell + Set-AzureADUser -ObjectId "HUB01@contoso.com" -PasswordPolicies "DisablePasswordExpiration" + ``` -7. Surface Hub requires a license for Skype for Business functionality. In order to enable Skype for Business, your environment will need to meet the [prerequisites for Skype for Business online](hybrid-deployment-surface-hub-device-accounts.md#sfb-online). +7. Surface Hub requires a license for Skype for Business functionality. In order to enable Skype for Business, your environment will need to meet the [prerequisites for Skype for Business online](hybrid-deployment-surface-hub-device-accounts.md#sfb-online). - Next, you can use `Get-AzureADSubscribedSku` to retrieve a list of available SKUs for your O365 tenant. + Next, you can use `Get-AzureADSubscribedSku` to retrieve a list of available SKUs for your O365 tenant. - Once you list out the SKUs, you'll need to assign the SkuId you want to the `$License.SkuId` variable. + Once you list out the SKUs, you'll need to assign the SkuId you want to the `$License.SkuId` variable. - ```PowerShell - Set-AzureADUser -ObjectId "HUB01@contoso.com" -UsageLocation "US" + ```PowerShell + Set-AzureADUser -ObjectId "HUB01@contoso.com" -UsageLocation "US" - Get-AzureADSubscribedSku | Select Sku*,*Units - $License = New-Object -TypeName Microsoft.Open.AzureAD.Model.AssignedLicense - $License.SkuId = SkuId You selected + Get-AzureADSubscribedSku | Select Sku*,*Units + $License = New-Object -TypeName Microsoft.Open.AzureAD.Model.AssignedLicense + $License.SkuId = SkuId You selected - $AssignedLicenses = New-Object -TypeName Microsoft.Open.AzureAD.Model.AssignedLicenses - $AssignedLicenses.AddLicenses = $License - $AssignedLicenses.RemoveLicenses = @() + $AssignedLicenses = New-Object -TypeName Microsoft.Open.AzureAD.Model.AssignedLicenses + $AssignedLicenses.AddLicenses = $License + $AssignedLicenses.RemoveLicenses = @() - Set-AzureADUserLicense -ObjectId "HUB01@contoso.com" -AssignedLicenses $AssignedLicenses - ``` + Set-AzureADUserLicense -ObjectId "HUB01@contoso.com" -AssignedLicenses $AssignedLicenses + ``` -8. Enable the device account with Skype for Business. - If the Skype for Business PowerShell module is not installed, [download the Skype for Business Online Windows PowerShell Module](https://www.microsoft.com/download/details.aspx?id=39366). +8. Enable the device account with Skype for Business. + If the Skype for Business PowerShell module is not installed, [download the Skype for Business Online Windows PowerShell Module](https://www.microsoft.com/download/details.aspx?id=39366). - - Start by creating a remote PowerShell session from a PC. + - Start by creating a remote PowerShell session from a PC. - ```PowerShell - Import-Module SkypeOnlineConnector - $cssess=New-CsOnlineSession -Credential $cred - Import-PSSession $cssess -AllowClobber - ``` + ```PowerShell + Import-Module SkypeOnlineConnector + $cssess=New-CsOnlineSession -Credential $cred + Import-PSSession $cssess -AllowClobber + ``` - - Next, if you aren't sure what value to use for the `RegistrarPool` parameter in your environment, you can get the value from an existing Skype for Business user using this cmdlet (for example, *alice@contoso.com*): + - Next, if you aren't sure what value to use for the `RegistrarPool` parameter in your environment, you can get the value from an existing Skype for Business user using this cmdlet (for example, alice@contoso.com): - ```PowerShell - (Get-CsTenant).TenantPoolExtension - ``` - OR by setting a variable + ```PowerShell + (Get-CsTenant).TenantPoolExtension + ``` + OR by setting a variable - ```PowerShell - $strRegistrarPool = (Get-CsTenant).TenantPoolExtension - $strRegistrarPool = $strRegistrarPool[0].Substring($strRegistrarPool[0].IndexOf(':') + 1) - ``` + ```PowerShell + $strRegistrarPool = (Get-CsTenant).TenantPoolExtension + $strRegistrarPool = $strRegistrarPool[0].Substring($strRegistrarPool[0].IndexOf(':') + 1) + ``` - - Enable the Surface Hub account with the following cmdlet: + - Enable the Surface Hub account with the following cmdlet: - ```PowerShell - Enable-CsMeetingRoom -Identity 'HUB01@contoso.com' -RegistrarPool yourRegistrarPool -SipAddressType EmailAddress - ``` + ```PowerShell + Enable-CsMeetingRoom -Identity 'HUB01@contoso.com' -RegistrarPool yourRegistrarPool -SipAddressType EmailAddress + ``` - OR using the $strRegistarPool variable from above + OR using the $strRegistarPool variable from above - ```PowerShell - Enable-CsMeetingRoom -Identity 'HUB01@contoso.com' -RegistrarPool $strRegistrarPool -SipAddressType EmailAddress - ``` + ```PowerShell + Enable-CsMeetingRoom -Identity 'HUB01@contoso.com' -RegistrarPool $strRegistrarPool -SipAddressType EmailAddress + ``` For validation, you should be able to use any Skype for Business client (PC, Android, etc) to sign in to this account. diff --git a/devices/surface-hub/prepare-your-environment-for-surface-hub.md b/devices/surface-hub/prepare-your-environment-for-surface-hub.md index d820afddf1..f9377b503f 100644 --- a/devices/surface-hub/prepare-your-environment-for-surface-hub.md +++ b/devices/surface-hub/prepare-your-environment-for-surface-hub.md @@ -102,15 +102,15 @@ When you go through the first-run program for your Surface Hub, there's some inf -

            [Create and test a device account](create-and-test-a-device-account-surface-hub.md)

            +

            Create and test a device account

            This topic introduces how to create and test the device account that Surface Hub uses to communicate with and Skype.

            -

            [Create provisioning packages](provisioning-packages-for-certificates-surface-hub.md)

            +

            Create provisioning packages

            For Windows 10, settings that use the registry or a content services platform (CSP) can be configured using provisioning packages. You can also add certificates during first run using provisioning.

            -

            [Admin group management](admin-group-management-for-surface-hub.md)

            +

            Admin group management

            Every Surface Hub can be configured individually by opening the Settings app on the device. However, to prevent people who are not administrators from changing the settings, the Settings app requires administrator credentials to open the app and change settings.

            The Settings app requires local administrator credentials to open the app.

            @@ -123,9 +123,9 @@ When you go through the first-run program for your Surface Hub, there's some inf - [Blog post: Surface Hub in a Multi-Domain Environment](https://blogs.technet.microsoft.com/y0av/2017/11/08/11/) - [Blog post: Configuring a proxy for your Surface Hub](https://blogs.technet.microsoft.com/y0av/2017/12/03/7/) -  + -  + diff --git a/devices/surface-hub/provisioning-packages-for-surface-hub.md b/devices/surface-hub/provisioning-packages-for-surface-hub.md index e28faaef88..2f47ffd5f8 100644 --- a/devices/surface-hub/provisioning-packages-for-surface-hub.md +++ b/devices/surface-hub/provisioning-packages-for-surface-hub.md @@ -72,11 +72,11 @@ After you [install Windows Configuration Designer](https://technet.microsoft.com ### Create the provisioning package 1. Open Windows Configuration Designer: - - From either the Start screen or Start menu search, type 'Windows Configuration Designer' and click on the Windows Configuration Designer shortcut, + - From either the Start screen or Start menu search, type 'Windows Configuration Designer' and click on the Windows Configuration Designer shortcut, - or + or - - If you installed Windows Configuration Designer from the ADK, navigate to `C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86` (on an x64 computer) or `C:\Program Files\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86\ICD.exe` (on an x86 computer), and then double-click **ICD.exe**. + - If you installed Windows Configuration Designer from the ADK, navigate to `C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86` (on an x64 computer) or `C:\Program Files\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86\ICD.exe` (on an x86 computer), and then double-click **ICD.exe**. 2. Click **Provision Surface Hub devices**. @@ -85,13 +85,13 @@ After you [install Windows Configuration Designer](https://technet.microsoft.com ### Configure settings - - - - - - - + + + + + + +
            ![step one](images/one.png) ![add certificates](images/add-certificates.png)

            To provision the device with a certificate, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.
            ![add a certificate](images/add-certificates-details.png)
            ![step two](images/two.png) ![configure proxy settings](images/proxy.png)

            Toggle **Yes** or **No** for proxy settings. The default configuration for Surface Hub is to automatically detect proxy settings, so you can select **No** if that is the setting that you want. However, if your infrastructure previously required using a proxy server and has changed to not require a proxy server, you can use a provisioning package to revert your Surface Hub devices to the default settings by selecting **Yes** and **Automatically detect settings**.

            If you toggle **Yes**, you can select to automatically detect proxy settings, or you can manually configure the settings by entering a URL to a setup script, or a static proxy server address. You can also identify whether to use the proxy server for local addresses, and enter exceptions (addresses that Surface Hub should connect to directly without using the proxy server).
            ![configure proxy settings](images/proxy-details.png)
            ![step three](images/three.png) ![device admins](images/set-up-device-admins.png)

            You can enroll the device in Active Directory and specify a security group to use the Settings app, enroll in Azure Active Directory to allow global admins to use the Settings app, or create a local administrator account on the device.

            To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain, and specify the security group to have admin credentials on Surface Hub. If a provisioning package that enrolls a device in Active Directory is going to be applied to a Surface Hub that was reset, the same domain account can only be used if the account listed is a domain administrator or is the same account that set up the Surface Hub initially. Otherwise, a different domain account must be used in the provisioning package.

            Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions.

            To create a local administrator account, select that option and enter a user name and password.

            **Important:** If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
            ![join Active Directory, Azure AD, or create a local admin account](images/set-up-device-admins-details.png)
            ![step four](images/four.png) ![enroll in device management](images/enroll-mdm.png)

            Toggle **Yes** or **No** for enrollment in MDM.

            If you toggle **Yes**, you must provide a service account and password or certificate thumbprint that is authorized to enroll the device, and also specify the authentication type. If required by your MDM provider, also enter the URLs for the discovery service, enrollment service, and policy service. [Learn more about managing Surface Hub with MDM.](manage-settings-with-mdm-for-surface-hub.md)
            ![enroll in mobile device management](images/enroll-mdm-details.png)
            ![step five](images/five.png) ![add applications](images/add-applications.png)

            You can install multiple Universal Windows Platform (UWP) apps in a provisioning package. For help with the settings, see [Provision PCs with apps](https://technet.microsoft.com/itpro/windows/configure/provision-pcs-with-apps).

            **Important:** Although the wizard interface allows you to select a Classic Win32 app, only include UWP apps in a provisioning package that will be applied to Surface Hub. If you include a Classic Win32 app, provisioning will fail.
            ![add an application](images/add-applications-details.png)
            ![step six](images/six.png) ![Add configuration file](images/add-config-file.png)

            You don't configure any settings in this step. It provides instructions for including a configuration file that contains a list of device accounts. The configuration file must not contain column headers. When you apply the provisioning package to Surface Hub, if a Surface Hub configuration file is included on the USB drive, you can select the account and friendly name for the device from the file. See [Sample configuration file](#sample-configuration-file) for an example.

            **Important:** The configuration file can only be applied during the out-of-box setup experience (OOBE) and can only be used with provisioning packages created using the Windows Configuration Designer released with Windows 10, version 1703.
            ![Add a Surface Hub configuration file](images/add-config-file-details.png)
            ![finish](images/finish.png)

            You can set a password to protect your provisioning package. You must enter this password when you apply the provisioning package to a device.
            ![Protect your package](images/finish-details.png)
            step one add certificates

            To provision the device with a certificate, click Add a certificate. Enter a name for the certificate, and then browse to and select the certificate to be used.
            add a certificate
            step two configure proxy settings

            Toggle Yes or No for proxy settings. The default configuration for Surface Hub is to automatically detect proxy settings, so you can select No if that is the setting that you want. However, if your infrastructure previously required using a proxy server and has changed to not require a proxy server, you can use a provisioning package to revert your Surface Hub devices to the default settings by selecting Yes and Automatically detect settings.

            If you toggle Yes, you can select to automatically detect proxy settings, or you can manually configure the settings by entering a URL to a setup script, or a static proxy server address. You can also identify whether to use the proxy server for local addresses, and enter exceptions (addresses that Surface Hub should connect to directly without using the proxy server).
            configure proxy settings
            step three device admins

            You can enroll the device in Active Directory and specify a security group to use the Settings app, enroll in Azure Active Directory to allow global admins to use the Settings app, or create a local administrator account on the device.

            To enroll the device in Active Directory, enter the credentials for a least-privileged user account to join the device to the domain, and specify the security group to have admin credentials on Surface Hub. If a provisioning package that enrolls a device in Active Directory is going to be applied to a Surface Hub that was reset, the same domain account can only be used if the account listed is a domain administrator or is the same account that set up the Surface Hub initially. Otherwise, a different domain account must be used in the provisioning package.

            Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, set up Azure AD join in your organization. The maximum number of devices per user setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click Get bulk token. In the Let's get you signed in window, enter an account that has permissions to join a device to Azure AD, and then the password. Click Accept to give Windows Configuration Designer the necessary permissions.

            To create a local administrator account, select that option and enter a user name and password.

            Important: If you create a local account in the provisioning package, you must change the password using the Settings app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in.
            join Active Directory, Azure AD, or create a local admin account
            step four enroll in device management

            Toggle Yes or No for enrollment in MDM.

            If you toggle Yes, you must provide a service account and password or certificate thumbprint that is authorized to enroll the device, and also specify the authentication type. If required by your MDM provider, also enter the URLs for the discovery service, enrollment service, and policy service. Learn more about managing Surface Hub with MDM.
            enroll in mobile device management
            step five add applications

            You can install multiple Universal Windows Platform (UWP) apps in a provisioning package. For help with the settings, see Provision PCs with apps.

            Important: Although the wizard interface allows you to select a Classic Win32 app, only include UWP apps in a provisioning package that will be applied to Surface Hub. If you include a Classic Win32 app, provisioning will fail.
            add an application
            step six Add configuration file

            You don't configure any settings in this step. It provides instructions for including a configuration file that contains a list of device accounts. The configuration file must not contain column headers. When you apply the provisioning package to Surface Hub, if a Surface Hub configuration file is included on the USB drive, you can select the account and friendly name for the device from the file. See Sample configuration file for an example.

            Important: The configuration file can only be applied during the out-of-box setup experience (OOBE) and can only be used with provisioning packages created using the Windows Configuration Designer released with Windows 10, version 1703.
            Add a Surface Hub configuration file
            finish

            You can set a password to protect your provisioning package. You must enter this password when you apply the provisioning package to a device.
            Protect your package
            After you're done, click **Create**. It only takes a few seconds. When the package is built, the location where the package is stored is displayed as a hyperlink at the bottom of the page. @@ -141,11 +141,11 @@ After you [install Windows Configuration Designer](https://technet.microsoft.com ### Create the provisioning package (advanced) 1. Open Windows Configuration Designer: - - From either the Start screen or Start menu search, type 'Windows Configuration Designer' and click on the Windows Configuration Designer shortcut, + - From either the Start screen or Start menu search, type 'Windows Configuration Designer' and click on the Windows Configuration Designer shortcut, - or + or - - If you installed Windows Configuration Designer from the ADK, navigate to `C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86` (on an x64 computer) or `C:\Program Files\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86\ICD.exe` (on an x86 computer), and then double-click **ICD.exe**. + - If you installed Windows Configuration Designer from the ADK, navigate to `C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86` (on an x64 computer) or `C:\Program Files\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86\ICD.exe` (on an x86 computer), and then double-click **ICD.exe**. 2. Click **Advanced provisioning**. diff --git a/devices/surface-hub/set-up-your-surface-hub.md b/devices/surface-hub/set-up-your-surface-hub.md index 05235f557c..d329156bb0 100644 --- a/devices/surface-hub/set-up-your-surface-hub.md +++ b/devices/surface-hub/set-up-your-surface-hub.md @@ -37,21 +37,21 @@ Before you turn on your Microsoft Surface Hub for the first time, make sure you' -

            [Setup worksheet](setup-worksheet-surface-hub.md)

            -

            When you've finished pre-setup and are ready to start first-time setup for your Surface Hub, make sure you have all the information listed in this section.

            +

            Setup worksheet

            +

            When you've finished pre-setup and are ready to start first-time setup for your Surface Hub, make sure you have all the information listed in this section.

            -

            [First-run program](first-run-program-surface-hub.md)

            -

            The term "first run" refers to the series of steps you'll go through the first time you power up your Surface Hub, and means the same thing as "out-of-box experience" (OOBE). This section will walk you through the process.

            +

            First-run program

            +

            The term "first run" refers to the series of steps you'll go through the first time you power up your Surface Hub, and means the same thing as "out-of-box experience" (OOBE). This section will walk you through the process.

            -  + -  + -  + diff --git a/devices/surface-hub/skype-hybrid-voice.md b/devices/surface-hub/skype-hybrid-voice.md index 9fb7200640..53922be017 100644 --- a/devices/surface-hub/skype-hybrid-voice.md +++ b/devices/surface-hub/skype-hybrid-voice.md @@ -22,63 +22,63 @@ If you deployed Skype for Business Cloud PBX with one of the hybrid voice option >[!WARNING] >If you create an account before configuration of Hybrid voice (you run Enable-CSMeetingRoom command), you will not be able to configure required hybrid voice parameters. In order to configure hybrid voice parameters for a previously configured account or to reconfigure a phone number, delete the E5 or E3 + Cloud PBX add-on license, and then follow the steps below, starting at step 3. -1. Create a new user account for Surface Hub. This example uses **surfacehub2@adatum.com**. The account can be created in local Active Directory and synchronized to the cloud, or created directly in the cloud. +1. Create a new user account for Surface Hub. This example uses surfacehub2@adatum.com. The account can be created in local Active Directory and synchronized to the cloud, or created directly in the cloud. ![new object user](images/new-user-hybrid-voice.png) -2. Select **Password Never Expires**. This is important for a Surface Hub device. +2. Select **Password Never Expires**. This is important for a Surface Hub device. - ![Password never expires](images/new-user-password-hybrid-voice.png) + ![Password never expires](images/new-user-password-hybrid-voice.png) -3. In Office 365, add **E5** license or **E3 and Cloud PBX** add-on to the user account created for the room. This is required for Hybrid Voice to work. +3. In Office 365, add **E5** license or **E3 and Cloud PBX** add-on to the user account created for the room. This is required for Hybrid Voice to work. - ![Add product license](images/product-license-hybrid-voice.png) + ![Add product license](images/product-license-hybrid-voice.png) -4. Wait approximately 15 minutes until the user account for the room appears in Skype for Business Online. +4. Wait approximately 15 minutes until the user account for the room appears in Skype for Business Online. -5. After the user account for room is created in Skype for Business Online, enable it for Hybrid Voice in Skype for Business Remote PowerShell by running the following cmdlet: +5. After the user account for room is created in Skype for Business Online, enable it for Hybrid Voice in Skype for Business Remote PowerShell by running the following cmdlet: - ``` - Set-csuser surfacehub2@adatum.com EnterpriseVoiceEnabled $true -HostedVoiceMail $true -onpremlineuri tel:+15005000102 - ``` + ``` + Set-csuser surfacehub2@adatum.com EnterpriseVoiceEnabled $true -HostedVoiceMail $true -onpremlineuri tel:+15005000102 + ``` -6. Validate Hybrid Voice call flow by placing test calls from the Surface Hub. +6. Validate Hybrid Voice call flow by placing test calls from the Surface Hub. -7. Start a remote PowerShell session on a PC and connect to Exchange by running the following cmdlets. +7. Start a remote PowerShell session on a PC and connect to Exchange by running the following cmdlets. - ``` - Set-ExecutionPolicy Unrestricted - $cred=Get-Credential -Message "Please use your Office 365 admin credentials" - $sess= New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/ps1-liveid/ -Credential $cred -Authentication Basic -AllowRedirection - Import-PSSession $sess - ``` + ``` + Set-ExecutionPolicy Unrestricted + $cred=Get-Credential -Message "Please use your Office 365 admin credentials" + $sess= New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/ps1-liveid/ -Credential $cred -Authentication Basic -AllowRedirection + Import-PSSession $sess + ``` -8. After establishing a session, modify the user account for the room to enable it as a **RoomMailboxAccount** by running the following cmdlets. This allows the account to authenticate with Surface Hub. +8. After establishing a session, modify the user account for the room to enable it as a **RoomMailboxAccount** by running the following cmdlets. This allows the account to authenticate with Surface Hub. - ``` - Set-Mailbox surfacehub2@adatum.com -Type Room - Set-Mailbox surfacehub2@adatum.com -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) - ``` + ``` + Set-Mailbox surfacehub2@adatum.com -Type Room + Set-Mailbox surfacehub2@adatum.com -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String -AsPlainText -Force) + ``` -9. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. +9. After setting up the mailbox, you will need to either create a new Exchange ActiveSync policy, or use a compatible existing policy. - Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to **False**. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. + Surface Hubs are only compatible with device accounts that have an ActiveSync policy where the **PasswordEnabled** property is set to **False**. If this isn’t set properly, then Exchange services on the Surface Hub (mail, calendar, and joining meetings), will not be enabled. - If you haven’t created a compatible policy yet, use the following cmdlet (this one creates a policy called "Surface Hubs"). After it’s created, you can apply the same policy to other device accounts. + If you haven’t created a compatible policy yet, use the following cmdlet (this one creates a policy called "Surface Hubs"). After it’s created, you can apply the same policy to other device accounts. - ``` - $easPolicy = New-MobileDeviceMailboxPolicy -Name "SurfaceHubs" -PasswordEnabled $false - ``` + ``` + $easPolicy = New-MobileDeviceMailboxPolicy -Name "SurfaceHubs" -PasswordEnabled $false + ``` - After you have a compatible policy, then you will need to apply the policy to the device account. However, policies can only be applied to user accounts and not resource mailboxes. Run the following cmdlets to convert the mailbox into a user type, apply the policy, and then convert it back into a mailbox (you may need to re-enable the account and set the password again). + After you have a compatible policy, then you will need to apply the policy to the device account. However, policies can only be applied to user accounts and not resource mailboxes. Run the following cmdlets to convert the mailbox into a user type, apply the policy, and then convert it back into a mailbox (you may need to re-enable the account and set the password again). - ``` - Set-Mailbox surfacehub2@adatum.com -Type Regular - Set-CASMailbox surfacehub2@adatum.com -ActiveSyncMailboxPolicy $easPolicy.id - Set-Mailbox surfacehub2@adatum.com -Type Room - $credNewAccount = Get-Credential -Message "Please provide the Surface Hub username and password" - Set-Mailbox surfacehub2@adatum.com -RoomMailboxPassword $credNewAccount.Password -EnableRoomMailboxAccount $true - ``` + ``` + Set-Mailbox surfacehub2@adatum.com -Type Regular + Set-CASMailbox surfacehub2@adatum.com -ActiveSyncMailboxPolicy $easPolicy.id + Set-Mailbox surfacehub2@adatum.com -Type Room + $credNewAccount = Get-Credential -Message "Please provide the Surface Hub username and password" + Set-Mailbox surfacehub2@adatum.com -RoomMailboxPassword $credNewAccount.Password -EnableRoomMailboxAccount $true + ``` 10. Various Exchange properties must be set on the device account to improve the meeting experience. You can see which properties can be set in [Exchange properties](exchange-properties-for-surface-hub-device-accounts.md). The following cmdlets provide an example of setting Exchange properties. diff --git a/devices/surface-hub/surface-hub-recovery-tool.md b/devices/surface-hub/surface-hub-recovery-tool.md index e1f93840dd..f1f6a52a05 100644 --- a/devices/surface-hub/surface-hub-recovery-tool.md +++ b/devices/surface-hub/surface-hub-recovery-tool.md @@ -78,7 +78,9 @@ Install Surface Hub Recovery Tool on the host PC. 5. When the download is complete, the tool instructs you to connect an SSD drive. If the tool is unable to locate the attached drive, there is a good chance that the cable being used is not reporting the name of the SSD to Windows. The imaging tool must find the name of the drive as "LITEON L CH-128V2S USB Device" before it can continue. For more information on how to remove the existing drive from your Surface Hub, see [Surface Hub SSD replacement](surface-hub-ssd-replacement.md). - ![Connect SSD](images/shrt-drive.png) +~~~ +![Connect SSD](images/shrt-drive.png) +~~~ 6. When the drive is recognized, click **Start** to begin the re-imaging process. On the warning that all data on the drive will be erased, click **OK**. @@ -94,7 +96,7 @@ Install Surface Hub Recovery Tool on the host PC. Issue | Notes --- | --- -The tool fails to image the SSD | Make sure you are using a factory-supplied SSD and one of the tested cables. +The tool fails to image the SSD | Make sure you are using a factory-supplied SSD and one of the tested cables. The reimaging process appears halted/frozen | It is safe to close and restart the Surface Hub Recovery Tool with no ill effect to the SSD. The drive isn’t recognized by the tool | Verify that the Surface Hub SSD is enumerated as a Lite-On drive, "LITEON L CH-128V2S USB Device". If the drive is recognized as another named device, your current cable isn’t compatible. Try another cable or one of the tested cable listed above. Error: -2147024809 | Open Disk Manager and remove the partitions on the Surface Hub drive. Disconnect and reconnect the drive to the host machine. Restart the imaging tool again. diff --git a/devices/surface-hub/surface-hub-site-readiness-guide.md b/devices/surface-hub/surface-hub-site-readiness-guide.md index ec536e5930..b4f8598526 100644 --- a/devices/surface-hub/surface-hub-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-site-readiness-guide.md @@ -131,7 +131,7 @@ For details on Touchback and Inkback, see the user guide at http://www.microsoft ## See also -[Watch the video (opens in a pop-up media player)][http://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov) +[Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov) diff --git a/devices/surface-hub/surface-hub-start-menu.md b/devices/surface-hub/surface-hub-start-menu.md index a7e0be3da4..9ddfa628e6 100644 --- a/devices/surface-hub/surface-hub-start-menu.md +++ b/devices/surface-hub/surface-hub-start-menu.md @@ -102,7 +102,6 @@ There are a few key differences between Start menu customization for Surface Hub - ``` @@ -179,7 +178,6 @@ This example shows a link to a website and a link to a .pdf file. - ``` >[!NOTE] diff --git a/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md b/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md index fc4edb1e19..65b4f6f1ca 100644 --- a/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md +++ b/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md @@ -25,7 +25,7 @@ There are a few scenarios where you need to specify the domain name of your Skyp 2. Click **Surface Hub**, and then click **Calling & Audio**. 3. Under **Skype for Business configuration**, click **Configure domain name**. 4. Type the domain name for your Skype for Business server, and then click **Ok**. -> [!TIP] -> You can type multiple domain names, separated by commas.
            For example: lync.com, outlook.com, lync.glbdns.microsoft.com + > [!TIP] + > You can type multiple domain names, separated by commas.
            For example: lync.com, outlook.com, lync.glbdns.microsoft.com ![Add Skype for Business FQDN to Settings](images/system-settings-add-fqdn.png) diff --git a/devices/surface-hub/use-room-control-system-with-surface-hub.md b/devices/surface-hub/use-room-control-system-with-surface-hub.md index 9aaa1b9f54..f8c792f932 100644 --- a/devices/surface-hub/use-room-control-system-with-surface-hub.md +++ b/devices/surface-hub/use-room-control-system-with-surface-hub.md @@ -33,7 +33,7 @@ To connect to a room control system control panel, you don't need to configure a | Parity | none | | Flow control | none | | Line feed | every carriage return | -  + ## Wiring diagram @@ -55,7 +55,7 @@ The following command modifiers are available. Commands terminate with a new lin | - | Decrease a value | | = | Set a discrete value | | ? | Queries for a current value | -  + ## Power @@ -112,7 +112,7 @@ Changes to volume levels can be sent by a room control system, or other system. | Volume- | SMC sends the volume down command.

            PC service notifies SMC of new volume level. | Volume = 50 | -  + ## Mute for audio @@ -123,7 +123,7 @@ Audio can be muted. | AudioMute+ | SMC sends the audio mute command.

            PC service notifies SMC that audio is muted. | none | -  + ## Video source @@ -137,7 +137,7 @@ Several display sources can be used. | 3 | VGA | -  + Changes to display source can be sent by a room control system, or other system. @@ -160,7 +160,7 @@ Errors are returned following the format in this table. | Error: Command not available when off '<input>'. | When the Surface Hub is off, commands other than Power return this error. For example, "Volume+" would be invalid and return " Error: Command not available when off 'Volume'". | -  + ## Related topics @@ -169,9 +169,9 @@ Errors are returned following the format in this table. [Microsoft Surface Hub administrator's guide](surface-hub-administrators-guide.md) -  + -  + diff --git a/devices/surface/assettag.md b/devices/surface/assettag.md index e40731a951..60ff9078bd 100644 --- a/devices/surface/assettag.md +++ b/devices/surface/assettag.md @@ -28,7 +28,7 @@ for Surface devices. It works on Surface Pro 3 and all newer Surface devices. To run Surface Asset Tag: -1. On the Surface device, download **Surface Pro 3 AssetTag.zip** from the [Microsoft Download +1. On the Surface device, download **Surface Asset Tag.zip** from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=46703), extract the zip file, and save AssetTag.exe in desired folder (in this example, C:\\assets). diff --git a/devices/surface/deploy-surface-app-with-windows-store-for-business.md b/devices/surface/deploy-surface-app-with-windows-store-for-business.md index 5a351cb4f6..9448059c5b 100644 --- a/devices/surface/deploy-surface-app-with-windows-store-for-business.md +++ b/devices/surface/deploy-surface-app-with-windows-store-for-business.md @@ -14,7 +14,7 @@ ms.reviewer: manager: dansimp --- -#Deploy Surface app with Microsoft Store for Business and Education +# Deploy Surface app with Microsoft Store for Business and Education **Applies to** * Surface Pro 4 @@ -38,11 +38,11 @@ The Surface app is a lightweight Microsoft Store app that provides control of ma If your organization is preparing images that will be deployed to your Surface devices, you may want to include the Surface app (formerly called the Surface Hub) in your imaging and deployment process instead of requiring users of each individual device to download and install the app from the Microsoft Store or your Microsoft Store for Business. -##Surface app overview +## Surface app overview The Surface app is available as a free download from the [Microsoft Store](https://www.microsoft.com/store/apps/Surface/9WZDNCRFJB8P). Users can download and install it from the Microsoft Store, but if your organization uses Microsoft Store for Business instead, you will need to add it to your store’s inventory and possibly include the app as part of your Windows deployment process. These processes are discussed throughout this article. For more information about Microsoft Store for Business, see [Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/) in the Windows TechCenter. -##Add Surface app to a Microsoft Store for Business account +## Add Surface app to a Microsoft Store for Business account Before users can install or deploy an app from a company’s Microsoft Store for Business account, the desired app(s) must first be made available and licensed to the users of a business. @@ -72,14 +72,14 @@ Before users can install or deploy an app from a company’s Microsoft Store for *Figure 3. Offline-licensed app acknowledgement* * Click **OK**. -##Download Surface app from a Microsoft Store for Business account +## Download Surface app from a Microsoft Store for Business account After you add an app to the Microsoft Store for Business account in Offline mode, you can download and add the app as an AppxBundle to a deployment share. 1. Log on to the Microsoft Store for Business account at https://businessstore.microsoft.com. 2. Click **Manage->Apps & software**. A list of all of your company’s apps is displayed, including the Surface app you added in the [Add Surface app to a Microsoft Store for Business account](#add-surface-app-to-a-microsoft-store-for-business-account) section of this article. 3. Under **Actions**, click the ellipsis (**…**), and then click **Download for offline use** for the Surface app. 4. Select the desired **Platform** and **Architecture** options from the available selections for the selected app, as shown in Figure 4. - ![Example of the AppxBundle package](images\deploysurfapp-fig4-downloadappxbundle.png "Example of the AppxBundle package") + ![Example of the AppxBundle package](images/deploysurfapp-fig4-downloadappxbundle.png "Example of the AppxBundle package") *Figure 4. Download the AppxBundle package for an app* 5. Click **Download**. The AppxBundle package will be downloaded. Make sure you note the path of the downloaded file because you’ll need that later in this article. @@ -91,7 +91,7 @@ After you add an app to the Microsoft Store for Business account in Offline mode Figure 5 shows the required frameworks for the Surface app. -![Required frameworks for the Surface app](images\deploysurfapp-fig5-requiredframework.png "Required frameworks for the Surface app") +![Required frameworks for the Surface app](images/deploysurfapp-fig5-requiredframework.png "Required frameworks for the Surface app") *Figure 5. Required frameworks for the Surface app* @@ -105,7 +105,7 @@ To download the required frameworks for the Surface app, follow these steps: >[!NOTE] >Only the 64-bit (x64) version of each framework is required for Surface devices. Surface devices are native 64-bit UEFI devices and are not compatible with 32-bit (x86) versions of Windows that would require 32-bit frameworks. -##Install Surface app on your computer with PowerShell +## Install Surface app on your computer with PowerShell The following procedure provisions the Surface app onto your computer and makes it available for any user accounts created on the computer afterwards. 1. Using the procedure described in the [How to download Surface app from a Microsoft Store for Business account](#download-surface-app-from-a-microsoft-store-for-business-account) section of this article, download the Surface app AppxBundle and license file. 2. Begin an elevated PowerShell session. @@ -129,26 +129,26 @@ The following procedure provisions the Surface app onto your computer and makes Before the Surface app is functional on the computer where it has been provisioned, you must also provision the frameworks described earlier in this article. To provision these frameworks, use the following procedure in the elevated PowerShell session you used to provision the Surface app. -5. In the elevated PowerShell session, copy and paste the following command: -``` - Add-AppxProvisionedPackage –Online –SkipLicense –PackagePath \Microsoft.VCLibs.140.00_14.0.23816.0_x64__8wekyb3d8bbwe.Appx -``` -6. In the elevated PowerShell session, copy and paste the following command: - ``` - Add-AppxProvisionedPackage –Online –SkipLicense –PackagePath \Microsoft.NET.Native.Runtime.1.1_1.1.23406.0_x64__8wekyb3d8bbwe.Appx - ``` +5. In the elevated PowerShell session, copy and paste the following command: + ``` + Add-AppxProvisionedPackage –Online –SkipLicense –PackagePath \Microsoft.VCLibs.140.00_14.0.23816.0_x64__8wekyb3d8bbwe.Appx + ``` +6. In the elevated PowerShell session, copy and paste the following command: + ``` + Add-AppxProvisionedPackage –Online –SkipLicense –PackagePath \Microsoft.NET.Native.Runtime.1.1_1.1.23406.0_x64__8wekyb3d8bbwe.Appx + ``` -##Install Surface app with MDT +## Install Surface app with MDT The following procedure uses MDT to automate installation of the Surface app at the time of deployment. The application is provisioned automatically by MDT during deployment and thus you can use this process with existing images. This is the recommended process to deploy the Surface app as part of a Windows deployment to Surface devices because it does not reduce the cross platform compatibility of the Windows image. -1. Using the procedure described [earlier in this article](#download-surface-app-from-a-microsoft-store-for-business-account), download the Surface app AppxBundle and license file. -2. Using the New Application Wizard in the MDT Deployment Workbench, import the downloaded files as a new **Application with source files**. -3. On the **Command Details** page of the New Application Wizard, specify the default **Working Directory** and for the **Command** specify the file name of the AppxBundle, as follows: +1. Using the procedure described [earlier in this article](#download-surface-app-from-a-microsoft-store-for-business-account), download the Surface app AppxBundle and license file. +2. Using the New Application Wizard in the MDT Deployment Workbench, import the downloaded files as a new **Application with source files**. +3. On the **Command Details** page of the New Application Wizard, specify the default **Working Directory** and for the **Command** specify the file name of the AppxBundle, as follows: - * Command: - ``` - Microsoft.SurfaceHub_10.0.342.0_neutral_~_8wekyb3d8bbwe.AppxBundle - ``` - * Working Directory: %DEPLOYROOT%\Applications\SurfaceApp + * Command: + ``` + Microsoft.SurfaceHub_10.0.342.0_neutral_~_8wekyb3d8bbwe.AppxBundle + ``` + * Working Directory: %DEPLOYROOT%\Applications\SurfaceApp For the Surface app to function on the target computer, it will also require the frameworks described earlier in this article. Use the following procedure to import the frameworks required for the Surface app into MDT and to configure them as dependencies. 1. Using the procedure described earlier in this article, download the framework files. Store each framework in a separate folder. diff --git a/devices/surface/deploy-windows-10-to-surface-devices-with-mdt.md b/devices/surface/deploy-windows-10-to-surface-devices-with-mdt.md index d52ff723c2..e749f22972 100644 --- a/devices/surface/deploy-windows-10-to-surface-devices-with-mdt.md +++ b/devices/surface/deploy-windows-10-to-surface-devices-with-mdt.md @@ -18,10 +18,10 @@ manager: dansimp **Applies to** - Surface Studio -* Surface Pro 4 -* Surface Book -* Surface 3 -* Windows 10 +- Surface Pro 4 +- Surface Book +- Surface 3 +- Windows 10 This article walks you through the recommended process to deploy Windows 10 to Surface devices with Microsoft deployment technologies. The process described in this article yields a complete Windows 10 environment including updated firmware and drivers for your Surface device along with applications like Microsoft Office 365 and the Surface app. When the process is complete, the Surface device will be ready for use by the end user. You can customize this process to include your own applications and configuration to meet the needs of your organization. You can also follow the guidance provided in this article to integrate deployment to Surface devices into existing deployment strategies. @@ -121,13 +121,13 @@ To boot from the network with either your reference virtual machines or your Sur Windows Deployment Services (WDS) is a Windows Server role. To add the WDS role to a Windows Server 2012 R2 environment, use the Add Roles and Features Wizard, as shown in Figure 1. Start the Add Roles and Features Wizard from the **Manage** button of **Server Manager**. Install both the Deployment Server and Transport Server role services. -![Install the Windows Deployment Services role](images\surface-deploymdt-fig1.png "Install the Windows Deployment Services role") +![Install the Windows Deployment Services role](images/surface-deploymdt-fig1.png "Install the Windows Deployment Services role") *Figure 1. Install the Windows Deployment Services server role* After the WDS role is installed, you need to configure WDS. You can begin the configuration process from the WDS node of Server Manager by right-clicking your server’s name and then clicking **Windows Deployment Services Management Console**. In the **Windows Deployment Services** window, expand the **Servers** node to find your server, right-click your server, and then click **Configure** in the menu to start the Windows Deployment Services Configuration Wizard, as shown in Figure 2. -![Configure PXE response for Windows Deployment Services](images\surface-deploymdt-fig2.png "Configure PXE response for Windows Deployment Services") +![Configure PXE response for Windows Deployment Services](images/surface-deploymdt-fig2.png "Configure PXE response for Windows Deployment Services") *Figure 2. Configure PXE response for Windows Deployment Services* @@ -148,7 +148,7 @@ To install Windows ADK, run the Adksetup.exe file that you downloaded from [Down When you get to the **Select the features you want to install** page, you only need to select the **Deployment Tools** and **Windows Preinstallation Environment (Windows PE)** check boxes to deploy Windows 10 using MDT, as shown in Figure 3. -![Required options for deployment with MDT](images\surface-deploymdt-fig3.png "Required options for deployment with MDT") +![Required options for deployment with MDT](images/surface-deploymdt-fig3.png "Required options for deployment with MDT") *Figure 3. Only Deployment Tools and Windows PE options are required for deployment with MDT* @@ -178,24 +178,24 @@ To create the deployment share, follow these steps: 1. Open the Deployment Workbench from your Start menu or Start screen, as shown in Figure 5. - ![The MDT Deployment Workbench](images\surface-deploymdt-fig5.png "The MDT Deployment Workbench") + ![The MDT Deployment Workbench](images/surface-deploymdt-fig5.png "The MDT Deployment Workbench") *Figure 5. The MDT Deployment Workbench* 2. Right-click the **Deployment Shares** folder, and then click **New Deployment Share** to start the New Deployment Share Wizard, as shown in Figure 6. - ![Summary page of the New Deployment Share Wizard](images\surface-deploymdt-fig6.png "Summary page of the New Deployment Share Wizard") + ![Summary page of the New Deployment Share Wizard](images/surface-deploymdt-fig6.png "Summary page of the New Deployment Share Wizard") *Figure 6. The Summary page of the New Deployment Share Wizard* 3. Create a new deployment share with New Deployment Share Wizard with the following steps: - * **Path** – Specify a local folder where the deployment share will reside, and then click **Next**. + * **Path** – Specify a local folder where the deployment share will reside, and then click **Next**. >[!NOTE] >Like the WDS remote installation folder, it is recommended that you put this folder on an NTFS volume that is not your system volume. - * **Share** – Specify a name for the network share under which the local folder specified on the **Path** page will be shared, and then click **Next**. + * **Share** – Specify a name for the network share under which the local folder specified on the **Path** page will be shared, and then click **Next**. >[!NOTE] >The share name cannot contain spaces. @@ -203,11 +203,11 @@ To create the deployment share, follow these steps: >[!NOTE] >You can use a Dollar Sign (**$**) to hide your network share so that it will not be displayed when users browse the available network shares on the server in File Explorer. - * **Descriptive Name** – Enter a descriptive name for the network share (this descriptive name can contain spaces), and then click **Next**. The descriptive name will be the name of the folder as it appears in the Deployment Workbench. - * **Options** – You can accept the default options on this page. Click **Next**. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the deployment share. - * **Progress** – While the deployment share is being created, a progress bar is displayed on this page to indicate the status of the deployment share creation process. - * **Confirmation** – When the deployment share creation process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Deployment Share Wizard. + * **Descriptive Name** – Enter a descriptive name for the network share (this descriptive name can contain spaces), and then click **Next**. The descriptive name will be the name of the folder as it appears in the Deployment Workbench. + * **Options** – You can accept the default options on this page. Click **Next**. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the deployment share. + * **Progress** – While the deployment share is being created, a progress bar is displayed on this page to indicate the status of the deployment share creation process. + * **Confirmation** – When the deployment share creation process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Deployment Share Wizard. 4. When the New Deployment Share Wizard is complete, you can expand the Deployment Shares folder to find your newly created deployment share. 5. You can expand your deployment share, where you will find several folders for the resources, scripts, and components of your MDT deployment environment are stored. @@ -230,30 +230,30 @@ To import Windows 10 installation files, follow these steps: 1. Right-click the **Operating Systems** folder under your deployment share in the Deployment Workbench, and then click **New Folder** to open the **New Folder** page, as shown in Figure 7. - ![Create a new folder on the New Folder page](images\surface-deploymdt-fig7.png "Create a new folder on the New Folder page") + ![Create a new folder on the New Folder page](images/surface-deploymdt-fig7.png "Create a new folder on the New Folder page") *Figure 7. Create a new folder on the New Folder page* 2. On the **New Folder** page a series of steps is displayed, as follows: - * **General Settings** – Enter a name for the folder in the **Folder Name** field (for example, Windows 10 Enterprise), add any comments you want in the **Comments** field, and then click **Next**. - * **Summary** – Review the specified configuration of the new folder on this page, and then click **Next**. - * **Progress** – A progress bar will be displayed on this page while the folder is created. This page will likely pass very quickly. - * **Confirmation** – When the new folder has been created, a **Confirmation** page displays the success of the operation. Click **Finish** to close the **New Folder** page. + * **General Settings** – Enter a name for the folder in the **Folder Name** field (for example, Windows 10 Enterprise), add any comments you want in the **Comments** field, and then click **Next**. + * **Summary** – Review the specified configuration of the new folder on this page, and then click **Next**. + * **Progress** – A progress bar will be displayed on this page while the folder is created. This page will likely pass very quickly. + * **Confirmation** – When the new folder has been created, a **Confirmation** page displays the success of the operation. Click **Finish** to close the **New Folder** page. 3. Expand the Operating Systems folder to see the newly created folder. 4. Right-click the newly created folder, and then click **Import Operating System** to launch the Import Operating System Wizard, as shown in Figure 8. - ![Import source files with the Import Operating System Wizard](images\surface-deploymdt-fig8.png "Import source files with the Import Operating System Wizard") + ![Import source files with the Import Operating System Wizard](images/surface-deploymdt-fig8.png "Import source files with the Import Operating System Wizard") *Figure 8. Import source files with the Import Operating System Wizard* 5. The Import Operating System Wizard walks you through the import of your operating system files, as follows: - * **OS Type** – Click **Full Set of Source Files** to specify that you are importing the Windows source files from installation media, and then click **Next**. - * **Source** – Click **Browse**, move to and select the folder or drive where your installation files are found, and then click **Next**. - * **Destination** – Enter a name for the new folder that will be created to hold the installation files, and then click **Next**. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - * **Progress** – While the installation files are imported, a progress bar is displayed on this page. - * **Confirmation** – When the operating system import process completes, the success of the process is displayed on this page. Click **Finish** to complete Import Operating System Wizard. -6. Expand the folder you created in Step 1 to see the entry for your newly imported installation files for Windows 10. + * **OS Type** – Click **Full Set of Source Files** to specify that you are importing the Windows source files from installation media, and then click **Next**. + * **Source** – Click **Browse**, move to and select the folder or drive where your installation files are found, and then click **Next**. + * **Destination** – Enter a name for the new folder that will be created to hold the installation files, and then click **Next**. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + * **Progress** – While the installation files are imported, a progress bar is displayed on this page. + * **Confirmation** – When the operating system import process completes, the success of the process is displayed on this page. Click **Finish** to complete Import Operating System Wizard. +6. Expand the folder you created in Step 1 to see the entry for your newly imported installation files for Windows 10. Now that you’ve imported the installation files from the installation media, you have the files that MDT needs to create the reference image and you are ready to instruct MDT how to create the reference image to your specifications. @@ -268,35 +268,35 @@ To create the reference image task sequence, follow these steps: 1. Right-click the **Task Sequences** folder under your deployment share in the Deployment Workbench, and then click **New Task Sequence** to start the New Task Sequence Wizard, as shown in Figure 9. - ![Create new task sequence to deploy and update a Windows 10 reference environment](images\surface-deploymdt-fig9.png "Create new task sequence to deploy and update a Windows 10 reference environment") + ![Create new task sequence to deploy and update a Windows 10 reference environment](images/surface-deploymdt-fig9.png "Create new task sequence to deploy and update a Windows 10 reference environment") *Figure 9. Create a new task sequence to deploy and update a Windows 10 reference environment* 2. The New Task Sequence Wizard presents a series of steps, as follows: - * **General Settings** – Enter an identifier for the reference image task sequence in the **Task Sequence ID** field, a name for the reference image task sequence in the **Task Sequence Name** field, and any comments for the reference image task sequence in the **Task Sequence Comments** field, and then click **Next**. - >[!NOTE] - >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. - * **Select Template** – Select **Standard Client Task Sequence** from the drop-down menu, and then click **Next**. - * **Select OS** – Navigate to and select the Windows 10 image you imported with the Windows 10 installation files, and then click **Next**. - * **Specify Product Key** – Click **Do Not Specify a Product Key at This Time**, and then click **Next**. - * **OS Settings** – Enter a name, organization, and home page URL in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. - * **Admin Password** – Click **Use the Specified Local Administrator Password**, enter a password in the provided field, and then click **Next**. - >[!NOTE] - >During creation of a reference image, any specified Administrator password will be automatically removed when the image is prepared for capture with Sysprep. During reference image creation, a password is not necessary, but is recommended to remain in line with best practices for production deployment environments. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. - * **Progress** – While the task sequence is created, a progress bar is displayed on this page. - * **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete the New Task Sequence Wizard. -2. Select the **Task Sequences** folder, right-click the new task sequence you created, and then click **Properties**. -3. Select the **Task Sequence** tab to view the steps that are included in the Standard Client Task Sequence template, as shown in Figure 10. + * **General Settings** – Enter an identifier for the reference image task sequence in the **Task Sequence ID** field, a name for the reference image task sequence in the **Task Sequence Name** field, and any comments for the reference image task sequence in the **Task Sequence Comments** field, and then click **Next**. + >[!NOTE] + >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. + * **Select Template** – Select **Standard Client Task Sequence** from the drop-down menu, and then click **Next**. + * **Select OS** – Navigate to and select the Windows 10 image you imported with the Windows 10 installation files, and then click **Next**. + * **Specify Product Key** – Click **Do Not Specify a Product Key at This Time**, and then click **Next**. + * **OS Settings** – Enter a name, organization, and home page URL in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. + * **Admin Password** – Click **Use the Specified Local Administrator Password**, enter a password in the provided field, and then click **Next**. + >[!NOTE] + >During creation of a reference image, any specified Administrator password will be automatically removed when the image is prepared for capture with Sysprep. During reference image creation, a password is not necessary, but is recommended to remain in line with best practices for production deployment environments. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. + * **Progress** – While the task sequence is created, a progress bar is displayed on this page. + * **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete the New Task Sequence Wizard. +3. Select the **Task Sequences** folder, right-click the new task sequence you created, and then click **Properties**. +4. Select the **Task Sequence** tab to view the steps that are included in the Standard Client Task Sequence template, as shown in Figure 10. - ![Enable Windows Update in the reference image task sequence](images\surface-deploymdt-fig10.png "Enable Windows Update in the reference image task sequence") + ![Enable Windows Update in the reference image task sequence](images/surface-deploymdt-fig10.png "Enable Windows Update in the reference image task sequence") *Figure 10. Enable Windows Update in the reference image task sequence* -4. Select the **Windows Update (Pre-Application Installation)** option, located under the **State Restore** folder. -5. Click the **Options** tab, and then clear the **Disable This Step** check box. -6. Repeat Step 4 and Step 5 for the **Windows Update (Post-Application Installation)** option. -7. Click **OK** to apply changes to the task sequence, and then close the task sequence properties window. +5. Select the **Windows Update (Pre-Application Installation)** option, located under the **State Restore** folder. +6. Click the **Options** tab, and then clear the **Disable This Step** check box. +7. Repeat Step 4 and Step 5 for the **Windows Update (Post-Application Installation)** option. +8. Click **OK** to apply changes to the task sequence, and then close the task sequence properties window. ### Generate and import MDT boot media @@ -306,25 +306,25 @@ To update the MDT boot media, follow these steps: 1. Right-click the deployment share in the Deployment Workbench, and then click **Update Deployment Share** to start the Update Deployment Share Wizard, as shown in Figure 11. - ![Generate boot images with the Update Deployment Share Wizard](images\surface-deploymdt-fig11.png "Generate boot images with the Update Deployment Share Wizard") + ![Generate boot images with the Update Deployment Share Wizard](images/surface-deploymdt-fig11.png "Generate boot images with the Update Deployment Share Wizard") *Figure 11. Generate boot images with the Update Deployment Share Wizard* 2. Use the Update Deployment Share Wizard to create boot images with the following process: - * **Options** – Click **Completely Regenerate the Boot Images**, and then click **Next**. - >[!NOTE] - >Because this is the first time the newly created deployment share has been updated, new boot images will be generated regardless of which option you select on the **Options** page. - * **Summary** – Review the specified options on this page before you click **Next** to begin generation of boot images. - * **Progress** – While the boot images are being generated, a progress bar is displayed on this page. - * **Confirmation** – When the boot images have been generated, the success of the process is displayed on this page. Click **Finish** to complete the Update Deployment Share Wizard. + * **Options** – Click **Completely Regenerate the Boot Images**, and then click **Next**. + >[!NOTE] + >Because this is the first time the newly created deployment share has been updated, new boot images will be generated regardless of which option you select on the **Options** page. + * **Summary** – Review the specified options on this page before you click **Next** to begin generation of boot images. + * **Progress** – While the boot images are being generated, a progress bar is displayed on this page. + * **Confirmation** – When the boot images have been generated, the success of the process is displayed on this page. Click **Finish** to complete the Update Deployment Share Wizard. 3. Confirm that boot images have been generated by navigating to the deployment share in File Explorer and opening the Boot folder. The following files should be displayed, as shown in Figure 12: - * **LiteTouchPE_x86.iso** - * **LiteTouchPE_x86.wim** - * **LiteTouchPE_x64.iso** - * **LiteTouchPE_x64.wim** + * **LiteTouchPE_x86.iso** + * **LiteTouchPE_x86.wim** + * **LiteTouchPE_x64.iso** + * **LiteTouchPE_x64.wim** - ![Boot images in the Boot folder after Update Deployment Share Wizard completes](images\surface-deploymdt-fig12.png "Boot images in the Boot folder after Update Deployment Share Wizard completes") + ![Boot images in the Boot folder after Update Deployment Share Wizard completes](images/surface-deploymdt-fig12.png "Boot images in the Boot folder after Update Deployment Share Wizard completes") *Figure 12. Boot images displayed in the Boot folder after completion of the Update Deployment Share Wizard* @@ -334,21 +334,21 @@ To import the MDT boot media into WDS for PXE boot, follow these steps: 2. Expand **Servers** and your deployment server. 3. Click the **Boot Images** folder, as shown in Figure 13. - ![Start the Add Image Wizard from the Boot Images folder](images\surface-deploymdt-fig13.png "Start the Add Image Wizard from the Boot Images folder") + ![Start the Add Image Wizard from the Boot Images folder](images/surface-deploymdt-fig13.png "Start the Add Image Wizard from the Boot Images folder") *Figure 13. Start the Add Image Wizard from the Boot Images folder* 4. Right-click the **Boot Images** folder, and then click **Add Boot Image** to open the Add Image Wizard, as shown in Figure 14. - ![Import the LiteTouchPE_x86.wim MDT boot image](images\surface-deploymdt-fig14.png "Import the LiteTouchPE_x86.wim MDT boot image") + ![Import the LiteTouchPE_x86.wim MDT boot image](images/surface-deploymdt-fig14.png "Import the LiteTouchPE_x86.wim MDT boot image") *Figure 14. Import the LiteTouchPE_x86.wim MDT boot image* 5. The Add Image Wizard displays a series of steps, as follows: - * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, click **LiteTouchPE_x86.wim**, click **Open**, and then click **Next**. - * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. - * **Summary** – Review your selections to import a boot image into WDS, and then click **Next**. - * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Add Image Wizard. + * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, click **LiteTouchPE_x86.wim**, click **Open**, and then click **Next**. + * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. + * **Summary** – Review your selections to import a boot image into WDS, and then click **Next**. + * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Add Image Wizard. >[!NOTE] >Only the 32-bit boot image, LiteTouchPE_x86.wim, is required to boot from BIOS devices, including Generation 1 Hyper-V virtual machines like the reference virtual machine. @@ -379,7 +379,7 @@ Perform the reference image deployment and capture using the following steps: 1. Start your virtual machine and press the F12 key when prompted to boot to the WDS server via PXE, as shown in Figure 15. - ![Start network boot by pressing the F12 key](images\surface-deploymdt-fig15.png "Start network boot by pressing the F12 key") + ![Start network boot by pressing the F12 key](images/surface-deploymdt-fig15.png "Start network boot by pressing the F12 key") *Figure 15. Start network boot by pressing the F12 key* @@ -387,18 +387,18 @@ Perform the reference image deployment and capture using the following steps: 3. Enter your MDT username and password, a user with rights to access the MDT deployment share over the network and with rights to write to the Captures folder in the deployment share. 4. After your credentials are validated, the Windows Deployment Wizard will start and process the boot and deployment share rules. 5. The Windows Deployment Wizard displays a series of steps, as follows: - * **Task Sequence** – Select the task sequence you created for reference image creation (it should be the only task sequence available), and then click **Next**. - * **Computer Details** – Leave the default computer name, workgroup name, and the **Join a Workgroup** option selected, and then click **Next**. The computer name and workgroup will be reset when the image is prepared by Sysprep and captured. - * **Move Data and Settings** – Leave the default option of **Do Not Move User Data and Settings** selected, and then click **Next**. - * **User Data (Restore)** – Leave the default option of **Do Not Restore User Data and Settings** selected, and then click **Next**. - * **Locale and Time** – Leave the default options for language and time settings selected. The locale and time settings will be specified during deployment of the image to other devices. Click **Next**. - * **Capture Image** – Click the **Capture an Image of this Reference Computer** option, as shown in Figure 16. In the **Location** field, keep the default location of the Captures folder. You can keep or change the name of the image file in the **File Name** field. When you are finished, click **Next**. + * **Task Sequence** – Select the task sequence you created for reference image creation (it should be the only task sequence available), and then click **Next**. + * **Computer Details** – Leave the default computer name, workgroup name, and the **Join a Workgroup** option selected, and then click **Next**. The computer name and workgroup will be reset when the image is prepared by Sysprep and captured. + * **Move Data and Settings** – Leave the default option of **Do Not Move User Data and Settings** selected, and then click **Next**. + * **User Data (Restore)** – Leave the default option of **Do Not Restore User Data and Settings** selected, and then click **Next**. + * **Locale and Time** – Leave the default options for language and time settings selected. The locale and time settings will be specified during deployment of the image to other devices. Click **Next**. + * **Capture Image** – Click the **Capture an Image of this Reference Computer** option, as shown in Figure 16. In the **Location** field, keep the default location of the Captures folder. You can keep or change the name of the image file in the **File Name** field. When you are finished, click **Next**. - ![Capture an image of the reference machine](images\surface-deploymdt-fig16.png "Capture an image of the reference machine") + ![Capture an image of the reference machine](images/surface-deploymdt-fig16.png "Capture an image of the reference machine") - *Figure 16. Use the Capture Image page to capture an image of the reference machine after deployment* + *Figure 16. Use the Capture Image page to capture an image of the reference machine after deployment* - * **Ready** – You can review your selections by expanding **Details** on the **Ready** page. Click **Begin** when you are ready to perform the deployment and capture of your reference image. + * **Ready** – You can review your selections by expanding **Details** on the **Ready** page. Click **Begin** when you are ready to perform the deployment and capture of your reference image. 6. Your reference task sequence will run with the specified options. @@ -427,14 +427,14 @@ To import the reference image for deployment, use the following steps: 1. Right-click the **Operating Systems** folder under your deployment share in the Deployment Workbench or the folder you created in when you imported Windows 10 installation files, and then click **Import Operating System** to start the Import Operating System Wizard. 2. Import the custom image with the Import Operating System Wizard by using the following steps: - * **OS Type** – Select Custom Image File to specify that you are importing the Windows source files from installation media, and then click **Next**. - * **Image** – Click **Browse**, and then navigate to and select the image file in the **Captures** folder in your deployment share. Select the **Move the Files to the Deployment Share Instead of Copying Them** checkbox if desired. Click **Next**. - * **Setup** – Click **Setup Files are not Neededf**, and then click **Next**. - * **Destination** – Enter a name for the new folder that will be created to hold the image file, and then click **Next**. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - * **Progress** – While the image is imported, a progress bar is displayed on this page. - * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Operating System Wizard. -3. Expand the folder in which you imported the image to verify that the import completed successfully. + * **OS Type** – Select Custom Image File to specify that you are importing the Windows source files from installation media, and then click **Next**. + * **Image** – Click **Browse**, and then navigate to and select the image file in the **Captures** folder in your deployment share. Select the **Move the Files to the Deployment Share Instead of Copying Them** checkbox if desired. Click **Next**. + * **Setup** – Click **Setup Files are not Neededf**, and then click **Next**. + * **Destination** – Enter a name for the new folder that will be created to hold the image file, and then click **Next**. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + * **Progress** – While the image is imported, a progress bar is displayed on this page. + * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Operating System Wizard. +3. Expand the folder in which you imported the image to verify that the import completed successfully. >[!NOTE] >You can import the reference image into the same deployment share that you used to create your reference image, or you could import the reference image into a new deployment share for deployment to your Surface devices. If you chose to create a new deployment share for deployment of your reference image, remember that you still need to import a full set of installation files from installation media. @@ -458,24 +458,24 @@ To import the Surface drivers (in this example, Surface Pro 4) into MDT, follow * Microsoft Corporation * Surface Pro 4 - ![Recommended folder structure for drivers](images\surface-deploymdt-fig17.png "Recommended folder structure for drivers") + ![Recommended folder structure for drivers](images/surface-deploymdt-fig17.png "Recommended folder structure for drivers") *Figure 17. The recommended folder structure for drivers* 4. Right-click the **Surface Pro 4** folder, and then click **Import Drivers** to start the Import Drivers Wizard, as shown in Figure 18. - ![Progress page during drivers import](images\surface-deploymdt-fig18.png "Progress page during drivers import") + ![Progress page during drivers import](images/surface-deploymdt-fig18.png "Progress page during drivers import") *Figure 18. The Progress page during drivers import* 5. The Import Driver Wizard displays a series of steps, as follows: - * **Specify Directory** – Click **Browse** and navigate to the folder where you extracted the Surface Pro 4 firmware and drivers in Step 1. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - * **Progress** – While the drivers are imported, a progress bar is displayed on this page. - * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Drivers Wizard. -6. Click the **Surface Pro 4** folder and verify that the folder now contains the drivers that were imported, as shown in Figure 19. + * **Specify Directory** – Click **Browse** and navigate to the folder where you extracted the Surface Pro 4 firmware and drivers in Step 1. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + * **Progress** – While the drivers are imported, a progress bar is displayed on this page. + * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Drivers Wizard. +6. Click the **Surface Pro 4** folder and verify that the folder now contains the drivers that were imported, as shown in Figure 19. - ![Drivers for Surface Pro 4 imported and organized in the MDT deployment share](images\surface-deploymdt-fig19.png "Drivers for Surface Pro 4 imported and organized in the MDT deployment share") + ![Drivers for Surface Pro 4 imported and organized in the MDT deployment share](images/surface-deploymdt-fig19.png "Drivers for Surface Pro 4 imported and organized in the MDT deployment share") *Figure 19. Drivers for Surface Pro 4 imported and organized in the MDT deployment share* @@ -493,7 +493,7 @@ After you have downloaded the source files for your version of Office Click-to-R 1. Right-click the existing **Configuration.xml** file, and then click **Edit**. 2. This action opens the file in Notepad. Replace the existing text with the following: - ``` + ``` @@ -501,7 +501,7 @@ After you have downloaded the source files for your version of Office Click-to-R -``` + ``` 3. Save the file. @@ -514,22 +514,22 @@ Now that the installation and configuration files are prepared, the application 1. Open the Deployment Workbench. 2. Expand the deployment share, right-click the **Applications** folder, and then click **New Application** to start the New Application Wizard, as shown in Figure 20. - ![Enter the command and directory for Office 2016 Click-to-Run](images\surface-deploymdt-fig20.png "Enter the command and directory for Office 2016 Click-to-Run") + ![Enter the command and directory for Office 2016 Click-to-Run](images/surface-deploymdt-fig20.png "Enter the command and directory for Office 2016 Click-to-Run") *Figure 20. Enter the command and directory for Office 2016 Click-to-Run* 3. The New Application Wizard walks you through importing the Office 2016 Click-to-Run files, as follows: - * **Application Type** – Click **Application with Source Files**, and then click **Next**. - * **Details** – Enter a name for the application (for example, Office 2016 Click-to-Run) in the **Application Name** field. Enter publisher, version, and language information in the **Publisher**, **Version**, and **Language** fields if desired. Click **Next**. - * **Source** – Click **Browse** to navigate to and select the folder where you downloaded the Office installation files with the Office Deployment Tool, and then click **Next**. - * **Destination** – Enter a name for the folder where the application files will be stored in the **Specify the Name of the Directory that Should Be Created** field or click **Next** to accept the default name. - * **Command Details** – Enter the Office Deployment Tool installation command line: + * **Application Type** – Click **Application with Source Files**, and then click **Next**. + * **Details** – Enter a name for the application (for example, Office 2016 Click-to-Run) in the **Application Name** field. Enter publisher, version, and language information in the **Publisher**, **Version**, and **Language** fields if desired. Click **Next**. + * **Source** – Click **Browse** to navigate to and select the folder where you downloaded the Office installation files with the Office Deployment Tool, and then click **Next**. + * **Destination** – Enter a name for the folder where the application files will be stored in the **Specify the Name of the Directory that Should Be Created** field or click **Next** to accept the default name. + * **Command Details** – Enter the Office Deployment Tool installation command line: `Setup.exe /configure configuration.xml` - * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - * **Progress** – While the installation files are imported, a progress bar is displayed on this page. - * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Application Wizard. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + * **Progress** – While the installation files are imported, a progress bar is displayed on this page. + * **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Application Wizard. 4. You should now see the **Office 2016 Click-to-Run** item under the **Applications** folder in the Deployment Workbench. @@ -551,17 +551,17 @@ The next step in the process is to create the deployment task sequence. This tas To create the deployment task sequence, follow these steps: 1. In the Deployment Workbench, under your Deployment Share, right-click the **Task Sequences** folder, and then click **New Task Sequence** to start the New Task Sequence Wizard. 2. Use these steps to create the deployment task sequence with the New Task Sequence Wizard: - * **General Settings** – Enter an identifier for the deployment task sequence in the **Task Sequence ID** field, a name for the deployment task sequence in the **Task Sequence Name** field, and any comments for the deployment task sequence in the **Task Sequence Comments** field, then click **Next**. - >[!NOTE] - >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. - * **Select Template** – Click **Standard Client Task Sequence** from the drop-down menu, and then click **Next**. - * **Select OS** – Navigate to and select the reference image that you imported, and then click **Next**. - * **Specify Product Key** – Select the product key entry that fits your organization's licensing system. The **Do Not Specify a Product Key at This Time** option can be used for systems that will be activated via Key Management Services (KMS) or Active Directory Based Activation (ADBA). A product key can be specified specifically if your organization uses Multiple Activation Keys (MAK). Click **Next**. - * **OS Settings** – Enter a name and organization for registration of Windows, and a home page URL for users when they browse the Internet in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. - * **Admin Password** – Click **Use the Specified Local Administrator Password**, enter a password in the provided field, and then click **Next**. - * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. - * **Progress** – While the task sequence is being created, a progress bar is displayed on this page. - * **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete the New Task Sequence Wizard. + * **General Settings** – Enter an identifier for the deployment task sequence in the **Task Sequence ID** field, a name for the deployment task sequence in the **Task Sequence Name** field, and any comments for the deployment task sequence in the **Task Sequence Comments** field, then click **Next**. + >[!NOTE] + >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. + * **Select Template** – Click **Standard Client Task Sequence** from the drop-down menu, and then click **Next**. + * **Select OS** – Navigate to and select the reference image that you imported, and then click **Next**. + * **Specify Product Key** – Select the product key entry that fits your organization's licensing system. The **Do Not Specify a Product Key at This Time** option can be used for systems that will be activated via Key Management Services (KMS) or Active Directory Based Activation (ADBA). A product key can be specified specifically if your organization uses Multiple Activation Keys (MAK). Click **Next**. + * **OS Settings** – Enter a name and organization for registration of Windows, and a home page URL for users when they browse the Internet in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. + * **Admin Password** – Click **Use the Specified Local Administrator Password**, enter a password in the provided field, and then click **Next**. + * **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. + * **Progress** – While the task sequence is being created, a progress bar is displayed on this page. + * **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete the New Task Sequence Wizard. After the task sequence is created it can be modified for increased automation, such as the installation of applications without user interaction, the selection of drivers, and the installation of Windows updates. @@ -573,7 +573,7 @@ After the task sequence is created it can be modified for increased automation, 6. Between the two **Windows Update** steps is the **Install Applications** step. Click the **Install Applications** step, and then click **Add**. 7. Hover the mouse over **General** under the **Add** menu, and then click **Install Application**. This will add a new step after the selected step for the installation of a specific application as shown in Figure 21. - ![A new Install Application step in the deployment task sequence](images\surface-deploymdt-fig21.png "A new Install Application step in the deployment task sequence") + ![A new Install Application step in the deployment task sequence](images/surface-deploymdt-fig21.png "A new Install Application step in the deployment task sequence") *Figure 21. A new Install Application step in the deployment task sequence* @@ -584,22 +584,22 @@ After the task sequence is created it can be modified for increased automation, 12. Expand the **Preinstall** folder, and then click the **Enable BitLocker (Offline)** step. 13. Open the **Add** menu again and choose **Set Task Sequence Variable** from under the **General** menu. 14. On the **Properties** tab of the new **Set Task Sequence Variable** step (as shown in Figure 22), configure the following options: - * **Name** – Set DriverGroup001 - * **Task Sequence Variable** – DriverGroup001 - * **Value** – Windows 10 x64\%Make%\%Model% + * **Name** – Set DriverGroup001 + * **Task Sequence Variable** – DriverGroup001 + * **Value** – Windows 10 x64\%Make%\%Model% - ![Configure a new Set Task Sequence Variable step in the deployment task sequence](images\surface-deploymdt-fig22.png "Configure a new Set Task Sequence Variable step in the deployment task sequence") + ![Configure a new Set Task Sequence Variable step in the deployment task sequence](images/surface-deploymdt-fig22.png "Configure a new Set Task Sequence Variable step in the deployment task sequence") - *Figure 22. Configure a new Set Task Sequence Variable step in the deployment task sequence* + *Figure 22. Configure a new Set Task Sequence Variable step in the deployment task sequence* 15. Select the **Inject Drivers** step, the next step in the task sequence. 16. On the **Properties** tab of the **Inject Drivers** step (as shown in Figure 23), configure the following options: - * In the **Choose a selection profile** drop-down menu, select **Nothing**. - * Click the **Install all drivers from the selection profile** button. + * In the **Choose a selection profile** drop-down menu, select **Nothing**. + * Click the **Install all drivers from the selection profile** button. - ![Configure deployment task sequence not to choose the drivers to inject into Windows](images\surface-deploymdt-fig23.png "Configure deployment task sequence not to choose the drivers to inject into Windows") + ![Configure deployment task sequence not to choose the drivers to inject into Windows](images/surface-deploymdt-fig23.png "Configure deployment task sequence not to choose the drivers to inject into Windows") - *Figure 23. Configure the deployment task sequence not to choose the drivers to inject into Windows* + *Figure 23. Configure the deployment task sequence not to choose the drivers to inject into Windows* 17. Click **OK** to apply changes to the task sequence and close the task sequence properties window. @@ -617,20 +617,20 @@ To automate the boot media rules, follow these steps: 2. Click the **Rules** tab, and then click **Edit Bootstrap.ini** to open Bootstrap.ini in Notepad. 3. Replace the text of the Bootstrap.ini file with the following text: - ``` - [Settings] - Priority=Model,Default + ``` + [Settings] + Priority=Model,Default - [Surface Pro 4] - DeployRoot=\\STNDeployServer\DeploymentShare$ - UserDomain=STNDeployServer - UserID=MDTUser - UserPassword=P@ssw0rd - SkipBDDWelcome=YES + [Surface Pro 4] + DeployRoot=\\STNDeployServer\DeploymentShare$ + UserDomain=STNDeployServer + UserID=MDTUser + UserPassword=P@ssw0rd + SkipBDDWelcome=YES - [Surface Pro 4] - DeployRoot=\\STNDeployServer\DeploymentShare$ - ``` + [Surface Pro 4] + DeployRoot=\\STNDeployServer\DeploymentShare$ + ``` 4. Press Ctrl+S to save Bootstrap.ini, and then close Notepad. @@ -650,7 +650,7 @@ Rules used in the text shown in Step 3 include: The bulk of the rules used to automate the MDT deployment process are stored in the deployment share rules, or the Customsettings.ini file. In this file you can answer and hide all of the prompts from the Windows Deployment Wizard, which yields a deployment experience that mostly consists of a progress bar that displays the automated actions occurring on the device. The deployment share rules are shown directly in the **Rules** tab of the deployment share properties, as shown in Figure 24. -![Deployment share rules configured for automation of the Windows Deployment Wizard](images\surface-deploymdt-fig24.png "Deployment share rules configured for automation of the Windows Deployment Wizard") +![Deployment share rules configured for automation of the Windows Deployment Wizard](images/surface-deploymdt-fig24.png "Deployment share rules configured for automation of the Windows Deployment Wizard") *Figure 24. Deployment share rules configured for automation of the Windows Deployment Wizard* @@ -740,10 +740,10 @@ To update the MDT boot media, follow these steps: 1. Right-click the deployment share in the Deployment Workbench, and then click **Update Deployment Share** to start the Update Deployment Share Wizard. 2. The Update Deployment Share Wizard displays a series of steps, as follows: - * **Options** – Choose between the **Completely Regenerate the Boot Images** or **Optimize the Boot Image Updating Process** options. Completely regenerating the boot images will take more time, but produces boot media that is not fragmented and does not contain out of date components. Optimizing the boot image updating process will proceed more quickly, but may result in longer load times when booting via PXE. Click **Next**. - * **Summary** – Review the specified options on this page before you click **Next** to begin the update of boot images. - * **Progress** – While the boot images are being updated a progress bar is displayed on this page. - * **Confirmation** – When the boot images have been updated, the success of the process is displayed on this page. Click **Finish** to complete the Update Deployment Share Wizard. + * **Options** – Choose between the **Completely Regenerate the Boot Images** or **Optimize the Boot Image Updating Process** options. Completely regenerating the boot images will take more time, but produces boot media that is not fragmented and does not contain out of date components. Optimizing the boot image updating process will proceed more quickly, but may result in longer load times when booting via PXE. Click **Next**. + * **Summary** – Review the specified options on this page before you click **Next** to begin the update of boot images. + * **Progress** – While the boot images are being updated a progress bar is displayed on this page. + * **Confirmation** – When the boot images have been updated, the success of the process is displayed on this page. Click **Finish** to complete the Update Deployment Share Wizard. To import the updated MDT boot media into WDS for PXE boot, follow these steps: @@ -752,17 +752,17 @@ To import the updated MDT boot media into WDS for PXE boot, follow these steps: 3. Click the **Boot Images** folder. 4. Right-click the existing MDT boot image, and then click **Replace Image** to open the Replace Boot Image Wizard. 5. Replace the previously imported MDT boot image with the updated version by using these steps in the Replace Boot Image Wizard: - * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, click **LiteTouchPE_x86.wim**, and then click **Open**. Click **Next**. - * **Available Images** – Only one image should be listed and selected **LiteTouch Windows PE (x86)**, click **Next**. - * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. - * **Summary** – Review your selections for importing a boot image into WDS, and then click **Next**. - * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Replace Boot Image Wizard. + * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, click **LiteTouchPE_x86.wim**, and then click **Open**. Click **Next**. + * **Available Images** – Only one image should be listed and selected **LiteTouch Windows PE (x86)**, click **Next**. + * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. + * **Summary** – Review your selections for importing a boot image into WDS, and then click **Next**. + * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Replace Boot Image Wizard. 6. Right-click the **Boot Images** folder, and then click **Add Image** to open the Add Image Wizard. 7. Add the new 64-bit boot image for 64-bit UEFI device compatibility with the Add Image Wizard , as follows: - * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, select **LiteTouchPE_x64.wim**, and then click **Open**. Click **Next**. - * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. - * **Summary** – Review your selections to import a boot image into WDS, and then click **Next**. - * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Add Image Wizard. + * **Image File** – Click **Browse** and navigate to the **Boot** folder in your deployment share, select **LiteTouchPE_x64.wim**, and then click **Open**. Click **Next**. + * **Image Metadata** – Enter a name and description for the MDT boot media, or click **Next** to accept the default options. + * **Summary** – Review your selections to import a boot image into WDS, and then click **Next**. + * **Task Progress** – A progress bar is displayed as the selected image file is copied into the WDS remote installation folder. Click **Finish** when the task is complete to close the Add Image Wizard. >[!NOTE] >Although it is a best practice to replace and update the boot images in WDS whenever the MDT deployment share is updated, for deployment to Surface devices the 32-bit boot image, LiteTouchPE_x86.wim, is not required. Only the 64-bit boot image is required for 64-bit UEFI devices. @@ -774,7 +774,7 @@ With all of the automation provided by the deployment share rules and task seque >[!NOTE] >For the deployment to require only a single touch, the Surface devices must be connected to a keyboard, connected to the network with a Microsoft Surface USB Ethernet Adapter or Surface Dock, and configured with PXE boot as the first boot option, as shown in Figure 25. -![Set boot priority for PXE boot](images\surface-deploymdt-fig25.png "Set boot priority for PXE boot") +![Set boot priority for PXE boot](images/surface-deploymdt-fig25.png "Set boot priority for PXE boot") *Figure 25. Setting boot priority for PXE boot* diff --git a/devices/surface/docfx.json b/devices/surface/docfx.json index 41fee61550..207b2119b7 100644 --- a/devices/surface/docfx.json +++ b/devices/surface/docfx.json @@ -1,40 +1,47 @@ { "build": { - "content": - [ - { - "files": ["**/**.md", "**/**.yml"], - "exclude": ["**/obj/**"] - } - ], + "content": [ + { + "files": [ + "**/**.md", + "**/**.yml" + ], + "exclude": [ + "**/obj/**" + ] + } + ], "resource": [ - { - "files": ["**/images/**"], - "exclude": ["**/obj/**"] - } + { + "files": [ + "**/images/**" + ], + "exclude": [ + "**/obj/**" + ] + } ], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/surface/breadcrumb/toc.json", - "ROBOTS": "INDEX, FOLLOW", - "ms.technology": "windows", - "ms.topic": "article", - "ms.author": "jdecker", - "ms.date": "05/09/2017", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.surface", - "folder_relative_path_in_docset": "./" - } - } + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/surface/breadcrumb/toc.json", + "ROBOTS": "INDEX, FOLLOW", + "ms.technology": "windows", + "ms.topic": "article", + "ms.author": "jdecker", + "ms.date": "05/09/2017", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.surface", + "folder_relative_path_in_docset": "./" + } + } }, - "externalReference": [ - ], + "externalReference": [], "template": "op.html", "dest": "devices/surface", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/devices/surface/enroll-and-configure-surface-devices-with-semm.md b/devices/surface/enroll-and-configure-surface-devices-with-semm.md index e2b4142c11..3d04792b01 100644 --- a/devices/surface/enroll-and-configure-surface-devices-with-semm.md +++ b/devices/surface/enroll-and-configure-surface-devices-with-semm.md @@ -37,13 +37,13 @@ To create a Surface UEFI configuration package, follow these steps: 2. Click **Start**. 3. Click **Configuration Package**, as shown in Figure 1. - ![Create a package for SEMM enrollment](images\surface-ent-mgmt-fig1-uefi-configurator.png "Create a package for SEMM enrollment") + ![Create a package for SEMM enrollment](images/surface-ent-mgmt-fig1-uefi-configurator.png "Create a package for SEMM enrollment") *Figure 1. Select Configuration Package to create a package for SEMM enrollment and configuration* 4. Click **Certificate Protection** to add your exported certificate file with private key (.pfx), as shown in Figure 2. Browse to the location of your certificate file, select the file, and then click **OK**. - ![Add the SEM certificate and Surface UEFI password to configuration package](images\surface-ent-mgmt-fig2-securepackage.png "Add the SEM certificate and Surface UEFI password to configuration package") + ![Add the SEM certificate and Surface UEFI password to configuration package](images/surface-ent-mgmt-fig2-securepackage.png "Add the SEM certificate and Surface UEFI password to configuration package") *Figure 2. Add the SEMM certificate and Surface UEFI password to a Surface UEFI configuration package* @@ -52,23 +52,23 @@ To create a Surface UEFI configuration package, follow these steps: 7. When you are prompted, enter and confirm your chosen password for Surface UEFI, and then click **OK**. If you want to clear an existing Surface UEFI password, leave the password field blank. 8. If you do not want the Surface UEFI package to apply to a particular device, on the **Choose which Surface type you want to target** page, click the slider beneath the corresponding Surface Book or Surface Pro 4 image so that it is in the **Off** position. (As shown in Figure 3.) - ![Choose devices for package compatibility](images\surface-semm-enroll-fig3.png "Choose devices for package compatibility") + ![Choose devices for package compatibility](images/surface-semm-enroll-fig3.png "Choose devices for package compatibility") *Figure 3. Choose the devices for package compatibility* 9. Click **Next**. 10. If you want to deactivate a component on managed Surface devices, on the **Choose which components you want to activate or deactivate** page, click the slider next to any device or group of devices you want to deactivate so that the slider is in the **Off** position. (Shown in Figure 4.) The default configuration for each device is **On**. Click the **Reset** button if you want to return all sliders to the default position. - ![Disable or enable Surface components](images\surface-ent-mgmt-fig3-enabledisable.png "Disable or enable Surface components") + ![Disable or enable Surface components](images/surface-ent-mgmt-fig3-enabledisable.png "Disable or enable Surface components") - *Figure 4. Disable or enable individual Surface components* + *Figure 4. Disable or enable individual Surface components* 11. Click **Next**. 12. To enable or disable advanced options in Surface UEFI or the display of Surface UEFI pages, on the **Choose the advanced settings for your devices** page, click the slider beside the desired setting to configure that option to **On** or **Off** (shown in Figure 5). In the **UEFI Front Page** section, you can use the sliders for **Security**, **Devices**, and **Boot** to control what pages are available to users who boot into Surface UEFI. (For more information about Surface UEFI settings, see [Manage Surface UEFI settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).) Click **Build** when you have finished selecting options to generate and save the package. - ![Control advanced Surface UEFI settings and Surface UEFI pages](images\surface-ent-mgmt-fig4-advancedsettings.png "Control advanced Surface UEFI settings and Surface UEFI pages") + ![Control advanced Surface UEFI settings and Surface UEFI pages](images/surface-ent-mgmt-fig4-advancedsettings.png "Control advanced Surface UEFI settings and Surface UEFI pages") - *Figure 5. Control advanced Surface UEFI settings and Surface UEFI pages with SEMM* + *Figure 5. Control advanced Surface UEFI settings and Surface UEFI pages with SEMM* 13. In the **Save As** dialog box, specify a name for the Surface UEFI configuration package, browse to the location where you would like to save the file, and then click **Save**. 14. When the package is created and saved, the **Successful** page is displayed. @@ -76,7 +76,7 @@ To create a Surface UEFI configuration package, follow these steps: >[!NOTE] >Record the certificate thumbprint characters that are displayed on this page, as shown in Figure 6. You will need these characters to confirm enrollment of new Surface devices in SEMM. Click **End** to complete package creation and close Microsoft Surface UEFI Configurator. -![Display of certificate thumbprint characters](images\surface-ent-mgmt-fig5-success.png "Display of certificate thumbprint characters") +![Display of certificate thumbprint characters](images/surface-ent-mgmt-fig5-success.png "Display of certificate thumbprint characters") *Figure 6. The last two characters of the certificate thumbprint are displayed on the Successful page* @@ -88,7 +88,7 @@ Now that you have created your Surface UEFI configuration package, you can enrol ## Enroll a Surface device in SEMM When the Surface UEFI configuration package is executed, the SEMM certificate and Surface UEFI configuration files are staged in the firmware storage of the Surface device. When the Surface device reboots, Surface UEFI processes these files and begins the process of applying the Surface UEFI configuration or enrolling the Surface device in SEMM, as shown in Figure 7. -![SEMM process for configuration of Surface UEFI or enrollment](images\surface-semm-enroll-fig7.png "SEMM process for configuration of Surface UEFI or enrollment") +![SEMM process for configuration of Surface UEFI or enrollment](images/surface-semm-enroll-fig7.png "SEMM process for configuration of Surface UEFI or enrollment") *Figure 7. The SEMM process for configuration of Surface UEFI or enrollment of a Surface device* @@ -100,12 +100,12 @@ To enroll a Surface device in SEMM with a Surface UEFI configuration package, fo 2. Select the **I accept the terms in the License Agreement** check box to accept the End User License Agreement (EULA), and then click **Install** to begin the installation process. 3. Click **Finish** to complete the Surface UEFI configuration package installation and restart the Surface device when you are prompted to do so. 4. Surface UEFI will load the configuration file and determine that SEMM is not enabled on the device. Surface UEFI will then begin the SEMM enrollment process, as follows: - * Surface UEFI will verify that the SEMM configuration file contains a SEMM certificate. - * Surface UEFI will prompt you to enter to enter the last two characters of the certificate thumbprint to confirm enrollment of the Surface device in SEMM, as shown in Figure 8. + * Surface UEFI will verify that the SEMM configuration file contains a SEMM certificate. + * Surface UEFI will prompt you to enter to enter the last two characters of the certificate thumbprint to confirm enrollment of the Surface device in SEMM, as shown in Figure 8. - ![SEMM enrollment requires last two characters of certificate thumbprint](images\surface-semm-enroll-fig8.png "SEMM enrollment requires last two characters of certificate thumbprint") + ![SEMM enrollment requires last two characters of certificate thumbprint](images/surface-semm-enroll-fig8.png "SEMM enrollment requires last two characters of certificate thumbprint") - *Figure 8. Enrollment in SEMM requires the last two characters of the certificate thumbprint* + *Figure 8. Enrollment in SEMM requires the last two characters of the certificate thumbprint* * Surface UEFI will store the SEMM certificate in firmware and apply the configuration settings that are specified in the Surface UEFI configuration file. @@ -113,17 +113,17 @@ To enroll a Surface device in SEMM with a Surface UEFI configuration package, fo You can verify that a Surface device has been successfully enrolled in SEMM by looking for **Microsoft Surface Configuration Package** in **Programs and Features** (as shown in Figure 9), or in the events stored in the **Microsoft Surface UEFI Configurator** log, found under **Applications and Services Logs** in Event Viewer (as shown in Figure 10). -![Verify enrollment of Surface device in SEMM in Programs and Features](images\surface-semm-enroll-fig9.png "Verify enrollment of Surface device in SEMM in Programs and Features") +![Verify enrollment of Surface device in SEMM in Programs and Features](images/surface-semm-enroll-fig9.png "Verify enrollment of Surface device in SEMM in Programs and Features") *Figure 9. Verify the enrollment of a Surface device in SEMM in Programs and Features* -![Verify enrollment of Surface device in SEMM in Event Viewer](images\surface-semm-enroll-fig10.png "Verify enrollment of Surface device in SEMM in Event Viewer") +![Verify enrollment of Surface device in SEMM in Event Viewer](images/surface-semm-enroll-fig10.png "Verify enrollment of Surface device in SEMM in Event Viewer") *Figure 10. Verify the enrollment of a Surface device in SEMM in Event Viewer* You can also verify that the device is enrolled in SEMM in Surface UEFI – while the device is enrolled, Surface UEFI will contain the **Enterprise management** page (as shown in Figure 11). -![Surface UEFI Enterprise management page](images\surface-semm-enroll-fig11.png "Surface UEFI Enterprise management page") +![Surface UEFI Enterprise management page](images/surface-semm-enroll-fig11.png "Surface UEFI Enterprise management page") *Figure 11. The Surface UEFI Enterprise management page* @@ -138,6 +138,6 @@ If you have secured Surface UEFI with a password, users without the password who If you have not secured Surface UEFI with a password or a user enters the password correctly, settings that are configured with SEMM will be dimmed (unavailable) and the text Some settings are managed by your organization will be displayed at the top of the page, as shown in Figure 12. -![Settings managed by SEMM disabled in Surface UEFI](images\surface-semm-enroll-fig12.png "Settings managed by SEMM disabled in Surface UEFI") +![Settings managed by SEMM disabled in Surface UEFI](images/surface-semm-enroll-fig12.png "Settings managed by SEMM disabled in Surface UEFI") *Figure 12. Settings managed by SEMM will be disabled in Surface UEFI* diff --git a/devices/surface/manage-surface-uefi-settings.md b/devices/surface/manage-surface-uefi-settings.md index c43ff23e7d..d25c33688f 100644 --- a/devices/surface/manage-surface-uefi-settings.md +++ b/devices/surface/manage-surface-uefi-settings.md @@ -15,7 +15,7 @@ ms.reviewer: manager: dansimp --- -#Manage Surface UEFI settings +# Manage Surface UEFI settings Current and future generations of Surface devices, including Surface Pro 4, Surface Book, and Surface Studio, use a unique UEFI firmware engineered by Microsoft specifically for these devices. This firmware allows for significantly greater control of the device’s operation over firmware versions in earlier generation Surface devices, including the support for touch, mouse, and keyboard operation. By using the Surface UEFI settings you can easily enable or disable internal devices or components, configure security to protect UEFI settings from being changed, and adjust the Surface device boot settings. @@ -24,7 +24,7 @@ Current and future generations of Surface devices, including Surface Pro 4, Surf You can enter the Surface UEFI settings on your Surface device by pressing the **Volume Up** button and the **Power** button simultaneously. Hold the **Volume Up** button until the Surface logo is displayed, which indicates that the device has begun to boot. -##PC information +## PC information On the **PC information** page, detailed information about your Surface device is provided: @@ -52,7 +52,7 @@ You will also find detailed information about the firmware of your Surface devic You can find up-to-date information about the latest firmware version for your Surface device in the [Surface Update History](https://www.microsoft.com/surface/support/install-update-activate/surface-update-history) for your device. -##Security +## Security On the **Security** page of Surface UEFI settings, you can set a password to protect UEFI settings. This password must be entered when you boot the Surface device to UEFI. The password can contain the following characters (as shown in Figure 2): @@ -82,7 +82,7 @@ You can also enable or disable the Trusted Platform Module (TPM) device on the * *Figure 4. Configure Surface UEFI security settings* -##Devices +## Devices On the **Devices** page you can enable or disable specific devices and components of your Surface device. Devices that you can enable or disable on this page include: @@ -106,7 +106,7 @@ Each device is listed with a slider button that you can move to **On** (enabled) *Figure 5. Enable and disable specific devices* -##Boot configuration +## Boot configuration On the **Boot Configuration** page, you can change the order of your boot devices and/or enable or disable boot of the following devices: @@ -128,7 +128,7 @@ For the specified boot order to take effect, you must set the **Enable Alternate You can also turn on and off IPv6 support for PXE with the **Enable IPv6 for PXE Network Boot** option, for example when performing a Windows deployment using PXE where the PXE server is configured for IPv4 only. -##About +## About The **About** page displays regulatory information, such as compliance with FCC rules, as shown in Figure 7. @@ -136,7 +136,7 @@ The **About** page displays regulatory information, such as compliance with FCC *Figure 7. Regulatory information displayed on the About page* -##Exit +## Exit Use the **Restart Now** button on the **Exit** page to exit UEFI settings, as shown in Figure 8. diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index 2329f1180e..3688553be3 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -76,77 +76,77 @@ To create a Microsoft Surface Data Eraser USB stick, first install the Microsoft After the creation tool is installed, follow these steps to create a Microsoft Surface Data Eraser USB stick. Before you begin these steps, ensure that you have a USB 3.0 stick that is 4 GB or larger connected to the computer. -1. Start Microsoft Surface Data Eraser from the Start menu or Start screen. +1. Start Microsoft Surface Data Eraser from the Start menu or Start screen. -2. Click **Build** to begin the Microsoft Surface Data Eraser USB creation process. +2. Click **Build** to begin the Microsoft Surface Data Eraser USB creation process. -3. Click **Start** to acknowledge that you have a USB stick of at least 4 GB connected, as shown in Figure 1. +3. Click **Start** to acknowledge that you have a USB stick of at least 4 GB connected, as shown in Figure 1. - ![Start the Microsoft Surface Data Eraser tool](images/dataeraser-start-tool.png "Start the Microsoft Surface Data Eraser tool") + ![Start the Microsoft Surface Data Eraser tool](images/dataeraser-start-tool.png "Start the Microsoft Surface Data Eraser tool") - *Figure 1. Start the Microsoft Surface Data Eraser tool* + *Figure 1. Start the Microsoft Surface Data Eraser tool* -4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 2, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost. +4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 2, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost. - >[!NOTE] - >If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB. -   - ![USB thumb drive selection](images/dataeraser-usb-selection.png "USB thumb drive selection") + >[!NOTE] + >If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB. + + ![USB thumb drive selection](images/dataeraser-usb-selection.png "USB thumb drive selection") - *Figure 2. USB thumb drive selection* + *Figure 2. USB thumb drive selection* -5. After the creation process is finished, the USB drive has been formatted and all binaries are copied to the USB drive. Click **Success**. +5. After the creation process is finished, the USB drive has been formatted and all binaries are copied to the USB drive. Click **Success**. -6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 3. +6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 3. - ![Surface Data Eraser USB creation process](images/dataeraser-complete-process.png "Surface Data Eraser USB creation process") + ![Surface Data Eraser USB creation process](images/dataeraser-complete-process.png "Surface Data Eraser USB creation process") - *Figure 3. Complete the Microsoft Surface Data Eraser USB creation process* + *Figure 3. Complete the Microsoft Surface Data Eraser USB creation process* -7. Click **X** to close Microsoft Surface Data Eraser. +7. Click **X** to close Microsoft Surface Data Eraser. ## How to use a Microsoft Surface Data Eraser USB stick After you create a Microsoft Surface Data Eraser USB stick, you can boot a supported Surface device from the USB stick by following this procedure: -1. Insert the bootable Microsoft Surface Data Eraser USB stick into the supported Surface device. +1. Insert the bootable Microsoft Surface Data Eraser USB stick into the supported Surface device. -2. Boot your Surface device from the Microsoft Surface Data Eraser USB stick. To boot your device from the USB stick follow these steps: +2. Boot your Surface device from the Microsoft Surface Data Eraser USB stick. To boot your device from the USB stick follow these steps: - a. Turn off your Surface device. + a. Turn off your Surface device. - b. Press and hold the **Volume Down** button. + b. Press and hold the **Volume Down** button. - c. Press and release the **Power** button. + c. Press and release the **Power** button. - d. Release the **Volume Down** button. + d. Release the **Volume Down** button. - >[!NOTE] - >If your device does not boot to USB using these steps, you may need to turn on the **Enable Alternate Boot Sequence** option in Surface UEFI. You can read more about Surface UEFI boot configuration in [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings). + >[!NOTE] + >If your device does not boot to USB using these steps, you may need to turn on the **Enable Alternate Boot Sequence** option in Surface UEFI. You can read more about Surface UEFI boot configuration in [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings). -3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 4. +3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 4. - ![Booting the Microsoft Surface Data Eraser USB stick](images/data-eraser-3.png "Booting the Microsoft Surface Data Eraser USB stick") + ![Booting the Microsoft Surface Data Eraser USB stick](images/data-eraser-3.png "Booting the Microsoft Surface Data Eraser USB stick") - *Figure 4. Booting the Microsoft Surface Data Eraser USB stick* + *Figure 4. Booting the Microsoft Surface Data Eraser USB stick* -4. Read the software license terms, and then close the Notepad file. +4. Read the software license terms, and then close the Notepad file. -5. Accept or decline the software license terms by typing **Accept** or **Decline**. You must accept the license terms to continue. +5. Accept or decline the software license terms by typing **Accept** or **Decline**. You must accept the license terms to continue. -6. The Microsoft Surface Data Eraser script detects the storage devices that are present in your Surface device and displays the details of the native storage device. To continue, press **Y** (this action runs Microsoft Surface Data Eraser and removes all data from the storage device) or press **N** (this action shuts down the device without removing data). +6. The Microsoft Surface Data Eraser script detects the storage devices that are present in your Surface device and displays the details of the native storage device. To continue, press **Y** (this action runs Microsoft Surface Data Eraser and removes all data from the storage device) or press **N** (this action shuts down the device without removing data). - >[!NOTE] - >The Microsoft Surface Data Eraser tool will delete all data, including Windows operating system files required to boot the device, in a secure and unrecoverable way. To boot a Surface device that has been wiped with Microsoft Surface Data Eraser, you will first need to reinstall the Windows operating system. To remove data from a Surface device without removing the Windows operating system, you can use the **Reset your PC** function. However, this does not prevent your data from being recovered with forensic or data recovery capabilities. See [Recovery options in Windows 10](https://support.microsoft.com/help/12415/windows-10-recovery-options) for more information. + >[!NOTE] + >The Microsoft Surface Data Eraser tool will delete all data, including Windows operating system files required to boot the device, in a secure and unrecoverable way. To boot a Surface device that has been wiped with Microsoft Surface Data Eraser, you will first need to reinstall the Windows operating system. To remove data from a Surface device without removing the Windows operating system, you can use the **Reset your PC** function. However, this does not prevent your data from being recovered with forensic or data recovery capabilities. See [Recovery options in Windows 10](https://support.microsoft.com/help/12415/windows-10-recovery-options) for more information. - ![Partition to be erased is displayed](images/sda-fig5-erase.png "Partition to be erased is displayed") + ![Partition to be erased is displayed](images/sda-fig5-erase.png "Partition to be erased is displayed") - *Figure 5. Partition to be erased is displayed in Microsoft Surface Data Eraser* + *Figure 5. Partition to be erased is displayed in Microsoft Surface Data Eraser* -7. If you pressed **Y** in step 6, due to the destructive nature of the data erasure process, an additional dialog box is displayed to confirm your choice. +7. If you pressed **Y** in step 6, due to the destructive nature of the data erasure process, an additional dialog box is displayed to confirm your choice. -8. Click the **Yes** button to continue erasing data on the Surface device. +8. Click the **Yes** button to continue erasing data on the Surface device. >[!NOTE] >When you run Surface Data Eraser on the Surface Data Eraser USB drive, a log file is generated in the **SurfaceDataEraserLogs** folder. diff --git a/devices/surface/step-by-step-surface-deployment-accelerator.md b/devices/surface/step-by-step-surface-deployment-accelerator.md index 0a29da23dd..7ce3009574 100644 --- a/devices/surface/step-by-step-surface-deployment-accelerator.md +++ b/devices/surface/step-by-step-surface-deployment-accelerator.md @@ -47,94 +47,94 @@ The tool installs in the SDA program group, as shown in Figure 2. >[!NOTE] >At this point, the tool has not yet prepared any deployment environment or downloaded any materials from the Internet. -  + ## Create a deployment share -The following steps show you how to create a deployment share for Windows 10 that supports Surface 3, Surface Pro 3, Surface Pro 4, Surface Book, the Surface Firmware Tool, the Surface Asset Tag Tool, and Office 365. As you follow the steps below, make the selections that are applicable for your organization. For example, you could choose to deploy Windows 10 to Surface Book only, without any of the Surface apps. +The following steps show you how to create a deployment share for Windows 10 that supports Surface 3, Surface Pro 3, Surface Pro 4, Surface Book, the Surface Firmware Tool, the Surface Asset Tag Tool, and Office 365. As you follow the steps below, make the selections that are applicable for your organization. For example, you could choose to deploy Windows 10 to Surface Book only, without any of the Surface apps. >[!NOTE] ->SDA lets you create deployment shares for both Windows 8.1 and Windows 10 deployments, but you can only create a single deployment share at a time. Therefore, to create both Windows 8.1 and Windows 10 deployment shares, you will need to run the tool twice. +>SDA lets you create deployment shares for both Windows 8.1 and Windows 10 deployments, but you can only create a single deployment share at a time. Therefore, to create both Windows 8.1 and Windows 10 deployment shares, you will need to run the tool twice. -  -1. Open the SDA wizard by double-clicking the icon in the **Surface Deployment Accelerator** program group on the Start screen. -2. On the **Welcome** page, click **Next** to continue. +1. Open the SDA wizard by double-clicking the icon in the **Surface Deployment Accelerator** program group on the Start screen. -3. On the **Verify System** page, the SDA wizard verifies the prerequisites required for an SDA deployment share. This process also checks for the presence of the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10 and the Microsoft Deployment Toolkit (MDT) 2013 Update 2. If these tools are not detected, they are downloaded and installed automatically. Click **Next** to continue. +2. On the **Welcome** page, click **Next** to continue. - >[!NOTE] - >As of SDA version 1.96.0405, SDA will install only the components of the Windows ADK that are required for deployment, as follows: - > * Deployment tools - > * User State Migration Tool (USMT) - > * Windows Preinstallation Environment (WinPE)

            +3. On the **Verify System** page, the SDA wizard verifies the prerequisites required for an SDA deployment share. This process also checks for the presence of the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10 and the Microsoft Deployment Toolkit (MDT) 2013 Update 2. If these tools are not detected, they are downloaded and installed automatically. Click **Next** to continue. - >[!NOTE] - >As of SDA version 1.96.0405, SDA will install and use MDT 2013 Update 2. Earlier versions of SDA are compatible only with MDT 2013 Update 1. + > [!NOTE] + > As of SDA version 1.96.0405, SDA will install only the components of the Windows ADK that are required for deployment, as follows: + > * Deployment tools + > * User State Migration Tool (USMT) + > * Windows Preinstallation Environment (WinPE)

            + > + > [!NOTE] + > As of SDA version 1.96.0405, SDA will install and use MDT 2013 Update 2. Earlier versions of SDA are compatible only with MDT 2013 Update 1. -4. On the **Windows 8.1** page, to create a Windows 10 deployment share, do not select the **Would you like to support Windows 8.1** check box. Click **Next** to continue. +4. On the **Windows 8.1** page, to create a Windows 10 deployment share, do not select the **Would you like to support Windows 8.1** check box. Click **Next** to continue. -5. On the **Windows 10** page, to create a Windows 10 deployment share, select the **Would you like to support Windows 10** check box. Supply the following information before you click **Next** to continue: +5. On the **Windows 10** page, to create a Windows 10 deployment share, select the **Would you like to support Windows 10** check box. Supply the following information before you click **Next** to continue: - - **Configure Deployment Share for Windows 10** + - **Configure Deployment Share for Windows 10** - - **Local Path** – Specify or browse to a location on the local storage device where you would like to store the deployment share files for the Windows 10 SDA deployment share. For example, **E:\\SDAWin10\\** is the location specified in Figure 3. + - **Local Path** – Specify or browse to a location on the local storage device where you would like to store the deployment share files for the Windows 10 SDA deployment share. For example, **E:\\SDAWin10\\** is the location specified in Figure 3. - - **Share Name** – Specify a name for the file share that will be used to access the deployment share on this server from the network. For example, **SDAWin10** is the deployment share name shown in Figure 3. The local path folder is automatically shared by the SDA scripts under this name to the group **Everyone** with a permission level of **Full Control**. + - **Share Name** – Specify a name for the file share that will be used to access the deployment share on this server from the network. For example, **SDAWin10** is the deployment share name shown in Figure 3. The local path folder is automatically shared by the SDA scripts under this name to the group **Everyone** with a permission level of **Full Control**. - - **Windows 10 Deployment Services** + - **Windows 10 Deployment Services** - - Select the **Import boot media into the local Windows Deployment Service** check box if you would like to boot your Surface devices from the network to perform the Windows deployment. Windows Deployment Services must be installed and configured to respond to PXE boot requests. See [Windows Deployment Services Getting Started Guide for Windows Server 2012](https://technet.microsoft.com/library/jj648426.aspx) for more information about how to configure Windows Deployment Services for PXE boot. + - Select the **Import boot media into the local Windows Deployment Service** check box if you would like to boot your Surface devices from the network to perform the Windows deployment. Windows Deployment Services must be installed and configured to respond to PXE boot requests. See [Windows Deployment Services Getting Started Guide for Windows Server 2012](https://technet.microsoft.com/library/jj648426.aspx) for more information about how to configure Windows Deployment Services for PXE boot. - - **Windows 10 Source Files** + - **Windows 10 Source Files** - - **Local Path** – Specify or browse to the root directory of Windows 10 installation files. If you have an ISO file, mount it and browse to the root of the mounted drive. You must have a full set of source files, not just **Install.wim**. + - **Local Path** – Specify or browse to the root directory of Windows 10 installation files. If you have an ISO file, mount it and browse to the root of the mounted drive. You must have a full set of source files, not just **Install.wim**. - ![Specify Windows 10 deployment share options](images/sdasteps-fig3.png "Specify Windows 10 deployment share options") + ![Specify Windows 10 deployment share options](images/sdasteps-fig3.png "Specify Windows 10 deployment share options") - *Figure 3. Specify Windows 10 deployment share options* + *Figure 3. Specify Windows 10 deployment share options* -6. On the **Configure** page, select the check box next to each device or app that you want to include in your deployment share. Note that Surface Pro 4 and Surface Book only support Windows 10 and are not available for the deployment of Windows 8.1. The Surface Firmware Tool is only applicable to Surface 3 and Surface Pro 3 and cannot be selected unless Surface 3 or Surface Pro 3 drivers are selected, as shown in Figure 4. Click **Next** to continue. +6. On the **Configure** page, select the check box next to each device or app that you want to include in your deployment share. Note that Surface Pro 4 and Surface Book only support Windows 10 and are not available for the deployment of Windows 8.1. The Surface Firmware Tool is only applicable to Surface 3 and Surface Pro 3 and cannot be selected unless Surface 3 or Surface Pro 3 drivers are selected, as shown in Figure 4. Click **Next** to continue. - ![Firmware tool selection](images/sdasteps-fig4-select.png "Firmware tool selection") + ![Firmware tool selection](images/sdasteps-fig4-select.png "Firmware tool selection") - *Figure 4. Selecting Surface Firmware Tool requires Surface Pro 3 drivers* + *Figure 4. Selecting Surface Firmware Tool requires Surface Pro 3 drivers* - >[!NOTE] - >You cannot select both Surface 3 and Surface 3 LTE models at the same time. + >[!NOTE] + >You cannot select both Surface 3 and Surface 3 LTE models at the same time. -7. On the **Summary** page confirm your selections and click **Finish** to begin the creation of your deployment share. The process can take several minutes as files are downloaded, the tools are installed, and the deployment share is created. While the SDA scripts are creating your deployment share, an **Installation Progress** window will be displayed, as shown in Figure 5. A typical SDA process includes: +7. On the **Summary** page confirm your selections and click **Finish** to begin the creation of your deployment share. The process can take several minutes as files are downloaded, the tools are installed, and the deployment share is created. While the SDA scripts are creating your deployment share, an **Installation Progress** window will be displayed, as shown in Figure 5. A typical SDA process includes: - - Download of Windows ADK + - Download of Windows ADK - - Installation of Windows ADK + - Installation of Windows ADK - - Download of MDT + - Download of MDT - - Installation of MDT + - Installation of MDT - - Download of Surface apps and drivers + - Download of Surface apps and drivers - - Creation of the deployment share + - Creation of the deployment share - - Import of Windows installation files into the deployment share + - Import of Windows installation files into the deployment share - - Import of the apps and drivers into the deployment share + - Import of the apps and drivers into the deployment share - - Creation of rules and task sequences for Windows deployment + - Creation of rules and task sequences for Windows deployment - ![The installatin progress window](images/sdasteps-fig5-installwindow.png "The installatin progress window") + ![The installatin progress window](images/sdasteps-fig5-installwindow.png "The installatin progress window") - *Figure 5. The Installation Progress window* ->[!NOTE] ->The following error message may be hit while Installing the latest ADK or MDT: "An exception occurred during a WebClient request.". This is due to incompatibility between SDA and BITS. Here is the workaround for this: + *Figure 5. The Installation Progress window* + >[!NOTE] + >The following error message may be hit while Installing the latest ADK or MDT: "An exception occurred during a WebClient request.". This is due to incompatibility between SDA and BITS. Here is the workaround for this: - ``` -In the following two PowerShell scripts: -%ProgramFiles%\Microsoft\Surface\Deployment Accelerator\Data\PowerShell\Install-MDT.ps1 -%ProgramFiles%\Microsoft\Surface\Deployment Accelerator\Data\PowerShell\INSTALL-WindowsADK.ps1 + ``` + In the following two PowerShell scripts: + %ProgramFiles%\Microsoft\Surface\Deployment Accelerator\Data\PowerShell\Install-MDT.ps1 + %ProgramFiles%\Microsoft\Surface\Deployment Accelerator\Data\PowerShell\INSTALL-WindowsADK.ps1 Edit the $BITSTransfer variable in the input parameters to $False as shown below: @@ -147,7 +147,7 @@ Param( [string]$BITSTransfer = $False ) ``` - + 8. When the SDA process completes the creation of your deployment share, a **Success** window is displayed. Click **Finish** to close the window. At this point your deployment share is now ready to perform a Windows deployment to Surface devices. ### Optional: Create a deployment share without an Internet connection @@ -170,7 +170,7 @@ If you are unable to connect to the Internet with your deployment server, or if >[!NOTE] >The **Copy from a Local Directory** check box is only available in SDA version 1.90.0221 or later. -  + ### Optional: Prepare offline USB media @@ -179,7 +179,7 @@ You can use USB media to perform an SDA deployment if your Surface device is una >[!NOTE] >The offline media files for the complete SDA deployment share are approximately 9 GB in size. Your USB drive must be at least 9 GB in size. A 16 GB USB drive is recommended. -  + Before you can create bootable media files within the MDT Deployment Workbench or copy those files to a USB drive, you must first configure that USB drive to be bootable. Using [DiskPart](https://go.microsoft.com/fwlink/p/?LinkId=761073), create a partition, format the partition as FAT32, and set the partition to be active. To run DiskPart, open an administrative PowerShell or Command Prompt window, and then run the following sequence of commands, as shown in Figure 7: @@ -211,7 +211,7 @@ Before you can create bootable media files within the MDT Deployment Workbench o >[!NOTE] >You can format your USB drive with FAT32 from Disk Management, but you must still use DiskPart to set the partition as active for the drive to boot properly. -   + After you have prepared the USB drive for boot, the next step is to generate offline media from the SDA deployment share. To create this media, follow these steps: @@ -264,7 +264,6 @@ After you have prepared the USB drive for boot, the next step is to generate off 18. Press **Ctrl+A** to select all of the text in the window, then press **Ctrl+V** to paste the text from the SDA deployment share Bootstrap.ini file. 19. Delete the following lines from the Bootstrap.ini as shown in Figure 11, and then save the file: - ``` UserID= UserDomain= @@ -356,7 +355,7 @@ To perform a deployment from the SDA deployment share, follow this process on th ### Boot the Surface device from the network -To boot the Surface device from the network, the Microsoft Surface Deployment Accelerator wizard must have been run on a Windows Server 2012 R2 or later environment that was configured with the Windows Deployment Services (WDS). WDS must have been configured to respond to network boot (PXE boot) requests and the boot files must have been imported into WDS. The SDA wizard will import these file automatically if the **Import boot media into the local Windows Deployment Service** check box was selected on the page for the version of Windows you intend to deploy. +To boot the Surface device from the network, the Microsoft Surface Deployment Accelerator wizard must have been run on a Windows Server 2012 R2 or later environment that was configured with the Windows Deployment Services (WDS). WDS must have been configured to respond to network boot (PXE boot) requests and the boot files must have been imported into WDS. The SDA wizard will import these file automatically if the **Import boot media into the local Windows Deployment Service** check box was selected on the page for the version of Windows you intend to deploy. To boot the Surface device from the network, you must also use a Microsoft Surface Ethernet Adapter or the Ethernet port on a Microsoft Surface Dock. Third-party Ethernet adapters are not supported for network boot (PXE boot). A keyboard is also required. Both the Microsoft Surface Type Cover and keyboards connected via USB to the device or dock are supported. @@ -366,7 +365,7 @@ To instruct your Surface device to boot from the network, start with the device 2. Press **Enter** when prompted by the dialog on the screen. This prompt indicates that your device has found the WDS PXE server over the network. -3. If you have configured more than one deployment share on this device, you will be prompted to select between the boot images for each deployment share. For example, if you created both a Windows 10 and a Windows 8.1 deployment share, you will be prompted to choose between these two options. +3. If you have configured more than one deployment share on this device, you will be prompted to select between the boot images for each deployment share. For example, if you created both a Windows 10 and a Windows 8.1 deployment share, you will be prompted to choose between these two options. 4. Enter the domain credentials that you use to log on to the server where SDA is installed when you are prompted, as shown in Figure 14. @@ -416,9 +415,9 @@ To run the Deploy Microsoft Surface task sequence: 8. When the deployment task sequence completes, a **Success** window is displayed. Click **Finish** to complete the deployment and begin using your Surface device. -  - -  + + + diff --git a/devices/surface/support-solutions-surface.md b/devices/surface/support-solutions-surface.md index 587338a7ff..a6099038b0 100644 --- a/devices/surface/support-solutions-surface.md +++ b/devices/surface/support-solutions-surface.md @@ -28,7 +28,7 @@ These are the top Microsoft Support solutions for common issues experienced when - [Cracked screen and physical damage](https://www.microsoft.com/surface/support/warranty-service-and-recovery/surface-is-damaged) -##Device cover or keyboard issues +## Device cover or keyboard issues - [Troubleshoot your Surface Type Cover or keyboard](https://www.microsoft.com/surface/support/hardware-and-drivers/troubleshoot-surface-keyboards) - [Troubleshoot problems with Surface Keyboard, Surface Ergonomic Keyboard, and Microsoft Modern Keyboard with Fingerprint ID](https://www.microsoft.com/surface/support/touch-mouse-and-search/surface-keyboard-troubleshooting) @@ -56,10 +56,10 @@ These are the top Microsoft Support solutions for common issues experienced when -  + -  + diff --git a/devices/surface/surface-enterprise-management-mode.md b/devices/surface/surface-enterprise-management-mode.md index d19546599a..5dfb51b75b 100644 --- a/devices/surface/surface-enterprise-management-mode.md +++ b/devices/surface/surface-enterprise-management-mode.md @@ -214,9 +214,7 @@ valid. machines that have it?** If you want SEMM reset or recovery to work, the certificate needs to be -valid and not expired. You can use the current valid ownership -certificate to sign a package that updates to a new certificate for -ownership. You do not need to create a reset package. +valid and not expired. **Can bulk reset packages be created for each surface that we order? Can one be built that resets all machines in our environment?** diff --git a/devices/surface/unenroll-surface-devices-from-semm.md b/devices/surface/unenroll-surface-devices-from-semm.md index d729fecdd7..6531857a06 100644 --- a/devices/surface/unenroll-surface-devices-from-semm.md +++ b/devices/surface/unenroll-surface-devices-from-semm.md @@ -29,7 +29,7 @@ The Surface UEFI reset package is the primary method you use to unenroll a Surfa Reset packages are created specifically for an individual Surface device. To begin the process of creating a reset package, you will need the serial number of the device you want to unenroll, as well as the SEMM certificate used to enroll the device. You can find the serial number of your Surface device on the **PC information** page of Surface UEFI, as shown in Figure 1. This page is displayed even if Surface UEFI is password protected and the incorrect password is entered. -![Serial number of Surface device is displayed](images\surface-semm-unenroll-fig1.png "Serial number of Surface device is displayed") +![Serial number of Surface device is displayed](images/surface-semm-unenroll-fig1.png "Serial number of Surface device is displayed") *Figure 1. The serial number of the Surface device is displayed on the Surface UEFI PC information page* @@ -42,20 +42,20 @@ To create a Surface UEFI reset package, follow these steps: 2. Click **Start**. 3. Click **Reset Package**, as shown in Figure 2. - ![Select Reset Package to create a package to unenroll Surface device from SEMM](images\surface-semm-unenroll-fig2.png "Select Reset Package to create a package to unenroll Surface device from SEMM") + ![Select Reset Package to create a package to unenroll Surface device from SEMM](images/surface-semm-unenroll-fig2.png "Select Reset Package to create a package to unenroll Surface device from SEMM") *Figure 2. Click Reset Package to create a package to unenroll a Surface device from SEMM* 4. Click **Certificate Protection** to add your SEMM certificate file with private key (.pfx), as shown in Figure 3. Browse to the location of your certificate file, select the file, and then click **OK**. - ![Add the SEMM certificate to Surface UEFI reset package](images\surface-semm-unenroll-fig3.png "Add the SEMM certificate to Surface UEFI reset package") + ![Add the SEMM certificate to Surface UEFI reset package](images/surface-semm-unenroll-fig3.png "Add the SEMM certificate to Surface UEFI reset package") *Figure 3. Add the SEMM certificate to a Surface UEFI reset package* 5. Click **Next**. 6. Type the serial number of the device you want to unenroll from SEMM (as shown in Figure 4), and then click **Build** to generate the Surface UEFI reset package. - ![Create a Surface UEFI reset package with serial number of Surface device](images\surface-semm-unenroll-fig4.png "Create a Surface UEFI reset package with serial number of Surface device") + ![Create a Surface UEFI reset package with serial number of Surface device](images/surface-semm-unenroll-fig4.png "Create a Surface UEFI reset package with serial number of Surface device") *Figure 4. Use the serial number of your Surface device to create a Surface UEFI reset package* @@ -64,7 +64,7 @@ To create a Surface UEFI reset package, follow these steps: Run the Surface UEFI reset package Windows Installer (.msi) file on the Surface device to unenroll the device from SEMM. The reset package will require a reboot to perform the unenroll operation. After the device has been unenrolled, you can verify the successful removal by ensuring that the **Microsoft Surface Configuration Package** item in **Programs and Features** (shown in Figure 5) is no longer present. -![Screen that shows device is enrolled in SEMM](images\surface-semm-unenroll-fig5.png "Screen that shows device is enrolled in SEMM") +![Screen that shows device is enrolled in SEMM](images/surface-semm-unenroll-fig5.png "Screen that shows device is enrolled in SEMM") *Figure 5. The presence of the Microsoft Surface Configuration Package item in Programs and Features indicates that the device is enrolled in SEMM* @@ -80,7 +80,7 @@ To initiate a Recovery Request, follow these steps: 2. Type the Surface UEFI password if you are prompted to do so. 3. Click the **Enterprise management** page, as shown in Figure 6. - ![Enterprise Management page](images\surface-semm-unenroll-fig6.png "Enterprise Management page") + ![Enterprise Management page](images/surface-semm-unenroll-fig6.png "Enterprise Management page") *Figure 6. The Enterprise management page is displayed in Surface UEFI on devices enrolled in SEMM* @@ -90,17 +90,17 @@ To initiate a Recovery Request, follow these steps: >A Recovery Request expires two hours after it is created. If a Recovery Request is not completed in this time, you will have to restart the Recovery Request process. 6. Select **SEMM Certificate** from the list of certificates displayed on the **Choose a SEMM reset key** page (shown in Figure 7), and then click or press **Next**. - ![Select SEMM certificate for your Recovery Request](images\surface-semm-unenroll-fig7.png "Select SEMM certificate for your Recovery Request") + ![Select SEMM certificate for your Recovery Request](images/surface-semm-unenroll-fig7.png "Select SEMM certificate for your Recovery Request") *Figure 7. Choose SEMM Certificate for your Recovery Request (Reset Request)* 7. On the **Enter SEMM reset verification code** page you can click the **QR Code** or **Text** buttons to display your Recovery Request (Reset Request) as shown in Figure 8, or the **USB** button to save your Recovery Request (Reset Request) as a file to a USB drive, as shown in Figure 9. - ![Recovery Request displayed as a QR Code](images\surface-semm-unenroll-fig8.png "Recovery Request displayed as a QR Code") + ![Recovery Request displayed as a QR Code](images/surface-semm-unenroll-fig8.png "Recovery Request displayed as a QR Code") *Figure 8. A Recovery Request (Reset Request) displayed as a QR Code* - ![Save a recovery request to a USB drive](images\surface-semm-unenroll-fig9.png "Save a recovery request to a USB drive") + ![Save a recovery request to a USB drive](images/surface-semm-unenroll-fig9.png "Save a recovery request to a USB drive") *Figure 9. Save a Recovery Request (Reset Request) to a USB drive* @@ -114,43 +114,43 @@ To initiate a Recovery Request, follow these steps: 9. Click **Start**. 10. Click **Recovery Request**, as shown in Figure 10. - ![Start process to approve a Recovery Request](images\surface-semm-unenroll-fig10.png "Start process to approve a Recovery Request") + ![Start process to approve a Recovery Request](images/surface-semm-unenroll-fig10.png "Start process to approve a Recovery Request") - *Figure 10. Click Recovery Request to begin the process to approve a Recovery Request* + *Figure 10. Click Recovery Request to begin the process to approve a Recovery Request* 11. Click **Certificate Protection** to authenticate the Recovery Request with the SEMM certificate. 12. Browse to and select your SEMM certificate file, and then click **OK**. 13. When you are prompted to enter the certificate password as shown in Figure 11, type and confirm the password for the certificate file, and then click **OK**. - ![Type password for SEMM certificate](images\surface-semm-unenroll-fig11.png "Type password for SEMM certificate") + ![Type password for SEMM certificate](images/surface-semm-unenroll-fig11.png "Type password for SEMM certificate") - *Figure 11. Type the password for the SEMM certificate* + *Figure 11. Type the password for the SEMM certificate* 14. Click **Next**. 15. Enter the Recovery Request (Reset Request), and then click **Generate** to create a reset verification code (as shown in Figure 12). - ![Enter the recovery request](images\surface-semm-unenroll-fig12.png "Enter the recovery request") + ![Enter the recovery request](images/surface-semm-unenroll-fig12.png "Enter the recovery request") - *Figure 12. Enter the Recovery Request (Reset Request)* + *Figure 12. Enter the Recovery Request (Reset Request)* - * If you displayed the Recovery Request (Reset Request) as text on the Surface device being reset, use the keyboard to type the Recovery Request (Reset Request) in the provided field. - * If you displayed the Recovery Request (Reset Request) as a QR Code and then used a messaging or email application to send the code to the computer with Microsoft Surface UEFI Configurator, copy and paste the code into the provided field. - * If you saved the Recovery Request (Reset Request) as a file to a USB drive, click the **Import** button, browse to and select the Recovery Request (Reset Request) file, and then click **OK**. + * If you displayed the Recovery Request (Reset Request) as text on the Surface device being reset, use the keyboard to type the Recovery Request (Reset Request) in the provided field. + * If you displayed the Recovery Request (Reset Request) as a QR Code and then used a messaging or email application to send the code to the computer with Microsoft Surface UEFI Configurator, copy and paste the code into the provided field. + * If you saved the Recovery Request (Reset Request) as a file to a USB drive, click the **Import** button, browse to and select the Recovery Request (Reset Request) file, and then click **OK**. 16. The reset verification code is displayed in Microsoft Surface UEFI Configurator, as shown in Figure 13. - ![Display of the reset verification code](images\surface-semm-unenroll-fig13.png "Display of the reset verification code") + ![Display of the reset verification code](images/surface-semm-unenroll-fig13.png "Display of the reset verification code") - *Figure 13. The reset verification code displayed in Microsoft Surface UEFI Configurator* + *Figure 13. The reset verification code displayed in Microsoft Surface UEFI Configurator* - * Click the **Share** button to send the reset verification code by email. + * Click the **Share** button to send the reset verification code by email. 17. Enter the reset verification code in the provided field on the Surface device (shown in Figure 8), and then click or press **Verify** to reset the device and unenroll the device from SEMM. 18. Click or press **Restart now** on the **SEMM reset successful** page to complete the unenrollment from SEMM, as shown in Figure 14. - ![Example display of successful unenrollment from SEMM](images\surface-semm-unenroll-fig14.png "Example display of successful unenrollment from SEMM") + ![Example display of successful unenrollment from SEMM](images/surface-semm-unenroll-fig14.png "Example display of successful unenrollment from SEMM") - *Figure 14. Successful unenrollment from SEMM* + *Figure 14. Successful unenrollment from SEMM* 19. Click **End** in Microsoft Surface UEFI Configurator to complete the Recovery Request (Reset Request) process and close Microsoft Surface UEFI Configurator. diff --git a/devices/surface/update.md b/devices/surface/update.md index c18804e78b..0a3a4b4a5d 100644 --- a/devices/surface/update.md +++ b/devices/surface/update.md @@ -25,7 +25,7 @@ Find out how to download and manage the latest firmware and driver updates for y | [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)| Get a list of the available downloads for Surface devices and links to download the drivers and firmware for your device.| | [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)| Explore the available options to manage firmware and driver updates for Surface devices.| | [Surface Dock Updater](surface-dock-updater.md)| Get a detailed walkthrough of Microsoft Surface Dock Updater.| -  + ## Related topics @@ -33,9 +33,9 @@ Find out how to download and manage the latest firmware and driver updates for y [Surface for IT pros blog](http://blogs.technet.com/b/surface/) -  + -  + diff --git a/devices/surface/upgrade-surface-devices-to-windows-10-with-mdt.md b/devices/surface/upgrade-surface-devices-to-windows-10-with-mdt.md index 35f35c3e68..72f123de7f 100644 --- a/devices/surface/upgrade-surface-devices-to-windows-10-with-mdt.md +++ b/devices/surface/upgrade-surface-devices-to-windows-10-with-mdt.md @@ -72,28 +72,28 @@ In the import process example shown in the [Deploy Windows 10 to Surface devices 2. Extract the contents of the Surface Pro 3 firmware and driver pack archive file to a temporary folder. Keep the driver files separate from other drivers or files. 3. Open the Deployment Workbench and expand the Deployment Shares node and your deployment share. 4. If you have not already created a folder structure by operating system version, you should do so next. Under the **Windows 10 x64** folder, create a new folder for Surface Pro 3 drivers named **Surface Pro 3**. Your Out-of-Box Drivers folder should resemble the following structure: - * WinPE x86 - * WinPE x64 - * Windows 10 x64 - * Microsoft Corporation - * Surface Pro 4 - * Surface Pro 3 + * WinPE x86 + * WinPE x64 + * Windows 10 x64 + * Microsoft Corporation + * Surface Pro 4 + * Surface Pro 3 5. Right-click the **Surface Pro 3** folder, and then click **Import Drivers** to start the Import Drivers Wizard, as shown in Figure 1. - ![Import Surface Pro 3 drivers for Windows 10](images\surface-upgrademdt-fig1.png "Import Surface Pro 3 drivers for Windows 10") + ![Import Surface Pro 3 drivers for Windows 10](images/surface-upgrademdt-fig1.png "Import Surface Pro 3 drivers for Windows 10") - *Figure 1. Import Surface Pro 3 drivers for Windows 10* + *Figure 1. Import Surface Pro 3 drivers for Windows 10* 6. The Import Driver Wizard displays a series of steps, as follows: - - **Specify Directory** – Click **Browse** and navigate to the folder where you extracted the Surface Pro 3 firmware and drivers in Step 1. - - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - - **Progress** – While the drivers are imported, a progress bar is displayed on this page. - - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete Import Drivers Wizard. + - **Specify Directory** – Click **Browse** and navigate to the folder where you extracted the Surface Pro 3 firmware and drivers in Step 1. + - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + - **Progress** – While the drivers are imported, a progress bar is displayed on this page. + - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete Import Drivers Wizard. 7. Select the **Surface Pro 3** folder and verify that the folder now contains the drivers that were imported, as shown in Figure 2. - ![Drivers for Surface Pro 3 imported and organized in the MDT deployment share](images\surface-upgrademdt-fig2.png "Drivers for Surface Pro 3 imported and organized in the MDT deployment share") + ![Drivers for Surface Pro 3 imported and organized in the MDT deployment share](images/surface-upgrademdt-fig2.png "Drivers for Surface Pro 3 imported and organized in the MDT deployment share") - *Figure 2. Drivers for Surface Pro 3 imported and organized in the MDT deployment share* + *Figure 2. Drivers for Surface Pro 3 imported and organized in the MDT deployment share* ### Import applications @@ -109,17 +109,17 @@ Create the upgrade task sequence with the following process: 1. In the Deployment Workbench under your Deployment Share, right-click the **Task Sequences** folder, and then click **New Task Sequence** to start the New Task Sequence Wizard. 2. Use these steps to create the deployment task sequence with the New Task Sequence Wizard: - - **General Settings** – Enter an identifier for the deployment task sequence in the Task Sequence ID field, a name for the deployment task sequence in the Task Sequence Name field, and any comments for the deployment task sequence in the **Task Sequence Comments** field, and then click **Next**. - >[!NOTE] - >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. - - **Select Template** – Select **Standard Client Upgrade Task Sequence** from the drop-down menu, and then click **Next**. - - **Select OS** – Navigate to and select the Windows image that you imported, and then click **Next**. - - **Specify Product Key** – Select the product key entry that fits your organization’s licensing system. The **Do Not Specify a Product Key at This Time** option can be used for systems that will be activated via Key Management Services (KMS) or Active Directory Based Activation (ADBA). A product key can be specified specifically if your organization uses Multiple Activation Keys (MAK). Click **Next**. - - **OS Settings** – Enter a name and organization for registration of Windows, and a home page URL for users when they browse the Internet in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. - - **Admin Password** – Select **Use the Specified Local Administrator Password** and enter a password in the provided fields, and then click **Next**. - - **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. - - **Progress** – While the task sequence is being created, a progress bar is displayed on this page. - - **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete New Task Sequence Wizard. + - **General Settings** – Enter an identifier for the deployment task sequence in the Task Sequence ID field, a name for the deployment task sequence in the Task Sequence Name field, and any comments for the deployment task sequence in the **Task Sequence Comments** field, and then click **Next**. + >[!NOTE] + >The **Task Sequence ID** field cannot contain spaces and can be a maximum of 16 characters. + - **Select Template** – Select **Standard Client Upgrade Task Sequence** from the drop-down menu, and then click **Next**. + - **Select OS** – Navigate to and select the Windows image that you imported, and then click **Next**. + - **Specify Product Key** – Select the product key entry that fits your organization’s licensing system. The **Do Not Specify a Product Key at This Time** option can be used for systems that will be activated via Key Management Services (KMS) or Active Directory Based Activation (ADBA). A product key can be specified specifically if your organization uses Multiple Activation Keys (MAK). Click **Next**. + - **OS Settings** – Enter a name and organization for registration of Windows, and a home page URL for users when they browse the Internet in the **Full Name**, **Organization**, and **Internet Explorer Home Page** fields, and then click **Next**. + - **Admin Password** – Select **Use the Specified Local Administrator Password** and enter a password in the provided fields, and then click **Next**. + - **Summary** – Review the specified configuration on this page before you click **Next** to begin creation of the task sequence. + - **Progress** – While the task sequence is being created, a progress bar is displayed on this page. + - **Confirmation** – When the task sequence creation completes, the success of the process is displayed on this page. Click **Finish** to complete New Task Sequence Wizard. After the task sequence is created, you can modify some additional settings to provide additional automation of the task sequence and require less interaction during deployment. Follow these steps to modify the task sequence: @@ -131,9 +131,9 @@ After the task sequence is created, you can modify some additional settings to p 6. Between the two Windows Update steps is an **Install Applications** step. Select that step and then click **Add**. 7. Hover the mouse over **General** under the **Add** menu, and then choose **Install Application**. This will add a new step after the selected step for the installation of a specific application as shown in Figure 3. - ![A new Install Application step in the deployment task sequence](images\surface-upgrademdt-fig3.png "A new Install Application step in the deployment task sequence") + ![A new Install Application step in the deployment task sequence](images/surface-upgrademdt-fig3.png "A new Install Application step in the deployment task sequence") - *Figure 3. A new Install Application step in the deployment task sequence* + *Figure 3. A new Install Application step in the deployment task sequence* 8. On the **Properties** tab of the new **Install Application** step, enter **Install Surface App** in the **Name** field. 9. Select **Install a Single Application**, and then click **Browse** to view available applications that have been imported into the deployment share. @@ -142,22 +142,22 @@ After the task sequence is created, you can modify some additional settings to p 12. Open the **Add** menu again and choose **Set Task Sequence Variable** from under the **General** menu. 13. On the **Properties** tab of the new **Set Task Sequence Variable** step (as shown in Figure 4) configure the following options: - - **Name** – Set DriverGroup001 - - **Task Sequence Variable** – DriverGroup001 - - **Value** – Windows 10 x64\%Make%\%Model% + - **Name** – Set DriverGroup001 + - **Task Sequence Variable** – DriverGroup001 + - **Value** – Windows 10 x64\%Make%\%Model% - ![Configure a new Set Task Sequence Variable step in the deployment task sequence](images\surface-upgrademdt-fig4.png "Configure a new Set Task Sequence Variable step in the deployment task sequence") + ![Configure a new Set Task Sequence Variable step in the deployment task sequence](images/surface-upgrademdt-fig4.png "Configure a new Set Task Sequence Variable step in the deployment task sequence") - *Figure 4. Configure a new Set Task Sequence Variable step in the deployment task sequence* + *Figure 4. Configure a new Set Task Sequence Variable step in the deployment task sequence* 14. Select the **Inject Drivers** step, the next step in the task sequence. 15. On the **Properties** tab of the **Inject Drivers** step (as shown in Figure 5) configure the following options: - * In the **Choose a selection profile** drop-down menu, select **Nothing**. - * Click the **Install all drivers from the selection profile** button. + * In the **Choose a selection profile** drop-down menu, select **Nothing**. + * Click the **Install all drivers from the selection profile** button. - ![Configure the deployment task sequence to not install drivers](images\surface-upgrademdt-fig5.png "Configure the deployment task sequence to not install drivers") + ![Configure the deployment task sequence to not install drivers](images/surface-upgrademdt-fig5.png "Configure the deployment task sequence to not install drivers") - *Figure 5. Configure the deployment task sequence to not install drivers* + *Figure 5. Configure the deployment task sequence to not install drivers* 16. Click **OK** to apply changes to the task sequence and close the task sequence properties window. diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index 8050e4754a..af796bd2c4 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -33,10 +33,10 @@ Before you begin the process outlined in this article, it is expected that you a * [System Center Configuration Manager application deployment](https://docs.microsoft.com/sccm/apps/deploy-use/deploy-applications) * Certificate management ->[!Note] ->You will also need access to the certificate that you intend to use to secure SEMM. For details about the requirements for this certificate, see [Surface Enterprise Management Mode certificate requirements](https://technet.microsoft.com/itpro/surface/surface-enterprise-management-mode#surface-enterprise-management-mode-certificate-requirements). - ->It is very important that this certificate be kept in a safe location and properly backed up. If this certificate becomes lost or unusable, it is not possible to reset Surface UEFI, change managed Surface UEFI settings, or remove SEMM from an enrolled Surface device. +> [!Note] +> You will also need access to the certificate that you intend to use to secure SEMM. For details about the requirements for this certificate, see [Surface Enterprise Management Mode certificate requirements](https://technet.microsoft.com/itpro/surface/surface-enterprise-management-mode#surface-enterprise-management-mode-certificate-requirements). +> +> It is very important that this certificate be kept in a safe location and properly backed up. If this certificate becomes lost or unusable, it is not possible to reset Surface UEFI, change managed Surface UEFI settings, or remove SEMM from an enrolled Surface device. #### Download Microsoft Surface UEFI Manager @@ -395,7 +395,7 @@ To add the SEMM Configuration Manager scripts to Configuration Manager as an app - Click **Microsoft Surface UEFI Manager** from the list of **Available Applications** and the MSI deployment type, and then click **OK** to close the **Specify Required Application** window. - * Keep the **Auto Install** check box selected if you want Microsoft Surface UEFI Manager installed automatically on devices when you attempt to enable SEMM with the Configuration Manager scripts. Click **OK** to close the **Add Dependency** window. + * Keep the **Auto Install** check box selected if you want Microsoft Surface UEFI Manager installed automatically on devices when you attempt to enable SEMM with the Configuration Manager scripts. Click **OK** to close the **Add Dependency** window. * Click **Next** to proceed. @@ -405,11 +405,11 @@ To add the SEMM Configuration Manager scripts to Configuration Manager as an app * **Completion** – Confirmation of the deployment type creation is displayed when the process is complete. Click **Close** to finish the Create Deployment Type Wizard. - * **Summary** – The information that you entered throughout the Create Application Wizard is displayed. Click **Next** to create the application. + - **Summary** – The information that you entered throughout the Create Application Wizard is displayed. Click **Next** to create the application. - * **Progress** – A progress bar and status as the application is added to the Software Library is displayed on this page. + - **Progress** – A progress bar and status as the application is added to the Software Library is displayed on this page. - * **Completion** – Confirmation of the successful application creation is displayed when the application creation process is complete. Click **Close** to finish the Create Application Wizard. + - **Completion** – Confirmation of the successful application creation is displayed when the application creation process is complete. Click **Close** to finish the Create Application Wizard. After the script application is available in the Software Library of Configuration Manager, you can distribute and deploy SEMM using the scripts you prepared to devices or collections. If you have configured the Microsoft Surface UEFI Manager assemblies as a dependency that will be automatically installed, you can deploy SEMM in a single step. If you have not configured the assemblies as a dependency, they must be installed on the devices you intend to manage before you enable SEMM. @@ -419,11 +419,11 @@ Alternatively, you can configure the application installation to reboot automati Removal of SEMM from a device deployed with Configuration Manager using these scripts is as easy as uninstalling the application with Configuration Manager. This action starts the ResetSEMM.ps1 script and properly unenrolls the device with the same certificate file that was used during the deployment of SEMM. ->[!NOTE] ->Microsoft Surface recommends that you create reset packages only when you need to unenroll a device. These reset packages are typically valid for only one device, identified by its serial number. You can, however, create a universal reset package that would work for any device enrolled in SEMM with this certificate. - ->We strongly recommend that you protect your universal reset package as carefully as the certificate you used to enroll devices in SEMM. Please remember that – just like the certificate itself – this universal reset package can be used to unenroll any of your organization’s Surface devices from SEMM. - ->When you install a reset package, the Lowest Supported Value (LSV) is reset to a value of 1. You can reenroll a device by using an existing configuration package – the device will prompt for the certificate thumbprint before ownership is taken. - ->For this reason, the reenrollment of a device in SEMM would require a new package to be created and installed on that device. Because this action is a new enrollment and not a change in configuration on a device already enrolled in SEMM, the device will prompt for the certificate thumbprint before ownership is taken. +> [!NOTE] +> Microsoft Surface recommends that you create reset packages only when you need to unenroll a device. These reset packages are typically valid for only one device, identified by its serial number. You can, however, create a universal reset package that would work for any device enrolled in SEMM with this certificate. +> +> We strongly recommend that you protect your universal reset package as carefully as the certificate you used to enroll devices in SEMM. Please remember that – just like the certificate itself – this universal reset package can be used to unenroll any of your organization’s Surface devices from SEMM. +> +> When you install a reset package, the Lowest Supported Value (LSV) is reset to a value of 1. You can reenroll a device by using an existing configuration package – the device will prompt for the certificate thumbprint before ownership is taken. +> +> For this reason, the reenrollment of a device in SEMM would require a new package to be created and installed on that device. Because this action is a new enrollment and not a change in configuration on a device already enrolled in SEMM, the device will prompt for the certificate thumbprint before ownership is taken. diff --git a/devices/surface/using-the-sda-deployment-share.md b/devices/surface/using-the-sda-deployment-share.md index f70ebba810..de79c73b49 100644 --- a/devices/surface/using-the-sda-deployment-share.md +++ b/devices/surface/using-the-sda-deployment-share.md @@ -84,16 +84,16 @@ To import drivers for a peripheral device: 6. Click **Import Drivers** to start the Import Drivers Wizard, as shown in Figure 1. - ![Provide the location of your driver files](images\using-sda-driverfiles-fig1.png "Provide the location of your driver files") + ![Provide the location of your driver files](images/using-sda-driverfiles-fig1.png "Provide the location of your driver files") - *Figure 1. Provide the location of your driver files* + *Figure 1. Provide the location of your driver files* 7. The Import Drivers Wizard presents a series of steps: - - **Specify Directory** – Click **Browse** and navigate to the folder where you stored the drivers in Step 1. - - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - - **Progress** – While the drivers are imported, a progress bar is displayed on this page. - - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Drivers Wizard. + - **Specify Directory** – Click **Browse** and navigate to the folder where you stored the drivers in Step 1. + - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + - **Progress** – While the drivers are imported, a progress bar is displayed on this page. + - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Drivers Wizard. 8. Repeat Steps 5-7 for each Surface model on which you would like to include this driver. @@ -110,44 +110,44 @@ As with drivers, the SDA deployment share can be pre-configured with apps like t In the previous example for including drivers for a POS system, you would also need to include POS software for processing transactions and recording the input from the barcode scanner and credit card reader. To import an application and prepare it for installation on your Surface devices during Windows deployment: -1. Download the application installation files or locate the installation media for your application. +1. Download the application installation files or locate the installation media for your application. -2. Determine the command line instruction for silent installation, usually provided by the developer of the application. For Windows Installer files (.msi), see [Standard Installer Command-Line Options](https://msdn.microsoft.com/library/windows/desktop/aa372024) in the Windows Dev Center. +2. Determine the command line instruction for silent installation, usually provided by the developer of the application. For Windows Installer files (.msi), see [Standard Installer Command-Line Options](https://msdn.microsoft.com/library/windows/desktop/aa372024) in the Windows Dev Center. -3. Open the MDT Deployment Workbench. +3. Open the MDT Deployment Workbench. -4. Expand the **Deployment Shares** node and expand the SDA deployment share. +4. Expand the **Deployment Shares** node and expand the SDA deployment share. -5. Expand the **Applications** folder. +5. Expand the **Applications** folder. -6. Click **New Application** to start the New Application Wizard, as shown in Figure 2. +6. Click **New Application** to start the New Application Wizard, as shown in Figure 2. - ![Provide the command to install your application](images\using-sda-installcommand-fig2.png "Provide the command to install your application") + ![Provide the command to install your application](images/using-sda-installcommand-fig2.png "Provide the command to install your application") - *Figure 2: Provide the command to install your application* + *Figure 2: Provide the command to install your application* -7. Follow the steps of the New Application Wizard: +7. Follow the steps of the New Application Wizard: - - **Application Type** – Click **Application with Source Files**, and then click **Next**. - - **Details** – Enter a name for the application in the **Application Name** field. Enter publisher, version, and language information in the **Publisher**, **Version**, and **Language** fields if desired. Click **Next**. - - **Source** – Click **Browse** to navigate to and select the folder with the application installation files procured in Step 1, and then click **Next**. - - **Destination** – Enter a name for the folder where the application files will be stored in the **Specify the Name of the Directory that Should Be Created** field or click **Next** to accept the default name. - - **Command Details** – Enter the silent command-line instruction, for example `setup.msi /quiet /norestart` - - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. - - **Progress** – While the installation files are imported, a progress bar is displayed on this page. - - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Application Wizard. + - **Application Type** – Click **Application with Source Files**, and then click **Next**. + - **Details** – Enter a name for the application in the **Application Name** field. Enter publisher, version, and language information in the **Publisher**, **Version**, and **Language** fields if desired. Click **Next**. + - **Source** – Click **Browse** to navigate to and select the folder with the application installation files procured in Step 1, and then click **Next**. + - **Destination** – Enter a name for the folder where the application files will be stored in the **Specify the Name of the Directory that Should Be Created** field or click **Next** to accept the default name. + - **Command Details** – Enter the silent command-line instruction, for example `setup.msi /quiet /norestart` + - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process. + - **Progress** – While the installation files are imported, a progress bar is displayed on this page. + - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Application Wizard. -8. Click the **Task Sequences** folder, right-click **1 - Deploy Microsoft Surface**, and then click **Properties**. +8. Click the **Task Sequences** folder, right-click **1 - Deploy Microsoft Surface**, and then click **Properties**. -9. Click the **Task Sequence** tab to view the steps that are included in the new task sequence. +9. Click the **Task Sequence** tab to view the steps that are included in the new task sequence. 10. Select the **Windows Update (Pre-Application Installation)** step, and then click **Add**. 11. Hover the mouse over **General** under the **Add** menu, and then click **Install Application**. This will add a new step after the selected step for the installation of a specific application as shown in Figure 3. - ![A new Install Application step for Sample POS App](images\using-sda-newinstall-fig3.png "A new Install Application step for Sample POS App") + ![A new Install Application step for Sample POS App](images/using-sda-newinstall-fig3.png "A new Install Application step for Sample POS App") - *Figure 3. A new Install Application step for Sample POS App* + *Figure 3. A new Install Application step for Sample POS App* 12. On the **Properties** tab of the new **Install Application** step, enter **Install - Sample POS App** in the **Name** field, where *Sample POS App* is the name of your app. diff --git a/devices/surface/wake-on-lan-for-surface-devices.md b/devices/surface/wake-on-lan-for-surface-devices.md index ad031f997d..ddc39aa7c2 100644 --- a/devices/surface/wake-on-lan-for-surface-devices.md +++ b/devices/surface/wake-on-lan-for-surface-devices.md @@ -48,10 +48,10 @@ To enable WOL support on Surface devices, a specific driver for the Surface Ethe You can run this Microsoft Windows Installer (.msi) file on a Surface device to install the Surface WOL driver, or you can distribute it to Surface devices with an application deployment solution, such as System Center Configuration Manager. To include the Surface WOL driver during deployment, you can install the .msi file as an application during the deployment process. You can also extract the Surface WOL driver files to include them in the deployment process. For example, you can include them in your Microsoft Deployment Toolkit (MDT) deployment share. You can read more about Surface deployment with MDT in [Deploy Windows 10 to Surface devices with Microsoft Deployment Toolkit](https://technet.microsoft.com/itpro/surface/deploy-windows-10-to-surface-devices-with-mdt). ->[!NOTE] ->During the installation of SurfaceWOL.msi, the following registry key is set to a value of 1, which allows easy identification of systems where the WOL driver has been installed. If you chose to extract and install these drivers separately during deployment, this registry key will not be configured and must be configured manually or with a script. - ->**HKLM\SYSTEM\CurrentControlSet\Control\Power AllowSystemRequiredPowerRequests** +> [!NOTE] +> During the installation of SurfaceWOL.msi, the following registry key is set to a value of 1, which allows easy identification of systems where the WOL driver has been installed. If you chose to extract and install these drivers separately during deployment, this registry key will not be configured and must be configured manually or with a script. +> +> **HKLM\SYSTEM\CurrentControlSet\Control\Power AllowSystemRequiredPowerRequests** To extract the contents of SurfaceWOL.msi, use the MSIExec administrative installation option (**/a**), as shown in the following example, to extract the contents to the C:\WOL\ folder: diff --git a/education/docfx.json b/education/docfx.json index aed16babee..5e87a91352 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -1,40 +1,47 @@ { "build": { - "content": - [ - { - "files": ["**/**.md", "**/**.yml"], - "exclude": ["**/obj/**"] - } - ], + "content": [ + { + "files": [ + "**/**.md", + "**/**.yml" + ], + "exclude": [ + "**/obj/**" + ] + } + ], "resource": [ - { - "files": ["**/images/**"], - "exclude": ["**/obj/**"] - } + { + "files": [ + "**/images/**" + ], + "exclude": [ + "**/obj/**" + ] + } ], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "ROBOTS": "INDEX, FOLLOW", - "ms.author": "celested", - "audience": "windows-education", - "ms.topic": "article", - "breadcrumb_path": "/education/breadcrumb/toc.json", - "ms.date": "05/09/2017", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "Win.education", - "folder_relative_path_in_docset": "./" - } - } + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "ROBOTS": "INDEX, FOLLOW", + "ms.author": "celested", + "audience": "windows-education", + "ms.topic": "article", + "breadcrumb_path": "/education/breadcrumb/toc.json", + "ms.date": "05/09/2017", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "Win.education", + "folder_relative_path_in_docset": "./" + } + } }, - "externalReference": [ - ], + "externalReference": [], "template": "op.html", "dest": "education", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/education/get-started/configure-microsoft-store-for-education.md b/education/get-started/configure-microsoft-store-for-education.md index 900de8b4e8..d6010ad62c 100644 --- a/education/get-started/configure-microsoft-store-for-education.md +++ b/education/get-started/configure-microsoft-store-for-education.md @@ -18,8 +18,8 @@ manager: dansimp # Configure Microsoft Store for Education > [!div class="step-by-step"] -[<< Use School Data Sync to import student data](use-school-data-sync.md) -[Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md) +> [<< Use School Data Sync to import student data](use-school-data-sync.md) +> [Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md) You'll need to configure Microsoft Store for Education to accept the services agreement and make sure your Microsoft Store account is associated with Intune for Education. @@ -34,30 +34,30 @@ You can watch the descriptive audio version here: [Microsoft Education: Configur 1. Sign in to Microsoft Store for Education. 2. Accept the Microsoft Store for Business and Education Services Agreement. - This will take you to the Microsoft Store for Education portal. + This will take you to the Microsoft Store for Education portal. - **Figure 1** - Microsoft Store for Education portal + **Figure 1** - Microsoft Store for Education portal - ![Microsoft Store for Education portal](images/msfe_store_portal.png) + ![Microsoft Store for Education portal](images/msfe_store_portal.png) 3. In the Microsoft Store portal, click **Manage** to go to the Microsoft Store **Overview** page. 4. Find the **Overview** page, find the **Store settings** tile and click **Management tools**. - **Figure 2** - Select management tools from the list of Store settings options + **Figure 2** - Select management tools from the list of Store settings options - ![Select management tools from list of Store settings options](images/msfe_storesettings_select_managementtools.png) + ![Select management tools from list of Store settings options](images/msfe_storesettings_select_managementtools.png) -4. In the **Management tools** page, find **Microsoft Intune** on the list and click **Activate** to get Intune for Education ready for use with Microsoft Store for Education. +5. In the **Management tools** page, find **Microsoft Intune** on the list and click **Activate** to get Intune for Education ready for use with Microsoft Store for Education. - **Figure 3** - Activate Intune for Education as the management tool + **Figure 3** - Activate Intune for Education as the management tool - ![Activate Intune for Education as the management tool](images/msfe_managementtools_activateintune.png) + ![Activate Intune for Education as the management tool](images/msfe_managementtools_activateintune.png) Your Microsoft Store for Education account is now linked to Intune for Education so let's set that up next. > [!div class="step-by-step"] -[<< Use School Data Sync to import student data](use-school-data-sync.md) -[Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md) +> [<< Use School Data Sync to import student data](use-school-data-sync.md) +> [Use Intune for Education to manage groups, apps, and settings >>](use-intune-for-education.md) ## Related topic diff --git a/education/get-started/enable-microsoft-teams.md b/education/get-started/enable-microsoft-teams.md index d9dff5f1c1..350f3be922 100644 --- a/education/get-started/enable-microsoft-teams.md +++ b/education/get-started/enable-microsoft-teams.md @@ -28,21 +28,21 @@ To get started, IT administrators need to use the Office 365 Admin Center to ena 3. Go to **Settings > Services & add-ins**. 4. On the **Services & add-ins** page, select **Microsoft Teams**. - **Figure 1** - Select Microsoft Teams from the list of services & add-ins + **Figure 1** - Select Microsoft Teams from the list of services & add-ins - ![Enable Microsoft Teams for your school](images/o365_settings_services_msteams.png) + ![Enable Microsoft Teams for your school](images/o365_settings_services_msteams.png) 5. On the Microsoft Teams settings screen, select the license that you want to configure, **Student** or **Faculty and Staff**. Select **Faculty and Staff**. - **Figure 2** - Select the license that you want to configure + **Figure 2** - Select the license that you want to configure - ![Select the Microsoft Teams license that you want to configure](images/o365_msteams_settings.png) + ![Select the Microsoft Teams license that you want to configure](images/o365_msteams_settings.png) 6. After you select the license type, set the toggle to turn on Microsoft Teams for your organization. - **Figure 3** - Turn on Microsoft Teams for your organization + **Figure 3** - Turn on Microsoft Teams for your organization - ![Turn on Microsoft Teams for your organization](images/o365_msteams_turnon.png) + ![Turn on Microsoft Teams for your organization](images/o365_msteams_turnon.png) 7. Click **Save**. @@ -50,8 +50,8 @@ You can find more info about how to control which users in your school can use M > [!div class="step-by-step"] -[<< Use School Data Sync to import student data](use-school-data-sync.md) -[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) +> [<< Use School Data Sync to import student data](use-school-data-sync.md) +> [Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) ## Related topic diff --git a/education/get-started/finish-setup-and-other-tasks.md b/education/get-started/finish-setup-and-other-tasks.md index 602b74a3cd..64361b412b 100644 --- a/education/get-started/finish-setup-and-other-tasks.md +++ b/education/get-started/finish-setup-and-other-tasks.md @@ -18,7 +18,7 @@ manager: dansimp # Finish Windows 10 device setup and other tasks > [!div class="step-by-step"] -[<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md) +> [<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md) Once you've set up your Windows 10 education device, it's worth checking to verify the following: @@ -39,12 +39,12 @@ Verify that the device is set up correctly and boots without any issues. 1. Confirm that the Start menu contains a simple configuration. 2. Confirm that the Store and built-in apps are installed and working. The apps pushed down from Intune for Education will appear under **Recently added**. - > [!NOTE] - > It may take some time before some apps are pushed down to your device from Intune for Education. Check again later if you don't see some of the apps you provisioned for the user. + > [!NOTE] + > It may take some time before some apps are pushed down to your device from Intune for Education. Check again later if you don't see some of the apps you provisioned for the user. - **Figure 1** - Sample list of apps for a user + **Figure 1** - Sample list of apps for a user - ![Apps list contains the apps provisioned for the user](images/win10_start_checkapps.png) + ![Apps list contains the apps provisioned for the user](images/win10_start_checkapps.png) ## Verify the device is Azure AD joined Let's now verify that the device is joined to your organization's Azure AD and shows up as being managed in Microsoft Intune for Education. @@ -54,17 +54,17 @@ Let's now verify that the device is joined to your organization's Azure AD and s 2. Select **Groups** and select **All Devices**. 3. In the **All Devices** page, see the list of devices and verify that the device you're signed into appears on the list. - **Figure 2** - List of all managed devices + **Figure 2** - List of all managed devices - ![Verify that the device is managed in Intune for Education](images/i4e_groups_alldevices_listofaadjdevices.png) + ![Verify that the device is managed in Intune for Education](images/i4e_groups_alldevices_listofaadjdevices.png) 4. On the Windows 10 education device, click **Start** and go to **Settings**. 5. Select **Accounts > Access work or school**. 6. In the **Access work or school** page, confirm that the device is connected to the organization's Azure AD. - **Figure 3** - Confirm that the Windows 10 device is joined to Azure AD + **Figure 3** - Confirm that the Windows 10 device is joined to Azure AD - ![Confirm that the Windows 10 device is joined to Azure AD](images/win10_confirmaadj.png) + ![Confirm that the Windows 10 device is joined to Azure AD](images/win10_confirmaadj.png) **That's it! You're done!** You've completed basic cloud setup, deployment, and management using Microsoft Education. @@ -91,13 +91,13 @@ If you need to make changes or updates to any of the apps or settings for the gr 2. Click **Groups** and then choose **Settings** in the taskbar at the top of the page. 3. You will see the same settings groups that you saw in express setup for Intune for Education as well as other settings categories such as **Windows Defender settings**, **Device sharing**, **Edition upgrade**, and so on. - **Figure 4** - See the list of available settings in Intune for Education + **Figure 4** - See the list of available settings in Intune for Education - ![See the list of available settings in Intune for Education](images/i4e_groups_settingslist_full.png) + ![See the list of available settings in Intune for Education](images/i4e_groups_settingslist_full.png) 4. Keep the default settings or configure the settings according to your school's policies. - For example, you can configure the diagnostic data sent to Microsoft in **Basic device settings > Send diagnostic data**. + For example, you can configure the diagnostic data sent to Microsoft in **Basic device settings > Send diagnostic data**. 5. Click **Save** or **Discard changes**. @@ -113,9 +113,9 @@ Follow the steps in this section to enable a single person to add many devices t 2. Configure the device settings for the school's Active Directory. To do this, go to the new Azure portal, https://portal.azure.com. 3. Select **Azure Active Directory > Users and groups > Device settings**. - **Figure 5** - Device settings in the new Azure portal + **Figure 5** - Device settings in the new Azure portal - ![Configure device settings in the new Azure portal](images/azure_newportal_usersandgroups_devicesettings.png) + ![Configure device settings in the new Azure portal](images/azure_newportal_usersandgroups_devicesettings.png) 4. Find the setting **Maximum number of devices per user** and change the value to **Unlimited**. 5. Click **Save** to update device settings. @@ -126,13 +126,13 @@ When students move from using one device to another, they may need to have their Follow the steps in this section to ensure that settings for the each user follow them when they move from one device to another. 1. Sign in to the Office 365 admin center. -3. Go to the new Azure portal, https://portal.azure.com. +2. Go to the new Azure portal, https://portal.azure.com. 3. Select **Azure Active Directory > Users and groups > Device settings**. 4. Find the setting **Users may sync settings and enterprise app data** and change the value to **All**. - **Figure 6** - Enable settings to roam with users + **Figure 6** - Enable settings to roam with users - ![Enable settings to roam with users](images/azure_usersandgroups_devicesettings_ers.png) + ![Enable settings to roam with users](images/azure_usersandgroups_devicesettings_ers.png) 5. Click **Save** to update device settings. @@ -151,21 +151,21 @@ To get started, IT administrators need to use the Office 365 Admin Center to ena 3. Go to **Settings > Services & add-ins**. 4. On the **Services & add-ins** page, select **Microsoft Teams**. - **Figure 1** - Select Microsoft Teams from the list of services & add-ins + **Figure 1** - Select Microsoft Teams from the list of services & add-ins - ![Enable Microsoft Teams for your school](images/o365_settings_services_msteams.png) + ![Enable Microsoft Teams for your school](images/o365_settings_services_msteams.png) 5. On the Microsoft Teams settings screen, select the license that you want to configure, **Student** or **Faculty and Staff**. Select **Faculty and Staff**. - **Figure 2** - Select the license that you want to configure + **Figure 2** - Select the license that you want to configure - ![Select the Microsoft Teams license that you want to configure](images/o365_msteams_settings.png) + ![Select the Microsoft Teams license that you want to configure](images/o365_msteams_settings.png) 6. After you select the license type, set the toggle to turn on Microsoft Teams for your organization. - **Figure 3** - Turn on Microsoft Teams for your organization + **Figure 3** - Turn on Microsoft Teams for your organization - ![Turn on Microsoft Teams for your organization](images/o365_msteams_turnon.png) + ![Turn on Microsoft Teams for your organization](images/o365_msteams_turnon.png) 7. Click **Save**. @@ -188,11 +188,11 @@ Adding a new device to your cloud-based tenant is easy. For new devices, you can 2. Select **Access work or school** and then click **Connect** in the **Connect to work or school** page. 3. In the **Set up a work or school account** window, enter the user's account info. - For example, if a teacher connects their personal device to the school network, they'll see the following screen after typing in their account information. + For example, if a teacher connects their personal device to the school network, they'll see the following screen after typing in their account information. - **Figure 7** - Device is now managed by Intune for Education + **Figure 7** - Device is now managed by Intune for Education - ![Device is managed by Intune for Education](images/byob_aad_enrollment_intune.png) + ![Device is managed by Intune for Education](images/byob_aad_enrollment_intune.png) 4. Enter the account password and then click **Sign in** to authenticate the user. @@ -200,17 +200,17 @@ Adding a new device to your cloud-based tenant is easy. For new devices, you can 5. After the user's credentails are validated, the window will refresh and will now include an entry that shows the device is now connected to the organization's MDM. This means the device is now enrolled in Intune for Education MDM and the account should have access to the organization's resources. - **Figure 8** - Device is connected to organization's MDM + **Figure 8** - Device is connected to organization's MDM - ![Device is connected to organization's MDM](images/win10_connectedtoorgmdm.png) + ![Device is connected to organization's MDM](images/win10_connectedtoorgmdm.png) 6. You can confirm that the new device and user are showing up as Intune for Education-managed by going to the Intune for Education management portal and following the steps in [Verify the device is Azure AD joined](#verify-the-device-is-azure-ad-joined). - It may take several minutes before the new device shows up so check again later. + It may take several minutes before the new device shows up so check again later. > [!div class="step-by-step"] -[<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md) +> [<< Set up Windows 10 education devices](set-up-windows-10-education-devices.md) ## Related topic diff --git a/education/get-started/get-started-with-microsoft-education.md b/education/get-started/get-started-with-microsoft-education.md index 1f3638abf3..a36cdb45da 100644 --- a/education/get-started/get-started-with-microsoft-education.md +++ b/education/get-started/get-started-with-microsoft-education.md @@ -105,18 +105,18 @@ To get started with Microsoft Education in a trial environment, follow these ste 1. [Set up a new Office 365 for Education tenant](set-up-office365-edu-tenant.md). - Wait for your tenant to be education-verified before proceeding with the next step. Verification can take up to a few days. + Wait for your tenant to be education-verified before proceeding with the next step. Verification can take up to a few days. 2. Once you have an education-verified tenant, click https://aka.ms/intuneforedupreviewtrial to apply the Intune for Education trial promo code. - 1. In the Intune for Education Trial page, on the upper right, click **Sign in** next to **Want to add this to an existing subscription?**. - 2. Sign in with your global admin credentials. + 1. In the Intune for Education Trial page, on the upper right, click **Sign in** next to **Want to add this to an existing subscription?**. + 2. Sign in with your global admin credentials. 3. Sign in to Office 365 admin portal and: - 1. Select **Admin > Users** and then search for your admin account. - 2. In the user page, select **Product licenses** and expand the **Office 365 Education** license you assigned to yourself. - 3. Confirm that School Data Sync is turned on. + 1. Select **Admin > Users** and then search for your admin account. + 2. In the user page, select **Product licenses** and expand the **Office 365 Education** license you assigned to yourself. + 3. Confirm that School Data Sync is turned on. -3. Skip ahead and follow the rest of the instructions in this walkthrough beginning with [Use School Data Sync to import student data](use-school-data-sync.md). +4. Skip ahead and follow the rest of the instructions in this walkthrough beginning with [Use School Data Sync to import student data](use-school-data-sync.md). ### Option 3: Try out Intune for Education Already have an Office 365 for Education verified tenant? Just sign in with your global admin credentials to apply the Intune for Education preview trial code to your tenant and follow the rest of the walkthrough. @@ -124,9 +124,9 @@ Already have an Office 365 for Education verified tenant? Just sign in with your 1. Click https://aka.ms/intuneforedupreviewtrial to get started. 2. In the **Intune for Education Trial** page, on the upper right, click **Sign in** next to **Want to add this to an existing subscription?**. - **Figure 2** - Intune for Education trial sign in page + **Figure 2** - Intune for Education trial sign in page - ![Intune for Education trial sign in page](images/i4e_trialsigninpage.png) + ![Intune for Education trial sign in page](images/i4e_trialsigninpage.png) 3. Enter your Office 365 global admin credentials to apply the Intune for Education trial to your tenant. 4. If you don't already have Microsoft Teams deployed to your tenant, you can start with [Enable Microsoft Teams for your school](enable-microsoft-teams.md) and then follow the rest of the instructions in this walkthrough. diff --git a/education/get-started/inclusive-classroom-it-admin.md b/education/get-started/inclusive-classroom-it-admin.md index 81e21b05f7..a67cc68626 100644 --- a/education/get-started/inclusive-classroom-it-admin.md +++ b/education/get-started/inclusive-classroom-it-admin.md @@ -1,84 +1,92 @@ ---- -title: Inclusive Classroom IT Admin Guide -description: Learning which Inclusive Classroom features are available in which apps and in which versions of Microsoft Office. -keywords: Inclusive Classroom, Admin, Administrator, Microsoft Intune, Intune, Ease of Access, Office 365, account -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.topic: article -ms.localizationpriority: medium -ms.pagetype: edu -ROBOTS: noindex,nofollow -author: levinec -ms.author: ellevin -ms.date: 06/12/2018 -ms.reviewer: -manager: dansimp ---- - -# Inclusive Classroom IT Admin Guide -The following guide will show you what Inclusive Classroom features are available in which apps and which versions of Microsoft Office. -You will also learn how to deploy apps using Microsoft Intune, turn on or off Ease of access settings for users, and change how you pay for your Office 365 subscription. - -1. [Inclusive Classroom features](#features) -2. [Deploying apps with Microsoft Intune](#intune) -3. [How to show/hide the Ease of Accesss settings for text in Windows 10](#ease) -4. [How to change your Office 365 account from monthly, semi-annual, or yearly](#account) - -## Inclusive Classroom features -|Reading features|Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | -|---|---|---|---|---|---|---| -| Read aloud with simultaneous highlighting |
            • OneNote 2016 (add-in), OneNote for the web, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word for the web, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word for iOS, Word for the web, Outlook Web Access, or Office Lens)

            |

            X

            (N/A for Word for iOS, Word for the web, Outlook Web Access, or Office Lens)

            |

            X

            |

            X

            (N/A for Outlook PC)

            |

            X

            (N/A for any OneNote apps or Outlook PC)

            | -| Adjustable text spacing and font size |
            • OneNote 2016 (add-in), OneNote for the web, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word for the web, Word Mac, Word for iPad
            • Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word for iOS, Word for the web, Outlook Web Access, or Office Lens)

            |

            X

            (N/A for Word for iOS, Word for the web, Outlook Web Access, or Office Lens)

            |

            X

            |

            X

            |

            X

            (N/A for any OneNote apps)

            | -| Syllabification |
            • OneNote 2016 (add-in), OneNote for the web, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word for the web
            • Outlook Web Access
            | |

            X

            (N/A for Word for iOS, Word for the web, Outlook Web Access)

            |

            X

            (N/A for Word iOS)

            |

            X

            (N/A for Word iOS)

            |

            X

            (N/A for any OneNote apps or Word iOS)

            | -| Parts of speech identification |
            • OneNote 2016 (add-in), OneNote for the web, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word for the web, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word for the web, Outlook Web Access)

            |

            X

            (N/A for Word for the web, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | -| Line focus mode |
            • Word 2016, Word for the web, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            | |

            X

            (N/A for Word for the web, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | -| Picture Dictionary |
            • Word 2016, Word on the web, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            | |

            X

            (N/A for Word for the web, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | -
            - -| Writing and proofing features | Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | -|---|---|---|---|---|---|---| -| Dictation |
            • OneNote 2016, OneNote for Windows 10
            • Word 2016
            • Outlook 2016
            • PowerPoint 2016
            | |

            X

            |

            X

            | | | -| Spelling suggestions for phonetic misspellings |
            • Word 2016, Word on the web, Word for Mac
            • Outlook 2016
            | |

            X

            |

            X

            |

            X

            | | -| Synonyms alongside spelling suggestions that can be read aloud |
            • Word 2016
            • Outlook 2016
            | |

            X

            |

            X

            |

            X

            | | -| Grammar checks |
            • Word 2016, Word for the web, Word for Mac
            • Outlook 2016
            | |

            X

            |

            X

            | | | -| Customizable writing critiques |
            • Word 2016, Word for Mac
            • Outlook 2016
            |

            X

            |

            X

            |

            X

            | | | -| Tell me what you want to do |
            • Office 2016
            • Office on the web
            • Office on iOS, Android, Windows 10
            |

            X

            |

            X

            |

            X

            |

            X

            | | -| Editor |
            • Word 2016
            | |

            X

            |

            X

            | | | -
            - -| Creating accessible content features | Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | -|---|---|---|---|---|---|---| -| Accessibility Checker |
            • All Office 365 authoring applications on PC, Mac, Web
            | |

            X

            |

            X

            | | | -| Accessible Templates |
            • Word for PCs, Mac
            • Excel for PCs, Mac
            • PowerPoint for PCs, Mac
            • Sway on iOS, Web, Windows 10
            | |

            X

            |

            X

            | | | -| Ability to add alt-text for images |
            • Word for PCs (includes automatic suggestions for image descriptions)
            • SharePoint Online (includes automatic suggestions for image descriptions)
            • PowerPoint for PCs (includes automatic suggestions for image descriptions)
            • OneNote (includes automatic extraction of text in images)
            • All Office 365 authoring applications (include ability to add alt-text manually)
            |

            X

            |

            X

            |

            X

            | | | -| Ability to add captions to videos |
            • PowerPoint for PCs
            • Sway on iOS, Web, Windows 10
            • Microsoft Stream (includes ability to have captions auto-generated for videos in English and Spanish)
            | |

            X

            | | | | -| Export as tagged PDF |
            • Word for PCs, Mac
            • Sway on iOS, Web, Windows 10
            | |

            X

            |

            X

            | | | -| Ability to request accessible content |
            • Outlook Web Access
            | | | | | | -
            - -| Communication features | Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | -|---|---|---|---|---|---|---| -| Microsoft Translator |
            • Word 2016
            • Excel 2016
            • "Translator for Outlook" Add-in
            • PowerPoint 2016 (and PowerPoint Garage Add-in)
            |

            X

            |

            X

            |

            X

            |

            X

            |

            X

            | -
            - -## Deploying apps with Microsoft Intune -Microsoft Intune can be used to deploy apps such as Immersive Reader and Microsoft Translator to all the devices connected in the same groups. -1. Go to the Intune for Education portal and log in with your account. -2. Select the **Apps** page. -3. Find the app you're looking for in the included list (if it's not there, you can select **Add app** and download it from the Microsoft Store). -4. Selecting your app will show you if it has been deployed to any of the groups that have been set up. From the **Groups** page you can select **Change group assignment** and choose which groups you want to deploy the app(s) to. - -## How to show/hide the Ease of access settings for text in Windows 10 -The Ease of access settings in Windows 10 are very useful accessibility tools, but having those options could be a bit much for everyone in a group to have in their device. With the following instructions you can chose to hide or show the Ease of access settings on users' devices. -1. Go to the Intune for Education portal and login with your account. -2. Select the **Groups** page and then select your desired group. -3. Select **Settings** and under the **User access and device settings** section you will find the toggle to set **Ease of access** to **Blocked** or **Not blocked**. -4. Select **Save** after making your selection. - -## How to change your Office 365 account from monthly, semi-annual, or yearly -Depending on how you plan to do billing, you can have Office 365 accounts that are set to renew monthly, semi-annually, or yearly. -1. Sign-in to your services and subscriptions with your Microsoft account. -2. Find the subscription in the list, then select **Change how you pay**. - >**Note:** If you don't see **Change how you pay**, it could be because auto-renew is not turned on. You won't be able to change how you pay if auto-renew is off because the subscription has already been paid and will end when its duration expires. -3. Choose a new way to pay from the list or select **Add a new way to pay** and follow the instructions. +--- +title: Inclusive Classroom IT Admin Guide +description: Learning which Inclusive Classroom features are available in which apps and in which versions of Microsoft Office. +keywords: Inclusive Classroom, Admin, Administrator, Microsoft Intune, Intune, Ease of Access, Office 365, account +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.topic: article +ms.localizationpriority: medium +ms.pagetype: edu +ROBOTS: noindex,nofollow +author: levinec +ms.author: ellevin +ms.date: 06/12/2018 +ms.reviewer: +manager: dansimp +--- + +# Inclusive Classroom IT Admin Guide +The following guide will show you what Inclusive Classroom features are available in which apps and which versions of Microsoft Office. +You will also learn how to deploy apps using Microsoft Intune, turn on or off Ease of access settings for users, and change how you pay for your Office 365 subscription. + +1. [Inclusive Classroom features](#features) +2. [Deploying apps with Microsoft Intune](#intune) +3. [How to show/hide the Ease of Accesss settings for text in Windows 10](#ease) +4. [How to change your Office 365 account from monthly, semi-annual, or yearly](#account) + +## Inclusive Classroom features + +| Reading features | Available in which apps | Office 2016 MSI | Office 2019 | Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | +|-------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------| +| Read aloud with simultaneous highlighting |
            • OneNote 2016 (add-in), OneNote Online, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word Online, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

            |

            X

            (N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

            |

            X

            |

            X

            (N/A for Outlook PC)

            |

            X

            (N/A for any OneNote apps or Outlook PC)

            | +| Adjustable text spacing and font size |
            • OneNote 2016 (add-in), OneNote Online, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word Online, Word Mac, Word for iPad
            • Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

            |

            X

            (N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

            |

            X

            |

            X

            |

            X

            (N/A for any OneNote apps)

            | +| Syllabification |
            • OneNote 2016 (add-in), OneNote Online, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word Online
            • Outlook Web Access
            | |

            X

            (N/A for Word for iOS, Word Online, Outlook Web Access)

            |

            X

            (N/A for Word iOS)

            |

            X

            (N/A for Word iOS)

            |

            X

            (N/A for any OneNote apps or Word iOS)

            | +| Parts of speech identification |
            • OneNote 2016 (add-in), OneNote Online, OneNote for Windows 10, OneNote for iPad, OneNote Mac
            • Word 2016, Word Online, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            |

            X

            (N/A for Word Online, Outlook Web Access)

            |

            X

            (N/A for Word Online, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | +| Line focus mode |
            • Word 2016, Word Online, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            | |

            X

            (N/A for Word Online, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | +| Picture Dictionary |
            • Word 2016, Word Online, Word Mac, Word for iOS
            • Outlook 2016, Outlook Web Access
            • Office Lens on iOS, Android
            | |

            X

            (N/A for Word Online, Outlook Web Access)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            |

            X

            (N/A for any OneNote apps)

            | + +
            + + +| Writing and proofing features | Available in which apps | Office 2016 MSI | Office 2019 | Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | +|----------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|---------------------------------| +| Dictation |
            • OneNote 2016, OneNote for Windows 10
            • Word 2016
            • Outlook 2016
            • PowerPoint 2016
            | |

            X

            |

            X

            | | | +| Spelling suggestions for phonetic misspellings |
            • Word 2016, Word Online, Word for Mac
            • Outlook 2016
            | |

            X

            |

            X

            |

            X

            | | +| Synonyms alongside spelling suggestions that can be read aloud |
            • Word 2016
            • Outlook 2016
            | |

            X

            |

            X

            |

            X

            | | +| Grammar checks |
            • Word 2016, Word Online, Word for Mac
            • Outlook 2016
            | |

            X

            |

            X

            | | | +| Customizable writing critiques |
            • Word 2016, Word for Mac
            • Outlook 2016
            |

            X

            |

            X

            |

            X

            | | | +| Tell me what you want to do |
            • Office 2016
            • Office Online
            • Office on iOS, Android, Windows 10
            |

            X

            |

            X

            |

            X

            |

            X

            | | +| Editor |
            • Word 2016
            | |

            X

            |

            X

            | | | + +
            + + +| Creating accessible content features | Available in which apps | Office 2016 MSI | Office 2019 | Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | +|---------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|---------------------------------| +| Accessibility Checker |
            • All Office 365 authoring applications on PC, Mac, Web
            | |

            X

            |

            X

            | | | +| Accessible Templates |
            • Word for PCs, Mac
            • Excel for PCs, Mac
            • PowerPoint for PCs, Mac
            • Sway on iOS, Web, Windows 10
            | |

            X

            |

            X

            | | | +| Ability to add alt-text for images |
            • Word for PCs (includes automatic suggestions for image descriptions)
            • SharePoint Online (includes automatic suggestions for image descriptions)
            • PowerPoint for PCs (includes automatic suggestions for image descriptions)
            • OneNote (includes automatic extraction of text in images)
            • All Office 365 authoring applications (include ability to add alt-text manually)
            |

            X

            |

            X

            |

            X

            | | | +| Ability to add captions to videos |
            • PowerPoint for PCs
            • Sway on iOS, Web, Windows 10
            • Microsoft Stream (includes ability to have captions auto-generated for videos in English and Spanish)
            | |

            X

            | | | | +| Export as tagged PDF |
            • Word for PCs, Mac
            • Sway on iOS, Web, Windows 10
            | |

            X

            |

            X

            | | | +| Ability to request accessible content |
            • Outlook Web Access
            | | | | | | + +
            + + +| Communication features | Available in which apps | Office 2016 MSI | Office 2019 | Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | +|------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------|--------------------------------------| +| Microsoft Translator |
            • Word 2016
            • Excel 2016
            • "Translator for Outlook" Add-in
            • PowerPoint 2016 (and PowerPoint Garage Add-in)
            |

            X

            |

            X

            |

            X

            |

            X

            |

            X

            | + +
            + +## Deploying apps with Microsoft Intune +Microsoft Intune can be used to deploy apps such as Immersive Reader and Microsoft Translator to all the devices connected in the same groups. +1. Go to the Intune for Education portal and log in with your account. +2. Select the **Apps** page. +3. Find the app you're looking for in the included list (if it's not there, you can select **Add app** and download it from the Microsoft Store). +4. Selecting your app will show you if it has been deployed to any of the groups that have been set up. From the **Groups** page you can select **Change group assignment** and choose which groups you want to deploy the app(s) to. + +## How to show/hide the Ease of access settings for text in Windows 10 +The Ease of access settings in Windows 10 are very useful accessibility tools, but having those options could be a bit much for everyone in a group to have in their device. With the following instructions you can chose to hide or show the Ease of access settings on users' devices. +1. Go to the Intune for Education portal and login with your account. +2. Select the **Groups** page and then select your desired group. +3. Select **Settings** and under the **User access and device settings** section you will find the toggle to set **Ease of access** to **Blocked** or **Not blocked**. +4. Select **Save** after making your selection. + +## How to change your Office 365 account from monthly, semi-annual, or yearly +Depending on how you plan to do billing, you can have Office 365 accounts that are set to renew monthly, semi-annually, or yearly. +1. Sign-in to your services and subscriptions with your Microsoft account. +2. Find the subscription in the list, then select **Change how you pay**. + >**Note:** If you don't see **Change how you pay**, it could be because auto-renew is not turned on. You won't be able to change how you pay if auto-renew is off because the subscription has already been paid and will end when its duration expires. +3. Choose a new way to pay from the list or select **Add a new way to pay** and follow the instructions. diff --git a/education/get-started/set-up-office365-edu-tenant.md b/education/get-started/set-up-office365-edu-tenant.md index 8f307ea6a9..0d5813061e 100644 --- a/education/get-started/set-up-office365-edu-tenant.md +++ b/education/get-started/set-up-office365-edu-tenant.md @@ -18,8 +18,8 @@ manager: dansimp # Set up an Office 365 Education tenant > [!div class="step-by-step"] -[<< Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) -[Use School Data Sync to import student data >>](use-school-data-sync.md) +> [<< Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) +> [Use School Data Sync to import student data >>](use-school-data-sync.md) Schools can use Office 365 to save time and be more productive. Built with powerful tools and accessible from any device, setting it up is the first step in getting your school to the cloud. @@ -34,24 +34,24 @@ You can watch the descriptive audio version here: [Microsoft Education: Set up a 1. Go to the Office 365 for Education sign up page to sign up for a free subscription for your school. 2. Create an account and a user ID and password to use to sign into your account. - **Figure 1** - Office 365 account creation + **Figure 1** - Office 365 account creation - ![Create an Office 365 account](images/o365_createaccount.png) + ![Create an Office 365 account](images/o365_createaccount.png) 3. Save your sign-in info so you can use it to sign in to https://portal.office.com (the sign-in page). Click **You're ready to go...** 4. In the **Verify eligibility for Microsoft Office 365 for Education** screen: - 1. Add your domain name and follow the steps to confirm ownership of the domain. - 2. Choose your DNS hosting provider to see step-by-step instructions on how to confirm that you own the domain. + 1. Add your domain name and follow the steps to confirm ownership of the domain. + 2. Choose your DNS hosting provider to see step-by-step instructions on how to confirm that you own the domain. - In some cases, you may need to wait several hours for the DNS verification to complete. You can click **I'll verify later** and come back later and log into the Office 365 portal and then go to the **Admin** center and select **Domains** to check the status entry for your domain. + In some cases, you may need to wait several hours for the DNS verification to complete. You can click **I'll verify later** and come back later and log into the Office 365 portal and then go to the **Admin** center and select **Domains** to check the status entry for your domain. - You may need to fill in other information to provide that you qualify for an education tenant. Provide and submit the info to Microsoft to continue verification for your tenant. + You may need to fill in other information to provide that you qualify for an education tenant. Provide and submit the info to Microsoft to continue verification for your tenant. As part of setting up a basic cloud infrastructure, you don't need to complete the rest of the Office 365 for Education setup so we will skip the rest of setup for now and start importing school data. You can pick up where you left off with Office 365 for Education setup once you've completed the rest of the steps in the walkthrough. See *Complete Office 365 for Education setup* in [Finish Windows 10 device setup and other tasks](finish-setup-and-other-tasks.md) for info. > [!div class="step-by-step"] -[<< Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) -[Use School Data Sync to import student data >>](use-school-data-sync.md) +> [<< Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) +> [Use School Data Sync to import student data >>](use-school-data-sync.md) ## Related topic diff --git a/education/get-started/set-up-windows-10-education-devices.md b/education/get-started/set-up-windows-10-education-devices.md index d448a1840d..bc564efa41 100644 --- a/education/get-started/set-up-windows-10-education-devices.md +++ b/education/get-started/set-up-windows-10-education-devices.md @@ -18,8 +18,8 @@ manager: dansimp # Set up Windows 10 education devices > [!div class="step-by-step"] -[<< Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) -[Finish setup and other tasks >>](finish-setup-and-other-tasks.md) +> [<< Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) +> [Finish setup and other tasks >>](finish-setup-and-other-tasks.md) We recommend using the latest build of Windows 10, version 1703 on your education devices. @@ -28,8 +28,8 @@ To set up new Windows 10 devices and enroll them to your education tenant, choos - **Option 2: [Go through Windows OOBE and join the device to Azure AD](set-up-windows-education-devices.md)** - You can go through a typical Windows 10 device setup or first-run experience to configure your device. > [!div class="step-by-step"] -[<< Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) -[Finish setup and other tasks >>](finish-setup-and-other-tasks.md) +> [<< Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) +> [Finish setup and other tasks >>](finish-setup-and-other-tasks.md) diff --git a/education/get-started/set-up-windows-education-devices.md b/education/get-started/set-up-windows-education-devices.md index fb4f46d999..65cd88c27c 100644 --- a/education/get-started/set-up-windows-education-devices.md +++ b/education/get-started/set-up-windows-education-devices.md @@ -30,15 +30,15 @@ You can watch the descriptive audio version here: [Microsoft Education: Set up a 1. If you don't have a Wi-Fi network configured, make sure you connect the device to the Internet through a wired or Ethernet connection. 2. Go through the Windows device setup experience. On a new or reset device, this starts with the **Let's start with region. Is this right?** screen. - **Figure 1** - Let's start with region + **Figure 1** - Let's start with region - ![Let's start with region](images/win10_letsstartwithregion.png) + ![Let's start with region](images/win10_letsstartwithregion.png) 3. Continue with setup. In the **How would you like to set up?** screen, select **Set up for an organization**. - **Figure 2** - Select setup for an organization + **Figure 2** - Select setup for an organization - ![Select setup for an organization](images/win10_setupforanorg.png) + ![Select setup for an organization](images/win10_setupforanorg.png) 4. Sign in using the user's account and password. Depending on the user password setting, you may be prompted to update the password. 5. Choose privacy settings for the device. Location, speech recognition, diagnostics, and other settings are all on by default. Configure the settings based on the school's policies. diff --git a/education/get-started/use-intune-for-education.md b/education/get-started/use-intune-for-education.md index 7f6d4c02f9..9a4b451c83 100644 --- a/education/get-started/use-intune-for-education.md +++ b/education/get-started/use-intune-for-education.md @@ -18,8 +18,8 @@ manager: dansimp # Use Intune for Education to manage groups, apps, and settings > [!div class="step-by-step"] -[<< Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) -[Set up Windows 10 education devices >>](set-up-windows-10-education-devices.md) +> [<< Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) +> [Set up Windows 10 education devices >>](set-up-windows-10-education-devices.md) Intune for Education is a streamlined device management solution for educational institutions that can be used to quickly set up and manage Windows 10 devices for your school. It provides a new streamlined UI with the enterprise readiness and resiliency of the Intune service. You can learn more about Intune for Education by reading the Intune for Education documentation. @@ -52,81 +52,81 @@ Intune for Education provides an **Express configuration** option so you can get 1. Log into the Intune for Education console. You will see the Intune for Education dashboard once you're logged in. - **Figure 1** - Intune for Education dashboard + **Figure 1** - Intune for Education dashboard - ![Intune for Education dashboard](images/i4e_portal.png) + ![Intune for Education dashboard](images/i4e_portal.png) 2. On the dashboard, click **Launch Express Configuration**, or select the **Express configuration** option on the menu on the left. 3. In the **Welcome to Intune for Education** screen, click **Get started**. - **Figure 2** - Click Get started to set up Intune for Education + **Figure 2** - Click Get started to set up Intune for Education - ![Click Get Started to configure groups, apps, and settings](images/i4e_expressconfiguration_welcome.png) + ![Click Get Started to configure groups, apps, and settings](images/i4e_expressconfiguration_welcome.png) 4. In the **Get school information (optional)** screen, it should indicate that SDS is already configured. Click **Next**. - **Figure 3** - SDS is configured + **Figure 3** - SDS is configured - ![SDS is already configured](images/i4e_expressconfiguration_sdsconfigured.png) + ![SDS is already configured](images/i4e_expressconfiguration_sdsconfigured.png) 5. In the **Choose group** screen, select **All Users**. All apps and settings that we select during express setup will apply to this group. - You can choose another group during this step, but note that your experience may vary from what we show in the walkthrough. + You can choose another group during this step, but note that your experience may vary from what we show in the walkthrough. 6. The **Next** button will appear at the bottom of the screen after you select **All Users**. Click **Next**. - > [!TIP] - > At the top of the screen, did you notice the **Choose group** button change to a green check mark? This means we are done with that step. If you change your mind or need to make changes, simply click on the button to go back to that step. Try it! - > - > **Figure 4** - Click on the buttons to go back to that step - > - > ![Click on the buttons to back to that step](images/i4e_expressconfiguration_choosebuttontogoback.png) + > [!TIP] + > At the top of the screen, did you notice the **Choose group** button change to a green check mark? This means we are done with that step. If you change your mind or need to make changes, simply click on the button to go back to that step. Try it! + > + > **Figure 4** - Click on the buttons to go back to that step + > + > ![Click on the buttons to back to that step](images/i4e_expressconfiguration_choosebuttontogoback.png) 7. In the **Choose apps** screen, you will see a selection of Web apps, Microsoft Store apps, and desktop (Win32) apps. You will also see a list of popular apps from each category. - - Add or remove apps by clicking on them. A blue checkmark means the app is added and will be installed for all members of the group selected in the **Choose group** step. + - Add or remove apps by clicking on them. A blue checkmark means the app is added and will be installed for all members of the group selected in the **Choose group** step. - In this walkthrough, it's up to you to select the apps you choose to install. Just remember what they are so that later in the walkthrough you can verify that the apps were installed correctly on the device. + In this walkthrough, it's up to you to select the apps you choose to install. Just remember what they are so that later in the walkthrough you can verify that the apps were installed correctly on the device. - > [!TIP] - > Web apps are pushed as links in the Windows Start menu under **All apps**. If you want apps to appear in Microsoft Edge browser tabs, use the **Homepages** setting for Microsoft Edge through **Express configuration** or **Manage Users and Devices**. + > [!TIP] + > Web apps are pushed as links in the Windows Start menu under **All apps**. If you want apps to appear in Microsoft Edge browser tabs, use the **Homepages** setting for Microsoft Edge through **Express configuration** or **Manage Users and Devices**. - **Figure 5** - Choose the apps that you want to install for the group + **Figure 5** - Choose the apps that you want to install for the group - ![Choose apps to install for the group](images/i4e_expressconfiguration_chooseapps_selected_cropped.png) + ![Choose apps to install for the group](images/i4e_expressconfiguration_chooseapps_selected_cropped.png) 8. When you're done choosing apps, click **Next** at the bottom of the screen. - If you select Microsoft Store apps, you will see a notification that Intune for Education is getting these apps. + If you select Microsoft Store apps, you will see a notification that Intune for Education is getting these apps. -8. In the **Choose settings** screen, we will set the settings to apply to the group. Click the reverse caret (downward-facing arrow) to expand the settings group and get more information about each setting in that settings group. +9. In the **Choose settings** screen, we will set the settings to apply to the group. Click the reverse caret (downward-facing arrow) to expand the settings group and get more information about each setting in that settings group. - **Figure 6** - Expand the settings group to get more details + **Figure 6** - Expand the settings group to get more details - ![Expand the settings group to get more info](images/i4e_expressconfiguration_choosesettings_expandcollapse_cropped_052217.png) + ![Expand the settings group to get more info](images/i4e_expressconfiguration_choosesettings_expandcollapse_cropped_052217.png) -9. For this walkthrough, set the following settings: - - In the **Microsoft Edge settings** group, change the **Do-Not-Track headers** setting to **Require**. - - In the **App settings** group, change the **Microsoft Store for Business apps** setting to **Block**, and then set the **Require Microsoft Store for Business apps to be installed from private store** to **Require**. +10. For this walkthrough, set the following settings: + - In the **Microsoft Edge settings** group, change the **Do-Not-Track headers** setting to **Require**. + - In the **App settings** group, change the **Microsoft Store for Business apps** setting to **Block**, and then set the **Require Microsoft Store for Business apps to be installed from private store** to **Require**. - **Figure 28** - Set some additional settings + **Figure 28** - Set some additional settings - ![Set some additional settings](images/i4e_expressconfiguration_choosesettings_additionalsettings_cropped.png) + ![Set some additional settings](images/i4e_expressconfiguration_choosesettings_additionalsettings_cropped.png) -10. Click **Next**. In the **Review** screen, you will see a summary of the apps and settings you selected to apply. +11. Click **Next**. In the **Review** screen, you will see a summary of the apps and settings you selected to apply. - **Figure 7** - Review the group, apps, and settings you configured + **Figure 7** - Review the group, apps, and settings you configured - ![Review the group, apps, and settings you configured](images/i4e_expressconfiguration_review.png) + ![Review the group, apps, and settings you configured](images/i4e_expressconfiguration_review.png) -11. Click **Save** to end express configuration. -12. You will see the **You're done!** screen which lets you choose one of two options. +12. Click **Save** to end express configuration. +13. You will see the **You're done!** screen which lets you choose one of two options. - **Figure 8** - All done with Intune for Education express configuration + **Figure 8** - All done with Intune for Education express configuration - ![Done with Intune for Education express configuration](images/i4e_expressconfiguration_alldone.png) + ![Done with Intune for Education express configuration](images/i4e_expressconfiguration_alldone.png) -13. Click **All done** or click the **X** on the upper-right corner of the screen to dismiss this screen and go back to the dashboard. +14. Click **All done** or click the **X** on the upper-right corner of the screen to dismiss this screen and go back to the dashboard. ## Add apps bought from Microsoft Store for Education @@ -138,39 +138,39 @@ Intune for Education provides an **Express configuration** option so you can get 1. In the Intune for Education console, click **Apps** from the menu on the left. - **Figure 9** - Click on **Apps** to see the list of apps for your tenant + **Figure 9** - Click on **Apps** to see the list of apps for your tenant - ![Click Apps to see the list of apps for your tenant](images/i4e_dashboard_clickapps.png) + ![Click Apps to see the list of apps for your tenant](images/i4e_dashboard_clickapps.png) 2. In the **Store apps** section, click **+ New app**. This will take you to the Microsoft Store for Education portal and you will already be signed in. - **Figure 10** - Select the option to add a new Store app + **Figure 10** - Select the option to add a new Store app - ![Select the option to add a new Store app](images/i4e_apps_newstoreapp_selected.png) + ![Select the option to add a new Store app](images/i4e_apps_newstoreapp_selected.png) 3. In the Microsoft Store page, check some of the categories for suggested apps or search the Store for a free educational or reference app. Find ones that you haven't already installed during express setup for Intune for Education. - For example, these apps are free: - - Duolingo - Learn Languages for Free - - Flashcards Pro - - Khan Academy - - My Study Life + For example, these apps are free: + - Duolingo - Learn Languages for Free + - Flashcards Pro + - Khan Academy + - My Study Life 4. Find or select the app you want to install and click **Get the app**. 5. In the app's Store page, click the **...** button and select **Add to private store**. 6. Repeat steps 3-5 to install another app or move to the next step. 7. In the Microsoft Store for Education portal, select **Manage > Apps & software > Manage apps** to verify that the apps you purchased appear in your inventory. - For example, if you bought Duolingo and Khan Academy, they will show up in your inventory along with the apps that Microsoft automatically provisioned for your education tenant. + For example, if you bought Duolingo and Khan Academy, they will show up in your inventory along with the apps that Microsoft automatically provisioned for your education tenant. - **Figure 11** - Apps inventory in Microsoft Store for Education + **Figure 11** - Apps inventory in Microsoft Store for Education - ![Apps inventory in Store for Business](images/msfe_manageapps_inventory_grouped.png) + ![Apps inventory in Store for Business](images/msfe_manageapps_inventory_grouped.png) - In the **Private store** column of the **Apps & software** page, the status for some apps will indicate that it's "In private store" while others will say "Not in private store". We won't go over this in the walkthrough, but you can learn more about this in Distribute apps using your private store. + In the **Private store** column of the **Apps & software** page, the status for some apps will indicate that it's "In private store" while others will say "Not in private store". We won't go over this in the walkthrough, but you can learn more about this in Distribute apps using your private store. - > [!NOTE] - > You'll see in the above screenshot that some apps say that **Add is in progress**. Sync happens automatically, but it may take up to 24 hours for your organization's private store and 12 hours for Intune for Education to sync all your purchased apps. + > [!NOTE] + > You'll see in the above screenshot that some apps say that **Add is in progress**. Sync happens automatically, but it may take up to 24 hours for your organization's private store and 12 hours for Intune for Education to sync all your purchased apps. ## Install apps for all users @@ -178,34 +178,34 @@ Now that you've bought the apps, use Intune for Education to specify the group t 1. In the Intune for Education console, click the **Groups** option from the menu on the left. - **Figure 12** - Groups page in Intune for Education + **Figure 12** - Groups page in Intune for Education - ![Groups page in Intune for Education](images/i4e_groupspage.png) + ![Groups page in Intune for Education](images/i4e_groupspage.png) 2. In the **Groups** page, select **All Users** from the list of groups on the left, and then click **Users** in the taskbar at the top of the **All Users** page. - **Figure 13** - List of all users in the tenant + **Figure 13** - List of all users in the tenant - ![List of all users in the tenant](images/i4e_groups_allusers_users_steps.png) + ![List of all users in the tenant](images/i4e_groups_allusers_users_steps.png) 3. In the taskbar at the top, select **Apps** and then click **Edit apps** to see a list of available apps. - **Figure 14** - Edit apps to assign them to users + **Figure 14** - Edit apps to assign them to users - ![Edit apps to assign them to users](images/i4e_groups_allusers_appspage_editapps.png) + ![Edit apps to assign them to users](images/i4e_groups_allusers_appspage_editapps.png) 4. Select the apps to deploy to the group. A blue checkmark will appear next to the apps you select. - **Figure 15** - Select the apps to deploy to the group + **Figure 15** - Select the apps to deploy to the group - ![Select the apps to deploy to the group](images/i4e_groups_allusers_selectappstodeploy.png) + ![Select the apps to deploy to the group](images/i4e_groups_allusers_selectappstodeploy.png) 5. Once you're done, click **Save** at the bottom of the page to deploy the selected apps to the group. 6. You'll be notified that app assignments are being updated. The updated **All Users** groups page now include the apps you selected. - **Figure 16** - Updated list of assigned apps + **Figure 16** - Updated list of assigned apps - ![Updated list of assigned apps](images/i4e_groups_allusers_updatedappslist.png) + ![Updated list of assigned apps](images/i4e_groups_allusers_updatedappslist.png) You're now done assigning apps to all users in your tenant. It's time to set up your Windows 10 device(s) and check that your cloud infrastructure is correctly set up and your apps are being pushed to your devices from the cloud. @@ -215,8 +215,8 @@ You're now done assigning apps to all users in your tenant. It's time to set up --> > [!div class="step-by-step"] -[<< Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) -[Set up Windows 10 education devices >>](set-up-windows-10-education-devices.md) +> [<< Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) +> [Set up Windows 10 education devices >>](set-up-windows-10-education-devices.md) diff --git a/education/get-started/use-school-data-sync.md b/education/get-started/use-school-data-sync.md index 6498bdec28..c6192599ba 100644 --- a/education/get-started/use-school-data-sync.md +++ b/education/get-started/use-school-data-sync.md @@ -18,8 +18,8 @@ manager: dansimp # Use School Data Sync to import student data > [!div class="step-by-step"] -[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) -[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) +> [<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) +> [Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) School Data Sync (SDS) helps you import Student Information System (SIS) data into Office 365. It helps automate the process for importing and integrating SIS data that you can use with Office 365 and apps like OneNote Class Notebooks. @@ -36,34 +36,34 @@ You can watch the descriptive audio version here: [Microsoft Education: Use Scho 1. Go to the O365-EDU-Tools GitHub site. 2. Click the green **Clone or download** button to download the SDS sample files. - **Figure 1** - Download the SDS sample files from GitHub + **Figure 1** - Download the SDS sample files from GitHub - ![Download the SDS sample files from GitHub](images/sds_github_downloadsample.png) + ![Download the SDS sample files from GitHub](images/sds_github_downloadsample.png) 3. In the **Clone with HTTPS** pop-up window, choose **Download ZIP** and note the location where you're saving the folder. 4. Go to the folder where you saved the .zip and unzip the files. 5. Open the **O365-EDU-Tools-master** folder and then open the **CSV Samples** subfolder. Confirm that you can see the following sample CSV files. - **Figure 2** - Sample CSV files + **Figure 2** - Sample CSV files - ![Use the sample CSV files](images/sds_sample_csv_files_us_uk.png) + ![Use the sample CSV files](images/sds_sample_csv_files_us_uk.png) - > [!NOTE] - > - The sample CSV files uses sample accounts and passwords. If you are using the sample files for testing, remember the accounts and their corresponding passwords. You may be asked to change the password during your first sign in. - > - If you are modifying the sample CSV files to use in your organization, change the accounts and passwords to match the user accounts and passwords in your organization. - > - If you are using CSV files from your existing production environment, see the detailed instructions in step 5 in the next section. + > [!NOTE] + > - The sample CSV files uses sample accounts and passwords. If you are using the sample files for testing, remember the accounts and their corresponding passwords. You may be asked to change the password during your first sign in. + > - If you are modifying the sample CSV files to use in your organization, change the accounts and passwords to match the user accounts and passwords in your organization. + > - If you are using CSV files from your existing production environment, see the detailed instructions in step 5 in the next section. To learn more about the CSV files that are required and the info you need to include in each file, see CSV files for School Data Sync. If you run into any issues, see School Data Sync errors and troubleshooting. ## Use SDS to import student data 1. If you haven't done so already, go to the SDS portal, https://sds.microsoft.com. -2. Click Sign in. Then enter your O365 Global Admin account credentials. +2. Click Sign in. Then enter your O365 Global Admin account credentials. 3. After logging in, click **+ Add Profile** in the left hand navigation pane to create a Sync Profile.. This opens up the new profile setup wizard within the main page. - **Figure 3** - New SDS profile setup wizard + **Figure 3** - New SDS profile setup wizard - ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) + ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) 4. For the new profile, in the **How do you want to connect to your school?** screen: @@ -74,101 +74,101 @@ To learn more about the CSV files that are required and the info you need to inc 5. In the **Sync options** screen: - 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. - 2. In the **Import data** section, click **Upload Files** to bring up the **Select data files to be uploaded** window. - 3. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. - 4. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. - 5. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. + 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. + 2. In the **Import data** section, click **Upload Files** to bring up the **Select data files to be uploaded** window. + 3. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. + 4. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. + 5. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. - > [!NOTE] - > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. + > [!NOTE] + > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. - 6. After all the files are successfully uploaded, click **OK**. - 7. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. - 8. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. - 9. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. - 10. In the **Student enrollment option** section: - * If you want to sync your student roster data immediately, leave the box unchecked. - * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. - 11. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. - 12. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. - 13. Click **Next**. + 6. After all the files are successfully uploaded, click **OK**. + 7. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. + 8. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. + 9. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. + 10. In the **Student enrollment option** section: + * If you want to sync your student roster data immediately, leave the box unchecked. + * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. + 11. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. + 12. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. + 13. Click **Next**. - **Figure 4** - Sync options for the new profile + **Figure 4** - Sync options for the new profile - ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) + ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) 6. In the **Teacher options** screen: - 1. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. - * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. - * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. - * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. + 1. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. + * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. + * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. + * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. - 2. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + 2. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - 3. In the **License assignment** section, choose the SKU to assign licenses for teachers. + 3. In the **License assignment** section, choose the SKU to assign licenses for teachers. - 4. Click **Next**. + 4. Click **Next**. - **Figure 5** - Specify options for teacher mapping + **Figure 5** - Specify options for teacher mapping - ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) + ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) 7. In the **Student options** screen: - 1. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. - 2. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - 3. In the **License assignment** section, choose the SKU to assign licenses for students. - 4. Click **Next**. + 1. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. + 2. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + 3. In the **License assignment** section, choose the SKU to assign licenses for students. + 4. Click **Next**. - **Figure 6** - Specify options for student mapping + **Figure 6** - Specify options for student mapping - ![Specify options for student mapping](images/how-to-deploy-SDS-using-CSV-files-4.PNG) + ![Specify options for student mapping](images/how-to-deploy-SDS-using-CSV-files-4.PNG) 8. In the profile **Review** page, review the summary and confirm that the options selected are correct. 9. Click **Create profile**. You will see a notification that your profile is being submitted and then you will see a page for your profile. - **Figure 7** - SDS profile page + **Figure 7** - SDS profile page - ![SDS profile page](images/how-to-deploy-SDS-using-CSV-files-5.png) + ![SDS profile page](images/how-to-deploy-SDS-using-CSV-files-5.png) 10. After the profile is created and the status indicates as **Setting up**, refresh the page until you see the status change to **Sync in progress**. Beneath the **Sync in progress** status, you will see which of the 5 sync stages SDS is working on: - * Stage 1 - Validating data - * Stage 2 - Processing schools and sections - * Stage 3 - Processing students and teachers - * Stage 4 - Adding students and teachers into sections - * Stage 5 - Setting up security groups + * Stage 1 - Validating data + * Stage 2 - Processing schools and sections + * Stage 3 - Processing students and teachers + * Stage 4 - Adding students and teachers into sections + * Stage 5 - Setting up security groups - If you don't see a **Sync in progress** status on the sync profile, and receive an error message instead, this indicates that SDS has encountered data issues during the pre-sync validation check and has not started syncing your data. This gives you the opportunity to fix the errors identified by the pre-sync validation checks before continuing. Once you've fixed any errors or if you prefer to continue with the errors and begin syncing your data anyway, click the **Resume sync** button to start the sync process. + If you don't see a **Sync in progress** status on the sync profile, and receive an error message instead, this indicates that SDS has encountered data issues during the pre-sync validation check and has not started syncing your data. This gives you the opportunity to fix the errors identified by the pre-sync validation checks before continuing. Once you've fixed any errors or if you prefer to continue with the errors and begin syncing your data anyway, click the **Resume sync** button to start the sync process. - Once you've completed all five sync stages, your profile status will update one final time. + Once you've completed all five sync stages, your profile status will update one final time. * If you haven't encountered any errors, you will see a green check mark which states **Everything is ok**, and the profile status will change to **Sync complete. Ready for more data.** * If SDS encountered sync errors, you will see a red status icon that indicates an error, and a profile status of **Sync complete. Profile contains multiple errors**. Download the available error report to identify and fix your sync errors. Once complete, upload new files as needed and re-sync your data until errors are resolved. - Here are some examples of what the sync status can look like: + Here are some examples of what the sync status can look like: - **Figure 8** - New profile: Sync in progress + **Figure 8** - New profile: Sync in progress - ![Sync in progress for the new profile](images/sds_profile_status_syncinprogress_062317.png) + ![Sync in progress for the new profile](images/sds_profile_status_syncinprogress_062317.png) - **Figure 9** - New profile: Sync complete - no errors + **Figure 9** - New profile: Sync complete - no errors - ![New profile sync complete with no errors](images/sds_profile_status_everythingok_062317.png) + ![New profile sync complete with no errors](images/sds_profile_status_everythingok_062317.png) - **Figure 10** - New profile: Sync complete - with errors + **Figure 10** - New profile: Sync complete - with errors - ![New profile sync complete with errors](images/sds_profile_status_syncerrors_062317.png) + ![New profile sync complete with errors](images/sds_profile_status_syncerrors_062317.png) - Sync times, like file download times, can vary widely depending on when you start the sync, how much data you are syncing, the complexity of your data (such as the number of users, schools, and class enrollments), overall system/network load, and other factors. Two people who start a sync at the same time may not have their syncs complete at the same time. + Sync times, like file download times, can vary widely depending on when you start the sync, how much data you are syncing, the complexity of your data (such as the number of users, schools, and class enrollments), overall system/network load, and other factors. Two people who start a sync at the same time may not have their syncs complete at the same time. - You can refresh the page to confirm that your profile synced successfully. + You can refresh the page to confirm that your profile synced successfully. That's it for importing sample school data using SDS. > [!div class="step-by-step"] -[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) -[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) +> [<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) +> [Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) ## Related topic [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) diff --git a/education/trial-in-a-box/educator-tib-get-started.md b/education/trial-in-a-box/educator-tib-get-started.md index 9d5d36ec6e..b842f7b7e8 100644 --- a/education/trial-in-a-box/educator-tib-get-started.md +++ b/education/trial-in-a-box/educator-tib-get-started.md @@ -78,15 +78,15 @@ Learning Tools and the Immersive Reader can be used in the Microsoft Edge browse 4. Select the **Immersive Reader** button. - ![Word's Immersive Reader](images/word_online_immersive_reader.png) + ![Word Online's Immersive Reader](images/word_online_immersive_reader.png) 5. Press the **Play** button to hear text read aloud. 6. Select these various settings to see different ways to configure Immersive Reader for your students. - | Text to Speech | Text Preferences | Grammar Options | Line Focus | - | :------------: | :--------------: | :-------------: | :--------: | - | ![Word Text to Speech](images/wordonline_tts.png) | ![Word Text Preferences](images/wordonline_text_preferences.png) | ![Word Grammar Options](images/wordonline_grammar_options.png) | ![Word Line Focus](images/wordonline_line_focus.png) | + | Text to Speech | Text Preferences | Grammar Options | Line Focus | + | :------------: | :--------------: | :-------------: | :--------: | + | ![Word Online Text to Speech](images/wordonline_tts.png) | ![Word Online Text Preferences](images/wordonline_text_preferences.png) | ![Word Online Grammar Options](images/wordonline_grammar_options.png) | ![Word Online Line Focus](images/wordonline_line_focus.png) |

            @@ -133,18 +133,18 @@ When you're not using the pen, just use the magnet to stick it to the left side 2. Take the digital pen out of the box and make notes or draw. 3. Follow the instructions for the project. Look for the **Try this!** callouts to experiment with these engaging activities. - - Discover the power of digital ink by selecting the Draw tab. Choose your pen and get scribbling. + - Discover the power of digital ink by selecting the Draw tab. Choose your pen and get scribbling. - ![OneNote Draw tab](images/onenote_draw.png) + ![OneNote Draw tab](images/onenote_draw.png) - - Type anywhere on the page! Just click your cursor where you want to place text. - - Use the checkmark in the **Home** tab to keep track of completed tasks. + - Type anywhere on the page! Just click your cursor where you want to place text. + - Use the checkmark in the **Home** tab to keep track of completed tasks. - ![OneNote To Do Tag](images/onenote_checkmark.png) + ![OneNote To Do Tag](images/onenote_checkmark.png) - - To find information without leaving OneNote, use the Researcher tool found under the Insert tab. + - To find information without leaving OneNote, use the Researcher tool found under the Insert tab. - ![OneNote Researcher](images/onenote_researcher.png) + ![OneNote Researcher](images/onenote_researcher.png)

            @@ -170,7 +170,7 @@ Use video to create a project summary. 4. In the **Start** menu, search for **Photos** or select the Photos tile to launch the app. 5. Select the first video to preview it full screen. Select **Edit & Create**, then select **Create a video with text**. - 1. If you don't see the **Edit & Create** menu, select the video and the menu will appear at the top of the screen. + 1. If you don't see the **Edit & Create** menu, select the video and the menu will appear at the top of the screen. 6. Name your project “Laser Maze Project.” Hit Enter to continue. @@ -178,24 +178,24 @@ Use video to create a project summary. 8. Drag the videos to the Storyboard, one by one. Your project should look roughly like this: - ![Photos app layout showing videos added in previous steps](images/photo_app_1.png) + ![Photos app layout showing videos added in previous steps](images/photo_app_1.png) 9. Select the first card in the Storyboard (the video of the project materials) and select **Text**, type a title in, a text style, a layout, and select **Done**. 10. Select the third card in the Storyboard (the video of the children assembling the maze) and select **Trim**. Drag the trim handle on the left to shorten the duration of the clip and select **Done**. 11. Select the last card on the Storyboard and select **3D effects**. - 1. Position the playback indicator to be roughly 1 second into the video clip, or when the boy moves down to examine the laser. - 2. Find the **lightning bolt** effect and click or drag to add it to the scene. Rotate, scale, and position the effect so it looks like the lightning is coming out of the laser beam and hitting the black back of the mirror. - 3. Position the blue anchor over the end of the laser pointer in the video and toggle on **Attach to a point** for the lightning bolt effect to anchor the effect in the scene. - 4. Play back your effect. - 5. Select **Done** when you have it where you want it. + 1. Position the playback indicator to be roughly 1 second into the video clip, or when the boy moves down to examine the laser. + 2. Find the **lightning bolt** effect and click or drag to add it to the scene. Rotate, scale, and position the effect so it looks like the lightning is coming out of the laser beam and hitting the black back of the mirror. + 3. Position the blue anchor over the end of the laser pointer in the video and toggle on **Attach to a point** for the lightning bolt effect to anchor the effect in the scene. + 4. Play back your effect. + 5. Select **Done** when you have it where you want it. - ![Lighting bolt effect being added to a video clip](images/photo_app_2.png) + ![Lighting bolt effect being added to a video clip](images/photo_app_2.png) 12. Select **Music** and select a track from the **Recommended** music collection. - 1. The music will update automatically to match the length of your video project, even as you make changes. - 2. If you don’t see more than a few music options, confirm that you’re connected to Wi-Fi and then close and re-open Microsoft Photos (returning to your project via the **Albums** tab). Additional music files should download in the background. + 1. The music will update automatically to match the length of your video project, even as you make changes. + 2. If you don’t see more than a few music options, confirm that you’re connected to Wi-Fi and then close and re-open Microsoft Photos (returning to your project via the **Albums** tab). Additional music files should download in the background. 13. You can adjust the volume for the background music using the **Music volume** button. @@ -226,7 +226,7 @@ Today, we'll explore a Minecraft world through the eyes of a student. 3. Scroll down to the **Details** section and select **Download World**. - ![Select the download world link](images/mcee_downloadworld.png) + ![Select the download world link](images/mcee_downloadworld.png) 4. When prompted, save the world. @@ -239,28 +239,28 @@ Today, we'll explore a Minecraft world through the eyes of a student. 8. Click **Lesson Hub Vol 1** to enter the downloaded world. 9. Explore the world by using the keys on your keyboard. - * **W** moves forward. - * **A** moves left. - * **S** moves right. - * **D** moves backward. + * **W** moves forward. + * **A** moves left. + * **S** moves right. + * **D** moves backward. 10. Use your mouse as your "eyes". Just move it to look around. 11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land. - To try more advanced movements or building within Minecraft, use the Minecraft Controls Diagram. + To try more advanced movements or building within Minecraft, use the Minecraft Controls Diagram. - ![Minecraft mouse and keyboard controls](images/mcee_keyboard_mouse_controls.png) + ![Minecraft mouse and keyboard controls](images/mcee_keyboard_mouse_controls.png) 12. Access and adapt over 300 lesson plans, spanning all grades and subjects, to meet your needs. Enjoy exploring new worlds and happy crafting. - **Try this!** + **Try this!** - 1. Go to education.minecraft.net/. - 2. Click **Class Resources**. - 3. Click **Find a Lesson**. + 1. Go to education.minecraft.net/. + 2. Click **Class Resources**. + 3. Click **Find a Lesson**. - ![Access and adapt over 300 Minecraft lesson plans](images/minecraft_lesson_plans.png) + ![Access and adapt over 300 Minecraft lesson plans](images/minecraft_lesson_plans.png)

            @@ -275,15 +275,15 @@ The **Math Assistant** and **Ink Replay** features available in the OneNote app To get started: 1. Open the OneNote app for Windows 10 (not OneNote 2016). - ![OneNote icon](images/OneNote_logo.png) + ![OneNote icon](images/OneNote_logo.png) 2. In the top left corner, click on the **<** arrow to access your notebooks and pages. - ![OneNote back arrow navigation button](images/left_arrow.png) + ![OneNote back arrow navigation button](images/left_arrow.png) 3. Click **Add Page** to launch a blank work space. - ![Select add page button](images/plus-page.png) + ![Select add page button](images/plus-page.png) 4. Make sure your pen is paired to the device. To pair, see Connect to Bluetooth devices. @@ -292,30 +292,30 @@ To solve the equation 3x+4=7, follow these instructions: 2. If you wrote the equation using digital ink, use the **Lasso tool** to circle the equation. If you typed the equation, highlight it using your mouse. - ![Lasso button](images/lasso.png) + ![Lasso button](images/lasso.png) 3. On the **Draw** tab, click the **Math** button. - ![Math button](images/math-button.png) + ![Math button](images/math-button.png) 4. From the drop-down menu in the **Math** pane, select the option to **Solve for x**. You can now see the final solution of the equation. - ![Solve for x menu](images/solve-for-x.png) + ![Solve for x menu](images/solve-for-x.png) 5. From the second drop-down below, choose **Steps for Solving Linear Formula**, which shows you the step-by-step solution of this equation. 6. On the **View** tab, click the **Replay** button. Use your mouse to select the written equation and watch your text in replay. Replay is great for students to review how the teacher solved the equation and for teachers to review how students approached a problem. - ![Replay button](images/replay.png) + ![Replay button](images/replay.png) To graph the equation 3x+4=7, follow these instructions: 1. From the drop-down menu in the **Math** pane, select the option to **Graph Both Sides in 2D**. You can play with the interactive graph of your equation - use a single finger to move the graph position or two fingers to change the **zoom** level. - ![Graph both sides in 2D](images/graph-for-x.png) + ![Graph both sides in 2D](images/graph-for-x.png) 2. Click the **Insert on Page** button below the graph to add a screenshot of the graph to your page. -
            -
            +
            +
            **Watch what Educators say about Microsoft Education delivering better learning outcomes** Bring out the best in students by providing a platform for collaborating, exploring, personalized learning, and getting things done across all devices. diff --git a/education/trial-in-a-box/itadmin-tib-get-started.md b/education/trial-in-a-box/itadmin-tib-get-started.md index 3d8864eb0b..253c4ded12 100644 --- a/education/trial-in-a-box/itadmin-tib-get-started.md +++ b/education/trial-in-a-box/itadmin-tib-get-started.md @@ -32,7 +32,7 @@ manager: dansimp | | |
            -To get the most out of Microsoft Education, we've pre-configured your tenant for you so you don't need to set it up. A tenant is representative of an organization. It is a dedicated instance of the Azure AD service that an organization receives and owns when it signs up for a Microsoft cloud service such as Azure, Microsoft Intune, or Office 365. We've also pre-populated the tenant with fictitious Student Information System (SIS) data so you can work with this as you follow the guide. +To get the most out of Microsoft Education, we've pre-configured your tenant for you so you don't need to set it up. A tenant is representative of an organization. It is a dedicated instance of the Azure AD service that an organization receives and owns when it signs up for a Microsoft cloud service such as Azure, Microsoft Intune, or Office 365. We've also pre-populated the tenant with fictitious Student Information System (SIS) data so you can work with this as you follow the guide. If you run into any problems while following the steps in this guide, or you have questions about Trial in a Box or Microsoft Education, see [Microsoft Education Trial in a Box Support](support-options.md). @@ -97,26 +97,26 @@ If you've previously used Set up School PCs to provision student devices, you ca ![Configure student PC settings](images/suspc_configure_pcsettings_selected.png) - - **Remove apps pre-installed by the device manufacturer** - If you select this option, this will reset the machine and the provisioning process will take longer (about 30 minutes). - - **Allow local storage (not recommended for shared devices)** lets students save files to the **Desktop** and **Documents** folder on the student PC. - - **Optimize device for a single student, instead of a shared cart or lab** optimizes the device for use by a single student (1:1). - - Set up School PCs will change some account management logic so that it sets the expiration time for an account to 180 days (without requiring sign-in). - - This setting also increases the maximum storage to 100% of the available disk space. This prevents the student's account from being erased if the student stores a lot of files or data or if the student doesn't use the PC over a prolonged period. - - **Let guests sign-in to these PCs** allows guests to use student PCs without a school account. If you select this option, a **Guest** account button will be added in the PC's sign-in screen to allow anyone to use the PC. - - **Enable Windows 10 Autopilot Reset** enables IT admins to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment the student PC is returned to a fully configured or known approved state. For more info, see [Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset). - - **Lock screen background** shows the default backgroudn used for student PCs provisioned by Set up School PCs. Select **Browse** to change the default. + - **Remove apps pre-installed by the device manufacturer** - If you select this option, this will reset the machine and the provisioning process will take longer (about 30 minutes). + - **Allow local storage (not recommended for shared devices)** lets students save files to the **Desktop** and **Documents** folder on the student PC. + - **Optimize device for a single student, instead of a shared cart or lab** optimizes the device for use by a single student (1:1). + - Set up School PCs will change some account management logic so that it sets the expiration time for an account to 180 days (without requiring sign-in). + - This setting also increases the maximum storage to 100% of the available disk space. This prevents the student's account from being erased if the student stores a lot of files or data or if the student doesn't use the PC over a prolonged period. + - **Let guests sign-in to these PCs** allows guests to use student PCs without a school account. If you select this option, a **Guest** account button will be added in the PC's sign-in screen to allow anyone to use the PC. + - **Enable Windows 10 Autopilot Reset** enables IT admins to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment the student PC is returned to a fully configured or known approved state. For more info, see [Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset). + - **Lock screen background** shows the default backgroudn used for student PCs provisioned by Set up School PCs. Select **Browse** to change the default. 7. **Set up the Take a Test app** configures the device for taking quizzes and high-stakes assessments by some providers like Smarter Balanced. Windows will lock down the student PC so that students can't access anything else while taking the test. ![Configure the Take a Test app](images/suspc_takeatest.png) - 1. Specify if you want to create a Take a Test button on the students' sign-in screens. - 2. Select **Advanced settings** to allow keyboard text suggestions to appear and to allow teachers to monitor online tests. + 1. Specify if you want to create a Take a Test button on the students' sign-in screens. + 2. Select **Advanced settings** to allow keyboard text suggestions to appear and to allow teachers to monitor online tests. - > [!NOTE] - > The Take a Test app doesn't provide monitoring capabilities, but it allows tools like AssistX ClassPolicy to see what is going on in the app. + > [!NOTE] + > The Take a Test app doesn't provide monitoring capabilities, but it allows tools like AssistX ClassPolicy to see what is going on in the app. - 3. Enter the assessment URL. + 3. Enter the assessment URL. 8. **Add recommended apps** lets you choose from a set of recommended Microsoft Store apps to provision. diff --git a/education/trial-in-a-box/support-options.md b/education/trial-in-a-box/support-options.md index 20bbe1c2a3..80fd5383f3 100644 --- a/education/trial-in-a-box/support-options.md +++ b/education/trial-in-a-box/support-options.md @@ -35,10 +35,10 @@ For more information about checking for updates, and how to optionally turn on a 2. In the admin center dashboard, select your profile on the upper righthand corner and select **My account** from the options. 3. Select **Personal info** and then edit **Contact details** to update your phone, primary email address, and alternate email address. - > [!NOTE] - > For the alternate email address, make sure you use a different address from your Office 365 email address. + > [!NOTE] + > For the alternate email address, make sure you use a different address from your Office 365 email address. - ![Complete your contact details](images/o365_adminaccountinfo.png) + ![Complete your contact details](images/o365_adminaccountinfo.png) 4. Click **Save**. @@ -46,15 +46,15 @@ For more information about checking for updates, and how to optionally turn on a 1. Click the **Need help?** button in the lower right-hand corner of the Office 365 console. - ![Select Need help to get support](images/o365_needhelp.png) + ![Select Need help to get support](images/o365_needhelp.png) - You will see a sidebar window open up on the right-hand side of the screen. + You will see a sidebar window open up on the right-hand side of the screen. - ![Option to have a support representative call you](images/o365_needhelp_callingoption.png) + ![Option to have a support representative call you](images/o365_needhelp_callingoption.png) - If you chose to have a support representative call you, a new support ticket will be opened and you can track these in **Support tickets**. + If you chose to have a support representative call you, a new support ticket will be opened and you can track these in **Support tickets**. - ![Track your support tickets](images/o365_needhelp_supporttickets.png) + ![Track your support tickets](images/o365_needhelp_supporttickets.png) 2. Click the **question button** ![Question button](images/o365_needhelp_questionbutton.png) in the top navigation of the sidebar window. 3. In the field below **Need help?**, enter a description of your help request. @@ -69,7 +69,7 @@ Forget your password? Follow these steps to recover it. 1. Go to https://portal.office.com 2. Select **Can't access your account** and follow the prompts to get back into your account. - ![Recover your account](images/officeportal_cantaccessaccount.png) + ![Recover your account](images/officeportal_cantaccessaccount.png) diff --git a/education/windows/autopilot-reset.md b/education/windows/autopilot-reset.md index d190cfc2e9..92f671930d 100644 --- a/education/windows/autopilot-reset.md +++ b/education/windows/autopilot-reset.md @@ -51,12 +51,12 @@ You can set the policy using one of these methods: - Set up School PCs app Autopilot Reset in the Set up School PCs app is available in the latest release of the app. Make sure you are running Windows 10, version 1709 on the student PCs if you want to use Autopilot Reset through the Set up School PCs app. You can check the version several ways: - - Reach out to your device manufacturer. - - If you manage your PCs using Intune or Intune for Education, you can check the OS version by checking the **OS version** info for the device. If you are using another MDM provider, check the documentation for the MDM provider to confirm the OS version. - - Log into the PCs, go to the **Settings > System > About** page, look in the **Windows specifications** section and confirm **Version** is set to 1709. + - Reach out to your device manufacturer. + - If you manage your PCs using Intune or Intune for Education, you can check the OS version by checking the **OS version** info for the device. If you are using another MDM provider, check the documentation for the MDM provider to confirm the OS version. + - Log into the PCs, go to the **Settings > System > About** page, look in the **Windows specifications** section and confirm **Version** is set to 1709. To use the Autopilot Reset setting in the Set up School PCs app: - * When using [Set up School PCs](use-set-up-school-pcs-app.md), in the **Configure student PC settings** screen, select **Enable Windows 10 Autopilot Reset** among the list of settings for the student PC as shown in the following example: + - When using [Set up School PCs](use-set-up-school-pcs-app.md), in the **Configure student PC settings** screen, select **Enable Windows 10 Autopilot Reset** among the list of settings for the student PC as shown in the following example: ![Configure student PC settings in Set up School PCs](images/suspc_configure_pc2.jpg) @@ -70,10 +70,10 @@ Autopilot Reset is a two-step process: trigger it and then authenticate. Once yo ![Enter CTRL+Windows key+R on the Windows lockscreen](images/autopilot-reset-lockscreen.png) This will open up a custom login screen for Autopilot Reset. The screen serves two purposes: - 1. Confirm/verify that the end user has the right to trigger Autopilot Reset - 2. Notify the user in case a provisioning package, created using Windows Configuration Designer or Set up School PCs, will be used as part of the process. + 1. Confirm/verify that the end user has the right to trigger Autopilot Reset + 2. Notify the user in case a provisioning package, created using Windows Configuration Designer or Set up School PCs, will be used as part of the process. - ![Custom login screen for Autopilot Reset](images/autopilot-reset-customlogin.png) + ![Custom login screen for Autopilot Reset](images/autopilot-reset-customlogin.png) 2. Sign in with the admin account credentials. If you created a provisioning package, plug in the USB drive and trigger Autopilot Reset. diff --git a/education/windows/change-to-pro-education.md b/education/windows/change-to-pro-education.md index 3a091a05ba..da30be64ef 100644 --- a/education/windows/change-to-pro-education.md +++ b/education/windows/change-to-pro-education.md @@ -101,8 +101,8 @@ When you change to Windows 10 Pro Education, you get the following benefits: - **Windows 10 Pro Education edition**. Devices currently running Windows 10 Pro, version 1607 or higher, or Windows 10 S mode, version 1703, can get Windows 10 Pro Education Current Branch (CB). This benefit does not include Long Term Service Branch (LTSB). - **Support from one to hundreds of users**. The Windows 10 Pro Education program does not have a limitation on the number of licenses an organization can have. - **Roll back options to Windows 10 Pro** - - When a user leaves the domain or you turn off the setting to automatically change to Windows 10 Pro Education, the device reverts seamlessly to Windows 10 Pro edition (after a grace period of up to 30 days). - - For devices that originally had Windows 10 Pro edition installed, when a license expires or is transferred to another user, the Windows 10 Pro Education device seamlessly steps back down to Windows 10 Pro. + - When a user leaves the domain or you turn off the setting to automatically change to Windows 10 Pro Education, the device reverts seamlessly to Windows 10 Pro edition (after a grace period of up to 30 days). + - For devices that originally had Windows 10 Pro edition installed, when a license expires or is transferred to another user, the Windows 10 Pro Education device seamlessly steps back down to Windows 10 Pro. See [Roll back Windows 10 Pro Education to Windows 10 Pro](#roll-back-windows-10-pro-education-to-windows-10-pro) for more info. @@ -114,7 +114,7 @@ Once you enable the setting to change to Windows 10 Pro Education, the change wi 1. Sign in to [Microsoft Store for Education](https://educationstore.microsoft.com/) with your work or school account. - If this is the first time you're signing into the Microsoft Store for Education, you'll be prompted to accept the Microsoft Store for Education Terms of Use. + If this is the first time you're signing into the Microsoft Store for Education, you'll be prompted to accept the Microsoft Store for Education Terms of Use. 2. Click **Manage** from the top menu and then select the **Benefits tile**. 3. In the **Benefits** tile, look for the **Change to Windows 10 Pro Education for free** link and then click it. diff --git a/education/windows/chromebook-migration-guide.md b/education/windows/chromebook-migration-guide.md index a155dc3bdb..9769d7a3bf 100644 --- a/education/windows/chromebook-migration-guide.md +++ b/education/windows/chromebook-migration-guide.md @@ -43,7 +43,7 @@ Before you can do any analysis or make decisions about which apps to migrate or > [!NOTE] > The majority of Chromebook apps are web apps. For these apps you need to first perform Microsoft Edge compatibility testing and then publish the web app URL to the Windows users. For more information, see the [Perform app compatibility testing for web apps](#perform-testing-webapps) section. -  + You can divide the apps into the following categories: @@ -83,7 +83,7 @@ Table 1. Google App replacements | Chrome | Microsoft Edge | | Google Drive | Microsoft OneDrive for Business | -  + It may be that you will decide to replace Google Apps after you deploy Windows devices. For more information on making this decision, see the [Select cloud services migration strategy](#select-cs-migrationstrat) section of this guide. @@ -164,7 +164,7 @@ Table 2. Settings in the Device Management node in the Google Admin Console

            These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:

            • User settings. Configures user-based settings for the Chrome browser and Chromebook devices. Most of these Chromebook user-based settings can be mapped to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.

            • -
            • Public session settings. Configures Public Sessions for Chrome devices that are used as kiosks, loaner devices, shared computers, or for any other work or school-related purpose for which users don't need to sign in with their credentials. You can configure Windows devices similarly by using Assigned Access. Record the settings and apps that are available in Public Sessions so that you can provide similar configuration in Assigned Access.

            • +
            • Public session settings. Configures Public Sessions for Chrome devices that are used as kiosks, loaner devices, shared computers, or for any other work or school-related purpose for which users don't need to sign in with their credentials. You can configure Windows devices similarly by using Assigned Access. Record the settings and apps that are available in Public Sessions so that you can provide similar configuration in Assigned Access.

            • Device settings. Configures device-based settings for the Chrome browser and Chromebook devices. You can map most of these Chromebook device-based settings to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.

            • Devices. Manages Chrome device management licenses. The number of licenses recorded here should correspond to the number of licenses you will need for your new management system, such as Intune. Record the number of licenses and use those to determine how many licenses you will need to manage your Windows devices.

            • App Management. Provides configuration settings for Chrome apps. Record the settings for any apps that you have identified that will run on Windows devices.

            • @@ -173,7 +173,7 @@ Table 2. Settings in the Device Management node in the Google Admin Console -  + Table 3 lists the settings in the Security node in the Google Admin Console. Review the settings and determine which settings you will migrate to Windows. @@ -215,7 +215,7 @@ Table 3. Settings in the Security node in the Google Admin Console -  + **Identify locally-configured settings to migrate** @@ -248,7 +248,7 @@ Table 4. Locally-configured settings | Powerwash | This action removes all user accounts and resets the Chromebook device back to factory settings. You don’t have to migrate any settings in this section. | | Reset settings | This action retains all user accounts, but restores all settings back to their default values. You don’t have to migrate any settings in this section. | -  + Determine how many users have similar settings and then consider managing those settings centrally. For example, a large number of users may have many of the same Chrome web browser settings. You can centrally manage these settings in Windows after migration. @@ -483,7 +483,7 @@ Table 5. Select on-premises AD DS, Azure AD, or hybrid -  + ### @@ -603,7 +603,7 @@ Table 6. Device, user, and app management products and technologies -  + You can use Configuration Manager and Intune in conjunction with each other to provide features from both products and technologies. In some instances you may need only one of these products or technologies. In other instances, you may need two or more to meet the device, user, and app management needs for your institution. @@ -680,21 +680,21 @@ Table 7. Network infrastructure products and technologies and deployment resourc DHCP DNS -  + If you use network infrastructure products and technologies from other vendors, refer to the vendor documentation on how to perform the necessary remediation. If you determined that no remediation is necessary, you can skip this section. @@ -722,22 +722,22 @@ Table 8. AD DS, Azure AD and deployment resources AD DS Azure AD -  + If you decided not to migrate to AD DS or Azure AD as a part of the migration, or if you determined that no remediation is necessary, you can skip this section. If you use identity products and technologies from another vendor, refer to the vendor documentation on how to perform the necessary steps. @@ -765,44 +765,44 @@ Table 9. Management systems and deployment resources Windows provisioning packages Group Policy Configuration Manager Intune MDT -  + If you determined that no new management system or no remediation of existing systems is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps. @@ -830,29 +830,29 @@ Table 10. Management systems and app deployment resources Group Policy Configuration Manager Intune -  + If you determined that no deployment of apps is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps. @@ -958,9 +958,9 @@ After you complete these steps, your management system should take over the day- [Try it out: Windows 10 in the classroom](https://go.microsoft.com/fwlink/p/?LinkId=623255) -  + -  + diff --git a/education/windows/configure-windows-for-education.md b/education/windows/configure-windows-for-education.md index dd40da27e0..1cb747217a 100644 --- a/education/windows/configure-windows-for-education.md +++ b/education/windows/configure-windows-for-education.md @@ -48,16 +48,16 @@ It is easy to be education ready when using Microsoft products. We recommend the You can [sign up to learn more about Intune for Education](https://info.microsoft.com/US-WNDWS-CNTNT-FY17-01Jan-17-IntuneforEducationlandingpageandnurture292531_01Registration-ForminBody.html). 3. On PCs running Windows 10, version 1703: - 1. Provision the PC using one of these methods: - * [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - This will automatically set both **SetEduPolicies** to True and **AllowCortana** to False. - * [Provision PCs with a custom package created with Windows Configuration Designer](https://technet.microsoft.com/itpro/windows/configure/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False. - 2. Join the PC to Azure Active Directory. - * Use Set up School PCs or Windows Configuration Designer to bulk enroll to Azure AD. - * Manually Azure AD join the PC during the Windows device setup experience. - 3. Enroll the PCs in MDM. - * If you have activated Intune for Education in your Azure AD tenant, enrollment will happen automatically when the PC is joined to Azure AD. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False. - 4. Ensure that needed assistive technology apps can be used. - * If you have students or school personnel who rely on assistive technology apps that are not available in the Microsoft Store for Education, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) for more info. + 1. Provision the PC using one of these methods: + * [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - This will automatically set both **SetEduPolicies** to True and **AllowCortana** to False. + * [Provision PCs with a custom package created with Windows Configuration Designer](https://technet.microsoft.com/itpro/windows/configure/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False. + 2. Join the PC to Azure Active Directory. + * Use Set up School PCs or Windows Configuration Designer to bulk enroll to Azure AD. + * Manually Azure AD join the PC during the Windows device setup experience. + 3. Enroll the PCs in MDM. + * If you have activated Intune for Education in your Azure AD tenant, enrollment will happen automatically when the PC is joined to Azure AD. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False. + 4. Ensure that needed assistive technology apps can be used. + * If you have students or school personnel who rely on assistive technology apps that are not available in the Microsoft Store for Education, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) for more info. 4. Distribute the PCs to students. @@ -87,14 +87,14 @@ Use one of these methods to set this policy. ### MDM - Intune for Education automatically sets this policy in the **All devices** group policy configuration. - If you're using an MDM provider other than Intune for Education, check your MDM provider documentation on how to set this policy. - - If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set. + - If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set. - For example, in Intune, create a new configuration policy and add an OMA-URI. - - OMA-URI: ./Vendor/MSFT/Policy/Config/Experience/AllowCortana - - Data type: Integer - - Value: 0 + For example, in Intune, create a new configuration policy and add an OMA-URI. + - OMA-URI: ./Vendor/MSFT/Policy/Config/Experience/AllowCortana + - Data type: Integer + - Value: 0 - ![Create an OMA URI for AllowCortana](images/allowcortana_omauri.png) + ![Create an OMA URI for AllowCortana](images/allowcortana_omauri.png) ### Group Policy Set **Computer Configuration > Administrative Templates > Windows Components > Search > AllowCortana** to **Disabled**. @@ -116,14 +116,14 @@ Use one of these methods to set this policy. ### MDM - Intune for Education automatically sets this policy in the **All devices** group policy configuration. - If you're using an MDM provider other than Intune for Education, check your MDM provider documentation on how to set this policy. - - If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set. + - If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set. - For example, in Intune, create a new configuration policy and add an OMA-URI. - - OMA-URI: ./Vendor/MSFT/SharedPC/SetEduPolicies - - Data type: Boolean - - Value: true + For example, in Intune, create a new configuration policy and add an OMA-URI. + - OMA-URI: ./Vendor/MSFT/SharedPC/SetEduPolicies + - Data type: Boolean + - Value: true - ![Create an OMA URI for SetEduPolices](images/setedupolicies_omauri.png) + ![Create an OMA URI for SetEduPolices](images/setedupolicies_omauri.png) ### Group Policy **SetEduPolicies** is not natively supported in Group Policy. Instead, use the [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/desktop/dn905224(v=vs.85).aspx) to set the policy in [MDM SharedPC](https://msdn.microsoft.com/library/windows/desktop/mt779129(v=vs.85).aspx). diff --git a/education/windows/deploy-windows-10-in-a-school-district.md b/education/windows/deploy-windows-10-in-a-school-district.md index 9807b6583b..4b3c170a20 100644 --- a/education/windows/deploy-windows-10-in-a-school-district.md +++ b/education/windows/deploy-windows-10-in-a-school-district.md @@ -596,8 +596,8 @@ To create a new Office 365 Education subscription for use in the classroom, use #### To create a new Office 365 subscription 1. In Microsoft Edge or Internet Explorer, type `https://portal.office.com/start?sku=faculty` in the address bar. - >**Note**  If you have already used your current sign-in account to create a new Office 365 subscription, you will be prompted to sign in. If you want to create a new Office 365 subscription, start an In-Private Window by using one of the following methods: -
              • In Microsoft Edge, open the Microsoft Edge app (press Ctrl+Shift+P, or click or tap **More actions**), and then click or tap **New InPrivate window**.
              • In Internet Explorer 11, open Internet Explorer 11 (press Ctrl+Shift+P, or click or tap **Settings**), click or tap **Safety**, and then click or tap **InPrivate Browsing**.
              + > **Note**  If you have already used your current sign-in account to create a new Office 365 subscription, you will be prompted to sign in. If you want to create a new Office 365 subscription, start an In-Private Window by using one of the following methods: + >
              • In Microsoft Edge, open the Microsoft Edge app (press Ctrl+Shift+P, or click or tap More actions), and then click or tap New InPrivate window.
              • In Internet Explorer 11, open Internet Explorer 11 (press Ctrl+Shift+P, or click or tap Settings), click or tap Safety, and then click or tap InPrivate Browsing.
              2. On the **Get started** page, in **Enter your school email address**, type your school email address, and then click **Sign up**. @@ -1102,30 +1102,30 @@ The first step in preparing for Windows 10 deployment is to configure—that is, 1. Import operating systems -Import the operating systems that you selected in the [Select the operating systems](#select-the-operating-systems) section into the deployment share. For more information about how to import operating systems, see [Import an Operating System into the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#ImportanOperatingSystemintotheDeploymentWorkbench). +Import the operating systems that you selected in the Select the operating systems section into the deployment share. For more information about how to import operating systems, see Import an Operating System into the Deployment Workbench. 2. Import device drivers Device drivers allow Windows 10 to know a device’s hardware resources and connected hardware accessories. Without the proper device drivers, certain features may be unavailable. For example, without the proper audio driver, a device cannot play sounds; without the proper camera driver, the device cannot take photos or use video chat.

              -Import device drivers for each device in your institution. For more information about how to import device drivers, see [Import Device Drivers into the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#ImportDeviceDriversintotheDeploymentWorkbench). +Import device drivers for each device in your institution. For more information about how to import device drivers, see Import Device Drivers into the Deployment Workbench. 3. Create MDT applications for Microsoft Store apps -Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using sideloading, which allows you to use the **Add-AppxPackage** Windows PowerShell cmdlet to deploy the .appx files associated with the app (called *provisioned apps*). Use this method to deploy up to 24 apps to Windows 10.

              +Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using sideloading, which allows you to use the Add-AppxPackage Windows PowerShell cmdlet to deploy the .appx files associated with the app (called provisioned apps). Use this method to deploy up to 24 apps to Windows 10.

              Prior to sideloading the .appx files, obtain the Microsoft Store .appx files that you will use to deploy (sideload) the apps in your provisioning package. For apps in Microsoft Store, you will need to obtain the .appx files by performing one of the following tasks:

              • For offline-licensed apps, download the .appx files from the Microsoft Store for Business.
              • For apps that are not offline licensed, obtain the .appx files from the app software vendor directly.

              If you are unable to obtain the .appx files from the app software vendor, then you or the students will need to install the apps on the student devices directly from Microsoft Store or Microsoft Store for Business.

              -If you have Intune or System Center Configuration Manager, you can deploy Microsoft Store apps after you deploy Windows 10, as described in the [Deploy and manage apps by using Intune](#deploy-and-manage-apps-by-using-intune) and [Deploy and manage apps by using System Center Configuration Manager](#deploy-and-manage-apps-by-using-system-center-configuration-manager) sections. This method provides granular deployment of Microsoft Store apps, and you can use it for ongoing management of Microsoft Store apps. This is the preferred method of deploying and managing Microsoft Store apps.

              +If you have Intune or System Center Configuration Manager, you can deploy Microsoft Store apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune and Deploy and manage apps by using System Center Configuration Manager sections. This method provides granular deployment of Microsoft Store apps, and you can use it for ongoing management of Microsoft Store apps. This is the preferred method of deploying and managing Microsoft Store apps.

              In addition, you must prepare your environment for sideloading Microsoft Store apps. For more information about how to:

                -
              • Prepare your environment for sideloading, see [Try it out: sideload Microsoft Store apps](https://technet.microsoft.com/windows/jj874388.aspx).
              • -
              • Create an MDT application, see [Create a New Application in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#CreateaNewApplicationintheDeploymentWorkbench).
              • +
              • Prepare your environment for sideloading, see Try it out: sideload Microsoft Store apps.
              • +
              • Create an MDT application, see Create a New Application in the Deployment Workbench.
              @@ -1134,10 +1134,10 @@ In addition, you must prepare your environment for sideloading Microsoft Store a 4. Create MDT applications for Windows desktop apps You need to create an MDT application for each Windows desktop app you want to deploy. You can obtain the Windows desktop apps from any source, but ensure that you have sufficient licenses for them.

              -To help reduce the effort needed to deploy Microsoft Office 2016 desktop apps, use the Office Deployment Tool, as described in [Deploy Click-to-Run for Office 365 products by using the Office Deployment Tool](https://technet.microsoft.com/library/jj219423.aspx).

              -If you have Intune, you can deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy and manage apps by using Intune](#deploy-and-manage-apps-by-using-intune) section. This method provides granular deployment of Windows desktop apps, and you can use it for ongoing management of the apps. This is the preferred method for deploying and managing Windows desktop apps. +To help reduce the effort needed to deploy Microsoft Office 2016 desktop apps, use the Office Deployment Tool, as described in Deploy Click-to-Run for Office 365 products by using the Office Deployment Tool.

              +If you have Intune, you can deploy Windows desktop apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune section. This method provides granular deployment of Windows desktop apps, and you can use it for ongoing management of the apps. This is the preferred method for deploying and managing Windows desktop apps.

              -**Note**  You can also deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy and manage apps by using Intune](#deploy-and-manage-apps-by-using-intune) section. +Note  You can also deploy Windows desktop apps after you deploy Windows 10, as described in the Deploy and manage apps by using Intune section. For more information about how to create an MDT application for Window desktop apps, see [Create a New Application in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx). @@ -1153,7 +1153,7 @@ For more information about how to create an MDT application for Window desktop a
            • Upgrade existing devices to 64-bit Windows 10 Education.
            • Upgrade existing devices to 32-bit Windows 10 Education.
            -
            Again, you will create the task sequences based on the operating systems that you imported in step 1. For more information about how to create a task sequence, see [Create a New Task Sequence in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#CreateaNewTaskSequenceintheDeploymentWorkbench). +
            Again, you will create the task sequences based on the operating systems that you imported in step 1. For more information about how to create a task sequence, see Create a New Task Sequence in the Deployment Workbench. @@ -1161,7 +1161,7 @@ For more information about how to create an MDT application for Window desktop a 6. Update the deployment share Updating a deployment share generates the MDT boot images you use to initiate the Windows 10 deployment process. You can configure the process to create 32-bit and 64-bit versions of the .iso and .wim files you can use to create bootable media or in Windows Deployment Services.

            -For more information about how to update a deployment share, see [Update a Deployment Share in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#UpdateaDeploymentShareintheDeploymentWorkbench). +For more information about how to update a deployment share, see Update a Deployment Share in the Deployment Workbench. @@ -1338,7 +1338,7 @@ For more information about how to create a task sequence in the: * Deployment Workbench for a deployment share, see [Create a New Task Sequence in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#CreateaNewTaskSequenceintheDeploymentWorkbench). * Configuration Manager console, see [Create a task sequence to install an operating system in System Center Configuration Manager](https://technet.microsoft.com/library/mt627927.aspx). -####Summary +#### Summary In this section, you customized the MDT deployment share to deploy Windows 10 and desktop apps to one or more reference devices by creating and customizing MDT applications, device drivers, and applications. Next, you ran the task sequence, which deploys Windows 10, deploys your apps, deploys the appropriate device drivers, and captures an image of the reference device. Then, you imported the captured reference image into a deployment share or System Center Configuration Manager. Finally, you created a task sequence to deploy your captured reference image to faculty and student devices. At this point in the process, you’re ready to deploy Windows 10 and your apps to your devices. ## Prepare for device management @@ -1384,8 +1384,8 @@ Use the information in Table 17 to help you determine whether you need to config Restrict the local administrator accounts on the devices Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices.

            -**Group Policy.** Create a **Local Group** Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item.

            -**Intune.** Not available. +Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item.

            +Intune. Not available. @@ -1393,8 +1393,8 @@ Use the information in Table 17 to help you determine whether you need to config Manage the built-in administrator account created during device deployment When you use MDT to deploy Windows 10, the MDT deployment process automatically creates a local Administrator account with the password you specified. As a security best practice, rename the built-in Administrator account and (optionally) disable it.

            -**Group Policy.** To rename the built-in Administrator account, use the **Accounts: Rename administrator account** Group Policy setting. For more information about how to rename the built-in Administrator account, see [To rename the Administrator account using the Group Policy Management Console](https://technet.microsoft.com/library/cc747484.aspx). You specify the new name for the Administrator account. To disable the built-in Administrator account, use the **Accounts: Administrator account status** Group Policy setting. For more information about how to disable the built-in Administrator account, see [Accounts: Administrator account status](https://technet.microsoft.com/library/jj852165.aspx).

            -**Intune.** Not available. +Group Policy. To rename the built-in Administrator account, use the Accounts: Rename administrator account Group Policy setting. For more information about how to rename the built-in Administrator account, see To rename the Administrator account using the Group Policy Management Console. You specify the new name for the Administrator account. To disable the built-in Administrator account, use the Accounts: Administrator account status Group Policy setting. For more information about how to disable the built-in Administrator account, see Accounts: Administrator account status.

            +Intune. Not available. @@ -1402,8 +1402,8 @@ Use the information in Table 17 to help you determine whether you need to config Control Microsoft Store access You can control access to Microsoft Store and whether existing Microsoft Store apps receive updates. You can only disable the Microsoft Store app in Windows 10 Education and Windows 10 Enterprise.

            -**Group Policy.** To disable the Microsoft Store app, use the **Turn off the Store Application** group policy setting. To prevent Microsoft Store apps from receiving updates, use the **Turn off Automatic Download and Install of updates** Group Policy setting. For more information about configuring these settings, see [Can I use Group Policy to control the Microsoft Store in my enterprise environment?](https://technet.microsoft.com/library/hh832040.aspx#BKMK_UseGP).

            -**Intune.** To enable or disable Microsoft Store access, use the **Allow application store** policy setting in the **Apps** section of a **Windows 10 General Configuration policy**. +Group Policy. To disable the Microsoft Store app, use the Turn off the Store Application group policy setting. To prevent Microsoft Store apps from receiving updates, use the Turn off Automatic Download and Install of updates Group Policy setting. For more information about configuring these settings, see Can I use Group Policy to control the Microsoft Store in my enterprise environment?.

            +Intune. To enable or disable Microsoft Store access, use the Allow application store policy setting in the Apps section of a Windows 10 General Configuration policy. @@ -1411,8 +1411,8 @@ Use the information in Table 17 to help you determine whether you need to config Use of Remote Desktop connections to devices Remote Desktop connections could allow unauthorized access to the device. Depending on your institution’s policies, you may want to disable Remote Desktop connections on your devices.

            -**Group Policy.** To enable or disable Remote Desktop connections to devices, use the **Allow Users to connect remotely using Remote Desktop** setting in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections.

            -**Intune.** Not available. +Group Policy. To enable or disable Remote Desktop connections to devices, use the Allow Users to connect remotely using Remote Desktop setting in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections.

            +Intune. Not available. @@ -1421,8 +1421,8 @@ Use the information in Table 17 to help you determine whether you need to config Use of camera A device’s camera can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the camera on your devices.

            -**Group Policy.** Not available.

            -**Intune.** To enable or disable the camera, use the **Allow camera** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. +Group Policy. Not available.

            +Intune. To enable or disable the camera, use the Allow camera policy setting in the Hardware section of a Windows 10 General Configuration policy. @@ -1430,8 +1430,8 @@ Use the information in Table 17 to help you determine whether you need to config Use of audio recording Audio recording (by using the Sound Recorder app) can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the Sound Recorder app on your devices.

            -**Group Policy.** To disable the Sound Recorder app, use the **Do not allow Sound Recorder to run** Group Policy setting. You can disable other audio recording apps by using AppLocker policies. To create AppLocker policies, use the information in [Editing an AppLocker Policy](https://technet.microsoft.com/library/ee791894.aspx) and [Create Your AppLocker Policies](https://technet.microsoft.com/library/ee791899.aspx).

            -**Intune.** To enable or disable audio recording, use the **Allow voice recording** policy setting in the **Features** section of a **Windows 10 General Configuration** policy. +Group Policy. To disable the Sound Recorder app, use the Do not allow Sound Recorder to run Group Policy setting. You can disable other audio recording apps by using AppLocker policies. To create AppLocker policies, use the information in Editing an AppLocker Policy and Create Your AppLocker Policies.

            +Intune. To enable or disable audio recording, use the Allow voice recording policy setting in the Features section of a Windows 10 General Configuration policy. @@ -1439,8 +1439,8 @@ Use the information in Table 17 to help you determine whether you need to config Use of screen capture Screen captures can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the ability to perform screen captures on your devices.

            -**Group Policy.** Not available.

            -**Intune.** To enable or disable screen capture, use the **Allow screen capture** policy setting in the **System** section of a **Windows 10 General Configuration** policy. +Group Policy. Not available.

            +Intune. To enable or disable screen capture, use the Allow screen capture policy setting in the System section of a Windows 10 General Configuration policy. @@ -1448,8 +1448,8 @@ Use the information in Table 17 to help you determine whether you need to config Use of location services Providing a device’s location can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the location service on your devices.

            -**Group Policy.** To enable or disable location services, use the **Turn off location** group policy setting in User Configuration\Windows Components\Location and Sensors.

            -**Intune.** To enable or disable location services, use the **Allow geolocation** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. +Group Policy. To enable or disable location services, use the Turn off location group policy setting in User Configuration\Windows Components\Location and Sensors.

            +Intune. To enable or disable location services, use the Allow geolocation policy setting in the Hardware section of a Windows 10 General Configuration policy. @@ -1457,8 +1457,8 @@ Use the information in Table 17 to help you determine whether you need to config Changing wallpaper Custom wallpapers can be a source of disclosure or privacy issues in an education environment (if the wallpaper displays information about the user or device). Depending on your institution’s policies, you may want to prevent users from changing the wallpaper on institution-owned devices.

            -**Group Policy.** To configure the wallpaper, use the **Desktop WallPaper** setting in User Configuration\Administrative Templates\Desktop\Desktop.

            -**Intune.** Not available. +Group Policy. To configure the wallpaper, use the Desktop WallPaper setting in User Configuration\Administrative Templates\Desktop\Desktop.

            +Intune. Not available. @@ -1466,7 +1466,7 @@ Use the information in Table 17 to help you determine whether you need to config
            -*Table 17. Recommended settings for educational institutions* +Table 17. Recommended settings for educational institutions ### Configure settings by using Group Policy @@ -1659,10 +1659,10 @@ Table 19 lists the school and individual classroom maintenance tasks, the resour Verify that Windows Update is active and current with operating system and software updates.

            For more information about completing this task when you have:
              -
            • Intune, see [Keep Windows PCs up to date with software updates in Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/keep-windows-pcs-up-to-date-with-software-updates-in-microsoft-intune).
            • -
            • Group Policy, see [Windows Update for Business](https://technet.microsoft.com/itpro/windows/plan/windows-update-for-business).
            • -
            • WSUS, see [Windows Server Update Services](https://msdn.microsoft.com/library/bb332157.aspx).
            • -
            • Neither Intune, Group Policy, nor WSUS, see “Install, upgrade, & activate” in [Windows 10 help](https://support.microsoft.com/products/windows?os=windows-10).
            • +
            • Intune, see Keep Windows PCs up to date with software updates in Microsoft Intune.
            • +
            • Group Policy, see Windows Update for Business.
            • +
            • WSUS, see Windows Server Update Services.
            • +
            • Neither Intune, Group Policy, nor WSUS, see “Install, upgrade, & activate” in Windows 10 help.
            x @@ -1672,7 +1672,7 @@ For more information about completing this task when you have: Verify that Windows Defender is active and current with malware Security intelligence.

            -For more information about completing this task, see [Turn Windows Defender on or off](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab02) and [Updating Windows Defender](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab03). +For more information about completing this task, see Turn Windows Defender on or off and Updating Windows Defender. x x @@ -1681,7 +1681,7 @@ For more information about completing this task, see [Turn Windows Defender on o Verify that Windows Defender has run a scan in the past week and that no viruses or malware were found.

            -For more information about completing this task, see the “How do I find and remove a virus?” topic in [Protect my PC from viruses](https://support.microsoft.com/help/17228/windows-protect-my-pc-from-viruses). +For more information about completing this task, see the “How do I find and remove a virus?” topic in Protect my PC from viruses. x x @@ -1692,8 +1692,8 @@ For more information about completing this task, see the “How do I find and re Download and approve updates for Windows 10, apps, device driver, and other software.

            For more information, see: x @@ -1703,7 +1703,7 @@ For more information, see: Verify that you’re using the appropriate Windows 10 servicing options for updates and upgrades (such as selecting whether you want to use Current Branch or Current Branch for Business).

            -For more information about Windows 10 servicing options for updates and upgrades, see [Windows 10 servicing options](https://technet.microsoft.com/itpro/windows/manage/introduction-to-windows-10-servicing). +For more information about Windows 10 servicing options for updates and upgrades, see Windows 10 servicing options. x @@ -1714,9 +1714,9 @@ For more information about Windows 10 servicing options for updates and upgrades Refresh the operating system and apps on devices.

            For more information about completing this task, see the following resources: @@ -1728,8 +1728,8 @@ For more information about completing this task, see the following resources: Install any new Windows desktop apps, or update any Windows desktop apps used in the curriculum.

            For more information, see: @@ -1742,8 +1742,8 @@ For more information, see: Microsoft Store apps are automatically updated from Microsoft Store. The menu bar in the Microsoft Store app shows whether any Microsoft Store app updates are available for download.

            You can also deploy Microsoft Store apps directly to devices by using Intune, System Center Configuration Manager, or both in a hybrid configuration. For more information, see: @@ -1755,8 +1755,8 @@ You can also deploy Microsoft Store apps directly to devices by using Intune, Sy Remove unnecessary user accounts (and corresponding licenses) from AD DS and Office 365 (if you have an on-premises AD DS infrastructure).

            For more information about how to:
              -
            • Remove unnecessary user accounts, see [Active Directory Administrative Center](https://technet.microsoft.com/windows-server-docs/identity/ad-ds/get-started/adac/active-directory-administrative-center).
            • -
            • Remove licenses, see [Assign or remove licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-remove-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
            • +
            • Remove unnecessary user accounts, see Active Directory Administrative Center.
            • +
            • Remove licenses, see Assign or remove licenses for Office 365 for business.
            @@ -1769,8 +1769,8 @@ For more information about how to: Add new accounts (and corresponding licenses) to AD DS (if you have an on-premises AD DS infrastructure).

            For more information about how to:
              -
            • Add user accounts, see [Bulk-import user and group accounts into AD DS](#bulk-import-user-and-group-accounts-into-ad-ds).
            • -
            • Assign licenses, see [Assign or remove licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-remove-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
            • +
            • Add user accounts, see Bulk-import user and group accounts into AD DS.
            • +
            • Assign licenses, see Assign or remove licenses for Office 365 for business.
            @@ -1782,8 +1782,8 @@ For more information about how to: Remove unnecessary user accounts (and corresponding licenses) from Office 365 (if you do not have an on-premises AD DS infrastructure).

            For more information about how to:
              -
            • Remove unnecessary user accounts, see [Delete or restore users](https://support.office.com/en-us/article/Delete-or-restore-users-d5155593-3bac-4d8d-9d8b-f4513a81479e).
            • -
            • Remove licenses, see [Assign or remove licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-remove-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
            • +
            • Remove unnecessary user accounts, see Delete or restore users.
            • +
            • Remove licenses, see Assign or remove licenses for Office 365 for business.
            @@ -1795,8 +1795,8 @@ For more information about how to: Add new accounts (and corresponding licenses) to Office 365 (if you don’t have an on-premises AD DS infrastructure).

            For more information about how to:
              -
            • Add user accounts, see [Add users to Office 365 for business](https://support.office.com/en-us/article/Add-users-to-Office-365-for-business-435ccec3-09dd-4587-9ebd-2f3cad6bc2bc) and [Add users individually or in bulk to Office 365](https://www.youtube.com/watch?v=zDs3VltTJps).
            • -
            • Assign licenses, see [Assign or remove licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-remove-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
            • +
            • Add user accounts, see Add users to Office 365 for business and Add users individually or in bulk to Office 365.
            • +
            • Assign licenses, see Assign or remove licenses for Office 365 for business.
            @@ -1808,8 +1808,8 @@ For more information about how to: Create or modify security groups, and manage group membership in Office 365.

            For more information about how to:
              -
            • Create or modify security groups, see [Create an Office 365 Group in the admin center](https://support.office.com/en-us/article/Create-an-Office-365-Group-in-the-admin-center-74a1ef8b-3844-4d08-9980-9f8f7a36000f?ui=en-US&rs=en-001&ad=US).
            • -
            • Manage group membership, see [Manage Group membership in the Office 365 admin center](https://support.office.com/en-us/article/Manage-Group-membership-in-the-Office-365-admin-center-e186d224-a324-4afa-8300-0e4fc0c3000a).
            • +
            • Create or modify security groups, see Create an Office 365 Group in the admin center.
            • +
            • Manage group membership, see Manage Group membership in the Office 365 admin center.
            @@ -1819,7 +1819,7 @@ For more information about how to: Create or modify Exchange Online or Microsoft Exchange Server distribution lists in Office 365.

            -For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see [Create and manage distribution groups](https://technet.microsoft.com/library/bb124513.aspx) and [Create, edit, or delete a security group](https://support.office.com/en-us/article/Create-edit-or-delete-a-security-group-55C96B32-E086-4C9E-948B-A018B44510CB). +For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see Create and manage distribution groups and Create, edit, or delete a security group. x @@ -1828,7 +1828,7 @@ For more information about how to create or modify Exchange Online or Exchange S Install new student devices.

            -Follow the same steps you followed in the [Deploy Windows 10 to devices](#deploy-windows-10-to-devices) section. +Follow the same steps you followed in the Deploy Windows 10 to devices section. diff --git a/education/windows/deploy-windows-10-in-a-school.md b/education/windows/deploy-windows-10-in-a-school.md index 710b04792f..db25071667 100644 --- a/education/windows/deploy-windows-10-in-a-school.md +++ b/education/windows/deploy-windows-10-in-a-school.md @@ -176,7 +176,7 @@ Complete the following steps to select the appropriate Office 365 Education lice
          • Determine the faculty members and students who need to install Office applications on devices (if any). Faculty and students can use Office applications online (standard plans) or run them locally (Office 365 ProPlus plans). Table 1 lists the advantages and disadvantages of standard and Office 365 ProPlus plans.

          • -*Table 1. Comparison of standard and Microsoft Office 365 ProPlus plans* +Table 1. Comparison of standard and Microsoft Office 365 ProPlus plans
            @@ -200,7 +200,7 @@ Complete the following steps to select the appropriate Office 365 Education lice
            The best user experience is to run Office 365 ProPlus or use native Office apps on mobile devices. If neither of these options is available, use Office applications online. In addition, all Office 365 plans provide a better user experience by storing documents in OneDrive for Business, which is included in all Office 365 plans. OneDrive for Business keeps content in sync among devices and helps ensure that users always have access to their documents on any device.
            -
          • Determine whether students or faculty need Azure Rights Management.
            You can use Azure Rights Management to protect classroom information against unauthorized access. Azure Rights Management protects your information inside or outside the classroom through encryption, identity, and authorization policies, securing your files and email. You can retain control of the information, even when it’s shared with people outside the classroom or your educational institution. Azure Rights Management is free to use with all Office 365 Education license plans. For more information, see [Azure Rights Management](https://technet.microsoft.com/library/jj585024.aspx).
          • +
          • Determine whether students or faculty need Azure Rights Management.
            You can use Azure Rights Management to protect classroom information against unauthorized access. Azure Rights Management protects your information inside or outside the classroom through encryption, identity, and authorization policies, securing your files and email. You can retain control of the information, even when it’s shared with people outside the classroom or your educational institution. Azure Rights Management is free to use with all Office 365 Education license plans. For more information, see Azure Rights Management.
          • Record the Office 365 Education license plans needed for the classroom in Table 2.

            *Table 2. Office 365 Education license plans needed for the classroom* @@ -224,7 +224,7 @@ The best user experience is to run Office 365 ProPlus or use native Office apps

          • -You will use the Office 365 Education license plan information you record in Table 2 in the [Create user accounts in Office 365](#create-user-accounts-in-office-365) section of this guide. +You will use the Office 365 Education license plan information you record in Table 2 in the Create user accounts in Office 365 section of this guide. ### Create a new Office 365 Education subscription @@ -235,11 +235,11 @@ To create a new Office 365 Education subscription for use in the classroom, use #### To create a new Office 365 subscription 1. In Microsoft Edge or Internet Explorer, type `https://portal.office.com/start?sku=faculty` in the address bar. - + **Note**  If you have already used your current sign-in account to create a new Office 365 subscription, you will be prompted to sign in. If you want to create a new Office 365 subscription, start an In-Private Window in one of the following: - - Microsoft Edge by opening the Microsoft Edge app, either pressing Ctrl+Shift+P or clicking or tapping **More actions**, and then clicking or tapping **New InPrivate window**. - - Internet Explorer 11 by opening Internet Explorer 11, either pressing Ctrl+Shift+P or clicking or tapping **Settings**, clicking or tapping **Safety**, and then clicking or tapping **InPrivate Browsing**. - + - Microsoft Edge by opening the Microsoft Edge app, either pressing Ctrl+Shift+P or clicking or tapping **More actions**, and then clicking or tapping **New InPrivate window**. + - Internet Explorer 11 by opening Internet Explorer 11, either pressing Ctrl+Shift+P or clicking or tapping **Settings**, clicking or tapping **Safety**, and then clicking or tapping **InPrivate Browsing**. + 2. On the **Get started** page, type your school email address in the **Enter your school email address** box, and then click **Sign up**. You will receive an email in your school email account. 3. Click the hyperlink in the email in your school email account. 4. On the **One last thing** page, complete your user information, and then click **Start**. The wizard creates your new Office 365 Education subscription, and you are automatically signed in as the administrative user you specified when you created the subscription. @@ -277,12 +277,13 @@ All new Office 365 Education subscriptions have automatic tenant join enabled by *Table 3. Windows PowerShell commands to enable or disable Automatic Tenant Join* -| Action | Windows PowerShell command | -|------- |----------------------------| -| Enable |`Set-MsolCompanySettings -AllowEmailVerifiedUsers $true`| -| Disable |`Set-MsolCompanySettings -AllowEmailVerifiedUsers $false`| +| Action | Windows PowerShell command | +|---------|-----------------------------------------------------------| +| Enable | `Set-MsolCompanySettings -AllowEmailVerifiedUsers $true` | +| Disable | `Set-MsolCompanySettings -AllowEmailVerifiedUsers $false` | +

            -**Note**  If your institution has AD DS, then disable automatic tenant join. Instead, use Azure AD integration with AD DS to add users to your Office 365 tenant. +Note  If your institution has AD DS, then disable automatic tenant join. Instead, use Azure AD integration with AD DS to add users to your Office 365 tenant. ### Disable automatic licensing @@ -294,10 +295,12 @@ Although all new Office 365 Education subscriptions have automatic licensing ena *Table 4. Windows PowerShell commands to enable or disable automatic licensing* -| Action | Windows PowerShell command| -| -------| --------------------------| -| Enable |`Set-MsolCompanySettings -AllowAdHocSubscriptions $true`| -|Disable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $false`| + +| Action | Windows PowerShell command | +|---------|-----------------------------------------------------------| +| Enable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $true` | +| Disable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $false` | +

            ### Enable Azure AD Premium @@ -380,15 +383,15 @@ You can deploy the Azure AD Connect tool by using one of the following methods: - **On premises.** As shown in Figure 6, Azure AD Connect runs on premises, which has the advantage of not requiring a virtual private network (VPN) connection to Azure. It does, however, require a virtual machine (VM) or physical server. - ![fig 6](images/deploy-win-10-school-figure6.png) + ![fig 6](images/deploy-win-10-school-figure6.png) - *Figure 6. Azure AD Connect on premises* + *Figure 6. Azure AD Connect on premises* - **In Azure**. As shown in Figure 7, Azure AD Connect runs on a VM in Azure AD, which has the advantages of being faster to provision (than a physical, on-premises server), offers better site availability, and helps reduce the number of on-premises servers. The disadvantage is that you need to deploy a VPN gateway on premises. - ![fig 7](images/deploy-win-10-school-figure7.png) + ![fig 7](images/deploy-win-10-school-figure7.png) - *Figure 7. Azure AD Connect in Azure* + *Figure 7. Azure AD Connect in Azure* This guide describes how to run Azure AD Connect on premises. For information about running Azure AD Connect in Azure, see [Deploy Office 365 Directory Synchronization (DirSync) in Microsoft Azure](https://technet.microsoft.com/library/dn635310.aspx). @@ -439,11 +442,13 @@ Several methods are available to bulk-import user accounts into AD DS domains. T *Table 5. AD DS bulk-import account methods* -|Method | Description and reason to select this method | -|-------| ---------------------------------------------| -|Ldifde.exe |This command-line tool allows you to import and export objects (such as user accounts) from AD DS. Select this method if you aren’t comfortable with Microsoft Visual Basic Scripting Edition (VBScript), Windows PowerShell, or other scripting languages. For more information about using Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](https://technet.microsoft.com/library/cc816781.aspx), and [LDIFDE](https://technet.microsoft.com/library/cc755456.aspx).| -|VBScript | This scripting language uses the Active Directory Services Interfaces (ADSI) Component Object Model interface to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with VBScript. For more information about using VBScript and ADSI, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx) and [ADSI Scriptomatic](https://technet.microsoft.com/scriptcenter/dd939958.aspx).| -|Windows PowerShell| This scripting language natively supports cmdlets to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with Window PowerShell scripting. For more information about using Windows PowerShell, see [Import Bulk Users to Active Directory](https://blogs.technet.microsoft.com/bettertogether/2011/01/09/import-bulk-users-to-active-directory/) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx).| + +| Method | Description and reason to select this method | +|--------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Ldifde.exe | This command-line tool allows you to import and export objects (such as user accounts) from AD DS. Select this method if you aren’t comfortable with Microsoft Visual Basic Scripting Edition (VBScript), Windows PowerShell, or other scripting languages. For more information about using Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](https://technet.microsoft.com/library/cc816781.aspx), and [LDIFDE](https://technet.microsoft.com/library/cc755456.aspx). | +| VBScript | This scripting language uses the Active Directory Services Interfaces (ADSI) Component Object Model interface to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with VBScript. For more information about using VBScript and ADSI, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx) and [ADSI Scriptomatic](https://technet.microsoft.com/scriptcenter/dd939958.aspx). | +| Windows PowerShell | This scripting language natively supports cmdlets to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with Window PowerShell scripting. For more information about using Windows PowerShell, see [Import Bulk Users to Active Directory](https://blogs.technet.microsoft.com/bettertogether/2011/01/09/import-bulk-users-to-active-directory/) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | +

            ### Create a source file that contains the user and group accounts @@ -451,11 +456,13 @@ After you have selected your user and group account bulk import method, you’re *Table 6. Source file format for each bulk import method* -| Method | Source file format | -|--------| -------------------| -|Ldifde.exe|Ldifde.exe requires a specific format for the source file. Use Ldifde.exe to export existing user and group accounts so that you can see the format. For examples of the format that Ldifde.exe requires, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](https://technet.microsoft.com/library/cc816781.aspx), and [LDIFDE](https://technet.microsoft.com/library/cc755456.aspx).| -|VBScript | VBScript can use any .csv file format to create a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in comma-separated values (CSV) format, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx).| -| Windows PowerShell| Windows PowerShell can use any .csv file format you want to create as a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in CSV format, see [Import Bulk Users to Active Directory](https://blogs.technet.microsoft.com/bettertogether/2011/01/09/import-bulk-users-to-active-directory/) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx).| + +| Method | Source file format | +|--------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Ldifde.exe | Ldifde.exe requires a specific format for the source file. Use Ldifde.exe to export existing user and group accounts so that you can see the format. For examples of the format that Ldifde.exe requires, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](https://technet.microsoft.com/library/cc816781.aspx), and [LDIFDE](https://technet.microsoft.com/library/cc755456.aspx). | +| VBScript | VBScript can use any .csv file format to create a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in comma-separated values (CSV) format, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://technet.microsoft.com/library/bb727091.aspx). | +| Windows PowerShell | Windows PowerShell can use any .csv file format you want to create as a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in CSV format, see [Import Bulk Users to Active Directory](https://blogs.technet.microsoft.com/bettertogether/2011/01/09/import-bulk-users-to-active-directory/) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). | +

            ### Import the user accounts into AD DS @@ -556,15 +563,17 @@ After you create the Microsoft Store for Business portal, configure it by using *Table 7. Menu selections to configure Microsoft Store for Business settings* -| Menu selection | What you can do in this menu | -|---------------| -------------------| -|Account information|Displays information about your Microsoft Store for Business account (no settings can be changed). You make changes to this information in Office 365 or the Azure Portal. For more information, see [Update Microsoft Store for Business account settings](https://technet.microsoft.com/itpro/windows/manage/update-windows-store-for-business-account-settings).| -|Device Guard signing|Allows you to upload and sign Device Guard catalog and policy files. For more information about Device Guard, see [Device Guard deployment guide](https://technet.microsoft.com/itpro/windows/keep-secure/device-guard-deployment-guide).| -|LOB publishers| Allows you to add line-of-business (LOB) publishers that can then publish apps to your private store. LOB publishers are usually internal developers or software vendors that are working with your institution. For more information, see [Working with line-of-business apps](https://technet.microsoft.com/itpro/windows/manage/working-with-line-of-business-apps).| -|Management tools| Allows you to add tools that you can use to distribute (deploy) apps in your private store. For more information, see [Distribute apps with a management tool](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-with-management-tool).| -|Offline licensing|Allows you to show (or not show) offline licensed apps to people shopping in your private store. For more information, see [Licensing model: online and offline licenses](https://technet.microsoft.com/itpro/windows/manage/apps-in-windows-store-for-business#licensing-model).| -|Permissions|Allows you to grant other users in your organization the ability to buy, manage, and administer your Microsoft Store for Business portal. You can also remove permissions you have previously granted. For more information, see [Roles and permissions in Microsoft Store for Business](https://technet.microsoft.com/itpro/windows/manage/roles-and-permissions-windows-store-for-business).| -|Private store|Allows you to change the organization name used in your Microsoft Store for Business portal. When you create your portal, the private store uses the organization name that you used to create your Office 365 subscription. For more information, see [Distribute apps using your private store](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-from-your-private-store).| + +| Menu selection | What you can do in this menu | +|----------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Account information | Displays information about your Microsoft Store for Business account (no settings can be changed). You make changes to this information in Office 365 or the Azure Portal. For more information, see [Update Microsoft Store for Business account settings](https://technet.microsoft.com/itpro/windows/manage/update-windows-store-for-business-account-settings). | +| Device Guard signing | Allows you to upload and sign Device Guard catalog and policy files. For more information about Device Guard, see [Device Guard deployment guide](https://technet.microsoft.com/itpro/windows/keep-secure/device-guard-deployment-guide). | +| LOB publishers | Allows you to add line-of-business (LOB) publishers that can then publish apps to your private store. LOB publishers are usually internal developers or software vendors that are working with your institution. For more information, see [Working with line-of-business apps](https://technet.microsoft.com/itpro/windows/manage/working-with-line-of-business-apps). | +| Management tools | Allows you to add tools that you can use to distribute (deploy) apps in your private store. For more information, see [Distribute apps with a management tool](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-with-management-tool). | +| Offline licensing | Allows you to show (or not show) offline licensed apps to people shopping in your private store. For more information, see [Licensing model: online and offline licenses](https://technet.microsoft.com/itpro/windows/manage/apps-in-windows-store-for-business#licensing-model). | +| Permissions | Allows you to grant other users in your organization the ability to buy, manage, and administer your Microsoft Store for Business portal. You can also remove permissions you have previously granted. For more information, see [Roles and permissions in Microsoft Store for Business](https://technet.microsoft.com/itpro/windows/manage/roles-and-permissions-windows-store-for-business). | +| Private store | Allows you to change the organization name used in your Microsoft Store for Business portal. When you create your portal, the private store uses the organization name that you used to create your Office 365 subscription. For more information, see [Distribute apps using your private store](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-from-your-private-store). | +

            ### Find, acquire, and distribute apps in the portal @@ -595,11 +604,11 @@ Depending on your school’s requirements, you may need any combination of the f - **Windows 10 Home**. Use this operating system to upgrade existing eligible institution-owned and personal devices that are running Windows 8.1 Home or Windows 7 Home to Windows 10 Home. - **Windows 10 Pro**. Use this operating system to: - - Upgrade existing eligible institution-owned and personal devices running Windows 8.1 Pro or Windows 7 Professional to Windows 10 Pro. - - Deploy new instances of Windows 10 Pro to devices so that new devices have a known configuration. + - Upgrade existing eligible institution-owned and personal devices running Windows 8.1 Pro or Windows 7 Professional to Windows 10 Pro. + - Deploy new instances of Windows 10 Pro to devices so that new devices have a known configuration. - **Windows 10 Education**. Use this operating system to: - - Upgrade institution-owned devices to Windows 10 Education. - - Deploy new instances of Windows 10 Education so that new devices have a known configuration. + - Upgrade institution-owned devices to Windows 10 Education. + - Deploy new instances of Windows 10 Education so that new devices have a known configuration. - **Windows 10 Pro Education**. Use this operating system to upgrade existing eligible institution-owned devices running Windows 10 Pro Education, version 1903 or later, to Windows 10 Education using [subscription activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation). **Note**  Although you can use Windows 10 Home on institution-owned devices, Microsoft recommends that you use Windows 10 Pro or Windows 10 Education, instead. Windows 10 Pro and Windows 10 Education provide support for MDM, policy-based management, and Microsoft Store for Business. These features are not available in Windows 10 Home. @@ -660,7 +669,7 @@ Select this method when you want to deploy Windows over-the-network and perform

          • Deploys images more slowly than when using local media.
          • Requires no additional infrastructure.
          - + Select this method when you want to deploy Windows over-the-network and are willing to boot the target device from local media. The advantage of this method is that the media are generic and typically don’t require updates after you create them (the Deployment Wizard accesses the centrally located deployment share over the network). The disadvantage of this method is that over-the-network deployments are slower than deployment from local media. @@ -707,7 +716,7 @@ The first step in preparation for Windows 10 deployment is to configure—that i 1. Import operating systems -Import the operating systems that you selected in the [Select operating systems](#select-the-operating-systems) section into the deployment share. For more information about how to import operating systems, see [Import an Operating System into the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#ImportanOperatingSystemintotheDeploymentWorkbench). +Import the operating systems that you selected in the Select operating systems section into the deployment share. For more information about how to import operating systems, see Import an Operating System into the Deployment Workbench. @@ -721,7 +730,7 @@ Import device drivers for each device in your institution. For more information 3. Create MDT applications for Microsoft Store apps -Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using *sideloading*, which allows you to use the **Add-AppxPackage** Windows PowerShell cmdlet to deploy the .appx files associated with the app (called *provisioned apps*). Use this method to deploy up to 24 apps to Windows 10.

          +Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using sideloading, which allows you to use the Add-AppxPackage Windows PowerShell cmdlet to deploy the .appx files associated with the app (called provisioned apps). Use this method to deploy up to 24 apps to Windows 10.

          Prior to sideloading the .appx files, obtain the Microsoft Store .appx files that you will use to deploy (sideload) the apps in your provisioning package. For apps in Microsoft Store, you will need to obtain the .appx files from the app software vendor directly. If you are unable to obtain the .appx files from the app software vendor, then you or the students will need to install the apps on the student devices directly from Microsoft Store or Microsoft Store for Business.

          @@ -729,8 +738,8 @@ If you have Intune, you can deploy Microsoft Store apps after you deploy Windows In addition, you must prepare your environment for sideloading (deploying) Microsoft Store apps. For more information about how to:

            -
          • Prepare your environment for sideloading, see [Sideload LOB apps in Windows 10](https://technet.microsoft.com/itpro/windows/deploy/sideload-apps-in-windows-10).
          • -
          • Create an MDT application, see [Create a New Application in the Deployment Workbench](https://technet.microsoft.com/library/dn759415.aspx#CreateaNewApplicationintheDeploymentWorkbench).
          • +
          • Prepare your environment for sideloading, see Sideload LOB apps in Windows 10.
          • +
          • Create an MDT application, see Create a New Application in the Deployment Workbench.
          @@ -787,9 +796,9 @@ You can use Windows Deployment Services in conjunction with MDT to automatically 1. Set up and configure Windows Deployment Services.

          Windows Deployment Services is a server role available in all Windows Server editions. You can enable the Windows Deployment Services server role on a new server or on any server running Windows Server in your institution. For more information about how to perform this step, see the following resources: - - [Windows Deployment Services overview](https://technet.microsoft.com/library/hh831764.aspx) - - The Windows Deployment Services Help file, included in Windows Deployment Services - - [Windows Deployment Services Getting Started Guide for Windows Server 2012](https://technet.microsoft.com/library/jj648426.aspx) + - [Windows Deployment Services overview](https://technet.microsoft.com/library/hh831764.aspx) + - The Windows Deployment Services Help file, included in Windows Deployment Services + - [Windows Deployment Services Getting Started Guide for Windows Server 2012](https://technet.microsoft.com/library/jj648426.aspx) 2. Add LTI boot images (Windows PE images) to Windows Deployment Services.

          The LTI boot images (.wim files) that you will add to Windows Deployment Services are in the MDT deployment share. Locate the .wim files in the Boot subfolder in the deployment share. For more information about how to perform this step, see [Add LTI Boot Images to Windows Deployment Services](https://technet.microsoft.com/library/dn759415.aspx#AddLTIBootImagestoWindowsDeploymentServices). @@ -903,89 +912,89 @@ Microsoft has several recommended settings for educational institutions. Table 1 Use of Microsoft accounts You want faculty and students to use only Azure AD accounts for institution-owned devices. For these devices, do not use Microsoft accounts or associate a Microsoft account with the Azure AD accounts.

          -**Note**  Personal devices typically use Microsoft accounts. Faculty and students can associate their Microsoft account with their Azure AD account on these devices.

          -**Group Policy.** Configure the [Accounts: Block Microsoft accounts](https://technet.microsoft.com/library/jj966262.aspx?f=255&MSPPError=-2147217396) Group Policy setting to use the Users can’t add Microsoft accounts setting option.

          -**Intune.** Enable or disable the camera by using the **Allow Microsoft account**, **Allow adding non-Microsoft accounts manually**, and **Allow settings synchronization for Microsoft accounts** policy settings under the **Accounts and Synchronization** section of a **Windows 10 General Configuration** policy. +Note  Personal devices typically use Microsoft accounts. Faculty and students can associate their Microsoft account with their Azure AD account on these devices.

          +Group Policy. Configure the Accounts: Block Microsoft accounts Group Policy setting to use the Users can’t add Microsoft accounts setting option.

          +Intune. Enable or disable the camera by using the Allow Microsoft account, Allow adding non-Microsoft accounts manually, and Allow settings synchronization for Microsoft accounts policy settings under the Accounts and Synchronization section of a Windows 10 General Configuration policy. Restrict local administrator accounts on the devices Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices.

          -**Group Policy**. Create a **Local Group** Group Policy preference to limit the local administrators group membership. Select the **Delete all member users** and **Delete all member groups** check boxes to remove any existing members. For more information about how to configure Local Group preferences, see [Configure a Local Group Item](https://technet.microsoft.com/library/cc732525.aspx).

          -**Intune**. Not available. +Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item.

          +Intune. Not available. Restrict the local administrator accounts on the devices Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices.

          -**Group Policy**. Create a **Local Group** Group Policy preference to limit the local administrators group membership. Select the **Delete all member users** and **Delete all member groups** check boxes to remove any existing members. For more information about how to configure Local Group preferences, see [Configure a Local Group Item](https://technet.microsoft.com/library/cc732525.aspx).

          -**Intune**. Not available. +Group Policy. Create a Local Group Group Policy preference to limit the local administrators group membership. Select the Delete all member users and Delete all member groups check boxes to remove any existing members. For more information about how to configure Local Group preferences, see Configure a Local Group Item.

          +Intune. Not available. Manage the built-in administrator account created during device deployment When you use MDT to deploy Windows 10, the MDT deployment process automatically creates a local Administrator account with the password you specified. As a security best practice, rename the built-in Administrator account and optionally disable it.

          -**Group Policy**. Rename the built-in Administrator account by using the **Accounts: Rename administrator account** Group Policy setting. For more information about how to rename the built-in Administrator account, see [To rename the Administrator account using the Group Policy Management Console](https://technet.microsoft.com/library/cc747484.aspx). You will specify the new name for the Administrator account. You can disable the built-in Administrator account by using the **Accounts: Administrator account status** Group Policy setting. For more information about how to disable the built-in Administrator account, see [Accounts: Administrator account status](https://technet.microsoft.com/library/jj852165.aspx).

          -**Intune**. Not available. +Group Policy. Rename the built-in Administrator account by using the Accounts: Rename administrator account Group Policy setting. For more information about how to rename the built-in Administrator account, see To rename the Administrator account using the Group Policy Management Console. You will specify the new name for the Administrator account. You can disable the built-in Administrator account by using the Accounts: Administrator account status Group Policy setting. For more information about how to disable the built-in Administrator account, see Accounts: Administrator account status.

          +Intune. Not available. Control Microsoft Store access You can control access to Microsoft Store and whether existing Microsoft Store apps receive updates. You can only disable the Microsoft Store app in Windows 10 Education and Windows 10 Enterprise.

          -**Group Policy**. You can disable the Microsoft Store app by using the **Turn off the Store Application** Group Policy setting. You can prevent Microsoft Store apps from receiving updates by using the **Turn off Automatic Download and Install of updates** Group Policy setting. For more information about configuring these settings, see [Can I use Group Policy to control the Microsoft Store in my enterprise environment?](https://technet.microsoft.com/library/hh832040.aspx#BKMK_UseGP).

          -**Intune**. You can enable or disable the camera by using the **Allow application store** policy setting in the **Apps** section of a **Windows 10 General Configuration** policy. +Group Policy. You can disable the Microsoft Store app by using the Turn off the Store Application Group Policy setting. You can prevent Microsoft Store apps from receiving updates by using the Turn off Automatic Download and Install of updates Group Policy setting. For more information about configuring these settings, see Can I use Group Policy to control the Microsoft Store in my enterprise environment?.

          +Intune. You can enable or disable the camera by using the Allow application store policy setting in the Apps section of a Windows 10 General Configuration policy. Use of Remote Desktop connections to devices Remote Desktop connections could allow unauthorized access to the device. Depending on your institution’s policies, you may want to disable Remote Desktop connections on your devices.

          -**Group Policy**. You can enable or disable Remote Desktop connections to devices by using the **Allow Users to connect remotely using Remote Desktop setting** in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections.

          -**Intune**. Not available. +Group Policy. You can enable or disable Remote Desktop connections to devices by using the Allow Users to connect remotely using Remote Desktop setting in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections.

          +Intune. Not available. Use of camera A device’s camera can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the camera on your devices.

          -**Group Policy**. Not available.

          -**Intune**. You can enable or disable the camera by using the **Allow camera** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. +Group Policy. Not available.

          +Intune. You can enable or disable the camera by using the Allow camera policy setting in the Hardware section of a Windows 10 General Configuration policy. Use of audio recording Audio recording (by using the Sound Recorder app) can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the Sound Recorder app on your devices.

          -**Group Policy**. You can disable the Sound Recorder app by using the **Do not allow Sound Recorder to run** Group Policy setting. You can disable other audio recording apps by using AppLocker policies. Create AppLocker policies by using the information in [Editing an AppLocker Policy](https://technet.microsoft.com/library/ee791894(v=ws.10).aspx) and [Create Your AppLocker Policies](https://technet.microsoft.com/library/ee791899.aspx).

          -**Intune**. You can enable or disable the camera by using the **Allow voice recording** policy setting in the **Features** section of a **Windows 10 General Configuration** policy. +Group Policy. You can disable the Sound Recorder app by using the Do not allow Sound Recorder to run Group Policy setting. You can disable other audio recording apps by using AppLocker policies. Create AppLocker policies by using the information in Editing an AppLocker Policy and Create Your AppLocker Policies.

          +Intune. You can enable or disable the camera by using the Allow voice recording policy setting in the Features section of a Windows 10 General Configuration policy. Use of screen capture Screen captures can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the ability to perform screen captures on your devices.

          -**Group Policy**. Not available.

          -**Intune**. You can enable or disable the camera by using the **Allow screen capture** policy setting in the **System** section of a **Windows 10 General Configuration** policy. +Group Policy. Not available.

          +Intune. You can enable or disable the camera by using the Allow screen capture policy setting in the System section of a Windows 10 General Configuration policy. Use of location services Providing a device’s location can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the location service on your devices.

          -**Group Policy**. You can enable or disable location services by using the **Turn off location** Group Policy setting in User Configuration\Windows Components\Location and Sensors.

          -**Intune**. You can enable or disable the camera by using the **Allow geolocation** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. +Group Policy. You can enable or disable location services by using the Turn off location Group Policy setting in User Configuration\Windows Components\Location and Sensors.

          +Intune. You can enable or disable the camera by using the Allow geolocation policy setting in the Hardware section of a Windows 10 General Configuration policy. Changing wallpaper Displaying a custom wallpaper can be a source of disclosure or privacy issues in an education environment (if the wallpaper displays information about the user or the device). Depending on your institution’s policies, you may want to prevent users from changing the wallpaper on your devices.

          -**Group Policy**. You can configure the wallpaper by using the **Desktop WallPaper** setting in User Configuration\Administrative Templates\Desktop\Desktop.

          -**Intune**. Not available. +Group Policy. You can configure the wallpaper by using the Desktop WallPaper setting in User Configuration\Administrative Templates\Desktop\Desktop.

          +Intune. Not available. @@ -1037,12 +1046,14 @@ Prior to deployment of Windows 10, ensure that you complete the tasks listed in *Table 12. Deployment preparation checklist* -|Task | | -| ---| --- | -| |The target devices have sufficient system resources to run Windows 10. | -| | Identify the necessary devices drivers, and import them to the MDT deployment share.| -| | Create an MDT application for each Microsoft Store and Windows desktop app.| -| | Notify the students and faculty about the deployment.| + +| Task | | +|------|--------------------------------------------------------------------------------------| +| | The target devices have sufficient system resources to run Windows 10. | +| | Identify the necessary devices drivers, and import them to the MDT deployment share. | +| | Create an MDT application for each Microsoft Store and Windows desktop app. | +| | Notify the students and faculty about the deployment. | +

          ### Perform the deployment @@ -1126,10 +1137,10 @@ Table 13 lists the school and individual classroom maintenance tasks, the resour Verify that Windows Update is active and current with operating system and software updates.

          For more information about completing this task when you have:

            -
          • Intune, see [Keep Windows PCs up to date with software updates in Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/keep-windows-pcs-up-to-date-with-software-updates-in-microsoft-intune).
          • -
          • Group Policy, see [Windows Update for Business](https://technet.microsoft.com/itpro/windows/plan/windows-update-for-business).
          • -
          • Windows Server Update Services (WSUS), see [Windows Server Update Services](https://msdn.microsoft.com/library/bb332157.aspx?f=255&MSPPError=-2147217396).
          • -
          • Neither Intune, Group Policy, or WSUS, see [Update Windows 10](https://windows.microsoft.com/en-id/windows-10/update-windows-10)
          • +
          • Intune, see Keep Windows PCs up to date with software updates in Microsoft Intune.
          • +
          • Group Policy, see Windows Update for Business.
          • +
          • Windows Server Update Services (WSUS), see Windows Server Update Services.
          • +
          • Neither Intune, Group Policy, or WSUS, see Update Windows 10
          X @@ -1139,7 +1150,7 @@ For more information about completing this task when you have: Verify that Windows Defender is active and current with malware Security intelligence.

          -For more information about completing this task, see [Turn Windows Defender on or off](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab01) and [Updating Windows Defender](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab03). +For more information about completing this task, see Turn Windows Defender on or off and Updating Windows Defender. X X X @@ -1147,7 +1158,7 @@ For more information about completing this task, see [Turn Windows Defender on o Verify that Windows Defender has run a scan in the past week and that no viruses or malware were found.

          -For more information about completing this task, see [How do I find and remove a virus?](https://windows.microsoft.com/en-US/windows-8/how-find-remove-virus) +For more information about completing this task, see How do I find and remove a virus? X X @@ -1156,7 +1167,7 @@ For more information about completing this task, see [How do I find and remove a Verify that you are using the appropriate Windows 10 servicing options for updates and upgrades (such as selecting whether you want to use Current Branch or Current Branch for Business).

          -For more information about Windows 10 servicing options for updates and upgrades, see [Windows 10 servicing options for updates and upgrades](https://technet.microsoft.com/itpro/windows/manage/introduction-to-windows-10-servicing). +For more information about Windows 10 servicing options for updates and upgrades, see Windows 10 servicing options for updates and upgrades. X X @@ -1164,7 +1175,7 @@ For more information about Windows 10 servicing options for updates and upgrades Refresh the operating system and apps on devices.

          -For more information about completing this task, see the [Deploy Windows 10 to devices](#deploy-windows-10-to-devices) section. +For more information about completing this task, see the Deploy Windows 10 to devices section. @@ -1174,7 +1185,7 @@ For more information about completing this task, see the [Deploy Windows 10 to d Install any new Windows desktop apps or update any Windows desktop apps that are used in the curriculum.

          -For more information, see the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. +For more information, see the Deploy apps by using Intune section. @@ -1185,7 +1196,7 @@ For more information, see the [Deploy apps by using Intune](#deploy-apps-by-usin Install new or update existing Microsoft Store apps that are used in the curriculum.

          Microsoft Store apps are automatically updated from Microsoft Store. The menu bar in the Microsoft Store app shows whether any Microsoft Store app updates are available for download.

          -You can also deploy Microsoft Store apps directly to devices by using Intune. For more information, see the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. +You can also deploy Microsoft Store apps directly to devices by using Intune. For more information, see the Deploy apps by using Intune section. @@ -1197,8 +1208,8 @@ You can also deploy Microsoft Store apps directly to devices by using Intune. Fo Remove unnecessary user accounts (and corresponding licenses) from Office 365.

          For more information about how to:
            -
          • Remove unnecessary user accounts, see [Delete or restore users](https://support.office.com/en-us/article/Delete-or-restore-users-d5155593-3bac-4d8d-9d8b-f4513a81479e?ui=en-US&rs=en-US&ad=US).
          • -
          • Unassign licenses, see [Assign or unassign licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-unassign-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
          • +
          • Remove unnecessary user accounts, see Delete or restore users.
          • +
          • Unassign licenses, see Assign or unassign licenses for Office 365 for business.
          @@ -1211,8 +1222,8 @@ For more information about how to: Add new accounts (and corresponding licenses) to Office 365.

          For more information about how to:
            -
          • Add user accounts, see [Add users to Office 365 for business](https://support.office.com/en-us/article/Add-users-to-Office-365-for-business-435ccec3-09dd-4587-9ebd-2f3cad6bc2bc) and [Add users individually or in bulk to Office 365](https://www.youtube.com/watch?v=zDs3VltTJps).
          • -
          • Assign licenses, see [Assign or unassign licenses for Office 365 for business](https://support.office.com/en-us/article/Assign-or-unassign-licenses-for-Office-365-for-business-997596b5-4173-4627-b915-36abac6786dc?ui=en-US&rs=en-US&ad=US).
          • +
          • Add user accounts, see Add users to Office 365 for business and Add users individually or in bulk to Office 365.
          • +
          • Assign licenses, see Assign or unassign licenses for Office 365 for business.
          @@ -1224,8 +1235,8 @@ For more information about how to: Create or modify security groups and manage group membership in Office 365.

          For more information about how to:
            -
          • Create or modify security groups, see [View, create, and delete Groups in the Office 365 admin center](https://support.office.com/en-us/article/View-create-and-delete-groups-in-the-Office-365-admin-center-a6360120-2fc4-46af-b105-6a04dc5461c7).
          • -
          • Manage group membership, see [Manage Group membership in the Office 365 admin center](https://support.office.com/en-us/article/Manage-Group-membership-in-the-Office-365-admin-center-e186d224-a324-4afa-8300-0e4fc0c3000a).
          • +
          • Create or modify security groups, see View, create, and delete Groups in the Office 365 admin center.
          • +
          • Manage group membership, see Manage Group membership in the Office 365 admin center.
          @@ -1236,7 +1247,7 @@ For more information about how to: Create or modify Exchange Online or Microsoft Exchange Server distribution lists in Office 365.

          -For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see [Manage Distribution Groups](https://technet.microsoft.com/library/bb124513.aspx) and [Groups in Exchange Online and SharePoint Online](https://support.office.com/en-us/article/Create-edit-or-delete-a-security-group-55C96B32-E086-4C9E-948B-A018B44510CB#__groups_in_exchange). +For more information about how to create or modify Exchange Online or Exchange Server distribution lists in Office 365, see Manage Distribution Groups and Groups in Exchange Online and SharePoint Online. @@ -1246,7 +1257,7 @@ For more information about how to create or modify Exchange Online or Exchange S Install new student devices

          -Follow the same steps described in the [Deploy Windows 10 to devices](#deploy-windows-10-to-devices) section. +Follow the same steps described in the Deploy Windows 10 to devices section. @@ -1261,10 +1272,10 @@ Follow the same steps described in the [Deploy Windows 10 to devices](#deploy-wi Now, you have identified the tasks you need to perform monthly, at the end of an academic year or semester, and as required. Your school configuration should match the typical school configuration that you saw in the [Plan a typical school configuration](#plan-a-typical-school-configuration) section. By performing these maintenance tasks you help ensure that your school stays secure and is configured as you specified. -##Related resources +## Related resources diff --git a/education/windows/edu-deployment-recommendations.md b/education/windows/edu-deployment-recommendations.md index 5669774a73..5ddc9d7456 100644 --- a/education/windows/edu-deployment-recommendations.md +++ b/education/windows/edu-deployment-recommendations.md @@ -91,19 +91,19 @@ If the school allows the use of personal or Microsoft account in addition to org Skype uses the user’s contact details to deliver important information about the account and it also lets friends find each other on Skype. To manage and edit your profile in the Skype UWP app, follow these steps: -1. In the Skype UWP app, select the user profile icon ![Skype profile icon](images/skype_uwp_userprofile_icon.png) to go to the user’s profile page. -2. In the account page, select **Manage account** for the Skype account that you want to change. This will take you to the online Skype portal. -3. In the online Skype portal, scroll down to the **Account details** section. In **Settings and preferences**, click **Edit profile**. +1. In the Skype UWP app, select the user profile icon ![Skype profile icon](images/skype_uwp_userprofile_icon.png) to go to the user’s profile page. +2. In the account page, select **Manage account** for the Skype account that you want to change. This will take you to the online Skype portal. +3. In the online Skype portal, scroll down to the **Account details** section. In **Settings and preferences**, click **Edit profile**. - The profile page includes these sections: + The profile page includes these sections: - * Personal information - * Contact details - * Profile settings + * Personal information + * Contact details + * Profile settings 4. Review the information in each section and click **Edit profile** in either or both the **Personal information** and **Contact details** sections to change the information being shared. You can also remove the checks in the **Profile settings** section to change settings on discoverability, notifications, and staying in touch. -5. If you do not wish the name to be included, edit the fields and replace the fields with **XXX**. -6. To change the profile picture, go to the Skype app and click on the current profile picture or avatar. The **Manage Profile Picture** window pops up. +5. If you do not wish the name to be included, edit the fields and replace the fields with **XXX**. +6. To change the profile picture, go to the Skype app and click on the current profile picture or avatar. The **Manage Profile Picture** window pops up. ![Skype profile icon](images/skype_uwp_manageprofilepic.png) diff --git a/education/windows/education-scenarios-store-for-business.md b/education/windows/education-scenarios-store-for-business.md index 9f82a24149..e23fe11c3d 100644 --- a/education/windows/education-scenarios-store-for-business.md +++ b/education/windows/education-scenarios-store-for-business.md @@ -174,4 +174,4 @@ You can manage your orders through Microsoft Store for Business. For info on ord It can take up to 24 hours after a purchase, before a receipt is available on your **Order history page**. > [!NOTE] -For **Minecraft: Education Edition**, you can request a refund through Microsoft Store for Business for two months from the purchase date. After two months, refunds require a support call. +> For **Minecraft: Education Edition**, you can request a refund through Microsoft Store for Business for two months from the purchase date. After two months, refunds require a support call. diff --git a/education/windows/enable-s-mode-on-surface-go-devices.md b/education/windows/enable-s-mode-on-surface-go-devices.md index 5a291fb8b8..0862548ea6 100644 --- a/education/windows/enable-s-mode-on-surface-go-devices.md +++ b/education/windows/enable-s-mode-on-surface-go-devices.md @@ -36,30 +36,30 @@ Here are some things you’ll need before attempting any of these procedures: Like enterprise administrators performing large-scale deployment of customized Windows images, education customers can create their own customized Windows images for deployment to multiple classroom devices. An education customer who plans to follow [a traditional image-based deployment process](https://docs.microsoft.com/windows/deployment/windows-10-deployment-scenarios#traditional-deployment) using a Windows 10 Pro (1803) image for Surface Go devices can enable S mode as follows: -1. Use DISM to mount your offline Windows 10 Pro (1803) image. +1. Use DISM to mount your offline Windows 10 Pro (1803) image. ``` dism /Mount-image /imagefile:\ {/Index:\ | /Name:\} /MountDir:\ ``` -2. Create an unattend.xml answer file, adding the - amd64_Microsoft_Windows_CodeIntegrity component to Pass 2 offline Servicing - and setting amd64_Microsoft_Windows_CodeIntegrity\\SkuPolicyRequired to “1”. - The resulting xml should look like this… +2. Create an unattend.xml answer file, adding the + amd64_Microsoft_Windows_CodeIntegrity component to Pass 2 offline Servicing + and setting amd64_Microsoft_Windows_CodeIntegrity\\SkuPolicyRequired to “1”. + The resulting xml should look like this… Copy ``` - - - 1 - - + + + 1 + + ``` 3. Save the answer file in the **Windows\Panther** folder of your mounted image as unattend.xml. 4. Use DISM to apply the unattend.xml file and enable S Mode: @@ -77,7 +77,7 @@ process](https://docs.microsoft.com/windows/deployment/windows-10-deployment-sce ``` dism /Unmount-image /MountDir:C:\\mount /Commit ``` ->Note: don’t forget the /Commit parameter to ensure you don’t lose your + >Note: don’t forget the /Commit parameter to ensure you don’t lose your changes. Your Windows 10 Pro (1803) image now has S mode enabled and is ready to deploy to Surface Go devices. diff --git a/education/windows/get-minecraft-for-education.md b/education/windows/get-minecraft-for-education.md index 954335a82f..0908c78b04 100644 --- a/education/windows/get-minecraft-for-education.md +++ b/education/windows/get-minecraft-for-education.md @@ -35,9 +35,9 @@ Teachers and IT administrators can now get early access to **Minecraft: Educatio - **Minecraft: Education Edition** requires Windows 10. - Trials or subscriptions of **Minecraft: Education Edition** are offered to education tenants that are managed by Azure Active Directory (Azure AD). - - If your school doesn't have an Azure AD tenant, the [IT administrator can set one up](school-get-minecraft.md) as part of the process of getting **Minecraft: Education Edition**. - * Office 365 Education, which includes online versions of Office apps plus 1 TB online storage. [Sign up your school for Office 365 Education.](https://products.office.com/academic/office-365-education-plan) - * If your school has an Office 365 Education subscription, it includes a free Azure AD subscription. [Register your free Azure AD subscription.](https://msdn.microsoft.com/library/windows/hardware/mt703369%28v=vs.85%29.aspx) + - If your school doesn't have an Azure AD tenant, the [IT administrator can set one up](school-get-minecraft.md) as part of the process of getting **Minecraft: Education Edition**. + - Office 365 Education, which includes online versions of Office apps plus 1 TB online storage. [Sign up your school for Office 365 Education.](https://products.office.com/academic/office-365-education-plan) + - If your school has an Office 365 Education subscription, it includes a free Azure AD subscription. [Register your free Azure AD subscription.](https://msdn.microsoft.com/library/windows/hardware/mt703369%28v=vs.85%29.aspx) diff --git a/education/windows/index.md b/education/windows/index.md index d30a753c88..0f1dedb139 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -18,28 +18,28 @@ ms.date: 10/13/2017 ## ![Learn more about Windows](images/education.png) Learn -

          [Windows 10 editions for education customers](windows-editions-for-education-customers.md)
          Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.

          -

          [Compare each Windows edition](https://www.microsoft.com/en-us/WindowsForBusiness/Compare)
          Find out more about the features and functionality we support in each edition of Windows.

          -

          [Get Windows 10 Education or Windows 10 Pro Education](https://www.microsoft.com/en-us/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools)
          When you've made your decision, find out how to buy Windows for your school.

          +

          Windows 10 editions for education customers
          Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.

          +

          Compare each Windows edition
          Find out more about the features and functionality we support in each edition of Windows.

          +

          Get Windows 10 Education or Windows 10 Pro Education
          When you've made your decision, find out how to buy Windows for your school.

          ## ![Plan for Windows 10 in your school](images/clipboard.png) Plan -

          [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md)
          Provides guidance on ways to customize the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school.

          -

          [Deployment recommendations for school IT administrators](edu-deployment-recommendations.md)
          Learn how to customize the OS privacy settings, Skype, and Xbox for Windows-based devices used in schools so that you can choose what information is shared with Microsoft.

          -[Get Minecraft Education Edition](get-minecraft-for-education.md)
          Minecraft Education Edition is built for learning. Learn how to get early access and add it to your Microsoft Store for Business for distribution.

          -

          [Take tests in Windows 10](take-tests-in-windows-10.md)
          Take a Test is a new app that lets you create the right environment for taking tests. Learn how to use and get it set up.

          -

          [Chromebook migration guide](chromebook-migration-guide.md)
          Find out how you can migrate a Chromebook-based learning environment to a Windows 10-based learning environment.

          +

          Windows 10 configuration recommendations for education customers
          Provides guidance on ways to customize the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school.

          +

          Deployment recommendations for school IT administrators
          Learn how to customize the OS privacy settings, Skype, and Xbox for Windows-based devices used in schools so that you can choose what information is shared with Microsoft.

          +Get Minecraft Education Edition
          Minecraft Education Edition is built for learning. Learn how to get early access and add it to your Microsoft Store for Business for distribution.

          +

          Take tests in Windows 10
          Take a Test is a new app that lets you create the right environment for taking tests. Learn how to use and get it set up.

          +

          Chromebook migration guide
          Find out how you can migrate a Chromebook-based learning environment to a Windows 10-based learning environment.

          ## ![Deploy Windows 10 for Education](images/PCicon.png) Deploy -

          [Set up Windows devices for education](set-up-windows-10.md)
          Depending on your school's device management needs, you can use the Set up School PCs app or the Windows Configuration Designer tool to quickly set up student PCs.

          -

          [Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)
          Get step-by-step guidance to help you deploy Windows 10 in a school environment.

          -

          [Deploy Windows 10 in a school district](deploy-windows-10-in-a-school-district.md)
          Get step-by-step guidance on how to deploy Windows 10 to PCs and devices across a school district.

          -

          [Test Windows 10 S on existing Windows 10 education devices](test-windows10s-for-edu.md)
          Test Windows 10 S on a variety of Windows 10 devices (except Windows 10 Home) in your school and share your feedback with us.

          +

          Set up Windows devices for education
          Depending on your school's device management needs, you can use the Set up School PCs app or the Windows Configuration Designer tool to quickly set up student PCs.

          +

          Deploy Windows 10 in a school
          Get step-by-step guidance to help you deploy Windows 10 in a school environment.

          +

          Deploy Windows 10 in a school district
          Get step-by-step guidance on how to deploy Windows 10 to PCs and devices across a school district.

          +

          Test Windows 10 S on existing Windows 10 education devices
          Test Windows 10 S on a variety of Windows 10 devices (except Windows 10 Home) in your school and share your feedback with us.

          ## ![Switch to Windows 10 for Education](images/windows.png) Switch -

          [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md)
          If you have an education tenant and use Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education.

          +

          Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S
          If you have an education tenant and use Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education.

          ## Windows 8.1 diff --git a/education/windows/school-get-minecraft.md b/education/windows/school-get-minecraft.md index 933f721799..00a5baee8a 100644 --- a/education/windows/school-get-minecraft.md +++ b/education/windows/school-get-minecraft.md @@ -117,7 +117,7 @@ After you've finished the purchase, you can find your invoice by checking **Mine 4. On **Invoice Bills**, click the invoice number to view and download your invoice. It downloads as a .pdf. - ![Minecraft: Education Edition app details page with view bills link highlighted](images/mcee-invoice-bills.png) + ![Minecraft: Education Edition app details page with view bills link highlighted](images/mcee-invoice-bills.png) The **Payment Instructions** section on the first page of the invoice has information on invoice amount, due date, and how to pay with electronic funds transfer, or with a check. @@ -156,7 +156,7 @@ For Minecraft: Education Edition, you can use auto assign subscription to contro ![Minecraft Education Edition product page with auto assign control highlighted.](images/mcee-auto-assign-legacy.png) - -Or- + -Or- ![Minecraft Education Edition product page with auto assign control highlighted.](images/mcee-auto-assign-bd.png) diff --git a/education/windows/set-up-school-pcs-azure-ad-join.md b/education/windows/set-up-school-pcs-azure-ad-join.md index e424106156..7b8f55bb14 100644 --- a/education/windows/set-up-school-pcs-azure-ad-join.md +++ b/education/windows/set-up-school-pcs-azure-ad-join.md @@ -16,7 +16,7 @@ manager: dansimp # Azure AD Join for school PCs -> [!NOTE] +> [!NOTE] > Set up School PCs app uses Azure AD Join to configure PCs. The app is helpful if you use the cloud based directory, Azure Active Directory (AD). If your organization uses Active Directory or requires no account to connect, install and use [Windows Configuration > Designer](set-up-students-pcs-to-join-domain.md) to > join your PCs to your school's domain. diff --git a/education/windows/set-up-school-pcs-provisioning-package.md b/education/windows/set-up-school-pcs-provisioning-package.md index 348f7a22f0..48a2aa9549 100644 --- a/education/windows/set-up-school-pcs-provisioning-package.md +++ b/education/windows/set-up-school-pcs-provisioning-package.md @@ -54,34 +54,34 @@ This section lists only the MDM and local group policies that are configured uni For a more detailed look of each policy listed, see [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) in the Windows IT Pro Center documentation. -|Policy name |Default value |Description | -|---------|---------|---------| -|Authority|User-defined | Authenticates the admin user. Value is set automatically when signed in to Azure AD. -|BPRT|User-defined| Value is set automatically when signed in to Azure AD. Allows you to create the provisioning package. | -|WLAN Setting| XML is generated from the Wi-Fi profile in the Set up School PCs app.| Configures settings for wireless connectivity.| -|Hide OOBE for desktop| True | Hides the interactive OOBE flow for Windows 10.| -|Download Mode|1 - HTTP blended with peering behind the same NAT|Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps, and App updates| -|Select when Preview Builds and Feature Updates are received | 32 - Semi-annual Channel. Device gets feature updates from Semi-annual Channel| Specifies how frequently devices receive preview builds and feature updates.| -|Allow auto update | 4 - Auto-installs and restarts without device-user control | When an auto update is available, it auto-installs and restarts the device without any input or action from the device user.| -|Configure automatic updates | 3 - Set to install at 3am | Scheduled time to install updates.| -|Update power policy for cart restarts | 1 - Configured| Skips all restart checks to ensure that the reboot will happen at the scheduled install time. | -|Select when Preview Builds and Feature Updates are received | 365 days | Defers Feature Updates for the specified number of days. When not specified, defaults to 365 days.| -|Allow all trusted apps | Disabled | Prevents untrusted apps from being installed to device | -|Allow developer unlock | Disabled | Students cannot unlock the PC and use it in developer mode | -|Allow Cortana | Disabled | Cortana is not allowed on the device. -|Allow manual MDM unenrollment | Disabled | Students cannot remove the mobile device manager from their device. | -|Settings page visibility|Enabled |Specific pages in the System Settings app are not visible or accessible to students.| -|Allow add provisioning package | Disabled | Students cannot add and upload new provisioning packages to their device. | -|Allow remove provisioning package | Disabled | Students cannot remove packages that you've uploaded to their device, including the Set up School PCs app | -|Start Layout|Enabled |Lets you specify the Start layout for users and prevents them from changing the configuration.| -|Import Edge Assets| Enabled| Import Microsoft Edge assets, such as PNG and JPG files, for secondary tiles on the Start layout. Tiles will appear as weblinks and will be tied to the relevant image asset files.| -|Allow pinned folder downloads|1 - The shortcut is visible and disables the setting in the Settings app |Makes the Downloads shortcut on the Start menu visible to students.| -|Allow pinned folder File Explorer|1 - The shortcut is visible and disables the setting in the Settings app |Makes the File Explorer shortcut on the Start menu visible to students.| -|Personalization | Deploy lock screen image | Set to the image you picked when you customized the lock screen during device setup. If you didn't customize the image, the computer will show the default. | Deploys a jpg, jpeg, or png image to be used as lock screen image on the device. -|Personalization| Lock screen image URL| Image filename| You can specify a jpg, jpeg, or png image to be used as the device lock screen image. This setting can take an http or https URL to a remote image to be downloaded, or a file URLto an existing local image. -|Update|Active hours end | 5 PM | There will be no update reboots before this time. | -|Update|Active hours start | 7 AM | There will be no update reboots after this time. | -|Updates Windows | Nightly | Sets Windows to update on a nightly basis. | +| Policy name | Default value | Description | +|-------------------------------------------------------------|--------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Authority | User-defined | Authenticates the admin user. Value is set automatically when signed in to Azure AD. | +| BPRT | User-defined | Value is set automatically when signed in to Azure AD. Allows you to create the provisioning package. | +| WLAN Setting | XML is generated from the Wi-Fi profile in the Set up School PCs app. | Configures settings for wireless connectivity. | +| Hide OOBE for desktop | True | Hides the interactive OOBE flow for Windows 10. | +| Download Mode | 1 - HTTP blended with peering behind the same NAT | Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps, and App updates | +| Select when Preview Builds and Feature Updates are received | 32 - Semi-annual Channel. Device gets feature updates from Semi-annual Channel | Specifies how frequently devices receive preview builds and feature updates. | +| Allow auto update | 4 - Auto-installs and restarts without device-user control | When an auto update is available, it auto-installs and restarts the device without any input or action from the device user. | +| Configure automatic updates | 3 - Set to install at 3am | Scheduled time to install updates. | +| Update power policy for cart restarts | 1 - Configured | Skips all restart checks to ensure that the reboot will happen at the scheduled install time. | +| Select when Preview Builds and Feature Updates are received | 365 days | Defers Feature Updates for the specified number of days. When not specified, defaults to 365 days. | +| Allow all trusted apps | Disabled | Prevents untrusted apps from being installed to device | +| Allow developer unlock | Disabled | Students cannot unlock the PC and use it in developer mode | +| Allow Cortana | Disabled | Cortana is not allowed on the device. | +| Allow manual MDM unenrollment | Disabled | Students cannot remove the mobile device manager from their device. | +| Settings page visibility | Enabled | Specific pages in the System Settings app are not visible or accessible to students. | +| Allow add provisioning package | Disabled | Students cannot add and upload new provisioning packages to their device. | +| Allow remove provisioning package | Disabled | Students cannot remove packages that you've uploaded to their device, including the Set up School PCs app | +| Start Layout | Enabled | Lets you specify the Start layout for users and prevents them from changing the configuration. | +| Import Edge Assets | Enabled | Import Microsoft Edge assets, such as PNG and JPG files, for secondary tiles on the Start layout. Tiles will appear as weblinks and will be tied to the relevant image asset files. | +| Allow pinned folder downloads | 1 - The shortcut is visible and disables the setting in the Settings app | Makes the Downloads shortcut on the Start menu visible to students. | +| Allow pinned folder File Explorer | 1 - The shortcut is visible and disables the setting in the Settings app | Makes the File Explorer shortcut on the Start menu visible to students. | +| Personalization | Deploy lock screen image | Set to the image you picked when you customized the lock screen during device setup. If you didn't customize the image, the computer will show the default. | +| Personalization | Lock screen image URL | Image filename | +| Update | Active hours end | 5 PM | +| Update | Active hours start | 7 AM | +| Updates Windows | Nightly | Sets Windows to update on a nightly basis. | ## Apps uninstalled from Windows 10 devices Set up School PCs app uses the Universal app uninstall policy. This policy identifies default apps that are not relevant to the classroom experience, and uninstalls them from each device. ALl apps uninstalled from Windows 10 devices include: diff --git a/education/windows/set-up-school-pcs-technical.md b/education/windows/set-up-school-pcs-technical.md index 23e8378dc8..5808bdcd4d 100644 --- a/education/windows/set-up-school-pcs-technical.md +++ b/education/windows/set-up-school-pcs-technical.md @@ -58,7 +58,7 @@ The following table describes the Set up School PCs app features and lists each | [Settings roaming](https://azure.microsoft.com/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) **via Azure AD** | | | | X | | Synchronize student and application data across devices for a personalized experience. | | | | | -> [!NOTE] +> [!NOTE] > If your school uses Active Directory, use [Windows Configuration > Designer](set-up-students-pcs-to-join-domain.md) > to configure your PCs to join the domain. You can only use the Set up School diff --git a/education/windows/set-up-students-pcs-to-join-domain.md b/education/windows/set-up-students-pcs-to-join-domain.md index a72bf722c9..22ee5f98f0 100644 --- a/education/windows/set-up-students-pcs-to-join-domain.md +++ b/education/windows/set-up-students-pcs-to-join-domain.md @@ -38,31 +38,31 @@ Follow the steps in [Provision PCs with common settings for initial deployment ( 3. Find the **SharedPC** settings group. - Set **EnableSharedPCMode** to **TRUE** to configure the PC for shared use. 4. (Optional) To configure the PC for secure testing, follow these steps. - 1. Under **Runtime settings**, go to **AssignedAccess > AssignedAccessSettings**. - 2. Enter **{"Account":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "}**, using the account that you want to set up. + 1. Under **Runtime settings**, go to **AssignedAccess > AssignedAccessSettings**. + 2. Enter **{"Account":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "}**, using the account that you want to set up. - **Figure 7** - Add the account to use for test-taking + **Figure 7** - Add the account to use for test-taking - ![Add the account to use for test-taking](images/wcd_settings_assignedaccess.png) + ![Add the account to use for test-taking](images/wcd_settings_assignedaccess.png) - The account can be in one of the following formats: - - username - - domain\username - - computer name\\username - - username@tenant.com + The account can be in one of the following formats: + - username + - domain\username + - computer name\\username + - username@tenant.com - 3. Under **Runtime settings**, go to **TakeATest** and configure the following settings: - 1. In **LaunchURI**, enter the assessment URL. - 2. In **TesterAccount**, enter the test account you entered in the previous step. + 3. Under **Runtime settings**, go to **TakeATest** and configure the following settings: + 1. In **LaunchURI**, enter the assessment URL. + 2. In **TesterAccount**, enter the test account you entered in the previous step. 5. To configure other settings to make Windows education ready, see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) and follow the guidance on what settings you can set using Windows Configuration Designer. 6. Follow the steps to [build a package](https://technet.microsoft.com/itpro/windows/configure/provisioning-create-package#build-package). - - You will see the file path for your provisioning package. By default, this is set to %windir%\Users\*your_username*\Windows Imaging and Configuration Designer (WICD)\*Project name*). - - Copy the provisioning package to a USB drive. + - You will see the file path for your provisioning package. By default, this is set to %windir%\Users\*your_username\Windows Imaging and Configuration Designer (WICD)\*Project name). + - Copy the provisioning package to a USB drive. - > [!IMPORTANT] - > When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. + > [!IMPORTANT] + > When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. ## Apply package diff --git a/education/windows/take-a-test-multiple-pcs.md b/education/windows/take-a-test-multiple-pcs.md index cd8384cac2..f1ee030a57 100644 --- a/education/windows/take-a-test-multiple-pcs.md +++ b/education/windows/take-a-test-multiple-pcs.md @@ -52,23 +52,23 @@ You can set up a test-taking account in Intune for Education. To do this, follow ![Add a test profile in Intune for Education](images/i4e_takeatestprofile_addnewprofile.png) 3. In the new profile page: - 1. Enter a name for the profile. - 2. Enter the assessment URL. - 3. Toggle the switch to **Allow screen capture**. - 4. Select a user account to use as the test-taking account. - 5. Click **Save**. + 1. Enter a name for the profile. + 2. Enter the assessment URL. + 3. Toggle the switch to **Allow screen capture**. + 4. Select a user account to use as the test-taking account. + 5. Click **Save**. - **Figure 3** - Add information about the test profile + **Figure 3** - Add information about the test profile - ![Add information about the test profile](images/i4e_takeatestprofile_newtestaccount.png) + ![Add information about the test profile](images/i4e_takeatestprofile_newtestaccount.png) - After you save the test profile, you will see a summary of the settings that you configured for Take a Test. Next, you'll need to assign the test profile to a group that will be using the test account. + After you save the test profile, you will see a summary of the settings that you configured for Take a Test. Next, you'll need to assign the test profile to a group that will be using the test account. -4. In the test account page, click **Groups**. +4. In the test account page, click **Groups**. - **Figure 4** - Assign the test account to a group + **Figure 4** - Assign the test account to a group - ![Assign the test account to a group](images/i4e_takeatestprofile_accountsummary.png) + ![Assign the test account to a group](images/i4e_takeatestprofile_accountsummary.png) 5. In the **Groups** page, click **Change group assignments**. @@ -77,12 +77,12 @@ You can set up a test-taking account in Intune for Education. To do this, follow ![Change group assignments](images/i4e_takeatestprofile_groups_changegroupassignments.png) 6. In the **Change group assignments** page: - 1. Select a group from the right column and click **Add Members** to select the group and assign the test-taking account to that group. You can select more than one group. - 2. Click **OK** when you're done making your selection. + 1. Select a group from the right column and click **Add Members** to select the group and assign the test-taking account to that group. You can select more than one group. + 2. Click **OK** when you're done making your selection. - **Figure 6** - Select the group(s) that will use the test account + **Figure 6** - Select the group(s) that will use the test account - ![Select the groups that will use the test account](images/i4e_takeatestprofile_groupassignment_selected.png) + ![Select the groups that will use the test account](images/i4e_takeatestprofile_groupassignment_selected.png) And that's it! When the students from the selected group sign in to the student PCs using the Take a Test user name that you selected, the PC will be locked down and Take a Test will open the assessment URL and students can start taking tests. @@ -91,8 +91,8 @@ You can configure a dedicated testing account through MDM or Configuration Manag **Best practice** - Create a single account in the directory specifically for test taking - - Active Directory example: Contoso\TestAccount - - Azure Active Directory example: testaccount@contoso.com + - Active Directory example: Contoso\TestAccount + - Azure Active Directory example: testaccount@contoso.com - Deploy the policies to the group of test-taking devices @@ -101,14 +101,14 @@ You can configure a dedicated testing account through MDM or Configuration Manag 1. Launch your management console. 2. Create a policy to set up single app kiosk mode using the following values: - - **Custom OMA-DM URI** = ./Vendor/MSFT/AssignedAccess/KioskModeApp - - **String value** = {"*Account*":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "} + - **Custom OMA-DM URI** = ./Vendor/MSFT/AssignedAccess/KioskModeApp + - **String value** = {"*Account*":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "} - *Account* can be in one of the following formats: - - username (not recommended) - - domain\username - - computer name\\username (not recommended) - - username@tenant.com + *Account* can be in one of the following formats: + - username (not recommended) + - domain\username + - computer name\\username (not recommended) + - username@tenant.com 3. Create a policy to configure the assessment URL using the following values: @@ -130,28 +130,28 @@ To set up a test account through Windows Configuration Designer, follow these st 1. [Install Windows Configuration Designer](https://technet.microsoft.com/itpro/windows/configure/provisioning-install-icd). 2. Create a provisioning package by following the steps in [Provision PCs with common settings for initial deployment (desktop wizard)](https://technet.microsoft.com/itpro/windows/configure/provision-pcs-for-initial-deployment). However, make a note of these other settings to customize the test account. - 1. After you're done with the wizard, do not click **Create**. Instead, click the **Switch to advanced editor** to switch the project to the advanced editor to see all the available **Runtine settings**. - 2. Under **Runtime settings**, go to **AssignedAccess > AssignedAccessSettings**. - 3. Enter **{"Account":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "}**, using the account that you want to set up. + 1. After you're done with the wizard, do not click **Create**. Instead, click the **Switch to advanced editor** to switch the project to the advanced editor to see all the available **Runtine settings**. + 2. Under **Runtime settings**, go to **AssignedAccess > AssignedAccessSettings**. + 3. Enter **{"Account":"*redmond\\kioskuser*","AUMID":” Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App "}**, using the account that you want to set up. - **Figure 7** - Add the account to use for test-taking + **Figure 7** - Add the account to use for test-taking - ![Add the account to use for test-taking](images/wcd_settings_assignedaccess.png) + ![Add the account to use for test-taking](images/wcd_settings_assignedaccess.png) - The account can be in one of the following formats: - - username - - domain\username - - computer name\\username - - username@tenant.com + The account can be in one of the following formats: + - username + - domain\username + - computer name\\username + - username@tenant.com - 4. Under **Runtime settings**, go to **TakeATest** and configure the following settings: - 1. In **LaunchURI**, enter the assessment URL. - 2. In **TesterAccount**, enter the test account you entered in step 3. + 4. Under **Runtime settings**, go to **TakeATest** and configure the following settings: + 1. In **LaunchURI**, enter the assessment URL. + 2. In **TesterAccount**, enter the test account you entered in step 3. 3. Follow the steps to [build a package](https://technet.microsoft.com/itpro/windows/configure/provisioning-create-package#build-package). - - You will see the file path for your provisioning package. By default, this is set to %windir%\Users\*your_username*\Windows Imaging and Configuration Designer (WICD)\*Project name*). - - Copy the provisioning package to a USB drive. + - You will see the file path for your provisioning package. By default, this is set to %windir%\Users\*your_username\Windows Imaging and Configuration Designer (WICD)\*Project name). + - Copy the provisioning package to a USB drive. 4. Follow the steps in [Apply a provisioning package](https://technet.microsoft.com/itpro/windows/configure/provisioning-apply-package) to apply the package that you created. @@ -207,17 +207,17 @@ Anything hosted on the web can be presented in a locked down manner, not just as **To provide a link to the test** 1. Create the link to the test using schema activation. - - Create a link using a web UI + - Create a link using a web UI - For this option, you can just copy the assessment URL, select the options you want to allow during the test, and click a button to create the link. We recommend this for option for teachers. + For this option, you can just copy the assessment URL, select the options you want to allow during the test, and click a button to create the link. We recommend this for option for teachers. - To get started, go here: [Create a link using a web UI](https://education.microsoft.com/courses-and-resources/windows-10-create-a-take-a-test-link). + To get started, go here: [Create a link using a web UI](https://education.microsoft.com/courses-and-resources/windows-10-create-a-take-a-test-link). - - Create a link using schema activation + - Create a link using schema activation - You can accomplish the same thing as the first option (using a web UI), by manually embedding a URL with a specific prefix. You can select parameters depending on what you want to enable. + You can accomplish the same thing as the first option (using a web UI), by manually embedding a URL with a specific prefix. You can select parameters depending on what you want to enable. - For more info, see [Create a link using schema activation](#create-a-link-using-schema-activation). + For more info, see [Create a link using schema activation](#create-a-link-using-schema-activation). 2. Distribute the link. @@ -232,20 +232,20 @@ One of the ways you can present content in a locked down manner is by embedding 1. Embed a link or create a desktop shortcut with: - ``` - ms-edu-secureassessment:#enforceLockdown - ``` + ``` + ms-edu-secureassessment:#enforceLockdown + ``` 2. To enable printing, screen capture, or both, use the above link and append one of these parameters: - - `&enableTextSuggestions` - Enables text suggestions - - `&requirePrinting` - Enables printing - - `&enableScreenCapture` - Enables screen capture - - `&requirePrinting&enableScreenCapture` - Enables printing and screen capture; you can use a combination of `&enableTextSuggestions`, `&requirePrinting`, and `&enableScreenCapture` if you want to enable more than one capability. + - `&enableTextSuggestions` - Enables text suggestions + - `&requirePrinting` - Enables printing + - `&enableScreenCapture` - Enables screen capture + - `&requirePrinting&enableScreenCapture` - Enables printing and screen capture; you can use a combination of `&enableTextSuggestions`, `&requirePrinting`, and `&enableScreenCapture` if you want to enable more than one capability. - If you exclude these parameters, the default behavior is disabled. + If you exclude these parameters, the default behavior is disabled. - For tests that utilizes the Windows lockdown API, which checks for running processes before locking down, remove `enforceLockdown`. Removing `enforceLockdown` will result in the app not locking down immediately, which allows you to close apps that are not allowed to run during lockdown. The test web application may lock down the device once you have closed the apps. + For tests that utilizes the Windows lockdown API, which checks for running processes before locking down, remove `enforceLockdown`. Removing `enforceLockdown` will result in the app not locking down immediately, which allows you to close apps that are not allowed to run during lockdown. The test web application may lock down the device once you have closed the apps. > [!NOTE] > The Windows 10, version 1607 legacy configuration, `ms-edu-secureassessment:!enforcelockdown` is still supported, but not in combination with the new parameters. diff --git a/education/windows/take-a-test-single-pc.md b/education/windows/take-a-test-single-pc.md index 5735ed9223..bb20a3760e 100644 --- a/education/windows/take-a-test-single-pc.md +++ b/education/windows/take-a-test-single-pc.md @@ -28,31 +28,31 @@ To configure the assessment URL and a dedicated testing account on a single PC, 2. Open the **Settings** app and go to **Accounts > Access work or school**. 3. Click **Set up an account for taking tests**. - **Figure 1** - Use the Settings app to set up a test-taking account + **Figure 1** - Use the Settings app to set up a test-taking account - ![Use the Settings app to set up a test-taking account](images/tat_settingsapp_workorschoolaccess_setuptestaccount.png) + ![Use the Settings app to set up a test-taking account](images/tat_settingsapp_workorschoolaccess_setuptestaccount.png) 4. In the **Set up an account for taking tests** window, choose an existing account to use as the dedicated testing account. - **Figure 2** - Choose the test-taking account + **Figure 2** - Choose the test-taking account - ![Choose the test-taking account](images/tat_settingsapp_setuptesttakingaccount_1703.png) + ![Choose the test-taking account](images/tat_settingsapp_setuptesttakingaccount_1703.png) > [!NOTE] > If you don't have an account on the device, you can create a new account. To do this, go to **Settings > Accounts > Other people > Add someone else to this PC > I don’t have this person’s sign-in information > Add a user without a Microsoft account**. 5. In the **Set up an account for taking tests**, enter the assessment URL in the field under **Enter the test's web address**. 6. Select the options you want to enable during the test. - - To enable printing, select **Require printing**. + - To enable printing, select **Require printing**. > [!NOTE] > Make sure a printer is preconfigured on the Take a Test account if you're enabling this option. - - To enable teachers to monitor screens, select **Allow screen monitoring**. - - To allow text suggestions, select **Allow text suggestions**. + - To enable teachers to monitor screens, select **Allow screen monitoring**. + - To allow text suggestions, select **Allow text suggestions**. -6. Click **Save**. -7. To take the test, the student must sign in using the test-taking account that you created. +7. Click **Save**. +8. To take the test, the student must sign in using the test-taking account that you created. ## Provide a link to the test Anything hosted on the web can be presented in a locked down manner, not just assessments. To lock down online content, just embed a URL with a specific prefix and devices will be locked down when users follow the link. We recommend using this method for lower stakes assessments. @@ -61,29 +61,29 @@ Anything hosted on the web can be presented in a locked down manner, not just as 1. Create the link to the test. - There are different ways you can do this: - - Create a link using a web UI + There are different ways you can do this: + - Create a link using a web UI - For this option, you can just copy the assessment URL, select the options you want to allow during the test, and click a button to create the link. We recommend this for option for teachers. + For this option, you can just copy the assessment URL, select the options you want to allow during the test, and click a button to create the link. We recommend this for option for teachers. - To get started, go here: [Create a link using a web UI](https://education.microsoft.com/courses-and-resources/windows-10-create-a-take-a-test-link). + To get started, go here: [Create a link using a web UI](https://education.microsoft.com/courses-and-resources/windows-10-create-a-take-a-test-link). - - Create a link using schema activation + - Create a link using schema activation - You can accomplish the same thing as the first option (using a web UI), by manually embedding a URL with a specific prefix. You can select parameters depending on what you want to enable. + You can accomplish the same thing as the first option (using a web UI), by manually embedding a URL with a specific prefix. You can select parameters depending on what you want to enable. - For more info, see [Create a link using schema activation](#create-a-link-using-schema-activation). + For more info, see [Create a link using schema activation](#create-a-link-using-schema-activation). 2. Distribute the link. - Once the links are created, you can distribute them through the web, email, OneNote, or any other method of your choosing. + Once the links are created, you can distribute them through the web, email, OneNote, or any other method of your choosing. - You can also create shortcuts to distribute the link. For more info, see [Create a shortcut for the test link](#create-a-shortcut-for-the-test-link). + You can also create shortcuts to distribute the link. For more info, see [Create a shortcut for the test link](#create-a-shortcut-for-the-test-link). 3. To take the test, have the students click on the link and provide user consent. - > [!NOTE] - > If you enabled printing, the printer must be preconfigured for the account before the student takes the test. + > [!NOTE] + > If you enabled printing, the printer must be preconfigured for the account before the student takes the test. ### Create a link using schema activation @@ -93,20 +93,20 @@ One of the ways you can present content in a locked down manner is by embedding 1. Embed a link or create a desktop shortcut with: - ``` - ms-edu-secureassessment:#enforceLockdown - ``` + ``` + ms-edu-secureassessment:#enforceLockdown + ``` 2. To enable printing, screen capture, or both, use the above link and append one of these parameters: - - `&enableTextSuggestions` - Enables text suggestions - - `&requirePrinting` - Enables printing - - `&enableScreenCapture` - Enables screen capture - - `&requirePrinting&enableScreenCapture` - Enables printing and screen capture; you can use a combination of `&enableTextSuggestions`, `&requirePrinting`, and `&enableScreenCapture` if you want to enable more than one capability. + - `&enableTextSuggestions` - Enables text suggestions + - `&requirePrinting` - Enables printing + - `&enableScreenCapture` - Enables screen capture + - `&requirePrinting&enableScreenCapture` - Enables printing and screen capture; you can use a combination of `&enableTextSuggestions`, `&requirePrinting`, and `&enableScreenCapture` if you want to enable more than one capability. - If you exclude these parameters, the default behavior is disabled. + If you exclude these parameters, the default behavior is disabled. - For tests that utilizes the Windows lockdown API, which checks for running processes before locking down, remove `enforceLockdown`. Removing `enforceLockdown` will result in the app not locking down immediately, which allows you to close apps that are not allowed to run during lockdown. The test web application may lock down the device once you have closed the apps. + For tests that utilizes the Windows lockdown API, which checks for running processes before locking down, remove `enforceLockdown`. Removing `enforceLockdown` will result in the app not locking down immediately, which allows you to close apps that are not allowed to run during lockdown. The test web application may lock down the device once you have closed the apps. > [!NOTE] > The Windows 10, version 1607 legacy configuration, `ms-edu-secureassessment:!enforcelockdown` is still supported, but not in combination with the new parameters. diff --git a/education/windows/take-tests-in-windows-10.md b/education/windows/take-tests-in-windows-10.md index 6c28ad5469..cad3303266 100644 --- a/education/windows/take-tests-in-windows-10.md +++ b/education/windows/take-tests-in-windows-10.md @@ -41,22 +41,22 @@ There are several ways to configure devices for assessments. You can: There are different methods to configure the assessment URL and a dedicated testing account depending on whether you're setting up Take a Test on a single PC or multiple PCs. - - **For a single PC** + - **For a single PC** - You can use the Windows 10 **Settings** application. For more info, see [Set up Take a Test on a single PC](take-a-test-single-pc.md). + You can use the Windows 10 **Settings** application. For more info, see [Set up Take a Test on a single PC](take-a-test-single-pc.md). - - **For multiple PCs** + - **For multiple PCs** - You can use any of these methods: - - Mobile device management (MDM) or Microsoft System Center Configuration Manager - - A provisioning package created in Windows Configuration Designer - - Group Policy to deploy a scheduled task that runs a Powershell script + You can use any of these methods: + - Mobile device management (MDM) or Microsoft System Center Configuration Manager + - A provisioning package created in Windows Configuration Designer + - Group Policy to deploy a scheduled task that runs a Powershell script - Beginning with Windows 10 Creators Update (version 1703), you can also configure Take a Test using these options: - - Set up School PCs app - - Intune for Education + Beginning with Windows 10 Creators Update (version 1703), you can also configure Take a Test using these options: + - Set up School PCs app + - Intune for Education - For more info about these methods, see [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md). + For more info about these methods, see [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md). - **Distribute the assessment URL through the web, email, OneNote, or any other method of your choosing. You can also create shortcuts to distribute the link** diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index a94a8ba8cf..d20b5ec239 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -242,7 +242,7 @@ For help with activation issues, click on the appropriate link below for support

          1 Internet access fees may apply.
          -2 Devices must be configured for educational use by applying **[SetEduPolicies](https://docs.microsoft.com/education/windows/configure-windows-for-education#setedupolicies)** using the Set up School PCs app.
          +2 Devices must be configured for educational use by applying SetEduPolicies using the Set up School PCs app.

          diff --git a/education/windows/use-set-up-school-pcs-app.md b/education/windows/use-set-up-school-pcs-app.md index 95b8972f96..4c9d0245bd 100644 --- a/education/windows/use-set-up-school-pcs-app.md +++ b/education/windows/use-set-up-school-pcs-app.md @@ -89,8 +89,8 @@ We recommend that you: * Configure your DHCP so at least 200 IP addresses are available for your devices. Having available IP addresses will allow you to set up many devices simultaneously. * Configure your IP addresses to expire after a short time--about 30 minutes. IP addresses will free up quickly so you can continue to set up devices without network issues. ->> [!WARNING] -> Only use the provisioning package on PCs that you want to configure and lock down for students. After you apply the provisioning package to a student PC, the PC must be reset to remove the settings. +> > [!WARNING] +> > Only use the provisioning package on PCs that you want to configure and lock down for students. After you apply the provisioning package to a student PC, the PC must be reset to remove the settings. ### Use an additional USB drive To set up more than one PC at the same time, save the provisioning package to additional USB drives. Then plug the USBs in at the same time during setup. diff --git a/mdop/agpm/agpm-server-tab-agpm30ops.md b/mdop/agpm/agpm-server-tab-agpm30ops.md index abf3c535d2..184530ce23 100644 --- a/mdop/agpm/agpm-server-tab-agpm30ops.md +++ b/mdop/agpm/agpm-server-tab-agpm30ops.md @@ -36,7 +36,7 @@ The maximum number of unique versions to store for each GPO does not include the When a GPO version is deleted, a record of that version remains in the history of the GPO, but the GPO version itself is deleted from the archive. You can prevent a GPO version from being deleted by marking it in the history as not deletable. -  + ### Additional references @@ -46,9 +46,9 @@ When a GPO version is deleted, a record of that version remains in the history o - [Performing Reviewer Tasks](performing-reviewer-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/agpm-server-tab-agpm40.md b/mdop/agpm/agpm-server-tab-agpm40.md index 45bde742b9..6e0807ad30 100644 --- a/mdop/agpm/agpm-server-tab-agpm40.md +++ b/mdop/agpm/agpm-server-tab-agpm40.md @@ -36,7 +36,7 @@ The maximum number of unique versions to store for each GPO does not include the When a GPO version is deleted, a record of that version remains in the history of the GPO, but the GPO version itself is deleted from the archive. You can prevent a GPO version from being deleted by marking it in the history as not deletable. -  + ### Additional references @@ -46,9 +46,9 @@ When a GPO version is deleted, a record of that version remains in the history o - [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md b/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md index 8045845e1d..90d438d2f0 100644 --- a/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md +++ b/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   If an Approver's e-mail address is included in the **To e-mail address** field on the **Domain** **Delegation** tab, the Approver will receive e-mail from the AGPM alias when an Editor or Reviewer submits a request. -   + ### Additional considerations @@ -52,9 +52,9 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne - [Performing Approver Tasks](performing-approver-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md b/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md index 3323f73d29..cba1a90592 100644 --- a/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md +++ b/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   If an Approver's e-mail address is included in the **To e-mail address** field on the **Domain** **Delegation** tab, the Approver will receive e-mail from the AGPM alias when an Editor or Reviewer submits a request. -   + ### Additional considerations @@ -52,9 +52,9 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne - [Performing Approver Tasks](performing-approver-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/approve-or-reject-a-pending-action.md b/mdop/agpm/approve-or-reject-a-pending-action.md index 235e9e039c..08603a71fc 100644 --- a/mdop/agpm/approve-or-reject-a-pending-action.md +++ b/mdop/agpm/approve-or-reject-a-pending-action.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   If an Approver's e-mail address is included in the **To** field on the **Domain** **Delegation** tab, the Approver will receive e-mail from the AGPM alias when an Editor or Reviewer submits a request. -   + ### Additional considerations @@ -52,9 +52,9 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne - [Performing Approver Tasks](performing-approver-tasks.md) -  + -  + diff --git a/mdop/agpm/back-up-the-archive-agpm40.md b/mdop/agpm/back-up-the-archive-agpm40.md index 1472e31534..e07a0de456 100644 --- a/mdop/agpm/back-up-the-archive-agpm40.md +++ b/mdop/agpm/back-up-the-archive-agpm40.md @@ -34,7 +34,7 @@ A user account that has access to both the AGPM Server—the computer on which t **Note**   If an AGPM Administrator backs up the archive infrequently, the Group Policy Objects (GPOs) in the archive backup will not be current. To better ensure that the archive backup is current, back up the archive as part of your organization’s daily backup strategy. -  + ### Additional references @@ -44,9 +44,9 @@ If an AGPM Administrator backs up the archive infrequently, the Group Policy Obj - [Managing the Archive](managing-the-archive-agpm40.md) -  + -  + diff --git a/mdop/agpm/back-up-the-archive.md b/mdop/agpm/back-up-the-archive.md index a24a1ffa63..a85193dcac 100644 --- a/mdop/agpm/back-up-the-archive.md +++ b/mdop/agpm/back-up-the-archive.md @@ -34,7 +34,7 @@ A user account that has access to both the AGPM Server—the computer on which t **Note**   If an AGPM Administrator backs up the archive infrequently, the Group Policy Objects (GPOs) in the archive backup will not be current. To better ensure that the archive backup is current, back up the archive as part of your organization’s daily backup strategy. -  + ### Additional references @@ -44,9 +44,9 @@ If an AGPM Administrator backs up the archive infrequently, the Group Policy Obj - [Managing the Archive](managing-the-archive.md) -  + -  + diff --git a/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md b/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md index 119101341b..4b298d6115 100644 --- a/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md +++ b/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md @@ -33,17 +33,17 @@ In Advanced Group Policy Management (AGPM), both the AGPM Service and the archiv

          Delegate access to Group Policy Objects (GPOs) in the archive.

          -

          [Delegate Domain-Level Access to the Archive](delegate-domain-level-access-to-the-archive-agpm40.md)

          -

          [Delegate Access to an Individual GPO in the Archive](delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md)

          +

          Delegate Domain-Level Access to the Archive

          +

          Delegate Access to an Individual GPO in the Archive

          Back up the archive to enable disaster recovery.

          -

          [Back Up the Archive](back-up-the-archive-agpm40.md)

          +

          Back Up the Archive

          -  + @@ -59,33 +59,33 @@ In Advanced Group Policy Management (AGPM), both the AGPM Service and the archiv - + - + - + - +

          Restore the archive from a backup to recover from a disaster.

          [Restore the Archive from a Backup](restore-the-archive-from-a-backup-agpm40.md)

          Restore the Archive from a Backup

          Move the AGPM Service, the archive, or both to a different server.

          [Move the AGPM Server and the Archive](move-the-agpm-server-and-the-archive-agpm40.md)

          Move the AGPM Server and the Archive

          Change the archive path, the AGPM Service Account, or the port on which the AGPM Service listens.

          [Modify the AGPM Service](modify-the-agpm-service-agpm40.md)

          Modify the AGPM Service

          Troubleshoot common problems with the AGPM Server.

          [Troubleshooting AGPM](troubleshooting-agpm-agpm40.md)

          -

          [Configure Logging and Tracing](configure-logging-and-tracing-agpm40.md)

          Troubleshooting AGPM

          +

          Configure Logging and Tracing

          -  + ### Additional references - [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md) -  + -  + diff --git a/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md b/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md index 2820f91efd..51a6f1f128 100644 --- a/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md +++ b/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md @@ -33,17 +33,17 @@ In Advanced Group Policy Management (AGPM), both the AGPM Service and the archiv

          Delegate access to Group Policy Objects (GPOs) in the archive.

          -

          [Delegate Domain-Level Access to the Archive](delegate-domain-level-access-to-the-archive-agpm30ops.md)

          -

          [Delegate Access to an Individual GPO in the Archive](delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md)

          +

          Delegate Domain-Level Access to the Archive

          +

          Delegate Access to an Individual GPO in the Archive

          Back up the archive to enable disaster recovery.

          -

          [Back Up the Archive](back-up-the-archive.md)

          +

          Back Up the Archive

          -  + @@ -59,33 +59,33 @@ In Advanced Group Policy Management (AGPM), both the AGPM Service and the archiv - + - + - + - +

          Restore the archive from a backup to recover from a disaster.

          [Restore the Archive from a Backup](restore-the-archive-from-a-backup.md)

          Restore the Archive from a Backup

          Move the AGPM Service, the archive, or both to a different server.

          [Move the AGPM Server and the Archive](move-the-agpm-server-and-the-archive.md)

          Move the AGPM Server and the Archive

          Change the archive path, the AGPM Service Account, or the port on which the AGPM Service listens.

          [Modify the AGPM Service](modify-the-agpm-service-agpm30ops.md)

          Modify the AGPM Service

          Troubleshoot common problems with the AGPM Server.

          [Troubleshooting Advanced Group Policy Management](troubleshooting-advanced-group-policy-management-agpm30ops.md)

          -

          [Configure Logging and Tracing](configure-logging-and-tracing-agpm30ops.md)

          Troubleshooting Advanced Group Policy Management

          +

          Configure Logging and Tracing

          -  + ### Additional references - [Operations Guide for Microsoft Advanced Group Policy Management 3.0](operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md index 07913b01e7..25fa7701f1 100644 --- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md +++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md @@ -33,41 +33,41 @@ In an environment where multiple people make changes to Group Policy Objects (GP

          Editor requests the creation of a new GPO or an Approver creates a new GPO.

          -

          [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm30ops.md)

          -

          [Create a New Controlled GPO](create-a-new-controlled-gpo-agpm30ops.md)

          +

          Request the Creation of a New Controlled GPO

          +

          Create a New Controlled GPO

          Approver approves the creation of the GPO if it was requested by an Editor.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm30ops.md)

          +

          Approve or Reject a Pending Action

          Editor checks out a copy of the GPO from the archive, so no one else can modify the GPO. Editor makes changes to the GPO, and then checks the modified GPO into the archive.

          -

          [Edit a GPO Offline](edit-a-gpo-offline-agpm30ops.md)

          +

          Edit a GPO Offline

          Editor requests deployment of the GPO to the production environment.

          -

          [Request Deployment of a GPO](request-deployment-of-a-gpo-agpm30ops.md)

          +

          Request Deployment of a GPO

          Reviewers, such as Approvers or Editors, analyze the GPO.

          -

          [Performing Reviewer Tasks](performing-reviewer-tasks-agpm30ops.md)

          +

          Performing Reviewer Tasks

          Approver approves and deploys the GPO to the production environment or rejects the GPO.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm30ops.md)

          +

          Approve or Reject a Pending Action

          -  + ### Additional references [Operations Guide for Microsoft Advanced Group Policy Management 3.0](operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md index 69f0aff557..a95a9654f7 100644 --- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md +++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md @@ -33,45 +33,45 @@ In an environment where multiple people change Group Policy Objects (GPOs) by us

          Editor requests that a new GPO be created or an Approver creates a new GPO.

          -

          [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm40.md)

          -

          [Create a New Controlled GPO](create-a-new-controlled-gpo-agpm40.md)

          +

          Request the Creation of a New Controlled GPO

          +

          Create a New Controlled GPO

          Approver approves the creation of the GPO if it was requested by an Editor.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm40.md)

          +

          Approve or Reject a Pending Action

          Editor checks out a copy of the GPO from the archive so that no one else can modify the GPO. Editor makes changes to the GPO, and then checks the modified GPO into the archive.

          -

          [Edit a GPO Offline](edit-a-gpo-offline-agpm40.md)

          +

          Edit a GPO Offline

          If developing in a test forest, Editor exports the GPO to a file, transfers the file to the production forest, and imports the file. Additionally, an Editor can link the GPO to an organizational unit that contains test computers and users.

          -

          [Using a Test Environment](using-a-test-environment.md)

          +

          Using a Test Environment

          Editor requests deployment of the GPO to the production environment of the domain.

          -

          [Request Deployment of a GPO](request-deployment-of-a-gpo-agpm40.md)

          +

          Request Deployment of a GPO

          Reviewers, such as Approvers or Editors, analyze the GPO.

          -

          [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md)

          +

          Performing Reviewer Tasks

          Approver approves and deploys the GPO to the production environment of the domain or rejects the GPO.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm40.md)

          +

          Approve or Reject a Pending Action

          -  + ### Additional references [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md) -  + -  + diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md index 1045a5ae06..fcb032c722 100644 --- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md +++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md @@ -33,37 +33,37 @@ In an environment where multiple people make changes to Group Policy objects (GP

          Editor requests the creation of a new GPO or an Approver creates a new GPO.

          -

          [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo.md)

          -

          [Create a New Controlled GPO](create-a-new-controlled-gpo.md)

          +

          Request the Creation of a New Controlled GPO

          +

          Create a New Controlled GPO

          Approver approves the creation of the GPO if it was requested by an Editor.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action.md)

          +

          Approve or Reject a Pending Action

          Editor checks out a copy of the GPO from the archive, so no one else can modify the GPO. Editor makes changes to the GPO, and then checks the modified GPO into the archive.

          -

          [Edit a GPO Offline](edit-a-gpo-offline.md)

          +

          Edit a GPO Offline

          Editor requests deployment of the GPO to the production environment.

          -

          [Request Deployment of a GPO](request-deployment-of-a-gpo.md)

          +

          Request Deployment of a GPO

          Reviewers, such as Approvers or Editors, analyze the GPO.

          -

          [Performing Reviewer Tasks](performing-reviewer-tasks.md)

          +

          Performing Reviewer Tasks

          Approver approves and deploys the GPO to the production environment or rejects the GPO.

          -

          [Approve or Reject a Pending Action](approve-or-reject-a-pending-action.md)

          +

          Approve or Reject a Pending Action

          -  + -  + -  + diff --git a/mdop/agpm/choosing-which-version-of-agpm-to-install.md b/mdop/agpm/choosing-which-version-of-agpm-to-install.md index 934b06e83f..c5b9d72127 100644 --- a/mdop/agpm/choosing-which-version-of-agpm-to-install.md +++ b/mdop/agpm/choosing-which-version-of-agpm-to-install.md @@ -56,7 +56,7 @@ Table 1 lists the operating systems on which you can install AGPM 4.0 SP3, and

          Windows Server 2012 R2

          Windows 10

          -

          Supported with the caveats outlined in [KB 4015786](https://support.microsoft.com/help/4015786/known-issues-managing-a-windows-10-group-policy-client-in-windows-serv) +

          Supported with the caveats outlined in KB 4015786

          @@ -92,7 +92,7 @@ Table 1 lists the operating systems on which you can install AGPM 4.0 SP3, and -  + ## AGPM 4.0 SP2 @@ -150,7 +150,7 @@ Table 1 lists the operating systems on which you can install AGPM 4.0 SP2, and -  + ## AGPM 4.0 SP1 @@ -201,7 +201,7 @@ Table 2 lists the operating systems on which you can install AGPM 4.0 SP1, and t -  + ## AGPM 4.0 @@ -247,7 +247,7 @@ Table 3 lists the operating systems on which you can install AGPM 4.0, and the p -  + ## Versions of AGPM that precede AGPM 4.0 @@ -287,7 +287,7 @@ Table 4 lists the operating systems on which you can install the versions of AGP -  + ## How to Get MDOP Technologies @@ -299,9 +299,9 @@ AGPM 4.0 SP2 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP i [Advanced Group Policy Management](index.md) -  + -  + diff --git a/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md b/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md index 0a6c740b1a..4e4802cb36 100644 --- a/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md +++ b/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md @@ -24,7 +24,7 @@ By encrypting AGPM e-mail notifications, you can better protect those that could **Caution**   Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on the computer. -  + A user account that has the AGPM Administrator (Full Control) role, the user account of the Approver who created the Group Policy Object (GPO) used in these procedures, or a user account that has the necessary permissions in AGPM is required to complete these procedures. Review the details in "Additional considerations" in this topic. @@ -82,9 +82,9 @@ A user account that has the AGPM Administrator (Full Control) role, the user acc - [Configuring Advanced Group Policy Management](configuring-advanced-group-policy-management.md) -  + -  + diff --git a/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md b/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md index b0311c3ed6..e4c204dcf0 100644 --- a/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md +++ b/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md @@ -24,7 +24,7 @@ By encrypting AGPM e-mail notifications, you can better protect those that could **Caution**   Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on the computer. -  + A user account that has the AGPM Administrator (Full Control) role, the user account of the Approver who created the Group Policy Object (GPO) used in these procedures, or a user account that has the necessary permissions in AGPM is required to complete these procedures. Review the details in "Additional considerations" in this topic. @@ -78,9 +78,9 @@ A user account that has the AGPM Administrator (Full Control) role, the user acc - [Configuring Advanced Group Policy Management](configuring-advanced-group-policy-management-agpm40.md) -  + -  + diff --git a/mdop/agpm/create-a-template-agpm30ops.md b/mdop/agpm/create-a-template-agpm30ops.md index 7d976f6c37..406acb5276 100644 --- a/mdop/agpm/create-a-template-agpm30ops.md +++ b/mdop/agpm/create-a-template-agpm30ops.md @@ -22,7 +22,7 @@ Creating a template enables you to save all of the settings of a particular vers **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management (AGPM) is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -52,9 +52,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/create-a-template-agpm40.md b/mdop/agpm/create-a-template-agpm40.md index acec837279..c8a1e97a01 100644 --- a/mdop/agpm/create-a-template-agpm40.md +++ b/mdop/agpm/create-a-template-agpm40.md @@ -22,7 +22,7 @@ Creating a template enables you to save all of the settings of a particular vers **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management (AGPM) is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -52,9 +52,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm40.md) -  + -  + diff --git a/mdop/agpm/create-a-template.md b/mdop/agpm/create-a-template.md index 454f143fc1..d0db0eb513 100644 --- a/mdop/agpm/create-a-template.md +++ b/mdop/agpm/create-a-template.md @@ -22,7 +22,7 @@ Creating a template enables you to save all of the settings of a particular vers **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -52,9 +52,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo.md) -  + -  + diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md index 1a916e3bf2..d35b5810d4 100644 --- a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md +++ b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md @@ -34,15 +34,15 @@ Some potential uses for a template include the following: **Note**   A template is a static version of a GPO that cannot be edited, yet can be used as a starting point for creating new, editable GPOs. Renaming or deleting a template does not affect GPOs created from that template. -  + - [Create a Template](create-a-template-agpm30ops.md) - [Set a Default Template](set-a-default-template-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md index 5ac61c82c4..a3981ca8a0 100644 --- a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md +++ b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md @@ -34,15 +34,15 @@ Some potential uses for a template include the following: **Note**   A template is a static version of a GPO that cannot be edited, yet can be used as a starting point for creating new, editable GPOs. Renaming or deleting a template does not affect GPOs created from that template. -  + - [Create a Template](create-a-template-agpm40.md) - [Set a Default Template](set-a-default-template-agpm40.md) -  + -  + diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template.md b/mdop/agpm/creating-a-template-and-setting-a-default-template.md index bfdf6f7ae8..79e1c3682d 100644 --- a/mdop/agpm/creating-a-template-and-setting-a-default-template.md +++ b/mdop/agpm/creating-a-template-and-setting-a-default-template.md @@ -22,15 +22,15 @@ Creating a template enables you to save all of the settings of a particular vers **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. Renaming or deleting a template does not impact GPOs created from that template. -  + - [Create a Template](create-a-template.md) - [Set a Default Template](set-a-default-template.md) -  + -  + diff --git a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md index 14df79cb4c..3c102e5273 100644 --- a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md +++ b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md @@ -34,14 +34,14 @@ A user account with the AGPM Administrator (Full Control) role, the user account **Note**   If a user or group inherits domain-wide access, the **Remove** button is unavailable. You can modify domain-wide access on the **Domain Delegation** tab. -   + 3. To modify the roles and permissions delegated to a user or group, click the **Advanced** button. In the **Permissions** dialog box, select the user or group, select the check box for each role to be assigned to that user or group, and click **OK**. **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -57,9 +57,9 @@ A user account with the AGPM Administrator (Full Control) role, the user account - [Managing the Archive](managing-the-archive.md) -  + -  + diff --git a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md index 1d5cab244e..f5124591cc 100644 --- a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md +++ b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md @@ -34,14 +34,14 @@ A user account with the AGPM Administrator (Full Control) role, the user account **Note**   If a user or group inherits domain-wide access, the **Remove** button is unavailable. You can modify domain-wide access on the **Domain Delegation** tab. -   + 3. To modify the roles and permissions delegated to a user or group, click the **Advanced** button. In the **Permissions** dialog box, select the user or group, select the check box for each role to be assigned to that user or group, and click **OK**. **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -57,9 +57,9 @@ A user account with the AGPM Administrator (Full Control) role, the user account - [Managing the Archive](managing-the-archive-agpm40.md) -  + -  + diff --git a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md index d45e8f5d17..3d5ef495b1 100644 --- a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md +++ b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md @@ -36,7 +36,7 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -52,9 +52,9 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm - [Managing the Archive](managing-the-archive.md) -  + -  + diff --git a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md index d2ea2f37e1..f1aa01ad7e 100644 --- a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md +++ b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md @@ -36,7 +36,7 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -52,9 +52,9 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm - [Managing the Archive](managing-the-archive-agpm40.md) -  + -  + diff --git a/mdop/agpm/delegate-domain-level-access.md b/mdop/agpm/delegate-domain-level-access.md index 34cf70127e..da327eae2f 100644 --- a/mdop/agpm/delegate-domain-level-access.md +++ b/mdop/agpm/delegate-domain-level-access.md @@ -32,7 +32,7 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm **Note**   Editor and Approver include Reviewer permissions. -   + 4. In the **Advanced Security Settings** dialog box, select a Group Policy administrator, and then click **Edit**. @@ -56,9 +56,9 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm - [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks.md) -  + -  + diff --git a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md index dfd93f9d27..2a17a1e42b 100644 --- a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md +++ b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md @@ -34,14 +34,14 @@ A user account with the AGPM Administrator (Full Control) role, the user account **Note**   If a user or group inherits domain-wide access, the **Remove** button is unavailable. You can modify domain-wide access on the **Domain Delegation** tab. -   + 3. To modify the roles and permissions delegated to a user or group, click the **Advanced** button. In the **Permissions** dialog box, select the user or group, select the check box for each role to be assigned to that user or group, and then click **OK**. **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -55,9 +55,9 @@ A user account with the AGPM Administrator (Full Control) role, the user account - [Creating, Controlling, or Importing a GPO](creating-controlling-or-importing-a-gpo-editor-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md index fc0b0fa130..19b09da4c5 100644 --- a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md +++ b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md @@ -34,14 +34,14 @@ A user account with the AGPM Administrator (Full Control) role, the user account **Note**   If a user or group inherits domain-wide access, the **Remove** button is unavailable. You can modify domain-wide access on the **Domain Delegation** tab. -   + 3. To modify the roles and permissions delegated to a user or group, click the **Advanced** button. In the **Permissions** dialog box, select the user or group, select the check box for each role to be assigned to that user or group, and then click **OK**. **Note**   Editor and Approver include Reviewer permissions. -   + ### Additional considerations @@ -55,9 +55,9 @@ A user account with the AGPM Administrator (Full Control) role, the user account - [Creating or Controlling a GPO](creating-or-controlling-a-gpo-agpm40-app.md) -  + -  + diff --git a/mdop/agpm/deploy-a-gpo-agpm30ops.md b/mdop/agpm/deploy-a-gpo-agpm30ops.md index bb2b420849..15b54d327d 100644 --- a/mdop/agpm/deploy-a-gpo-agpm30ops.md +++ b/mdop/agpm/deploy-a-gpo-agpm30ops.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify whether the most recent version of a GPO has been deployed, on the **Controlled** tab, double-click the GPO to display its **History**. In the **History** for the GPO, the **State** column indicates whether a GPO has been deployed. -  + ### Additional considerations @@ -52,9 +52,9 @@ To verify whether the most recent version of a GPO has been deployed, on the **C - [Performing Approver Tasks](performing-approver-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/deploy-a-gpo-agpm40.md b/mdop/agpm/deploy-a-gpo-agpm40.md index f9af5a9fc8..d24c1562ea 100644 --- a/mdop/agpm/deploy-a-gpo-agpm40.md +++ b/mdop/agpm/deploy-a-gpo-agpm40.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify whether the most recent version of a GPO has been deployed, on the **Controlled** tab, double-click the GPO to display its **History**. In the **History** for the GPO, the **State** column indicates whether a GPO has been deployed. -  + ### Additional considerations @@ -52,9 +52,9 @@ To verify whether the most recent version of a GPO has been deployed, on the **C - [Performing Approver Tasks](performing-approver-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/deploy-a-gpo.md b/mdop/agpm/deploy-a-gpo.md index 68f2ffda9d..6cccb83b8a 100644 --- a/mdop/agpm/deploy-a-gpo.md +++ b/mdop/agpm/deploy-a-gpo.md @@ -42,7 +42,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify whether the most recent version of a GPO has been deployed, on the **Controlled** tab, double-click the GPO to display its **History**. In the **History** for the GPO, the **State** column indicates whether a GPO has been deployed. -  + ### Additional considerations @@ -52,9 +52,9 @@ To verify whether the most recent version of a GPO has been deployed, on the **C - [Performing Approver Tasks](performing-approver-tasks.md) -  + -  + diff --git a/mdop/agpm/edit-a-gpo-offline-agpm30ops.md b/mdop/agpm/edit-a-gpo-offline-agpm30ops.md index e2d68c2dbc..5518d46244 100644 --- a/mdop/agpm/edit-a-gpo-offline-agpm30ops.md +++ b/mdop/agpm/edit-a-gpo-offline-agpm30ops.md @@ -57,7 +57,7 @@ To edit a GPO, you check out the GPO from the archive, edit the GPO offline, and **Note**   To disable all Computer Configuration settings or all User Configuration settings, right-click the GPO in the **Group Policy Management Editor** window and click **Properties**. Select **Disable Computer Configuration settings** or **Disable User Configuration settings** as appropriate. -   + 3. When you have finished modifying the GPO, close the **Group Policy Management Editor** window. @@ -101,9 +101,9 @@ To edit a GPO, you check out the GPO from the archive, edit the GPO offline, and - [Deploy a GPO](deploy-a-gpo-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/edit-a-gpo-offline-agpm40.md b/mdop/agpm/edit-a-gpo-offline-agpm40.md index 83ee120136..4f311a1cc3 100644 --- a/mdop/agpm/edit-a-gpo-offline-agpm40.md +++ b/mdop/agpm/edit-a-gpo-offline-agpm40.md @@ -57,7 +57,7 @@ To edit a GPO, you check out the GPO from the archive, edit the GPO offline, and **Note**   To disable all Computer Configuration settings or all User Configuration settings, right-click the GPO in the **Group Policy Management Editor** window and click **Properties**. Select **Disable Computer Configuration settings** or **Disable User Configuration settings** as appropriate. -   + 3. When you have finished modifying the GPO, close the **Group Policy Management Editor** window. @@ -101,9 +101,9 @@ To edit a GPO, you check out the GPO from the archive, edit the GPO offline, and - [Deploy a GPO](deploy-a-gpo-agpm40.md) -  + -  + diff --git a/mdop/agpm/history-window-agpm30ops.md b/mdop/agpm/history-window-agpm30ops.md index 36d184af14..c3295c3095 100644 --- a/mdop/agpm/history-window-agpm30ops.md +++ b/mdop/agpm/history-window-agpm30ops.md @@ -49,7 +49,7 @@ The tabs within the **History** window filter the states in the history of the G -  + ## Event information @@ -88,11 +88,10 @@ Information is provided for each state in the history of the GPO.

          Deletable

          Whether this version of the GPO can be deleted if the number of unique versions of each GPO retained in the archive is limited.

          -Note   -

          You can modify whether a version of a GPO is deletable by right-clicking it and then clicking Do Not Allow Deletion or Allow Deletion.

          +Note

          You can modify whether a version of a GPO is deletable by right-clicking it and then clicking Do Not Allow Deletion or Allow Deletion.

          -  +
          @@ -114,7 +113,7 @@ Information is provided for each state in the history of the GPO. -  + ## Reports @@ -144,7 +143,7 @@ The **Settings** and **Differences** buttons display reports about GPO settings -  + ### Key to difference reports @@ -185,7 +184,7 @@ The **Settings** and **Differences** buttons display reports about GPO settings -  + - For items with changed settings, the changed settings are identified when the item is expanded. The value for the attribute in each GPO is displayed in the same order that the GPOs are displayed in the report. @@ -195,9 +194,9 @@ The **Settings** and **Differences** buttons display reports about GPO settings - [Contents Tab](contents-tab-agpm30ops.md) -  - -  + + + diff --git a/mdop/agpm/history-window-agpm40.md b/mdop/agpm/history-window-agpm40.md index f899c458b3..7603d75dd5 100644 --- a/mdop/agpm/history-window-agpm40.md +++ b/mdop/agpm/history-window-agpm40.md @@ -49,7 +49,7 @@ The tabs within the **History** window filter the states in the history of the G -  + ## Event information @@ -88,11 +88,10 @@ Information is provided for each state in the history of the GPO.

          Deletable

          Whether this version of the GPO can be deleted if the number of unique versions of each GPO retained in the archive is limited.

          -Note   -

          You can change whether a version of a GPO can be deleted by right-clicking the GPO and then clicking Do Not Allow Deletion or Allow Deletion.

          +Note

          You can change whether a version of a GPO can be deleted by right-clicking the GPO and then clicking Do Not Allow Deletion or Allow Deletion.

          -  +
          @@ -114,7 +113,7 @@ Information is provided for each state in the history of the GPO. -  + ## Reports @@ -144,7 +143,7 @@ The **Settings** and **Differences** buttons display reports about GPO settings -  + ### Key to difference reports @@ -185,7 +184,7 @@ The **Settings** and **Differences** buttons display reports about GPO settings -  + - For items with changed settings, the changed settings are identified when the item is expanded. The value for the attribute in each GPO is displayed in the same order that the GPOs are displayed in the report. @@ -195,9 +194,9 @@ The **Settings** and **Differences** buttons display reports about GPO settings - [Contents Tab](contents-tab-agpm40.md) -  - -  + + + diff --git a/mdop/agpm/index.md b/mdop/agpm/index.md index c3b4414d7c..96315421b6 100644 --- a/mdop/agpm/index.md +++ b/mdop/agpm/index.md @@ -44,17 +44,17 @@ In addition to the product documentation available online, supplemental product

          MDOP Virtual Labs

          -

          For a list of available MDOP virtual labs, go to [Microsoft Desktop Optimization Pack (MDOP) Virtual Labs](https://go.microsoft.com/fwlink/?LinkId=234276) (https://go.microsoft.com/fwlink/?LinkId=234276).

          +

          For a list of available MDOP virtual labs, go to Microsoft Desktop Optimization Pack (MDOP) Virtual Labs (https://go.microsoft.com/fwlink/?LinkId=234276).

          MDOP TechCenter

          -

          For technical whitepapers, evaluation materials, blogs, and additional MDOP resources, go to [MDOP TechCenter](https://go.microsoft.com/fwlink/?LinkId=225286) (https://go.microsoft.com/fwlink/?LinkId=225286)

          +

          For technical whitepapers, evaluation materials, blogs, and additional MDOP resources, go to MDOP TechCenter (https://go.microsoft.com/fwlink/?LinkId=225286)

          -  + ## How to Get MDOP @@ -70,9 +70,9 @@ MDOP subscribers can download the software at the [Microsoft Volume Licensing we **Purchase MDOP** Visit the enterprise [Purchase Windows Enterprise Licensing](https://www.microsoft.com/windows/enterprise/how-to-buy.aspx) website to find out how to purchase MDOP for your business. -  + -  + diff --git a/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md b/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md index 4b71523caf..d119a83fa7 100644 --- a/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md +++ b/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md @@ -32,7 +32,7 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm **Important**   Only GPO versions displayed on the **Unique Versions** tab of the **History** window count toward the limit. -   + 4. Click the **Apply** button. @@ -46,9 +46,9 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm - [Managing the Archive](managing-the-archive.md) -  + -  + diff --git a/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md b/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md index 8950fcffb6..2570da4136 100644 --- a/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md +++ b/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md @@ -32,7 +32,7 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm **Important**   Only GPO versions displayed on the **Unique Versions** tab of the **History** window count toward the limit. -   + 4. Click the **Apply** button. @@ -46,9 +46,9 @@ A user account with the AGPM Administrator (Full Control) role or necessary perm - [Managing the Archive](managing-the-archive-agpm40.md) -  + -  + diff --git a/mdop/agpm/managing-the-agpm-service-agpm30ops.md b/mdop/agpm/managing-the-agpm-service-agpm30ops.md index dd84d8d402..9896b4a887 100644 --- a/mdop/agpm/managing-the-agpm-service-agpm30ops.md +++ b/mdop/agpm/managing-the-agpm-service-agpm30ops.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + - [Start and Stop the AGPM Service](start-and-stop-the-agpm-service-agpm30ops.md) @@ -34,9 +34,9 @@ Do not modify settings for the AGPM Service through **Administrative Tools** and - [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/managing-the-agpm-service-agpm40.md b/mdop/agpm/managing-the-agpm-service-agpm40.md index a67dd02255..96280adf4b 100644 --- a/mdop/agpm/managing-the-agpm-service-agpm40.md +++ b/mdop/agpm/managing-the-agpm-service-agpm40.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + - [Start and Stop the AGPM Service](start-and-stop-the-agpm-service-agpm40.md) @@ -34,9 +34,9 @@ Do not modify settings for the AGPM Service through **Administrative Tools** and - [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/managing-the-agpm-service.md b/mdop/agpm/managing-the-agpm-service.md index a4158688a0..174c061105 100644 --- a/mdop/agpm/managing-the-agpm-service.md +++ b/mdop/agpm/managing-the-agpm-service.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + - [Start and Stop the AGPM Service](start-and-stop-the-agpm-service.md) @@ -32,9 +32,9 @@ Do not modify settings for the AGPM Service through **Administrative Tools** and - [Modify the Port on Which the AGPM Service Listens](modify-the-port-on-which-the-agpm-service-listens.md) -  + -  + diff --git a/mdop/agpm/modify-the-agpm-service-account.md b/mdop/agpm/modify-the-agpm-service-account.md index 2046f75c10..21bd9e501c 100644 --- a/mdop/agpm/modify-the-agpm-service-account.md +++ b/mdop/agpm/modify-the-agpm-service-account.md @@ -24,7 +24,7 @@ The archive path and AGPM Service Account are configured during the installation **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + A user account that is a member of the Domain Admins group and has access to the AGPM Server (the computer on which Microsoft Advanced Group Policy Management - Server is installed) is required to complete this procedure. @@ -33,7 +33,7 @@ The AGPM Service Account must have full access to the GPOs that it will manage a If you will be managing GPOs on multiple domains or if a member server will be the AGPM Server, you should configure a different account as the AGPM Service Account because the Local System account for one domain controller cannot access GPOs on other domains. -  + **To modify the AGPM Service Account** @@ -57,9 +57,9 @@ If you will be managing GPOs on multiple domains or if a member server will be t - [Managing the AGPM Service](managing-the-agpm-service.md) -  + -  + diff --git a/mdop/agpm/modify-the-agpm-service-agpm30ops.md b/mdop/agpm/modify-the-agpm-service-agpm30ops.md index a67e0b4d03..ce08a4d000 100644 --- a/mdop/agpm/modify-the-agpm-service-agpm30ops.md +++ b/mdop/agpm/modify-the-agpm-service-agpm30ops.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + A user account that is a member of the Domain Admins group and has access to the AGPM Server (the computer on which Microsoft Advanced Group Policy Management - Server is installed) is required to complete this procedure. Additionally, you must provide credentials for the AGPM Service Account to complete this procedure. @@ -45,7 +45,7 @@ A user account that is a member of the Domain Admins group and has access to the **Important**   The archive path can point to a folder on the AGPM Server or elsewhere, but the location should have sufficient space to store all GPOs and history data managed by this AGPM Server. -   + 2. In the **AGPM Service Account** dialog box, enter credentials for a service account under which the AGPM Service will run, and click **Next**. @@ -56,14 +56,14 @@ A user account that is a member of the Domain Admins group and has access to the If you will be managing GPOs on multiple domains or if a member server will be the AGPM Server, you should configure a different account as the AGPM Service Account because the Local System account for one domain controller cannot access GPOs on other domains. -   + 3. In the **Archive Owner** dialog box, enter the user name of an AGPM Administrator (Full Control) or group of AGPM Administrators, and click **Next**. **Note**   Modifying the installation clears the credentials for the Archive Owner. You must re-enter credentials, but they are not required to match the credentials used during the original installation. -   + 4. In the **Port Configuration** dialog box, type a new port on which the AGPM Service should listen or confirm the port currently selected, and click **Next**. @@ -72,7 +72,7 @@ A user account that is a member of the Domain Admins group and has access to the If you manually configure port exceptions or have rules configuring port exceptions, you can clear the **Add port exception to firewall** check box. -   + 5. Click **Change**, and when the installation is complete click **Finish**. @@ -84,9 +84,9 @@ A user account that is a member of the Domain Admins group and has access to the - [Managing the AGPM Service](managing-the-agpm-service-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/modify-the-agpm-service-agpm40.md b/mdop/agpm/modify-the-agpm-service-agpm40.md index 567b557030..20ec5c3a65 100644 --- a/mdop/agpm/modify-the-agpm-service-agpm40.md +++ b/mdop/agpm/modify-the-agpm-service-agpm40.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -  + A user account that is a member of the Domain Admins group and has access to the AGPM Server (the computer on which Microsoft Advanced Group Policy Management - Server is installed) is required to complete this procedure. Additionally, you must provide credentials for the AGPM Service Account to complete this procedure. @@ -41,7 +41,7 @@ A user account that is a member of the Domain Admins group and has access to the **Important**   The archive path can point to a folder on the AGPM Server or elsewhere, but the location should have sufficient space to store all GPOs and history data managed by this AGPM Server. -   + 2. In the **AGPM Service Account** dialog box, enter credentials for a service account under which the AGPM Service will run, and click **Next**. @@ -52,14 +52,14 @@ A user account that is a member of the Domain Admins group and has access to the If you will be managing GPOs on multiple domains or if a member server will be the AGPM Server, you should configure a different account as the AGPM Service Account because the Local System account for one domain controller cannot access GPOs on other domains. -   + 3. In the **Archive Owner** dialog box, enter the user name of an AGPM Administrator (Full Control) or group of AGPM Administrators, and click **Next**. **Note**   Modifying the installation clears the credentials for the Archive Owner. You must re-enter credentials, but they are not required to match the credentials used during the original installation. -   + 4. In the **Port Configuration** dialog box, type a new port on which the AGPM Service should listen or confirm the port currently selected, and click **Next**. @@ -68,7 +68,7 @@ A user account that is a member of the Domain Admins group and has access to the If you manually configure port exceptions or have rules configuring port exceptions, you can clear the **Add port exception to firewall** check box. -   + 5. Click **Change**, and when the installation is complete click **Finish**. @@ -80,9 +80,9 @@ A user account that is a member of the Domain Admins group and has access to the - [Managing the AGPM Service](managing-the-agpm-service-agpm40.md) -  + -  + diff --git a/mdop/agpm/modify-the-archive-path.md b/mdop/agpm/modify-the-archive-path.md index 26d73805cc..0e52f280d7 100644 --- a/mdop/agpm/modify-the-archive-path.md +++ b/mdop/agpm/modify-the-archive-path.md @@ -44,7 +44,7 @@ A user account that is a member of the Domain Admins group and has access to the If you will be managing GPOs on multiple domains or if a member server will be the AGPM Server, you should configure a different account as the AGPM Service Account because the Local System account for one domain controller cannot access GPOs on other domains. -   + 3. For the archive owner, enter the credentials of an AGPM Administrator (Full Control). @@ -54,9 +54,9 @@ A user account that is a member of the Domain Admins group and has access to the - [Managing the AGPM Service](managing-the-agpm-service.md) -  + -  + diff --git a/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md b/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md index cce4742600..6ad27ab0b6 100644 --- a/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md +++ b/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Note**   Before modifying the port on which the AGPM Service listens, it is recommended that you back up the AGPM archive index file (gpostate.xml). This file is located in the folder entered as the archive path during the installation of Advanced Group Policy Management - Server. By default, this location of this file is %CommonAppData%\\Microsoft\\AGPM\\gpostate.xml on the AGPM Server. If you do not know which computer hosts the archive, you can follow the procedure for modifying the archive path to display the current archive path. For more information, see [Modify the Archive Path](modify-the-archive-path.md). -  + A user account with access to the AGPM Server (the computer on which the AGPM Service is installed) and the archive index file is required to complete this procedure. @@ -44,9 +44,9 @@ A user account with access to the AGPM Server (the computer on which the AGPM Se - [Managing the AGPM Service](managing-the-agpm-service.md) -  + -  + diff --git a/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md b/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md index 9581264c82..027abbaaa7 100644 --- a/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md +++ b/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md @@ -24,7 +24,7 @@ If you are replacing the AGPM Server and the server on which the archive is host - By default, the archive is hosted on the AGPM Server, but you can specify an archive path to host it on another server instead. -  + A user account that is a member of the Domain Admins group and has access to the previous and new AGPM Servers is required to complete this procedure. Additionally, you must provide credentials for the AGPM Service Account to be used by the new AGPM Server to complete this procedure. @@ -43,7 +43,7 @@ A user account that is a member of the Domain Admins group and has access to the **Note**   As a best practice, you should uninstall Microsoft Advanced Group Policy Management – Server from the previous AGPM Server. This will ensure that the AGPM Service cannot be unintentionally restarted on that server and potentially cause confusion if any AGPM Server connections to it remain. -   + 3. Copy the archive from the backup to the new server that will host the archive. For more information, see [Restore the Archive from a Backup](restore-the-archive-from-a-backup-agpm40.md). @@ -54,7 +54,7 @@ A user account that is a member of the Domain Admins group and has access to the 2. You must re-enter and confirm the password on the **Domain Delegation** tab. For more information, see [Configure E-Mail Notification](configure-e-mail-notification-agpm40.md). -   + ### Additional references @@ -72,9 +72,9 @@ A user account that is a member of the Domain Admins group and has access to the - [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/move-the-agpm-server-and-the-archive.md b/mdop/agpm/move-the-agpm-server-and-the-archive.md index 071df53b78..93f0d42c02 100644 --- a/mdop/agpm/move-the-agpm-server-and-the-archive.md +++ b/mdop/agpm/move-the-agpm-server-and-the-archive.md @@ -24,7 +24,7 @@ If you are replacing the AGPM Server and the server on which the archive is host - By default, the archive is hosted on the AGPM Server, but you can specify an archive path to host it on another server instead. -  + A user account that is a member of the Domain Admins group and has access to the previous and new AGPM Servers is required to complete this procedure. Additionally, you must provide credentials for the AGPM Service Account to be used by the new AGPM Server to complete this procedure. @@ -43,7 +43,7 @@ A user account that is a member of the Domain Admins group and has access to the **Note**   As a best practice, you should uninstall Microsoft Advanced Group Policy Management – Server from the previous AGPM Server. This will ensure that the AGPM Service cannot be unintentionally restarted on that server and potentially cause confusion if any AGPM Server connections to it remain. -   + 3. Copy the archive from the backup to the new server that will host the archive. For more information, see [Restore the Archive from a Backup](restore-the-archive-from-a-backup.md). @@ -54,7 +54,7 @@ A user account that is a member of the Domain Admins group and has access to the 2. You must re-enter and confirm the password on the **Domain Delegation** tab. For more information, see [Configure E-Mail Notification](configure-e-mail-notification-agpm30ops.md). -   + ### Additional references @@ -72,9 +72,9 @@ A user account that is a member of the Domain Admins group and has access to the - [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md b/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md index 81bf1531af..aa73d0ac46 100644 --- a/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md +++ b/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md @@ -38,7 +38,7 @@ Because the AGPM Administrator role includes the permissions for all other roles [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md), such as reviewing settings and comparing GPOs -  + ### Additional considerations @@ -68,9 +68,9 @@ By default, the AGPM Administrator role has Full Control—all AGPM permissions: The **Modify Options** and **Modify Security** permissions are unique to the role of AGPM Administrator. -  + -  + diff --git a/mdop/agpm/performing-approver-tasks-agpm30ops.md b/mdop/agpm/performing-approver-tasks-agpm30ops.md index 17aef02024..457707ad10 100644 --- a/mdop/agpm/performing-approver-tasks-agpm30ops.md +++ b/mdop/agpm/performing-approver-tasks-agpm30ops.md @@ -22,7 +22,7 @@ An Approver is a person authorized by an AGPM Administrator (Full Control) to cr **Important**   Make sure that you are connecting to the central archive for GPOs. For more information, see [Configure an AGPM Server Connection](configure-an-agpm-server-connection-reviewer-agpm30ops.md). -  + - [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm30ops.md) @@ -39,7 +39,7 @@ Make sure that you are connecting to the central archive for GPOs. For more info **Note**   Before approving a GPO, an Approver should review the policy settings that it contains. The Approver role includes the permissions for the Reviewer role, so that an Approver can review policy settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks-agpm30ops.md) for more information. -  + ### Additional considerations @@ -57,9 +57,9 @@ By default, the following permissions are provided for the Approver role: Also, an Approver has full control over GPOs that he created or controlled. -  + -  + diff --git a/mdop/agpm/performing-approver-tasks-agpm40.md b/mdop/agpm/performing-approver-tasks-agpm40.md index 0baa5cc043..8a19c9ecda 100644 --- a/mdop/agpm/performing-approver-tasks-agpm40.md +++ b/mdop/agpm/performing-approver-tasks-agpm40.md @@ -22,7 +22,7 @@ An Approver is a person authorized by an AGPM Administrator (Full Control) to cr **Important**   Make sure that you are connecting to the central archive for GPOs. For more information, see [Configure an AGPM Server Connection](configure-an-agpm-server-connection-agpm40.md). -  + - [Approve or Reject a Pending Action](approve-or-reject-a-pending-action-agpm40.md) @@ -39,7 +39,7 @@ Make sure that you are connecting to the central archive for GPOs. For more info **Note**   Before approving a GPO, an Approver should review the policy settings that it contains. The Approver role includes the permissions for the Reviewer role, so that an Approver can review policy settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md) for more information. -  + ### Additional considerations @@ -57,9 +57,9 @@ By default, the following permissions are provided for the Approver role: Also, an Approver has full control over GPOs that he created or controlled. -  + -  + diff --git a/mdop/agpm/performing-approver-tasks.md b/mdop/agpm/performing-approver-tasks.md index 1bb25ef566..ce05f48885 100644 --- a/mdop/agpm/performing-approver-tasks.md +++ b/mdop/agpm/performing-approver-tasks.md @@ -22,7 +22,7 @@ An Approver is a person authorized by an AGPM Administrator (Full Control) to cr **Important**   Ensure that you are connecting to the central archive for GPOs. For more information, see [Configure the AGPM Server Connection](configure-the-agpm-server-connection-reviewer.md). -  + - [Approve or Reject a Pending Action](approve-or-reject-a-pending-action.md) @@ -39,7 +39,7 @@ Ensure that you are connecting to the central archive for GPOs. For more informa **Note**   Because the Approver role includes the permissions for the Reviewer role, an Approver can also review settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks.md) for more information. -  + ### Additional considerations @@ -57,9 +57,9 @@ By default, the following permissions are provided for the Approver role: Also, an Approver has full control over GPOs that he created or controlled. -  + -  + diff --git a/mdop/agpm/performing-editor-tasks-agpm30ops.md b/mdop/agpm/performing-editor-tasks-agpm30ops.md index b38befa379..abc69827c2 100644 --- a/mdop/agpm/performing-editor-tasks-agpm30ops.md +++ b/mdop/agpm/performing-editor-tasks-agpm30ops.md @@ -22,7 +22,7 @@ An Editor is a person authorized by an AGPM Administrator (Full Control) to make **Important**   Ensure that you are connecting to the central archive for GPOs. For more information, see [Configure an AGPM Server Connection](configure-an-agpm-server-connection-reviewer-agpm30ops.md). -  + - [Creating, Controlling, or Importing a GPO](creating-controlling-or-importing-a-gpo-agpm30ops.md) @@ -35,7 +35,7 @@ Ensure that you are connecting to the central archive for GPOs. For more informa **Note**   Because the Editor role includes the permissions for the Reviewer role, an Editor can also review settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks-agpm30ops.md) for more information. -  + ### Additional considerations @@ -49,9 +49,9 @@ By default, the following permissions are provided for the Editor role: - Create Template -  + -  + diff --git a/mdop/agpm/performing-editor-tasks-agpm40.md b/mdop/agpm/performing-editor-tasks-agpm40.md index 82d108b281..b776479dfc 100644 --- a/mdop/agpm/performing-editor-tasks-agpm40.md +++ b/mdop/agpm/performing-editor-tasks-agpm40.md @@ -22,7 +22,7 @@ In Advanced Group Policy Management (AGPM), an Editor is a person authorized by **Important**   Make sure that you are connecting to the central archive for GPOs. For more information, see [Configure an AGPM Server Connection](configure-an-agpm-server-connection-agpm40.md). -  + - [Creating or Controlling a GPO](creating-or-controlling-a-gpo-agpm40-ed.md) @@ -39,7 +39,7 @@ Make sure that you are connecting to the central archive for GPOs. For more info **Note**   Because the Editor role includes the permissions for the Reviewer role, an Editor can also review settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md) for more information. -  + ### Additional considerations @@ -57,9 +57,9 @@ By default, the following permissions are provided for the Editor role: - Create Template -  + -  + diff --git a/mdop/agpm/performing-editor-tasks.md b/mdop/agpm/performing-editor-tasks.md index bcad7c8bb0..eeea2a652c 100644 --- a/mdop/agpm/performing-editor-tasks.md +++ b/mdop/agpm/performing-editor-tasks.md @@ -22,7 +22,7 @@ An Editor is a person authorized by an AGPM Administrator (Full Control) to make **Important**   Ensure that you are connecting to the central archive for GPOs. For more information, see [Configure the AGPM Server Connection](configure-the-agpm-server-connection-reviewer.md). -  + - [Creating, Controlling, or Importing a GPO](creating-controlling-or-importing-a-gpo-editor.md) @@ -35,7 +35,7 @@ Ensure that you are connecting to the central archive for GPOs. For more informa **Note**   Because the Editor role includes the permissions for the Reviewer role, an Editor can also review settings and compare GPOs. See [Performing Reviewer Tasks](performing-reviewer-tasks.md) for more information. -  + ### Additional considerations @@ -49,9 +49,9 @@ By default, the following permissions are provided for the Editor role: - Create Template -  + -  + diff --git a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md index f782b1e0c3..5eea73eb07 100644 --- a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md +++ b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md @@ -36,7 +36,7 @@ A user account with the Editor role or necessary permissions in Advanced Group P **Note**   If a GPO was deleted from the production environment, restoring it to the archive will not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO. For information, see [Deploy a GPO](deploy-a-gpo-agpm30ops.md). -  + ### Additional considerations @@ -48,9 +48,9 @@ If a GPO was deleted from the production environment, restoring it to the archiv - [Deleting, Restoring, or Destroying a GPO](deleting-restoring-or-destroying-a-gpo-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md index 9afa9d9981..9a569cc216 100644 --- a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md +++ b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md @@ -36,7 +36,7 @@ A user account with the Editor role or necessary permissions in Advanced Group P **Note**   If a GPO was deleted from the production environment, restoring it to the archive will not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO. For information, see [Request Deployment of a GPO](request-deployment-of-a-gpo-agpm40.md). -  + ### Additional considerations @@ -48,9 +48,9 @@ If a GPO was deleted from the production environment, restoring it to the archiv - [Deleting or Restoring a GPO](deleting-or-restoring-a-gpo-agpm40.md) -  + -  + diff --git a/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md b/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md index 342d6c7600..5f46d1b370 100644 --- a/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md +++ b/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md @@ -36,7 +36,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   If a GPO was deleted from the production environment, restoring it to the archive will not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO. For information, see [Deploy a GPO](deploy-a-gpo-agpm30ops.md). -  + ### Additional considerations @@ -46,9 +46,9 @@ If a GPO was deleted from the production environment, restoring it to the archiv - [Deleting, Restoring, or Destroying a GPO](deleting-restoring-or-destroying-a-gpo-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/restore-a-deleted-gpo-agpm40.md b/mdop/agpm/restore-a-deleted-gpo-agpm40.md index 3350340ca0..d68d3dc138 100644 --- a/mdop/agpm/restore-a-deleted-gpo-agpm40.md +++ b/mdop/agpm/restore-a-deleted-gpo-agpm40.md @@ -36,7 +36,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   If a GPO was deleted from the production environment, restoring it to the archive will not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO. For information, see [Deploy a GPO](deploy-a-gpo-agpm40.md). -  + ### Additional considerations @@ -46,9 +46,9 @@ If a GPO was deleted from the production environment, restoring it to the archiv - [Deleting, Restoring, or Destroying a GPO](deleting-restoring-or-destroying-a-gpo-agpm40.md) -  + -  + diff --git a/mdop/agpm/restore-a-deleted-gpo.md b/mdop/agpm/restore-a-deleted-gpo.md index aaa6e75e6d..27a79b4d0e 100644 --- a/mdop/agpm/restore-a-deleted-gpo.md +++ b/mdop/agpm/restore-a-deleted-gpo.md @@ -36,7 +36,7 @@ A user account with the Editor, Approver, or AGPM Administrator (Full Control) r **Note**   If a GPO was deleted from the production environment, restoring it to the archive will not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO. For information, see [Deploy a GPO](deploy-a-gpo.md). -  + ### Additional considerations @@ -46,9 +46,9 @@ If a GPO was deleted from the production environment, restoring it to the archiv - [Deleting, Restoring, or Destroying a GPO](deleting-restoring-or-destroying-a-gpo.md) -  + -  + diff --git a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md index 4495e614f3..14901c7456 100644 --- a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md +++ b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md @@ -36,7 +36,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify that the version that has been redeployed matches the version intended, examine a difference report for the two versions. In the **History** window for the GPO, highlight the two versions, and then right-click and select **Difference** and either **HTML Report** or **XML Report**. -  + ### Additional considerations @@ -46,9 +46,9 @@ To verify that the version that has been redeployed matches the version intended - [Performing Approver Tasks](performing-approver-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md index 70ecdf9cf9..2363f2055b 100644 --- a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md +++ b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md @@ -36,7 +36,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify that the version that has been redeployed matches the version intended, examine a difference report for the two versions. In the **History** window for the GPO, highlight the two versions, and then right-click and select **Difference** and either **HTML Report** or **XML Report**. -  + ### Additional considerations @@ -46,9 +46,9 @@ To verify that the version that has been redeployed matches the version intended - [Performing Approver Tasks](performing-approver-tasks.md) -  + -  + diff --git a/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md b/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md index 3e8f90b2c8..5a9b000943 100644 --- a/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md +++ b/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md @@ -36,7 +36,7 @@ A user account with the Approver or AGPM Administrator (Full Control) role or ne **Note**   To verify that the version that has been redeployed matches the version intended, examine a difference report for the two versions. In the **History** window for the GPO, highlight the two versions, and then right-click and select **Difference** and either **HTML Report** or **XML Report**. -  + ### Additional considerations @@ -46,9 +46,9 @@ To verify that the version that has been redeployed matches the version intended - [Performing Approver Tasks](performing-approver-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/set-a-default-template-agpm30ops.md b/mdop/agpm/set-a-default-template-agpm30ops.md index e1db68f7c0..aab61140e4 100644 --- a/mdop/agpm/set-a-default-template-agpm30ops.md +++ b/mdop/agpm/set-a-default-template-agpm30ops.md @@ -22,7 +22,7 @@ As an Editor, you can specify which of the available templates will be the defau **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management (AGPM) is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -54,9 +54,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/set-a-default-template-agpm40.md b/mdop/agpm/set-a-default-template-agpm40.md index 607827e3bd..68c165be29 100644 --- a/mdop/agpm/set-a-default-template-agpm40.md +++ b/mdop/agpm/set-a-default-template-agpm40.md @@ -22,7 +22,7 @@ As an Editor, you can specify which of the available templates will be the defau **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management (AGPM) is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -54,9 +54,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo-agpm40.md) -  + -  + diff --git a/mdop/agpm/set-a-default-template.md b/mdop/agpm/set-a-default-template.md index e898dea445..354b961123 100644 --- a/mdop/agpm/set-a-default-template.md +++ b/mdop/agpm/set-a-default-template.md @@ -22,7 +22,7 @@ As an Editor, you can specify which of the available templates will be the defau **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + A user account with the Editor or AGPM Administrator (Full Control) role or necessary permissions in Advanced Group Policy Management is required to complete this procedure. Review the details in "Additional considerations" in this topic. @@ -54,9 +54,9 @@ A user account with the Editor or AGPM Administrator (Full Control) role or nece - [Request the Creation of a New Controlled GPO](request-the-creation-of-a-new-controlled-gpo.md) -  + -  + diff --git a/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md b/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md index 09e1df9c24..bd04d77d92 100644 --- a/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md +++ b/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Important**   Stopping or disabling the AGPM Service will prevent AGPM Clients from performing any operations (such as listing or editing GPOs) through the server. -  + A user account with access to the AGPM Server (the computer on which the AGPM Service is installed) is required to complete this procedure. @@ -35,15 +35,15 @@ A user account with access to the AGPM Server (the computer on which the AGPM Se **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -   + ### Additional references - [Managing the AGPM Service](managing-the-agpm-service-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md b/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md index 5d09af3efc..7d19498e83 100644 --- a/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md +++ b/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Important**   Stopping or disabling the AGPM Service will prevent AGPM Clients from performing any operations (such as listing or editing GPOs) through the server. -  + A user account with access to the AGPM Server (the computer on which the AGPM Service is installed) is required to complete this procedure. @@ -35,15 +35,15 @@ A user account with access to the AGPM Server (the computer on which the AGPM Se **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. -   + ### Additional references - [Managing the AGPM Service](managing-the-agpm-service-agpm40.md) -  + -  + diff --git a/mdop/agpm/start-and-stop-the-agpm-service.md b/mdop/agpm/start-and-stop-the-agpm-service.md index 25c70d3eb6..05cb3f8cc5 100644 --- a/mdop/agpm/start-and-stop-the-agpm-service.md +++ b/mdop/agpm/start-and-stop-the-agpm-service.md @@ -22,7 +22,7 @@ The AGPM Service is a Windows service that acts as a security proxy, managing cl **Important**   Stopping or disabling the AGPM Service will prevent AGPM clients from performing any operations (such as listing or editing GPOs) through the server. -  + A user account with access to the AGPM Server (the computer on which the AGPM Service is installed) is required to complete this procedure. @@ -35,15 +35,15 @@ A user account with access to the AGPM Server (the computer on which the AGPM Se **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. To modify settings for the service, see [Managing the AGPM Service](managing-the-agpm-service.md). -   + ### Additional references - [Managing the AGPM Service](managing-the-agpm-service.md) -  + -  + diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md index b5f244c51b..b41ee4e572 100644 --- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md +++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md @@ -68,7 +68,7 @@ Archives cannot be migrated from an AGPM Server or a GPOVault Server running Win For Windows Server 2003, if GPOVault Server is installed on the computer on which you want to install AGPM Server, it is recommended that you do not uninstall GPOVault Server before beginning the installation. The installation of AGPM Server will uninstall GPOVault Server and automatically transfer your existing GPOVault archive data to an AGPM archive. -  + ### AGPM Client requirements @@ -81,16 +81,16 @@ Before you begin this scenario, create four user accounts. During the scenario, **Note**   **Link GPOs** permission is assigned to members of Domain Administrators and Enterprise Administrators by default. To assign **Link GPOs** permission to additional users or groups (such as accounts with the roles of AGPM Administrator or Approver), click the node for the domain and then click the **Delegation** tab, select **Link GPOs**, click **Add**, and select users or groups to which to assign the permission. -  + For this scenario, you perform actions with different accounts. You can either log on with each account as indicated, or you can use the **Run as** command to start the GPMC with the indicated account. **Note**   To use the **Run as** command with GPMC on Windows Server 2003, click **Start**, point to **Administrative Tools**, right-click **Group Policy Management**, and click **Run as**. Click **The following user** and enter credentials for an account. -To use the **Run as** command with GPMC on Windows Vista, click the **Start** button, point to **Run**, and type **runas /user:***DomainName\\UserName***"mmc %windir%\\system32\\gpmc.msc"**, and click **OK**. Type the password for the account when prompted. +To use the **Run as** command with GPMC on Windows Vista, click the **Start** button, point to **Run**, and type **runas /user:**DomainName\\UserName**"mmc %windir%\\system32\\gpmc.msc"**, and click **OK**. Type the password for the account when prompted. -  + ## Steps for installing and configuring AGPM @@ -134,7 +134,7 @@ In this step, you install AGPM Server on the member server or domain controller **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. For information on how to modify settings for the service, see Help for Advanced Group Policy Management. -   + ### Step 2: Install AGPM Client @@ -211,12 +211,12 @@ As an AGPM Administrator (Full Control), you delegate domain-level access to GPO **Note**   You can also delegate access at the GPO level rather than the domain level. For details, see Help for Advanced Group Policy Management. -  + **Important**   You should restrict membership in the Group Policy Creator Owners group, so it cannot be used to circumvent AGPM management of access to GPOs. (In the **Group Policy Management Console**, click **Group Policy Objects** in the forest and domain in which you want to manage GPOs, click **Delegation**, and then configure the settings to meet the needs of your organization.) -  + **To delegate access to all GPOs throughout a domain** @@ -512,7 +512,7 @@ Occasionally you may discover after deleting a GPO that it is still needed. In t **Note**   Restoring a GPO to the archive does not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO as in [Step 3: Review and deploy a GPO](#bkmk-manage3). -   + After editing and deploying a GPO, you may discover that recent changes to the GPO are causing a problem. In this step, you act as an Approver to roll back to a previous version of the GPO. You can roll back to any version in the history of the GPO. You can use comments and labels to identify known good versions and when specific changes were made. @@ -529,11 +529,11 @@ After editing and deploying a GPO, you may discover that recent changes to the G **Note**   To verify that the version that has been redeployed is the version intended, examine a difference report for the two versions. In the **History** window for the GPO, select the two versions, right-click them, point to **Difference**, and then click either **HTML Report** or **XML Report**. -   + -  + -  + diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md index 1a83ba048e..d593fc9011 100644 --- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md +++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md @@ -56,7 +56,7 @@ Computers on which you want to install AGPM must meet the following requirements **Note**   If you have AGPM 2.5 installed and are upgrading from Windows Server® 2003 to Windows Server 2008 or Windows Vista® with no service packs installed to Windows Vista with Service Pack 1, you must upgrade the operating system before you can upgrade to AGPM 3.0. -  + ### AGPM Server requirements @@ -105,7 +105,7 @@ Before you begin this scenario, create four user accounts. During the scenario, **Note**   **Link GPOs** permission is assigned to members of Domain Administrators and Enterprise Administrators by default. To assign **Link GPOs** permission to additional users or groups (such as accounts with the roles of AGPM Administrator or Approver), click the node for the domain and then click the **Delegation** tab, select **Link GPOs**, click **Add**, and select users or groups to which to assign the permission. -  + ## Steps for installing and configuring AGPM @@ -153,7 +153,7 @@ In this step, you install AGPM Server on the member server or domain controller **Caution**   Do not modify settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing so can prevent the AGPM Service from starting. For information on how to modify settings for the service, see Help for Advanced Group Policy Management. -   + ### Step 2: Install AGPM Client @@ -220,12 +220,12 @@ As an AGPM Administrator (Full Control), you delegate domain-level access to GPO **Note**   You can also delegate access at the GPO level rather than the domain level. For details, see Help for Advanced Group Policy Management. -  + **Important**   You should restrict membership in the Group Policy Creator Owners group, so it cannot be used to circumvent AGPM management of access to GPOs. (In the **Group Policy Management Console**, click **Group Policy Objects** in the forest and domain in which you want to manage GPOs, click **Delegation**, and then configure the settings to meet the needs of your organization.) -  + **To delegate access to all GPOs throughout a domain** @@ -348,31 +348,31 @@ In this step, you act as an Approver, creating reports and analyzing the setting **To review settings in the GPO** -1. On a computer on which you have installed AGPM Client, log on with a user account that has been assigned the role of Approver in AGPM. (Any Group Policy administrator with the Reviewer role, which is included in all of the other roles, can review the settings in a GPO.) +1. On a computer on which you have installed AGPM Client, log on with a user account that has been assigned the role of Approver in AGPM. (Any Group Policy administrator with the Reviewer role, which is included in all of the other roles, can review the settings in a GPO.) -2. Open the e-mail inbox for the account and note that you have received an e-mail message from the AGPM alias with an Editor's request to deploy a GPO. +2. Open the e-mail inbox for the account and note that you have received an e-mail message from the AGPM alias with an Editor's request to deploy a GPO. -3. In the **Group Policy Management Console** tree, click **Change Control** in the forest and domain in which you want to manage GPOs. +3. In the **Group Policy Management Console** tree, click **Change Control** in the forest and domain in which you want to manage GPOs. -4. On the **Contents** tab in the details pane, click the **Pending** tab. +4. On the **Contents** tab in the details pane, click the **Pending** tab. -5. Double-click **MyGPO** to display its history. +5. Double-click **MyGPO** to display its history. -6. Review the settings in the most recent version of MyGPO: +6. Review the settings in the most recent version of MyGPO: - 1. In the **History** window, right-click the GPO version with the most recent timestamp, click **Settings**, and then click **HTML Report** to display a summary of the GPO's settings. + 1. In the **History** window, right-click the GPO version with the most recent timestamp, click **Settings**, and then click **HTML Report** to display a summary of the GPO's settings. - 2. In the Web browser, click **show all** to display all of the settings in the GPO. Close the browser. + 2. In the Web browser, click **show all** to display all of the settings in the GPO. Close the browser. -7. Compare the most recent version of MyGPO to the first version checked in to the archive: +7. Compare the most recent version of MyGPO to the first version checked in to the archive: - 1. In the **History** window, click the GPO version with the most recent time stamp. Press CTRL and click the oldest GPO version for which the **Computer Version** is not **\***. + 1. In the **History** window, click the GPO version with the most recent time stamp. Press CTRL and click the oldest GPO version for which the **Computer Version** is not **\\***. - 2. Click the **Differences** button. The **Account Policies/Password Policy** section is highlighted in green and preceded by **\[+\]**, indicating that this setting is configured only in the latter version of the GPO. + 2. Click the **Differences** button. The **Account Policies/Password Policy** section is highlighted in green and preceded by **\[+\]**, indicating that this setting is configured only in the latter version of the GPO. - 3. Click **Account Policies/Password Policy**. The **Minimum password length** setting is also highlighted in green and preceded by **\[+\]**, indicating that it is configured only in the latter version of the GPO. + 3. Click **Account Policies/Password Policy**. The **Minimum password length** setting is also highlighted in green and preceded by **\[+\]**, indicating that it is configured only in the latter version of the GPO. - 4. Close the Web browser. + 4. Close the Web browser. **To deploy the GPO to the production environment** @@ -501,7 +501,7 @@ Occasionally you may discover after deleting a GPO that it is still needed. In t **Note**   Restoring a GPO to the archive does not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO as in [Step 3: Review and deploy a GPO](#bkmk-manage3). -   + After editing and deploying a GPO, you may discover that recent changes to the GPO are causing a problem. In this step, you act as an Approver to roll back to a previous version of the GPO. You can roll back to any version in the history of the GPO. You can use comments and labels to identify known good versions and when specific changes were made. @@ -518,11 +518,11 @@ After editing and deploying a GPO, you may discover that recent changes to the G **Note**   To verify that the version that has been redeployed is the version intended, examine a difference report for the two versions. In the **History** window for the GPO, select the two versions, right-click them, point to **Difference**, and then click either **HTML Report** or **XML Report**. -   + -  + -  + diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md index 465392169b..dc69096e0f 100644 --- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md +++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md @@ -60,7 +60,7 @@ If you have AGPM 2.5 installed and are upgrading from Windows Server® 2003 to If you have AGPM 3.0 installed, you do not have to upgrade the operating system before you upgrade to AGPM 4.0 -  + In a mixed environment that includes both newer and older operating systems, there are some limitations to functionality, as indicated in the following table. @@ -101,7 +101,7 @@ In a mixed environment that includes both newer and older operating systems, the -  + ### AGPM Server requirements @@ -162,7 +162,7 @@ Before you begin this scenario, create four user accounts. During the scenario, **Note**   **Link GPOs** permission is assigned to members of Domain Administrators and Enterprise Administrators by default. To assign **Link GPOs** permission to additional users or groups (such as accounts that have the roles of AGPM Administrator or Approver), click the node for the domain and then click the **Delegation** tab, select **Link GPOs**, click **Add**, and select users or groups to which you want to assign the permission. -  + ## Steps for installing and configuring AGPM @@ -222,7 +222,7 @@ In this step, you install AGPM Server on the member server or domain controller **Caution**   Do not change settings for the AGPM Service through **Administrative Tools** and **Services** in the operating system. Doing this can prevent the AGPM Service from starting. For information about how to change settings for the service, see Help for Advanced Group Policy Management. -   + ### Step 2: Install AGPM Client @@ -289,12 +289,12 @@ As an AGPM Administrator (Full Control), you delegate domain-level access to GPO **Note**   You can also delegate access at the GPO level instead of the domain level. For more information, see Help for Advanced Group Policy Management. -  + **Important**   You should restrict membership in the Group Policy Creator Owners group so that it cannot be used to circumvent AGPM management of access to GPOs. (In the **Group Policy Management Console**, click **Group Policy Objects** in the forest and domain in which you want to manage GPOs, click **Delegation**, and then configure the settings to meet the needs of your organization.) -  + **To delegate access to all GPOs throughout a domain** @@ -417,31 +417,31 @@ In this step, you act as an Approver, creating reports and analyzing the setting **To review settings in the GPO** -1. On a computer on which you have installed AGPM Client, log on with a user account that is assigned the role of Approver in AGPM. Any Group Policy administrator with the Reviewer role, which is included in all of the other roles, can review the settings in a GPO. +1. On a computer on which you have installed AGPM Client, log on with a user account that is assigned the role of Approver in AGPM. Any Group Policy administrator with the Reviewer role, which is included in all of the other roles, can review the settings in a GPO. -2. Open the e-mail inbox for the account and notice that you have received an e-mail message from the AGPM alias with an Editor's request to deploy a GPO. +2. Open the e-mail inbox for the account and notice that you have received an e-mail message from the AGPM alias with an Editor's request to deploy a GPO. -3. In the **Group Policy Management Console** tree, click **Change Control** in the forest and domain in which you want to manage GPOs. +3. In the **Group Policy Management Console** tree, click **Change Control** in the forest and domain in which you want to manage GPOs. -4. On the **Contents** tab in the details pane, click the **Pending** tab. +4. On the **Contents** tab in the details pane, click the **Pending** tab. -5. Double-click **MyGPO** to display its history. +5. Double-click **MyGPO** to display its history. -6. Review the settings in the most recent version of MyGPO: +6. Review the settings in the most recent version of MyGPO: - 1. In the **History** window, right-click the GPO version with the most recent time stamp, click **Settings**, and then click **HTML Report** to display a summary of the GPO's settings. + 1. In the **History** window, right-click the GPO version with the most recent time stamp, click **Settings**, and then click **HTML Report** to display a summary of the GPO's settings. - 2. In the Web browser, click **show all** to display all the settings in the GPO. Close the browser. + 2. In the Web browser, click **show all** to display all the settings in the GPO. Close the browser. -7. Compare the most recent version of MyGPO to the first version checked in to the archive: +7. Compare the most recent version of MyGPO to the first version checked in to the archive: - 1. In the **History** window, click the GPO version with the most recent time stamp. Press CTRL and then click the oldest GPO version for which the **Computer Version** is not **\***. + 1. In the **History** window, click the GPO version with the most recent time stamp. Press CTRL and then click the oldest GPO version for which the **Computer Version** is not **\\***. - 2. Click the **Differences** button. The **Account Policies/Password Policy** section is highlighted in green and preceded by **\[+\]**. This indicates that the setting is configured only in the latter version of the GPO. + 2. Click the **Differences** button. The **Account Policies/Password Policy** section is highlighted in green and preceded by **\[+\]**. This indicates that the setting is configured only in the latter version of the GPO. - 3. Click **Account Policies/Password Policy**. The **Minimum password length** setting is also highlighted in green and preceded by **\[+\]**, indicating that it is configured only in the latter version of the GPO. + 3. Click **Account Policies/Password Policy**. The **Minimum password length** setting is also highlighted in green and preceded by **\[+\]**, indicating that it is configured only in the latter version of the GPO. - 4. Close the Web browser. + 4. Close the Web browser. **To deploy the GPO to the production environment** @@ -570,7 +570,7 @@ Occasionally you may discover after you delete a GPO that it is still needed. In **Note**   Restoring a GPO to the archive does not automatically redeploy it to the production environment. To return the GPO to the production environment, deploy the GPO as in [Step 3: Review and deploy a GPO](#bkmk-manage3). -   + After editing and deploying a GPO, you may discover that recent changes to the GPO are causing a problem. In this step, you act as an Approver to roll back to an earlier version of the GPO. You can roll back to any version in the history of the GPO. You can use comments and labels to identify known good versions and when specific changes were made. @@ -587,11 +587,11 @@ After editing and deploying a GPO, you may discover that recent changes to the G **Note**   To verify that the version that was redeployed is the version intended, examine a difference report for the two versions. In the **History** window for the GPO, select the two versions, right-click them, point to **Difference**, and then click either **HTML Report** or **XML Report**. -   + -  + -  + diff --git a/mdop/agpm/technical-overview-of-agpm.md b/mdop/agpm/technical-overview-of-agpm.md index 516d253320..9f7a7d14d8 100644 --- a/mdop/agpm/technical-overview-of-agpm.md +++ b/mdop/agpm/technical-overview-of-agpm.md @@ -101,7 +101,7 @@ Table 1 describes both the items that AGPM installs or creates and the parts of -  + ### Additional references @@ -119,7 +119,7 @@ The gpostate.xml file records the state of each GPO in the archive. The file is **Caution**   Do not manually edit gpostate.xml or the GPOs the archive contains. This information is provided only to enhance understanding of the AGPM archive. Instead, use the AGPM snap-in to change GPOs. -  + When AGPM creates the archive, it gives Full Control to SYSTEM, Administrators, and the AGPM Service Account (specified in the setup of AGPM Server). Changing permissions by using the AGPM user interface on the AGPM snap-in does not alter permissions on the archive, because the AGPM Service Account performs all operations on behalf of the logged-on user. @@ -261,22 +261,22 @@ AGPM gives AGPM Administrators the flexibility to configure permissions at a mor -  + **Note**   **Export GPO** and **Import GPO** permissions are not available in AGPM 3.0 or 2.5. The ability to delegate access to GPOs in the production environment for a domain and the ability to limit the number of GPO versions stored are not available in AGPM 2.5. -  + ### Additional references For information about what tasks can be performed by Group Policy administrators assigned a particular role or about which permissions are required to perform a specific task, see the [Operations Guide for AGPM](https://go.microsoft.com/fwlink/?LinkId=160061). -  + -  + diff --git a/mdop/agpm/template-commands-agpm30ops.md b/mdop/agpm/template-commands-agpm30ops.md index 66f215dc18..d0d078ee41 100644 --- a/mdop/agpm/template-commands-agpm30ops.md +++ b/mdop/agpm/template-commands-agpm30ops.md @@ -30,7 +30,7 @@ Because a template cannot be altered, templates have no history. However, like a **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + Right-clicking the **Group Policy Objects** list on this tab displays a shortcut menu, including whichever of the following options are applicable. @@ -56,7 +56,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Reports @@ -84,7 +84,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Template management @@ -116,7 +116,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Miscellaneous @@ -144,7 +144,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ### Additional references @@ -154,9 +154,9 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut - [Performing Reviewer Tasks](performing-reviewer-tasks-agpm30ops.md) -  + -  + diff --git a/mdop/agpm/template-commands-agpm40.md b/mdop/agpm/template-commands-agpm40.md index cbeea91b27..ab77542a14 100644 --- a/mdop/agpm/template-commands-agpm40.md +++ b/mdop/agpm/template-commands-agpm40.md @@ -30,7 +30,7 @@ Because a template cannot be altered, templates have no history. However, like a **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + Right-clicking the **Group Policy Objects** list on this tab displays a shortcut menu, including whichever of the following options are applicable. @@ -56,7 +56,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Reports @@ -84,7 +84,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Template management @@ -116,7 +116,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Miscellaneous @@ -144,7 +144,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ### Additional references @@ -154,9 +154,9 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut - [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md) -  + -  + diff --git a/mdop/agpm/templates-tab.md b/mdop/agpm/templates-tab.md index e781c75a4b..6c6a7e617d 100644 --- a/mdop/agpm/templates-tab.md +++ b/mdop/agpm/templates-tab.md @@ -30,7 +30,7 @@ Because a template cannot be altered, templates have no history. However, like a **Note**   A template is an uneditable, static version of a GPO for use as a starting point for creating new, editable GPOs. -  + Right-clicking the **Group Policy Objects** list on this tab displays a shortcut menu, including whichever of the following options are applicable. @@ -56,7 +56,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Reports @@ -84,7 +84,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Template management @@ -116,7 +116,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ## Miscellaneous @@ -144,7 +144,7 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut -  + ### Additional references @@ -154,9 +154,9 @@ Right-clicking the **Group Policy Objects** list on this tab displays a shortcut - [Performing Reviewer Tasks](performing-reviewer-tasks.md) -  + -  + diff --git a/mdop/agpm/using-a-test-environment.md b/mdop/agpm/using-a-test-environment.md index 49a3f57e3e..0b9b47d7e4 100644 --- a/mdop/agpm/using-a-test-environment.md +++ b/mdop/agpm/using-a-test-environment.md @@ -28,11 +28,11 @@ Before you request that a Group Policy Object (GPO) be deployed to the productio **Note**   You can also import a GPO from the production environment of the domain. For more information, see [Import a GPO from Production](import-a-gpo-from-production-agpm40-ed.md). -  + -  + -  + diff --git a/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md b/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md index 247e642cfd..44b77a218d 100644 --- a/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md +++ b/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md @@ -22,14 +22,14 @@ You can use App-V Package Accelerators to automatically sequence large, complex **Note**   In some cases, you are prompted to install an application locally to the computer running the App-V Sequencer before you can use the Package Accelerator. If you have to install an application, you must install the application to the application’s default location. This installation is not monitored by App-V Sequencer. When the App-V Package Accelerator is created, the author of the Package Accelerator determines whether to install an application locally is required. -  + App-V Sequencer extracts the required files from the App-V Package Accelerator and associated installation media to create a virtual package without having to monitor the installation of the application. **Important**   Disclaimer: The Microsoft Application Virtualization Sequencer does not give you any license rights to the software application you are using to create a Package Accelerator. You must abide by all end user license terms for such application. It is your responsibility to make sure the software application’s license terms allow you to create a Package Accelerator using Application Virtualization Sequencer. -  + App-V Package Accelerators and project templates differ from each other. Package Accelerators are application-specific. Project templates enable users to save commonly used settings specific to an organization and apply them to multiple applications. You can also create project templates at the command prompt, while in contrast, you must use the App-V Sequencer console to create Package Accelerators. Additionally, creating a package by using a Package Accelerator and applying a project template is not supported. @@ -60,9 +60,9 @@ Always save App-V Package Accelerators and any associated installation media in [How to Apply a Package Accelerator to Create a Virtual Application Package (App-V 4.6 SP1)](how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/about-application-virtualization-servers.md b/mdop/appv-v4/about-application-virtualization-servers.md index 3a2fd51e6e..241dbca298 100644 --- a/mdop/appv-v4/about-application-virtualization-servers.md +++ b/mdop/appv-v4/about-application-virtualization-servers.md @@ -24,7 +24,7 @@ You can also stream applications to clients from Application Virtualization Stre You can stream applications to the client directly from a file or disk. Some application virtualization deployment scenarios, which are characterized by low or unreliable connectivity or where bandwidth is limited, are ideally suited for streaming from file or disk. -  + One or more Application Virtualization Management Servers that share a single data store make up an *Application Virtualization system*. @@ -37,9 +37,9 @@ One or more Application Virtualization Management Servers that share a single da [How to Set Up Publishing Servers](how-to-set-up-publishing-servers.md) -  + -  + diff --git a/mdop/appv-v4/about-microsoft-application-virtualization-46-sp2.md b/mdop/appv-v4/about-microsoft-application-virtualization-46-sp2.md index c1454fd3cc..d11db11a1f 100644 --- a/mdop/appv-v4/about-microsoft-application-virtualization-46-sp2.md +++ b/mdop/appv-v4/about-microsoft-application-virtualization-46-sp2.md @@ -22,7 +22,7 @@ Microsoft Application Virtualization (App-V) 4.6 SP2 provides several enhanceme **Caution**   This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + **Support for Windows 8 and Windows Server 2012** @@ -61,12 +61,12 @@ Before launching the App-V Sequencer, create the following registry value under -  + **Note**   On a computer running a 64-bit operating system, create the registry value under HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard\\Overrides. -  + For each OSD-file in your Adobe Reader X package, add the following items under the <POLICIES> element: @@ -98,9 +98,9 @@ App-V 4.6 SP2 includes a rollup of fixes to address issues found since the App [App-V 4.6 SP2 Release Notes](https://go.microsoft.com/fwlink/?LinkId=267600) Provides the most up-to-date information about known issues with App-V 4.6 SP2. -  + -  + diff --git a/mdop/appv-v4/about-microsoft-application-virtualization-46.md b/mdop/appv-v4/about-microsoft-application-virtualization-46.md index c7c42a8ff0..394b921628 100644 --- a/mdop/appv-v4/about-microsoft-application-virtualization-46.md +++ b/mdop/appv-v4/about-microsoft-application-virtualization-46.md @@ -32,7 +32,7 @@ Microsoft Application Virtualization (App-V) 4.6 provides the following enhancem **Note**   The App-V Management Server and Streaming Server have not been updated to version 4.6. Until they are updated, use App-V Management Server and Streaming Server 4.5 with the most recent service pack. -  + ## In This Section @@ -40,9 +40,9 @@ The App-V Management Server and Streaming Server have not been updated to versio [App-V 4.6 Release Notes](app-v-46-release-notes.md) Provides the most up-to-date information about known issues with Microsoft Application Virtualization (App-V) 4.6. -  + -  + diff --git a/mdop/appv-v4/about-publishing.md b/mdop/appv-v4/about-publishing.md index bdf72b3860..54ba36cfd3 100644 --- a/mdop/appv-v4/about-publishing.md +++ b/mdop/appv-v4/about-publishing.md @@ -22,7 +22,7 @@ You can centrally manage publishing applications to the Application Virtualizati **Note**   Before the client can refresh the publishing information, the client must know about the Application Virtualization Management Server. You configure the client with the necessary information about the server when you install the client. -  + When a client contacts the server for application publishing information, the server provides the client with the list of applications that the user has permission to access and the location of the corresponding Open Software Descriptor (OSD) files. The server also provides the relevant information about icons, file type associations, and shortcuts. @@ -33,9 +33,9 @@ When a client contacts the server for application publishing information, the se [About Application Virtualization Applications](about-application-virtualization-applications.md) -  + -  + diff --git a/mdop/appv-v4/about-sequencing-phases.md b/mdop/appv-v4/about-sequencing-phases.md index 675b66bd7e..78f1f65733 100644 --- a/mdop/appv-v4/about-sequencing-phases.md +++ b/mdop/appv-v4/about-sequencing-phases.md @@ -26,7 +26,7 @@ The four phases to sequencing an application and creating a virtual application **Important**   To view the advanced options select **Show Advanced Monitoring Options** on the **Package Information** page. -   + 2. **Launch phase**—During the launch phase, you can specify any required file associations and security descriptors that should be configured with the package. You should open the application as many times as necessary to ensure application functionality and stability. @@ -39,9 +39,9 @@ The four phases to sequencing an application and creating a virtual application [Application Virtualization Sequencer](application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/about-the-application-virtualization-sequencer.md b/mdop/appv-v4/about-the-application-virtualization-sequencer.md index 8a06d64d81..139afed1b7 100644 --- a/mdop/appv-v4/about-the-application-virtualization-sequencer.md +++ b/mdop/appv-v4/about-the-application-virtualization-sequencer.md @@ -22,7 +22,7 @@ The Microsoft Application Virtualization (App-V) Sequencer monitors and records **Important**   To run a virtual application package the target computer must be running the appropriate version of the App-V client. -  + Virtual application packages run on target computers without interacting with the underlying operating system on the target computer because each application runs in a virtual environment and is isolated from other applications that are installed or running on the target computer. This isolation can reduce application conflicts and can help decrease the required amount of application pre-deployment testing. @@ -83,16 +83,16 @@ The App-V Sequencer runs all services detected at sequencing time using the Loca **Important**   You should always save virtual application packages in a secure location. -  + ## Related topics [Application Virtualization Sequencer Overview](application-virtualization-sequencer-overview.md) -  + -  + diff --git a/mdop/appv-v4/about-the-deployment-tab.md b/mdop/appv-v4/about-the-deployment-tab.md index bb104b5b19..ecd0dce407 100644 --- a/mdop/appv-v4/about-the-deployment-tab.md +++ b/mdop/appv-v4/about-the-deployment-tab.md @@ -50,16 +50,15 @@ Use the **Server URL** controls to specify the virtual application server config

          Hostname

          Enables you to select the virtual application server or the load balancer in front of a group of virtual application servers that will stream the software package to an Application Virtualization Desktop Client. You must complete this item to create a sequenced application package, but you can change from the default %SFT_SOFTGRIDSERVER% environment variable to the actual hostname or IP address of a virtual application server.

          -Note   -

          If you choose not to specify a static hostname or IP address, on each Application Virtualization Desktop Client you must set up an environment variable called SFT_SOFTGRIDSERVER. Its value must be the hostname or IP address of the virtual application server or load balancer that is this client's source of applications. You should make this environment variable a system variable rather than a user variable. Any Application Virtualization Desktop Client session that is running on this computer during your assignment of this variable must be closed and then opened so that the resumed session will be aware of its new application source.

          +Note

          If you choose not to specify a static hostname or IP address, on each Application Virtualization Desktop Client you must set up an environment variable called SFT_SOFTGRIDSERVER. Its value must be the hostname or IP address of the virtual application server or load balancer that is this client's source of applications. You should make this environment variable a system variable rather than a user variable. Any Application Virtualization Desktop Client session that is running on this computer during your assignment of this variable must be closed and then opened so that the resumed session will be aware of its new application source.

          -  +

          Port

          -

          Enables you to specify the port on which the virtual application server or the load balancer will listen for an Application Virtualization Desktop Client's request for the package. This information is required to create a package, but you can change it. The default port is 554.

          +

          Enables you to specify the port on which the virtual application server or the load balancer will listen for an Application Virtualization Desktop Client's request for the package. This information is required to create a package, but you can change it. The default port is 554.

          Path

          @@ -68,7 +67,7 @@ Use the **Server URL** controls to specify the virtual application server config -  + ## Operating Systems @@ -98,7 +97,7 @@ Use the **Operating Systems** controls to specify the application's operating sy -  + ## Output Options @@ -121,7 +120,7 @@ Use the **Output Options** controls to specify the output options for the applic

          Compression Algorithm

          Use to select the method for compressing the SFT file for streaming across a network. Select one of the following compression methods:

            -
          • Compressed—Specifies that the SFT file be compressed in the [ZLIB](https://go.microsoft.com/fwlink/?LinkId=111475) format.

          • +
          • Compressed—Specifies that the SFT file be compressed in the ZLIB format.

          • Not Compressed—The default; specifies that the SFT file not be compressed.

          @@ -136,7 +135,7 @@ Use the **Output Options** controls to specify the output options for the applic -  + ## Related topics @@ -145,9 +144,9 @@ Use the **Output Options** controls to specify the output options for the applic [Sequencer Console](sequencer-console.md) -  - -  + + + diff --git a/mdop/appv-v4/about-the-properties-tab.md b/mdop/appv-v4/about-the-properties-tab.md index eaca0ea4c3..60f67d1be8 100644 --- a/mdop/appv-v4/about-the-properties-tab.md +++ b/mdop/appv-v4/about-the-properties-tab.md @@ -69,7 +69,7 @@ Specifies the size of the primary and secondary feature blocks into which the SF **Note**   After the initial package has been created, the block size value is not changeable. -  + ## Related topics @@ -78,9 +78,9 @@ After the initial package has been created, the block size value is not changeab [Sequencer Console](sequencer-console.md) -  + -  + diff --git a/mdop/appv-v4/about-the-virtual-registry-tab.md b/mdop/appv-v4/about-the-virtual-registry-tab.md index f896c8b733..71e0e3aa94 100644 --- a/mdop/appv-v4/about-the-virtual-registry-tab.md +++ b/mdop/appv-v4/about-the-virtual-registry-tab.md @@ -24,9 +24,9 @@ You can also choose to ignore the hosting system’s keys by selecting **Overrid The changes to the virtual registry **Settings** tab affect applications that are part of the specific sequenced application package, but they do not affect the operation of other applications that are streamed to or locally installed on the Application Virtualization Desktop Client. **Note**   -  Exercise caution when changing virtual registry keys and values. Changing these keys and values might render your sequenced application package inoperable. + Exercise caution when changing virtual registry keys and values. Changing these keys and values might render your sequenced application package inoperable. -  + The left pane of the **Virtual Registry** tab displays the full list of virtual registries created during the sequencing of an application. @@ -52,9 +52,9 @@ Displays the file attributes. [Sequencer Console](sequencer-console.md) -  + -  + diff --git a/mdop/appv-v4/about-using-the-sequencer-command-line.md b/mdop/appv-v4/about-using-the-sequencer-command-line.md index 87c841e9a1..844d28f414 100644 --- a/mdop/appv-v4/about-using-the-sequencer-command-line.md +++ b/mdop/appv-v4/about-using-the-sequencer-command-line.md @@ -26,7 +26,7 @@ You can use the command line to create sequenced application packages. Using the **Important**   Sequencing at the command prompt allows for default sequencing only. If you need to change default sequencing parameters, you must either manually modify a sequenced application package or re-sequence the application. -  + All subsequent modifications to existing sequenced application packages must be made using the sequencing wizard. @@ -48,9 +48,9 @@ To sequence an application by using the command prompt, the following conditions [How to Manage Virtual Applications Using the Command Line](how-to-manage-virtual-applications-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/add-app.md b/mdop/appv-v4/add-app.md index 8f842a5d13..56e1ff83ee 100644 --- a/mdop/appv-v4/add-app.md +++ b/mdop/appv-v4/add-app.md @@ -60,7 +60,7 @@ Adds an application record. -  + For version 4.6, the following option has been added. @@ -77,21 +77,21 @@ For version 4.6, the following option has been added. -  + **Note**   The resulting name of the application will be taken from the OSD file and not from the name provided in APP:<application>. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/antivirus-running-dialog-box--app-v-46-sp1-.md b/mdop/appv-v4/antivirus-running-dialog-box--app-v-46-sp1-.md index 2cd1f7d042..055f74d65d 100644 --- a/mdop/appv-v4/antivirus-running-dialog-box--app-v-46-sp1-.md +++ b/mdop/appv-v4/antivirus-running-dialog-box--app-v-46-sp1-.md @@ -26,16 +26,16 @@ Use the following procedure to stop the antivirus software from running during s **Important**   Remember to restart the antivirus software when you have finished sequencing the application. -   + ## Related topics [Dialog Boxes (AppV 4.6 SP1)](dialog-boxes--appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/app-v-45-sp2-release-notes.md b/mdop/appv-v4/app-v-45-sp2-release-notes.md index 7c07e37579..dc5d8fafe0 100644 --- a/mdop/appv-v4/app-v-45-sp2-release-notes.md +++ b/mdop/appv-v4/app-v-45-sp2-release-notes.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Important**   Read these Release Notes thoroughly before you install the Microsoft Application Virtualization Management System. These Release Notes contain information that you need to successfully install the Application Virtualization Management System. These Release Notes contain information that is not available in the product documentation. If there is a discrepancy between these Release Notes and other Application Virtualization Management System documentation, the latest change should be considered authoritative. -  + For updated information about known issues, please visit the Microsoft TechNet Library at [App-V 4.5 SP2 Release Notes](https://go.microsoft.com/fwlink/?LinkId=184640) (https://go.microsoft.com/fwlink/?LinkId=184640). @@ -84,7 +84,7 @@ Alternatively, if you are installing or upgrading to the App-V 4.5 SP2 Client fo - This step is not required if you are upgrading and have previously installed Dw20shared.msi. -  + ### Improving performance when sequencing the .NET Framework @@ -212,9 +212,9 @@ Microsoft, Active Directory, ActiveSync, MS-DOS, Windows, Windows Server, and W All other trademarks are property of their respective owners. -  + -  + diff --git a/mdop/appv-v4/app-v-46-release-notes.md b/mdop/appv-v4/app-v-46-release-notes.md index 6304282f67..efa16e1ff9 100644 --- a/mdop/appv-v4/app-v-46-release-notes.md +++ b/mdop/appv-v4/app-v-46-release-notes.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Important**   Read these Release Notes thoroughly before you install the Microsoft Application Virtualization (App-V) Management System. These Release Notes contain information that you need to successfully install Application Virtualization (App-V) 4.6. This document contains information that is not available in the product documentation. If there is a discrepancy between these Release Notes and other App-V documentation, the latest change should be considered authoritative. -  + ## Protect Against Security Vulnerabilities and Viruses @@ -43,7 +43,7 @@ WORKAROUND   Open the old package with either the App-V 4.5 SP1 Sequencer or **Note**   Alternatively, at the command prompt, the App-V Sequencer can generate the new .msi file by using the */OPEN* and */MSI* parameters, for example, `SFTSequencer /Open:”package.sprj” /MSI`. For more information, see [How to Upgrade a Virtual Application by Using the Command Line](how-to-upgrade-a-virtual-application-by-using-the-command-line.md). -  + ### Release Notes Copyright Information @@ -59,9 +59,9 @@ Microsoft, Active Directory, ActiveSync, ActiveX, Excel, SQL Server, Windows, Wi All other trademarks are property of their respective owners. -  + -  + diff --git a/mdop/appv-v4/app-v-46-sp1-release-notes.md b/mdop/appv-v4/app-v-46-sp1-release-notes.md index 375172fe50..09ea6abd40 100644 --- a/mdop/appv-v4/app-v-46-sp1-release-notes.md +++ b/mdop/appv-v4/app-v-46-sp1-release-notes.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Important**   Read these Release Notes thoroughly before you install the Microsoft Application Virtualization (App-V) Management System. These Release Notes contain information that helps you successfully install Application Virtualization (App-V) 4.6 SP1. This document contains information that is not available in the product documentation. If there is a difference between these Release Notes and other App-V documentation, the latest change should be considered authoritative. -  + ## Protect Against Security Vulnerabilities and Viruses @@ -98,9 +98,9 @@ Microsoft, Active Directory, ActiveSync, ActiveX, Excel, SQL Server, Windows, Wi All other trademarks are property of their respective owners. -  + -  + diff --git a/mdop/appv-v4/app-v-46-sp2-release-notes.md b/mdop/appv-v4/app-v-46-sp2-release-notes.md index f66b783829..9da44bdde6 100644 --- a/mdop/appv-v4/app-v-46-sp2-release-notes.md +++ b/mdop/appv-v4/app-v-46-sp2-release-notes.md @@ -36,7 +36,7 @@ We are interested in your feedback on App-V 4.6 SP2. You can send your feedbac **Note**   This email address is not a support channel, but your feedback will help us to plan future changes for our documentation and product releases. -  + For the latest information about MDOP and additional learning resources, see the [MDOP Information Experience](https://go.microsoft.com/fwlink/p/?LinkId=236032) page. @@ -66,7 +66,7 @@ fsutil 8dot3name set Q: 0 **Note**   You do not need to change this setting on the App-V client because the App-V file system properly handles short paths on Windows 8 or Windows Server 2012. -  + ### App-V does not override the default handler for file type or protocol associations on Windows 8 @@ -104,9 +104,9 @@ Microsoft, Active Directory, ActiveX, Bing, Excel, Silverlight, SQL Server, Win [About Microsoft Application Virtualization 4.6 SP2](about-microsoft-application-virtualization-46-sp2.md) -  + -  + diff --git a/mdop/appv-v4/app-v-client-registry-values-sp1.md b/mdop/appv-v4/app-v-client-registry-values-sp1.md index 46d0383bf2..59e5ac9ae5 100644 --- a/mdop/appv-v4/app-v-client-registry-values-sp1.md +++ b/mdop/appv-v4/app-v-client-registry-values-sp1.md @@ -17,12 +17,12 @@ ms.date: 08/30/2016 # App-V Client Registry Values -The Microsoft Application Virtualization (App-V) client stores its configuration in the registry. You can gather some useful information about the client if you understand the format of data in the registry. You can also configure many client actions by changing registry entries. This topic lists all the Application Virtualization (App-V) client registry keys and explains their uses. +The Microsoft Application Virtualization (App-V) client stores its configuration in the registry. You can gather some useful information about the client if you understand the format of data in the registry. You can also configure many client actions by changing registry entries. This topic lists all the Application Virtualization (App-V) client registry keys and explains their uses. -**Important**   +**Important** On a computer running a 64-bit operating system, the keys and values described in the following sections will be under HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\Client. -  + ## Configuration Key @@ -52,45 +52,44 @@ The following table provides information about the registry values associated wi

          Do not modify.

          -

          Version 

          -

          String 

          -

          4.5.0.xxx 

          -

          Do not modify. 

          +

          Version

          +

          String

          +

          4.5.0.xxx

          +

          Do not modify.

          -

          Drivers 

          -

          String 

          -

          Sftfs.sys 

          +

          Drivers

          +

          String

          +

          Sftfs.sys

          If this key value is present, it contains the name of the driver that caused a stop error the last time the core was starting. After you have fixed the stop error, you must delete this key value so that sftlist can start.

          -

          InstallPath 

          -

          String 

          +

          InstallPath

          +

          String

          Default=C:\Program Files\Microsoft Application Virtualization Client

          -

          The location where the client is installed. Do not modify. 

          +

          The location where the client is installed. Do not modify.

          -

          LogFileName 

          -

          String 

          +

          LogFileName

          +

          String

          Default=CSIDL_COMMON_APPDATA\Microsoft\Application Virtualization Client\sftlog.txt

          The path and name for the client log file.

          -Note   -

          If you are running an earlier version than App-V 4.6, SP1 and you modify the log file name or location, you must restart the sftlist service for the change to take effect.

          +Note

          If you are running an earlier version than App-V 4.6, SP1 and you modify the log file name or location, you must restart the sftlist service for the change to take effect.

          -  +

          -

          LogMinSeverity 

          -

          DWORD 

          +

          LogMinSeverity

          +

          DWORD

          Default=4, Informational

          Controls which messages are written to the log. The value indicates a threshold of what is logged—everything less than or equal to that value is logged. For example, a value of 0x3 (Warning) indicates that Warnings (0x3), Errors (0x2), and Critical Errors (0x1) are logged.

          Value Range: 0x0 = None, 0x1 = Critical, 0x2 = Error, 0x3 = Warning, 0x4 = Information (Default), 0x5 = Verbose.

          The log level is configurable from the Application Virtualization (App-V) client console and from the command prompt. At a command prompt, the command sftlist.exe /verboselog will increase the log level to verbose. For more information on command-line details see

          -

          https://go.microsoft.com/fwlink/?LinkId=141467https://go.microsoft.com/fwlink/?LinkId=141467

          +

          https://go.microsoft.com/fwlink/?LinkId=141467https://go.microsoft.com/fwlink/?LinkId=141467

          .

          @@ -131,31 +130,31 @@ The following table provides information about the registry values associated wi

          ApplicationSourceRoot

          String

          rtsps://mainserver:322/prodapps

          -

          https://mainserver:443/prodapps

          -

          file://\\uncserver\share\prodapps

          -

          file://\\uncserver\share

          +

          https://mainserver:443/prodapps

          +

          file://\uncserver\share\prodapps

          +

          file://\uncserver\share

          Enables an administrator or electronic software distribution (ESD) system to ensure application loading is performed according to the topology management scheme. Use this key value to override the OSD CODEBASE for the HREF element (for example, the source location) for an application. Application Source Root supports URLs and Universal Naming Convention (UNC) path formats.

          -

          The correct format for the URL path is protocol://servername:[port][/path][/], where port and path are optional. If a port is not specified, the default port for the protocol is used. Only the protocol://server:port portion of the OSD URL is replaced. 

          -

          The correct format for the UNC path is \\computername\sharefolder\[folder][\], where folder is optional. The computer name can be a fully qualified domain name (FQDN) or an IP address, and sharefolder can be a drive letter. Only the \\computername\sharefolder or drive letter portion of the OSD path is replaced. 

          +

          The correct format for the URL path is protocol://servername:[port][/path][/], where port and path are optional. If a port is not specified, the default port for the protocol is used. Only the protocol://server:port portion of the OSD URL is replaced.

          +

          The correct format for the UNC path is \computername\sharefolder[folder][], where folder is optional. The computer name can be a fully qualified domain name (FQDN) or an IP address, and sharefolder can be a drive letter. Only the \computername\sharefolder or drive letter portion of the OSD path is replaced.

          OSDSourceRoot

          String

          -

          \\computername\sharefolder\resource

          -

          \\computername\content

          +

          \computername\sharefolder\resource

          +

          \computername\content

          C:\foldername

          -

          http://computername/productivity/

          -

          https://computername/productivity/

          +

          http://computername/productivity/

          +

          https://computername/productivity/

          Enables an administrator to specify a source location for OSD file retrieval for a sequenced application package during publication. Acceptable formats for the OSDSourceRoot include UNC paths and URLs (http or https).

          IconSourceRoot

          String

          -

          \\computername\sharefolder\resource

          -

          \\computername\content

          +

          \computername\sharefolder\resource

          +

          \computername\content

          C:\foldername

          -

          http://computername/productivity/

          -

          https://computername/productivity/

          +

          http://computername/productivity/

          +

          https://computername/productivity/

          Enables an administrator to specify a source location for icon file retrieval for a sequenced application package during publication. Acceptable formats for the IconSourceRoot include UNC paths and URLs (http or https).

          @@ -189,89 +188,89 @@ The following table provides information about the registry values associated wi

          Restart the sftlist service for the change to take effect.

          -

          UserDataDirectory 

          -

          String 

          +

          UserDataDirectory

          +

          String

          %APPDATA%

          Location where the icon cache and user settings are stored.

          -

          GlobalDataDirectory 

          -

          String 

          -

          C:\Users\Public\Documents 

          +

          GlobalDataDirectory

          +

          String

          +

          C:\Users\Public\Documents

          Directory to use for global App-V data, including caches for OSD files, icon files, shortcut information, and SystemGuard resources such as .ini files.

          -

          AllowCrashes 

          -

          DWORD 

          -

          0 or 1 

          +

          AllowCrashes

          +

          DWORD

          +

          0 or 1

          Default=0: A value of 0 means that the client tries to catch internal program exceptions so that other user applications can recover and continue when a crash happens. A value of 1 means that the client allows the internal program exceptions to occur so that they can be captured in a debugger.

          -

          CoreInternalTimeout 

          -

          DWORD 

          +

          CoreInternalTimeout

          +

          DWORD

          60

          -

          Time-out in seconds for internal IPC requests between core and front-end. Do not modify. 

          +

          Time-out in seconds for internal IPC requests between core and front-end. Do not modify.

          -

          DefaultSuiteCombineTime 

          -

          DWORD 

          +

          DefaultSuiteCombineTime

          +

          DWORD

          10

          -

          This value is used to indicate how soon after being started that a program can shut down and not generate any error messages when another application in the same suite is running. 

          +

          This value is used to indicate how soon after being started that a program can shut down and not generate any error messages when another application in the same suite is running.

          -

          SerializedSuiteLaunchTimeout 

          -

          DWORD 

          +

          SerializedSuiteLaunchTimeout

          +

          DWORD

          Default=60000

          -

          Defines how long in milliseconds the client will wait as it tries to serialize program starts in the same suite. If the client times out, the program start will continue but it will not be serialized. 

          +

          Defines how long in milliseconds the client will wait as it tries to serialize program starts in the same suite. If the client times out, the program start will continue but it will not be serialized.

          -

          ScriptTimeout 

          -

          DWORD 

          +

          ScriptTimeout

          +

          DWORD

          300

          -

          Default time-out in seconds for scripts in OSD file if WAIT=TRUE. You can specify per-script time-outs with TIMEOUT instead of WAIT. A value of 0 means no wait, and 0xFFFFFFFF means wait forever. 

          +

          Default time-out in seconds for scripts in OSD file if WAIT=TRUE. You can specify per-script time-outs with TIMEOUT instead of WAIT. A value of 0 means no wait, and 0xFFFFFFFF means wait forever.

          -

          LaunchRecordLogPath 

          -

          String 

          +

          LaunchRecordLogPath

          +

          String

          If, under either HKLM or HKCU, this value contains a valid path to a log file, SFTTray will write to this log when programs start, shut down, fail to launch, and enter or exit disconnected mode.

          -

          LaunchRecordMask 

          -

          DWORD 

          +

          LaunchRecordMask

          +

          DWORD

          0x1A (26) log launch errors and disconnected mode entry and exit activity.

          0x1F (31) logs everything.

          -

          0x0 (0) logs nothing. 

          +

          0x0 (0) logs nothing.

          Specifies which of the five events are logged (bitmask values):

          1 for program starts

          2 for launch failure errors

          4 for shutdowns

          8 for entering disconnected mode

          16 for exiting disconnected mode to reconnect to a server

          -

          Add any combination of those numbers to turn on the respective messages. Defaults to 0x1F if not in registry. 

          +

          Add any combination of those numbers to turn on the respective messages. Defaults to 0x1F if not in registry.

          -

          LaunchRecordWriteTimeout 

          -

          DWORD 

          +

          LaunchRecordWriteTimeout

          +

          DWORD

          Default=3000

          Specifies in milliseconds how long the tray will wait when trying to write to the launch record log if another process is using it.

          -

          ImportSearchPath 

          -

          String 

          -

          d:\files\;C:\documents and settings\user1\SFTs 

          +

          ImportSearchPath

          +

          String

          +

          d:\files;C:\documents and settings\user1\SFTs

          A semicolon delimited list of up to five directories to search for portable SFT files before prompting the user to select a directory. Trailing backslash in paths is optional. This value is not present by default and must be set manually.

          UserImportPath

          -

          String 

          -

          D:\SFTs\ 

          +

          String

          +

          D:\SFTs\

          Valid only under HKCU. The last location the user browsed to while finding a SFT file for package import. Set automatically if the SFT is found successfully. This is used on successive imports when trying to automatically locate SFT files.

          -  + ## Shared Key @@ -287,29 +286,29 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Shared key control -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description -

          DumpPath 

          -

          String 

          -

          Default=C:\ 

          -

          Default path to create dump files when generating a minidump on an exception. This defaults to C:\ if not specified. The Client installer sets this key to the <App Virtualization global data directory>\Dumps. The Sequencer installer sets this key to the installation directory. 

          +

          DumpPath

          +

          String

          +

          Default=C:\

          +

          Default path to create dump files when generating a minidump on an exception. This defaults to C:\ if not specified. The Client installer sets this key to the <App Virtualization global data directory>\Dumps. The Sequencer installer sets this key to the installation directory.

          -

          DumpPathSizeLimit 

          -

          DWORD 

          +

          DumpPathSizeLimit

          +

          DWORD

          1000

          Specifies the maximum total amount of disk space in megabytes that can be used to store minidumps. Default = 1000 MB.

          -  + ## Network Key @@ -325,10 +324,10 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network ke -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description @@ -339,8 +338,8 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network ke

          Enables or disables offline mode. If set to 0, the client will not communicate with App-V Management Servers or publishing servers. In disconnected operations, the client can start a loaded application even when it is not connected to an App-V Management Server. In offline mode, the client does not attempt to connect to an App-V Management Server or publishing server. You must allow disconnected operations to be able to work offline. Default value is 1 enabled (online), and 0 is disabled (offline).

          -

          AllowDisconnectedOperation 

          -

          DWORD 

          +

          AllowDisconnectedOperation

          +

          DWORD

          Default=1

          Enables or disables disconnected operation. Default value is 1 enabled, and 0 is disabled. When disconnected operations are enabled, the App-V client can start a loaded application even when it is not connected to an App-V Management Server.

          @@ -348,12 +347,12 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network ke

          FastConnectTimeout

          DWORD

          Default=1000

          -

          This value specifies the TCP connect time-out in milliseconds to determine when to go into disconnected operations mode. This value can be used to override the default ConnectTimeout of 20 seconds (App-V connect time-out for network transactions) or the system’s TCP time-out of approximately 25 seconds. This brings the client into disconnected operations mode quickly. Applied on the next connect.

          +

          This value specifies the TCP connect time-out in milliseconds to determine when to go into disconnected operations mode. This value can be used to override the default ConnectTimeout of 20 seconds (App-V connect time-out for network transactions) or the system’s TCP time-out of approximately 25 seconds. This brings the client into disconnected operations mode quickly. Applied on the next connect.

          LimitDisconnectedOperation

          DWORD

          -

          Default=1 

          +

          Default=1

          Applicable only if AllowDisconnectedOperation is 1, enabled. This value determines whether there will be a time limit for how long the client will be allowed to operate in disconnected operations. 1=limited. 0=unlimited.

          @@ -407,7 +406,7 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network ke -  + ## Http Key @@ -423,10 +422,10 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network\\H -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description @@ -445,7 +444,7 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Network\\H -  + ## File System Key @@ -461,53 +460,53 @@ The values that are contained under the HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsof -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description -

          FileSize 

          -

          DWORD 

          +

          FileSize

          +

          DWORD

          4096

          -

          Maximum size in megabytes of file system cache file. If you change this value in the registry, you must set State to 0 and reboot. 

          +

          Maximum size in megabytes of file system cache file. If you change this value in the registry, you must set State to 0 and reboot.

          -

          FileName 

          -

          String 

          -

          C:\Users\Public\Documents\SoftGrid Client\sftfs.fsd 

          -

          Location of file system cache file. If you change this value in the registry, you must either leave FileSize the same and reboot or set State to 0 and reboot. 

          +

          FileName

          +

          String

          +

          C:\Users\Public\Documents\SoftGrid Client\sftfs.fsd

          +

          Location of file system cache file. If you change this value in the registry, you must either leave FileSize the same and reboot or set State to 0 and reboot.

          -

          DriveLetter 

          -

          String 

          -

          Q: 

          -

          Drive where App-V file system will be mounted, if it is available. This value is set either by the listener or the installer, and it is read by the file system. 

          +

          DriveLetter

          +

          String

          +

          Q:

          +

          Drive where App-V file system will be mounted, if it is available. This value is set either by the listener or the installer, and it is read by the file system.

          -

          State 

          -

          DWORD 

          -

          0x100 

          -

          State of file system. Set to 0 and reboot to completely clear the file system cache. 

          +

          State

          +

          DWORD

          +

          0x100

          +

          State of file system. Set to 0 and reboot to completely clear the file system cache.

          -

          FileSystemStorage 

          -

          String 

          -

          C:\Profiles\Joe\SG 

          -

          Path for symlinks, set under HKCU. Do not modify (use data directory under Configuration to change). 

          +

          FileSystemStorage

          +

          String

          +

          C:\Profiles\Joe\SG

          +

          Path for symlinks, set under HKCU. Do not modify (use data directory under Configuration to change).

          -

          GlobalFileSystemStorage 

          -

          String 

          -

          C:\Users\Public\Documents\SoftGrid Client\AppFS Storage 

          -

          Path for global file system data. Do not modify. 

          +

          GlobalFileSystemStorage

          +

          String

          +

          C:\Users\Public\Documents\SoftGrid Client\AppFS Storage

          +

          Path for global file system data. Do not modify.

          -

          MaxPercentToLockInCache 

          -

          DWORD 

          -

          Default=90 

          +

          MaxPercentToLockInCache

          +

          DWORD

          +

          Default=90

          Specifies the maximum percentage of the file system cache file that can be locked. Do not modify.

          @@ -525,19 +524,19 @@ The values that are contained under the HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsof -  + ## Permissions Key -To help to prevent users from making mistakes, administrators can use the HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Permissions key to control access to some actions for non-administrative users—for example, to prevent users from accidentally unloading programs. Users with administrative rights can give themselves any of these permissions. On shared systems, such as a Remote Desktop Session Host (RD Session Host) server (formerly Terminal Server) system, be careful when granting additional permissions to users because some of these permissions would enable users to control the applications used by all users on the system. Possible values for these settings are 1 (allow) and 0 (disallow). +To help to prevent users from making mistakes, administrators can use the HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Permissions key to control access to some actions for non-administrative users—for example, to prevent users from accidentally unloading programs. Users with administrative rights can give themselves any of these permissions. On shared systems, such as a Remote Desktop Session Host (RD Session Host) server (formerly Terminal Server) system, be careful when granting additional permissions to users because some of these permissions would enable users to control the applications used by all users on the system. Possible values for these settings are 1 (allow) and 0 (disallow). The Permissions key settings control all interfaces that enable the named actions. This includes the Options Dialog, SFTTray, and SFTMime. These settings do not affect administrators. The following table provides information about the registry values associated with the Permissions key. -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description ChangeFSDrive DWORD @@ -570,21 +569,21 @@ Default=0 A value of 1 allows users to add applications explicitly. This does not affect applications that are added through publishing refresh nor does it prevent users from starting (and thereby implicitly adding) applications that have not already been added. Values are 0 or 1. -LoadApp  +LoadApp -DWORD  +DWORD 0 -Does not allow a user to load an application. This is the default for RD Session Hosts. If you are a mobile user, you might want to fully load your applications in the cache to use them during disconnected operation or offline mode. To stream applications from the App-V Management Server or the App-V Streaming Server, you must be connected to a server to load applications. +Does not allow a user to load an application. This is the default for RD Session Hosts. If you are a mobile user, you might want to fully load your applications in the cache to use them during disconnected operation or offline mode. To stream applications from the App-V Management Server or the App-V Streaming Server, you must be connected to a server to load applications. 1 -Allows a user to load an application. This is the default for Windows desktops.  +Allows a user to load an application. This is the default for Windows desktops. -UnloadApp  +UnloadApp -DWORD  +DWORD 0 @@ -592,43 +591,43 @@ Does not allow a user to unload an application. When you load or unload a packag 1 -Allows a user to unload an application.  +Allows a user to unload an application. -LockApp  +LockApp -DWORD  +DWORD 0 -Does not allow a user to lock and unlock an application. This is the default for RD Session Hosts. A locked application cannot be removed from the cache to make room for new applications. To remove a locked application from the App-V Desktop or Client for Remote Desktop Services (formerly Terminal Services) cache, you must unlock it. +Does not allow a user to lock and unlock an application. This is the default for RD Session Hosts. A locked application cannot be removed from the cache to make room for new applications. To remove a locked application from the App-V Desktop or Client for Remote Desktop Services (formerly Terminal Services) cache, you must unlock it. 1 -Allows a user to lock and unlock an application. This is the default for Windows Desktops.  +Allows a user to lock and unlock an application. This is the default for Windows Desktops. -ManageTypes  +ManageTypes -DWORD  +DWORD 0 -Does not allow a user to add, edit, or remove file type associations for that User alone. This is the default for RD Session Hosts.  +Does not allow a user to add, edit, or remove file type associations for that User alone. This is the default for RD Session Hosts. 1 -Allows a user to add, edit, and remove file type associations for that user only and not globally. This is the default for Windows Desktops.  +Allows a user to add, edit, and remove file type associations for that user only and not globally. This is the default for Windows Desktops. -RefreshServer  +RefreshServer -DWORD  +DWORD 0 -Does not allow a user to trigger a refresh of MIME settings. This is the default for RD Session Hosts.  +Does not allow a user to trigger a refresh of MIME settings. This is the default for RD Session Hosts. 1 -Enables a user to trigger a refresh of MIME settings. This is the default for Windows Desktops.  +Enables a user to trigger a refresh of MIME settings. This is the default for Windows Desktops. UpdateOSDFile @@ -638,17 +637,17 @@ Default= 0 A value of 1 enables a user to use a modified OSD file. -ImportApp  +ImportApp -DWORD  +DWORD 0 -Does not allow a user to import applications into cache. The difference between Load and Import is that when a Load is triggered, the client gets the package from the currently configured location contained in the OSD, ASR, or Override URL. When using Import, a location to get the package from must be specified.  +Does not allow a user to import applications into cache. The difference between Load and Import is that when a Load is triggered, the client gets the package from the currently configured location contained in the OSD, ASR, or Override URL. When using Import, a location to get the package from must be specified. 1 -Allows a user to import applications into cache.  +Allows a user to import applications into cache. ChangeRefreshSettings @@ -714,7 +713,7 @@ DWORD A value of 1 allows the users to select to run the client in Offline Mode. In Offline Mode, the Application Virtualization client can start a loaded application even when it is not connected to an Application Virtualization Server. -  + ## Custom Settings @@ -730,24 +729,24 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\CustomSett -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description -

          TrayErrorDelay 

          -

          DWORD 

          -

          Default=30 

          -

          Time in seconds that the Application Virtualization notification area will display error messages like "Launch failed". Minimum value of 1. 

          +

          TrayErrorDelay

          +

          DWORD

          +

          Default=30

          +

          Time in seconds that the Application Virtualization notification area will display error messages like "Launch failed". Minimum value of 1.

          -

          TraySuccessDelay 

          -

          DWORD 

          -

          Default=10 

          -

          Time in seconds that the appvmed notification area will display success messages like "Word launched" or "Excel shut down". If 0, those messages will be suppressed. 

          +

          TraySuccessDelay

          +

          DWORD

          +

          Default=10

          +

          Time in seconds that the appvmed notification area will display success messages like "Word launched" or "Excel shut down". If 0, those messages will be suppressed.

          TrayVisibility

          @@ -772,7 +771,7 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\CustomSett -  + ## Reporting Settings @@ -788,10 +787,10 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Reporting -Name  -Type  -Data (Examples)  -Description  +Name +Type +Data (Examples) +Description @@ -810,16 +809,16 @@ The HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Reporting -  + ## Related topics [Application Virtualization Client Reference](application-virtualization-client-reference.md) -  - -  + + + diff --git a/mdop/appv-v4/app-v-desktop-client-security.md b/mdop/appv-v4/app-v-desktop-client-security.md index 4ad4b67eef..8b1261715e 100644 --- a/mdop/appv-v4/app-v-desktop-client-security.md +++ b/mdop/appv-v4/app-v-desktop-client-security.md @@ -22,7 +22,7 @@ The App-V Desktop Client provides many security enhancements that were not avail **Note**   When you install the App-V Desktop Client on a computer, the software defaults to the most secure settings. However, when upgrading, the previous settings of the client persist. -  + By default, the App-V Desktop Client is configured only with the permissions required to allow a non-administrative user to perform a publishing refresh and stream applications. Additional security enhancements provided in the App-V Desktop Client include the following: @@ -44,12 +44,12 @@ After you install the Desktop Client, you can configure other security settings **Important**   Carefully consider the consequences of changing access rights, especially on systems that are shared by multiple users, such as Terminal Servers. -  + **Note**   If users in the environment have local administrator privileges for their computers, the permissions are ignored. -  + ### ADM Template @@ -58,7 +58,7 @@ Microsoft Application Virtualization (App-V) introduces an ADM Template that you **Important**   When using the ADM Template, remember that the settings are Group Policy preference settings and not fully managed Group Policies. -  + For a full description of the ADM Template, the specific settings, and guidance to successfully deploy clients in your environment, see the App-V ADM Template white paper at [https://go.microsoft.com/fwlink/LinkId=122063](https://go.microsoft.com/fwlink/?LinkId=122063). @@ -67,9 +67,9 @@ For a full description of the ADM Template, the specific settings, and guidance If your organization does not require users to open applications directly from an OSD file, you can enhance security by removing the file type associations on the client. Remove the `HKEY_CURRENT_USERS` keys for OSD and `Softgird.osd.file` by using the registry editor. You can put this process into a logon script or into a post-installation script to automate these changes. -  + -  + diff --git a/mdop/appv-v4/app-v-installation-checklist.md b/mdop/appv-v4/app-v-installation-checklist.md index fc6726368b..4b2e5c573d 100644 --- a/mdop/appv-v4/app-v-installation-checklist.md +++ b/mdop/appv-v4/app-v-installation-checklist.md @@ -33,43 +33,43 @@ The following checklist is intended to provide a high-level list of items to con

          Install the App-V Management Server. If you are installing the Management Web Service, Management Console, or the Data Store on different servers, you can use the custom installation option.

          -

          [How to Install Application Virtualization Management Server](how-to-install-application-virtualization-management-server.md)

          +

          How to Install Application Virtualization Management Server

          Install the App-V Management Web Service. (Optional ¹)

          -

          [How to Install the Management Web Service](how-to-install-the-management-web-service.md)

          +

          How to Install the Management Web Service

          Install the App-V Management Console. (Optional ¹)

          -

          [How to Install the Management Console](how-to-install-the-management-console.md)

          +

          How to Install the Management Console

          Install the App-V Data Store. (Optional ¹)

          -

          [How to Install a Database](how-to-install-a-database.md)

          +

          How to Install a Database

          Install the App-V client.

          -

          [How to Manually Install the Application Virtualization Client](how-to-manually-install-the-application-virtualization-client.md)

          +

          How to Manually Install the Application Virtualization Client

          Install the App-V Sequencer.

          -

          [How to Install the Application Virtualization Sequencer](how-to-install-the-application-virtualization-sequencer.md)

          +

          How to Install the Application Virtualization Sequencer

          Install the App-V Streaming Server. (This is optional and required only if you are installing the Streaming Server).

          -

          [How to Install the Application Virtualization Streaming Server](how-to-install-the-application-virtualization-streaming-server.md)

          +

          How to Install the Application Virtualization Streaming Server

          Create Content directories on the servers that will be used for streaming applications to users’ computers.

          -

          [How to Configure the Application Virtualization Management Servers](how-to-configure-the-application-virtualization-management-servers.md)

          -

          [How to Configure the Application Virtualization Streaming Servers](how-to-configure-the-application-virtualization-streaming-servers.md)

          -

          [How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md)

          -

          [How to Configure the File Server](how-to-configure-the-file-server.md)

          +

          How to Configure the Application Virtualization Management Servers

          +

          How to Configure the Application Virtualization Streaming Servers

          +

          How to Configure the Server for IIS

          +

          How to Configure the File Server

          -  + ¹ This is required only if you are installing the App-V Management Web Service, Management Console, or the Data Store on a different computer. @@ -80,9 +80,9 @@ The following checklist is intended to provide a high-level list of items to con [App-V Postinstallation Checklist](app-v-postinstallation-checklist.md) -  + -  + diff --git a/mdop/appv-v4/app-v-interoperability-with-windows-applocker.md b/mdop/appv-v4/app-v-interoperability-with-windows-applocker.md index a2bb838966..be861b5d2c 100644 --- a/mdop/appv-v4/app-v-interoperability-with-windows-applocker.md +++ b/mdop/appv-v4/app-v-interoperability-with-windows-applocker.md @@ -22,7 +22,7 @@ Version 4.5 SP1 of the Microsoft Application Virtualization (App-V) client suppo **Note**   Windows AppLocker must first be enabled before configuring Windows AppLocker rules for virtual applications. For more information about enabling Windows AppLocker, [Windows AppLocker](https://go.microsoft.com/fwlink/?LinkId=156732) (https://go.microsoft.com/fwlink/?LinkId=156732). -  + ## Configuring Windows AppLocker Rules for Virtual Applications @@ -31,9 +31,9 @@ Local administrators can create Windows AppLocker rules that restrict the runnin When you browse to find a directory path or specific file for which you want to create a rule, you can access the App-V drive by using the path to the hidden share. For example, you can browse to \\\\localhost\\Q$, where the App-V drive is drive Q. However, to create the rule, you must edit the path to remove the reference to \\\\localhost\\Q$ and use Q:\\ instead. You must start each application on the reference computer to access the application’s files, and administrative rights are required to browse to \\\\localhost\\Q$. -  + -  + diff --git a/mdop/appv-v4/app-v-postinstallation-checklist.md b/mdop/appv-v4/app-v-postinstallation-checklist.md index b3bac26db3..87b30551fd 100644 --- a/mdop/appv-v4/app-v-postinstallation-checklist.md +++ b/mdop/appv-v4/app-v-postinstallation-checklist.md @@ -33,37 +33,37 @@ The following checklist provides a high-level list of items to consider and outl

          Create firewall exceptions for the App-V Management Server or Streaming Server services.

          -

          [Configuring the Firewall for the App-V Servers](configuring-the-firewall-for-the-app-v-servers.md)

          +

          Configuring the Firewall for the App-V Servers

          Verify that the App-V system is functioning correctly by publishing, streaming, and testing the default application.

          -

          [How to Install and Configure the Default Application](how-to-install-and-configure-the-default-application.md)

          +

          How to Install and Configure the Default Application

          Configure the App-V Client to use the App-V Streaming Server or other server for streaming by means of the ApplicationSourceRoot, IconSourceRoot, and OSDSourceRoot settings.

          -

          [How to Configure the Client for Application Package Retrieval](how-to-configure-the-client-for-application-package-retrieval.md)

          +

          How to Configure the Client for Application Package Retrieval

          Understand how to use the .msi file version of sequenced application packages for offline deployment.

          -

          [How to Publish a Virtual Application on the Client](how-to-publish-a-virtual-application-on-the-client.md)

          +

          How to Publish a Virtual Application on the Client

          (Optional) Configure SQL Server database mirroring for the App-V database.

          -

          [How to Configure Microsoft SQL Server Mirroring Support for App-V](how-to-configure-microsoft-sql-server-mirroring-support-for-app-v.md)

          +

          How to Configure Microsoft SQL Server Mirroring Support for App-V

          -  + ## Related topics [Application Virtualization Deployment and Upgrade Checklists](application-virtualization-deployment-and-upgrade-checklists.md) -  + -  + diff --git a/mdop/appv-v4/app-v-pre-installation-checklist.md b/mdop/appv-v4/app-v-pre-installation-checklist.md index f1ebaf80dc..c426c83566 100644 --- a/mdop/appv-v4/app-v-pre-installation-checklist.md +++ b/mdop/appv-v4/app-v-pre-installation-checklist.md @@ -33,35 +33,34 @@ The following checklist is intended to provide a high-level list of items to con

          Ensure your computing environment meets the supported configurations required for App-V.

          -

          [Application Virtualization Deployment Requirements](application-virtualization-deployment-requirements.md)

          +

          Application Virtualization Deployment Requirements

          Configure the necessary Active Directory groups and accounts.

          -

          [Configuring Prerequisite Groups in Active Directory for App-V](configuring-prerequisite-groups-in-active-directory-for-app-v.md)

          +

          Configuring Prerequisite Groups in Active Directory for App-V

          Configure the Internet Information Services (IIS) settings on the server that is running IIS.

          -

          [How to Configure Windows Server 2008 for App-V Management Servers](how-to-configure-windows-server-2008-for-app-v-management-servers.md)

          +

          How to Configure Windows Server 2008 for App-V Management Servers

          Configure the server that is running IIS to be trusted for delegation.

          -Note   -

          This is required only if you are installing the App-V Management Server by using a distributed system architecture, that is, if you install the App-V Management Console, the Management Web Service, and the database on different computers.

          +Note

          This is required only if you are installing the App-V Management Server by using a distributed system architecture, that is, if you install the App-V Management Console, the Management Web Service, and the database on different computers.

          -  +
          -

          [How to Configure the Server to be Trusted for Delegation](how-to-configure-the-server-to-be-trusted-for-delegation.md)

          +

          How to Configure the Server to be Trusted for Delegation

          Install Microsoft SQL Server 2008.

          -

          [Install SQL Server 2008](https://go.microsoft.com/fwlink/?LinkId=181924) (https://go.microsoft.com/fwlink/?LinkId=181924).

          +

          Install SQL Server 2008 (https://go.microsoft.com/fwlink/?LinkId=181924).

          -  + ## Related topics @@ -70,9 +69,9 @@ The following checklist is intended to provide a high-level list of items to con [App-V Installation Checklist](app-v-installation-checklist.md) -  - -  + + + diff --git a/mdop/appv-v4/app-v-upgrade-checklist.md b/mdop/appv-v4/app-v-upgrade-checklist.md index 57b5302ede..fcabc76d01 100644 --- a/mdop/appv-v4/app-v-upgrade-checklist.md +++ b/mdop/appv-v4/app-v-upgrade-checklist.md @@ -17,7 +17,7 @@ ms.date: 08/30/2016 # App-V Upgrade Checklist -Before trying to upgrade to Microsoft Application Virtualization (App-V) 4.5 or later versions, any version earlier than App-V 4.1 must be upgraded to App-V 4.1. You should plan to upgrade clients first, and then upgrade the server components. App-V clients that have been upgraded to App-V 4.5 continue to work with App-V servers that have not yet been upgraded. Earlier versions of the client are not supported on servers that have been upgraded to App-V 4.5. +Before trying to upgrade to Microsoft Application Virtualization (App-V) 4.5 or later versions, any version earlier than App-V 4.1 must be upgraded to App-V 4.1. You should plan to upgrade clients first, and then upgrade the server components. App-V clients that have been upgraded to App-V 4.5 continue to work with App-V servers that have not yet been upgraded. Earlier versions of the client are not supported on servers that have been upgraded to App-V 4.5. @@ -33,64 +33,63 @@ Before trying to upgrade to Microsoft Application Virtualization (App-V) 4.5 or - + - + - + - + - +

          Upgrade the App-V clients.

          [How to Upgrade the Application Virtualization Client](how-to-upgrade-the-application-virtualization-client.md)

          How to Upgrade the Application Virtualization Client

          Upgrade the App-V servers and database.

          -Important   -

          If you have more than one server sharing access to the App-V database, all those servers must be taken offline while the database is being upgraded. You should follow your regular business practices for the database upgrade, but we recommend that you test the database upgrade by using a backup copy of the database first on a test server. Then, you should select one of the servers for the first upgrade, which will upgrade the database schema. After the production database has been successfully upgraded, you can upgrade the App-V software on the other servers.

          +Important

          If you have more than one server sharing access to the App-V database, all those servers must be taken offline while the database is being upgraded. You should follow your regular business practices for the database upgrade, but we recommend that you test the database upgrade by using a backup copy of the database first on a test server. Then, you should select one of the servers for the first upgrade, which will upgrade the database schema. After the production database has been successfully upgraded, you can upgrade the App-V software on the other servers.

          -  +

          [How to Upgrade the Servers and System Components](how-to-upgrade-the-servers-and-system-components.md)

          How to Upgrade the Servers and System Components

          Upgrade the App-V Management Web Service.

          This step applies only if the Management Web Service is on a separate server, which would require that you run the server installer program on that separate server to upgrade the Management Web service. Otherwise, the previous server upgrade step will automatically upgrade the Management Web Service.

          [How to Upgrade the Servers and System Components](how-to-upgrade-the-servers-and-system-components.md)

          How to Upgrade the Servers and System Components

          Upgrade the App-V Management Console.

          This step applies only if the Management Console is on a separate computer, which would require that you run the server installer program on that separate computer to upgrade the console. Otherwise, the previous server upgrade step will upgrade the Management Console.

          [How to Upgrade the Servers and System Components](how-to-upgrade-the-servers-and-system-components.md)

          How to Upgrade the Servers and System Components

          Upgrade the App-V Sequencer.

          [How to Upgrade the Application Virtualization Sequencer](how-to-upgrade-the-application-virtualization-sequencer.md)

          How to Upgrade the Application Virtualization Sequencer

          -  + ## Additional Upgrade Considerations -- Any virtual application packages sequenced in version 4.2 will not have to be sequenced again for use with version 4.5. However, you should consider upgrading the virtual packages to the Microsoft Application Virtualization 4.5 format if you want to apply default access control lists (ACLs) or generate a Windows Installer file. This is a simple process and requires only that the existing virtual application package be opened and saved with the App-V 4.5 Sequencer. This can be automated by using the App-VSequencer command-line interface. For more information, see [How to Create or Upgrade Virtual Applications Using the App-V Sequencer](how-to-create-or-upgrade-virtual-applications-using--the-app-v-sequencer.md) +- Any virtual application packages sequenced in version 4.2 will not have to be sequenced again for use with version 4.5. However, you should consider upgrading the virtual packages to the Microsoft Application Virtualization 4.5 format if you want to apply default access control lists (ACLs) or generate a Windows Installer file. This is a simple process and requires only that the existing virtual application package be opened and saved with the App-V 4.5 Sequencer. This can be automated by using the App-VSequencer command-line interface. For more information, see [How to Create or Upgrade Virtual Applications Using the App-V Sequencer](how-to-create-or-upgrade-virtual-applications-using--the-app-v-sequencer.md) -- One of the features of the 4.5 Sequencer is the ability to create Windows Installer (.msi) files as control points for virtual application package interoperability with electronic software distribution (ESD) systems, such as Microsoft System Center Configuration Manager 2007. Previous Windows Installer files created with the MSI tool for Application Virtualization that were installed on a App-V 4.1 or 4.2 client that is subsequently upgraded to App-V 4.5 will continue to work, although they cannot be installed on the App-V 4.5 client. However, they cannot be removed or upgraded unless they are upgraded in the App-V 4.5 Sequencer. The original App-V package earlier than 4.5 has to be opened in the App-V 4.5 Sequencer and then saved as a Windows Installer File. +- One of the features of the 4.5 Sequencer is the ability to create Windows Installer (.msi) files as control points for virtual application package interoperability with electronic software distribution (ESD) systems, such as Microsoft System Center Configuration Manager 2007. Previous Windows Installer files created with the MSI tool for Application Virtualization that were installed on a App-V 4.1 or 4.2 client that is subsequently upgraded to App-V 4.5 will continue to work, although they cannot be installed on the App-V 4.5 client. However, they cannot be removed or upgraded unless they are upgraded in the App-V 4.5 Sequencer. The original App-V package earlier than 4.5 has to be opened in the App-V 4.5 Sequencer and then saved as a Windows Installer File. - **Note**   - If the App-V 4.2 Client has already been upgraded to App-V 4.5, it is possible to script a workaround to preserve the version 4.2 packages on version 4.5 clients and allow them to be managed. This script must copy two files, msvcp71.dll and msvcr71.dll, to the App-V installation folder and set the following registry key values under the registry key:\[HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Configuration\]: + **Note** + If the App-V 4.2 Client has already been upgraded to App-V 4.5, it is possible to script a workaround to preserve the version 4.2 packages on version 4.5 clients and allow them to be managed. This script must copy two files, msvcp71.dll and msvcr71.dll, to the App-V installation folder and set the following registry key values under the registry key:\[HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client\\Configuration\]: "ClientVersion"="4.2.1.20" "GlobalDataDirectory"="C:\\\\Documents and Settings\\\\All Users\\\\Documents\\\\" (a globally writeable location) -   + - Windows Installer files generated by the App-V 4.5 Sequencer display the error message "This package requires Microsoft Application Virtualization Client 4.5 or later" when trying to run them on an App-V 4.6 Client. Open the old package with either the App-V 4.5 SP1 Sequencer or the App-V 4.6 Sequencer and generate a new .msi file for the package. -- Any version 4.2 reports that were created and saved will be overwritten when the server is upgraded to version 4.5. If you have to keep these reports, you must save a backup copy of the SftMMC.msc file located in the SoftGrid Management Console folder on the server and use that copy to replace the new SftMMC.msc that is installed during the upgrade. +- Any version 4.2 reports that were created and saved will be overwritten when the server is upgraded to version 4.5. If you have to keep these reports, you must save a backup copy of the SftMMC.msc file located in the SoftGrid Management Console folder on the server and use that copy to replace the new SftMMC.msc that is installed during the upgrade. - For additional information about upgrading from previous versions, see [Upgrading to Microsoft Application Virtualization 4.5 FAQ](https://go.microsoft.com/fwlink/?LinkId=120358) (https://go.microsoft.com/fwlink/?LinkId=120358). -## App-V 4.6 Client Package Support +## App-V 4.6 Client Package Support -You can deploy packages created in previous versions of App-V to App-V 4.6 clients. However, you must modify the associated .osd file so that it includes the appropriate operating system and chip architecture information. The following values can be used: +You can deploy packages created in previous versions of App-V to App-V 4.6 clients. However, you must modify the associated .osd file so that it includes the appropriate operating system and chip architecture information. The following values can be used: @@ -138,16 +137,16 @@ You can deploy packages created in previous versions of App-V to App-V 4.6 cli
          -  -To run a newly created 32-bit package, you must sequence the application on a computer running a 32-bit operating system with the App-V 4.6 Sequencer installed. After you have sequenced the application, in the Sequencer console, click the **Deployment** tab and then specify the appropriate operating system and chip architecture as required. -**Important**   -Applications sequenced on a computer running a 64-bit operating system must be deployed to computers running a 64-bit operating system. New 32-bit packages created by using the App-V 4.6 Sequencer do not run on computers running the App-V 4.5 client. +To run a newly created 32-bit package, you must sequence the application on a computer running a 32-bit operating system with the App-V 4.6 Sequencer installed. After you have sequenced the application, in the Sequencer console, click the **Deployment** tab and then specify the appropriate operating system and chip architecture as required. -  +**Important** +Applications sequenced on a computer running a 64-bit operating system must be deployed to computers running a 64-bit operating system. New 32-bit packages created by using the App-V 4.6 Sequencer do not run on computers running the App-V 4.5 client. -To run new 64-bit packages on the App-V 4.6 Client, you must sequence the application on a computer running the App-V 4.6 Sequencer and that is running a 64-bit operating system. After you have sequenced the application, in the Sequencer console, click the **Deployment** tab, and then specify the appropriate operating system and chip architecture as required. + + +To run new 64-bit packages on the App-V 4.6 Client, you must sequence the application on a computer running the App-V 4.6 Sequencer and that is running a 64-bit operating system. After you have sequenced the application, in the Sequencer console, click the **Deployment** tab, and then specify the appropriate operating system and chip architecture as required. The following table lists which client versions will run packages created by using the various versions of the sequencer. @@ -162,36 +161,36 @@ The following table lists which client versions will run packages created by usi -Sequenced by using the App-V 4.2 Sequencer -Sequenced by using the App-V 4.5 Sequencer -Sequenced by using the 32-bit App-V 4.6 Sequencer -Sequenced by using the 64-bit App-V 4.6 Sequencer +Sequenced by using the App-V 4.2 Sequencer +Sequenced by using the App-V 4.5 Sequencer +Sequenced by using the 32-bit App-V 4.6 Sequencer +Sequenced by using the 64-bit App-V 4.6 Sequencer -

          4.2 Client

          +

          4.2 Client

          Yes

          No

          No

          No

          -

          4.5 Client ¹

          +

          4.5 Client ¹

          Yes

          Yes

          No

          No

          -

          4.6 Client (32-bit)

          +

          4.6 Client (32-bit)

          Yes

          Yes

          Yes

          No

          -

          4.6 Client (64-bit)

          +

          4.6 Client (64-bit)

          Yes

          Yes

          Yes

          @@ -200,13 +199,13 @@ The following table lists which client versions will run packages created by usi -  -¹Applies to all versions of the App-V 4.5 client, including App-V 4.5, App-V 4.5 CU1, and App-V 4.5 SP1. -  - -  +¹Applies to all versions of the App-V 4.5 client, including App-V 4.5, App-V 4.5 CU1, and App-V 4.5 SP1. + + + + diff --git a/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md b/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md index 75ec7ccebc..e11246cb72 100644 --- a/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md +++ b/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md @@ -27,7 +27,7 @@ The following list includes the recommended minimum hardware and software requir **Note**   The Application Virtualization (App-V) Desktop Client requires no additional processor or RAM resources beyond the requirements of the host operating system. -  + ### Hardware Requirements @@ -85,8 +85,8 @@ The hardware requirements are applicable to all versions. The following software prerequisites are installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, the following products must be installed first. -- **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). - - **Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)**—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see [Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)](https://go.microsoft.com/fwlink/?LinkId=63266) (https://go.microsoft.com/fwlink/?LinkId=63266). +- **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). + - **Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)**—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see [Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)](https://go.microsoft.com/fwlink/?LinkId=63266) (https://go.microsoft.com/fwlink/?LinkId=63266). For the Application Virtualization (App-V) 4.6 Desktop Client, the following additional software prerequisite is installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, you must also install with the other prerequisites listed. @@ -136,19 +136,19 @@ The Application Virtualization (App-V) 4.6 Desktop Client supports x86 and x64 S The following software prerequisites are installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, the following products must be installed first. -- **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). +- Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see Microsoft Visual C++ 2005 SP1 Redistributable Package (x86) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist_x86.exe from Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update (https://go.microsoft.com/fwlink/?LinkId=169360). -- **Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)**—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see [Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)](https://go.microsoft.com/fwlink/?LinkId=63266) (https://go.microsoft.com/fwlink/?LinkId=63266). +- Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see Microsoft Core XML Services (MSXML) 6.0 SP1 (x86) (https://go.microsoft.com/fwlink/?LinkId=63266). -- **Microsoft Application Error Reporting**—The installation program for this software is included in the **Support\\Watson** folder in the self-extracting archive file. +- Microsoft Application Error Reporting—The installation program for this software is included in the Support\Watson folder in the self-extracting archive file. For the Application Virtualization (App-V) 4.6 Desktop Client, the following additional software prerequisite is installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, you must also install with the other prerequisites listed. -- **Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=150700) (https://go.microsoft.com/fwlink/?LinkId=150700). +- Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)—For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see Microsoft Visual C++ 2008 SP1 Redistributable Package (x86) (https://go.microsoft.com/fwlink/?LinkId=150700). ## Application Virtualization Client for Remote Desktop Services -Following are the recommended hardware and software requirements for the Application Virtualization Client for Remote Desktop Services. The requirements are listed first for appv461\_3, followed by the requirements for versions that preceded App-V 4.6 SP2. +Following are the recommended hardware and software requirements for the Application Virtualization Client for Remote Desktop Services. The requirements are listed first for appv461_3, followed by the requirements for versions that preceded App-V 4.6 SP2. The Application Virtualization (App-V) Client for Remote Desktop Services requires no additional processor or RAM resources beyond the requirements of the host operating system. diff --git a/mdop/appv-v4/application-virtualization-client-installer-command-line-parameters.md b/mdop/appv-v4/application-virtualization-client-installer-command-line-parameters.md index 2bb49ee5ac..5934984a4d 100644 --- a/mdop/appv-v4/application-virtualization-client-installer-command-line-parameters.md +++ b/mdop/appv-v4/application-virtualization-client-installer-command-line-parameters.md @@ -19,12 +19,12 @@ ms.date: 08/30/2016 The following table lists all available Microsoft Application Virtualization Client installer command-line parameters, their values, and a brief description of each parameter. Parameters are case-sensitive and must be entered as all-uppercase letters. All parameter values must be enclosed in double quotes. -**Note**   -- For App-V version 4.6, command-line parameters cannot be used during a client upgrade. +**Note** +- For App-V version 4.6, command-line parameters cannot be used during a client upgrade. - The *SWICACHESIZE* and *MINFREESPACEMB* parameters cannot be combined on the command line. If both are used, the *SWICACHESIZE* parameter will be ignored. -  + @@ -59,14 +59,13 @@ The following table lists all available Microsoft Application Virtualization Cli

          A URL has several parts:

          <protocol>://<server>:<port>/<path>/<?query><#fragment>

          A UNC path has three parts:

          -

          \\<computername>\<share folder>\<resource>

          +

          &lt;computername>&lt;share folder>&lt;resource>

          If the APPLICATIONSOURCEROOT parameter is specified on a client, the client will break the URL or UNC path from an OSD file into its constituent parts and replace the OSD sections with the corresponding APPLICATIONSOURCEROOT sections.

          -Important   -

          Be sure to use the correct format when using file:// with a UNC path. The correct format is file://\\<server>\<share>.

          +Important

          Be sure to use the correct format when using file:// with a UNC path. The correct format is file://&lt;server>&lt;share>.

          -  +
          @@ -77,13 +76,12 @@ The following table lists all available Microsoft Application Virtualization Cli

          A URL has several parts:

          <protocol>://<server>:<port>/<path>/<?query><#fragment>

          A UNC path has three parts:

          -

          \\<computername>\<share folder>\<resource>

          +

          &lt;computername>&lt;share folder>&lt;resource>

          -Important   -

          Be sure to use the correct format when using a UNC path. Acceptable formats are \\<server>\<share> or <drive letter>:\<folder>.

          +Important

          Be sure to use the correct format when using a UNC path. Acceptable formats are &lt;server>&lt;share> or <drive letter>:&lt;folder>.

          -  +
          @@ -94,13 +92,12 @@ The following table lists all available Microsoft Application Virtualization Cli

          A URL has several parts:

          <protocol>://<server>:<port>/<path>/<?query><#fragment>

          A UNC path has three parts:

          -

          \\<computername>\<share folder>\<resource>

          +

          &lt;computername>&lt;share folder>&lt;resource>

          -Important   -

          Be sure to use the correct format when using a UNC path. Acceptable formats are \\<server>\<share> or <drive letter>:\<folder>.

          +Important

          Be sure to use the correct format when using a UNC path. Acceptable formats are &lt;server>&lt;share> or <drive letter>:&lt;folder>.

          -  +
          @@ -111,11 +108,10 @@ The following table lists all available Microsoft Application Virtualization Cli @@ -144,20 +139,18 @@ The following table lists all available Microsoft Application Virtualization Cli
        • NONE—No auto-loading, regardless of what triggers might be set.

        • ALL—If any AutoLoad trigger is enabled, all packages are automatically loaded, whether or not they have ever been launched.

          -Note   -

          This setting is configured for individual packages by using the SFTMIME ADD PACKAGE and CONFIGURE PACKAGE commands. For more information about these commands, see [SFTMIME Command Reference](sftmime--command-reference.md).

          +Note

          This setting is configured for individual packages by using the SFTMIME ADD PACKAGE and CONFIGURE PACKAGE commands. For more information about these commands, see SFTMIME Command Reference.

          -  +
        • PREVUSED—If any AutoLoad trigger is enabled, load only the packages where at least one application in the package has been previously used (that is, launched or precached).

        • -Note   -

          When you install the App-V client to use a read-only cache, (for example, as a VDI server implementation), you must set the AUTOLOADTARGET parameter to NONE to prevent the client from trying to update applications in the read-only cache.

          +Note

          When you install the App-V client to use a read-only cache, (for example, as a VDI server implementation), you must set the AUTOLOADTARGET parameter to NONE to prevent the client from trying to update applications in the read-only cache.

          -  +
          @@ -217,7 +210,7 @@ The following table lists all available Microsoft Application Virtualization Cli - @@ -286,19 +279,18 @@ The following table lists all available Microsoft Application Virtualization Cli

          The AutoLoad triggers that define the events that initiate auto-loading of applications. AutoLoad implicitly uses background streaming to enable the application to be fully loaded into cache.

          The primary feature block will be loaded as quickly as possible. Remaining feature blocks will be loaded in the background to enable foreground operations, such as user interaction with applications, to take priority and provide optimal performance.

          -Note   -

          The AUTOLOADTARGET parameter determines which applications are auto-loaded. By default, packages that have been used are auto-loaded unless AUTOLOADTARGET is set.

          +Note

          The AUTOLOADTARGET parameter determines which applications are auto-loaded. By default, packages that have been used are auto-loaded unless AUTOLOADTARGET is set.

          -  +

          Each parameter affects loading behavior as follows:

            @@ -126,11 +122,10 @@ The following table lists all available Microsoft Application Virtualization Cli

            The three values can be combined. In the following example, AutoLoad triggers are enabled both at user login and when publishing refresh occurs:

            AUTOLOADONLOGIN AUTOLOADONREFRESH

            -Note   -

            If the client is configured with these values at first install, Autoload will not be triggered until the next time the user logs off and logs back on.

            +Note

            If the client is configured with these values at first install, Autoload will not be triggered until the next time the user logs off and logs back on.

            -  +

          SWIPUBSVRHOST

          IP address|host name

          Specifies either the IP address of the Application Virtualization Server or a host name of the server that resolves into the server's IP address; required when SWIPUBSVRDISPLAY is used.

          +

          Specifies either the IP address of the Application Virtualization Server or a host name of the server that resolves into the server's IP address; required when SWIPUBSVRDISPLAY is used.

          Example: SWIPUBSVRHOST="SERVER01"

          [0|1]

          Used when you have applied registry settings prior to deploying a client—for example, by using Group Policy. When a client is deployed, set this parameter to a value of 1 so that it will not overwrite the registry settings.

          -Important   -

          If set to a value of 1, the following client installer command-line parameters are ignored:

          +Important

          If set to a value of 1, the following client installer command-line parameters are ignored:

          SWICACHESIZE, MINFREESPACEMB, ALLOWINDEPENDENTFILESTREAMING, APPLICATIONSOURCEROOT, ICONSOURCEROOT, OSDSOURCEROOT, SYSTEMEVENTLOGLEVEL, SWIGLOBALDATA, DOTIMEOUTMINUTES, SWIFSDRIVE, AUTOLOADTARGET, AUTOLOADTRIGGERS, and SWIUSERDATA.

          -

          For further information about setting these values after installation, see “How to Configure the App-V Client Registry Settings by Using the Command Line” in the Application Virtualization (App-V) Operations Guide ([https://go.microsoft.com/fwlink/?LinkId=122939](https://go.microsoft.com/fwlink/?LinkId=122939)).

          +

          For further information about setting these values after installation, see “How to Configure the App-V Client Registry Settings by Using the Command Line” in the Application Virtualization (App-V) Operations Guide (https://go.microsoft.com/fwlink/?LinkId=122939).

          -  +
          -  + ## Related topics @@ -309,9 +301,9 @@ The following table lists all available Microsoft Application Virtualization Cli [SFTMIME Command Reference](sftmime--command-reference.md) -  - -  + + + diff --git a/mdop/appv-v4/application-virtualization-properties-general-tab.md b/mdop/appv-v4/application-virtualization-properties-general-tab.md index 6b66e5fa66..31bfb94c4b 100644 --- a/mdop/appv-v4/application-virtualization-properties-general-tab.md +++ b/mdop/appv-v4/application-virtualization-properties-general-tab.md @@ -40,7 +40,7 @@ Select the level from the drop-down list. The default level is **Warning**. **Note**   The **System Log Level** setting controls the level of messages sent to the system event log. The logged messages are identical to the messages that get logged to the client event log, but they are stored in a different location that does not have the space limitations of the client event log. Because the system event log does not have space limitations, it is ideally suited for situations where verbose logging is necessary. -  + **Global Data Directory** Enter or browse to the location of the directory of the log file. The default locations are as follows: @@ -57,9 +57,9 @@ Enter or browse to the location of the directory where user-specific data is sto [Client Management Console: Application Virtualization Properties](client-management-console-application-virtualization-properties.md) -  + -  + diff --git a/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md b/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md index b658320309..22cdebc6e0 100644 --- a/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md +++ b/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md @@ -22,7 +22,7 @@ This topic describes the minimum recommended hardware and software requirements **Important**   You must run the App-V sequencer (**SFTSequencer.exe**) using an account that has administrator privileges because of the changes the sequencer makes to the local system. These changes can include writing files to the **C:\\Program Files** directory, making registry changes, starting and stopping services, updating security descriptors for files, and changing permissions. -  + Before you install the Sequencer and after you sequence each application, you must restore a clean operating system image to the sequencing computer. You can use one of the following methods to restore the computer running the Sequencer: @@ -47,7 +47,7 @@ The requirements are listed first for Microsoft Application Virtualization (App- **Note**   Sequencing requires heavy disk usage. A fast disk speed can decrease the sequencing time. -   + ### Software Requirements for App-V 4.6 SP2 @@ -96,12 +96,12 @@ The following list outlines the supported operating systems for running the App- -  + **Note**   The Application Virtualization (App-V) 4.6 SP2 Sequencer supports 32-bit and 64-bit versions of these operating systems. -  + You should configure computers running the Sequencer with the same applications that are installed on targeted computers. @@ -146,14 +146,14 @@ The following list outlines the supported operating systems for running the Sequ -  + ¹Supported for App-V 4.5 with SP1 or SP2, and App-V 4.6 only **Note**   The Application Virtualization (App-V) 4.6 Sequencer supports 32-bit and 64-bit versions of these operating systems. -  + You should configure computers running the Sequencer with the same applications that are installed on targeted computers. @@ -202,12 +202,12 @@ You should configure computers running the Sequencer with the same applications -  + **Note**   Application Virtualization (App-V) 4.6 SP2 for Remote Desktop Services supports 32-bit and 64-bit versions of these operating systems. -  + ### Software Requirements for Remote Desktop Services for Versions that Precede App-V 4.6 SP2 @@ -254,12 +254,12 @@ Application Virtualization (App-V) 4.6 SP2 for Remote Desktop Services supports -  + **Note**   Application Virtualization (App-V) 4.6 SP2 for Remote Desktop Services supports 32-bit and 64-bit versions of these operating systems. -  + ## Related topics @@ -272,9 +272,9 @@ Application Virtualization (App-V) 4.6 SP2 for Remote Desktop Services supports [How to Upgrade the Application Virtualization Sequencer](how-to-upgrade-the-application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/application-virtualization-sequencing-wizard-advanced-options-page.md b/mdop/appv-v4/application-virtualization-sequencing-wizard-advanced-options-page.md index f778765055..bea986ef57 100644 --- a/mdop/appv-v4/application-virtualization-sequencing-wizard-advanced-options-page.md +++ b/mdop/appv-v4/application-virtualization-sequencing-wizard-advanced-options-page.md @@ -41,16 +41,15 @@ Use the **Advanced Options** page of the Application Virtualization (App-V) Sequ
        • 64 KB

        -Note   -

        When you select a block size, consider the size of the SFT file and your network bandwidth. A file with a smaller block size takes longer to stream over the network but is less bandwidth-intensive. Files with larger block sizes might stream faster, but they use more network bandwidth. Through experimentation, you can discover the optimum block size for streaming applications on your network.

        +Note

        When you select a block size, consider the size of the SFT file and your network bandwidth. A file with a smaller block size takes longer to stream over the network but is less bandwidth-intensive. Files with larger block sizes might stream faster, but they use more network bandwidth. Through experimentation, you can discover the optimum block size for streaming applications on your network.

        -  +

        Enable Microsoft Update During Monitoring

        -

        Enables installation of Microsoft Updates during the Sequencing Wizard's monitoring phase.

        +

        Enables installation of Microsoft Updates during the Sequencing Wizard's monitoring phase.

        Rebase DLLs

        @@ -58,11 +57,11 @@ Use the **Advanced Options** page of the Application Virtualization (App-V) Sequ

        Back

        -

        Accesses the Sequencing Wizard's previous page.

        +

        Accesses the Sequencing Wizard's previous page.

        Next

        -

        Accesses the Sequencing Wizard's next page.

        +

        Accesses the Sequencing Wizard's next page.

        Cancel

        @@ -71,7 +70,7 @@ Use the **Advanced Options** page of the Application Virtualization (App-V) Sequ -  + \[Template Token Value\] @@ -112,7 +111,7 @@ Use the **Advanced Options** page of the App-V Sequencing Wizard to specify adva -  + \[Template Token Value\] @@ -121,9 +120,9 @@ Use the **Advanced Options** page of the App-V Sequencing Wizard to specify adva [Sequencing Wizard](sequencing-wizard.md) -  - -  + + + diff --git a/mdop/appv-v4/application-virtualization-sequencing-wizard-monitor-installation-page.md b/mdop/appv-v4/application-virtualization-sequencing-wizard-monitor-installation-page.md index 81c5439dc4..cab2f6fa85 100644 --- a/mdop/appv-v4/application-virtualization-sequencing-wizard-monitor-installation-page.md +++ b/mdop/appv-v4/application-virtualization-sequencing-wizard-monitor-installation-page.md @@ -35,31 +35,29 @@ Use the **Monitor Installation** page of the Application Virtualization Sequenci

        Begin Monitoring

        Starts the monitoring of the sequencing process.

        -Note   -

        The Sequencer will minimize so that you can run your application's installer, except on Vista.

        +Note

        The Sequencer will minimize so that you can run your application's installer, except on Vista.

        -  +

        Stop Monitoring

        Stops the monitoring of the sequencing process.

        -Note   -

        The Stop Monitoring button is displayed only after the monitoring process starts.

        +Note

        The Stop Monitoring button is displayed only after the monitoring process starts.

        -  +

        Back

        -

        Accesses the Sequencing Wizard's previous page.

        +

        Accesses the Sequencing Wizard's previous page.

        Next

        -

        Accesses the Sequencing Wizard's next page.

        +

        Accesses the Sequencing Wizard's next page.

        Cancel

        @@ -68,7 +66,7 @@ Use the **Monitor Installation** page of the Application Virtualization Sequenci -  + \[Template Token Value\] @@ -109,7 +107,7 @@ Use the **Monitor Installation** page of the App-V sequencing wizard to monitor -  + \[Template Token Value\] @@ -118,9 +116,9 @@ Use the **Monitor Installation** page of the App-V sequencing wizard to monitor [Sequencing Wizard](sequencing-wizard.md) -  - -  + + + diff --git a/mdop/appv-v4/application-virtualization-server-based-scenario-overview.md b/mdop/appv-v4/application-virtualization-server-based-scenario-overview.md index e1dd5d1a06..fd47fcd34c 100644 --- a/mdop/appv-v4/application-virtualization-server-based-scenario-overview.md +++ b/mdop/appv-v4/application-virtualization-server-based-scenario-overview.md @@ -55,7 +55,7 @@ For load from file package delivery, the server delivers the entire virtualized **Note**   For each delivery method, the initial virtual application delivery process and the virtual application update process are the same; the updated virtual application package replaces the original application package. -  + The following table compares the advantages and disadvantages of each package delivery method. @@ -98,7 +98,7 @@ The following table compares the advantages and disadvantages of each package de -  + ## Server-Related Protocols and External Components @@ -157,7 +157,7 @@ The following table lists the server types that can be used in an Application Vi -  + ## Related topics @@ -168,9 +168,9 @@ The following table lists the server types that can be used in an Application Vi [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/application-virtualization-system-requirements.md b/mdop/appv-v4/application-virtualization-system-requirements.md index c2b13d450d..0688d51f04 100644 --- a/mdop/appv-v4/application-virtualization-system-requirements.md +++ b/mdop/appv-v4/application-virtualization-system-requirements.md @@ -89,7 +89,7 @@ The following list includes the minimum recommended hardware and software requir -  + ¹Applies to App-V 4.5 SP1 and SP2 only. @@ -163,7 +163,7 @@ The following list includes the minimum recommended hardware and software requir -  + ¹Applies to App-V 4.5 SP1 and SP2 only. @@ -243,7 +243,7 @@ The following list includes the minimum recommended hardware and software requir -  + ¹Applies to App-V 4.5 SP1 and SP2 only. @@ -327,7 +327,7 @@ The following list includes the minimum recommended hardware and software requir -  + ¹Applies to App-V 4.5 SP1 and SP2 only. @@ -338,7 +338,7 @@ The following list includes the minimum recommended hardware and software requir **Important**   The minimum requirement is .NET Framework 2.0 SP2 if you must install App-V hotfix KB980850 or subsequent App-V hotfixes on the computer that is running the App-V Management Console. -   + ## Related topics @@ -353,9 +353,9 @@ The following list includes the minimum recommended hardware and software requir [How to Upgrade the Servers and System Components](how-to-upgrade-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/applications-licenses-node.md b/mdop/appv-v4/applications-licenses-node.md index 716dc4bbf5..e41472ad97 100644 --- a/mdop/appv-v4/applications-licenses-node.md +++ b/mdop/appv-v4/applications-licenses-node.md @@ -28,7 +28,7 @@ The **Applications Licenses** node is one level below the Application Virtualiza **Note**   You can combine concurrent and named licenses for the same application. -  + Right-click the **Applications Licenses** node to display a pop-up menu that contains the following elements. @@ -116,9 +116,9 @@ Displays the help system for the Application Virtualization Server Management Co [Server Management Console: Application Licenses Node](server-management-console-application-licenses-node.md) -  + -  + diff --git a/mdop/appv-v4/applications-results-pane-columns.md b/mdop/appv-v4/applications-results-pane-columns.md index a2e1bb086b..763e99c393 100644 --- a/mdop/appv-v4/applications-results-pane-columns.md +++ b/mdop/appv-v4/applications-results-pane-columns.md @@ -22,7 +22,7 @@ The **Results** pane of the **Applications** node in the Application Virtualizat **Note**   You can add or remove columns by right-clicking in the **Results** pane, selecting **View**, and then selecting **Add/Remove Columns**. -  + The list can be sorted by any column. Columns that contain dates and times are sorted in chronological order, not alphabetical. For columns that contain a mix of dates and times and text, dates and times are considered to come before any other text. @@ -127,9 +127,9 @@ The application version. [Application Virtualization Client Management Console Reference](application-virtualization-client-management-console-reference.md) -  + -  + diff --git a/mdop/appv-v4/best-practices-for-the-application-virtualization-sequencer-sp1.md b/mdop/appv-v4/best-practices-for-the-application-virtualization-sequencer-sp1.md index 18e320f75c..98700d6626 100644 --- a/mdop/appv-v4/best-practices-for-the-application-virtualization-sequencer-sp1.md +++ b/mdop/appv-v4/best-practices-for-the-application-virtualization-sequencer-sp1.md @@ -68,7 +68,7 @@ The following best practices should be considered when sequencing a new applicat **Note**   If you are running App-V 4.6 SP1 you do not need to sequence to a directory that follows the 8.3 naming convention. -   + - **Sequence to a unique directory that follows the 8.3 naming convention.** @@ -95,9 +95,9 @@ The following best practices should be considered when sequencing a new applicat [Planning for Application Virtualization System Deployment](planning-for-application-virtualization-system-deployment.md) -  + -  + diff --git a/mdop/appv-v4/command-line-errors.md b/mdop/appv-v4/command-line-errors.md index 6689d0460b..4acd9ab657 100644 --- a/mdop/appv-v4/command-line-errors.md +++ b/mdop/appv-v4/command-line-errors.md @@ -22,7 +22,7 @@ Use the following list of errors to identify the reasons why command-line sequen **Note**   More than one error might be displayed when sequencing. Furthermore, the error code displayed might be the sum of two error codes. For example, if the */InstallPath* and */OutputFile* parameters are missing, the Microsoft System Center Application Virtualization Sequencer will return 96—the sum of the two error codes. -  + 01 There is an unspecified error. @@ -64,7 +64,7 @@ The sequenced application package cannot be saved. The specified package name (/PACKAGENAME) is not valid. 8192 -The specified block size (/BLOCKSIZE*)* is not valid. +The specified block size (/BLOCKSIZE) is not valid. 16384 The specified compression type (/COMPRESSION) is not valid. @@ -91,9 +91,9 @@ The package name was not specified. [Command-Line Parameters](command-line-parameters.md) -  + -  + diff --git a/mdop/appv-v4/command-line-parameters.md b/mdop/appv-v4/command-line-parameters.md index 6e2dff3b8e..b404816379 100644 --- a/mdop/appv-v4/command-line-parameters.md +++ b/mdop/appv-v4/command-line-parameters.md @@ -34,7 +34,7 @@ Use to specify the path and file name of the SPRJ file that will be generated. **Important**   The */OUTPUTFILE* parameter is not available when opening a package that you do not intend to upgrade. -  + */FULLLOAD* or */F* Use to specify whether to put everything in the primary feature block. @@ -87,9 +87,9 @@ Specifies the directory on the sequencing computer where the files associated wi [How to Upgrade a Package Using the Open Package Command](how-to-upgrade-a-package-using-the-open-package-command.md) -  + -  + diff --git a/mdop/appv-v4/configuring-certificates-to-support-app-v-management-server-or-streaming-server.md b/mdop/appv-v4/configuring-certificates-to-support-app-v-management-server-or-streaming-server.md index 3fd924773b..5c2c349db4 100644 --- a/mdop/appv-v4/configuring-certificates-to-support-app-v-management-server-or-streaming-server.md +++ b/mdop/appv-v4/configuring-certificates-to-support-app-v-management-server-or-streaming-server.md @@ -22,12 +22,12 @@ After you complete the certificate provisioning process and change the private k **Note**   Select the certificate that was configured for App-V if there is more than one certificate provisioned for this server. -  + **Important**   When upgrading from version  4.2 to version  4.5, the setup has an option for **Use enhanced security**; however, selecting this option will not disable streaming over RTSP. You must use the Management Console to disable RTSP after installation. -  + Select the TCP port that the service will use for client communications. The default port is TCP 322; however, you can change the port to a custom port for your environment. @@ -51,9 +51,9 @@ For more detailed information about configuring certificates with the SAN attrib [How to Modify Private Key Permissions to Support Management Server or Streaming Server](how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md) -  + -  + diff --git a/mdop/appv-v4/configuring-certificates-to-support-secure-streaming.md b/mdop/appv-v4/configuring-certificates-to-support-secure-streaming.md index 65e80a70a6..2a4167506b 100644 --- a/mdop/appv-v4/configuring-certificates-to-support-secure-streaming.md +++ b/mdop/appv-v4/configuring-certificates-to-support-secure-streaming.md @@ -35,7 +35,7 @@ The scenarios for obtaining and installing a certificate for App-V are as follow **Note**   If you need to obtain a certificate from a third-party CA, follow the documentation available on that CA’s Web site. -   + If a PKI infrastructure has been deployed, consult with the PKI administrators to acquire a certificate that complies with the requirements described in this topic. If a PKI infrastructure is not available, use a third-party CA to obtain a valid certificate. @@ -47,9 +47,9 @@ For step-by-step guidance for obtaining and installing a certificate, see . @@ -41,9 +41,9 @@ App-V can use IIS servers to support different infrastructure configurations. Fo [How to Install and Configure the App-V Management Console for a More Secure Environment](how-to-install-and-configure-the-app-v-management-console-for-a-more-secure-environment.md) -  + -  + diff --git a/mdop/appv-v4/configuring-iis-for-secure-streaming.md b/mdop/appv-v4/configuring-iis-for-secure-streaming.md index 3f3e7c2588..7257a99ab0 100644 --- a/mdop/appv-v4/configuring-iis-for-secure-streaming.md +++ b/mdop/appv-v4/configuring-iis-for-secure-streaming.md @@ -26,7 +26,7 @@ If you want to stream applications from a file server, you should enhance the se - For Windows Server 2008, -  + ## MIME Types @@ -55,9 +55,9 @@ To create an SPN, run `setspn.exe` from a command prompt while logged in as a me [Configuring Management or Streaming Server for Secure Communications Post-Installation](configuring-management-or-streaming-server-for-secure-communications-post-installation.md) -  + -  + diff --git a/mdop/appv-v4/create-package-page--app-v-46-sp1.md b/mdop/appv-v4/create-package-page--app-v-46-sp1.md index 39e886c400..11e4b06c98 100644 --- a/mdop/appv-v4/create-package-page--app-v-46-sp1.md +++ b/mdop/appv-v4/create-package-page--app-v-46-sp1.md @@ -33,16 +33,16 @@ Select the **Compress Package** check box to compress the package, which can hel **Note**   If the original package size is more than 4 GB and compressed, by default, the checkbox is checked and cannot be changed. If the original package is compressed and less than 4 GB, the check box is checked, but can be cleared. -  + ## Related topics [Sequencer Wizard - Package Accelerator (AppV 4.6 SP1)](sequencer-wizard---package-accelerator--appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/delete-package.md b/mdop/appv-v4/delete-package.md index 4e7a870a04..b5f9062d59 100644 --- a/mdop/appv-v4/delete-package.md +++ b/mdop/appv-v4/delete-package.md @@ -52,7 +52,7 @@ Removes a package record and the applications associated with it. -  + For version 4.6, the following option has been added. @@ -69,23 +69,23 @@ For version 4.6, the following option has been added. -  + **Important**   The DELETE PACKAGE command always performs a global delete of the package and deletes only global file types and shortcuts. If the package is global, this command must be run as local Administrator; otherwise, only **DeleteApp** permission is needed. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/delete-server.md b/mdop/appv-v4/delete-server.md index ca8f118cc5..4f021d2a66 100644 --- a/mdop/appv-v4/delete-server.md +++ b/mdop/appv-v4/delete-server.md @@ -22,7 +22,7 @@ Removes a publishing server. **Note**   This command does not remove any applications or packages published to the client by the server. For each application, use the SFTMIME **CLEAR APP** command followed by the **DELETE PACKAGE** command to completely remove those applications and packages from the client. -  + `SFTMIME DELETE SERVER:server-name [/LOG log-pathname | /CONSOLE | /GUI]` @@ -57,7 +57,7 @@ This command does not remove any applications or packages published to the clien -  + For version 4.6, the following option has been added. @@ -74,16 +74,16 @@ For version 4.6, the following option has been added. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/determine-your-streaming-method.md b/mdop/appv-v4/determine-your-streaming-method.md index f338a6e5f8..290ebfd16b 100644 --- a/mdop/appv-v4/determine-your-streaming-method.md +++ b/mdop/appv-v4/determine-your-streaming-method.md @@ -22,14 +22,14 @@ The first time that a user double-clicks the icon that has been placed on a comp **Note**   *Streaming* is the term used to describe the process of obtaining content from a sequenced application package, starting with the primary feature block and then obtaining additional blocks as needed. -  + The streaming source location is usually a server that is accessible by the user’s computer; however, some electronic distribution systems, such as Microsoft System Center Configuration Manager, can distribute the SFT file to the user’s computer and then stream the virtual application package locally from that computer’s cache. **Note**   A streaming source location for virtual packages can be set up on a computer that is not a server. This is especially useful in a small branch office that has no server. -  + The streaming sources that can be used to store sequenced applications are described in the following table. @@ -60,7 +60,7 @@ The streaming sources that can be used to store sequenced applications are descr
        • No active upgrade

        -

        [How to Configure the File Server](how-to-configure-the-file-server.md)

        +

        How to Configure the File Server

        IIS server

        @@ -76,7 +76,7 @@ The streaming sources that can be used to store sequenced applications are descr
      • Need to manage IIS

      • No active upgrade

      -

      [How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md)

      +

      How to Configure the Server for IIS

      Application Virtualization Streaming Server

      @@ -90,12 +90,12 @@ The streaming sources that can be used to store sequenced applications are descr
    • Dual infrastructure

    • Server administration requirement

    -

    [How to Configure the Application Virtualization Management Servers](how-to-configure-the-application-virtualization-management-servers.md)

    +

    How to Configure the Application Virtualization Management Servers

    -  + ## Related topics @@ -106,9 +106,9 @@ The streaming sources that can be used to store sequenced applications are descr [Determine Your Publishing Method](determine-your-publishing-method.md) -  + -  + diff --git a/mdop/appv-v4/electronic-software-distribution-based-scenario-overview.md b/mdop/appv-v4/electronic-software-distribution-based-scenario-overview.md index 3fed5fca24..51c635b149 100644 --- a/mdop/appv-v4/electronic-software-distribution-based-scenario-overview.md +++ b/mdop/appv-v4/electronic-software-distribution-based-scenario-overview.md @@ -22,7 +22,7 @@ If you plan to use an electronic software distribution (ESD) solution to deploy **Important**   Whichever ESD solution you use, you must be familiar with the requirements of your particular solution. If you are using System Center Configuration Manager 2007 R2 or later, see the System Center Configuration Manager documentation at . -  + Using an existing ESD system provides you with the following benefits: @@ -75,9 +75,9 @@ For more detailed information about the preceding streaming methods, see [Determ [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/exclusion-item-dialog-box.md b/mdop/appv-v4/exclusion-item-dialog-box.md index b0eb2f90d3..3038ca2a54 100644 --- a/mdop/appv-v4/exclusion-item-dialog-box.md +++ b/mdop/appv-v4/exclusion-item-dialog-box.md @@ -22,7 +22,7 @@ Use the **Exclusion Item** dialog box to assign or change a mapping rule and to **Important**   Adding files from an excluded directory to the virtual files system is not supported. -  + **Exclude Path** Use to specify variable name that the Application Virtualization Sequencer will exclude if encountered while parsing virtual file system items or virtual registry items. @@ -41,9 +41,9 @@ Use to select the mapping rules the Application Virtualization Sequencer will ap [Sequencer Dialog Boxes](sequencer-dialog-boxes.md) -  + -  + diff --git a/mdop/appv-v4/file-type-association-results-pane-columns.md b/mdop/appv-v4/file-type-association-results-pane-columns.md index 8f52fc81c5..553b985e35 100644 --- a/mdop/appv-v4/file-type-association-results-pane-columns.md +++ b/mdop/appv-v4/file-type-association-results-pane-columns.md @@ -22,7 +22,7 @@ In the Application Virtualization Client Management Console, the **Results** pan **Note**   You can add or remove a column simply by right-clicking in the **Results** pane, selecting **View**, then selecting **Add/Remove Columns**. -  + The list can be sorted by any of the columns. Columns that contain dates and times are sorted in chronological order, not alphabetical. For columns that contain a mix of dates and times and text, dates and times are considered to come before any other text. @@ -86,9 +86,9 @@ The perceived type or blank. [File Type Association Results Pane](file-type-association-results-pane.md) -  + -  + diff --git a/mdop/appv-v4/how-to-add-a-package-version.md b/mdop/appv-v4/how-to-add-a-package-version.md index a3f7d10fd5..b2aba5778b 100644 --- a/mdop/appv-v4/how-to-add-a-package-version.md +++ b/mdop/appv-v4/how-to-add-a-package-version.md @@ -22,7 +22,7 @@ In the Application Virtualization Server Management Console, when you resequence **Note**   When you upgrade a package with a new version, you can leave the existing version in place or delete it and leave only the newest one. You might want to leave the old version in place for compatibility with legacy documents or so that you can test the new version before making it available to all users. -  + **To add a package version** @@ -47,9 +47,9 @@ When you upgrade a package with a new version, you can leave the existing versio [How to Manage Packages in the Server Management Console](how-to-manage-packages-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-add-a-package.md b/mdop/appv-v4/how-to-add-a-package.md index e11b12017a..4e55ae9e08 100644 --- a/mdop/appv-v4/how-to-add-a-package.md +++ b/mdop/appv-v4/how-to-add-a-package.md @@ -38,7 +38,7 @@ It is recommended that you import applications instead of adding them manually. In dialog boxes that refer to Virtual Application Servers, you must use a network location, such as the server's static host name or IP address, that your users can access. The application's Open Software Descriptor (OSD) file can replace the placeholder variable *%SFT\_SOFTGRIDSERER%* with the server's static host name or IP address. If you leave the placeholder variable, you must set this variable on each client computer that will access that server. Set a User or System variable on each computer for SFT\_SOFTGRIDSERVER. The variable value must be the server's static host name or IP address. If you set a variable, exit the Client session, log out of and back into Microsoft Windows, and then restart the session on each computer that had a session running and had the variable set. -   + 4. Click **Next**. @@ -47,7 +47,7 @@ It is recommended that you import applications instead of adding them manually. **Note**   If you are managing applications on a remote server, in the next dialog box, type only the path of the file relative to the server's content root. -   + ## Related topics @@ -56,9 +56,9 @@ It is recommended that you import applications instead of adding them manually. [How to Manage Packages in the Server Management Console](how-to-manage-packages-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-add-a-server.md b/mdop/appv-v4/how-to-add-a-server.md index 5ec5731ad3..4649e67c3f 100644 --- a/mdop/appv-v4/how-to-add-a-server.md +++ b/mdop/appv-v4/how-to-add-a-server.md @@ -22,7 +22,7 @@ To help you manage your Application Virtualization Management Servers more effic **Note**   All servers in a server group must be connected to the same data store. -  + **To add a server to a group** @@ -51,9 +51,9 @@ All servers in a server group must be connected to the same data store. [How to Remove a Server](how-to-remove-a-server.md) -  + -  + diff --git a/mdop/appv-v4/how-to-add-an-administrator-group.md b/mdop/appv-v4/how-to-add-an-administrator-group.md index f0af936e2b..193e0366bd 100644 --- a/mdop/appv-v4/how-to-add-an-administrator-group.md +++ b/mdop/appv-v4/how-to-add-an-administrator-group.md @@ -28,14 +28,14 @@ From the **Administrators** node of the Application Virtualization Server Manage **Important**   When completing the **Select Groups** dialog box, you might see the **Multiple Names Found** dialog box, which can display multiple group names. To add more than one group at a time, press **Ctrl** and click the name of each group you want to add. Click **OK** to exit the **Multiple Names Found** dialog box. -   + 3. Click **OK**. **Note**   To add administrator groups to the Application Virtualization Management Server, you must have system administrator or security administrator privileges on the associated data store. If you attempt to create a group without sufficient privileges, the system generates an error message. -   + ## Related topics @@ -44,9 +44,9 @@ From the **Administrators** node of the Application Virtualization Server Manage [How to Delete an Administrator Group](how-to-delete-an-administrator-group.md) -  + -  + diff --git a/mdop/appv-v4/how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md b/mdop/appv-v4/how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md index 2c8c075c8d..c1ecf63c7e 100644 --- a/mdop/appv-v4/how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md @@ -19,77 +19,79 @@ ms.date: 06/16/2016 You can use App-V Package Accelerators to automatically generate a new virtual application package. For more information about Package Accelerators, see [About App-V Package Accelerators (App-V 4.6 SP1)](about-app-v-package-accelerators--app-v-46-sp1-.md). -**Important**   +**Important** Disclaimer: The Application Virtualization Sequencer does not give you any license rights to the software application you are using to create a Package Accelerator. You must abide by all end user license terms for such application. It is your responsibility to make sure the software application’s license terms allow you to create a Package Accelerator using Application Virtualization Sequencer. -  -**Note**   + +**Note** Before starting this procedure, copy the required Package Accelerator locally to the computer running the App-V Sequencer. You should also copy all required installation files for the package to a local directory on the computer running the Sequencer. This is the directory that you have to specify in step 5 of this procedure. -  + Use the following procedure to create a virtual application package by using a Package Accelerator. **To create a virtual application package by using an App-V Package Accelerator** -1. To start the App-V Sequencer, on the computer that is running the App-V Sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. +1. To start the App-V Sequencer, on the computer that is running the App-V Sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. -2. To start the **Create New Package Wizard**, click **Create a New Virtual Application Package**. To create the package, select the **Create Package using a Package Accelerator** check box, and then click **Next**. +2. To start the **Create New Package Wizard**, click **Create a New Virtual Application Package**. To create the package, select the **Create Package using a Package Accelerator** check box, and then click **Next**. -3. On the **Select Package Accelerator** page, to specify the Package Accelerator that will be used to create the new virtual application package, click **Browse** to locate the Package Accelerator that you want to use. Click **Next**. +3. On the **Select Package Accelerator** page, to specify the Package Accelerator that will be used to create the new virtual application package, click **Browse** to locate the Package Accelerator that you want to use. Click **Next**. - **Important**   - If the publisher of the Package Accelerator cannot be verified and does not contain a valid digital signature, in the **Security Warning** dialog box, you must confirm that you trust the source of the Package Accelerator before you click **Run**. + **Important** + If the publisher of the Package Accelerator cannot be verified and does not contain a valid digital signature, in the **Security Warning** dialog box, you must confirm that you trust the source of the Package Accelerator before you click **Run**. -   -4. On the **Guidance** page, review the publishing guidance information displayed in the information pane. The information displayed was added when the Package Accelerator was created and contains information about creating and publishing the package. To export the guidance information to a text (.txt) file, click **Export** and specify the location where the file should be saved, and then click **Next**. -5. On the **Select Installation Files** page, to create a local folder that contains all required installation files for the package, click **Make New Folder** and specify where the folder should be saved. You must also specify a name to be assigned to the folder. You must then copy all required installation files to the location that you specified. If the folder that contains the installation files already exists on the computer running the Sequencer, click **Browse** to select the folder. +4. On the **Guidance** page, review the publishing guidance information displayed in the information pane. The information displayed was added when the Package Accelerator was created and contains information about creating and publishing the package. To export the guidance information to a text (.txt) file, click **Export** and specify the location where the file should be saved, and then click **Next**. - Alternatively, if you have already copied the installation files to a directory on this computer, click **Make New Folder**, browse to the folder that contains the installation files, and then click **Next**. +5. On the **Select Installation Files** page, to create a local folder that contains all required installation files for the package, click **Make New Folder** and specify where the folder should be saved. You must also specify a name to be assigned to the folder. You must then copy all required installation files to the location that you specified. If the folder that contains the installation files already exists on the computer running the Sequencer, click **Browse** to select the folder. - **Note**   - You can specify the following types of supported installation files: + Alternatively, if you have already copied the installation files to a directory on this computer, click **Make New Folder**, browse to the folder that contains the installation files, and then click **Next**. - - Windows Installer files(**.msi** + **Note** + You can specify the following types of supported installation files: - - .cab files + - Windows Installer files(**.msi** - - Compressed files with a .zip file name extension + - .cab files - - The actual application files + - Compressed files with a .zip file name extension - The following file types are not supported: **.msp** and**.exe** files. If you specify an **.exe** file you must extract the installation files manually. + - The actual application files -   + The following file types are not supported: **.msp** and.exe files. If you specify an **.exe** file you must extract the installation files manually. - If the Package Accelerator requires an application be installed prior to applying the Package Accelerator and you have installed the application, on the **Local Installation** page, select the check box **I have installed all applications**, and then click **Next**. -6. On the **Package Name** page, specify a name that will be associated with the package. The name specified identifies the package in the App-V Management Console. Click **Next**. -7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package you are creating. To confirm the location where the package is created, review the information displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. +~~~ +If the Package Accelerator requires an application be installed prior to applying the Package Accelerator and you have installed the application, on the **Local Installation** page, select the check box **I have installed all applications**, and then click **Next**. +~~~ - To create the package, click **Create**. After the package has been created, click **Next**. +6. On the **Package Name** page, specify a name that will be associated with the package. The name specified identifies the package in the App-V Management Console. Click **Next**. -8. On the **Configure Software** page, to enable the Sequencer to configure the applications contained in the package, select **Configure Software**. This step is useful for configuring any associated tasks that must be completed to run the application on target computers, such as configuring any associated license agreements. +7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package you are creating. To confirm the location where the package is created, review the information displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. - If you select **Configure Software**, the following items are configured by the Sequencer as part of this step: + To create the package, click **Create**. After the package has been created, click **Next**. - - **Load Package**. The Sequencer loads the files associated with the package. It can take several seconds to up to an hour to decode the package. +8. On the **Configure Software** page, to enable the Sequencer to configure the applications contained in the package, select **Configure Software**. This step is useful for configuring any associated tasks that must be completed to run the application on target computers, such as configuring any associated license agreements. - - **Run Each Program**. Optionally run the programs contained in the package. This step is helpful for completing any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. + If you select **Configure Software**, the following items are configured by the Sequencer as part of this step: - - **Save Package**. The Sequencer saves the package. + - **Load Package**. The Sequencer loads the files associated with the package. It can take several seconds to up to an hour to decode the package. - - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. + - **Run Each Program**. Optionally run the programs contained in the package. This step is helpful for completing any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. - If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. + - **Save Package**. The Sequencer saves the package. -9. On the **Completion** page, after you have reviewed the information displayed in the **Virtual Application Package Report** pane, click **Close**. + - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. - The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md). + If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. + +9. On the **Completion** page, after you have reviewed the information displayed in the **Virtual Application Package Report** pane, click **Close**. + + The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md). ## Related topics @@ -98,9 +100,9 @@ Use the following procedure to create a virtual application package by using a P [How to Create App-V Package Accelerators (App-V 4.6 SP1)](how-to-create-app-v-package-accelerators--app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-apply-an-app-v-project-template--app-v-46-sp1-.md b/mdop/appv-v4/how-to-apply-an-app-v-project-template--app-v-46-sp1-.md index 6a76dbab6d..4ac9accd65 100644 --- a/mdop/appv-v4/how-to-apply-an-app-v-project-template--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-apply-an-app-v-project-template--app-v-46-sp1-.md @@ -22,7 +22,7 @@ You can use an App-V project template to apply common settings associated with a **Note**   You can only apply an App-V project template when you are creating a new virtual application package. Applying project templates to existing virtual application packages is not supported. Additionally, you cannot use a project template in conjunction with a Package Accelerator. -  + For more information about creating App-V project templates, see [How to Create an App-V Project Template (App-V 4.6 SP1)](how-to-create-an-app-v-project-template--app-v-46-sp1-.md). @@ -43,9 +43,9 @@ For more information about creating App-V project templates, see [How to Create [How to Create an App-V Project Template (App-V 4.6 SP1)](how-to-create-an-app-v-project-template--app-v-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-vista.md b/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-vista.md index 13693fd880..ae25bdef3b 100644 --- a/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-vista.md +++ b/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-vista.md @@ -22,7 +22,7 @@ Use the following procedure to configure the App-V Desktop Client for proper Win **Note**   This procedure must be completed on each non-domain joined computer. Depending on the number of non-domain joined computers in your environment, this could be a very tedious operation. You can use scripts and the command-line interface for Credential Manager to help administrators automate this process. -  + **To assign the proper credentials for App-V clients running Windows Vista** @@ -51,9 +51,9 @@ This procedure must be completed on each non-domain joined computer. Depending o [How to Assign the Proper Credentials for Windows XP](how-to-assign--the-proper-credentials-for-windows-xp.md) -  + -  + diff --git a/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-xp.md b/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-xp.md index 62ecfffa26..2d0a95bbfd 100644 --- a/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-xp.md +++ b/mdop/appv-v4/how-to-assign--the-proper-credentials-for-windows-xp.md @@ -22,7 +22,7 @@ Use the following procedure to configure the App-V Desktop Client for proper Win **Note**   After finishing this procedure, the non-domain joined client can perform a publishing refresh without being joined to a domain. -  + **To assign the proper credentials for App-V clients running Windows XP** @@ -49,9 +49,9 @@ After finishing this procedure, the non-domain joined client can perform a publi [How to Assign the Proper Credentials for Windows Vista](how-to-assign--the-proper-credentials-for-windows-vista.md) -  + -  + diff --git a/mdop/appv-v4/how-to-associate-an-application-with-a-license-group.md b/mdop/appv-v4/how-to-associate-an-application-with-a-license-group.md index 892b2f1d91..ffb07d7155 100644 --- a/mdop/appv-v4/how-to-associate-an-application-with-a-license-group.md +++ b/mdop/appv-v4/how-to-associate-an-application-with-a-license-group.md @@ -22,7 +22,7 @@ You can enforce licensing restrictions on an application by associating the appl **Important**   One or more application license groups must exist for you to associate an application with a license group. -  + **To associate an application with a license group** @@ -35,9 +35,9 @@ One or more application license groups must exist for you to associate an applic 4. Click **OK**. **Note**   -    You can alter the **Properties** tab of one application at a time. + You can alter the **Properties** tab of one application at a time. -   + ## Related topics @@ -48,9 +48,9 @@ One or more application license groups must exist for you to associate an applic [How to Manage Reports in the Server Management Console](how-to-manage-reports-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-branch-a-package.md b/mdop/appv-v4/how-to-branch-a-package.md index 0a8725cbdb..52221d9dd2 100644 --- a/mdop/appv-v4/how-to-branch-a-package.md +++ b/mdop/appv-v4/how-to-branch-a-package.md @@ -29,23 +29,25 @@ Use the following procedure to branch a sequenced virtual application package. 3. To save a copy of the package, in the App-V Sequencer, select **File**, **Save As**. Specify a new, unique name, and specify a new unique package root directory for the copy of the package. Click **Save**. - **Important**   + **Important** You must specify a new package name or you will overwrite the existing version of the package. -   - The sequencer will automatically generate new GUID files for the new package. The version number associated with the package will also be automatically appended to the OSD file name. -4. After you save the new version you can apply the required configuration changes and save the associated ICO, OSD, SFT, and SPRJ files to correct location on the Application Virtualization (App-V) server. +~~~ +The sequencer will automatically generate new GUID files for the new package. The version number associated with the package will also be automatically appended to the OSD file name. +~~~ + +4. After you save the new version you can apply the required configuration changes and save the associated ICO, OSD, SFT, and SPRJ files to correct location on the Application Virtualization (App-V) server. ## Related topics [Tasks for the Application Virtualization Sequencer](tasks-for-the-application-virtualization-sequencer.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-change-package-properties.md b/mdop/appv-v4/how-to-change-package-properties.md index 8ef8be5842..abe69abeb3 100644 --- a/mdop/appv-v4/how-to-change-package-properties.md +++ b/mdop/appv-v4/how-to-change-package-properties.md @@ -24,7 +24,7 @@ If this is the first time the package has been created, you can also change the **Note**   When selecting a block size, consider the size of the SFT file and your network bandwidth. A file with a smaller block size takes longer to stream over the network, but it is less bandwidth intensive. Files with larger block sizes might stream faster, but they use more network bandwidth. Through experimentation, you can discover the optimum block size for streaming applications on your network. -  + The remainder of the package properties on the **Properties** tab is automatically generated and cannot be modified on this tab. @@ -53,9 +53,9 @@ The remainder of the package properties on the **Properties** tab is automatical [Sequencer Console](sequencer-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-change-the-cache-size-and-the-drive-letter-designation.md b/mdop/appv-v4/how-to-change-the-cache-size-and-the-drive-letter-designation.md index 7ec090fda8..8346a0eb10 100644 --- a/mdop/appv-v4/how-to-change-the-cache-size-and-the-drive-letter-designation.md +++ b/mdop/appv-v4/how-to-change-the-cache-size-and-the-drive-letter-designation.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 You can change the cache size and drive letter designation directly from the **Application Virtualization** node in the Application Virtualization Client Management Console. -**Note**   +**Note** After the cache size has been set, it cannot be made smaller. -  + **To change the cache size** @@ -30,20 +30,22 @@ After the cache size has been set, it cannot be made smaller. 2. Select the **File System** tab on the **Properties** dialog box. In the **Client Cache Configuration Settings** section, click one of the following radio buttons to choose how to manage the cache space: - **Important**   + **Important** If you select the **Use free disk space threshold** setting, the value you enter will set the cache size to the total disk size minus the free disk space threshold number you entered. If you then want revert to using the **Use maximum cache size** setting, you must specify a larger number than the existing cache size. Otherwise, the error “New size must be larger than the existing cache size” will appear. -   - - **Use maximum cache size** - Enter a numeric value from 100 to 1,048,576 (1 TB) in the **Maximum size (MB)** field to specify the maximum size of the cache. The value shown in **Reserved Cache Size** indicates the amount of cache in use. +~~~ +- **Use maximum cache size** - - **Use free disk space threshold** + Enter a numeric value from 100 to 1,048,576 (1 TB) in the **Maximum size (MB)** field to specify the maximum size of the cache. The value shown in **Reserved Cache Size** indicates the amount of cache in use. - Enter a numeric value to specify the amount of free disk space, in MB, that the cache must leave available on the disk. This allows the cache to grow until the amount of free disk space reaches this limit. The value shown in **Free disk space remaining** indicates how much disk space is unused. +- **Use free disk space threshold** -3. Click **OK** or **Apply** to change the setting. + Enter a numeric value to specify the amount of free disk space, in MB, that the cache must leave available on the disk. This allows the cache to grow until the amount of free disk space reaches this limit. The value shown in **Free disk space remaining** indicates how much disk space is unused. +~~~ + +3. Click **OK** or **Apply** to change the setting. **To change the drive letter designation** @@ -58,9 +60,9 @@ After the cache size has been set, it cannot be made smaller. [How to Configure the Client in the Application Virtualization Client Management Console](how-to-configure-the-client-in-the-application-virtualization-client-management-console.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-change-the-log-reporting-levels-and-reset-the-log-files.md b/mdop/appv-v4/how-to-change-the-log-reporting-levels-and-reset-the-log-files.md index c027a3323c..c981b9ffd1 100644 --- a/mdop/appv-v4/how-to-change-the-log-reporting-levels-and-reset-the-log-files.md +++ b/mdop/appv-v4/how-to-change-the-log-reporting-levels-and-reset-the-log-files.md @@ -28,14 +28,14 @@ You can use the following procedure to change the log reporting level from the * **Note**   If you choose **Verbose** as the logging level, the log files will grow large very quickly. This might inhibit client performance, so best practice is to use this log level only for diagnosing specific problems. -   + 3. On the **General** tab in the **Properties** dialog box, from the **System Log Level** drop-down list, select the desired log level. **Note**   The **System Log Level** setting controls the level of messages sent to the system event log. The logged messages are identical to the messages that get logged to the client event log, but they are stored in a different location. -   + 4. Click **OK** or **Apply** to change the setting. @@ -54,9 +54,9 @@ You can use the following procedure to change the log reporting level from the * [User Access Permissions in Application Virtualization Client](user-access-permissions-in-application-virtualization-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-change-the-server-cache-size.md b/mdop/appv-v4/how-to-change-the-server-cache-size.md index 5d7f06ba81..198ee9a625 100644 --- a/mdop/appv-v4/how-to-change-the-server-cache-size.md +++ b/mdop/appv-v4/how-to-change-the-server-cache-size.md @@ -22,7 +22,7 @@ You can use the following procedure to change the cache size for any server dire **Note**   Although you can change the cache size, unless your configuration specifically requires you to change the size, it is recommended that you leave the cache size set to the default values. -  + **To change the server cache size** @@ -47,9 +47,9 @@ Although you can change the cache size, unless your configuration specifically r [How to Manage Servers in the Server Management Console](how-to-manage-servers-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-change-the-server-logging-level-and-the-database-parameters.md b/mdop/appv-v4/how-to-change-the-server-logging-level-and-the-database-parameters.md index aa8e62062a..8bfcb4dcb4 100644 --- a/mdop/appv-v4/how-to-change-the-server-logging-level-and-the-database-parameters.md +++ b/mdop/appv-v4/how-to-change-the-server-logging-level-and-the-database-parameters.md @@ -36,7 +36,7 @@ The following logging levels are available: **Note**   Because of the size of the log file produced when you use **Verbose** mode, the recommendation is that you do not run production servers with this level of logging set. -  + The database logging parameters determine the database driver type, access credentials, and location of the logging database. @@ -103,7 +103,7 @@ The database logging parameters determine the database driver type, access crede -   + **To change database log parameters** @@ -132,9 +132,9 @@ The database logging parameters determine the database driver type, access crede [How to Customize an Application Virtualization System in the Server Management Console](how-to-customize-an-application-virtualization-system-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-change-the-server-port.md b/mdop/appv-v4/how-to-change-the-server-port.md index 996b9ddaef..3a807f2d68 100644 --- a/mdop/appv-v4/how-to-change-the-server-port.md +++ b/mdop/appv-v4/how-to-change-the-server-port.md @@ -34,7 +34,7 @@ From the Application Virtualization Server Management Console, you can use the f **Note**   The port number can be any value between 1 and 65,535. The default values are 554 for RTSP and 322 for RTSPS. -   + 6. Click **OK** to change the port number. @@ -49,9 +49,9 @@ From the Application Virtualization Server Management Console, you can use the f [How to Manage Servers in the Server Management Console](how-to-manage-servers-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-change-user-access-permissions.md b/mdop/appv-v4/how-to-change-user-access-permissions.md index 0813ad7dac..ef7947df2b 100644 --- a/mdop/appv-v4/how-to-change-user-access-permissions.md +++ b/mdop/appv-v4/how-to-change-user-access-permissions.md @@ -22,7 +22,7 @@ Use the following procedure to change user access permissions in the Application **Note**   Before changing users access permissions, ensure that any permissions changes are consistent with the organization's guidelines for granting user access. -  + **To change user access permissions** @@ -39,9 +39,9 @@ Before changing users access permissions, ensure that any permissions changes ar [User Access Permissions in Application Virtualization Client](user-access-permissions-in-application-virtualization-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-clear-an-application.md b/mdop/appv-v4/how-to-clear-an-application.md index 68f018ccf9..c738ca904d 100644 --- a/mdop/appv-v4/how-to-clear-an-application.md +++ b/mdop/appv-v4/how-to-clear-an-application.md @@ -22,7 +22,7 @@ You can clear an application from the console directly from the **Results** pane **Note**   When you clear an application from the console, you can no longer use that application. However, the application remains in cache and is still available to other users on the same system. After a publishing refresh, the cleared applications will again become available to you. If there are multiple applications in a package, the user's settings are not removed until all of the applications are cleared. -  + **To clear an application from the console** @@ -30,9 +30,9 @@ When you clear an application from the console, you can no longer use that appli 2. At the confirmation prompt, click **Yes** to remove the application or click **No** to cancel the operation. -  + -  + diff --git a/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--rds--sp1.md b/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--rds--sp1.md index 3ab7c3694b..801b2d13bc 100644 --- a/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--rds--sp1.md +++ b/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--rds--sp1.md @@ -20,14 +20,14 @@ ms.date: 08/30/2016 **Important**   You must be running App-V 4.6, SP1 to use this procedure. -  + You can deploy the App-V client by using a shared cache that is populated with all the applications required for all users. Then you configure the App-V Remote Desktop Services (RDS) Clients to use the same cache file. Users are granted access to specific applications by using the App-V publishing process. Because the cache is already preloaded with all applications, no streaming occurs when a user starts an application. However, the packages used to prepopulate the cache must be put on an App-V server that supports Real Time Streaming Protocol (RTSP) streaming and that grants access permissions to the App-V Clients. If you publish the applications by using an App-V Management Server, you can use it to provide this streaming function. **Note**   The details outlined in these procedures are intended as examples only. You might use different methods to complete the overall process. -  + ## Deploying the App-V Client in an RDS Scenario @@ -47,77 +47,77 @@ These tasks require careful planning. We recommend that you prepare and document **Note**   Although you can publish the applications by using several different methods, the following procedures are based on your using an App-V Management Server for publishing. -  + **To configure the read-only cache for initial deployment** -1. Set up and configure an App-V Management Server to provide user authentication and publishing support. +1. Set up and configure an App-V Management Server to provide user authentication and publishing support. -2. Populate the Content folder of this Management Server with all the application packages required for all users. +2. Populate the Content folder of this Management Server with all the application packages required for all users. -3. Set up a staging computer that has the App-V Client installed. Log on to the staging computer by using an account that has access to all applications so that the complete set of applications are published to the computer, and then stream the applications to cache so that they are fully loaded. +3. Set up a staging computer that has the App-V Client installed. Log on to the staging computer by using an account that has access to all applications so that the complete set of applications are published to the computer, and then stream the applications to cache so that they are fully loaded. - **Important**   - The staging computer must use the same operating system type and system architecture as those used by the VMs on which the App-V Client will run. + **Important** + The staging computer must use the same operating system type and system architecture as those used by the VMs on which the App-V Client will run. -   + -4. Restart the staging computer in safe mode to make sure that the drivers are not started, because this would lock the cache file. +4. Restart the staging computer in safe mode to make sure that the drivers are not started, because this would lock the cache file. - **Note**   - Or, you can stop and disable the Application Virtualization service, and then restart the computer. After the file is copied, remember to enable and start the service again. + **Note** + Or, you can stop and disable the Application Virtualization service, and then restart the computer. After the file is copied, remember to enable and start the service again. -   + -5. Copy the Sftfs.fsd cache file to a SAN where all the RDS servers can access it, such as in a shared folder. Set the folder access permissions to Read-only for the group Everyone and to Full Control for administrators who will manage the cache file updates. The location of the cache file can be obtained from the registry AppFS\\FileName. +5. Copy the Sftfs.fsd cache file to a SAN where all the RDS servers can access it, such as in a shared folder. Set the folder access permissions to Read-only for the group Everyone and to Full Control for administrators who will manage the cache file updates. The location of the cache file can be obtained from the registry AppFS\\FileName. - **Important**   - You must put the FSD file in a location that has the responsiveness and reliability equal to locally attached storage performance, for example, a SAN. + **Important** + You must put the FSD file in a location that has the responsiveness and reliability equal to locally attached storage performance, for example, a SAN. -   + -6. Install the App-V RDS Client on each RDS server, and then configure it to use the read-only cache by adding the following registry key values to the AppFS key on the client. The AppFS key is located at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\\]Microsoft\\SoftGrid\\4.5\\Client\\AppFS for 32-bit computers and at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\Client\\AppFS for 64-bit computers. +6. Install the App-V RDS Client on each RDS server, and then configure it to use the read-only cache by adding the following registry key values to the AppFS key on the client. The AppFS key is located at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\\]Microsoft\\SoftGrid\\4.5\\Client\\AppFS for 32-bit computers and at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\Client\\AppFS for 64-bit computers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    KeyTypeValuePurpose

    FileName

    String

    path of FSD

    Specifies the path of the shared cache file, for example, \\RDSServername\Sharefolder\SFTFS.FSD (Required).

    ReadOnlyFSD

    DWORD

    1

    Configures the client to operate in Read-Only mode. This ensures that the client will not try to stream updates to the package cache. (Required)

    ErrorLogLocation

    String

    path of error log (.etl) file

    Entry used to specify the path of the error log. (Recommended. Use a local path such as C:\Logs\Sftfs.etl).

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    KeyTypeValuePurpose

    FileName

    String

    path of FSD

    Specifies the path of the shared cache file, for example, \RDSServername\Sharefolder\SFTFS.FSD (Required).

    ReadOnlyFSD

    DWORD

    1

    Configures the client to operate in Read-Only mode. This ensures that the client will not try to stream updates to the package cache. (Required)

    ErrorLogLocation

    String

    path of error log (.etl) file

    Entry used to specify the path of the error log. (Recommended. Use a local path such as C:\Logs\Sftfs.etl).

    -   + -7. Configure each RDS server in the farm to use the publishing server and to use publishing update when users log on. As users log on to the RDS servers, a publishing update cycle occurs and publishes all the applications for which their account is authorized. These applications are run from the shared cache. +7. Configure each RDS server in the farm to use the publishing server and to use publishing update when users log on. As users log on to the RDS servers, a publishing update cycle occurs and publishes all the applications for which their account is authorized. These applications are run from the shared cache. **To configure the RDS client for package upgrade** @@ -130,7 +130,7 @@ Although you can publish the applications by using several different methods, th **Note**   Or, you can first stop and then disable the Application Virtualization service in the Services.msc, and restart the computer. After the file has been copied, remember to enable and start the service again. -   + 4. Copy the Sftfs.fsd cache file to a SAN where all the RDS servers can access it, such as in a shared folder. You can use a different file name, for example, SFTFS\_V2.FSD, to distinguish the new version. @@ -139,7 +139,7 @@ Although you can publish the applications by using several different methods, th **Important**   You must restart the RDS servers in order to use the updated shared cache file. -   + ## How to Use Symbolic Links when Upgrading the Cache @@ -161,7 +161,7 @@ Instead of changing the AppFS key FILENAME value every time that a new cache fil **Note**   On the storage server, appropriate link permissions must be enabled. Depending on the location of link and the Sftfs.fsd file, the permissions are **L2L:1** or **L2R:1** or **R2L:1** or **R2R:1**. -   + 4. When you configure the App-V RDS Client, set the AppFS key FILENAME value equal to the UNC path of the FSD file that is using the symbolic link. For example, set the file name to \\\\VDIHostserver\\Symlinkname. When the App-V client first accesses the cache, the symbolic link passes to the client a handle to the cache file. The client continues to use that handle as long as the client is running. The value of the symbolic link can safely be updated even if existing clients have the old shared cache open. @@ -176,9 +176,9 @@ Instead of changing the AppFS key FILENAME value every time that a new cache fil [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--vdi-.md b/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--vdi-.md index 169b09a6b0..2ee211e811 100644 --- a/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--vdi-.md +++ b/mdop/appv-v4/how-to-configure-a-read-only-cache-on-the-app-v-client--vdi-.md @@ -22,7 +22,7 @@ In Microsoft Application Virtualization (App-V) 4.6 the Client supports using a **Note**   The details outlined in these procedures are intended as examples only. You might use different methods to complete the overall process. -  + ## Deploying the App-V Client in a VDI Scenario @@ -44,77 +44,77 @@ These tasks require careful planning. We recommend that you prepare and document **Note**   Although you can publish the applications by using several different methods, the following procedures are based on the use of an App-V Management Server for publishing. -  + **To configure the read-only cache for initial deployment in a Pooled VM VDI or Static VM VDI scenario** -1. Set up and configure an App-V Management Server in a VM on the VDI server to provide user authentication and publishing support. +1. Set up and configure an App-V Management Server in a VM on the VDI server to provide user authentication and publishing support. -2. Populate the Content folder of this Management Server with all the application packages required for all users. +2. Populate the Content folder of this Management Server with all the application packages required for all users. -3. Set up a staging computer that has the App-V Client installed. Log on to the staging computer with an account that has access to all applications so that the complete set of applications are published to the computer, and then stream the applications to cache so that they are fully loaded. +3. Set up a staging computer that has the App-V Client installed. Log on to the staging computer with an account that has access to all applications so that the complete set of applications are published to the computer, and then stream the applications to cache so that they are fully loaded. - **Important**   - The staging computer must use the same operating system type and system architecture as those used by the VMs on which the App-V Client will run. + **Important** + The staging computer must use the same operating system type and system architecture as those used by the VMs on which the App-V Client will run. -   + -4. Restart the staging computer in Safe Mode to ensure the drivers are not started, which would lock the cache file. +4. Restart the staging computer in Safe Mode to ensure the drivers are not started, which would lock the cache file. - **Note**   - Alternatively, you can stop and disable the Application Virtualization service, and then restart the computer. After the file has been copied, remember to enable and start the service again. + **Note** + Alternatively, you can stop and disable the Application Virtualization service, and then restart the computer. After the file has been copied, remember to enable and start the service again. -   + -5. Copy the Sftfs.fsd cache file to the VDI server’s SAN where all the VMs can access it, such as in a shared folder. Set the folder access permissions to Read-only for the group Everyone and to Full Control for administrators who will manage the cache file updates. The location of the cache file can be obtained from the registry AppFS\\FileName. +5. Copy the Sftfs.fsd cache file to the VDI server’s SAN where all the VMs can access it, such as in a shared folder. Set the folder access permissions to Read-only for the group Everyone and to Full Control for administrators who will manage the cache file updates. The location of the cache file can be obtained from the registry AppFS\\FileName. - **Important**   - You must put the FSD file in a location that has the responsiveness and reliability equivalent to locally attached storage performance, for example, a SAN. + **Important** + You must put the FSD file in a location that has the responsiveness and reliability equivalent to locally attached storage performance, for example, a SAN. -   + -6. Install the App-V Desktop Client on the VDI Master VM Image, and then configure it to use the read-only cache by adding the following registry key values to the AppFS key on the client. The AppFS key is located at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\\[Wow6432Node\\\]Microsoft\\SoftGrid\\4.5\\Client\\AppFS. +6. Install the App-V Desktop Client on the VDI Master VM Image, and then configure it to use the read-only cache by adding the following registry key values to the AppFS key on the client. The AppFS key is located at HKEY\_LOCAL\_MACHINE\\SOFTWARE\\\[Wow6432Node\\\]Microsoft\\SoftGrid\\4.5\\Client\\AppFS. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    KeyTypeValuePurpose

    FileName

    String

    path to FSD

    Specifies the path to the shared cache file, for example, \\VDIServername\Sharefolder\SFTFS.FSD (Required).

    ReadOnlyFSD

    DWORD

    1

    Configures the client to operate in Read-Only mode. This ensures that the client will not attempt to stream updates to the package cache. (Required)

    ErrorLogLocation

    String

    path to error log (.etl) file

    Entry used to specify the path to the error log. (Recommended. Use a local path such as C:\Logs\Sftfs.etl).

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    KeyTypeValuePurpose

    FileName

    String

    path to FSD

    Specifies the path to the shared cache file, for example, \VDIServername\Sharefolder\SFTFS.FSD (Required).

    ReadOnlyFSD

    DWORD

    1

    Configures the client to operate in Read-Only mode. This ensures that the client will not attempt to stream updates to the package cache. (Required)

    ErrorLogLocation

    String

    path to error log (.etl) file

    Entry used to specify the path to the error log. (Recommended. Use a local path such as C:\Logs\Sftfs.etl).

    -   + -7. Configure the Master VM Image client to use the publishing server and to use publishing refresh at logon. As users log on to the VDI system and their VM is built from the Master VM Image, a publishing refresh cycle occurs and publishes all the applications for which their account is authorized. These applications are run from the shared cache. +7. Configure the Master VM Image client to use the publishing server and to use publishing refresh at logon. As users log on to the VDI system and their VM is built from the Master VM Image, a publishing refresh cycle occurs and publishes all the applications for which their account is authorized. These applications are run from the shared cache. **To configure the client for package upgrade in a Pooled VM scenario** @@ -127,7 +127,7 @@ Although you can publish the applications by using several different methods, th **Note**   Alternatively, you can stop and disable the Application Virtualization service in the Services.msc, and then restart the computer. After the file has been copied, remember to enable and start the service again. -   + 4. Copy the Sftfs.fsd cache file to the VDI server’s SAN where all the VMs can access it, such as in a shared folder. You can use a different filename, for example, SFTFS\_V2.FSD, to distinguish the new version. @@ -144,7 +144,7 @@ Although you can publish the applications by using several different methods, th **Note**   Alternatively, you can stop and disable the Application Virtualization service in the Services.msc, and then restart the computer. After the file has been copied, remember to enable and start the service again. -   + 4. Copy the Sftfs.fsd cache file to the VDI server’s SAN where all the VMs can access it, such as in a shared folder. You can use a different filename, for example, SFTFS\_V2.FSD, to distinguish the new version. @@ -172,7 +172,7 @@ Instead of modifying the AppFS key FILENAME value every time that a new cache fi **Note**   On the storage server, appropriate link permissions must be enabled. Depending on the location of link and the Sftfs.fsd file, the permissions are **L2L:1** or **L2R:1** or **R2L:1** or **R2R:1**. -   + 4. When you configure the App-V Desktop Client on the VDI Master VM Image, set the AppFS key FILENAME value equal to the UNC path of the FSD file that is using the symbolic link; for example, set it to \\\\VDIHostserver\\Symlinkname. When the App-V client first accesses the cache, the symbolic link passes to the client a handle to the cache file. The client continues to use that handle as long as the client is running. The value of the symbolic link can safely be updated even if existing clients have the old shared cache open. @@ -187,9 +187,9 @@ Instead of modifying the AppFS key FILENAME value every time that a new cache fi [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-management-server-security-post-installation.md b/mdop/appv-v4/how-to-configure-management-server-security-post-installation.md index ec60f8bdde..ec3efe7a1a 100644 --- a/mdop/appv-v4/how-to-configure-management-server-security-post-installation.md +++ b/mdop/appv-v4/how-to-configure-management-server-security-post-installation.md @@ -32,7 +32,7 @@ Use the App-V Management Console to add the certificate and configure the App-V **Note**   If no certificates are displayed in the wizard, a certificate has not been provisioned or the certificate does meet the requirements of App-V. -   + 5. Click **Next** to continue on to the **Welcome To Certificate Wizard** page. @@ -51,9 +51,9 @@ Use the App-V Management Console to add the certificate and configure the App-V [Troubleshooting Certificate Permission Issues](troubleshooting-certificate-permission-issues.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-microsoft-sql-server-mirroring-support-for-app-v.md b/mdop/appv-v4/how-to-configure-microsoft-sql-server-mirroring-support-for-app-v.md index 54ebda0ffc..978aefac2f 100644 --- a/mdop/appv-v4/how-to-configure-microsoft-sql-server-mirroring-support-for-app-v.md +++ b/mdop/appv-v4/how-to-configure-microsoft-sql-server-mirroring-support-for-app-v.md @@ -19,18 +19,18 @@ ms.date: 08/30/2016 You can use the following procedure to configure your Microsoft Application Virtualization (App-V) environment to use Microsoft SQL Server database mirroring. Configuring database mirroring can help with disaster recovery and failover scenarios. App-V 4.5 SP2 supports all modes of database mirroring currently available for Microsoft SQL Server 2005 and SQL Server 2008. -**Note**   +**Note** This procedure is written for administrators who are familiar with setting up and configuring SQL Server databases and database mirroring with Microsoft SQL Server, and therefore covers only the specific configuration settings that are unique to App-V. -  + **To configure your App-V environment to use Microsoft SQL Server database mirroring** 1. Set up SQL Server database mirroring of the App-V database following your standard business practices for database mirroring. Use the following links for general information about implementing Microsoft SQL Server database mirroring: - - **Microsoft SQL 2005**—[Setting Up Database Mirroring](https://go.microsoft.com/fwlink/?LinkId=187478) (https://go.microsoft.com/fwlink/?LinkId=187478) + - **Microsoft SQL 2005**—[Setting Up Database Mirroring](https://go.microsoft.com/fwlink/?LinkId=187478) (https://go.microsoft.com/fwlink/?LinkId=187478) - - **Microsoft SQL 2008**—[Setting Up Database Mirroring](https://go.microsoft.com/fwlink/?LinkId=187477) (https://go.microsoft.com/fwlink/?LinkId=187477) + - **Microsoft SQL 2008**—[Setting Up Database Mirroring](https://go.microsoft.com/fwlink/?LinkId=187477) (https://go.microsoft.com/fwlink/?LinkId=187477) In addition, you can find Best Practices information in [Database Mirroring Best Practices and Performance Considerations](https://go.microsoft.com/fwlink/?LinkId=190270) (https://go.microsoft.com/fwlink/?LinkId=190270). @@ -42,10 +42,10 @@ This procedure is written for administrators who are familiar with setting up an 5. Check the registry key **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Softgrid\\4.5\\Server\\SQLServerName** and make sure that it contains only the host name of the SQL Server. If it includes an instance name, for example *serverhostname\\instancename*, the instance name must be removed. - **Important**   + **Important** The App-V Management Server uses the TCP/IP networking library to communicate with the SQL Server when database mirroring is enabled, and therefore instance names cannot be used. The port numbers must be specified in the registry keys instead. -   + 6. Check the registry key **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Softgrid\\4.5\\Server\\SQLServerPort** and make sure that it contains the port number that is used for SQL on the SQL Server computer. If you are using a named instance this key value must be set to the port that is used for the named instance. @@ -61,28 +61,30 @@ This procedure is written for administrators who are familiar with setting up an - Click the **All** tab, and then select the entry **Failover Partner**. Click **Edit Value**, and then enter the server name of the failover SQL Server. Click **OK**. - **Important**   + **Important** The App-V system uses Kerberos authentication. Therefore, when you configure SQL mirroring where Kerberos Authentication is enabled on the SQL Server and the SQL Server service runs under a domain user account, you must manually configure an SPN. For more information, see “When SQL Service Uses Domain-Based Account” in the article [Configuring App-V Administration for a Distributed Environment](https://go.microsoft.com/fwlink/?LinkId=203186) (https://go.microsoft.com/fwlink/?LinkId=203186). -   + 10. To verify that database mirroring is running correctly, test the failover and confirm that the App-V Management Server continues to function correctly. - **Important**   + **Important** Proceed with care, and follow your standard business practices to ensure that system operations are not disrupted in the event of a failure. -   - After the failover has occurred successfully, as verified by using the SQL Server status monitoring information, right-click the **Applications** node in the App-V Management Console, and then select **Refresh**. The list of applications should display normally if the system is working correctly. + +~~~ +After the failover has occurred successfully, as verified by using the SQL Server status monitoring information, right-click the **Applications** node in the App-V Management Console, and then select **Refresh**. The list of applications should display normally if the system is working correctly. +~~~ ## Related topics [How to Perform Administrative Tasks in the Application Virtualization Server Management Console](how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-configure-shortcut-and-file-type-association-behavior-46-only.md b/mdop/appv-v4/how-to-configure-shortcut-and-file-type-association-behavior-46-only.md index a21b2e2aa8..7f8b6db82f 100644 --- a/mdop/appv-v4/how-to-configure-shortcut-and-file-type-association-behavior-46-only.md +++ b/mdop/appv-v4/how-to-configure-shortcut-and-file-type-association-behavior-46-only.md @@ -63,16 +63,16 @@ There are four policy values defined in the following table and these apply to b -  + **Note**   The text values refer to the values for the XML attributes in the publishing XML file.  You can set these values manually if you have implemented a custom HTTP publishing solution. -  + -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md b/mdop/appv-v4/how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md index 883535f565..150d93d6c9 100644 --- a/mdop/appv-v4/how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md +++ b/mdop/appv-v4/how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md @@ -30,7 +30,7 @@ There is also an ADM template that you can use. For more information about the A **Caution**   Use care when you edit the registry because errors can leave the computer in an unusable state. Be sure to follow your standard business practices that relate to registry edits. Thoroughly test all proposed changes in a test environment before you deploy them to production computers. -  + ## In This Section @@ -38,7 +38,7 @@ Use care when you edit the registry because errors can leave the computer in an **Important**   On a 64-bit computer, the keys and values described in the following sections will be under HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\Client. -  + [How to Reset the FileSystem Cache](how-to-reset-the-filesystem-cache.md) Provides the information that is required to reset the FileSystem cache. @@ -69,9 +69,9 @@ Describes the registry key values that control shortcuts and file type associati [Application Virtualization Client](application-virtualization-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-application-virtualization-management-servers.md b/mdop/appv-v4/how-to-configure-the-application-virtualization-management-servers.md index b989effea1..bd27ed1708 100644 --- a/mdop/appv-v4/how-to-configure-the-application-virtualization-management-servers.md +++ b/mdop/appv-v4/how-to-configure-the-application-virtualization-management-servers.md @@ -22,7 +22,7 @@ Before virtualized applications can be streamed to the Application Virtualizatio **Important**   Application Virtualization Servers stream SFT files to the Desktop Client and the Client for Remote Desktop Services using only RTSP or RTSPS protocols. The ICO (icon) file and the OSD (open software descriptor) file can be configured to stream from a different file or HTTP server. -  + **To configure the Application Virtualization Management Server** @@ -33,7 +33,7 @@ Application Virtualization Servers stream SFT files to the Desktop Client and th **Note**   During the installation procedure, you specify the location of the \\Content directory on the **Content Path** screen. -   + 2. Navigate to the location that you specified for the \\Content directory, and if necessary, create the directory. @@ -50,9 +50,9 @@ Application Virtualization Servers stream SFT files to the Desktop Client and th [How to Configure Servers for Server-Based Deployment](how-to-configure-servers-for-server-based-deployment.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-application-virtualization-streaming-servers.md b/mdop/appv-v4/how-to-configure-the-application-virtualization-streaming-servers.md index 06d284e905..9f63f76ebb 100644 --- a/mdop/appv-v4/how-to-configure-the-application-virtualization-streaming-servers.md +++ b/mdop/appv-v4/how-to-configure-the-application-virtualization-streaming-servers.md @@ -22,7 +22,7 @@ Before virtual applications can be streamed to the Application Virtualization De **Important**   Application Virtualization Servers stream SFT files to the Desktop Client and the Client for Remote Desktop Services using only RTSP or RTSPS protocols. The ICO (icon) file and the OSD (open software descriptor) file can be configured to stream from a different file or HTTP server. -  + **To configure the Application Virtualization Streaming Servers** @@ -47,9 +47,9 @@ Application Virtualization Servers stream SFT files to the Desktop Client and th [How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-client-for-application-package-retrieval.md b/mdop/appv-v4/how-to-configure-the-client-for-application-package-retrieval.md index 1ad36a95fd..54a3e12931 100644 --- a/mdop/appv-v4/how-to-configure-the-client-for-application-package-retrieval.md +++ b/mdop/appv-v4/how-to-configure-the-client-for-application-package-retrieval.md @@ -23,12 +23,12 @@ If you want the client to obtain the package content (SFT file) from a local App You can also configure the OSDSourceRoot and IconSourceRoot registry key values if you want to override those settings in the package manifest file or in the paths sent by a publishing server. The OSDSourceRoot specifies a source location for OSD file retrieval for an application package during publication. The IconSourceRoot specifies a source location for icon retrieval for an application package during publication. -**Note**   +**Note** - The IconSourceRoot and OSDSourceRoot settings override the values in the package manifest file, so if you try to deploy a package by using the Windows Installer (.msi) file method, it will also override the values in the package manifest file that is contained within that .msi file. - During both the publishing and HTTP(S) streaming operations,App-V 4.5 SP1 clients use the proxy server settings that are configured in Internet Explorer on the user’s computer. -  + **To configure the ApplicationSourceRoot registry key value** @@ -40,93 +40,95 @@ You can also configure the OSDSourceRoot and IconSourceRoot registry key values The correct format for the URL path is **protocol://servername:\[port\]\[/path\]\[/\]**, where **port** and **path** are optional. If **port** is not specified, the default port for the protocol is used. Only the **protocol://server:port** portion of the OSD URL is replaced. - **Important**   + **Important** Environment variables are not supported in the ApplicationSourceRoot definition. -   - The following table lists examples of acceptable URL and UNC path formats. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ApplicationSourceRootOSD File HREF PathResultComments

    rtsps://mainserver:322

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps/productivity/office2k3.sft?customer=seq

    https://mainserver:443/prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    https://mainserver:443/prodapps/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps

    rtsp://%SFT_APPVSERVER%:554/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322

    \\uncserver\share\productivity\office2k3.sft

    rtsps://mainserver:322/productivity/office2k3.sft

    ‘\’ converted to ‘/’

    rtsps://mainserver:322

    file://\\uncserver\share\productivity\office2k3.sft

    rtsps://mainserver:322/productivity/office2k3.sft

    ‘\’ converted to ‘/’

    \\uncserver\share

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    \\uncserver\share\productivity\office2k3.sft

    ‘/’ converted to ‘\’ and parameter dropped when converting to UNC path

    \\uncserver\share\prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    \\uncserver\share\prodapps\productivity\office2k3.sft

    ‘/’ converted to ‘\’ and parameter dropped when converting to UNC path

    M:

    \\uncserver\share\productivity\office2k3.sft

    M:\productivity\office2k3.sft

    M:\prodapps

    \\uncserver\share\productivity\office2k3.sft

    M:\prodapps\productivity\office2k3.sft

    +~~~ +The following table lists examples of acceptable URL and UNC path formats. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ApplicationSourceRootOSD File HREF PathResultComments

    rtsps://mainserver:322

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps/productivity/office2k3.sft?customer=seq

    https://mainserver:443/prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    https://mainserver:443/prodapps/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps

    rtsp://%SFT_APPVSERVER%:554/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322/prodapps/productivity/office2k3.sft?customer=seq

    rtsps://mainserver:322

    \\uncserver\share\productivity\office2k3.sft

    rtsps://mainserver:322/productivity/office2k3.sft

    ‘\’ converted to ‘/’

    rtsps://mainserver:322

    file://\\uncserver\share\productivity\office2k3.sft

    rtsps://mainserver:322/productivity/office2k3.sft

    ‘\’ converted to ‘/’

    \\uncserver\share

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    \\uncserver\share\productivity\office2k3.sft

    ‘/’ converted to ‘\’ and parameter dropped when converting to UNC path

    \\uncserver\share\prodapps

    rtsp://appserver/productivity/office2k3.sft?customer=seq

    \\uncserver\share\prodapps\productivity\office2k3.sft

    ‘/’ converted to ‘\’ and parameter dropped when converting to UNC path

    M:

    \\uncserver\share\productivity\office2k3.sft

    M:\productivity\office2k3.sft

    M:\prodapps

    \\uncserver\share\productivity\office2k3.sft

    M:\prodapps\productivity\office2k3.sft

    +~~~ + -   **To configure the OSDSourceRoot value** @@ -157,9 +159,9 @@ You can also configure the OSDSourceRoot and IconSourceRoot registry key values [How to Configure the App-V Client Registry Settings by Using the Command Line](how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-configure-the-client-for-disconnected-operation-mode.md b/mdop/appv-v4/how-to-configure-the-client-for-disconnected-operation-mode.md index de18e02299..08fb9b8dfb 100644 --- a/mdop/appv-v4/how-to-configure-the-client-for-disconnected-operation-mode.md +++ b/mdop/appv-v4/how-to-configure-the-client-for-disconnected-operation-mode.md @@ -22,7 +22,7 @@ The disconnected operation mode enables the Application Virtualization (App-V) D **Important**   In a large organization where multiple Remote Desktop Session Host (RD°Session Host) servers (formerly Terminal Servers) are linked in a farm to support many users, using a single App-V Management Server to support the farm represents a single point of failure. To provide high availability to support the RD Session Host farm, consider linking two or more App-V Management Servers to use the same database. -  + **To enable disconnected operation mode** @@ -59,9 +59,9 @@ In a large organization where multiple Remote Desktop Session Host (RD°Session [How to Configure the App-V Client Registry Settings by Using the Command Line](how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-client-log-file.md b/mdop/appv-v4/how-to-configure-the-client-log-file.md index 51957c7d93..20b326dfa4 100644 --- a/mdop/appv-v4/how-to-configure-the-client-log-file.md +++ b/mdop/appv-v4/how-to-configure-the-client-log-file.md @@ -40,7 +40,7 @@ You can use the following procedures to configure the Application Virtualization **Caution**   This registry key value must be set to a value greater than zero to ensure the log file does get reset. -   + **To change the number of backup copies** @@ -93,16 +93,16 @@ You can use the following procedures to configure the Application Virtualization -   + ## Related topics [How to Configure the App-V Client Registry Settings by Using the Command Line](how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-file-server.md b/mdop/appv-v4/how-to-configure-the-file-server.md index aeabd48e6a..812c78cb2c 100644 --- a/mdop/appv-v4/how-to-configure-the-file-server.md +++ b/mdop/appv-v4/how-to-configure-the-file-server.md @@ -24,7 +24,7 @@ If you are using an Application Virtualization Management Server as a distributi **Important**   For applications to stream properly to the Application Virtualization Desktop Client and the Client for Remote Desktop Services, the SFT file streams from the content directory on the server where you store the virtual application; the ICO (icon) file and the OSD (open software descriptor) file can be configured to stream from a different server. -  + **To configure the Application Virtualization file server** @@ -35,14 +35,14 @@ For applications to stream properly to the Application Virtualization Desktop Cl **Note**   During the installation procedure, you specify the location of the \\Content directory on the **Content Path** screen. -   + 2. Create a \\Content directory, which corresponds to the directory you specified when you installed the server, on each computer that you are using as a file share. **Important**   Configure the Application Virtualization Desktop Clients to stream applications from the computer you are using as a file share rather than from an Application Virtualization Server or IIS server. -   + 3. When the \\Content directory is created, configure this directory as a standard file share. @@ -59,9 +59,9 @@ For applications to stream properly to the Application Virtualization Desktop Cl [How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-server-for-iis.md b/mdop/appv-v4/how-to-configure-the-server-for-iis.md index 8b35940084..76119811be 100644 --- a/mdop/appv-v4/how-to-configure-the-server-for-iis.md +++ b/mdop/appv-v4/how-to-configure-the-server-for-iis.md @@ -34,7 +34,7 @@ Before virtual applications can be streamed to the Application Virtualization De **Note**   If you are using IIS to publish the ICO and OSD files, you must configure a MIME type for OSD=TXT; otherwise, IIS will not serve the ICO and OSD files to clients. If you are using IIS to publish packages (SFT files), you must configure a MIME type for SFT=Binary; otherwise, IIS will not serve the SFT files to clients. -  + ## Related topics @@ -49,9 +49,9 @@ If you are using IIS to publish the ICO and OSD files, you must configure a MIME [How to Configure the File Server](how-to-configure-the-file-server.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-the-server-to-be-trusted-for-delegation.md b/mdop/appv-v4/how-to-configure-the-server-to-be-trusted-for-delegation.md index d8b24baede..04e4ec6328 100644 --- a/mdop/appv-v4/how-to-configure-the-server-to-be-trusted-for-delegation.md +++ b/mdop/appv-v4/how-to-configure-the-server-to-be-trusted-for-delegation.md @@ -22,7 +22,7 @@ When you install the Microsoft Application Virtualization (App-V) Management Ser **Note**   If you install the App-V Management Server software on a single server and place the data store on a separate server, there is one situation in which you must still configure the server to be trusted for delegation even though the Management Web Service and Management Console are on the same server. This situation occurs if you need to connect to the Management Web Service in the console by using the **Use Alternate Credentials** option. -  + The type of delegation that you can use depends on the Domain Functional Level that you have configured in your Active Directory Domain Services (AD DS) infrastructure. The following table lists the types of delegation that can be configured for each Domain Functional Level for App-V. Detailed instructions follow the table. @@ -57,7 +57,7 @@ The type of delegation that you can use depends on the Domain Functional Level t -  + ¹ Not recommended. @@ -126,9 +126,9 @@ If you are running the Management Web Service on an IIS 7 server, you must compl 3. Type **appcmd.exe set config -section:system.webServer/security/authentication/windowsAuthentication -useAppPoolCredentials:true**, and then press ENTER. -  + -  + diff --git a/mdop/appv-v4/how-to-configure-windows-server-2003-firewall-for-app-v.md b/mdop/appv-v4/how-to-configure-windows-server-2003-firewall-for-app-v.md index 9979a50563..59c1e3b44c 100644 --- a/mdop/appv-v4/how-to-configure-windows-server-2003-firewall-for-app-v.md +++ b/mdop/appv-v4/how-to-configure-windows-server-2003-firewall-for-app-v.md @@ -26,14 +26,14 @@ Use the following procedure to configure the Windows Server 2003 firewall for A **Note**   If the server has not been configured to run the firewall service before this step, you will be prompted to start the firewall service. -   + 2. If ICO and OSD files are published through SMB, ensure that **File and Printer Sharing** is enabled on the **Exceptions** tab. **Note**   If ICO and OSD files are published through HTTP/HTTPS on the Management Server, you might need to add an exception for HTTP or HTTPS. If the IIS server hosting the ICO and OSD files is hosted on a computer separate from the Management Server, you need to add the exception to that computer. To maximize performance, it is recommended that you host the ICO and OSD files on a separate server from the Management Server. -   + 3. Add a program exception for `sghwdsptr.exe`, which is the Management Server service executable. The default path to this executable is `%ProgramFiles%\Microsoft System Center App Virt Management Server\App Virt Management Server\bin`. @@ -42,7 +42,7 @@ Use the following procedure to configure the Windows Server 2003 firewall for A The App-V Streaming Server requires a program exception `sglwdsptr.exe` for RTSPS communication. The App-V Streaming Server that uses RTSP for communication also requires a program exception for `sglwsvr.exe`. -   + 4. Ensure that the proper scope is configured for each exception. To reduce risk, remove any computer and strictly limit the IP addresses to which the server will respond. @@ -51,9 +51,9 @@ Use the following procedure to configure the Windows Server 2003 firewall for A [How to Configure Windows Server 2008 Firewall for App-V](how-to-configure-windows-server-2008-firewall-for-app-v.md) -  + -  + diff --git a/mdop/appv-v4/how-to-configure-windows-server-2008-firewall-for-app-v.md b/mdop/appv-v4/how-to-configure-windows-server-2008-firewall-for-app-v.md index 2da29411bd..7578063d2b 100644 --- a/mdop/appv-v4/how-to-configure-windows-server-2008-firewall-for-app-v.md +++ b/mdop/appv-v4/how-to-configure-windows-server-2008-firewall-for-app-v.md @@ -26,7 +26,7 @@ If the Management Server is configured to use RTSP, repeat this procedure to add The App-V Streaming Server requires the program exception `sglwdsptr.exe` for RTSPS communication. An App-V Streaming Server that uses RTSP for communication also requires a program exception for `sglwsvr.exe`. -  + **To configure Windows Server 2008 firewall for App-V** @@ -49,9 +49,9 @@ The App-V Streaming Server requires the program exception `sglwdsptr.exe` for RT [How to Configure Windows Server 2003 Firewall for App-V](how-to-configure-windows-server-2003-firewall-for-app-v.md) -  + -  + diff --git a/mdop/appv-v4/how-to-connect-to-an-application-virtualization-system.md b/mdop/appv-v4/how-to-connect-to-an-application-virtualization-system.md index 63a4b468d3..097bf0d4b7 100644 --- a/mdop/appv-v4/how-to-connect-to-an-application-virtualization-system.md +++ b/mdop/appv-v4/how-to-connect-to-an-application-virtualization-system.md @@ -21,49 +21,49 @@ You must connect the Application Virtualization Server Management Console to an **To connect to an Application Virtualization System** -1. Right-click the Application Virtualization System node in the **Scope** pane, and select **Connect to Application Virtualization System** from the pop-up menu. +1. Right-click the Application Virtualization System node in the **Scope** pane, and select **Connect to Application Virtualization System** from the pop-up menu. - **Note**   - There are three components to Application Virtualization server management: the Application Virtualization Management Console, the Management Web Service, and the SQL Datastore. If these components are distributed across different physical machines, you must configure security properly for the components to communicate across the system. For more information, see the following manuals and articles: + **Note** + There are three components to Application Virtualization server management: the Application Virtualization Management Console, the Management Web Service, and the SQL Datastore. If these components are distributed across different physical machines, you must configure security properly for the components to communicate across the system. For more information, see the following manuals and articles: - [How to Configure the Server to be Trusted for Delegation](https://go.microsoft.com/fwlink/?LinkID=166682) (https://go.microsoft.com/fwlink/?LinkID=166682) + [How to Configure the Server to be Trusted for Delegation](https://go.microsoft.com/fwlink/?LinkID=166682) (https://go.microsoft.com/fwlink/?LinkID=166682) - [Planning and Deployment Guide for the Application Virtualization System](https://go.microsoft.com/fwlink/?LinkID=122063) (https://go.microsoft.com/fwlink/?LinkID=122063) + [Planning and Deployment Guide for the Application Virtualization System](https://go.microsoft.com/fwlink/?LinkID=122063) (https://go.microsoft.com/fwlink/?LinkID=122063) - [Operations Guide for the Application Virtualization System](https://go.microsoft.com/fwlink/?LinkID=133129) (https://go.microsoft.com/fwlink/?LinkID=133129) + [Operations Guide for the Application Virtualization System](https://go.microsoft.com/fwlink/?LinkID=133129) (https://go.microsoft.com/fwlink/?LinkID=133129) - [Article 930472](https://go.microsoft.com/fwlink/?LinkId=114647) in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=114647) + [Article 930472](https://go.microsoft.com/fwlink/?LinkId=114647) in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=114647) - [Article 930565](https://go.microsoft.com/fwlink/?LinkId=114648) in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=114648) + [Article 930565](https://go.microsoft.com/fwlink/?LinkId=114648) in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=114648) -   + -2. Complete the fields in the **Connect to Application Virtualization System** dialog box: +2. Complete the fields in the **Connect to Application Virtualization System** dialog box: - 1. **Web Service Host Name**—Enter the name of the Application Virtualization System to which you want to connect, or enter **localhost** to connect to the local server. + 1. **Web Service Host Name**—Enter the name of the Application Virtualization System to which you want to connect, or enter **localhost** to connect to the local server. - 2. **Use Secure Connection**—Select this check box if you want to connect to the server with a secure connection. + 2. **Use Secure Connection**—Select this check box if you want to connect to the server with a secure connection. - 3. **Port**—Enter the port number you want to use for the connection. **80** is the default regular port number, and **443** is the secure-port number. + 3. **Port**—Enter the port number you want to use for the connection. **80** is the default regular port number, and **443** is the secure-port number. - 4. **Use Current Windows Account**—Select this radio button to use the current Windows account credentials. + 4. **Use Current Windows Account**—Select this radio button to use the current Windows account credentials. - 5. **Specify Windows Account**—Select this radio button when you want to connect to the server as a different user. + 5. **Specify Windows Account**—Select this radio button when you want to connect to the server as a different user. - 6. **Name**—Enter the name of the new user by using either the *DOMAIN\\username* or the *username@domain* format. + 6. **Name**—Enter the name of the new user by using either the *DOMAIN\\username* or the username@domain format. - 7. **Password**—Enter the password that corresponds to the new user. + 7. **Password**—Enter the password that corresponds to the new user. -3. Click **OK**. +3. Click **OK**. ## Related topics [How to Perform Administrative Tasks in the Application Virtualization Server Management Console](how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-create-a-reportserver.md b/mdop/appv-v4/how-to-create-a-reportserver.md index 9149a22464..134036f18f 100644 --- a/mdop/appv-v4/how-to-create-a-reportserver.md +++ b/mdop/appv-v4/how-to-create-a-reportserver.md @@ -20,9 +20,9 @@ ms.date: 06/16/2016 The process for creating a report from the Application Virtualization Server Management Console is the same regardless of the report type. When you select a report type, the window displays a brief description of the selected report. **Note**   -  When you create a report, you specify the parameters that are used for collecting the data when the report is run. Until you run a report, no data is collected. + When you create a report, you specify the parameters that are used for collecting the data when the report is run. Until you run a report, no data is collected. -  + **To create a report** @@ -51,9 +51,9 @@ The process for creating a report from the Application Virtualization Server Man [How to Run a Report](how-to-run-a-reportserver.md) -  + -  + diff --git a/mdop/appv-v4/how-to-create-an-app-v-project-template--app-v-46-sp1-.md b/mdop/appv-v4/how-to-create-an-app-v-project-template--app-v-46-sp1-.md index 630562e2a4..55143333bd 100644 --- a/mdop/appv-v4/how-to-create-an-app-v-project-template--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-create-an-app-v-project-template--app-v-46-sp1-.md @@ -22,7 +22,7 @@ You can use an App-V project template to save commonly applied settings associat **Note**   You can only apply an App-V project template when you are creating a new virtual application package. Applying project templates to existing virtual application packages is not supported. -  + For more information about applying an App-V project template, see [How to Apply an App-V Project Template (App-V 4.6 SP1)](how-to-apply-an-app-v-project-template--app-v-46-sp1-.md). @@ -55,9 +55,9 @@ The following general settings are saved with an App-V project template: [How to Apply an App-V Project Template (App-V 4.6 SP1)](how-to-apply-an-app-v-project-template--app-v-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/how-to-create-app-v-package-accelerators--app-v-46-sp1-.md b/mdop/appv-v4/how-to-create-app-v-package-accelerators--app-v-46-sp1-.md index 30a098576a..522662b28d 100644 --- a/mdop/appv-v4/how-to-create-app-v-package-accelerators--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-create-app-v-package-accelerators--app-v-46-sp1-.md @@ -21,19 +21,19 @@ You can use App-V Package Accelerators to automatically generate a new virtual a In some situations, to create the Package Accelerator, you might have to install the application locally on the computer running the Sequencer. First try to create the Package Accelerator by using the installation media, and if there are a number of missing files that are required, install the application locally to the computer running the Sequencer, and then create the Package Accelerator. -**Important**   +**Important** Before you begin the following procedure, you should do the following: - Copy the virtual application package that you must use to create the Package Accelerator locally to the computer running the Sequencer. - Copy all required installation files associated with the virtual application package to the computer running the Sequencer. -  -**Important**   + +**Important** Disclaimer: The Microsoft Application Virtualization Sequencer does not give you any license rights to the software application you are using to create a Package Accelerator. You must abide by all end user license terms for such application. It is your responsibility to make sure the software application’s license terms allow you to create a Package Accelerator using Application Virtualization Sequencer. -  + **To create an App-V Package Accelerator** @@ -43,45 +43,49 @@ Disclaimer: The Microsoft Application Virtualization Sequencer does not give you 3. On the **Select Package** page, to specify an existing virtual application package to use to create the Package Accelerator, click **Browse**, and locate the existing virtual application package (.sprj file). - **Tip**   + **Tip** Copy the files associated with the virtual application package you plan to use locally to the computer running the Sequencer. -   - Click **Next**. -4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. +~~~ +Click **Next**. +~~~ - **Tip**   - Copy the folder that contains the required installation files to the computer running the Sequencer. +4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. -   + **Tip** + Copy the folder that contains the required installation files to the computer running the Sequencer. - If the application is already installed on the computer running the Sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. -5. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. - **Note**   - You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. +~~~ +If the application is already installed on the computer running the Sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. +~~~ -   +5. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. -6. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the Package Accelerator. Select only files that are required for the application to run successfully, and then click **Next**. + **Note** + You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. -7. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. - If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. -8. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. +6. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the Package Accelerator. Select only files that are required for the application to run successfully, and then click **Next**. -9. On the **Create Package Accelerator** page, to specify where to save the Package Accelerator, click **Browse** and select the directory. +7. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. + + If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. + +8. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. + +9. On the **Create Package Accelerator** page, to specify where to save the Package Accelerator, click **Browse** and select the directory. 10. On the **Completion** page, to close the **Create Package Accelerator** wizard, click **Close**. - **Important**   - To help ensure that the Package Accelerator is as secure as possible, and so that the publisher can be verified when the Package Accelerator is applied, you should always digitally sign the Package Accelerator. + **Important** + To help ensure that the Package Accelerator is as secure as possible, and so that the publisher can be verified when the Package Accelerator is applied, you should always digitally sign the Package Accelerator. + -   ## Related topics @@ -89,9 +93,9 @@ Disclaimer: The Microsoft Application Virtualization Sequencer does not give you Configuring the Application Virtualization Sequencer (App-V 4.6 SP1) [How to Apply a Package Accelerator to Create a Virtual Application Package (App-V 4.6 SP1)](how-to-apply-a-package-accelerator-to-create-a-virtual-application-package---app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-create-the-package-root-directory.md b/mdop/appv-v4/how-to-create-the-package-root-directory.md index be6427c1e2..01ba72181f 100644 --- a/mdop/appv-v4/how-to-create-the-package-root-directory.md +++ b/mdop/appv-v4/how-to-create-the-package-root-directory.md @@ -30,16 +30,16 @@ After you have created the package root directory, you can begin sequencing appl **Important**   The name you assign to virtual application files that will be saved in the package root directory should use the 8.3 naming format. The file names should be no longer than 8 characters with a three-character file name extension. -   + ## Related topics [Tasks for the Application Virtualization Sequencer](tasks-for-the-application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-create-the-sequencer-package-root-directory.md b/mdop/appv-v4/how-to-create-the-sequencer-package-root-directory.md index 47c3340f0e..6b2e6bc05c 100644 --- a/mdop/appv-v4/how-to-create-the-sequencer-package-root-directory.md +++ b/mdop/appv-v4/how-to-create-the-sequencer-package-root-directory.md @@ -30,7 +30,7 @@ After you have created the package root directory, you can begin sequencing appl **Important**   The name you assign to virtual application files that will be saved in the package root directory should use the 8.3 naming format. The file names should be no longer than 8 characters with a three-character file name extension. -   + ## Related topics @@ -41,9 +41,9 @@ After you have created the package root directory, you can begin sequencing appl [How to Modify the Scratch Directory Location](how-to-modify-the-scratch-directory-location.md) -  + -  + diff --git a/mdop/appv-v4/how-to-delete-a-package-version.md b/mdop/appv-v4/how-to-delete-a-package-version.md index df9a0517c4..62137f64ca 100644 --- a/mdop/appv-v4/how-to-delete-a-package-version.md +++ b/mdop/appv-v4/how-to-delete-a-package-version.md @@ -22,7 +22,7 @@ From the Application Virtualization Server Management Console, for a package tha **Note**   When you choose to delete a version, a confirmation box reminds you that client computers might still be using it. You should advise users to exit and unload any applications before you remove a version that is in use. -  + **To delete a package version** @@ -37,7 +37,7 @@ When you choose to delete a version, a confirmation box reminds you that client **Note**   If you have users in disconnected operation, their applications will be replaced with the new versions the next time they connect to the servers. After you are sure all users have updated applications, you can delete old versions. -   + ## Related topics @@ -46,9 +46,9 @@ When you choose to delete a version, a confirmation box reminds you that client [How to Manage Packages in the Server Management Console](how-to-manage-packages-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-delete-a-packageserver.md b/mdop/appv-v4/how-to-delete-a-packageserver.md index 7ce829a0c2..c63d2eaf35 100644 --- a/mdop/appv-v4/how-to-delete-a-packageserver.md +++ b/mdop/appv-v4/how-to-delete-a-packageserver.md @@ -22,7 +22,7 @@ You can use the following procedure to delete a package, including all versions **Important**   When you choose to delete a package, a confirmation box reminds you that this action deletes all its versions. The server will no longer be able to stream the application. -  + **To delete a package** @@ -39,9 +39,9 @@ When you choose to delete a package, a confirmation box reminds you that this ac [How to Manage Packages in the Server Management Console](how-to-manage-packages-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-delete-all-virtual-applications-by-using-the-command-line.md b/mdop/appv-v4/how-to-delete-all-virtual-applications-by-using-the-command-line.md index 032fc4c7ec..21e583e5b2 100644 --- a/mdop/appv-v4/how-to-delete-all-virtual-applications-by-using-the-command-line.md +++ b/mdop/appv-v4/how-to-delete-all-virtual-applications-by-using-the-command-line.md @@ -22,7 +22,7 @@ You can use the following procedure to delete all virtual applications from a sp **Note**   When all applications are deleted from a package, the Application Virtualization (App-V) Client also deletes the package. -  + **To delete all applications** @@ -33,7 +33,7 @@ When all applications are deleted from a package, the Application Virtualization **Note**   When all applications are deleted from a package, the Application Virtualization (App-V) Client also deletes the package. -   + ## Related topics @@ -42,9 +42,9 @@ When all applications are deleted from a package, the Application Virtualization [How to Remove a Package by Using the Command Line](how-to-remove-a-package-by-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-delete-an-application-server.md b/mdop/appv-v4/how-to-delete-an-application-server.md index bae5e498a7..247163a1de 100644 --- a/mdop/appv-v4/how-to-delete-an-application-server.md +++ b/mdop/appv-v4/how-to-delete-an-application-server.md @@ -22,7 +22,7 @@ You can delete an application through the Application Virtualization Server Mana **Note**   If this is the only application in a package, deleting it also removes related package data and file associations. -  + **To delete an application** @@ -41,9 +41,9 @@ If this is the only application in a package, deleting it also removes related p [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-delete-an-application.md b/mdop/appv-v4/how-to-delete-an-application.md index bc88fecdd4..4ac8548398 100644 --- a/mdop/appv-v4/how-to-delete-an-application.md +++ b/mdop/appv-v4/how-to-delete-an-application.md @@ -24,7 +24,7 @@ When you delete an application, the selected application will no longer be avail After a publishing refresh, the deleted applications will again become available to you. -  + **To delete an application** @@ -32,9 +32,9 @@ After a publishing refresh, the deleted applications will again become available 2. At the confirmation prompt, click **Yes** to remove the application or click **No** to cancel the operation. -  + -  + diff --git a/mdop/appv-v4/how-to-deny-access-to-an-application.md b/mdop/appv-v4/how-to-deny-access-to-an-application.md index 285023e7f9..e1a9045654 100644 --- a/mdop/appv-v4/how-to-deny-access-to-an-application.md +++ b/mdop/appv-v4/how-to-deny-access-to-an-application.md @@ -32,7 +32,7 @@ Users must be in an application's **Access Permissions** list to load and use th **Note**   To control access to applications, you can also limit the application licenses. Setting up the proper user groups in Active Directory Domain Services provides the easiest way to grant and deny access to specific sets of users. -   + ## Related topics @@ -43,9 +43,9 @@ Users must be in an application's **Access Permissions** list to load and use th [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md b/mdop/appv-v4/how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md index 45c70140f6..140d19db20 100644 --- a/mdop/appv-v4/how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md @@ -41,31 +41,31 @@ Use the following table to determine which type of application you should sequen

    Standard

    Select this option to create a package that contains an application or a suite of applications. You should select this option for most applications that you plan to sequence.

    -

    [How to Sequence a New Standard Application (App-V 4.6 SP1)](how-to-sequence-a-new-standard-application--app-v-46-sp1-.md)

    +

    How to Sequence a New Standard Application (App-V 4.6 SP1)

    Add-on or Plug-in

    -

    Select this option to create a package that extends the functionality of a standard application, for example, a plug-in for Microsoft Excel. Additionally, you can use plug-ins for natively installed applications, or another package that is linked by using Dynamic Suite Composition. For more information about Dynamic Suite Composition, see [How To Use Dynamic Suite Composition](https://go.microsoft.com/fwlink/?LinkId=203804) (https://go.microsoft.com/fwlink/?LinkId=203804).

    -

    [How to Sequence a New Add-on or Plug-in Application (App-V 4.6 SP1)](how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md)

    +

    Select this option to create a package that extends the functionality of a standard application, for example, a plug-in for Microsoft Excel. Additionally, you can use plug-ins for natively installed applications, or another package that is linked by using Dynamic Suite Composition. For more information about Dynamic Suite Composition, see How To Use Dynamic Suite Composition (https://go.microsoft.com/fwlink/?LinkId=203804).

    +

    How to Sequence a New Add-on or Plug-in Application (App-V 4.6 SP1)

    Middleware

    -

    Select this option to create a package that is required by a standard application, for example, the Microsoft .NET Framework. Middleware packages are used for linking to other packages by using Dynamic Suite Composition. For more information about Dynamic Suite Composition, see [How To Use Dynamic Suite Composition](https://go.microsoft.com/fwlink/?LinkId=203804) (https://go.microsoft.com/fwlink/?LinkId=203804).

    -

    [How to Sequence a New Middleware Application (App-V 4.6 SP1)](how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md)

    +

    Select this option to create a package that is required by a standard application, for example, the Microsoft .NET Framework. Middleware packages are used for linking to other packages by using Dynamic Suite Composition. For more information about Dynamic Suite Composition, see How To Use Dynamic Suite Composition (https://go.microsoft.com/fwlink/?LinkId=203804).

    +

    How to Sequence a New Middleware Application (App-V 4.6 SP1)

    -  + ## Related topics [Tasks for the Application Virtualization Sequencer (App-V 4.6 SP1)](tasks-for-the-application-virtualization-sequencer--app-v-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/how-to-edit-an-osd-file-using-a-text-editor.md b/mdop/appv-v4/how-to-edit-an-osd-file-using-a-text-editor.md index 9f3c2aab77..6930a3459d 100644 --- a/mdop/appv-v4/how-to-edit-an-osd-file-using-a-text-editor.md +++ b/mdop/appv-v4/how-to-edit-an-osd-file-using-a-text-editor.md @@ -26,7 +26,7 @@ Use the following procedure to edit an Open Software Descriptor (OSD) file by us **Note**   Before modifying the OSD file, read the schema prescribed by the XSD file in the install directory. Failing to follow this schema might introduce errors that prevent a sequenced application from starting successfully. -   + 2. Edit the OSD file using your XML or ASCII text editor of choice, adhering to the prescribed schema and the following guidelines: @@ -47,9 +47,9 @@ Use the following procedure to edit an Open Software Descriptor (OSD) file by us [OSD File Elements](osd-file-elements.md) -  + -  + diff --git a/mdop/appv-v4/how-to-edit-an-osd-file.md b/mdop/appv-v4/how-to-edit-an-osd-file.md index 79b422fa13..e150953185 100644 --- a/mdop/appv-v4/how-to-edit-an-osd-file.md +++ b/mdop/appv-v4/how-to-edit-an-osd-file.md @@ -20,14 +20,14 @@ ms.date: 06/16/2016 Use the following procedures to modify a sequenced application package's Open Software Descriptor (OSD) file by adding or deleting an element or an attribute. **Note**   -  Some elements do not have an attribute, so it is not possible to add an attribute to every element. + Some elements do not have an attribute, so it is not possible to add an attribute to every element. -  + **Important**   If you use the OSD editor to change the .sft file name, the HREF attribute of the CODEBASE element in the OSD file, you must use the **Save As** command to save the change to the project files. -  + **To add an element** @@ -82,9 +82,9 @@ If you use the OSD editor to change the .sft file name, the HREF attribute of th [Sequencer Console](sequencer-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-grant-access-to-an-application.md b/mdop/appv-v4/how-to-grant-access-to-an-application.md index 81398a8f93..697afb607b 100644 --- a/mdop/appv-v4/how-to-grant-access-to-an-application.md +++ b/mdop/appv-v4/how-to-grant-access-to-an-application.md @@ -36,7 +36,7 @@ As the administrator, you can use the Application Virtualization Server Manageme **Note**   You must set up your groups in Active Directory Domain Services before you attempt to grant access to applications. -   + ## Related topics @@ -49,9 +49,9 @@ As the administrator, you can use the Application Virtualization Server Manageme [How to Manually Add an Application](how-to-manually-add-an-application.md) -  + -  + diff --git a/mdop/appv-v4/how-to-import-an-application.md b/mdop/appv-v4/how-to-import-an-application.md index dd4f4ceec9..ecaec1c2de 100644 --- a/mdop/appv-v4/how-to-import-an-application.md +++ b/mdop/appv-v4/how-to-import-an-application.md @@ -28,11 +28,11 @@ You can use the following procedure to import an application into the cache dire **Note**   If you have already configured an import search path or if the SFT file is in the same path as the last successful import, step 2 is not required. -   + -  + -  + diff --git a/mdop/appv-v4/how-to-import-an-applicationserver.md b/mdop/appv-v4/how-to-import-an-applicationserver.md index f00f214802..24b4bce0dd 100644 --- a/mdop/appv-v4/how-to-import-an-applicationserver.md +++ b/mdop/appv-v4/how-to-import-an-applicationserver.md @@ -22,7 +22,7 @@ Typically, you import applications to make them available to stream from an Appl **Note**   To import an application, you must have its sequenced Open Software Descriptor (OSD) file or its Sequencer Project (SPRJ) file available on the server. -  + When importing an application, you should make sure the server is configured with a value in the **Default Content Path** field on the **General** tab of the **System Options** dialog (accessible by right-clicking the **Application Virtualization System** node in the App-V Server Console). The default content path value defines where the applications will be imported, and during the import process, this value is used to modify the paths defined in the OSD file for the SFT file and for the icon shortcuts. In the OSD file, the path for the SFT file is specified in the CODEBASE HREF entry and the path for the icons is specified in the SHORTCUTS entry. @@ -43,14 +43,14 @@ During the import process, the protocol, server, and, if present, port specified -

    \\server\content\

    -

    http://WebServer/myFolder/package.sft

    -

    \\server\content\myFolder\package.sft

    +

    \server\content</p> +

    http://WebServer/myFolder/package.sft

    +

    \server\content\myFolder\package.sft

    -  + **To import an application** @@ -71,7 +71,7 @@ During the import process, the protocol, server, and, if present, port specified **Note**   Applications sequenced with Sequencer 4.0 populate the **File Associations** dialog box when you import or create them through the management console. Applications with previous Sequencer version packages do not. -   + 8. Click **Next**. @@ -92,9 +92,9 @@ During the import process, the protocol, server, and, if present, port specified [How to Manually Add an Application](how-to-manually-add-an-application.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-a-database.md b/mdop/appv-v4/how-to-install-a-database.md index 5bf2b0a7bb..884793e4a7 100644 --- a/mdop/appv-v4/how-to-install-a-database.md +++ b/mdop/appv-v4/how-to-install-a-database.md @@ -22,7 +22,7 @@ You can use the following procedure to install a database for your server-based **Important**   To install the database, you must use a network account with the appropriate permissions. If your organization requires that only database administrators are allowed to create and conduct database upgrades, scripts are available that allow this task to be performed. -  + **To install a database** @@ -41,7 +41,7 @@ To install the database, you must use a network account with the appropriate per **Note**   If a component is already installed on the computer, by deselecting it on the **Custom Setup** screen it will automatically be uninstalled. -   + 7. On the **Database Server** page, type the passwords, assign an installation path, save the information, and click **Next**. @@ -50,44 +50,44 @@ To install the database, you must use a network account with the appropriate per **Note**   If error 25109 is displayed when you try to complete this step, you have incorrectly set up the permissions necessary to install the database. For details on setting up the necessary SQL permissions, please see . -   + 9. On the **Directory Server** screen, enter a domain name and credentials that Application Virtualization Servers and the Management Web Service will use to access your domain controller, save this information, and then click **Next**. **Note**   The installation will default to the domain of the current computer. -   + 10. On the **Administrator Group** page, enter the name of a group that will have Administrator privileges, save this information, and then click **Next**. **Note**   You can also enter the first few characters of the name of a group that will have Administration privileges, click **Next**, and on the **Select Administrator Group** screen, select the group from the resulting list. Then save this information and click **Next**. -   + 11. On the **Default Provider Group** page, enter the complete name of a group that will control access to applications, save this information, and then click **Next**. **Note**   You can also enter the first few characters of the name of a group that will control access to applications, click **Next**, and on the **Select Default Provider Group** screen, select the group in the list. Then save this information and click **Next**. -   + 12. On the **Installation Wizard Completed** page, to close the wizard, click **Finish**. **Important**   The installation can take a few minutes to finish. A status message will flash above the Windows desktop notification area, indicating whether the installation succeeded. -   + ## Related topics [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-and-configure-the-app-v-management-console-for-a-more-secure-environment.md b/mdop/appv-v4/how-to-install-and-configure-the-app-v-management-console-for-a-more-secure-environment.md index b3a244ce99..83e7e4b7d1 100644 --- a/mdop/appv-v4/how-to-install-and-configure-the-app-v-management-console-for-a-more-secure-environment.md +++ b/mdop/appv-v4/how-to-install-and-configure-the-app-v-management-console-for-a-more-secure-environment.md @@ -30,7 +30,7 @@ The default installation of the App-V Management Console includes support for se **Important**   The name provided in the Web Service Host Name must match the common name on the certificate, or the connection will fail. -   + 4. Select the appropriate login credentials, and click **OK**. @@ -39,9 +39,9 @@ The default installation of the App-V Management Console includes support for se [Configuring Certificates to Support the App-V Web Management Service](configuring-certificates-to-support-the-app-v-web-management-service.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-and-configure-the-default-application.md b/mdop/appv-v4/how-to-install-and-configure-the-default-application.md index d621888eca..c5bb0dbe54 100644 --- a/mdop/appv-v4/how-to-install-and-configure-the-default-application.md +++ b/mdop/appv-v4/how-to-install-and-configure-the-default-application.md @@ -36,7 +36,7 @@ Use the following procedures to publish the default application and to stream it **Note**   You can also use **localhost** for the Web Service Host name if it is installed on the Management Server. -   + 6. In the App-V Management Console, right-click the **Server** node, and click **System Options**. @@ -45,7 +45,7 @@ Use the following procedures to publish the default application and to stream it **Important**   Use the FQDN for the server name so that the client can resolve the name correctly. -   + 8. In the App-V Management Console, in the navigation pane, expand the **Server** node, and then click **Applications**. @@ -58,7 +58,7 @@ Use the following procedures to publish the default application and to stream it **Important**   Ensure that the values in both the **OSD Path** and **Icon Path** boxes are in UNC format (for example, \\\\<Server Name>\\Content\\DefaultApp.ico), and point to the Content folder you created when installing the server. Do not use **localhost** or a file path containing a drive letter such as C:\\Program Files\\..\\..\\Content. -   + 12. Select the DefaultApp.osd file, and click **Open**. @@ -74,11 +74,11 @@ Use the following procedures to publish the default application and to stream it 18. Locate the line that contains the **HREF** tag, and change it to the following code: -      `CODEBASEHREF=”RTSP://:554/DefaultApp.sft”` + `CODEBASEHREF=”RTSP://:554/DefaultApp.sft”` Or, if you are using RTSPS: -      `CODEBASEHREF=”RTSPS://:322/DefaultApp.sft”` + `CODEBASEHREF=”RTSPS://:322/DefaultApp.sft”` 19. Close the DefaultApp.osd file, and save the changes. @@ -95,9 +95,9 @@ Use the following procedures to publish the default application and to stream it [How to Configure Servers for Server-Based Deployment](how-to-configure-servers-for-server-based-deployment.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-application-virtualization-management-server.md b/mdop/appv-v4/how-to-install-application-virtualization-management-server.md index f857719922..0dd33e3482 100644 --- a/mdop/appv-v4/how-to-install-application-virtualization-management-server.md +++ b/mdop/appv-v4/how-to-install-application-virtualization-management-server.md @@ -21,10 +21,10 @@ The Application Virtualization Management Server publishes its applications to c If you have designated a target computer on the network, with a login account having local Administrator privileges, you can use the following procedure to install the Application Virtualization Management Server and assign it to the appropriate server group. -**Note**   +**Note** The Installation Wizard can create a server group record, if one does not exist, as well as a record of the Application Virtualization Management Server's membership in this group. -  + After you complete the installation process, reboot the server. @@ -42,40 +42,42 @@ After you complete the installation process, reboot the server. 6. On the **Setup Type** page, select **Custom**. Click **Next**. On the **Custom Setup** page, deselect all Application Virtualization System components except **Application Virtualization Server**, and then click **Next**. - **Caution**   + **Caution** If a component is already installed on the computer, when you deselect it in the **Custom Setup** window, the component is automatically uninstalled. -   + 7. On the **Configuration Database** page, select a database server from the list of available servers or add a server by selecting **Use the following host name** and specifying the **Server Name** and **Port Number** data. Click **Next**. - **Note**   + **Note** The Application Virtualization Management Server does not support case sensitive SQL. -   - If a database is available, click the radio button, select the database from the list, and then click **Next**. Setup will upgrade it to this newer version. If the name does not appear in the list, enter the name in the space provided. - **Note**   - When naming a server, do not use the backslash character (/) in the server name. +~~~ +If a database is available, click the radio button, select the database from the list, and then click **Next**. Setup will upgrade it to this newer version. If the name does not appear in the list, enter the name in the space provided. - If you need to install a database, see [How to Install a Database](how-to-install-a-database.md). If you would like to create a new database for this version, select **Create a new database** and specify the name that will be assigned to the new database. You can also specify a new location for the database by selecting the check box and entering the path. +**Note** +When naming a server, do not use the backslash character (/) in the server name. -   +If you need to install a database, see [How to Install a Database](how-to-install-a-database.md). If you would like to create a new database for this version, select **Create a new database** and specify the name that will be assigned to the new database. You can also specify a new location for the database by selecting the check box and entering the path. +~~~ -8. On the **Connection Security Mode** page, select the desired certificate from the drop-down list. Click **Next**. - **Note**   - The **Secure Connection Mode** setting requires the server to have a server certificate provisioned to it from a public key infrastructure. If a server certificate is not installed on the server, this option is unavailable and cannot be selected. You must grant the Network Service account read access to the certificate being used. -   +8. On the **Connection Security Mode** page, select the desired certificate from the drop-down list. Click **Next**. -9. On the **TCP Port Configuration** page, to use the default port (554), select **Use default port (554)**. To specify a custom port, select **Use custom port** and specify the port number that will be used. Click **Next**. + **Note** + The **Secure Connection Mode** setting requires the server to have a server certificate provisioned to it from a public key infrastructure. If a server certificate is not installed on the server, this option is unavailable and cannot be selected. You must grant the Network Service account read access to the certificate being used. + + + +9. On the **TCP Port Configuration** page, to use the default port (554), select **Use default port (554)**. To specify a custom port, select **Use custom port** and specify the port number that will be used. Click **Next**. + + **Note** + When you install the server in a nonsecure environment, you can use the default port (554) or you can define a custom port. - **Note**   - When you install the server in a nonsecure environment, you can use the default port (554) or you can define a custom port. -   10. On the **Administrator Group** page, specify the name of the security group authorized to manage this server in **Group Name**. Click **Next**. Confirm the group specified and click **Next**. @@ -83,37 +85,37 @@ After you complete the installation process, reboot the server. 12. On the **Content Path** page, specify the location on the target computer where SFT files will be saved, and then click **Next**. - **Note**   - If the HTTP or RTSP port for the Management Server is already allocated, you will be prompted to choose a new port. Select the desired port, and then click **Next**. + **Note** + If the HTTP or RTSP port for the Management Server is already allocated, you will be prompted to choose a new port. Select the desired port, and then click **Next**. + -   13. On the **Ready to Install the Program** page, to install the Application Virtualization Management Server, click **Install**. - **Note**   - If error 25120 is displayed when you try to complete this step, you need to enable IIS **Management Scripts and Tools**. To enable this Windows feature, open the **Programs and Features** control panel, select **Turn Windows features on or off**, and navigate to **Internet Information Services.** + **Note** + If error 25120 is displayed when you try to complete this step, you need to enable IIS **Management Scripts and Tools**. To enable this Windows feature, open the **Programs and Features** control panel, select **Turn Windows features on or off**, and navigate to **Internet Information Services.** + + Under **Web Management Tools**, enable **IIS Management Scripts and Tools**. - Under **Web Management Tools**, enable **IIS Management Scripts and Tools**. -   14. On the **Installation Wizard Completed** screen, to close the wizard, click **Finish**. - **Important**   - The installation can take a few minutes to finish. A status message will flash above the Windows desktop notification area, indicating that the installation succeeded. + **Important** + The installation can take a few minutes to finish. A status message will flash above the Windows desktop notification area, indicating that the installation succeeded. + + It is not necessary to reboot the computer when prompted. However, to optimize system performance, a reboot is recommended. - It is not necessary to reboot the computer when prompted. However, to optimize system performance, a reboot is recommended. -   ## Related topics [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-install-the-app-v-client-by-using-setupmsi-new.md b/mdop/appv-v4/how-to-install-the-app-v-client-by-using-setupmsi-new.md index 7593c79ddc..f5b25c5517 100644 --- a/mdop/appv-v4/how-to-install-the-app-v-client-by-using-setupmsi-new.md +++ b/mdop/appv-v4/how-to-install-the-app-v-client-by-using-setupmsi-new.md @@ -27,22 +27,22 @@ You can use the following procedures to install the prerequisite software. You c **Note**   The x86 versions of the following software are required for both x86 and x64 versions of the App-V client. -  + **To install Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)** -1. Download the [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) software package from the Microsoft Download Center (https://go.microsoft.com/fwlink/?LinkId=119961). \[Template Token Value\] For version 4.5 SP2 and later of the App-V client, download vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360).\[Template Token Value\] +1. Download the [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) software package from the Microsoft Download Center (). \[Template Token Value\] For version 4.5 SP2 and later of the App-V client, download vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360).\[Template Token Value\] -2. To install silently, use the command-line option “/Q” with vcredist\_x86.exe—for example, **vcredist\_x86.exe /Q**. +2. To install silently, use the command-line option “/Q” with vcredist\_x86.exe—for example, **vcredist\_x86.exe /Q**. -3. To install the software by using the vcredist\_x86.msi file, use the command-line option “/C /T:<fullpathtofolder>” to extract the files vcredist.msi and vcredis1.cab from vcredist\_x86.exe to a temporary folder. To install silently, use the command-line option /quiet—for example, **msiexec /i vcredist.msi** /quiet. +3. To install the software by using the vcredist\_x86.msi file, use the command-line option “/C /T:<fullpathtofolder>” to extract the files vcredist.msi and vcredis1.cab from vcredist\_x86.exe to a temporary folder. To install silently, use the command-line option /quiet—for example, **msiexec /i vcredist.msi** /quiet. ### To install Microsoft Visual C++ 2008 SP1 Redistributable Package (x86) **Important**   For version 4.6 and later of the App-V client, you must also install the Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package ATL Security Update. -  + **** @@ -65,7 +65,7 @@ When installing Microsoft Application Error Reporting, you must use the *APPGUID **Important**   For App-V 4.6 SP2 and later, you no longer need to install Microsoft Application Error Reporting (dw20shared.msi). App-V now uses Microsoft Error Reporting. -  + @@ -129,14 +129,14 @@ For App-V 4.6 SP2 and later, you no longer need to install Microsoft Applicati
    -  + ¹ App-V “Languages” release. **Note**   If you need to find the product code, you can use the Orca.exe database editor or a similar tool to examine Windows Installer files to find the value of the *ProductCode* property. For more information about using Orca.exe, see [Windows Installer Development Tools](https://go.microsoft.com/fwlink/?LinkId=150008) (https://go.microsoft.com/fwlink/?LinkId=150008). -  + **** @@ -144,7 +144,7 @@ If you need to find the product code, you can use the Orca.exe database editor o 2. To install the software, run the following command: -      **msiexec /i dw20shared.msi APPGUID={valuefromtable} REBOOT=Suppress REINSTALL=ALL REINSTALLMODE=vomus** + **msiexec /i dw20shared.msi APPGUID={valuefromtable} REBOOT=Suppress REINSTALL=ALL REINSTALLMODE=vomus** ## Installing the App-V Client by Using the Setup.msi Program @@ -170,16 +170,16 @@ Use the following procedure to install the App-V client. Ensure that any necessa - To turn on installation logging, use the msiexec switch **/l\*v filename.log**. -   + ## Related topics [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-application-virtualization-sequencer.md b/mdop/appv-v4/how-to-install-the-application-virtualization-sequencer.md index f046fb2fc9..d9c4fb364b 100644 --- a/mdop/appv-v4/how-to-install-the-application-virtualization-sequencer.md +++ b/mdop/appv-v4/how-to-install-the-application-virtualization-sequencer.md @@ -24,7 +24,7 @@ You must have administrative rights on the computer you are using to sequence th **Important**   After you have sequenced an application, before you can properly sequence a new application you must reinstall the operating system and the Sequencer on the computer you are using to sequence applications. -  + **To install the Microsoft Application Virtualization Sequencer** @@ -49,9 +49,9 @@ After you have sequenced an application, before you can properly sequence a new [Application Virtualization Deployment Requirements](application-virtualization-deployment-requirements.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-application-virtualization-streaming-server.md b/mdop/appv-v4/how-to-install-the-application-virtualization-streaming-server.md index 5408f6f762..0cd8731539 100644 --- a/mdop/appv-v4/how-to-install-the-application-virtualization-streaming-server.md +++ b/mdop/appv-v4/how-to-install-the-application-virtualization-streaming-server.md @@ -24,7 +24,7 @@ If you have designated a target computer on the network, with a logon account ha **Note**   The Installation Wizard can create a server group record, if one does not exist, and a record of the Application Virtualization Streaming Server membership in this group. -  + After you complete the installation process, restart the server. @@ -35,7 +35,7 @@ After you complete the installation process, restart the server. **Important**   Make sure that the App-V Management Server is not installed on this computer. The two products cannot be installed on the same computer. -   + 2. Navigate to the location of the Application Virtualization System Setup program on the network, either run this program from the network or copy its directory to the target computer, and then double-click the **Setup.exe** file. @@ -52,21 +52,21 @@ After you complete the installation process, restart the server. **Note**   The **Secure Connection Mode** setting requires the server to have a server certificate provisioned to it from a public key infrastructure. If a server certificate is not installed on the server, this option is unavailable and cannot be selected. You must grant the Network Service account read access to the certificate being used. -   + 8. On the **TCP Port Configuration** page, to use the standard port (554), select **Use default port (554)**. To specify a custom port, select **Use custom port**, specify the port number in the field provided, and then click **Next**. **Note**   When you install the server in a nonsecure scenario, you can use the default port (554), or you can define a custom port. -   + 9. On the **Content Root** page, specify the location on the target computer where SFT files will be saved, and then click **Next**. **Note**   If the HTTP or RTSP port for the Virtual Application Streaming Server is already allocated, you will be prompted to select a new port. Specify the desired port, and then click **Next**. -   + 10. On the **Advanced Setting** screen, enter the following information: @@ -93,7 +93,7 @@ After you complete the installation process, restart the server. **Note**   The App-V Streaming Server uses NTFS file system permissions to control access to the applications under the Content share. Use **Enable User authentication** and **Enable User authorization** to control whether the server checks and enforces those access control lists (ACLs) or not. -   + 11. On the **Ready to Install the Program** page, to start the installation, click **Install**. @@ -104,7 +104,7 @@ After you complete the installation process, restart the server. It is not required to restart the computer when you are prompted. However, to optimize system performance, we recommend a restart. -   + 13. Repeat Steps 1–12 for each Virtual Application Server that you have to install. @@ -113,9 +113,9 @@ After you complete the installation process, restart the server. [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-client-by-using-the-command-line-new.md b/mdop/appv-v4/how-to-install-the-client-by-using-the-command-line-new.md index adaed4781c..ab7c6ff130 100644 --- a/mdop/appv-v4/how-to-install-the-client-by-using-the-command-line-new.md +++ b/mdop/appv-v4/how-to-install-the-client-by-using-the-command-line-new.md @@ -24,21 +24,21 @@ You can use optional command-line parameters to apply specific configuration set **Note**   When you install the App-V client to use with a read-only cache, for example with a VDI server implementation, you must set the *AUTOLOADTARGET* parameter to NONE to prevent the client from trying to update applications when the cache is read-only. -  + For more information about setting these parameter values after installation, see [How to Configure the App-V Client Registry Settings by Using the Command Line](https://go.microsoft.com/fwlink/?LinkId=169355) (https://go.microsoft.com/fwlink/?LinkId=169355) in the Application Virtualization (App-V) Operations Guide. **Note**   If a configuration setting on the user’s computer depends on the client installation path, note that the Application Virtualization (App-V) 4.5 client copies its installation files to a different folder than previous versions did. By default, a new installation of the App-V 4.5 client will copy its installation files to the \\Program Files\\Microsoft Application Virtualization Client folder. If an earlier version of the client is already installed, running the App-V 4.5 client installer will perform an upgrade of the existing client using the existing installation folder. -  + \[Template Token Value\] **Note**   For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL is copied to the Windows\\system32 directory. If the App-V client is installed on a 64-bit system, SFTLDR\_WOW64.DLL is copied to the Windows\\SysWOW64 directory. -  + \[Template Token Value\] @@ -64,9 +64,9 @@ Provides step-by-step procedures for installing any prerequisite software and al [How to Uninstall the App-V Client](how-to-uninstall-the-app-v-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-management-console.md b/mdop/appv-v4/how-to-install-the-management-console.md index a082c316bf..1f584040a8 100644 --- a/mdop/appv-v4/how-to-install-the-management-console.md +++ b/mdop/appv-v4/how-to-install-the-management-console.md @@ -40,14 +40,14 @@ Before you can complete this procedure, you must install the Application Virtual **Note**   If a component is already installed on the computer, by deselecting it on the Custom Setup screen, it will automatically be uninstalled. -   + 8. On the **Ready to Modify the Program** screen, click **Install**. **Note**   If this is the first component you install, the **Ready to Install the Program** page is displayed. To start the installation, click **Install**. -   + 9. On the **Installation Wizard Completed** screen, click **Finish**. Click **Okay** to restart the computer and complete the installation. @@ -64,9 +64,9 @@ Before you can complete this procedure, you must install the Application Virtual [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-management-web-service.md b/mdop/appv-v4/how-to-install-the-management-web-service.md index ecdd307a3f..66cdda0365 100644 --- a/mdop/appv-v4/how-to-install-the-management-web-service.md +++ b/mdop/appv-v4/how-to-install-the-management-web-service.md @@ -36,21 +36,21 @@ Use the following procedure to install the Application Virtualization Management **Note**   If this is not the first component you installed on this computer, the **Program Maintenance** page is displayed. On the **Program Maintenance** page, click **Modify**. -   + 7. On the **Custom Setup** page, clear all Application Virtualization System components except **App Virt Management Service**, and then click **Next**. **Note**   If a component is already installed on the computer, by clearing it on the **Custom Setup** page, you will automatically uninstall it. -   + 8. On the **Database Server** page, click **Connect to available database**, and then click **Next**. **Note**   In a production environment, Microsoft assumes that you will connect to an existing database. If you want to install a database, see [How to Install a Database](how-to-install-a-database.md). After installing the database, continue with step 13. -   + 9. On the **Database Server Type** page, select a database type from the list, and then click **Next**. @@ -65,7 +65,7 @@ Use the following procedure to install the Application Virtualization Management **Note**   If this is the first component you install, the **Ready to Install the Program** page is displayed. On the page, click **Install**. -   + 14. On the **Installation Wizard Completed** page, click **Finish**. @@ -74,9 +74,9 @@ Use the following procedure to install the Application Virtualization Management [How to Install the Servers and System Components](how-to-install-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/how-to-install-the-sequencer---app-v-46-sp1-.md b/mdop/appv-v4/how-to-install-the-sequencer---app-v-46-sp1-.md index b6d86bc704..ce132d4f49 100644 --- a/mdop/appv-v4/how-to-install-the-sequencer---app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-install-the-sequencer---app-v-46-sp1-.md @@ -21,10 +21,10 @@ The Microsoft Application Virtualization (App-V) Sequencer monitors and records You must have administrative credentials on the computer you are using to sequence the application, and the computer must not be running any version of App-V client. Creating a virtual application by using the App-V Sequencer requires multiple operations, so it is important that you install the Sequencer on a computer that meets or exceeds the [Application Virtualization Sequencer Hardware and Software Requirements](application-virtualization-sequencer-hardware-and-software-requirements.md). -**Note**   +**Note** Running the App-V sequencer in Safe Mode is not supported. -  + **To install the Microsoft Application Virtualization Sequencer** @@ -40,38 +40,40 @@ Running the App-V sequencer in Safe Mode is not supported. 6. On the **Virtual Drive** page, to configure the Application Virtualization default drive **Q:\\** (default) as the drive that all sequenced applications will run from, click **Next**. If you want to specify a different drive letter, use the list and select the drive letter that you want to use by selecting the appropriate drive letter, and then click **Next**. - **Important**   + **Important** The Application Virtualization drive letter specified with this step is the drive letter that virtual applications will be run from on target computers. The drive letter specified must be available, and not currently in use on the computers running the App-V client. If the specified drive is already in use, the virtual application fails on the target computer. -   + 7. On the **Ready to Install the Program** page, to start the installation, click **Install**. 8. On the **InstallShield Wizard Completed** page, to close the installation wizard and open the App-V Sequencer, click **Finish**. To close the installation wizard without opening the Sequencer, clear **Launch the program**, and then click **Finish**. - **Note**   + **Note** If you installed the App-V Sequencer on a computer running a virtual environment, for example a virtual machine, you must now take a snapshot. After you sequence an application, you can revert to this image, so you can sequence the next application. -   - When you uninstall the Sequencer, the following registry keys are not removed from the computer that the Sequencer was installed on. Additionally, you must restart the computer after you have uninstalled the Sequencer so that all associated drivers can be stopped and the operation can be completed. - - **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid** +~~~ +When you uninstall the Sequencer, the following registry keys are not removed from the computer that the Sequencer was installed on. Additionally, you must restart the computer after you have uninstalled the Sequencer so that all associated drivers can be stopped and the operation can be completed. - - **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5** +- **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid** - - **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard** +- **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5** - - **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard\\SecKey** +- **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard** + +- **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard\\SecKey** +~~~ ## Related topics [Configuring the Application Virtualization Sequencer (App-V 4.6 SP1)](configuring-the-application-virtualization-sequencer--app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-install-the-servers-and-system-components.md b/mdop/appv-v4/how-to-install-the-servers-and-system-components.md index 1e8509796b..a5fa8f0893 100644 --- a/mdop/appv-v4/how-to-install-the-servers-and-system-components.md +++ b/mdop/appv-v4/how-to-install-the-servers-and-system-components.md @@ -22,7 +22,7 @@ Before you can deliver applications to users, you must install the Microsoft App **Note**   The procedures in this section take you through a customized installation, where you pick and choose components to install on separate computers, as recommended in a production environment. However, your operating procedures might dictate a different approach, and during the installation process you might want to group components together. Regardless of where you install the components, you can install them in any order. -  + ## In This Section @@ -54,9 +54,9 @@ Provides step-by-step procedures to remove all or selected Application Virtualiz [How to Upgrade the Servers and System Components](how-to-upgrade-the-servers-and-system-components.md) -  + -  + diff --git a/mdop/appv-v4/how-to-load-files-and-packages.md b/mdop/appv-v4/how-to-load-files-and-packages.md index af5bdf9c35..21dc909c70 100644 --- a/mdop/appv-v4/how-to-load-files-and-packages.md +++ b/mdop/appv-v4/how-to-load-files-and-packages.md @@ -22,7 +22,7 @@ You can use the following procedure to load files and packages on Application Vi **Note**   During the installation process, you specified the location of the \\Content directory on the **Content Path** page. This directory should be created and configured as a standard file share before you point to its location. -  + **To load files and packages** @@ -41,16 +41,16 @@ During the installation process, you specified the location of the \\Content dir The App-V Clients must be properly configured to retrieve applications and packages from Web servers and file servers. For more information, see [How to Configure the Client for Application Package Retrieval](how-to-configure-the-client-for-application-package-retrieval.md). -   + ## Related topics [Application Virtualization Server](application-virtualization-server.md) -  + -  + diff --git a/mdop/appv-v4/how-to-load-or-unload-an-application.md b/mdop/appv-v4/how-to-load-or-unload-an-application.md index fc96564b9c..94fce4808b 100644 --- a/mdop/appv-v4/how-to-load-or-unload-an-application.md +++ b/mdop/appv-v4/how-to-load-or-unload-an-application.md @@ -22,7 +22,7 @@ You can use the following procedures to load or unload an application from the c **Note**   When you load or unload a package, all the applications in the package are loaded into or removed from cache. When loading a package, if you do not have adequate space in cache to load the applications, increase your cache size. For more information about cache size, see [How to Change the Cache Size and the Drive Letter Designation](how-to-change-the-cache-size-and-the-drive-letter-designation.md). -  + **To load an application** @@ -41,9 +41,9 @@ When you load or unload a package, all the applications in the package are loade [How to Change the Cache Size and the Drive Letter Designation](how-to-change-the-cache-size-and-the-drive-letter-designation.md) -  + -  + diff --git a/mdop/appv-v4/how-to-load-virtual-applications-from-the-desktop-notification-area.md b/mdop/appv-v4/how-to-load-virtual-applications-from-the-desktop-notification-area.md index a7ad84ad83..6443110c20 100644 --- a/mdop/appv-v4/how-to-load-virtual-applications-from-the-desktop-notification-area.md +++ b/mdop/appv-v4/how-to-load-virtual-applications-from-the-desktop-notification-area.md @@ -24,7 +24,7 @@ The applications are loaded one application at a time. The progress bar shows yo **Note**   If your system encounters an error while loading an application, it reports the error to you. You must dismiss the error dialog before it will load the next application. -  + **To load all applications** @@ -49,9 +49,9 @@ If your system encounters an error while loading an application, it reports the [How to Use the Desktop Notification Area for Application Virtualization Client Management](how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md) -  + -  + diff --git a/mdop/appv-v4/how-to-manage-application-groups-in-the-server-management-console.md b/mdop/appv-v4/how-to-manage-application-groups-in-the-server-management-console.md index f5e2c37995..67680da087 100644 --- a/mdop/appv-v4/how-to-manage-application-groups-in-the-server-management-console.md +++ b/mdop/appv-v4/how-to-manage-application-groups-in-the-server-management-console.md @@ -34,7 +34,7 @@ You can create a group, place it where you would like in the console's **Applica **Note**   Moving applications into groups does not affect the locations of their files (SFT, OSD, or SPRJ) on the server's file system. -  + ## In This Section @@ -58,9 +58,9 @@ Provides step-by-step instructions for removing or deleting an application group [How to Perform Administrative Tasks in the Application Virtualization Server Management Console](how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-manage-application-licenses-in-the-server-management-console.md b/mdop/appv-v4/how-to-manage-application-licenses-in-the-server-management-console.md index 3c643b1545..279a9aaa89 100644 --- a/mdop/appv-v4/how-to-manage-application-licenses-in-the-server-management-console.md +++ b/mdop/appv-v4/how-to-manage-application-licenses-in-the-server-management-console.md @@ -22,7 +22,7 @@ The Application Virtualization Server Management Console is the interface you us **Important**   If the App-V client Application Source Root (ASR) setting is configured to use any type of streaming source other than the Management Server, for example a Streaming Server, an IIS server, or a File server, then the Management Server is unable to enforce its licensing policy. -  + ## In This Section @@ -53,9 +53,9 @@ Provides a procedure for creating a new unlimited license group, allowing specif [How to Perform Administrative Tasks in the Application Virtualization Server Management Console](how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-manage-the-app-v-client-cache-using-performance-counters.md b/mdop/appv-v4/how-to-manage-the-app-v-client-cache-using-performance-counters.md index 4edea45b0e..1f9c00705d 100644 --- a/mdop/appv-v4/how-to-manage-the-app-v-client-cache-using-performance-counters.md +++ b/mdop/appv-v4/how-to-manage-the-app-v-client-cache-using-performance-counters.md @@ -32,16 +32,16 @@ You can use the following procedure to determine how much free space is availabl **Important**   The App-V performance counters are implemented in a 32-bit DLL, so to see them, you must use the following command to start the 32-bit version of Performance Monitor: **mmc /32 perfmon.msc**. This command must be run directly on the computer being monitored and cannot be used to monitor a remote computer running a 64-bit operating system. -   + ## Related topics [How to Manage Virtual Applications by Using the Command Line](how-to-manage-virtual-applications-by-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-manage-virtual-applications-manually.md b/mdop/appv-v4/how-to-manage-virtual-applications-manually.md index 77766cbcef..9b3d5d2637 100644 --- a/mdop/appv-v4/how-to-manage-virtual-applications-manually.md +++ b/mdop/appv-v4/how-to-manage-virtual-applications-manually.md @@ -27,7 +27,7 @@ You can use the following procedures to load or unload an application from the c **Note**   When you load or unload a package, all the applications in the package are loaded into or removed from cache. When loading a package, if you do not have adequate space in cache to load the applications, increase your cache size. For more information about cache size, see [How to Change the Cache Size and the Drive Letter Designation](how-to-change-the-cache-size-and-the-drive-letter-designation.md). -  + **To load an App-V application** @@ -49,7 +49,7 @@ You can clear an application from the console directly from the **Results** pane **Note**   When you clear an application from the console, you can no longer use that application. However, the application remains in cache and is still available to other users on the same system. After a publishing refresh, the cleared applications will again become available to you. If there are multiple applications in a package, the user's settings are not removed until all of the applications are cleared. -  + **To clear an application from the console** @@ -84,7 +84,7 @@ You can use the following procedure to import an application into the cache dire **Note**   If you have already configured an import search path or if the SFT file is in the same path as the last successful import, step 2 is not required. -   + ## How to lock or unlock an App-V application @@ -113,7 +113,7 @@ When you delete an application, the selected application will no longer be avail After a publishing refresh, the deleted applications will again become available to you. -  + **To delete an application** @@ -231,9 +231,9 @@ You can use the following procedure to delete a file type association. The **Fil [Application Virtualization Client](application-virtualization-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-manually-install-the-application-virtualization-client.md b/mdop/appv-v4/how-to-manually-install-the-application-virtualization-client.md index ad9474f810..014d912472 100644 --- a/mdop/appv-v4/how-to-manually-install-the-application-virtualization-client.md +++ b/mdop/appv-v4/how-to-manually-install-the-application-virtualization-client.md @@ -17,19 +17,19 @@ ms.date: 08/30/2016 # How to Manually Install the Application Virtualization Client -There are two types of Application Virtualization Client components: the Application Virtualization Desktop Client, which is designed for installation on desktop computers, and the Application Virtualization Client for Remote Desktop Services (formerly Terminal Services), which you can install on Remote Desktop Session Host (RD Session Host) servers . Although the two client installer programs are different, you can use the following procedure to manually install either the Application Virtualization Desktop Client on a single desktop computer or the Application Virtualization Client for Remote Desktop Services on a single RD Session Host server. In a production environment, you most likely will install the Application Virtualization Desktop Client on multiple desktop computers with an automated scripted installation process. For information about how to install multiple clients by using a scripted installation process, see [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md). +There are two types of Application Virtualization Client components: the Application Virtualization Desktop Client, which is designed for installation on desktop computers, and the Application Virtualization Client for Remote Desktop Services (formerly Terminal Services), which you can install on Remote Desktop Session Host (RD Session Host) servers . Although the two client installer programs are different, you can use the following procedure to manually install either the Application Virtualization Desktop Client on a single desktop computer or the Application Virtualization Client for Remote Desktop Services on a single RD Session Host server. In a production environment, you most likely will install the Application Virtualization Desktop Client on multiple desktop computers with an automated scripted installation process. For information about how to install multiple clients by using a scripted installation process, see [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md). -**Note**   -1. If you are installing the Application Virtualization Client for Remote Desktop Services software on a RD Session Host server, advise users who have an open RDP or ICA client session with the RD Session Host server that they must save their work and close their sessions. In a Remote Desktop session, you can install the client the client manually. For more information about upgrading the client, see [How to Upgrade the Application Virtualization Client](how-to-upgrade-the-application-virtualization-client.md). +**Note** +1. If you are installing the Application Virtualization Client for Remote Desktop Services software on a RD Session Host server, advise users who have an open RDP or ICA client session with the RD Session Host server that they must save their work and close their sessions. In a Remote Desktop session, you can install the client the client manually. For more information about upgrading the client, see [How to Upgrade the Application Virtualization Client](how-to-upgrade-the-application-virtualization-client.md). -2. If you have any configuration on the user’s computer that depends on the client install path, note that the Application Virtualization (App-V) 4.5 client uses a different install folder than previous versions. By default, a new install of the Application Virtualization (App-V) 4.5 client will install to the \\Program Files\\Microsoft Application Virtualization Client folder. If an earlier version of the client is already installed, installing the App-V client will perform an upgrade into the existing installation folder. +2. If you have any configuration on the user’s computer that depends on the client install path, note that the Application Virtualization (App-V) 4.5 client uses a different install folder than previous versions. By default, a new install of the Application Virtualization (App-V) 4.5 client will install to the \\Program Files\\Microsoft Application Virtualization Client folder. If an earlier version of the client is already installed, installing the App-V client will perform an upgrade into the existing installation folder. -  -**Note**   -For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL is installed in the Windows\\system32 directory. If the App-V client is installed on a 64-bit system, SFTLDR\_WOW64.DLL is installed in the Windows\\SysWOW64 directory. -  +**Note** +For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL is installed in the Windows\\system32 directory. If the App-V client is installed on a 64-bit system, SFTLDR\_WOW64.DLL is installed in the Windows\\SysWOW64 directory. + + **To manually install Application Virtualization Desktop Client** @@ -43,30 +43,32 @@ For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL 5. The wizard checks the system to ensure that all prerequisite software is installed, and if any of the following are missing, the wizard will automatically prompt you to install them: - - Microsoft Visual C++ 2005 SP1 Redistributable Package (x86) + - Microsoft Visual C++ 2005 SP1 Redistributable Package (x86) - - Microsoft Core XML Services (MSXML) 6.0 SP1 (x86) + - Microsoft Core XML Services (MSXML) 6.0 SP1 (x86) - Microsoft Application Error Reporting - **Note**   - For App-V version 4.6 and later, the wizard will also install Microsoft Visual C++ 2008 SP1 Redistributable Package (x86). + **Note** + For App-V version 4.6 and later, the wizard will also install Microsoft Visual C++ 2008 SP1 Redistributable Package (x86). - For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see (https://go.microsoft.com/fwlink/?LinkId=150700). + For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see (https://go.microsoft.com/fwlink/?LinkId=150700). -   - If prompted, click **Install**. Installation progress is displayed, and the status changes from **Pending** to **Installing**. Installation status changes to **Succeeded** as each step is completed successfully. -6. When the **Microsoft Application Virtualization Desktop Client – InstallShield Wizard** is displayed, click **Next**. +~~~ +If prompted, click **Install**. Installation progress is displayed, and the status changes from **Pending** to **Installing**. Installation status changes to **Succeeded** as each step is completed successfully. +~~~ -7. The **License Agreement** screen is displayed. Read the license agreement, and if you agree, click **I accept the terms in the license agreement** and then click **Next**. +6. When the **Microsoft Application Virtualization Desktop Client – InstallShield Wizard** is displayed, click **Next**. - Optionally, you can click the button to read the Privacy Statement. You must be connected to the Internet to access the Privacy Statement. +7. The **License Agreement** screen is displayed. Read the license agreement, and if you agree, click **I accept the terms in the license agreement** and then click **Next**. -8. On the **Setup Type** screen, select the setup type. Click **Typical** to use the default program values, or click **Custom** if you want to configure the program settings during installation. + Optionally, you can click the button to read the Privacy Statement. You must be connected to the Internet to access the Privacy Statement. -9. If you choose **Typical**, the next screen displays **Ready to Install the Program**. Click **Install** to begin the installation. +8. On the **Setup Type** screen, select the setup type. Click **Typical** to use the default program values, or click **Custom** if you want to configure the program settings during installation. + +9. If you choose **Typical**, the next screen displays **Ready to Install the Program**. Click **Install** to begin the installation. 10. If you choose **Custom**, the **Destination Folder** screen appears. @@ -74,71 +76,75 @@ For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL 12. On the **Application Virtualization Data Location** screen, click **Next** to accept the default data locations or complete the following actions to change where the data is stored: - 1. Click **Change**, and then browse to or, in the **Global Data Location** field, enter the destination folder for the global data location, and click **OK**. The Global Data Directory is where the Application Virtualization Desktop Client caches data shared by all users on the computer, like OSD files and SFT file data. + 1. Click **Change**, and then browse to or, in the **Global Data Location** field, enter the destination folder for the global data location, and click **OK**. The Global Data Directory is where the Application Virtualization Desktop Client caches data shared by all users on the computer, like OSD files and SFT file data. - 2. If you want to change the drive letter to be used, select the preferred drive letter from the drop-down list. + 2. If you want to change the drive letter to be used, select the preferred drive letter from the drop-down list. - 3. Enter a new path to store the user-specific data in the **User-specific Data Location** field if you want to change the data location. The User Data Directory is where the Application Virtualization Desktop Client stores user-specific information, like personal settings for virtualized applications. + 3. Enter a new path to store the user-specific data in the **User-specific Data Location** field if you want to change the data location. The User Data Directory is where the Application Virtualization Desktop Client stores user-specific information, like personal settings for virtualized applications. - **Note**   - This path must be different for every user, so it should include a user-specific environment variable or a mapped drive or something else that will resolve to a unique path for each user. + **Note** + This path must be different for every user, so it should include a user-specific environment variable or a mapped drive or something else that will resolve to a unique path for each user. -   - 4. When you have finished making the changes, click **Next**. + + 4. When you have finished making the changes, click **Next**. 13. On the **Cache Size Settings** screen, you can accept or change the default cache size. Click one of the following radio buttons to choose how to manage the cache space: - 1. **Use maximum cache size**. Enter a numeric value from 100–1,048,576 (1 TB) in the **Maximum size (MB)** field to specify the maximum size of the cache. + 1. **Use maximum cache size**. Enter a numeric value from 100–1,048,576 (1 TB) in the **Maximum size (MB)** field to specify the maximum size of the cache. - 2. **Use free disk space threshold**. Enter a numeric value to specify the amount of free disk space, in MB, that the Application Virtualization Client must leave available on the disk. This allows the cache to grow until the amount of free disk space reaches this limit. The value shown in **Free disk space remaining** indicates how much disk space is currently unused. + 2. **Use free disk space threshold**. Enter a numeric value to specify the amount of free disk space, in MB, that the Application Virtualization Client must leave available on the disk. This allows the cache to grow until the amount of free disk space reaches this limit. The value shown in **Free disk space remaining** indicates how much disk space is currently unused. - **Important**   - To ensure that the cache has sufficient space allocated for all packages that might be deployed, use the **Use free disk space threshold** setting when you configure the client so that the cache can grow as needed. Alternatively, determine in advance how much disk space will be needed for the App-V cache, and at installation time, set the cache size accordingly. For more information about the cache space management feature, in the Microsoft Application Virtualization (App-V) Operations Guide, see **How to Use the Cache Space Management Feature**. + **Important** + To ensure that the cache has sufficient space allocated for all packages that might be deployed, use the **Use free disk space threshold** setting when you configure the client so that the cache can grow as needed. Alternatively, determine in advance how much disk space will be needed for the App-V cache, and at installation time, set the cache size accordingly. For more information about the cache space management feature, in the Microsoft Application Virtualization (App-V) Operations Guide, see **How to Use the Cache Space Management Feature**. -   - Click **Next** to continue. + +~~~ +Click **Next** to continue. +~~~ 14. In the following sections of the **Runtime Package Policy Configuration** screen, you can change the parameters that affect how the Application Virtualization client behaves during runtime: - 1. **Application Source Root**. Specifies the location of SFT files. If used, overrides the protocol, server, and port portions of the CODEBASE HREF URL in the OSD file. + 1. **Application Source Root**. Specifies the location of SFT files. If used, overrides the protocol, server, and port portions of the CODEBASE HREF URL in the OSD file. - 2. **Application Authorization**. When **Require User authorization even when cached** is checked, users are required to connect to a server and validate their credentials at least once before they are allowed to start each virtual application. + 2. **Application Authorization**. When **Require User authorization even when cached** is checked, users are required to connect to a server and validate their credentials at least once before they are allowed to start each virtual application. - 3. **Allow streaming from file**. Indicates whether streaming from file will be enabled, regardless of how the **Application Source Root** field is used. If not checked, streaming from files is disabled. This must be checked if **Application Source Root** contains a UNC path in the form \\\\server\\share. + 3. **Allow streaming from file**. Indicates whether streaming from file will be enabled, regardless of how the **Application Source Root** field is used. If not checked, streaming from files is disabled. This must be checked if **Application Source Root** contains a UNC path in the form \\\\server\\share. - 4. **Automatically Load Application**. Controls when and how automatic background loading of applications occurs. + 4. **Automatically Load Application**. Controls when and how automatic background loading of applications occurs. - **Note**   - When you install the App-V client to use with a read-only cache, for example, with a VDI server implementation, set **What applications to Auto Load** to **Do not automatically load applications** to prevent the client from trying to update applications in the read-only cache. + **Note** + When you install the App-V client to use with a read-only cache, for example, with a VDI server implementation, set **What applications to Auto Load** to **Do not automatically load applications** to prevent the client from trying to update applications in the read-only cache. -   - Click **Next** to continue. + +~~~ +Click **Next** to continue. +~~~ 15. On the **Publishing Server** screen, select the **Set up a Publishing Server now** check box if you want to define a publishing server, or click **Next** if you want to complete this later. To define a publishing server, specify the following information: - 1. **Display Name**—Enter the name you want to display for the server. + 1. **Display Name**—Enter the name you want to display for the server. - 2. **Type**—Select the server type from the drop-down list of server types. + 2. **Type**—Select the server type from the drop-down list of server types. - 3. **Host Name** and **Port**—Enter the host name and the port in the corresponding fields. When you select a server type in the drop-down list, the port field will automatically fill with the standard port numbers. To change a port number, click the server type in the list and change the port number according to your needs. + 3. **Host Name** and **Port**—Enter the host name and the port in the corresponding fields. When you select a server type in the drop-down list, the port field will automatically fill with the standard port numbers. To change a port number, click the server type in the list and change the port number according to your needs. - 4. **Path**—If you have selected either **Standard HTTP Server** or **Enhanced Security HTTP Server**, you must enter the complete path to the XML file containing publishing data in this field. If you select either **Application Virtualization Server** or **Enhanced Security Application Virtualization Server**, this field is not active. + 4. **Path**—If you have selected either **Standard HTTP Server** or **Enhanced Security HTTP Server**, you must enter the complete path to the XML file containing publishing data in this field. If you select either **Application Virtualization Server** or **Enhanced Security Application Virtualization Server**, this field is not active. - 5. **Automatically contact this server to update settings when a user logs in**—Select this check box if you want this server to be queried automatically when users log in to their account on the Application Virtualization Client. + 5. **Automatically contact this server to update settings when a user logs in**—Select this check box if you want this server to be queried automatically when users log in to their account on the Application Virtualization Client. - 6. When finished with the configuration steps, click **Next**. + 6. When finished with the configuration steps, click **Next**. 16. On the **Ready to Install the Program** screen, click **Install**. A screen is displayed that shows the progress of the installation. 17. On the **Install Wizard Completed** screen, click **Finish**. - **Note**   - If the installation fails for any reason, you might need to restart the computer before trying the install again. + **Note** + If the installation fails for any reason, you might need to restart the computer before trying the install again. + -   ## Related topics @@ -147,9 +153,9 @@ For App-V version 4.6 and later, when the App-V client is installed, SFTLDR.DLL [Stand-Alone Delivery Scenario Overview](stand-alone-delivery-scenario-overview.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-migrate-the-app-v-sql-database-to-a-different-sql-server.md b/mdop/appv-v4/how-to-migrate-the-app-v-sql-database-to-a-different-sql-server.md index 857213e8d4..f2489eb2f5 100644 --- a/mdop/appv-v4/how-to-migrate-the-app-v-sql-database-to-a-different-sql-server.md +++ b/mdop/appv-v4/how-to-migrate-the-app-v-sql-database-to-a-different-sql-server.md @@ -22,7 +22,7 @@ The following procedures describe in detail how to migrate the SQL database of t **Important**   This procedure requires that the App-V server service is stopped and this will prevent end-users from using their applications. -  + **To back up the App-V SQL database** @@ -110,9 +110,9 @@ This procedure requires that the App-V server service is stopped and this will p 7. Open the App-V Management Console, right-click the **Applications** node and select **Refresh**. The list of applications should be displayed as before. -  + -  + diff --git a/mdop/appv-v4/how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md b/mdop/appv-v4/how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md index 933de34358..af10891ff9 100644 --- a/mdop/appv-v4/how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md @@ -42,7 +42,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Important**   If you are required to disable virus scanning software, scan the computer running the sequencer to ensure that no unwanted or malicious files are added to the package. -   + 6. On the **Select Installer** page, click **Browse** and specify the update installation file for the application. If the update does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. @@ -51,7 +51,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Note**   The sequencer monitors all changes and installations to the computer running the sequencer, including the changes and installations that are performed outside of the sequencing wizard. -   + 8. On the **Installation Report** page, you can review information about the virtual application you just updated. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. @@ -60,7 +60,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Note**   If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop**, and then click one of the following options, **Stop all applications** or **Stop this application only**, depending on what you want. -   + 10. On the **Create Package** page, to modify the package without saving it, select the **Continue to modify package without saving using the package editor** check box. When you select this option, the package in the Sequencer console opens so that you can modify the package before it is saved. Click **Next**. @@ -121,7 +121,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Important**   If you are required to disable virus scanning software, scan the computer running the sequencer to ensure that no unwanted or malicious files can be added to the package. -   + 6. On the **Select Installer** page, click **Browse** and specify the installation file for the application. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. @@ -130,7 +130,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Note**   All changes and installations to the computer running the sequencer are monitored by the sequencer, including the changes and installations that are performed outside of the sequencing wizard. -   + 8. On the **Configure Software** page, optionally run the programs contained in the package. This step helps complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at the same time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs you want to run, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. It can take several minutes for all programs to run. Click **Next**. @@ -151,7 +151,7 @@ You must have the App-V Sequencer installed to modify a virtual application pack **Note**   If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop** and select either the **Stop all applications** or the **Stop this application only** check box, depending on what you want. -   + 13. On the **Create Package** page, select the **Continue to modify package without saving using the package editor** check box, to modify the package without saving it. When you select this option, the package in the sequencer console opens so that you can modify the package before it is saved. Click **Next**. @@ -164,9 +164,9 @@ You must have the App-V Sequencer installed to modify a virtual application pack [Tasks for the Application Virtualization Sequencer (App-V 4.6 SP1)](tasks-for-the-application-virtualization-sequencer--app-v-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md b/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md index d5216f7819..c5b952309a 100644 --- a/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md +++ b/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md @@ -26,7 +26,7 @@ In Windows Server 2008, the process of changing the ACLs on the private key is **Note**   The default security context is Network Service; however, a domain account can be used instead. -  + **To manage private keys in Windows Server 2003** @@ -57,9 +57,9 @@ The default security context is Network Service; however, a domain account can b [Configuring Certificates to Support Secure Streaming](configuring-certificates-to-support-secure-streaming.md) -  + -  + diff --git a/mdop/appv-v4/how-to-modify-the-log-directory-location.md b/mdop/appv-v4/how-to-modify-the-log-directory-location.md index c648d46936..9b4accadbf 100644 --- a/mdop/appv-v4/how-to-modify-the-log-directory-location.md +++ b/mdop/appv-v4/how-to-modify-the-log-directory-location.md @@ -22,7 +22,7 @@ The log directory location is where the Application Virtualization (App-V) Seque **Important**   The log location directory must be located on the computer running the App-V Sequencer. -  + Use the following procedure to change the location of the directory where the App-V Sequencer will save associated logs. @@ -41,9 +41,9 @@ Use the following procedure to change the location of the directory where the Ap [How to Configure the App-V Sequencer](how-to-configure-the-app-v-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md b/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md index f77fb2f8db..f3aa20ff3b 100644 --- a/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md +++ b/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md @@ -36,7 +36,7 @@ Use the following procedure to modify the operating system versions associated w **Note**   If you select **Tools** / **Create MSI** to create a new Windows Installer file, you can skip **Step 6** of this procedure. -   + 6. To save the virtual application package, select **Package** / **Save**. @@ -45,9 +45,9 @@ Use the following procedure to modify the operating system versions associated w [Tasks for the Application Virtualization Sequencer](tasks-for-the-application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md b/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md index 11e606a1f9..582f590f01 100644 --- a/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md +++ b/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md @@ -22,7 +22,7 @@ The scratch directory is used by the App-V Sequencer to save temporary files dur **Important**   The specified scratch directory location should be located on the computer running the App-V Sequencer. -  + Use the following procedure to modify the scratch directory location. @@ -43,9 +43,9 @@ Use the following procedure to modify the scratch directory location. [How to Modify the Log Directory Location](how-to-modify-the-log-directory-location.md) -  + -  + diff --git a/mdop/appv-v4/how-to-move-an-application-group.md b/mdop/appv-v4/how-to-move-an-application-group.md index c544b38b85..13f84cae13 100644 --- a/mdop/appv-v4/how-to-move-an-application-group.md +++ b/mdop/appv-v4/how-to-move-an-application-group.md @@ -34,7 +34,7 @@ In the Application Virtualization Server Management Console, you can use the fol **Note**   You can select and move multiple application groups simultaneously. In the right pane, use the **CTRL**-click or **Shift**-click key combinations to select more than one group. -   + ## Related topics @@ -45,9 +45,9 @@ In the Application Virtualization Server Management Console, you can use the fol [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-move-an-application.md b/mdop/appv-v4/how-to-move-an-application.md index 3395f20062..891de6a2a0 100644 --- a/mdop/appv-v4/how-to-move-an-application.md +++ b/mdop/appv-v4/how-to-move-an-application.md @@ -22,7 +22,7 @@ If you have application groups under the **Applications** node in the Applicatio **Important**   You must have one or more application groups under the **Applications** node to move applications. -  + **To move an application** @@ -41,7 +41,7 @@ You must have one or more application groups under the **Applications** node to **Note**   You can select and move multiple application groups simultaneously. In the right pane, use the **CTRL**-click or **Shift**-click key combinations to select more than one group. -   + ## Related topics @@ -50,9 +50,9 @@ You must have one or more application groups under the **Applications** node to [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md b/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md index 7f55ee7809..9a25b5de7e 100644 --- a/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md +++ b/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md @@ -46,16 +46,16 @@ Use the following procedure to open sequenced application packages using the com **Note**   If the installer or Windows Installer package has a graphical user interface, it will be displayed after you specify the command-line parameters. -   + ## Related topics [How to Manage Virtual Applications Using the Command Line](how-to-manage-virtual-applications-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md b/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md index 25574eab65..d91ae838c7 100644 --- a/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md +++ b/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md @@ -40,7 +40,7 @@ When you deploy Application Virtualization by using an electronic software distr **Important**   For OVERRIDEURL all backslash characters must be escaped using a preceding backslash, or the OVERRIDEURL path will not be parsed correctly. Also, properties and values must be entered as uppercase except where the value is a path to a file. -   + **To publish a package using SFTMIME** @@ -61,9 +61,9 @@ When you deploy Application Virtualization by using an electronic software distr [Stand-Alone Delivery Scenario for Application Virtualization Clients](stand-alone-delivery-scenario-for-application-virtualization-clients.md) -  + -  + diff --git a/mdop/appv-v4/how-to-refresh-the-publishing-servers.md b/mdop/appv-v4/how-to-refresh-the-publishing-servers.md index 5cfbb564a4..54494a77f0 100644 --- a/mdop/appv-v4/how-to-refresh-the-publishing-servers.md +++ b/mdop/appv-v4/how-to-refresh-the-publishing-servers.md @@ -22,7 +22,7 @@ After you request access to additional applications and permission is granted by **Note**   By default, publishing information is refreshed on user log in. -  + **To refresh the publishing information** @@ -37,7 +37,7 @@ By default, publishing information is refreshed on user log in. - Right-click the server in the **Results** pane, and then select **Properties** from the pop-up menu. Select the **Refresh** tab, and then click the **Refresh** button. -   + ## Related topics @@ -46,9 +46,9 @@ By default, publishing information is refreshed on user log in. [How to Set Up Publishing Refresh on Login](how-to-set-up-publishing-refresh-on-login.md) -  + -  + diff --git a/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md b/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md index 6e5218bac6..28cf02fc30 100644 --- a/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md +++ b/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md @@ -30,18 +30,18 @@ You can use the following procedure to remove an application from its assigned l 4. Click **OK**. **Note**   -   You can alter the **Properties** tab of one application at a time. + You can alter the **Properties** tab of one application at a time. -   + ## Related topics [How to Associate an Application with a License Group](how-to-associate-an-application-with-a-license-group.md) -  + -  + diff --git a/mdop/appv-v4/how-to-remove-an-application-group.md b/mdop/appv-v4/how-to-remove-an-application-group.md index 86beaeaecc..9971b36c80 100644 --- a/mdop/appv-v4/how-to-remove-an-application-group.md +++ b/mdop/appv-v4/how-to-remove-an-application-group.md @@ -22,7 +22,7 @@ You can use the following procedures to remove an application group in the Appli **Caution**   Deleting a group with its applications deletes those applications from the Application Virtualization Management Server. When you try to do this, you must confirm the deletion in a pop-up window. -  + **To empty and then delete an application group** @@ -49,7 +49,7 @@ Deleting a group with its applications deletes those applications from the Appli **Note**   You can select and remove multiple application groups simultaneously. In the right pane, use the **CTRL**-click or **Shift**-click key combinations to select more than one group. -   + ## Related topics @@ -58,9 +58,9 @@ Deleting a group with its applications deletes those applications from the Appli [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-remove-an-application-license-group.md b/mdop/appv-v4/how-to-remove-an-application-license-group.md index 4fe41a65b2..108f41917f 100644 --- a/mdop/appv-v4/how-to-remove-an-application-license-group.md +++ b/mdop/appv-v4/how-to-remove-an-application-license-group.md @@ -22,7 +22,7 @@ In the Application Virtualization Server Management Console, you can use the fol **Important**   Before you can remove a license group, you must remove any licenses associated with the group. -  + **To remove a license group** @@ -51,9 +51,9 @@ Before you can remove a license group, you must remove any licenses associated w [How to Set Up an Unlimited License Group](how-to-set-up-an-unlimited-license-group.md) -  + -  + diff --git a/mdop/appv-v4/how-to-rename-an-application.md b/mdop/appv-v4/how-to-rename-an-application.md index c31ed10887..d16fc9a6e9 100644 --- a/mdop/appv-v4/how-to-rename-an-application.md +++ b/mdop/appv-v4/how-to-rename-an-application.md @@ -30,16 +30,16 @@ You can rename an application through the Application Virtualization Server Mana **Note**   You can also highlight the application in the right pane and press **F2**. -   + ## Related topics [How to Manage Applications in the Server Management Console](how-to-manage-applications-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-run-a-reportserver.md b/mdop/appv-v4/how-to-run-a-reportserver.md index 60e1602dcd..feb8ffd3aa 100644 --- a/mdop/appv-v4/how-to-run-a-reportserver.md +++ b/mdop/appv-v4/how-to-run-a-reportserver.md @@ -22,7 +22,7 @@ The process for running a report is the same regardless of the report type. When **Note**   Reports are not run automatically; you must run them explicitly to generate output data. The length of time it takes to run a report is determined by the amount of data collected in the data store. -  + **To run a report** @@ -55,9 +55,9 @@ Reports are not run automatically; you must run them explicitly to generate outp [How to Print a Report](how-to-print-a-reportserver.md) -  + -  + diff --git a/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md index e97ed83def..69b8fe0655 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to create a new add-on or plug-in virtual application package by using the Application Virtualization (App-V) Sequencer. An add-on or plug-in application is an application that extends the functionality of an application, for example, a plug-in for Microsoft Excel. For more information about the types of applications you can sequence, see [How to Determine Which Type of Application to Sequence (App-V 4.6 SP1)](how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md). -**Important**   +**Important** Before performing the following procedure, install the parent application locally on the computer that is running the sequencer. For example, if you are sequencing a plug-in for Microsoft Excel, install Microsoft Excel locally on the computer that is running the sequencer. Also install the parent application in the same directory where the application is installed on target computers. If the plug-in or add-on is going to be used with an existing virtual application package, install the application on the same virtual application drive that was used when you created the parent virtual application package. -  + You can also use an existing virtual application package as the parent application. To use an existing virtual application package, use the following procedure before sequencing the new add-on or plug-in. @@ -40,10 +40,10 @@ You can also use an existing virtual application package as the parent applicati 3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail, or for the package to contain unnecessary data. We strongly recommend that you resolve all potential issues before you continue. After you have fixed the conflicts, to update the information displayed, click **Refresh**. After you have resolved all potential issues, click **Next**. - **Important**   + **Important** If you are required to disable virus scanning software, scan the computer running the sequencer to ensure that no unwanted or malicious files could be added to the package. -   + 4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. @@ -53,59 +53,63 @@ You can also use an existing virtual application package as the parent applicati 6. On the **Select Primary** page, click **Browse** and specify the parent application. - **Important**   + **Important** If the parent application that the add-on or plug-in you are installing is going to support has not been installed locally, stop here and install the application on the computer running the sequencer. For example, the **Excel.exe** program file must be installed locally for a Microsoft Excel plug-in. -   - Click **Next**. -7. On the **Package Name** page, specify a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will also be displayed in the App-V management console. The **Installation Location** displays the Application Virtualization path where the application will be installed. To edit this location, select **Edit (Advanced)**. +~~~ +Click **Next**. +~~~ - **Important**   - Editing the Application Virtualization path is an advanced configuration task. You should fully understand the implications of changing the path. For most applications, we recommend the default path. +7. On the **Package Name** page, specify a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will also be displayed in the App-V management console. The **Installation Location** displays the Application Virtualization path where the application will be installed. To edit this location, select **Edit (Advanced)**. -   + **Important** + Editing the Application Virtualization path is an advanced configuration task. You should fully understand the implications of changing the path. For most applications, we recommend the default path. - Click **Next**. -8. On the **Installation** page, when the sequencer and application installer are ready, install the plug-in or add-in application so the sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. +~~~ +Click **Next**. +~~~ + +8. On the **Installation** page, when the sequencer and application installer are ready, install the plug-in or add-in application so the sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. + +9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. 10. On the **Customize** page, if you are finished installing and configuring the virtual application, select **Stop now** and skip to step 14 of this procedure. If you want to customize any of the items in the following list, select **Customize**. - - Edit the file type associations associated with an application. + - Edit the file type associations associated with an application. - - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. + - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 11. On the **Edit Shortcuts** page, you can optionally configure the file type associations (FTA) that will be associated with the various applications in the package. To create a new FTA, in the left pane, select and expand the application that you want to customize, and then click **Add**. In the **Add File Type Association** dialog box, provide the necessary information for the new FTA. Under the application, select **Shortcuts** to review the shortcut information associated with an application. In the **Location** pane, you can review the icon file information. To edit an existing FTA, click **Edit**. To remove an FTA, select the FTA, and then click **Remove**. Click **Next**. 12. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. It can take several minutes for all the applications to run. After all applications have run, close each of the applications, and then click **Next**. - **Note**   - If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop** and select one of the check boxes, **Stop all applications** or **Stop this application only**. + **Note** + If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop** and select one of the check boxes, **Stop all applications** or **Stop this application only**. + -   13. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box, and then select the operating systems that can run this package. Click **Next**. 14. On the **Create Package** page, to modify the package without saving it, select **Continue to modify package without saving using the package editor** check box. Selecting this option opens the package in the Sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select the default **Save the package now**. Optionally, select **Comments** to add comments that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse** and specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. + To save the package immediately, select the default **Save the package now**. Optionally, select **Comments** to add comments that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse** and specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. 15. On the **Completion** page, after you have reviewed the information that is displayed in the **Successful Virtual Application Package Report** pane, click **Close**. The information displayed in the **Successful Virtual Application Package Report** pane is also available in the directory specified in step 14 of this procedure, in a file named **Reports.xml**. - The package is now available in the sequencer. Click **Edit \[Package Name\]** to edit the package properties. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md). + The package is now available in the sequencer. Click **Edit \[Package Name\]** to edit the package properties. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md). + + **Important** + After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. - **Important**   - After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. -   ## Related topics @@ -114,9 +118,9 @@ You can also use an existing virtual application package as the parent applicati [How to Determine Which Type of Application to Sequence (App-V 4.6 SP1)](how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md b/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md index 2ea4999e59..8cf0f80add 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md +++ b/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md @@ -19,19 +19,19 @@ ms.date: 06/16/2016 Use the following procedure to create a new virtual application by using the Application Virtualization (App-V) Sequencer. You can also use the App-V Sequencer to configure which files and configurations are applicable to all users and which files and configurations users can customize. After you successfully sequence the application, it is available in the App-V Sequencer. -**Important**   -During sequencing, if the computer running the sequencer is running Windows Vista or Windows 7, and a restart is initiated outside of the virtual environment, for example, by clicking **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows from shutting down. If you click **Force shut down**, the package creation will fail, and the computer will restart. When you click **Cancel**, the sequencer successfully records the restart while the application is being sequenced. +**Important** +During sequencing, if the computer running the sequencer is running Windows Vista or Windows 7, and a restart is initiated outside of the virtual environment, for example, by clicking **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows from shutting down. If you click **Force shut down**, the package creation will fail, and the computer will restart. When you click **Cancel**, the sequencer successfully records the restart while the application is being sequenced. + -  **To sequence a new application** 1. To create the App-V drive, configure drive Q as the location that can be used to save files while you are sequencing an application. You must then create individual directories for each application that you plan to sequence on drive Q. You can create the virtual application targeted folders before you sequence an application, or you can create them in step 5 of this procedure. - **Note**   + **Note** The App-V drive you specify must be accessible on targeted computers. If drive Q is not accessible, you can choose a different drive letter. -   + 2. To start the App-V Sequencer Console, on the computer that is running the App-V Sequencer, select **Start** / **Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. To start the Sequencing Wizard, click **Create a Package**. @@ -41,34 +41,36 @@ During sequencing, if the computer running the sequencer is running Windows Vis 5. On the **Monitor Installation** page, when you are ready to install the application, click **Begin Monitoring**, and in the **Browse for Folder** dialog box, specify the directory on drive Q where the application will be installed. If you did not configure drive Q and used a different drive letter for the application virtualization drive, select the drive letter you specified in step 1 of this procedure. To install the application to a folder that has not been created on the application virtualization drive, click **Make New Folder**. After you specify the folder, wait while the Sequencer configures the computer for sequencing. - **Important**   + **Important** You must install each application that you sequence into a separate directory on the virtual application drive, and the associated folder name must not be longer than eight characters. -   - After the computer has been configured for sequencing, install the application so that the App-V Sequencer can monitor the installation; when you are finished, click **Stop Monitoring**, and then click **Next**. -6. On the **Configure Applications** page, if necessary, configure the shortcuts and file type associations that will be associated with the virtual application. To add a new file type association or shortcut, click **Add**, and in the **Add Application** dialog box, specify the new element. To remove an existing shortcut or file type association, click **Remove**. To edit an existing element, select the element you want to modify, and then click **Edit**. Specify the configurations in the **Edit Application** dialog box. Click **Save**, and then click **Next**. +~~~ +After the computer has been configured for sequencing, install the application so that the App-V Sequencer can monitor the installation; when you are finished, click **Stop Monitoring**, and then click **Next**. +~~~ -7. On the **Launch Applications** page, to start the application to ensure that the package has been installed correctly and is optimized for streaming, select the package, and then click **Launch**. This step is useful for configuring how the application initially runs on targeted computers and for accepting any associated license agreements before the package becomes available to App-V clients. If multiple applications are associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. +6. On the **Configure Applications** page, if necessary, configure the shortcuts and file type associations that will be associated with the virtual application. To add a new file type association or shortcut, click **Add**, and in the **Add Application** dialog box, specify the new element. To remove an existing shortcut or file type association, click **Remove**. To edit an existing element, select the element you want to modify, and then click **Edit**. Specify the configurations in the **Edit Application** dialog box. Click **Save**, and then click **Next**. -8. After you have successfully created the package, in the App-V Sequencer Console, select **File** / **Save** and specify the name and the virtual drive location where the package will be saved. +7. On the **Launch Applications** page, to start the application to ensure that the package has been installed correctly and is optimized for streaming, select the package, and then click **Launch**. This step is useful for configuring how the application initially runs on targeted computers and for accepting any associated license agreements before the package becomes available to App-V clients. If multiple applications are associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. - You can optionally create an associated Windows Installer file (**.msi**) to install the virtual application package on targeted computers. To create a Windows Installer file, open the package in the Sequencer and select **Tools** / **Create MSI**. The Windows Installer file will be created and saved in the directory where the virtual application package is saved. +8. After you have successfully created the package, in the App-V Sequencer Console, select **File** / **Save** and specify the name and the virtual drive location where the package will be saved. + + You can optionally create an associated Windows Installer file (**.msi**) to install the virtual application package on targeted computers. To create a Windows Installer file, open the package in the Sequencer and select **Tools** / **Create MSI**. The Windows Installer file will be created and saved in the directory where the virtual application package is saved. + + **Important** + After you have successfully created a virtual application package, you cannot run the virtual application package on the computer running the sequencer. - **Important**   - After you have successfully created a virtual application package, you cannot run the virtual application package on the computer running the sequencer. -   ## Related topics [How to Upgrade a Virtual Application Package (App-V 4.6)](how-to-upgrade-a-virtual-application-package--app-v-46-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md b/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md index 24fa8fa4f3..8df7b3d92a 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md +++ b/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 You can use a command line to sequence a new application. Using a command line is useful when you have to create a large number of virtual applications or when you need to create sequenced applications on a recurring basis. -**Important**   +**Important** Command-line sequencing allows for default sequencing only. If you need to change default installation settings for the application you are sequencing, you must either manually modify the virtual application or update the virtual application by using the Application Virtualization (App-V) Sequencer. For more information about updating a virtual application by using the App-V Sequencer, see [How to Upgrade an Existing Virtual Application](how-to-upgrade-an-existing-virtual-application.md). -  + Use the following procedure to create a virtual application by using the command line. @@ -36,43 +36,45 @@ Use the following procedure to create a virtual application by using the command `SFTSequencer /INSTALLPACKAGE:"pathtoMSI" /INSTALLPATH:"pathtopackageroot" /OUTPUTFILE:"pathtodestinationSPRJ"` - **Note**   + **Note** You can specify additional parameters by using the command line, depending on the complexity of the application you are sequencing. For a complete list of parameters that are available for use with the App-V Sequencer, see [Sequencer Command-Line Parameters](sequencer-command-line-parameters.md). -   - Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. - - - - - - - - - - - - - - - - - - - - - - - - - -
    ValueDescription

    pathtoMSI

    Specifies the Windows Installer or a batch file that will be used to install an application so that it can be sequenced.

    pathtopackageroot

    Specify the package root directory.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ +Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. -   + ++++ + + + + + + + + + + + + + + + + + + + + +
    ValueDescription

    pathtoMSI

    Specifies the Windows Installer or a batch file that will be used to install an application so that it can be sequenced.

    pathtopackageroot

    Specify the package root directory.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ -4. Press **Enter**. + + +4. Press **Enter**. ## Related topics @@ -83,9 +85,9 @@ Use the following procedure to create a virtual application by using the command [Sequencer Command-Line Parameters](sequencer-command-line-parameters.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md b/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md index 8c2c0b74ba..65432aa68a 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md +++ b/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 You can use a command line to sequence a new application. Using a command line is useful when you have to create a large number of virtual applications or when you need to create sequenced applications on a recurring basis. -**Important**   +**Important** Command-line sequencing allows for default sequencing only. If you need to change default installation settings for the application you are sequencing, you must either manually modify the virtual application or update the virtual application by using the Application Virtualization (App-V) Sequencer. For more information about updating a virtual application by using the App-V Sequencer, see [How to Upgrade an Existing Virtual Application](how-to-upgrade-an-existing-virtual-application.md). -  + Use the following procedure to create a virtual application by using the command line. @@ -36,52 +36,54 @@ Use the following procedure to create a virtual application by using the command `SFTSequencer /INSTALLPACKAGE:"pathtoMSI" /INSTALLPATH:"pathtopackageroot" /OUTPUTFILE:"pathtodestinationSPRJ"` - **Note**   + **Note** You can specify additional parameters by using the command line, depending on the complexity of the application you are sequencing. For a complete list of parameters that are available for use with the App-V Sequencer, see [Application Virtualization Sequencer Command Line](application-virtualization-sequencer-command-line.md). -   - Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. - - - - - - - - - - - - - - - - - - - - - - - - - -
    ValueDescription

    pathtoMSI

    Specifies the Windows Installer or a batch file that will be used to install an application so that it can be sequenced.

    pathtopackageroot

    Specifies the package root directory.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ +Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. -   + ++++ + + + + + + + + + + + + + + + + + + + + +
    ValueDescription

    pathtoMSI

    Specifies the Windows Installer or a batch file that will be used to install an application so that it can be sequenced.

    pathtopackageroot

    Specifies the package root directory.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ -4. Press **Enter**. + + +4. Press **Enter**. ## Related topics [How to Manage Virtual Applications Using the Command Line](how-to-manage-virtual-applications-using-the-command-line.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-application.md b/mdop/appv-v4/how-to-sequence-a-new-application.md index f3c3c5f9f5..3d05d35761 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-application.md +++ b/mdop/appv-v4/how-to-sequence-a-new-application.md @@ -31,29 +31,31 @@ After you successfully sequence the application, it is available in the App-V Se 3. On the **Package Information** page, specify the **Package Name** that will be assigned to the virtual application. The package name is required for generating the associated Windows Installer file. You should also add an optional comment that will be assigned to the package and that provides detailed information about the virtual application. To display the **Advanced Options** page, select **Show Advanced Monitoring Options**. Click **Next**. - **Note**   + **Note** To display the **Advanced Options** page, you must select **Show Advanced Monitoring Options**. If you do not require the **Advanced Options** page, skip to step 4. -   + 4. On the **Advanced Options** page, to specify the **Block Size** for the virtual application, select the size you want. The block size determines how the **.sft** file will be divided for streaming the package across the network to target computers. To allow Microsoft Update to update the application as it is being sequenced; select **Allow Microsoft Update to run during monitoring**. If you select this option, Microsoft Updates are allowed to be installed during the monitoring phase and you will need to accept the associated updates for them to be installed. To remap the supported dynamic link library (.dll) files so that they use a contiguous space of RAM, select **Rebase DLLs**. Selecting this option can conserve memory and help improve performance. Many applications do not support this option, but it is useful in environments with limited RAM such as in Terminal Server scenarios. Click **Next**. 5. On the **Monitor Installation** page, to monitor the installation of an application, click **Begin Monitoring**. After you click **Begin Monitoring**, specify the directory on the Q:\\ drive where the application will be installed. To install the application to a folder that has not been ccreated, click **Make New Folder**. You must install each application that you sequence into a separate directory. - **Important**   + **Important** The folder name you specify must not be longer than 8 characters. -   - Wait for the virtual environment to load, and then install the application so that the App-V Sequencer can monitor the process. When you have completed the installation, click **Stop Monitoring** and then click **Next**. -6. On the **Additional Files to Map to Virtual File System (VFS)** page, to specify additional files to be added to the Virtual File System (VFS), click **Add**. Browse to the file you want to add, and click **Open**. To clear existing files that have been added, click **Reset** and then click **Next**. +~~~ +Wait for the virtual environment to load, and then install the application so that the App-V Sequencer can monitor the process. When you have completed the installation, click **Stop Monitoring** and then click **Next**. +~~~ -7. On the **Configure Applications** page, configure the shortcuts and file type associations that will be associated with the virtual application. Select the element you want to update, and then click **Edit Locations**. Specify the configurations in the **Shortcut Locations** dialog box. Click **OK** and then click **Next**. +6. On the **Additional Files to Map to Virtual File System (VFS)** page, to specify additional files to be added to the Virtual File System (VFS), click **Add**. Browse to the file you want to add, and click **Open**. To clear existing files that have been added, click **Reset** and then click **Next**. -8. On the **Launch Applications** page, to start the application to ensure that the package is optimized for streaming, select the package and click **Launch**. This step is useful for configuring how the application initially runs on target computers and for accepting any associated license agreements before the package is made available to clients. If there are multiple applications associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. +7. On the **Configure Applications** page, configure the shortcuts and file type associations that will be associated with the virtual application. Select the element you want to update, and then click **Edit Locations**. Specify the configurations in the **Shortcut Locations** dialog box. Click **OK** and then click **Next**. -9. On the **Sequence Package** page, to close the wizard, click **Finish**. +8. On the **Launch Applications** page, to start the application to ensure that the package is optimized for streaming, select the package and click **Launch**. This step is useful for configuring how the application initially runs on target computers and for accepting any associated license agreements before the package is made available to clients. If there are multiple applications associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. + +9. On the **Sequence Package** page, to close the wizard, click **Finish**. 10. After you have successfully created the package, to save the package, in the App-V Sequencer Console, select **File** / **Save** and specify the name and the location where the package will be saved. @@ -62,9 +64,9 @@ After you successfully sequence the application, it is available in the App-V Se [Tasks for the Application Virtualization Sequencer](tasks-for-the-application-virtualization-sequencer.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md index 89175af2b4..4f5f815988 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md @@ -21,10 +21,10 @@ Use the following procedure to create a new middleware virtual application packa Use this type of package by using Dynamic Suite Composition in App-V. Dynamic Suite Composition enables you to define a virtual application package as being dependent on another virtual application package. The dependency enables the application to interact with the middleware or plug-in in the virtual environment, where typically this interaction is prevented. This is useful because a secondary application package can be used with several other primary applications, which enables each primary application to reference the same secondary package. For more information about how to use Dynamic Suite Composition, see [How To Use Dynamic Suite Composition](https://go.microsoft.com/fwlink/?LinkID=203804&clcid=0x409) in the Microsoft Technical Library (https://go.microsoft.com/fwlink/?LinkID=203804&clcid=0x409). -**Important**   -During sequencing, if the computer running the App-V Sequencer is running Windows Vista or Windows 7 and a restart is initiated outside of the virtual environment, for example, **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows from shutting down. If you click **Force shut down**, the package creation fails. When you click **Cancel**, App-V Sequencer successfully records the restart while the application is being sequenced. +**Important** +During sequencing, if the computer running the App-V Sequencer is running Windows Vista or Windows 7 and a restart is initiated outside of the virtual environment, for example, **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows from shutting down. If you click **Force shut down**, the package creation fails. When you click **Cancel**, App-V Sequencer successfully records the restart while the application is being sequenced. + -  **To sequence a new middleware application** @@ -34,10 +34,10 @@ During sequencing, if the computer running the App-V Sequencer is running Window 3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail, or for the package to contain unnecessary data. We strongly recommend that you resolve all potential issues before you continue. After you have fixed the conflicts, to update the information displayed, click **Refresh**. After you have resolved all potential issues, click **Next**. - **Important**   + **Important** If you are required to disable virus scanning software, you must scan the computer running the App-VSequencer to ensure that no unwanted or malicious files can be added to the package. -   + 4. On the **Type of Application** page, select **Middleware**, and then click **Next**. @@ -47,33 +47,35 @@ During sequencing, if the computer running the App-V Sequencer is running Window 6. On the **Package Name** page, specify a name that will be associated with the package. The name helps identify the purpose and version of the application that will be added to the package. The package name is also displayed in the App-V Management Console. The **Installation Location** displays the application virtualization path where the application will be installed. To edit this location, select **Edit (Advanced)**. - **Important**   + **Important** Editing the Application Virtualization path is an advanced configuration task. You should fully understand the implications of changing the path. For most applications, we recommend the default path. -   - Click **Next**. -7. On the **Installation** page, when the Sequencer and middleware application installer are ready, install the application so that the Sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. +~~~ +Click **Next**. +~~~ -8. On the **Installation** page, wait while the Sequencer configures the virtual application package. +7. On the **Installation** page, when the Sequencer and middleware application installer are ready, install the application so that the Sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. +8. On the **Installation** page, wait while the Sequencer configures the virtual application package. + +9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. 10. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box and select the operating systems that can run this package. Click **Next**. 11. On the **Create Package** page, to modify the package without saving it, select the **Continue to modify package without saving using the package editor** check box. Selecting this option opens the package in the Sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select the default, the **Save the package now** check box. Add optional comments in the **Comments** box that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse**, and then specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. + To save the package immediately, select the default, the **Save the package now** check box. Add optional comments in the **Comments** box that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse**, and then specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. 12. On the **Completion** page, after you have reviewed the information displayed in the **Virtual Application Package Report** pane, click **Close**. The information displayed in the **Virtual Application Package Report** pane is also available in the directory specified in step 11 of this procedure, in a file named **Report.xml**. - The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md) + The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md) + + **Important** + After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the Sequencer. - **Important**   - After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the Sequencer. -   ## Related topics @@ -82,9 +84,9 @@ During sequencing, if the computer running the App-V Sequencer is running Window [How to Determine Which Type of Application to Sequence (App-V 4.6 SP1)](how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md index 1293f25561..0811b151cb 100644 --- a/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md +++ b/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md @@ -19,15 +19,15 @@ ms.date: 06/16/2016 Use the following procedure to create a new standard virtual application package by using the Application Virtualization (App-V) Sequencer. This procedure applies to most applications that you sequence. For more information about the types of applications you can sequence, see [How to Determine Which Type of Application to Sequence (App-V 4.6 SP1)](how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md). You must run the sequencer (**SFTSequencer.exe**) using an account that has administrator privileges because of the changes the sequencer makes to the local system. These changes can include writing files to the **C:\\Program Files** directory, making registry changes, starting and stopping services, updating security descriptors for files, and changing permissions. -**Important**   -During sequencing, if the computer running the Sequencer is running Windows Vista or Windows 7 and a restart is initiated outside of the virtual environment, for example, **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows Vista or Windows from shutting down. If you click **Force shut down**, the package creation fails. When you click **Cancel**, the Sequencer successfully records the restart while the application is being sequenced. +**Important** +During sequencing, if the computer running the Sequencer is running Windows Vista or Windows 7 and a restart is initiated outside of the virtual environment, for example, **Start** / **Shut Down**, you must click **Cancel** when prompted to close the program that is preventing Windows Vista or Windows from shutting down. If you click **Force shut down**, the package creation fails. When you click **Cancel**, the Sequencer successfully records the restart while the application is being sequenced. -  -**Note**   + +**Note** Running the App-V sequencer in Safe Mode is not supported. -  + **To sequence a new standard application** @@ -37,10 +37,10 @@ Running the App-V sequencer in Safe Mode is not supported. 3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail, or for the package to contain unnecessary data. We strongly recommend that you resolve all potential issues before you continue. After you have fixed the conflicts, to update the information that is displayed, click **Refresh**. After you have resolved all potential issues, click **Next**. - **Important**   + **Important** If you are required to disable virus scanning software, scan the computer running the Sequencer to ensure that no unwanted or malicious files could be added to the package. -   + 4. On the **Type of Application** page, click **Standard Application (default)** check box, and then click **Next**. @@ -50,59 +50,61 @@ Running the App-V sequencer in Safe Mode is not supported. 6. On the **Package Name** page, specify a name that will be associated with the package. The name helps identify the purpose and version of the application that are added to the package. The package name is also displayed in the App-V management console. The **Primary Virtual Application Directory** displays the Application Virtualization path where the application will be installed on target computers. To edit this location, select **Edit (Advanced)**. - **Important**   + **Important** Editing the Application Virtualization path is an advanced configuration task. You should fully understand the implications of changing the path. For most applications, the default path is recommended. -   - Click **Next**. -7. On the **Installation** page, when the Sequencer and application installer are ready, install the application so that the Sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. +~~~ +Click **Next**. +~~~ -8. On the **Installation** page, wait while the Sequencer configures the virtual application package. +7. On the **Installation** page, when the Sequencer and application installer are ready, install the application so that the Sequencer can monitor the installation process. Perform the installation by using the application’s installation process. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. -9. On the **Configure Software** page, optionally run the programs contained in the package. This step helps complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs you want to run, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. It can take several minutes for all programs to run. Click **Next**. +8. On the **Installation** page, wait while the Sequencer configures the virtual application package. + +9. On the **Configure Software** page, optionally run the programs contained in the package. This step helps complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs you want to run, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. It can take several minutes for all programs to run. Click **Next**. 10. On the **Installation Report** page, you can review information about the virtual application package you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. 11. On the **Customize** page, if you are finished installing and configuring the virtual application, select **Stop now** and skip to step 15 of this procedure. If you want to customize any of the items in the following list, select **Customize**. - - Edit the file type associations and the icons associated with an application. + - Edit the file type associations and the icons associated with an application. - - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. + - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 12. On the **Edit Shortcuts** page, you can optionally configure the file type associations (FTA) and shortcut locations that will be associated with the various applications in the package. To create a new FTA, in the left pane, select and expand the application you want to customize, and then click **Add**. In the **Add File Type Association** dialog box, provide the necessary information for the new FTA. To review the shortcut information associated with an application, under the application, select **Shortcuts**, and in the **Location** pane, you can edit the icon file information. To edit an existing FTA, click **Edit**. To remove an FTA, select the FTA, and then click **Remove**. Click **Next**. 13. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. It can take several minutes for all the applications to run. After all applications have run, close each of the applications, and then click **Next**. - **Note**   - If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop**, and select one of the check boxes, **Stop all applications** or **Stop this application only**, depending on what you want. + **Note** + If you want to stop an application from loading during this step, in the **Application Launch** dialog box, click **Stop**, and select one of the check boxes, **Stop all applications** or **Stop this application only**, depending on what you want. + -   14. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select **Allow this package to run on any operating system**. To configure this package to run only on specific operating systems, select **Allow this package to run only on the following operating systems** and specify the operating systems that can run this package. Click **Next**. - **Important**   - The operating systems specified during this step reflect the operating systems on target computers that are enabled to run the package. You must ensure that the operating systems specified are supported by the application you are sequencing. + **Important** + The operating systems specified during this step reflect the operating systems on target computers that are enabled to run the package. You must ensure that the operating systems specified are supported by the application you are sequencing. + -   15. On the **Create Package** page, to modify the package without saving it, select **Continue to modify package without saving using the package editor**. Selecting this option opens the package in the Sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select the default **Save the package now**. Add optional **Comments** that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse** and specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. + To save the package immediately, select the default **Save the package now**. Add optional **Comments** that will be associated with the package. Comments are useful for identifying version and other information about the package. The default **Save Location** is also displayed. To change the default location, click **Browse** and specify the new location. The uncompressed package size is displayed. If the package size exceeds 4 GB (uncompressed) and you plan to stream the package to target computers, you must select **Compress Package**. Click **Create**. 16. On the **Completion** page, after you have reviewed the information displayed in the **Virtual Application Package Report** pane, click **Close**. The information displayed in the **Virtual Application Package Report** pane is also available in the directory specified in step 15 of this procedure, in a file named **Report.xml**. The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about modifying a package, see [How to Modify an Existing Virtual Application Package (App-V 4.6 SP1)](how-to-modify-an-existing-virtual-application-package--app-v-46-sp1-.md) - **Important**   + **Important** After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the Sequencer. -   + ## Related topics @@ -111,9 +113,9 @@ Running the App-V sequencer in Safe Mode is not supported. [How to Determine Which Type of Application to Sequence (App-V 4.6 SP1)](how-to-determine-which-type-of-application-to-sequence---app-v-46-sp1-.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-sequence-an-application.md b/mdop/appv-v4/how-to-sequence-an-application.md index dc5570e9bf..6e4b78a2d3 100644 --- a/mdop/appv-v4/how-to-sequence-an-application.md +++ b/mdop/appv-v4/how-to-sequence-an-application.md @@ -31,29 +31,31 @@ After you successfully sequence the application, it is available in the App-V Se 3. On the **Package Information** page, specify the **Package Name** that will be assigned to the virtual application. The package name is required for generating the associated Windows Installer file. You should also add an optional comment that will be assigned to the package and that provides detailed information about the virtual application. To display the **Advanced Options** page, select **Show Advanced Monitoring Options**. Click **Next**. - **Note**   + **Note** To display the **Advanced Options** page, you must select **Show Advanced Monitoring Options**. If you do not require the **Advanced Options** page, skip to step 4. -   -4. On the **Advanced Options** page, to specify the **Block Size** for the virtual application, select the size you want. The block size determines how the **.sft** file will be divided for streaming the package across the network to target computers. To allow Microsoft Update to update the application as it is being sequenced; select **Allow Microsoft Update to run during monitoring**. If you select this option, Microsoft Updates are allowed to be installed during the monitoring phase and you will need to accept the associated updates for them to be installed. To remap the supported dynamic link library (.dll) files so that they use a contiguous space of RAM, select **Rebase DLLs**. Selecting this option can conserve memory and help improve performance. Many applications do not support this option, but it is useful in environments with limited RAM such as in Remote Desktop Session Host (RD Session Host) Server scenarios. Click **Next**. + +4. On the **Advanced Options** page, to specify the **Block Size** for the virtual application, select the size you want. The block size determines how the **.sft** file will be divided for streaming the package across the network to target computers. To allow Microsoft Update to update the application as it is being sequenced; select **Allow Microsoft Update to run during monitoring**. If you select this option, Microsoft Updates are allowed to be installed during the monitoring phase and you will need to accept the associated updates for them to be installed. To remap the supported dynamic link library (.dll) files so that they use a contiguous space of RAM, select **Rebase DLLs**. Selecting this option can conserve memory and help improve performance. Many applications do not support this option, but it is useful in environments with limited RAM such as in Remote Desktop Session Host (RD Session Host) Server scenarios. Click **Next**. 5. On the **Monitor Installation** page, to monitor the installation of an application, click **Begin Monitoring**. After you click **Begin Monitoring**, specify the directory on the Q:\\ drive where the application will be installed. To install the application to a folder that has not been created, click **Make New Folder**. You must install each application that you sequence into a separate directory. - **Important**   + **Important** The folder name you specify must not be longer than 8 characters. -   - Wait for the virtual environment to load, and then install the application so that the App-V Sequencer can monitor the process. When you have completed the installation, click **Stop Monitoring**, and then click **Next**. -6. On the **Additional Files to Map to Virtual File System (VFS)** page, to specify additional files to be added to the Virtual File System (VFS), click **Add**. Browse to the file you want to add and click **Open**. To clear existing files that have been added, click **Reset**, and then click **Next**. +~~~ +Wait for the virtual environment to load, and then install the application so that the App-V Sequencer can monitor the process. When you have completed the installation, click **Stop Monitoring**, and then click **Next**. +~~~ -7. On the **Configure Applications** page, configure the shortcuts and file type associations that will be associated with the virtual application. Select the element that you want to update, and then click **Edit Locations**. Specify the configurations in the Shortcut Locations dialog box. Click **OK**, and then click **Next**. +6. On the **Additional Files to Map to Virtual File System (VFS)** page, to specify additional files to be added to the Virtual File System (VFS), click **Add**. Browse to the file you want to add and click **Open**. To clear existing files that have been added, click **Reset**, and then click **Next**. -8. On the **Launch Applications** page, to start the application to ensure that the package is optimized for streaming, select the package and click **Launch**. This step is useful for configuring how the application initially runs on target computers and for accepting any associated license agreements before the package is made available to clients. If there are multiple applications associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. +7. On the **Configure Applications** page, configure the shortcuts and file type associations that will be associated with the virtual application. Select the element that you want to update, and then click **Edit Locations**. Specify the configurations in the Shortcut Locations dialog box. Click **OK**, and then click **Next**. -9. On the **Sequence Package** page, to close the wizard, click **Finish**. +8. On the **Launch Applications** page, to start the application to ensure that the package is optimized for streaming, select the package and click **Launch**. This step is useful for configuring how the application initially runs on target computers and for accepting any associated license agreements before the package is made available to clients. If there are multiple applications associated with this package, you can select **Launch All** to open all of the applications. To sequence the package, click **Next**. + +9. On the **Sequence Package** page, to close the wizard, click **Finish**. 10. After you have successfully created the package, to save the package, in the App-V Sequencer Console, select **File** / **Save** and specify the name and the location where the package will be saved. @@ -64,9 +66,9 @@ After you successfully sequence the application, it is available in the App-V Se [How to Sequence a New Application by Using the Command Line](how-to-sequence-a-new-application-by-using-the-command-line.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md b/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md index 847e678222..330c8fd3c2 100644 --- a/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md +++ b/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md @@ -20,9 +20,9 @@ ms.date: 06/16/2016 The Application Virtualization Server Management Console lets you enable or disable Windows authentication, which lets you to define who has access to the system. You can use the following procedures to set up and disable authentication from the **Provider Policies Results** pane of the console. **Note**   -  Normally, you set up authentication when you add a provider policy through the New Provider Policy Wizard. + Normally, you set up authentication when you add a provider policy through the New Provider Policy Wizard. -  + **To set up authentication** @@ -53,9 +53,9 @@ The Application Virtualization Server Management Console lets you enable or disa [How to Customize an Application Virtualization System in the Server Management Console](how-to-customize-an-application-virtualization-system-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-set-up-or-disable-database-size.md b/mdop/appv-v4/how-to-set-up-or-disable-database-size.md index 95f24a2f22..80082bec49 100644 --- a/mdop/appv-v4/how-to-set-up-or-disable-database-size.md +++ b/mdop/appv-v4/how-to-set-up-or-disable-database-size.md @@ -24,7 +24,7 @@ When the size of the stored data reaches 95% (the high watermark) of the specifi **Note**   The **No Size Limit** and **Keep All Usage** options are provided so that you can disable usage reporting and database cleanup. Selecting these items will clean up the database transaction log as well. (All committed Microsoft SQL Server transactions will be removed from the database log.) -  + **To set up database size** @@ -55,9 +55,9 @@ The **No Size Limit** and **Keep All Usage** options are provided so that you ca [How to Set Up or Disable Usage Reporting](how-to-set-up-or-disable-usage-reporting.md) -  + -  + diff --git a/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md b/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md index 5c4a0755b9..cc5904c915 100644 --- a/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md +++ b/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md @@ -20,9 +20,9 @@ ms.date: 06/16/2016 You can use the following procedures in the Application Virtualization Server Management Console to specify the duration (in months) of Application Virtualization System usage information you want to store in the database. **Note**   - To store usage information, you must select the **Log Usage Information** check box on the **Provider Pipeline** tab. To display this tab, right-click the provider policy in the **Provider Policies Results** pane and select **Properties**. + To store usage information, you must select the **Log Usage Information** check box on the **Provider Pipeline** tab. To display this tab, right-click the provider policy in the **Provider Policies Results** pane and select **Properties**. -  + **To set up usage reporting** @@ -55,9 +55,9 @@ You can use the following procedures in the Application Virtualization Server Ma [How to Set Up or Disable Database Size](how-to-set-up-or-disable-database-size.md) -  + -  + diff --git a/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md b/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md index 6bbe52ef10..7c062516ea 100644 --- a/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md +++ b/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md @@ -22,7 +22,7 @@ You can use the following procedure to configure the client to periodically refr **Note**   After you have performed this procedure, the publishing information will be refreshed according to the new settings after the first refresh at login. When this first refresh occurs, the server might override the computer settings with different settings, depending on how it is configured. The **Refresh** tab in the **Properties** dialog box shows the locally configured client computer settings and any settings that might have been configured for the user by the publishing server. -  + **To periodically refresh the publishing information from the Application Virtualization Servers** @@ -35,7 +35,7 @@ After you have performed this procedure, the publishing information will be refr **Note**   This setting will cause the client to refresh publishing information every time the configured period elapses. If the user is not logged in when it's time to do a refresh, the refresh will take place when the user next logs in. The timer is then started again for the next period. -   + 4. Click **Apply** to change the configuration. @@ -46,9 +46,9 @@ After you have performed this procedure, the publishing information will be refr [How to Configure the Client in the Application Virtualization Client Management Console](how-to-configure-the-client-in-the-application-virtualization-client-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-uninstall-the-app-v-client.md b/mdop/appv-v4/how-to-uninstall-the-app-v-client.md index e85301064c..32cefce588 100644 --- a/mdop/appv-v4/how-to-uninstall-the-app-v-client.md +++ b/mdop/appv-v4/how-to-uninstall-the-app-v-client.md @@ -28,14 +28,14 @@ Use the following procedure to uninstall the Application Virtualization Client f **Important**   The uninstall process cannot be canceled or interrupted. -   + 3. When a message stating that the Microsoft Application Virtualization Client Tray application must be closed before continuing appears, right-click the App-V icon in the notification area and select **Exit** to close the application. Then click **Retry** to continue with the uninstall process. **Important**   You might see a message stating that one or more virtual applications are in use. Close any open applications and save your data before you continue. Then click **OK** to continue with the uninstall process. -   + 4. A progress bar shows the time remaining. When this step finishes, you must restart the computer so that all associated drivers can be stopped to complete the uninstall process. @@ -50,7 +50,7 @@ Use the following procedure to uninstall the Application Virtualization Client f - HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\SoftGrid\\4.5\\SystemGuard\\SecKey -   + ## Related topics @@ -61,9 +61,9 @@ Use the following procedure to uninstall the Application Virtualization Client f [How to Publish a Virtual Application on the Client](how-to-publish-a-virtual-application-on-the-client.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md b/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md index 72bbdf39b0..6084e10e78 100644 --- a/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md +++ b/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md @@ -30,16 +30,16 @@ Use the Open Package command to upgrade or apply an update to a sequenced applic **Important**   Updating the file name with the package version is essential to successfully completing the upgrade. -   + ## Related topics [How to Manage Virtual Applications Using the Command Line](how-to-manage-virtual-applications-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-a-package.md b/mdop/appv-v4/how-to-upgrade-a-package.md index 63a4c6cb90..503f8d897c 100644 --- a/mdop/appv-v4/how-to-upgrade-a-package.md +++ b/mdop/appv-v4/how-to-upgrade-a-package.md @@ -28,7 +28,7 @@ When you upgrade a package with a new version, you can leave the existing versio **Note**   If resequencing did not add features that changed the Open Software Descriptor (OSD), icon (ICO), or Sequencer Project (SPRJ) files, you do not need to copy those. You can include these files if you want all these files to display the same date. -   + 2. In left pane of the Application Virtualization Server Management Console, expand **Packages**. @@ -47,9 +47,9 @@ When you upgrade a package with a new version, you can leave the existing versio [How to Manage Packages in the Server Management Console](how-to-manage-packages-in-the-server-management-console.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md b/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md index 1822dbefd4..3ed3a2cdfc 100644 --- a/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md +++ b/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md @@ -29,56 +29,58 @@ Use the following procedure to upgrade a virtual application by using a command `SFTSequencer /UPGRADE:"pathtosourceSPRJ" /INSTALLPACKAGE:"pathtoUpgradeInstaller" /DECODEPATH:"pathtodecodefolder" /OUTPUTFILE:"pathtodestinationSPRJ"` - **Note**   + **Note** You can specify additional parameters by using the command line, depending on the complexity of the application you are upgrading. For a complete list of parameters that are available for use with the App-V Sequencer, see [Command-Line Parameters](command-line-parameters.md). -   - Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ValueDescription

    pathtosourceSPRJ

    Specifies the directory location of the virtual application to be upgraded.

    pathtoUpgradeInstaller

    Specifies the Windows Installer or a batch file that will be used to install an upgrade to the application.

    pathtodecodefolder

    Specify the directory in which to unpack the SFT file.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ +Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. -   + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
    ValueDescription

    pathtosourceSPRJ

    Specifies the directory location of the virtual application to be upgraded.

    pathtoUpgradeInstaller

    Specifies the Windows Installer or a batch file that will be used to install an upgrade to the application.

    pathtodecodefolder

    Specify the directory in which to unpack the SFT file.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ -4. Press **Enter**. + + +4. Press **Enter**. ## Related topics [How to Manage Virtual Applications Using the Command Line](how-to-manage-virtual-applications-using-the-command-line.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md b/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md index 4ee6cef6b0..74d9705ad4 100644 --- a/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md +++ b/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md @@ -22,7 +22,7 @@ You can upgrade an existing virtual application to a new version by using the Ap **Caution**   You should not reference a previous version of the Windows Installer (.msi) file when you upgrade an existing virtual application package because the previous version of the .sft file will be modified during the upgrade. -  + Use the following procedure to upgrade an existing virtual application. @@ -37,7 +37,7 @@ Use the following procedure to upgrade an existing virtual application. **Important**   The directory that you specify must be located in the package root directory on the Q:\\ drive. You can create a new folder, or you can create a subfolder under the directory where the original virtual application is saved. The name assigned to the new folder must not be longer than 8 eight characters. -   + 4. To open the Sequencing Wizard, select **Tools**/**Sequencing Wizard**. On the **Package Information** page, optionally specify the new **Package Name** and add optional comments that will be associated with the updated virtual application. Click **Next**. @@ -58,9 +58,9 @@ Use the following procedure to upgrade an existing virtual application. [Tasks for the Application Virtualization Sequencer](tasks-for-the-application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md b/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md index c4bbb5fa00..30f369aa2b 100644 --- a/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md +++ b/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md @@ -29,47 +29,49 @@ Use the following procedure to upgrade a virtual application by using a command `SFTSequencer /UPGRADE:"pathtosourceSPRJ" /INSTALLPACKAGE:"pathtoUpgradeInstaller" /DECODEPATH:"pathtodecodefolder" /OUTPUTFILE:"pathtodestinationSPRJ"` - **Note**   + **Note** You can specify additional parameters by using the command line, depending on the complexity of the application you are upgrading. For a complete list of parameters that are available for use with the App-V Sequencer, see [Sequencer Command-Line Parameters](sequencer-command-line-parameters.md). -   - Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ValueDescription

    pathtosourceSPRJ

    Specifies the directory location of the virtual application to be upgraded.

    pathtoUpgradeInstaller

    Specifies the Windows Installer or a batch file that will be used to install an upgrade to the application.

    pathtodecodefolder

    Specify the directory in which to unpack the SFT file.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ +Use the value descriptions in the following table to help you determine the actual text you will use in the preceding command. -   + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
    ValueDescription

    pathtosourceSPRJ

    Specifies the directory location of the virtual application to be upgraded.

    pathtoUpgradeInstaller

    Specifies the Windows Installer or a batch file that will be used to install an upgrade to the application.

    pathtodecodefolder

    Specify the directory in which to unpack the SFT file.

    pathtodestinationSPRJ

    Specifies the path and file name of the SPRJ file that will be created.

    +~~~ -4. Press **Enter**. + + +4. Press **Enter**. ## Related topics @@ -80,9 +82,9 @@ Use the following procedure to upgrade a virtual application by using a command [Sequencer Command-Line Parameters](sequencer-command-line-parameters.md) -  - -  + + + diff --git a/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md b/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md index 813a4396b9..a1184994e7 100644 --- a/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md +++ b/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md @@ -28,7 +28,7 @@ Use the following procedure to upgrade an existing virtual application by using **Warning**   You must specify the root folder of the existing virtual application. Do not manually create a subfolder or the upgrade will fail. -   + 3. On the **Package Information** page, specify the **Package Name** that will be assigned to the updated package. The package name is required for generating the associated Windows Installer file. You should also add an optional comment that will be assigned to the package and that provides detailed information about the virtual application—for example, a version number. To display the **Advanced Options** page, select **Show Advanced Monitoring Options** and click **Next**; otherwise, proceed to step 5. @@ -51,9 +51,9 @@ Use the following procedure to upgrade an existing virtual application by using [How to Sequence a New Application (App-V 4.6)](how-to-sequence-a-new-application--app-v-46-.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md index b1e7fbf32e..f2acf0f9d6 100644 --- a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md +++ b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md @@ -22,12 +22,12 @@ You can use the following procedures to upgrade the Application Virtualization ( **Note**   During the upgrade to Application Virtualization (App-V) 4.5 or later versions, the permissions to the HKCU registry key are changed. Because of this, users will lose user configurations that were set previously, such as user-configured Disconnected Mode settings. If the user is not actively restricted from configuring client user interface behavior through a permission lockdown, the user can reset these preferences after a publishing refresh. -  + **Important**   When upgrading to version 4.6 or a later version of the App-V Client, you must use the correct installer for the computer’s operating system, 32-bit or 64-bit. The installation will fail and an error message will be displayed if you use the wrong installer. -  + **To upgrade the Application Virtualization Desktop Client** @@ -50,7 +50,7 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must - Microsoft Visual C++ 2008 SP1 Redistributable Package (x86) -   + 5. Click **Install**. Installation progress is displayed, and the status changes from **Pending** to **Installing**. Installation status changes to **Succeeded** as each step is completed successfully. @@ -63,14 +63,14 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must **Warning**   If you did not shut down the client program in step 1, you might see a **Files In Use** warning displayed. If this happens, right-click the App-V Client icon displayed in the desktop notification area and select **Exit** to shut down the existing client. Then click **Retry** to continue. -   + 9. When the installation completes successfully, you will be prompted to restart the computer. You need to restart the computer to complete the installation. **Caution**   If the upgrade fails for any reason, you will need to restart the computer before attempting the upgrade again. -   + **To upgrade the Application Virtualization Client by Using the Command Line** @@ -81,7 +81,7 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must - For App-V version 4.6, command-line parameters cannot be used during an upgrade and will be ignored. -   + 2. The following command-line example uses the setup.msi file to upgrade the App-V Client. You will need to use the correct client installer program depending on whether you are upgrading the App-V Desktop Client or the App-V Client for Remote Desktop Services (formerly Terminal Services). @@ -90,7 +90,7 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must **Important**   The quotation marks are required only when the value contains a space. For consistency, all instances in the preceding example are shown as having quotation marks. -   + **To upgrade the Application Virtualization Client for Remote Desktop Services** @@ -101,7 +101,7 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must **Note**   In App-V version 4.6 and later, in addition to using the command line to upgrade the client, you can also use a Remote Desktop session. No special parameters are required to start the Remote Desktop session. -   + 3. After the Client for Remote Desktop Services upgrade is complete, restart and log in to the RD Session Host. @@ -110,16 +110,16 @@ When upgrading to version 4.6 or a later version of the App-V Client, you must **Caution**   If the upgrade fails for any reason, you will need to restart the computer before attempting the upgrade again. -   + ## Related topics [Application Virtualization Deployment and Upgrade Considerations](application-virtualization-deployment-and-upgrade-considerations.md) -  + -  + diff --git a/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md b/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md index 17f40aed8e..3724881e5b 100644 --- a/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md +++ b/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md @@ -26,7 +26,7 @@ Use the following procedure to upgrade software components installed on all Appl - You can upgrade to Microsoft Application Virtualization (App-V) 4.5 only from Microsoft Application Virtualization (App-V) 4.1 or 4.1 SP1. App-V 4.0 and earlier must be uninstalled or upgraded to 4.1 or 4.1 SP1 before upgrading to App-V 4.5. -  + **To upgrade software components on Application Virtualization System computers** @@ -51,7 +51,7 @@ Use the following procedure to upgrade software components installed on all Appl When you want to restore a database with VSS, you must first stop the App-V Server Service on the Management Server. This should be done on every Management server if there is more than one server connected to the same database. -   + 9. On the first **Package Validation** page, read the content and then click **Next**. @@ -70,9 +70,9 @@ Use the following procedure to upgrade software components installed on all Appl [Application Virtualization Deployment and Upgrade Considerations](application-virtualization-deployment-and-upgrade-considerations.md) -  + -  + diff --git a/mdop/appv-v4/how-to-use-dynamic-suite-composition.md b/mdop/appv-v4/how-to-use-dynamic-suite-composition.md index 8a49422338..a92d326172 100644 --- a/mdop/appv-v4/how-to-use-dynamic-suite-composition.md +++ b/mdop/appv-v4/how-to-use-dynamic-suite-composition.md @@ -30,7 +30,7 @@ If you plan to make several primary applications dependent on a single middlewar **Important**   Package dependencies can be specified as mandatory for a primary application. If a secondary package is flagged as mandatory and it cannot be accessed for some reason during loading, the load of the secondary package will fail. Also, the primary application will fail when the user tries to start it. -  + You can use the following procedures to create a secondary package, for either a plug-in or a middleware component, and then you can use the final procedure to define the dependency in the OSD file of the secondary package. @@ -47,7 +47,7 @@ You can use the following procedures to create a secondary package, for either a **Important**   You must specify a new package root for the secondary package. -   + 5. Start the sequencer monitoring phase. @@ -62,7 +62,7 @@ You can use the following procedures to create a secondary package, for either a **Note**   To assist with management of secondary packages, it is recommended that the package name include the term “Secondary package” to emphasize that this is a package that will not function as a stand-alone application—for example, **\[Plug In Name\] Secondary package**. -   + **To create a secondary package for middleware by using Dynamic Suite Composition** @@ -87,56 +87,56 @@ You can use the following procedures to create a secondary package, for either a **Note**   To assist with management of secondary packages, it is recommended that the package name include the term “Secondary package” to emphasize that this is a package that will not function as a stand-alone application—for example, **\[Middleware Name\] Secondary package**. -   + **To define the dependency in the primary package** -1. On the server, open the OSD file of the secondary package for editing. (It is a good idea to use an XML editor to make changes to the OSD file; however, you can use Notepad as an alternative.) +1. On the server, open the OSD file of the secondary package for editing. (It is a good idea to use an XML editor to make changes to the OSD file; however, you can use Notepad as an alternative.) -2. Copy the **CODEBASE HREF** line from that file. +2. Copy the **CODEBASE HREF** line from that file. -3. Open the OSD file of the primary package for editing. +3. Open the OSD file of the primary package for editing. -4. Insert the **<DEPENDENCIES>**tag after the close of **</ENVLIST>** tag at the end of the **<VIRTUALENV>** section just before the **</VIRTUALENV>** tag. +4. Insert the <DEPENDENCIES>tag after the close of **</ENVLIST>** tag at the end of the **<VIRTUALENV>** section just before the **</VIRTUALENV>** tag. -5. Paste the **CODEBASE HREF** line from the secondary package after the **<DEPENDENCIES>** tag you just created. +5. Paste the **CODEBASE HREF** line from the secondary package after the **<DEPENDENCIES>** tag you just created. -6. If the secondary package is a mandatory package, which means that it must be started before the primary package is started, add the **MANDATORY=”TRUE”** property inside the **CODEBASE** tag. If it is not mandatory, the property can be omitted. +6. If the secondary package is a mandatory package, which means that it must be started before the primary package is started, add the **MANDATORY=”TRUE”** property inside the **CODEBASE** tag. If it is not mandatory, the property can be omitted. -7. Close the **<DEPENDENCIES>** tag by inserting the following: +7. Close the **<DEPENDENCIES>** tag by inserting the following: - **</DEPENDENCIES>** + **</DEPENDENCIES>** -8. Review the changes that you made to the OSD file, and then save and close the file. The following example shows how the added section should appear. The tag values shown here are for example only. +8. Review the changes that you made to the OSD file, and then save and close the file. The following example shows how the added section should appear. The tag values shown here are for example only. - **<VIRTUALENV>** + **<VIRTUALENV>** -      **<ENVLIST>** + **<ENVLIST>** - **…** + **…** -      **</ENVLIST>** + **</ENVLIST>** -      **<DEPENDENCIES>** + **<DEPENDENCIES>** -           **<CODEBASE HREF="rtsp://virt\_apps/package.1/package.1.sft" GUID="D54C80FA-9DFF-459D-AA33-DD852C9FBFBA" SYSGUARDFILE="package.1\\osguard.cp"/>** + **<CODEBASE HREF="rtsp://virt\_apps/package.1/package.1.sft" GUID="D54C80FA-9DFF-459D-AA33-DD852C9FBFBA" SYSGUARDFILE="package.1\\osguard.cp"/>** -           **<CODEBASE HREF="rtsp://sample\_apps/package.2/sample.sft" GUID="D54C80FA-9DFF-459D-AA33-DD852C9FBFBA" SYSGUARDFILE="package.2\\osguard.cp" MANDATORY="TRUE" />** + **<CODEBASE HREF="rtsp://sample\_apps/package.2/sample.sft" GUID="D54C80FA-9DFF-459D-AA33-DD852C9FBFBA" SYSGUARDFILE="package.2\\osguard.cp" MANDATORY="TRUE" />** -      **</DEPENDENCIES>** + **</DEPENDENCIES>** - **</VIRTUALENV>** + **</VIRTUALENV>** -9. If the secondary package has any entries in the **<ENVLIST>** section of the OSD file, you must copy those entries to the same section in the primary package. +9. If the secondary package has any entries in the **<ENVLIST>** section of the OSD file, you must copy those entries to the same section in the primary package. ## Related topics [How to Create or Upgrade Virtual Applications Using the App-V Sequencer](how-to-create-or-upgrade-virtual-applications-using--the-app-v-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md b/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md index b63b75ced7..5c1a2d616f 100644 --- a/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md +++ b/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md @@ -24,7 +24,7 @@ More than one package is deleted if necessary. Packages that are locked are not **Note**   To ensure that the cache has sufficient space allocated for all packages that might be deployed, use the **Use free disk space threshold** setting when you configure the client so that the cache can grow as needed. Alternatively, determine in advance how much disk space will be needed for the App-V cache, and at installation time, set the cache size accordingly. -  + The cache space management feature is controlled by the UnloadLeastRecentlyUsed registry value. A value of 1 enables the feature, and a value of 0 (zero) disables it. @@ -43,16 +43,16 @@ The cache space management feature is controlled by the UnloadLeastRecentlyUsed **Caution**   The maximum value for this registry key is 0x00011111. Larger values will prevent the correct operation of the cache space management feature. -   + ## Related topics [How to Configure the App-V Client Registry Settings by Using the Command Line](how-to-configure-the-app-v-client-registry-settings-by-using-the-command-line.md) -  + -  + diff --git a/mdop/appv-v4/how-to-use-the-differential-sft-file.md b/mdop/appv-v4/how-to-use-the-differential-sft-file.md index 2a7af0419e..ee2cad8104 100644 --- a/mdop/appv-v4/how-to-use-the-differential-sft-file.md +++ b/mdop/appv-v4/how-to-use-the-differential-sft-file.md @@ -28,7 +28,7 @@ For more information about upgrading a package, see “How to Upgrade an Existin **Note**   As a prerequisite, all user computers being targeted by the ESD must have the V1.sft file fully loaded into their local cache, and file streaming must be enabled on all computers. -  + **To use the Differential SFT file** @@ -55,16 +55,16 @@ As a prerequisite, all user computers being targeted by the ESD must have the V1 - The **Generate Microsoft Windows Installer (MSI) Package** capability in the Sequencer cannot be used with the Differential SFT file. -  + ## Related topics [How to Create or Upgrade Virtual Applications Using the App-V Sequencer](how-to-create-or-upgrade-virtual-applications-using--the-app-v-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md b/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md index 612f70f5ea..2600e02b87 100644 --- a/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md +++ b/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md @@ -22,7 +22,7 @@ If you plan to be disconnected from the network for an extended period of time, **Note**   By default, **Work Offline** is disabled for the Client for Remote Desktop Services (formerly Terminal Services). Your system administrator must change your user permissions to allow you to use this setting on a Client for Remote Desktop Services. -  + **To work offline** @@ -37,9 +37,9 @@ By default, **Work Offline** is disabled for the Client for Remote Desktop Servi [How to Use the Desktop Notification Area for Application Virtualization Client Management](how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md) -  + -  + diff --git a/mdop/appv-v4/improving-security-during-app-v-sequencing.md b/mdop/appv-v4/improving-security-during-app-v-sequencing.md index 915cf67c11..25d280c294 100644 --- a/mdop/appv-v4/improving-security-during-app-v-sequencing.md +++ b/mdop/appv-v4/improving-security-during-app-v-sequencing.md @@ -34,13 +34,13 @@ This feature also enables the sequencing engineer to capture the security settin **Important**   Although the sequencer captures the NTFS ACLs while monitoring the installation phase of sequencing, it does not capture the ACLs for the registry. Users have full access to all registry keys for virtual applications except for services. However, if a user modifies the registry of a virtual application, that change is stored in a specific location (`uservol_sftfs_v1.pkg`) and won’t affect other users. -  + During the installation phase, a sequencing engineer can modify the default permissions of the files if necessary. After the sequencing process is complete, but before saving the package, the sequencing engineer can then choose to enforce security descriptors that were captured during the installation phase. It is a best practice to enforce security descriptors if no other solution allows the application to run properly once virtualized. -  + -  + diff --git a/mdop/appv-v4/installation-files-page.md b/mdop/appv-v4/installation-files-page.md index b127b488e8..01386f3df3 100644 --- a/mdop/appv-v4/installation-files-page.md +++ b/mdop/appv-v4/installation-files-page.md @@ -30,7 +30,7 @@ Click **Browse** to specify the installation files that have been installed loca **Note**   The default installation location you provide depends on the following conditions: -  + - The package root specified when the package was originally created. @@ -49,9 +49,9 @@ When you create a package using a package accelerator, each file in the package, [Create Package Accelerator Wizard (AppV 4.6 SP1)](create-package-accelerator-wizard--appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md b/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md index 3dd1bfce4a..a57d3fd5ef 100644 --- a/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md +++ b/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md @@ -22,7 +22,7 @@ The topics in this section provide information for installing an enhanced securi **Note**   Installing or configuring an App-V Management or Streaming Server to use enhanced security (for example, Transport Layer Security, or TLS) requires that an X.509 V3 certificate has been provisioned to the App-V server. -  + When you prepare to install or configure a secure Management or Streaming Server, consider the following technical requirements: @@ -35,7 +35,7 @@ When you prepare to install or configure a secure Management or Streaming Server **Note**   If you are using App-V in a Network Load Balancing cluster, you must configure the certificate with Subject Alternate Names (SANs) to support RTSPS. For information about configuring the certification authority (CA) and creating certificates with SANs, see . -   + - The client and the server need to trust the root CA—The CA issuing the certificate to the App-V server must by trusted by the client connecting to the server. If not, the client ends the connection. @@ -53,9 +53,9 @@ Provides procedures you can use to modify keys in Windows Server 2003 and Windo [Configuring Certificates to Support App-V Management Server or Streaming Server](configuring-certificates-to-support-app-v-management-server-or-streaming-server.md) Provides information about configuring certificates for the App-V Management or Streaming Servers, including information about configuring certificates for Network Load Balancing environments. -  + -  + diff --git a/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md b/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md index 81e70170d2..08a864e1ad 100644 --- a/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md +++ b/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md @@ -42,7 +42,7 @@ Place the following servers in the perimeter network: **Note**   It is a best practice to place the Management Server and IIS server on separate computers. -  + Place the following servers in the internal network: @@ -80,7 +80,7 @@ The following tables list the traffic requirements for communication from the In -  + @@ -117,11 +117,11 @@ The following tables list the traffic requirements for communication from the In
    -  + -  + -  + diff --git a/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md b/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md index d8b0f1880b..fb9336a35c 100644 --- a/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md +++ b/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md @@ -22,7 +22,7 @@ This Microsoft Application Virtualization (App-V) security guide provides instru **Note**   This documentation does not provide guidance for choosing the specific security options. That information is provided in the App-V Security Best Practices white paper available at . -  + As an App-V administrator using this guide, you should be familiar with the following security-related technologies: @@ -48,7 +48,7 @@ For more information about App-V infrastructure models, see the following docume - [Infrastructure Planning and Design Guide Series](https://go.microsoft.com/fwlink/?LinkId=151986) -  + These models utilize some but possibly not all of the App-V components depicted in the following illustration. @@ -75,9 +75,9 @@ The App-V Sequencer monitors and captures the installation of applications and c Application Virtualization (App-V) Client The App-V Client is installed on the App-V Desktop Client computer or on the App-V Terminal Services Client computer. It provides the virtual environment for the virtual application packages. The App-V Client manages the package streaming to the cache, virtual application publishing refresh, and interaction with the Application Virtualization Servers. -  + -  + diff --git a/mdop/appv-v4/load-app.md b/mdop/appv-v4/load-app.md index df4cfdf568..e76ab3bbfd 100644 --- a/mdop/appv-v4/load-app.md +++ b/mdop/appv-v4/load-app.md @@ -22,7 +22,7 @@ Loads the specified application and all other applications in the package into t **Note**   The **LOAD APP** command starts the load process and a progress bar is displayed in the Desktop Notification Area. The command exits immediately after starting this process, so any load errors are displayed in the same location. Use the **LOAD PACKAGE** command if you want to start the load process from the command line without using the Desktop Notification Area. -  + `SFTMIME LOAD APP:application [/LOG log-pathname | /GUI]` @@ -53,7 +53,7 @@ The **LOAD APP** command starts the load process and a progress bar is displayed -  + For version 4.6, the following option has been added. @@ -70,16 +70,16 @@ For version 4.6, the following option has been added. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/load-package.md b/mdop/appv-v4/load-package.md index 38af545eee..a5b0ab5872 100644 --- a/mdop/appv-v4/load-package.md +++ b/mdop/appv-v4/load-package.md @@ -56,7 +56,7 @@ Loads the specified package into the file system cache. -  + For version 4.6, the following option has been added. @@ -73,23 +73,23 @@ For version 4.6, the following option has been added. -  + **Note**   If no SFTPATH is specified, the client will load the package by using the path it has been configured to use, based on the OSD file, the ApplicationSourceRoot registry key value, or the OverrideURL setting. The **LOAD PACKAGE** command performs a synchronous load and will not be complete until the package is fully loaded or until it encounters an error condition. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md index d45a94db3b..91f7d0618e 100644 --- a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md +++ b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md @@ -68,7 +68,7 @@ The remainder of this document will address the following specific features: **Note**   This section is divided into two parts: (1) features in all versions of App-V and (2) features in App-V 4.6 SP1 and later. -  + ### Microsoft Error Reporting @@ -217,9 +217,9 @@ No information is sent to Microsoft through customers’ use of the Application [About Microsoft Application Virtualization 4.6 SP2](about-microsoft-application-virtualization-46-sp2.md) -  + -  + diff --git a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md index ff7b325be9..1e8882dde6 100644 --- a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md +++ b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Important**   Read these Release Notes thoroughly before you install the Application Virtualization Management System. These Release Notes contain information that you need to successfully install the Application Virtualization Management System. These Release Notes contain information that is not available in the product documentation. If there is a discrepancy between these Release Notes and other Application Virtualization Management System documentation, the latest change should be considered authoritative. -  + For updated information about known issues, please visit the Microsoft TechNet Library at . @@ -75,16 +75,16 @@ When this has been completed, install the App-V 4.5 SP1 client by using setup.ms When installing Microsoft Application Error Reporting, use the following command if you are installing or upgrading to the App-V 4.5 SP1 Desktop client: -    msiexec /i dw20shared.msi APPGUID={93468B43-C19D-44F9-8BCC-114076DB0443}  allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus + msiexec /i dw20shared.msi APPGUID={93468B43-C19D-44F9-8BCC-114076DB0443}  allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus Alternatively, if you are installing or upgrading to the App-V 4.5 SP1 Client for Remote Desktop Services (formerly Terminal Services), use the following command: -    msiexec /i dw20shared.msi APPGUID={0042AD3C-99A4-4E58-B5F0-744D5AD96E1C} allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus + msiexec /i dw20shared.msi APPGUID={0042AD3C-99A4-4E58-B5F0-744D5AD96E1C} allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus **Note**   The APPGUID parameter references the product code of the App-V client that you install or upgrade. The product code is unique for each setup.msi. You can use the Orca database editor or a similar tool to examine Windows Installer files and determine the product code. This step is required for all installations or upgrades to App-V 4.5 SP1. -  + ### Improving performance when sequencing the .NET Framework @@ -211,9 +211,9 @@ Microsoft, Active Directory, ActiveSync, MS-DOS, Windows, Windows Server, and W All other trademarks are property of their respective owners. -  + -  + diff --git a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md index d706463499..34494bd042 100644 --- a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md +++ b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Important**   Read these Release Notes thoroughly before you install the Application Virtualization Management System. These Release Notes contain information that you need to successfully install the Application Virtualization Management System. This document contains information that is not available in the product documentation. If there is a discrepancy between these Release Notes and other Application Virtualization Management System documentation, the latest change should be considered authoritative. These Release Notes supersede the content included with this product. -  + For updated information about known issues, please visit the Microsoft TechNet Library at . @@ -36,7 +36,7 @@ These Release Notes have been updated to reflect the changes introduced with Mic **Important**   Running App-V 4.5 CU1 on any version of Windows 7 or Windows Server 2008 R2 in a live operating environment is not supported. -   + - Improved support for sequencing the .NET Framework: App-V 4.5 CU1 addresses previous issues with sequencing the .NET Framework 3.5 and earlier on Windows XP (SP2 or later). For more information about the new capabilities, see the TechNet article at . @@ -74,16 +74,16 @@ When this has been completed, install the App-V 4.5 CU1 client by using setup.m When installing Microsoft Application Error Reporting, use the following command if you are installing or upgrading to the App-V 4.5 CU1 Desktop client: -    msiexec /i dw20shared.msi APPGUID={FE495DBC-6D42-4698-B61F-86E655E0796D}  allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus + msiexec /i dw20shared.msi APPGUID={FE495DBC-6D42-4698-B61F-86E655E0796D}  allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus Alternatively, if you are installing or upgrading to the App-V 4.5 CU1 Terminal Services client, use the following command: -    msiexec /i dw20shared.msi APPGUID={8A97C241-D92A-47DC-B360-E716C1AAA929} allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus + msiexec /i dw20shared.msi APPGUID={8A97C241-D92A-47DC-B360-E716C1AAA929} allusers=1 reboot=suppress REINSTALL=all REINSTALLMODE=vomus **Note**   The APPGUID parameter references the product code of the App-V client that you install or upgrade to. The product code is unique for each setup.msi. You can use the Orca database editor or similar tool to examine Windows Installer files and determine the product code. This step is required for all installs or upgrades to App-V 4.5 CU1. -  + ### Some applications might fail to install during the monitoring phase when sequencing on Windows 7 Beta @@ -91,12 +91,12 @@ When sequencing on Windows 7 Beta or on a computer with Windows Installer 5.0, WORKAROUND   You must manually grant the Everyone group Full Control permissions to the following registry key: -    HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\SystemGuard + HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\SystemGuard **Important**   You must use the **Advanced** button to set the “Include inheritable permissions from this object’s parent” option. -  + ### Unable to save packages when sequencing on Windows 7 Beta @@ -235,7 +235,7 @@ WORKAROUND   After installing the application on the sequencing computer, whi **Important**   This issue has been fixed in Microsoft Application Virtualization 4.5 Cumulative Update 1. -  + ### When the server installer is run in silent mode, it does not correctly check for MSXML6 @@ -262,7 +262,7 @@ When using Symantec Endpoint Protection with the Application and Device Control **Important**   This issue has been fixed in Microsoft Application Virtualization 4.5 Cumulative Update 1. -  + ## Release Notes Copyright Information @@ -277,9 +277,9 @@ Microsoft, MS-DOS, Windows, Windows Server, Windows Vista, Active Directory, an The names of actual companies and products mentioned herein may be the trademarks of their respective owners. -  + -  + diff --git a/mdop/appv-v4/package-name-page---learn-more-.md b/mdop/appv-v4/package-name-page---learn-more-.md index 9c4ecbc616..2ec6a13682 100644 --- a/mdop/appv-v4/package-name-page---learn-more-.md +++ b/mdop/appv-v4/package-name-page---learn-more-.md @@ -22,7 +22,7 @@ Use the **Package Name** page to specify a name for the virtual application pack **Note**   Editing the primary virtual application directory is an advanced task. -  + This page contains the following elements: @@ -37,9 +37,9 @@ Select this option to change the location of where the virtual application will [Create New Package Wizard (AppV 4.6 SP1)](create-new-package-wizard---appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/planning-for-client-security.md b/mdop/appv-v4/planning-for-client-security.md index dcf7f1cf5f..6050d3895b 100644 --- a/mdop/appv-v4/planning-for-client-security.md +++ b/mdop/appv-v4/planning-for-client-security.md @@ -38,9 +38,9 @@ By default, the installation of the client registers file type associations (FTA Starting with App-V version 4.6, the file type association is no longer created for OSD files during a new installation of the client, although the existing settings will be maintained during an upgrade from version 4.2 or 4.5 of the App-V client. If for any reason it is essential to create the file type association, you can create the following registry keys and set their values as shown: -    Create HKEY\_CLASSES\_ROOT\\.osd with a default value of SoftGrid.osd.File + Create HKEY\_CLASSES\_ROOT\\.osd with a default value of SoftGrid.osd.File -    Under HKEY\_LOCAL\_MACHINE\\software\\classes\\Softgrid.osd.file, create a string value named AppUserModelID with a data value of Microsoft.AppV.Client.Tray + Under HKEY\_LOCAL\_MACHINE\\software\\classes\\Softgrid.osd.file, create a string value named AppUserModelID with a data value of Microsoft.AppV.Client.Tray ### Authorization @@ -66,7 +66,7 @@ When the client communicates with the server to perform a publishing refresh, it **Note**   If you are using IIS to publish the ICO and OSD files, configure a MIME type for OSD=TXT; otherwise, IIS will refuse to serve the ICO and OSD files to clients. -  + ### Package Streaming @@ -75,7 +75,7 @@ When a user launches an application for the first time, or if auto-loading param **Note**   If you are using IIS to publish packages (SFT files), configure a MIME type for SFT=Binary; otherwise, IIS will refuse to serve the SFT files to clients. -  + ### Roaming Profiles and Folder Redirection @@ -99,9 +99,9 @@ If a user is home-based and the computer is not joined to the company domain, Ap [Planning for Security and Protection](planning-for-security-and-protection.md) -  + -  + diff --git a/mdop/appv-v4/planning-for-migration-from-previous-versions.md b/mdop/appv-v4/planning-for-migration-from-previous-versions.md index 2e51199471..c999a32a70 100644 --- a/mdop/appv-v4/planning-for-migration-from-previous-versions.md +++ b/mdop/appv-v4/planning-for-migration-from-previous-versions.md @@ -28,7 +28,7 @@ To help ensure a successful migration, the Application Virtualization system com **Note**   If you have more than one server sharing access to the Application Virtualization database, all those servers must be taken offline while the database is being upgraded. You should follow your normal business practices for the database upgrade, but it is highly advisable that you test the database upgrade by using a backup copy of the database first on a test server. Then, you should select one of the servers for the first upgrade, which will upgrade the database schema. After the production database has been successfully upgraded, you can upgrade the other servers. -   + 3. **Microsoft Application Virtualization Management Web Service.** This step applies only if the Management Web Service is on a separate server, which would require that you run the server installer program on that separate server to upgrade the Web service. Otherwise, the previous server upgrade step will automatically upgrade the Management Web Service. @@ -87,14 +87,14 @@ You can deploy packages created in previous versions of App-V to App-V 4.6 Clie -  + To run a newly created 32-bit package, you must sequence the application on a computer running a 32-bit operating system with the App-V 4.6 Sequencer installed. After you have sequenced the application, in the Sequencer console, select the **Deployment** tab and then specify the appropriate operating system and chip architecture as required. **Important**   Applications sequenced on a computer running a 64-bit operating system must be deployed to computers running a 64-bit operating system. New 32-bit packages created by using the App-V 4.6 Sequencer will not run on computers running the App-V 4.5 Client. -  + To run new 64-bit packages on the App-V 4.6 Client, you must sequence the application on a computer running the App-V 4.6 Sequencer and that is running a 64-bit operating system. After you have sequenced the application, in the Sequencer console, select the **Deployment** tab and then specify the appropriate operating system and chip architecture as required. @@ -179,7 +179,7 @@ The following table lists which client versions will run packages created by usi -  + ¹Applies to all versions of the App-V 4.5 Client, including App-V 4.5, App-V 4.5 CU1 and App-V 4.5 SP1. @@ -195,7 +195,7 @@ If the App-V 4.2 Client has already been upgraded to 4.5, it is possible to us "GlobalDataDirectory"="C:\\\\Documents and Settings\\\\All Users\\\\Documents\\\\" (a globally writeable location) -  + Windows Installer files generated by the App-V 4.5 Sequencer display the error message "This package requires Microsoft Application Virtualization Client 4.5 or later" when you try to run them on an App-V 4.6 Client. Open the old package with either the App-V 4.5 SP1 Sequencer or the App-V 4.6 Sequencer and generate a new .msi for the package. @@ -208,9 +208,9 @@ For additional information about upgrading from previous versions, see [Upgradin [Planning for Application Virtualization System Deployment](planning-for-application-virtualization-system-deployment.md) -  + -  + diff --git a/mdop/appv-v4/planning-for-sequencer-security.md b/mdop/appv-v4/planning-for-sequencer-security.md index 0c70b2b38e..d3ad4052ec 100644 --- a/mdop/appv-v4/planning-for-sequencer-security.md +++ b/mdop/appv-v4/planning-for-sequencer-security.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Incorporate recommended implementation practices as early as possible when configuring Application Virtualization (App-V) so that your Sequencer implementation is functional and more secure. If you have already configured the Sequencer, use the following best-practice guidelines to revisit your design decisions and analyze them from a security perspective. -**Important**   +**Important** The App-V Sequencer collects and deploys all application information recorded on the computer running the sequencer. You should ensure that all users accessing the computer running the Sequencer have administrative credentials. Users with user account credentials should not have access to control package contents and package files. If you are sequencing on a computer running Remote Desktop Services (formerly Terminal Services), make sure it is a computer that is dedicated to sequencing and that users with user account credentials are not connected to it during sequencing. -  + ## Sequencer Security Best Practices @@ -31,19 +31,21 @@ Consider the following scenarios and the associated best practices when implemen - **Virus scanning on the computer running the Sequencer**—It is recommended that you scan the computer running the Sequencer for viruses and then disable all antivirus and malware detection software on the computer running the Sequencer during the sequencing process. This will speed the sequencing process and prevent the antivirus and anti-malware software components from interfering with the sequencing process. Next install the sequenced package on a computer not running the Sequencer, and after successful installation, scan that computer for viruses. If viruses are found, the manufacturer of the software should be contacted to inform them of the infected source files and request an updated installation source without viruses. Optionally, the Sequencer could be scanned after the installation phase and if a virus is found, the software manufacturer should be contacted as mentioned above. - **Note**   + **Note** If a virus is detected in an application, the application should not be deployed to target computers. -   + - **Capturing access control lists (ACLs) on NTFS files**—The App-V Sequencer captures NTFS file system permissions for the files that are monitored during the installation of the product. This capability allows you to more accurately replicate the intended behavior of the application, as if it were installed locally and not virtualized. In some scenarios, an application might store information that users were not intended to access within the application files. For example, an application could store credentials information in a file inside of the application. If ACLs are not enforced on the package, a user could potentially view and then use this information outside of the application. - **Note**   + **Note** You should not sequence applications that store unencrypted security-specific information, such as passwords, and so on. -   - During the installation phase, you can modify the default permissions of the files if necessary. After completion of the sequencing process, but before saving the package, you can choose whether to enforce security descriptors that were captured during the installation of the application. By default, App-V will enforce the security descriptors specified during the installation of the application. If you turn off security descriptor enforcement, you should test the application to ensure the removal of associated Access Control Lists (ACL) will not cause the application to perform unexpectedly. + +~~~ +During the installation phase, you can modify the default permissions of the files if necessary. After completion of the sequencing process, but before saving the package, you can choose whether to enforce security descriptors that were captured during the installation of the application. By default, App-V will enforce the security descriptors specified during the installation of the application. If you turn off security descriptor enforcement, you should test the application to ensure the removal of associated Access Control Lists (ACL) will not cause the application to perform unexpectedly. +~~~ - **Sequencer doesn’t capture registry ACLs**—Although the Sequencer captures the NTFS file system ACLs during the installation phase of sequencing, it does not capture the ACLs for the registry. Users will have full access to all registry keys for virtual applications except for services. However, if a user modifies the registry of a virtual application, the change will be stored in a specific store (**uservol\_sftfs\_v1.pkg**) and will not affect other users. @@ -58,9 +60,9 @@ Consider the following scenarios and the associated best practices when implemen [Planning for Security and Protection](planning-for-security-and-protection.md) -  - -  + + + diff --git a/mdop/appv-v4/planning-for-server-security.md b/mdop/appv-v4/planning-for-server-security.md index 691db969f7..7f51cc0fc6 100644 --- a/mdop/appv-v4/planning-for-server-security.md +++ b/mdop/appv-v4/planning-for-server-security.md @@ -71,7 +71,7 @@ Installing or configuring an App-V Management Server or Streaming Server to use **Note**   If you use App-V in a network load balanced cluster, the certificate must be configured with *Subject Alternate Names* (SANs) to support RTSPS. For information about configuring the certification authority (CA) and creating certificates with SANs, see (https://go.microsoft.com/fwlink/?LinkId=133228). -   + - The CA issuing the certificate to the App-V server must be trusted by the client connecting to the server. Otherwise, the client terminates the connection. @@ -80,7 +80,7 @@ Installing or configuring an App-V Management Server or Streaming Server to use **Note**   For information about configuring a public key infrastructure (PKI), see (https://go.microsoft.com/fwlink/?LinkId=133229). -   + ### Configuring IIS Servers with HTTPS @@ -89,7 +89,7 @@ App-V might use IIS servers in certain infrastructure configurations. For more i **Note**   If you are using IIS to publish the ICO and OSD files, configure a MIME type for OSD=TXT; otherwise, IIS will refuse to serve the ICO and OSD files to clients. -  + ### Application-Level Security @@ -115,9 +115,9 @@ For the infrastructure to operate correctly, separating the App-V Management Con [Planning for Security and Protection](planning-for-security-and-protection.md) -  + -  + diff --git a/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md b/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md index d99739b85f..fe295dc2f6 100644 --- a/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md +++ b/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md @@ -28,7 +28,7 @@ For step-by-step information about installing the Sequencer, see [How to Install **Important**   The entire sequencing process plan should be reviewed and approved by your corporate security team. Sequencer operations would usually be kept separate from the production environment in a lab. This can be as simple or as comprehensive as necessary, based on your business requirements. The sequencing computers will need connectivity to the corporate network to copy finished packages over to the production servers. However, because they are typically operated without antivirus protection, they must not be on the corporate network unprotected—for example, you might be able to operate behind a firewall or on an isolated network segment. Using Virtual Machines configured to share an isolated virtual network might also be an acceptable approach. Follow your corporate security policies to safely address this situation. -  + Key steps for planning the sequencing process include the following: @@ -41,7 +41,7 @@ Key steps for planning the sequencing process include the following: **Important**   Running the App-V sequencer in Safe Mode is not supported. -   + - Verify that you understand the sequenced application’s operating environment, including integration elements such as Microsoft Office or the Java Runtime Environment, because this will often determine whether anything has to be installed on the sequencing computer prior to sequencing the application. @@ -64,9 +64,9 @@ Key steps for planning the sequencing process include the following: [Security and Protection Overview](security-and-protection-overview.md) -  + -  + diff --git a/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md b/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md index 77e89fcbc7..15a00e586c 100644 --- a/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md +++ b/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md @@ -24,7 +24,7 @@ The supported options include using a file server, an IIS server, or an Applicat **Note**   The active upgrade feature enables a new version of an application to be added to an App-V Management Server or Streaming Server without affecting users currently running the application. The App-V clients will automatically receive the latest version of the application from the App-V Management Server or Streaming Server the next time the user starts the application. Use of the RTSP(S) protocol is required for this feature. -  + @@ -53,7 +53,7 @@ The active upgrade feature enables a new version of an application to be added t - + @@ -69,7 +69,7 @@ The active upgrade feature enables a new version of an application to be added t
  • Need to manage IIS

  • No active upgrade

  • - + @@ -83,7 +83,7 @@ The active upgrade feature enables a new version of an application to be added t
  • Dual infrastructure

  • Server administration requirement

  • - + @@ -97,12 +97,12 @@ The active upgrade feature enables a new version of an application to be added t
  • Dual infrastructure

  • Server administration requirement

  • - +
    • No active upgrade

    [How to Configure the File Server](how-to-configure-the-file-server.md)

    How to Configure the File Server

    IIS server

    [How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md)

    How to Configure the Server for IIS

    Application Virtualization Streaming Server

    [How to Configure the Application Virtualization Streaming Servers](how-to-configure-the-application-virtualization-streaming-servers.md)

    How to Configure the Application Virtualization Streaming Servers

    Application Virtualization Management Server

    [How to Configure the Application Virtualization Management Servers](how-to-configure-the-application-virtualization-management-servers.md)

    How to Configure the Application Virtualization Management Servers

    -  + ## Related topics @@ -113,9 +113,9 @@ The active upgrade feature enables a new version of an application to be added t [Publishing Virtual Applications Using Application Virtualization Management Servers](publishing-virtual-applications-using-application-virtualization-management-servers.md) -  + -  + diff --git a/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md b/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md index 5e5f3b172b..a166551ed1 100644 --- a/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md +++ b/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md @@ -24,7 +24,7 @@ The Application Virtualization Streaming Server provides support for the active **Note**   Access to the applications is controlled by means of Security Groups in Active Directory Domain Services, so you will need to plan a process for setting up a security group for each virtual application and for managing which users are added to each group. The Application Virtualization system administrator configures each streaming server to use these Active Directory groups by applying ACLs to the application directories under the CONTENT share, which controls access to the packages based on Active Directory group membership. -  + The characteristics of the available streaming options are summarized in the following table. @@ -55,7 +55,7 @@ The characteristics of the available streaming options are summarized in the fol
    • No active upgrade

    -

    [How to Configure the File Server](how-to-configure-the-file-server.md)

    +

    How to Configure the File Server

    IIS server

    @@ -71,7 +71,7 @@ The characteristics of the available streaming options are summarized in the fol
  • Need to manage IIS

  • No active upgrade

-

[How to Configure the Server for IIS](how-to-configure-the-server-for-iis.md)

+

How to Configure the Server for IIS

Application Virtualization Streaming Server

@@ -85,12 +85,12 @@ The characteristics of the available streaming options are summarized in the fol
  • Dual infrastructure

  • Server administration requirement

  • -

    [How to Configure the Application Virtualization Management Servers](how-to-configure-the-application-virtualization-management-servers.md)

    +

    How to Configure the Application Virtualization Management Servers

    -  + ## Related topics @@ -101,9 +101,9 @@ The characteristics of the available streaming options are summarized in the fol [Publishing Virtual Applications Using Electronic Software Distribution](publishing-virtual-applications-using-electronic-software-distribution.md) -  + -  + diff --git a/mdop/appv-v4/publish-package.md b/mdop/appv-v4/publish-package.md index 2244ea2b8d..0ddf0d20e8 100644 --- a/mdop/appv-v4/publish-package.md +++ b/mdop/appv-v4/publish-package.md @@ -60,7 +60,7 @@ Publishes the contents of an entire package. -  + For version 4.6, the following option has been added. @@ -77,7 +77,7 @@ For version 4.6, the following option has been added. -  + **Important**   The package must already have been added to the Application Virtualization Client, and the manifest file is required. @@ -90,16 +90,16 @@ Publishing with the **GLOBAL** parameter adds the file types and shortcuts liste If the package is not global before the call and the **GLOBAL** parameter is used, the package is made global and available to all users. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/publishing-servers-results-pane-columns.md b/mdop/appv-v4/publishing-servers-results-pane-columns.md index 21a25b5593..ef1b0fcca5 100644 --- a/mdop/appv-v4/publishing-servers-results-pane-columns.md +++ b/mdop/appv-v4/publishing-servers-results-pane-columns.md @@ -22,7 +22,7 @@ The **Publishing Servers Results** pane can display a variety of columns. **Name **Note**   You can add or remove a column simply by right-clicking in the **Results** pane, selecting **View**, then selecting **Add/Remove Columns**. -  + The list can be sorted by any of the columns. Columns that contain dates and times are sorted in chronological order, not alphabetical. For columns that contain a mix of dates and times and text (for example, **Next Refresh**), dates and times are considered to come before any other text. @@ -65,9 +65,9 @@ The last time a refresh happened from this server for any user. [Publishing Servers Results Pane](publishing-servers-results-pane.md) -  + -  + diff --git a/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md b/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md index 3e9819103c..8b19e64174 100644 --- a/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md +++ b/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md @@ -22,14 +22,14 @@ In an Application Virtualization Server-based deployment, virtual application pa **Note**   The CONTENT share should be located on the server’s attached disk storage. Using a network storage device such as a SAN or a DFS share should be considered carefully because of the network impact. -  + Applications are provisioned to Active Directory groups. Typically, the Application Virtualization administrator will create Active Directory groups for each virtual application to be published and then add the appropriate users to those groups. When the users log on to their workstations, the Application Virtualization Client, by default, performs a publishing refresh using the credentials of the logged on user. The user can then start applications from wherever the shortcuts have been placed. The Application Virtualization administrator determines where and how many shortcuts are located on the client system during the sequencing of the application. **Note**   A *publishing refresh* is a call to the Application Virtualization Server that is defined on the Application Virtualization Client, to determine which virtual application shortcuts are sent to the client for use by the end user. -  + ## Related topics @@ -42,9 +42,9 @@ A *publishing refresh* is a call to the Application Virtualization Server that i [Planning Your Streaming Solution in an Application Virtualization Server-Based Implementation](planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md) -  + -  + diff --git a/mdop/appv-v4/query-obj.md b/mdop/appv-v4/query-obj.md index 78ce46407b..21de4d2dc6 100644 --- a/mdop/appv-v4/query-obj.md +++ b/mdop/appv-v4/query-obj.md @@ -68,7 +68,7 @@ Returns a tab-delimited list of current applications, packages, file type associ -  + For version 4.6, the following option has been added. @@ -85,7 +85,7 @@ For version 4.6, the following option has been added. -  + **Note**   In version 4.6, a new column has been added to the output of SFTMIME QUERY OBJ:APP \[/GLOBAL\]. The last column of the output is a numeric value that indicates whether an application is published or not. @@ -96,7 +96,7 @@ PUBLISHED=0 means the application has not been published or it is no longer publ If you use the /GLOBAL parameter, the PUBLISHED state will be 1 for applications that were published globally and 0 for those applications that were published under user contexts. Without the /GLOBAL parameter, a PUBLISHED state of 1 is returned for applications published in the context of the user running the command, and a state of 0 is returned for those applications that are published globally. -  + The SFTMIME QUERY OBJ command can be used to query for information on all of the objects shown above—applications, packages, file type associations, and servers. To show how you might use the SFTMIME QUERY OBJ command in your normal operations tasks, the following example demonstrates the process you would follow if you wanted to set the OVERRIDEURL parameter value for a specific package to specify a new path to the package content.  @@ -125,16 +125,16 @@ For version 4.6 SP2, the following option has been added. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/sequencer-command-line-error-codes.md b/mdop/appv-v4/sequencer-command-line-error-codes.md index 601a845085..a328fb293d 100644 --- a/mdop/appv-v4/sequencer-command-line-error-codes.md +++ b/mdop/appv-v4/sequencer-command-line-error-codes.md @@ -22,7 +22,7 @@ Use the following list to help identify errors that are related to sequencing ap **Note**   Multiple errors can occur during sequencing, and if this happens, the error code that is displayed might be the sum of two error codes. For example, if the */InstallPath* and */OutputFile* parameters are missing, the App-V Sequencer will return **96**—the sum of the two error codes. -  + 01 There is an unspecified error. @@ -91,9 +91,9 @@ The package name is not specified. [Sequencer Command-Line Parameters](sequencer-command-line-parameters.md) -  + -  + diff --git a/mdop/appv-v4/sequencer-hardware-and-software-requirements.md b/mdop/appv-v4/sequencer-hardware-and-software-requirements.md index 755e20033f..47e3854169 100644 --- a/mdop/appv-v4/sequencer-hardware-and-software-requirements.md +++ b/mdop/appv-v4/sequencer-hardware-and-software-requirements.md @@ -38,7 +38,7 @@ The following list outlines the recommended hardware requirements for running th **Note**   Sequencing requires heavy disk usage. A fast disk speed can decrease the sequencing time. -   + ### Software Requirements @@ -81,14 +81,14 @@ The following list outlines the supported operating systems for running the Sequ -  + ¹Supported for App-V 4.5 with SP1 or SP2, and App-V 4.6 only **Note**   The Application Virtualization (App-V) 4.6 Sequencer supports 32-bit and 64-bit versions of these operating systems. -  + You should configure computers running the Sequencer with the same applications that are installed on target computers. @@ -131,21 +131,21 @@ You should configure computers running the Sequencer with the same applications -  + **Note**   Application Virtualization (App-V) 4.6 for Remote Desktop Services supports 32-bit and 64-bit versions of these operating systems. -  + ## Related topics [Application Virtualization Sequencer Overview](application-virtualization-sequencer-overview.md) -  + -  + diff --git a/mdop/appv-v4/server-management-console-application-virtualization-system-node.md b/mdop/appv-v4/server-management-console-application-virtualization-system-node.md index bd131b7023..527349e8e6 100644 --- a/mdop/appv-v4/server-management-console-application-virtualization-system-node.md +++ b/mdop/appv-v4/server-management-console-application-virtualization-system-node.md @@ -24,19 +24,19 @@ You can right-click the Application Virtualization System node to display the fo **Configure Connection** In this dialog box, you can modify the following settings: -- **Web Service Host Name**—Enables you to enter the name of the Application Virtualization System to which you want to connect, or you can enter **localhost** to connect to the local computer. +- **Web Service Host Name**—Enables you to enter the name of the Application Virtualization System to which you want to connect, or you can enter **localhost** to connect to the local computer. -- **Use Secure Connection**—Select if you want to connect to the server with a secure connection. +- **Use Secure Connection**—Select if you want to connect to the server with a secure connection. -- **Port**—Enables you to enter the port number you want to use for the connection. 80 is the default regular port number, and 443 is default secure port number. +- **Port**—Enables you to enter the port number you want to use for the connection. 80 is the default regular port number, and 443 is default secure port number. -- **Use Current Windows Account**—Select to use the current Windows account credentials. +- **Use Current Windows Account**—Select to use the current Windows account credentials. -- **Specify Windows Account**—Select when you want to connect to the server as a different user. +- **Specify Windows Account**—Select when you want to connect to the server as a different user. -- **Name**—Enables you to enter the name of the new user by using either the *DOMAIN\\username* or the *username@domain* format. +- **Name**—Enables you to enter the name of the new user by using either the *DOMAIN\\username* or the username@domain format. -- **Password**—Enables you to enter the password that corresponds to the new user. +- **Password**—Enables you to enter the password that corresponds to the new user. **System Options** On the following tabs on this dialog box, you can modify the associated settings: @@ -62,9 +62,9 @@ Starts the management console help file. [Application Virtualization Server Management Console Reference](application-virtualization-server-management-console-reference.md) -  + -  + diff --git a/mdop/appv-v4/sfttray-command-reference.md b/mdop/appv-v4/sfttray-command-reference.md index 4d8b2607ce..ec90b9b166 100644 --- a/mdop/appv-v4/sfttray-command-reference.md +++ b/mdop/appv-v4/sfttray-command-reference.md @@ -26,28 +26,28 @@ By default, the icon is displayed whenever a virtual application is started, alt The list of commands and command-line switches can be displayed by running the following command from a command window. -**Note**   +**Note** There is only one Application Virtualization Client Tray instance for each user context, so if you start a new SFTTRAY command, it will be passed to the program that is already running. -  -`     Sfttray.exe /?` + +` Sfttray.exe /?` ### Command Usage -`     Sfttray.exe [/HIDE | /SHOW]` +` Sfttray.exe [/HIDE | /SHOW]` -`     Sfttray.exe [/HIDE | /SHOW] [/QUIET] [/EXE alternate-exe] /LAUNCH app [args]` +` Sfttray.exe [/HIDE | /SHOW] [/QUIET] [/EXE alternate-exe] /LAUNCH app [args]` -`     Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LOAD app [/SFTFILE sft]` +` Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LOAD app [/SFTFILE sft]` -`     Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LOADALL` +` Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LOADALL` -`     Sfttray.exe [/HIDE | /SHOW] [/QUIET] /REFRESHALL` +` Sfttray.exe [/HIDE | /SHOW] [/QUIET] /REFRESHALL` -`     Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LAUNCHRESULT /LAUNCH app [args]` +` Sfttray.exe [/HIDE | /SHOW] [/QUIET] /LAUNCHRESULT /LAUNCH app [args]` -`     Sfttray.exe /EXIT` +` Sfttray.exe /EXIT` ### Command-Line Switches @@ -81,22 +81,20 @@ The SFTTRAY command-line switches are described in the following table.

    /EXE <alternate-exe>

    Used with /LAUNCH to specify that an executable program is to be started in the virtual environment when a virtual application is started in place of the target file specified in the OSD.

    -Note   -

    For example, use “SFTTRAY.EXE /EXE REGEDIT.EXE /LAUNCH <app>” to enable you to examine the registry of the virtual environment in which the application is running.

    +Note

    For example, use “SFTTRAY.EXE /EXE REGEDIT.EXE /LAUNCH <app>” to enable you to examine the registry of the virtual environment in which the application is running.

    -  +

    /LAUNCH <app> [<args>]

    Starts a virtual application. Specify the name and version of an application or the path to an OSD file. Optionally, command-line arguments can be passed to the virtual application.

    -Note   -

    Use the command “SFTMIME.EXE /QUERY OBJ:APP /SHORT” to obtain a list of the names and versions of available virtual applications.

    +Note

    Use the command “SFTMIME.EXE /QUERY OBJ:APP /SHORT” to obtain a list of the names and versions of available virtual applications.

    -  +
    @@ -126,20 +124,20 @@ The SFTTRAY command-line switches are described in the following table. -  -**Note**   + +**Note** ¹ The */LAUNCHRESULT* command line parameter provides a means for the process that launches sfttray.exe to specify the root name for a global event and a memory mapped file that are used to return the launch result code to the process. The unique identifier name should start with “SFT-” to prevent the event name from getting virtualized when the launching process is invoked within a virtual environment. The memory mapped region will be 64 bits in size. To use this parameter, the launching process creates an event with the name “<UNIQUE ID>-result\_event”, a memory mapped file with the name “<UNIQUE ID>-result\_value”, and optionally an event with the name “<UNIQUE ID>-shutdown\_event”, and then the launching process launches sfttray.exe and waits on the event to be signaled. After the event “<UNIQUE ID>-result\_event” is signaled, the launching process retrieves the 64-bit return code from the memory mapped region. If the optional event “<UNIQUE ID>-shutdown\_event” exists when the virtual application exits, sfttray.exe opens and signals the event. The launching process waits on this shutdown event if it needs to determine when the virtual application exits. -  - -  - -  + + + + + diff --git a/mdop/appv-v4/stand-alone-delivery-scenario-for-application-virtualization-clients.md b/mdop/appv-v4/stand-alone-delivery-scenario-for-application-virtualization-clients.md index ed9253a02c..35eb413f20 100644 --- a/mdop/appv-v4/stand-alone-delivery-scenario-for-application-virtualization-clients.md +++ b/mdop/appv-v4/stand-alone-delivery-scenario-for-application-virtualization-clients.md @@ -22,7 +22,7 @@ The Stand-Alone Delivery Scenario enables you to realize the benefits of Microso **Note**   It is assumed that you have already installed the Application Virtualization Sequencer in preparation for the stand-alone scenario. For more information, see [How to Install the Application Virtualization Sequencer](how-to-install-the-application-virtualization-sequencer.md). -  + ## In This Section @@ -48,9 +48,9 @@ Provides command-line procedures for publishing an application package, using ei [How to Install the Application Virtualization Sequencer](how-to-install-the-application-virtualization-sequencer.md) -  + -  + diff --git a/mdop/appv-v4/streaming-page-learn-more.md b/mdop/appv-v4/streaming-page-learn-more.md index 39a82004b2..be20559d54 100644 --- a/mdop/appv-v4/streaming-page-learn-more.md +++ b/mdop/appv-v4/streaming-page-learn-more.md @@ -22,7 +22,7 @@ Use the **Streaming** page to optimize the virtual application package. During t **Note**   You only have to perform the following tasks if you plan to stream the package across the network. -  + This page contains the following elements: @@ -37,9 +37,9 @@ Runs all the programs saved in the virtual application package. [Create New Package Wizard (AppV 4.6 SP1)](create-new-package-wizard---appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/system-utilization-reportserver.md b/mdop/appv-v4/system-utilization-reportserver.md index 65731e2111..0120c1b27d 100644 --- a/mdop/appv-v4/system-utilization-reportserver.md +++ b/mdop/appv-v4/system-utilization-reportserver.md @@ -42,7 +42,7 @@ After you run a report and the output is displayed in the Application Virtualiza **Note**   The App-V server name reported from the clients must be part of the Default Server Group in order for the System Utilization report to show data. For example, if you are using multiple servers with a Network Load Balancer (NLB), you must add the NLB cluster name to the Default Server Group. -  + ## Related topics @@ -57,9 +57,9 @@ The App-V server name reported from the clients must be part of the Default Serv [How to Run a Report](how-to-run-a-reportserver.md) -  + -  + diff --git a/mdop/appv-v4/target-os-page-learn-more.md b/mdop/appv-v4/target-os-page-learn-more.md index a3caad179a..19b12e2fee 100644 --- a/mdop/appv-v4/target-os-page-learn-more.md +++ b/mdop/appv-v4/target-os-page-learn-more.md @@ -22,7 +22,7 @@ Use the **Target OS** page to specify which operating systems in your environmen **Note**   The operating systems specified on this page can only run this virtual application package if the application you are sequencing supports the operating systems specified. Review the supported operating systems for the application you are sequencing to ensure compatibility. -  + This page contains the following elements: @@ -37,9 +37,9 @@ Enables the virtual application package to be installed and run only on the sele [Create New Package Wizard (AppV 4.6 SP1)](create-new-package-wizard---appv-46-sp1-.md) -  + -  + diff --git a/mdop/appv-v4/unpublish-package.md b/mdop/appv-v4/unpublish-package.md index b3594c6f63..378a0dd72c 100644 --- a/mdop/appv-v4/unpublish-package.md +++ b/mdop/appv-v4/unpublish-package.md @@ -60,7 +60,7 @@ Enables you to remove the shortcuts and file types for an entire package. -  + For version 4.6, the following option has been added. @@ -77,7 +77,7 @@ For version 4.6, the following option has been added. -  + **Important**   Before you can run the **UNPUBLISH PACKAGE** command, the package must already have been added to the Application Virtualization Client. @@ -92,16 +92,16 @@ Using **UNPUBLISH PACKAGE** without **GLOBAL** removes the user shortcuts and fi **UNPUBLISH PACKAGE** always clears all the user settings, shortcuts, and file types regardless of the use of the /CLEAR switch. -  + ## Related topics [SFTMIME Command Reference](sftmime--command-reference.md) -  + -  + diff --git a/mdop/appv-v4/user-access-permissions-in-application-virtualization-client.md b/mdop/appv-v4/user-access-permissions-in-application-virtualization-client.md index 733fc666cd..e8376d17ce 100644 --- a/mdop/appv-v4/user-access-permissions-in-application-virtualization-client.md +++ b/mdop/appv-v4/user-access-permissions-in-application-virtualization-client.md @@ -22,7 +22,7 @@ On the **Permissions** tab on the **Properties** dialog box, accessible by right **Note**   Before changing users permissions, ensure that any permissions changes are consistent with the organization's guidelines for granting user permissions. -  + The following table lists and describes the permissions that can be granted to users. @@ -117,16 +117,16 @@ The following table lists and describes the permissions that can be granted to u -  + ## Related topics [How to Change User Access Permissions](how-to-change-user-access-permissions.md) -  + -  + diff --git a/mdop/appv-v4/using-application-virtualization-servers-as-a-package-management-solution.md b/mdop/appv-v4/using-application-virtualization-servers-as-a-package-management-solution.md index d448c2c2b3..d9c8bd044f 100644 --- a/mdop/appv-v4/using-application-virtualization-servers-as-a-package-management-solution.md +++ b/mdop/appv-v4/using-application-virtualization-servers-as-a-package-management-solution.md @@ -22,7 +22,7 @@ If you do not have an existing ESD system to deploy your Application Virtualizat **Note**   Access to the applications is controlled by means of Security Groups in Active Directory Domain Services, so you will need to plan a process to set up a security group for each virtualized application and for managing which users are added to each group. The Application Virtualization Management Server administrator configures the server to use these Active Directory groups, and the server then automatically controls access to the packages based on Active Directory group membership. -  + ## In This Section @@ -43,9 +43,9 @@ Describes available options for using Application Virtualization Streaming Serve [Planning for Application Virtualization System Deployment](planning-for-application-virtualization-system-deployment.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-50-dynamic-configuration.md b/mdop/appv-v5/about-app-v-50-dynamic-configuration.md index 0e79ae7a90..a4913fba8b 100644 --- a/mdop/appv-v5/about-app-v-50-dynamic-configuration.md +++ b/mdop/appv-v5/about-app-v-50-dynamic-configuration.md @@ -35,7 +35,7 @@ The previous .xml files specify package settings and allow for packages to be cu **Note**   The following information can only be used to modify sequencer generated configuration files to customize packages to meet specific user or group requirements. -  + ### Dynamic Configuration file contents @@ -58,7 +58,7 @@ All of the additions, deletions, and updates in the configuration files need to -  + The previous table represents how the files will be read. The first entry represents what will be read last, therefore, its content takes precedence. Therefore, all packages inherently contain and provide default settings from the package manifest. If a deployment configuration .xml file with customized settings is applied, it will override the package manifest defaults. If a user configuration .xml file with customized settings is applied prior to that, it will override both the deployment configuration and the package manifest defaults. @@ -102,477 +102,477 @@ The structure of the App-V 5.0 Dynamic Configuration file is explained in the fo **Header** - the header of a dynamic user configuration file is as follows: -<?xml version="1.0" encoding="utf-8"?><UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="http://schemas.microsoft.com/appv/2010/userconfiguration"> +<?xml version="1.0" encoding="utf-8"?><UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="; The **PackageId** is the same value as exists in the Manifest file. **Body** - the body of the Dynamic User Configuration file can include all the app extension points that are defined in the Manifest file, as well as information to configure virtual applications. There are four subsections allowed in the body: -1. **Applications** - All app-extensions that are contained in the Manifest file within a package are assigned with an Application ID, which is also defined in the manifest file. This allows you to enable or disable all the extensions for a given application within a package. The **Application ID** must exist in the Manifest file or it will be ignored. +1. **Applications** - All app-extensions that are contained in the Manifest file within a package are assigned with an Application ID, which is also defined in the manifest file. This allows you to enable or disable all the extensions for a given application within a package. The **Application ID** must exist in the Manifest file or it will be ignored. - <UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="http://schemas.microsoft.com/appv/2010/userconfiguration"> + <UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="; - <Applications> + <Applications> - <!-- No new application can be defined in policy. AppV Client will ignore any application ID that is not also in the Manifest file --> + <!-- No new application can be defined in policy. AppV Client will ignore any application ID that is not also in the Manifest file --> - <Application Id="{a56fa627-c35f-4a01-9e79-7d36aed8225a}" Enabled="false"> + <Application Id="{a56fa627-c35f-4a01-9e79-7d36aed8225a}" Enabled="false"> - </Application> + </Application> - </Applications> + </Applications> - … + … - </UserConfiguration> + </UserConfiguration> -2. **Subsystems** - AppExtensions and other subsystems are arranged as subnodes under the <Subsystems>: +2. **Subsystems** - AppExtensions and other subsystems are arranged as subnodes under the <Subsystems>: - <UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="http://schemas.microsoft.com/appv/2010/userconfiguration"> + <UserConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="; - <Subsystems> + <Subsystems> - .. + .. - </Subsystems> + </Subsystems> - .. + .. - </UserConfiguration> + </UserConfiguration> - Each subsystem can be enabled/disabled using the “**Enabled**” attribute. Below are the various subsystems and usage samples. + Each subsystem can be enabled/disabled using the “**Enabled**” attribute. Below are the various subsystems and usage samples. - **Extensions:** + **Extensions:** - Some subsystems (Extension Subsystems) control Extensions. Those subsystems are:- shortcuts, File-Type associations, URL Protocols, AppPaths, Software Clients and COM + Some subsystems (Extension Subsystems) control Extensions. Those subsystems are:- shortcuts, File-Type associations, URL Protocols, AppPaths, Software Clients and COM - Extension Subsystems can be enabled and disabled independently of the content.  Thus if Shortcuts are enabled, The client will use the shortcuts contained within the manifest by default. Each Extension Subsystem can contain an <Extensions> node. If this child element is present, the client will ignore the content in the Manifest file for that subsystem and only use the content in the configuration file. + Extension Subsystems can be enabled and disabled independently of the content. Thus if Shortcuts are enabled, The client will use the shortcuts contained within the manifest by default. Each Extension Subsystem can contain an <Extensions> node. If this child element is present, the client will ignore the content in the Manifest file for that subsystem and only use the content in the configuration file. - Example using the shortcuts subsystem: + Example using the shortcuts subsystem: - 1. If the user defined this in either the dynamic or deployment config file: + 1. If the user defined this in either the dynamic or deployment config file: -                              **<Shortcuts  Enabled="true">** + **<Shortcuts Enabled="true">** -                                          **<Extensions>** + **<Extensions>** -                                           ... + ... -                                          **</Extensions>** + **</Extensions>** -                              **</Shortcuts>** + **</Shortcuts>** -                   Content in the manifest will be ignored.    + Content in the manifest will be ignored. - 2. If the user defined only the following: + 2. If the user defined only the following: -                             **<Shortcuts  Enabled="true"/>** + **<Shortcuts Enabled="true"/>** -                   Then the content in the Manifest will be integrated during publishing. + Then the content in the Manifest will be integrated during publishing. - 3. If the user defines the following + 3. If the user defines the following -                            **<Shortcuts  Enabled="true">** + **<Shortcuts Enabled="true">** -                                          **<Extensions/>** + **<Extensions/>** -                              **</Shortcuts>** + **</Shortcuts>** - Then all the shortcuts within the manifest will still be ignored. There will be no shortcuts integrated. + Then all the shortcuts within the manifest will still be ignored. There will be no shortcuts integrated. - The supported Extension Subsystems are: + The supported Extension Subsystems are: - **Shortcuts:** This controls shortcuts that will be integrated into the local system. Below is a sample with 2 shortcuts: + **Shortcuts:** This controls shortcuts that will be integrated into the local system. Below is a sample with 2 shortcuts: - <Subsystems> + <Subsystems> - <Shortcuts Enabled="true"> + <Shortcuts Enabled="true"> -   <Extensions> + <Extensions> -     <Extension Category="AppV.Shortcut"> + <Extension Category="AppV.Shortcut"> -       <Shortcut> + <Shortcut> -         <File>\[{Common Programs}\]\\Microsoft Contoso\\Microsoft ContosoApp Filler 2010.lnk</File> + <File>\[{Common Programs}\]\\Microsoft Contoso\\Microsoft ContosoApp Filler 2010.lnk</File> -         <Target>\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE</Target> + <Target>\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE</Target> -         <Icon>\[{Windows}\]\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\inficon.exe</Icon> + <Icon>\[{Windows}\]\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\inficon.exe</Icon> -         <Arguments /> + <Arguments /> -         <WorkingDirectory /> + <WorkingDirectory /> -         <AppUserModelId>ContosoApp.Filler.3</AppUserModelId> + <AppUserModelId>ContosoApp.Filler.3</AppUserModelId> -         <Description>Fill out dynamic forms to gather and reuse information throughout the organization using Microsoft ContosoApp.</Description> + <Description>Fill out dynamic forms to gather and reuse information throughout the organization using Microsoft ContosoApp.</Description> -         <Hotkey>0</Hotkey> + <Hotkey>0</Hotkey> -         <ShowCommand>1</ShowCommand> + <ShowCommand>1</ShowCommand> -         <ApplicationId>\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE</ApplicationId> + <ApplicationId>\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE</ApplicationId> -       </Shortcut> + </Shortcut> -   </Extension> + </Extension> -   <Extension Category="AppV.Shortcut"> + <Extension Category="AppV.Shortcut"> -     <Shortcut> + <Shortcut> -       <File>\[{AppData}\]\\Microsoft\\Contoso\\Recent\\Templates.LNK</File> + <File>\[{AppData}\]\\Microsoft\\Contoso\\Recent\\Templates.LNK</File> -       <Target>\[{AppData}\]\\Microsoft\\Templates</Target> + <Target>\[{AppData}\]\\Microsoft\\Templates</Target> -       <Icon /> + <Icon /> -       <Arguments /> + <Arguments /> -       <WorkingDirectory /> + <WorkingDirectory /> -       <AppUserModelId /> + <AppUserModelId /> -       <Description /> + <Description /> -       <Hotkey>0</Hotkey> + <Hotkey>0</Hotkey> -       <ShowCommand>1</ShowCommand> + <ShowCommand>1</ShowCommand> -       <!-- Note the ApplicationId is optional --> + <!-- Note the ApplicationId is optional --> -     </Shortcut> + </Shortcut> -   </Extension> - -  </Extensions> - - </Shortcuts> - - **File-Type Associations:** Associates File-types with programs to open by default as well as setup the context menu. (MIME types can also be setup using this susbsystem). Sample File-type Association is below: - - <FileTypeAssociations Enabled="true"> - - <Extensions> - -   <Extension Category="AppV.FileTypeAssociation"> - -     <FileTypeAssociation> - -       <FileExtension MimeAssociation="true"> - -       <Name>.docm</Name> - -       <ProgId>contosowordpad.DocumentMacroEnabled.12</ProgId> - -       <PerceivedType>document</PerceivedType> - -       <ContentType>application/vnd.ms-contosowordpad.document.macroEnabled.12</ContentType> - -       <OpenWithList> - -         <ApplicationName>wincontosowordpad.exe</ApplicationName> - -       </OpenWithList> - -      <OpenWithProgIds> - -         <ProgId>contosowordpad.8</ProgId> - -       </OpenWithProgIds> - -       <ShellNew> - -         <Command /> - -         <DataBinary /> - -         <DataText /> - -         <FileName /> - -         <NullFile>true</NullFile> - -         <ItemName /> - -         <IconPath /> - -         <MenuText /> - -         <Handler /> - -       </ShellNew> - -     </FileExtension> - -     <ProgId> - -        <Name>contosowordpad.DocumentMacroEnabled.12</Name> - -         <DefaultIcon>\[{Windows}\]\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\contosowordpadicon.exe,15</DefaultIcon> - -         <Description>Blah Blah Blah</Description> - -         <FriendlyTypeName>\[{FOLDERID\_ProgramFilesX86}\]\\Microsoft Contoso 14\\res.dll,9182</FriendlyTypeName> - -         <InfoTip>\[{FOLDERID\_ProgramFilesX86}\]\\Microsoft Contoso 14\\res.dll,1424</InfoTip> - -         <EditFlags>0</EditFlags> - -         <ShellCommands> - -           <DefaultCommand>Open</DefaultCommand> - -           <ShellCommand> - -              <ApplicationId>{e56fa627-c35f-4a01-9e79-7d36aed8225a}</ApplicationId> - -              <Name>Edit</Name> - -              <FriendlyName>&Edit</FriendlyName> - -              <CommandLine>"\[{PackageRoot}\]\\Contoso\\WINcontosowordpad.EXE" /vu "%1"</CommandLine> - -           </ShellCommand> - -           </ShellCommand> - -             <ApplicationId>{e56fa627-c35f-4a01-9e79-7d36aed8225a}</ApplicationId> - -             <Name>Open</Name> - -             <FriendlyName>&Open</FriendlyName> - -             <CommandLine>"\[{PackageRoot}\]\\Contoso\\WINcontosowordpad.EXE" /n "%1"</CommandLine> - -             <DropTargetClassId /> - -             <DdeExec> - -               <Application>mscontosowordpad</Application> - -               <Topic>ShellSystem</Topic> - -               <IfExec>\[SHELLNOOP\]</IfExec> - -               <DdeCommand>\[SetForeground\]\[ShellNewDatabase "%1"\]</DdeCommand> - -             </DdeExec> - -           </ShellCommand> - -         </ShellCommands> - -       </ProgId> - -      </FileTypeAssociation> - -    </Extension> - -   </Extensions> - -   </FileTypeAssociations> - - **URL Protocols**: This controls the URL Protocols that are integrated into the local registry of the client machine e.g. “mailto:”. - - <URLProtocols Enabled="true"> - - <Extensions> - - <Extension Category="AppV.URLProtocol"> - - <URLProtocol> - -   <Name>mailto</Name> - -   <ApplicationURLProtocol> - -   <DefaultIcon>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE,-9403</DefaultIcon> - -   <EditFlags>2</EditFlags> - -   <Description /> - -   <AppUserModelId /> - -   <FriendlyTypeName /> - -   <InfoTip /> - - <SourceFilter /> - -   <ShellFolder /> - -   <WebNavigableCLSID /> - -   <ExplorerFlags>2</ExplorerFlags> - -   <CLSID /> - -   <ShellCommands> - -   <DefaultCommand>open</DefaultCommand> - -   <ShellCommand> - -   <ApplicationId>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationId> - -   <Name>open</Name> - -   <CommandLine>\[{ProgramFilesX86}\\Microsoft Contoso\\Contoso\\contosomail.EXE" -c OEP.Note /m "%1"</CommandLine> - -   <DropTargetClassId /> - -   <FriendlyName /> - -   <Extended>0</Extended> - -   <LegacyDisable>0</LegacyDisable> - -   <SuppressionPolicy>2</SuppressionPolicy> - -    <DdeExec> - -   <NoActivateHandler /> - -   <Application>contosomail</Application> - -   <Topic>ShellSystem</Topic> - -   <IfExec>\[SHELLNOOP\]</IfExec> - -   <DdeCommand>\[SetForeground\]\[ShellNewDatabase "%1"\]</DdeCommand> - -   </DdeExec> - -   </ShellCommand> - -   </ShellCommands> - -   </ApplicationURLProtocol> - -   </URLProtocol> - -   </Extension> - -   </Extension> - -   </URLProtocols> - - **Software Clients**: Allows the app to register as an Email client, news reader, media player and makes the app visible in the Set Program Access and Computer Defaults UI. In most cases you should only need to enable and disable it. There is also a control to enable and disable the email client specifically if you want the other clients still enabled except for that client. - - <SoftwareClients Enabled="true"> - -   <ClientConfiguration EmailEnabled="false" /> - - </SoftwareClients> - - AppPaths:- If an application for example contoso.exe is registered with an apppath name of “myapp”, it allows you type “myapp” under the run menu and it will open contoso.exe. - - <AppPaths Enabled="true"> - - <Extensions> - - <Extension Category="AppV.AppPath"> - - <AppPath> - -   <ApplicationId>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationId> - -   <Name>contosomail.exe</Name> - -   <ApplicationPath>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationPath> - -   <PATHEnvironmentVariablePrefix /> - -   <CanAcceptUrl>false</CanAcceptUrl> - -   <SaveUrl /> - - </AppPath> - - </Extension> + </Extension> </Extensions> - </AppPaths> + </Shortcuts> - **COM**: Allows an Application register Local COM servers. Mode can be Integration, Isolated or Off. When Isol. + **File-Type Associations:** Associates File-types with programs to open by default as well as setup the context menu. (MIME types can also be setup using this susbsystem). Sample File-type Association is below: - <COM Mode="Isolated"/> + <FileTypeAssociations Enabled="true"> - **Other Settings**: + <Extensions> - In addition to Extensions, other subsystems can be enabled/disabled and edited: + <Extension Category="AppV.FileTypeAssociation"> - **Virtual Kernel Objects**: + <FileTypeAssociation> - <Objects Enabled="false" /> + <FileExtension MimeAssociation="true"> - **Virtual Registry**: Used if you want to set a registry in the Virtual Registry within HKCU + <Name>.docm</Name> - <Registry Enabled="true"> + <ProgId>contosowordpad.DocumentMacroEnabled.12</ProgId> - <Include> + <PerceivedType>document</PerceivedType> - <Key Path="\\REGISTRY\\USER\\\[{AppVCurrentUserSID}\]\\Software\\ABC"> + <ContentType>application/vnd.ms-contosowordpad.document.macroEnabled.12</ContentType> - <Value Type="REG\_SZ" Name="Bar" Data="NewValue" /> + <OpenWithList> -  </Key> + <ApplicationName>wincontosowordpad.exe</ApplicationName> -   <Key Path="\\REGISTRY\\USER\\\[{AppVCurrentUserSID}\]\\Software\\EmptyKey" /> + </OpenWithList> -  </Include> + <OpenWithProgIds> - <Delete> + <ProgId>contosowordpad.8</ProgId> -   </Registry> + </OpenWithProgIds> - **Virtual File System** + <ShellNew> -       <FileSystem Enabled="true" /> + <Command /> - **Virtual Fonts** + <DataBinary /> -       <Fonts Enabled="false" /> + <DataText /> - **Virtual Environment Variables** + <FileName /> - <EnvironmentVariables Enabled="true"> + <NullFile>true</NullFile> - <Include> + <ItemName /> -        <Variable Name="UserPath" Value="%path%;%UserProfile%" /> + <IconPath /> -        <Variable Name="UserLib" Value="%UserProfile%\\ABC" /> + <MenuText /> -        </Include> + <Handler /> -       <Delete> + </ShellNew> -        <Variable Name="lib" /> + </FileExtension> -         </Delete> + <ProgId> -         </EnvironmentVariables> + <Name>contosowordpad.DocumentMacroEnabled.12</Name> - **Virtual services** + <DefaultIcon>\[{Windows}\]\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\contosowordpadicon.exe,15</DefaultIcon> -       <Services Enabled="false" /> + <Description>Blah Blah Blah</Description> -3. **UserScripts** – Scripts can be used to setup or alter the virtual environment as well as execute scripts at time of deployment or removal, before an application executes, or they can be used to “clean up” the environment after the application terminates. Please reference a sample User configuration file that is output by the sequencer to see a sample script. The Scripts section below provides more information on the various triggers that can be used. + <FriendlyTypeName>\[{FOLDERID\_ProgramFilesX86}\]\\Microsoft Contoso 14\\res.dll,9182</FriendlyTypeName> -4. **ManagingAuthority** – Can be used when 2 versions of your package are co-existing on the same machine, one deployed to App-V 4.6 and the other deployed on App-V 5.0. To Allow App-V vNext to take over App-V 4.6 extension points for the named package enter the following in the UserConfig file (where PackageName is the Package GUID in App-V 4.6: + <InfoTip>\[{FOLDERID\_ProgramFilesX86}\]\\Microsoft Contoso 14\\res.dll,1424</InfoTip> - <ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName="032630c0-b8e2-417c-acef-76fc5297fe81" /> + <EditFlags>0</EditFlags> + + <ShellCommands> + + <DefaultCommand>Open</DefaultCommand> + + <ShellCommand> + + <ApplicationId>{e56fa627-c35f-4a01-9e79-7d36aed8225a}</ApplicationId> + + <Name>Edit</Name> + + <FriendlyName>&Edit</FriendlyName> + + <CommandLine>"\[{PackageRoot}\]\\Contoso\\WINcontosowordpad.EXE" /vu "%1"</CommandLine> + + </ShellCommand> + + </ShellCommand> + + <ApplicationId>{e56fa627-c35f-4a01-9e79-7d36aed8225a}</ApplicationId> + + <Name>Open</Name> + + <FriendlyName>&Open</FriendlyName> + + <CommandLine>"\[{PackageRoot}\]\\Contoso\\WINcontosowordpad.EXE" /n "%1"</CommandLine> + + <DropTargetClassId /> + + <DdeExec> + + <Application>mscontosowordpad</Application> + + <Topic>ShellSystem</Topic> + + <IfExec>\[SHELLNOOP\]</IfExec> + + <DdeCommand>\[SetForeground\]\[ShellNewDatabase "%1"\]</DdeCommand> + + </DdeExec> + + </ShellCommand> + + </ShellCommands> + + </ProgId> + + </FileTypeAssociation> + + </Extension> + + </Extensions> + + </FileTypeAssociations> + + **URL Protocols**: This controls the URL Protocols that are integrated into the local registry of the client machine e.g. “mailto:”. + + <URLProtocols Enabled="true"> + + <Extensions> + + <Extension Category="AppV.URLProtocol"> + + <URLProtocol> + + <Name>mailto</Name> + + <ApplicationURLProtocol> + + <DefaultIcon>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE,-9403</DefaultIcon> + + <EditFlags>2</EditFlags> + + <Description /> + + <AppUserModelId /> + + <FriendlyTypeName /> + + <InfoTip /> + + <SourceFilter /> + + <ShellFolder /> + + <WebNavigableCLSID /> + + <ExplorerFlags>2</ExplorerFlags> + + <CLSID /> + + <ShellCommands> + + <DefaultCommand>open</DefaultCommand> + + <ShellCommand> + + <ApplicationId>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationId> + + <Name>open</Name> + + <CommandLine>\[{ProgramFilesX86}\\Microsoft Contoso\\Contoso\\contosomail.EXE" -c OEP.Note /m "%1"</CommandLine> + + <DropTargetClassId /> + + <FriendlyName /> + + <Extended>0</Extended> + + <LegacyDisable>0</LegacyDisable> + + <SuppressionPolicy>2</SuppressionPolicy> + + <DdeExec> + + <NoActivateHandler /> + + <Application>contosomail</Application> + + <Topic>ShellSystem</Topic> + + <IfExec>\[SHELLNOOP\]</IfExec> + + <DdeCommand>\[SetForeground\]\[ShellNewDatabase "%1"\]</DdeCommand> + + </DdeExec> + + </ShellCommand> + + </ShellCommands> + + </ApplicationURLProtocol> + + </URLProtocol> + + </Extension> + + </Extension> + + </URLProtocols> + + **Software Clients**: Allows the app to register as an Email client, news reader, media player and makes the app visible in the Set Program Access and Computer Defaults UI. In most cases you should only need to enable and disable it. There is also a control to enable and disable the email client specifically if you want the other clients still enabled except for that client. + + <SoftwareClients Enabled="true"> + + <ClientConfiguration EmailEnabled="false" /> + + </SoftwareClients> + + AppPaths:- If an application for example contoso.exe is registered with an apppath name of “myapp”, it allows you type “myapp” under the run menu and it will open contoso.exe. + + <AppPaths Enabled="true"> + + <Extensions> + + <Extension Category="AppV.AppPath"> + + <AppPath> + + <ApplicationId>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationId> + + <Name>contosomail.exe</Name> + + <ApplicationPath>\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE</ApplicationPath> + + <PATHEnvironmentVariablePrefix /> + + <CanAcceptUrl>false</CanAcceptUrl> + + <SaveUrl /> + + </AppPath> + + </Extension> + + </Extensions> + + </AppPaths> + + **COM**: Allows an Application register Local COM servers. Mode can be Integration, Isolated or Off. When Isol. + + <COM Mode="Isolated"/> + + **Other Settings**: + + In addition to Extensions, other subsystems can be enabled/disabled and edited: + + **Virtual Kernel Objects**: + + <Objects Enabled="false" /> + + **Virtual Registry**: Used if you want to set a registry in the Virtual Registry within HKCU + + <Registry Enabled="true"> + + <Include> + + <Key Path="\\REGISTRY\\USER\\\[{AppVCurrentUserSID}\]\\Software\\ABC"> + + <Value Type="REG\_SZ" Name="Bar" Data="NewValue" /> + + </Key> + + <Key Path="\\REGISTRY\\USER\\\[{AppVCurrentUserSID}\]\\Software\\EmptyKey" /> + + </Include> + + <Delete> + + </Registry> + + **Virtual File System** + + <FileSystem Enabled="true" /> + + **Virtual Fonts** + + <Fonts Enabled="false" /> + + **Virtual Environment Variables** + + <EnvironmentVariables Enabled="true"> + + <Include> + + <Variable Name="UserPath" Value="%path%;%UserProfile%" /> + + <Variable Name="UserLib" Value="%UserProfile%\\ABC" /> + + </Include> + + <Delete> + + <Variable Name="lib" /> + + </Delete> + + </EnvironmentVariables> + + **Virtual services** + + <Services Enabled="false" /> + +3. **UserScripts** – Scripts can be used to setup or alter the virtual environment as well as execute scripts at time of deployment or removal, before an application executes, or they can be used to “clean up” the environment after the application terminates. Please reference a sample User configuration file that is output by the sequencer to see a sample script. The Scripts section below provides more information on the various triggers that can be used. + +4. **ManagingAuthority** – Can be used when 2 versions of your package are co-existing on the same machine, one deployed to App-V 4.6 and the other deployed on App-V 5.0. To Allow App-V vNext to take over App-V 4.6 extension points for the named package enter the following in the UserConfig file (where PackageName is the Package GUID in App-V 4.6: + + <ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName="032630c0-b8e2-417c-acef-76fc5297fe81" /> ### Dynamic Deployment Configuration file **Header** - The header of a Deployment Configuration file is as follows: -<?xml version="1.0" encoding="utf-8"?><DeploymentConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="http://schemas.microsoft.com/appv/2010/deploymentconfiguration"> +<?xml version="1.0" encoding="utf-8"?><DeploymentConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="; The **PackageId** is the same value as exists in the manifest file. @@ -582,11 +582,11 @@ The **PackageId** is the same value as exists in the manifest file. - Machine Configuration section–contains information that can be configured only for an entire machine, not for a specific user on the machine. For example, HKEY\_LOCAL\_MACHINE registry keys in the VFS. -<DeploymentConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="http://schemas.microsoft.com/appv/2010/deploymentconfiguration"> +<DeploymentConfiguration **PackageId**="1f8488bf-2257-46b4-b27f-09c9dbaae707" DisplayName="Reserved" xmlns="; <UserConfiguration> -  .. + .. </UserConfiguration> @@ -610,11 +610,11 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <MachineConfiguration> -   <Subsystems> + <Subsystems> -   .. + .. -   </Subsystems> + </Subsystems> .. @@ -630,65 +630,65 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <ApplicationCapabilities Enabled="true"> -   <Extensions> + <Extensions> -    <Extension Category="AppV.ApplicationCapabilities"> + <Extension Category="AppV.ApplicationCapabilities"> -     <ApplicationCapabilities> + <ApplicationCapabilities> -      <ApplicationId>\[{PackageRoot}\]\\LitView\\LitViewBrowser.exe</ApplicationId> + <ApplicationId>\[{PackageRoot}\]\\LitView\\LitViewBrowser.exe</ApplicationId> -      <Reference> + <Reference> -       <Name>LitView Browser</Name> + <Name>LitView Browser</Name> -       <Path>SOFTWARE\\LitView\\Browser\\Capabilities</Path> + <Path>SOFTWARE\\LitView\\Browser\\Capabilities</Path> -      </Reference> + </Reference> -    <CapabilityGroup> + <CapabilityGroup> -     <Capabilities> + <Capabilities> -      <Name>@\[{ProgramFilesX86}\]\\LitView\\LitViewBrowser.exe,-12345</Name> + <Name>@\[{ProgramFilesX86}\]\\LitView\\LitViewBrowser.exe,-12345</Name> -      <Description>@\[{ProgramFilesX86}\]\\LitView\\LitViewBrowser.exe,-12346</Description> + <Description>@\[{ProgramFilesX86}\]\\LitView\\LitViewBrowser.exe,-12346</Description> -      <Hidden>0</Hidden> + <Hidden>0</Hidden> -      <EMailSoftwareClient>Lit View E-Mail Client</EMailSoftwareClient> + <EMailSoftwareClient>Lit View E-Mail Client</EMailSoftwareClient> -      <FileAssociationList> + <FileAssociationList> -       <FileAssociation Extension=".htm" ProgID="LitViewHTML" /> + <FileAssociation Extension=".htm" ProgID="LitViewHTML" /> -       <FileAssociation Extension=".html" ProgID="LitViewHTML" /> + <FileAssociation Extension=".html" ProgID="LitViewHTML" /> -       <FileAssociation Extension=".shtml" ProgID="LitViewHTML" /> + <FileAssociation Extension=".shtml" ProgID="LitViewHTML" /> -      </FileAssociationList> + </FileAssociationList> -      <MIMEAssociationList> + <MIMEAssociationList> -       <MIMEAssociation Type="audio/mp3" ProgID="LitViewHTML" /> + <MIMEAssociation Type="audio/mp3" ProgID="LitViewHTML" /> -       <MIMEAssociation Type="audio/mpeg" ProgID="LitViewHTML" /> + <MIMEAssociation Type="audio/mpeg" ProgID="LitViewHTML" /> -      </MIMEAssociationList> + </MIMEAssociationList> -     <URLAssociationList> + <URLAssociationList> -       <URLAssociation Scheme="http" ProgID="LitViewHTML.URL.http" /> + <URLAssociation Scheme="http" ProgID="LitViewHTML.URL.http" /> -      </URLAssociationList> + </URLAssociationList> -      </Capabilities> + </Capabilities> -   </CapabilityGroup> + </CapabilityGroup> -    </ApplicationCapabilities> + </ApplicationCapabilities> -   </Extension> + </Extension> </Extensions> @@ -704,15 +704,15 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <Include> -   <Key Path="\\REGISTRY\\Machine\\Software\\ABC"> + <Key Path="\\REGISTRY\\Machine\\Software\\ABC"> -     <Value Type="REG\_SZ" Name="Bar" Data="Baz" /> + <Value Type="REG\_SZ" Name="Bar" Data="Baz" /> -    </Key> + </Key> -   <Key Path="\\REGISTRY\\Machine\\Software\\EmptyKey" /> + <Key Path="\\REGISTRY\\Machine\\Software\\EmptyKey" /> -  </Include> + </Include> <Delete> @@ -724,9 +724,9 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <NotIsolate> -    <Object Name="testObject" /> + <Object Name="testObject" /> -  </NotIsolate> + </NotIsolate> </Objects> @@ -734,11 +734,11 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <MachineConfiguration> -   ..  + ..  -   <ProductSourceURLOptOut Enabled="true" /> + <ProductSourceURLOptOut Enabled="true" /> -   .. + .. </MachineConfiguration> @@ -748,19 +748,19 @@ Machine Configuration - the Machine configuration section of the Deployment Conf <MachineConfiguration> -   ..    + ..    -   <TerminateChildProcesses> + <TerminateChildProcesses> -     <Application Path="\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE" /> + <Application Path="\[{PackageRoot}\]\\Contoso\\ContosoApp.EXE" /> -     <Application Path="\[{PackageRoot}\]\\LitView\\LitViewBrowser.exe" /> + <Application Path="\[{PackageRoot}\]\\LitView\\LitViewBrowser.exe" /> -     <Application Path="\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE" /> + <Application Path="\[{ProgramFilesX86}\]\\Microsoft Contoso\\Contoso\\contosomail.EXE" /> -   </TerminateChildProcesses> + </TerminateChildProcesses> -   .. + .. </MachineConfiguration> @@ -855,7 +855,7 @@ The following table describes the various script events and the context under wh -  + ### Create a Dynamic Configuration file using an App-V 5.0 Manifest file @@ -879,9 +879,9 @@ To create the file manually, the information above in previous sections can be c [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-50-reporting.md b/mdop/appv-v5/about-app-v-50-reporting.md index 24988cb82c..befb001a5f 100644 --- a/mdop/appv-v5/about-app-v-50-reporting.md +++ b/mdop/appv-v5/about-app-v-50-reporting.md @@ -41,7 +41,7 @@ The following list displays the end–to-end high-level workflow for reporting i **Note**   If you are using the Configuration Manager integration with App-V 5.0, most reports are generated from Configuration Manager rather than from App-V 5.0. -   + 4. After importing the App-V 5.0 PowerShell module using `Import-Module AppvClient` as administrator, enable the App-V 5.0 client. This sample PowerShell cmdlet enables App-V 5.0 reporting: @@ -60,9 +60,11 @@ The following list displays the end–to-end high-level workflow for reporting i **Note**   By default the cache is cleared after the server confirms receipt of data. You can manually configure the client to save the data cache. -   + - If the App-V 5.0 client device does not receive a success notification from the server, it retains data in the cache and tries to resend data at the next configured interval. Clients continue to collect data and add it to the cache. +~~~ +If the App-V 5.0 client device does not receive a success notification from the server, it retains data in the cache and tries to resend data at the next configured interval. Clients continue to collect data and add it to the cache. +~~~ ### App-V 5.0 reporting server frequently asked questions @@ -110,24 +112,23 @@ The following table displays answers to common questions about App-V 5.0 reporti

    Yes. Besides manually sending reporting using PowerShell Cmdlets (Send-AppvClientReport), the task can be scheduled so it will happen automatically. There are two ways to schedule the reporting:

    1. Using PowerShell cmdlets - Set-AppvClientConfiguration. For example:

      -

      Set-AppvClientConfiguration -ReportingEnabled 1 - ReportingServerURL http://any.com/appv-reporting

      +

      Set-AppvClientConfiguration -ReportingEnabled 1 - ReportingServerURL http://any.com/appv-reporting

      -

      For a complete list of client configuration settings see [About Client Configuration Settings](about-client-configuration-settings.md) and look for the following entries: ReportingEnabled, ReportingServerURL, ReportingDataCacheLimit, ReportingDataBlockSize, ReportingStartTime, ReportingRandomDelay, ReportingInterval.

      +

      For a complete list of client configuration settings see About Client Configuration Settings and look for the following entries: ReportingEnabled, ReportingServerURL, ReportingDataCacheLimit, ReportingDataBlockSize, ReportingStartTime, ReportingRandomDelay, ReportingInterval.

    2. By using Group Policy. If distributed using the domain controller, the settings are the same as previously listed.

      -Note   -

      Group Policy settings override local settings configured using PowerShell.

      +Note

      Group Policy settings override local settings configured using PowerShell.

      -  +
    + -  ## App-V 5.0 Client Reporting @@ -138,10 +139,10 @@ To use App-V 5.0 reporting you must install and configure the App-V 5.0 client. The following examples show how PowerShell parameters can configure the reporting features of the App-V 5.0 client. -**Note**   +**Note** The following configuration task can also be configured using Group Policy settings in the App-V 5.0 ADMX template. For more information about using the ADMX template, see [How to Modify App-V 5.0 Client Configuration Using the ADMX Template and Group Policy](how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md). + -  **To enable reporting and to initiate data collection on the computer running the App-V 5.0 client**: @@ -155,7 +156,7 @@ Set-AppVClientConfiguration –ReportingServerURL http://MyReportingServer:MyPor `-ReportingInterval 1 -ReportingRandomDelay 30` -This example configures the client to automatically send the reporting data to the reporting server URL **http://MyReportingServer:MyPort/**. Additionally, the reporting data will be sent daily between 8:00 and 8:30 PM, depending on the random delay generated for the session. +This example configures the client to automatically send the reporting data to the reporting server URL http://MyReportingServer:MyPort/. Additionally, the reporting data will be sent daily between 8:00 and 8:30 PM, depending on the random delay generated for the session. **To limit the size of the data cache on the client**: @@ -224,8 +225,8 @@ The following table displays the types of information you can collect by using A + -  The client collects and saves this data in an **.xml** format. The data cache is hidden by default and requires administrator rights to open the XML file. @@ -270,20 +271,19 @@ You can also use the **Send-AppVClientReport** cmdlet to manually collect data.

    If you have an existing App-V 5.0 reporting Server, create a customized scheduled task or script. Specify that the client send the data to the specified location with the desired frequency.

    If you do not have an existing App-V 5.0 reporting Server, use the –URL parameter to send the data to a specified share. For example:

    -

    Send-AppVClientReport –URL \\Myshare\MyData\ -DeleteOnSuccess

    -

    The previous example will send the reporting data to \\MyShare\MyData\ location indicated by the -URL parameter. After the data has been sent, the cache is cleared.

    +

    Send-AppVClientReport –URL \Myshare\MyData\ -DeleteOnSuccess

    +

    The previous example will send the reporting data to \MyShare\MyData</strong> location indicated by the -URL parameter. After the data has been sent, the cache is cleared.

    -Note   -

    If a location other than the Reporting Server is specified, the data is sent using .xml format with no additional processing.

    +Note

    If a location other than the Reporting Server is specified, the data is sent using .xml format with no additional processing.

    -  +
    -  + ### Creating Reports @@ -317,9 +317,9 @@ You should also ensure that the reporting server web service’s **Maximum Concu [How to install the Reporting Server on a Standalone Computer and Connect it to the Database](how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-50-sp1.md b/mdop/appv-v5/about-app-v-50-sp1.md index fae0ea6408..65c04e3806 100644 --- a/mdop/appv-v5/about-app-v-50-sp1.md +++ b/mdop/appv-v5/about-app-v-50-sp1.md @@ -32,7 +32,7 @@ This service pack contains the following changes: - Reporting - **HKEY\_LOCAL\_MACHINE** \\ **SOFTWARE** \\ **Microsoft** \\ **AppV** \\ **Server** \\ **ReportingService** \\ **REPORTING\_DB\_NAME** -   + ## How to Get MDOP Technologies @@ -51,9 +51,9 @@ App-V 5.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is p [Release Notes for App-V 5.0 SP1](release-notes-for-app-v-50-sp1.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-50-sp2.md b/mdop/appv-v5/about-app-v-50-sp2.md index c3fd881748..fa43f9f5d9 100644 --- a/mdop/appv-v5/about-app-v-50-sp2.md +++ b/mdop/appv-v5/about-app-v-50-sp2.md @@ -61,7 +61,7 @@ Tasks that have been placed in a pending state will be performed according to th -  + When a task is placed in a pending state, the App-V client also generates a registry key for the pending task, as follows: @@ -88,7 +88,7 @@ When a task is placed in a pending state, the App-V client also generates a regi -  + ### Virtualizing Microsoft Office 2013 and Microsoft Office 2010 using App-V 5.0 @@ -99,7 +99,7 @@ Use the following link for more information about App-V 5.0 supported Microsoft **Note**   This document focuses on creating a Microsoft Office 2013 App-V 5.0 Package. However, it also provides information about scenarios for Microsoft Office 2010 with App-V 5.0. -  + ### App-V 5.0 Client Management User Interface Application @@ -173,9 +173,9 @@ App-V 5.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is p [Release Notes for App-V 5.0 SP2](release-notes-for-app-v-50-sp2.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-50-sp3.md b/mdop/appv-v5/about-app-v-50-sp3.md index b4f0f69c18..b427373e7f 100644 --- a/mdop/appv-v5/about-app-v-50-sp3.md +++ b/mdop/appv-v5/about-app-v-50-sp3.md @@ -59,17 +59,17 @@ See the following links for the App-V 5.0 SP3 software prerequisites and support -

    [App-V 5.0 SP3 Prerequisites](app-v-50-sp3-prerequisites.md)

    +

    App-V 5.0 SP3 Prerequisites

    Prerequisite software that you must install before starting the App-V 5.0 SP3 installation

    -

    [App-V 5.0 SP3 Supported Configurations](app-v-50-sp3-supported-configurations.md)

    +

    App-V 5.0 SP3 Supported Configurations

    Supported operating systems and hardware requirements for the App-V Server, Sequencer, and Client components

    -  + ## Migrating to App-V 5.0 SP3 @@ -101,11 +101,10 @@ Review the following information before you start the upgrade:
  • Connection groups

  • -Note   -

    To use the App-V client user interface, download the existing version from [Microsoft Application Virtualization 5.0 Client UI Application](https://www.microsoft.com/download/details.aspx?id=41186).

    +Note

    To use the App-V client user interface, download the existing version from Microsoft Application Virtualization 5.0 Client UI Application.

    -  +
    @@ -113,8 +112,8 @@ Review the following information before you start the upgrade:

    You must first upgrade to App-V 5.0. You cannot upgrade directly from App-V 4.x to App-V 5.0 SP3.

    For more information, see:

    @@ -135,7 +134,7 @@ Review the following information before you start the upgrade: -  + ### Steps to upgrade the App-V infrastructure @@ -157,15 +156,14 @@ Complete the following steps to upgrade each component of the App-V infrastructu

    Step 1: Upgrade the App-V Server.

    If you are not using the App-V Server, skip this step and go to the next step.

    -Note   -

    The App-V 5.0 SP3 client is compatible with the App-V 5.0 SP1 Server.

    +Note

    The App-V 5.0 SP3 client is compatible with the App-V 5.0 SP1 Server.

    -  +

    Follow these steps:

      -
    1. Review the [Release Notes for App-V 5.0 SP3](release-notes-for-app-v-50-sp3.md) for issues that may affect the App-V Server installation.

    2. +
    3. Review the Release Notes for App-V 5.0 SP3 for issues that may affect the App-V Server installation.

    4. Do one of the following, depending on the method you are using to upgrade the Management database and/or Reporting database:

      @@ -193,35 +191,35 @@ Complete the following steps to upgrade each component of the App-V infrastructu - + - +

      Management database

      To install or upgrade, see [SQL scripts to install or upgrade the App-V 5.0 SP3 Management Server database fail](https://support.microsoft.com/kb/3031340).

      To install or upgrade, see SQL scripts to install or upgrade the App-V 5.0 SP3 Management Server database fail.

      Reporting database

      Follow the steps in [How to Deploy the App-V Databases by Using SQL Scripts](how-to-deploy-the-app-v-databases-by-using-sql-scripts.md).

      Follow the steps in How to Deploy the App-V Databases by Using SQL Scripts.

      -

       

      +

      -

       

    5. -
    6. If you are upgrading the App-V Server from App-V 5.0 SP1 Hotfix Package 3 or later, complete the steps in section [Check registry keys after installing the App-V 5.0 SP3 Server](#bkmk-check-reg-key-svr).

    7. -
    8. Follow the steps in [How to Deploy the App-V 5.0 Server](how-to-deploy-the-app-v-50-server-50sp3.md).

    9. +

      +
    10. If you are upgrading the App-V Server from App-V 5.0 SP1 Hotfix Package 3 or later, complete the steps in section Check registry keys after installing the App-V 5.0 SP3 Server.

    11. +
    12. Follow the steps in How to Deploy the App-V 5.0 Server.

    Step 2: Upgrade the App-V Sequencer.

    -

    See [How to Install the Sequencer](how-to-install-the-sequencer-beta-gb18030.md).

    +

    See How to Install the Sequencer.

    Step 3: Upgrade the App-V client or App-V RDS client.

    -

    See [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md).

    +

    See How to Deploy the App-V Client.

    -  + ### Check registry keys before installing the App-V 5.0 SP3 Server @@ -252,7 +250,7 @@ This is step 3 from the previous table. -  + **ManagementDatabase key** @@ -320,7 +318,7 @@ If you are installing the Management database, set these registry keys under `HK -  + **ManagementService key** @@ -355,7 +353,7 @@ If you are installing the Management server, set these registry keys under `HKLM -  + **ReportingDatabase key** @@ -423,7 +421,7 @@ If you are installing the Reporting database, set these registry keys under `HKL -  + **ReportingService key** @@ -454,7 +452,7 @@ If you are installing the Reporting server, set these registry keys under `HKLM\ -  + ## Manually created connection group xml file requires update to schema @@ -489,27 +487,27 @@ You can manage connection groups more easily by using optional packages and othe

    Including optional packages in a connection group enables you to dynamically determine which applications will be included in the connection group’s virtual environment, based on the applications that users are entitled to.

    You don’t need to manage as many connection groups because you can mix optional and non-optional packages in the same connection group. Mixing packages allows different groups of users to use the same connection group, even though users might have only one package in common.

    Example: You can enable a package with Microsoft Office for all users, but enable different optional packages, which contain different Office plug-ins, to different subsets of users.

    -

    [How to Use Optional Packages in Connection Groups](how-to-use-optional-packages-in-connection-groups.md#bkmk-apps-plugs-optional)

    +

    How to Use Optional Packages in Connection Groups

    Unpublish or delete an optional package without changing the connection group

    Unpublish or delete, or unpublish and republish an optional package, which is in a connection group, without having to disable or re-enable the connection group on the App-V client.

    -

    [How to Use Optional Packages in Connection Groups](how-to-use-optional-packages-in-connection-groups.md#bkmk-apps-plugs-optional)

    +

    How to Use Optional Packages in Connection Groups

    Publish connection groups that contain user-published and globally published packages

    Create a user-published connection group that contains user-published and globally published packages.

    -

    [How to Create a Connection Group with User-Published and Globally Published Packages](how-to-create-a-connection-group-with-user-published-and-globally-published-packages.md)

    +

    How to Create a Connection Group with User-Published and Globally Published Packages

    Make a connection group ignore the package version

    Configure a connection group to accept any version of a package, which enables you to upgrade a package without having to disable the connection group. In addition, if there is an optional package with an incorrect version in the connection group, the package is ignored and won’t block the connection group’s virtual environment from being created.

    -

    [How to Make a Connection Group Ignore the Package Version](how-to-make-a-connection-group-ignore-the-package-version.md)

    +

    How to Make a Connection Group Ignore the Package Version

    Limit end users’ publishing capabilities

    Enable only administrators (not end users) to publish packages and to enable connection groups.

    -

    For information about connection groups, see [How to Allow Only Administrators to Enable Connection Groups](how-to-allow-only-administrators-to-enable-connection-groups.md)

    +

    For information about connection groups, see How to Allow Only Administrators to Enable Connection Groups

    For information about packages, see the following articles:

    @@ -525,19 +523,19 @@ You can manage connection groups more easily by using optional packages and othe - + - + - +

    Management console

    [How to Publish a Package by Using the Management Console](how-to-publish-a-package-by-using-the-management-console-50.md)

    How to Publish a Package by Using the Management Console

    PowerShell

    [How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell](how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell.md#bkmk-admin-only-posh-topic-cg)

    How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell

    Third-party electronic software delivery system

    [How to Enable Only Administrators to Publish Packages by Using an ESD](how-to-enable-only-administrators-to-publish-packages-by-using-an-esd.md)

    How to Enable Only Administrators to Publish Packages by Using an ESD

    -

     

    +

    Enable or disable a connection group for a specific user

    @@ -546,18 +544,18 @@ You can manage connection groups more easily by using optional packages and othe
  • Enable-AppVClientConnectionGroup

  • Disable-AppVClientConnectionGroup

  • -

    [How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell](how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell.md#bkmk-enable-cg-for-user-poshtopic)

    +

    How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell

    Merging identical package paths into one virtual directory in connection groups

    If two or more packages in a connection group contain identical directory paths, the paths are merged into a single virtual directory inside the connection group virtual environment.

    This merging of paths allows an application in one package to access files that are in a different package.

    -

    [About the Connection Group Virtual Environment](about-the-connection-group-virtual-environment.md#bkmk-merged-root-ve-exp)

    +

    About the Connection Group Virtual Environment

    -  + ## Administrators can publish and unpublish packages for a specific user @@ -591,7 +589,7 @@ Administrators can use the following cmdlets to publish or unpublish packages fo -  + ## Enable only administrators to publish and unpublish packages @@ -618,12 +616,12 @@ You can enable only administrators (not end users) to publish and unpublish pack

    PowerShell

    -

    [How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell](how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md#bkmk-admins-pub-pkgs)

    +

    How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell

    -  + ## RunVirtual registry key supports packages that are published to the user @@ -655,7 +653,7 @@ New Windows PowerShell cmdlets for the App-V Server have been added to help you

    Add-AppvServerConnectionGroupPackage

    -

    Appends a package to the end of a connection group's package list and enables you to configure the package as optional and/or with no version within the connection group.

    +

    Appends a package to the end of a connection group's package list and enables you to configure the package as optional and/or with no version within the connection group.

    Set-AppvServerConnectionGroupPackage

    @@ -668,7 +666,7 @@ New Windows PowerShell cmdlets for the App-V Server have been added to help you -  + ### Getting help for the PowerShell cmdlets @@ -719,16 +717,16 @@ Cmdlet help is available in the following formats: -

     

    +

    On TechNet as web pages

    -

    See the App-V node under [Microsoft Desktop Optimization Pack Automation with Windows PowerShell](https://technet.microsoft.com/library/dn520245.aspx).

    +

    See the App-V node under Microsoft Desktop Optimization Pack Automation with Windows PowerShell.

    -  + For more information, see [How to Load the PowerShell Cmdlets and Get Cmdlet Help](how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md). @@ -758,11 +756,10 @@ The primary virtual application directory (PVAD) is hidden in App-V 5.0 SP3, but
    1. In the Registry Editor, navigate to: HKLM\SOFTWARE\Microsoft\AppV\Sequencer\Compatibility

      -Note   -

      If the Compatability subkey doesn’t exist, you must create it.

      +Note

      If the Compatability subkey doesn’t exist, you must create it.

      -  +
    2. Create a DWORD Value named EnablePVADControl, and set the value to 1.

      A value of 0 means that PVAD is hidden.

    3. @@ -771,7 +768,7 @@ The primary virtual application directory (PVAD) is hidden in App-V 5.0 SP3, but -  + **More about PVAD:** When you use the Sequencer to create a package, you can enter any installation path for the package. In past versions of App-V, you were required to specify the primary virtual application directory (PVAD) of the application as the path. PVAD is the directory to which you would typically install an application on your local computer if you weren’t using App-V. For example, if you were installing Office on a computer, the PVAD typically would be C:\\Program Files\\Microsoft Office\\. @@ -804,7 +801,7 @@ In App-V 5.0 SP3, you must provide the following values in the address when you -  + For syntax and examples of this query, see [Viewing App-V Server Publishing Metadata](viewing-app-v-server-publishing-metadata.md). @@ -832,9 +829,9 @@ App-V is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part [Release Notes for App-V 5.0 SP3](release-notes-for-app-v-50-sp3.md) -  - -  + + + diff --git a/mdop/appv-v5/about-app-v-50.md b/mdop/appv-v5/about-app-v-50.md index 7741f64825..3274f24d79 100644 --- a/mdop/appv-v5/about-app-v-50.md +++ b/mdop/appv-v5/about-app-v-50.md @@ -56,7 +56,7 @@ The following table displays some of the differences between App-V 4.6 and App-V -

      Must Use a dedicated drive letter (Q:\).

      +

      Must Use a dedicated drive letter (Q:</strong>).

      No dedicated drive letter required.

      @@ -69,7 +69,7 @@ The following table displays some of the differences between App-V 4.6 and App-V

      Dynamic Suite Composition enabled interaction with middleware applications.

      -

      Peer applications are shared using connection groups. For more information about connection groups see, [Managing Connection Groups](managing-connection-groups.md).

      +

      Peer applications are shared using connection groups. For more information about connection groups see, Managing Connection Groups.

      VDI/RDS environments required a read-only shared cache.

      @@ -86,7 +86,7 @@ The following table displays some of the differences between App-V 4.6 and App-V -  + ## How to Get MDOP Technologies @@ -103,9 +103,9 @@ App-V 5.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is p [Getting Started with App-V 5.0](getting-started-with-app-v-50--rtm.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-51-dynamic-configuration.md b/mdop/appv-v5/about-app-v-51-dynamic-configuration.md index f5af0a1482..52ce3487de 100644 --- a/mdop/appv-v5/about-app-v-51-dynamic-configuration.md +++ b/mdop/appv-v5/about-app-v-51-dynamic-configuration.md @@ -50,10 +50,10 @@ The **PackageId** is the same value as exists in the manifest file. The body of the dynamic user configuration file can include all the app extension points defined in the manifest file, as well as information to configure virtual applications. There are four subsections allowed in the body: -1. **[Applications](#applications)** -2. **[Subsystems](#subsystems)** -3. **[UserScripts](#userscripts)** -4. **[ManagingAuthority](#managingauthority)** +1. **[Applications](#applications)** +2. **[Subsystems](#subsystems)** +3. **[UserScripts](#userscripts)** +4. **[ManagingAuthority](#managingauthority)** #### Applications @@ -75,7 +75,6 @@ All app-extensions contained in the manifest file within a package have an Appli .. - ``` #### Subsystems @@ -94,7 +93,6 @@ AppExtensions and other subsystems arranged as subnodes. .. - ``` You can enable or disable each subsystem using the **Enabled** attribute. @@ -107,40 +105,37 @@ Extension subsystems can be enabled and disabled independently of the content. F _**Examples:**_ -- If you define this in either the user or deployment config file, the content in the manifest gets ignored. +- If you define this in either the user or deployment config file, the content in the manifest gets ignored. - ```XML + ```XML - + - + - ... + ... - + - + + ``` +- If you define only the following, the content in the manifest gets integrated during publishing. - ``` -- If you define only the following, the content in the manifest gets integrated during publishing. - - ```XML + ```XML - + + ``` - ``` +- If you define the following, all Shortcuts within the manifest still get ignored. In other words, no Shortcuts get integrated. -- If you define the following, all Shortcuts within the manifest still get ignored. In other words, no Shortcuts get integrated. + ```XML - ```XML + - + - - - - - ``` + + ``` _**Supported extension subsystems:**_ @@ -162,7 +157,7 @@ _**Supported extension subsystems:**_ [{PackageRoot}]\Contoso\ContosoApp.EXE - + [{Windows}]\Installer\{90140000-0011-0000-0000-0000000FF1CE}\inficon.exe @@ -176,7 +171,7 @@ _**Supported extension subsystems:**_ 0 1 - + [{PackageRoot}]\Contoso\ContosoApp.EXE @@ -186,7 +181,7 @@ _**Supported extension subsystems:**_ - + [{AppData}]\Microsoft\Contoso\Recent\Templates.LNK [{AppData}]\Microsoft\Templates @@ -214,7 +209,6 @@ _**Supported extension subsystems:**_ - ``` **File-Type Associates** extension subsystem associates file types with programs to open by default as well as set up the context menu. @@ -239,7 +233,7 @@ _**Supported extension subsystems:**_ contosowordpad.DocumentMacroEnabled.12 document - + application/vnd.ms-contosowordpad.document.macroEnabled.12 @@ -281,7 +275,7 @@ _**Supported extension subsystems:**_ contosowordpad.DocumentMacroEnabled.12 - + [{Windows}]\Installer\{90140000-0011-0000-0000-000000FF1CE}\contosowordpadicon.exe,15 Blah Blah Blah @@ -297,19 +291,19 @@ _**Supported extension subsystems:**_ Open - + {e56fa627-c35f-4a01-9e79-7d36aed8225a} Edit &Edit - + "[{PackageRoot}]\Contoso\WINcontosowordpad.EXE" /vu "%1" - + {e56fa627-c35f-4a01-9e79-7d36aed8225a} Open @@ -345,7 +339,6 @@ _**Supported extension subsystems:**_ - ``` **URL Protocols** extension subsystem controls the URL protocols integrated into the local registry of the client machine, for example, _mailto:_. @@ -435,7 +428,6 @@ _**Supported extension subsystems:**_ - ``` **Software Clients** extension subsystem allows the app to register as an email client, news reader, media player and makes the app visible in the Set program access and Computer defaults UI. In most cases, you should only need to enable and disable it. There is also a control to enable and disable the email client specifically if you want the other clients still enabled except for that client. @@ -447,7 +439,6 @@ _**Supported extension subsystems:**_ - ``` **AppPaths** extension subsystem opens apps registered with an application path. For example, if contoso.exe has an apppath name of _myapp_, users can type _myapp_ from the run menu, opening contoso.exe. @@ -481,19 +472,17 @@ _**Supported extension subsystems:**_ - ``` **COM** extensions subsystem allows an application registered to local COM servers. The mode can be: -- Integration -- Isolated -- Off +- Integration +- Isolated +- Off ```XML - ``` **Virtual Kernel Objects** @@ -501,7 +490,6 @@ _**Supported extension subsystems:**_ ```XML - ``` **Virtual Registry** sets a registry in the virtual registry within HKCU. @@ -525,7 +513,6 @@ _**Supported extension subsystems:**_ - ``` **Virtual File System** @@ -533,7 +520,6 @@ _**Supported extension subsystems:**_ ```XML - ``` **Virtual Fonts** @@ -541,7 +527,6 @@ _**Supported extension subsystems:**_ ```XML - ``` **Virtual Environment Variables** @@ -565,7 +550,6 @@ _**Supported extension subsystems:**_ - ``` **Virtual services** @@ -573,7 +557,6 @@ _**Supported extension subsystems:**_ ```XML - ``` #### UserScripts @@ -588,7 +571,6 @@ Use ManagingAuthority when two versions of your package co-exist on the same mac ```XML - ``` ## Deployment configuration file (DeploymentConfig.xml) @@ -643,7 +625,6 @@ The body of the dynamic deployment configuration file includes two sections: - ``` ### UserConfiguration @@ -654,10 +635,10 @@ Refer to [User configuration file contents (UserConfig.xml)](#user-configuration Use the MachineConfiguration section to configure information for an entire machine; not for a specific user on the computer. For example, HKEY_LOCAL_MACHINE registry keys in the virtual registry. There are four subsections allowed in under this element: -1. **[Subsystems](#subsystems-1)** -2. **[ProductSourceURLOptOut](#productsourceurloptout)** -3. **[MachineScripts](#machinescripts)** -4. **[TerminateChildProcess](#terminatechildprocess)** +1. **[Subsystems](#subsystems-1)** +2. **[ProductSourceURLOptOut](#productsourceurloptout)** +3. **[MachineScripts](#machinescripts)** +4. **[TerminateChildProcess](#terminatechildprocess)** #### Subsystems @@ -676,7 +657,6 @@ AppExtensions and other subsystems arranged as subnodes. … - ``` You can enable or disable each subsystem using the **Enabled** attribute. @@ -703,7 +683,7 @@ This extension also makes the virtual application visible in the Set default pro - + [{PackageRoot}]\LitView\LitViewBrowser.exe @@ -718,10 +698,10 @@ This extension also makes the virtual application visible in the Set default pro - + @[{ProgramFilesX86}]\LitView\LitViewBrowser.exe,-12345 - + @[{ProgramFilesX86}]\LitView\LitViewBrowser.exe,-12346 0 @@ -763,7 +743,6 @@ This extension also makes the virtual application visible in the Set default pro - ``` _**Supported extension subsystems:**_ @@ -789,7 +768,6 @@ _**Supported extension subsystems:**_ - ``` **Machine Wide Virtual Kernel Objects** @@ -805,7 +783,6 @@ _**Supported extension subsystems:**_ - ``` #### ProductSourceURLOptOut @@ -823,7 +800,6 @@ Use ProductSourceURLOptOut to indicate that the URL for the package can be modif ... - ``` #### MachineScripts @@ -855,7 +831,6 @@ An application executable can be specified, whose child processes get terminated ... - ``` @@ -890,11 +865,11 @@ ScriptRunner.exe application. The application then runs each script separately, along with the arguments that you specify for each script. Use only one script (ScriptRunner.exe) per trigger. ->[!NOTE] - ->We recommended that you run the multi-script line from a command prompt -first to make sure that all arguments are built correctly before adding them to -the deployment configuration file. +> [!NOTE] +> +> We recommended that you run the multi-script line from a command prompt +> first to make sure that all arguments are built correctly before adding them to +> the deployment configuration file. ### Example script and parameter descriptions @@ -926,9 +901,9 @@ Name of the event trigger for which you are running a script, such as adding a p The script launcher application that is installed as part of the App-V client installation. ->[!NOTE] - ->Although ScriptRunner.exe is installed as part of the App-V client, the location of the App-V client must be in %path% or ScriptRunner will not run. ScriptRunner.exe is typically located in the C:FilesApplication Virtualizationfolder. +> [!NOTE] +> +> Although ScriptRunner.exe is installed as part of the App-V client, the location of the App-V client must be in %path% or ScriptRunner will not run. ScriptRunner.exe is typically located in the C:FilesApplication Virtualizationfolder. #### \ diff --git a/mdop/appv-v5/about-app-v-51-reporting.md b/mdop/appv-v5/about-app-v-51-reporting.md index d169f6eb72..b667825ee9 100644 --- a/mdop/appv-v5/about-app-v-51-reporting.md +++ b/mdop/appv-v5/about-app-v-51-reporting.md @@ -41,7 +41,7 @@ The following list displays the end–to-end high-level workflow for reporting i **Note**   If you are using the Configuration Manager integration with App-V 5.1, most reports are generated from Configuration Manager rather than from App-V 5.1. -   + 4. After importing the App-V 5.1 PowerShell module using `Import-Module AppvClient` as administrator, enable the App-V 5.1 client. This sample PowerShell cmdlet enables App-V 5.1 reporting: @@ -60,9 +60,11 @@ The following list displays the end–to-end high-level workflow for reporting i **Note**   By default the cache is cleared after the server confirms receipt of data. You can manually configure the client to save the data cache. -   + - If the App-V 5.1 client device does not receive a success notification from the server, it retains data in the cache and tries to resend data at the next configured interval. Clients continue to collect data and add it to the cache. +~~~ +If the App-V 5.1 client device does not receive a success notification from the server, it retains data in the cache and tries to resend data at the next configured interval. Clients continue to collect data and add it to the cache. +~~~ ### App-V 5.1 reporting server frequently asked questions @@ -110,24 +112,23 @@ The following table displays answers to common questions about App-V 5.1 reporti

      Yes. Besides manually sending reporting using PowerShell Cmdlets (Send-AppvClientReport), the task can be scheduled so it will happen automatically. There are two ways to schedule the reporting:

      1. Using PowerShell cmdlets - Set-AppvClientConfiguration. For example:

        -

        Set-AppvClientConfiguration -ReportingEnabled 1 - ReportingServerURL http://any.com/appv-reporting

        +

        Set-AppvClientConfiguration -ReportingEnabled 1 - ReportingServerURL http://any.com/appv-reporting

        -

        For a complete list of client configuration settings see [About Client Configuration Settings](about-client-configuration-settings51.md) and look for the following entries: ReportingEnabled, ReportingServerURL, ReportingDataCacheLimit, ReportingDataBlockSize, ReportingStartTime, ReportingRandomDelay, ReportingInterval.

        +

        For a complete list of client configuration settings see About Client Configuration Settings and look for the following entries: ReportingEnabled, ReportingServerURL, ReportingDataCacheLimit, ReportingDataBlockSize, ReportingStartTime, ReportingRandomDelay, ReportingInterval.

      2. By using Group Policy. If distributed using the domain controller, the settings are the same as previously listed.

        -Note   -

        Group Policy settings override local settings configured using PowerShell.

        +Note

        Group Policy settings override local settings configured using PowerShell.

        -  +
      + -  ## App-V 5.1 Client Reporting @@ -138,10 +139,10 @@ To use App-V 5.1 reporting you must install and configure the App-V 5.1 client. The following examples show how PowerShell parameters can configure the reporting features of the App-V 5.1 client. -**Note**   +**Note** The following configuration task can also be configured using Group Policy settings in the App-V 5.1 ADMX template. For more information about using the ADMX template, see [How to Modify App-V 5.1 Client Configuration Using the ADMX Template and Group Policy](how-to-modify-app-v-51-client-configuration-using-the-admx-template-and-group-policy.md). + -  **To enable reporting and to initiate data collection on the computer running the App-V 5.1 client**: @@ -155,7 +156,7 @@ Set-AppVClientConfiguration –ReportingServerURL http://MyReportingServer:MyPor `-ReportingInterval 1 -ReportingRandomDelay 30` -This example configures the client to automatically send the reporting data to the reporting server URL **http://MyReportingServer:MyPort/**. Additionally, the reporting data will be sent daily between 8:00 and 8:30 PM, depending on the random delay generated for the session. +This example configures the client to automatically send the reporting data to the reporting server URL http://MyReportingServer:MyPort/. Additionally, the reporting data will be sent daily between 8:00 and 8:30 PM, depending on the random delay generated for the session. **To limit the size of the data cache on the client**: @@ -224,8 +225,8 @@ The following table displays the types of information you can collect by using A + -  The client collects and saves this data in an **.xml** format. The data cache is hidden by default and requires administrator rights to open the XML file. @@ -270,20 +271,19 @@ You can also use the **Send-AppVClientReport** cmdlet to manually collect data.

      If you have an existing App-V 5.1 reporting Server, create a customized scheduled task or script. Specify that the client send the data to the specified location with the desired frequency.

      If you do not have an existing App-V 5.1 reporting Server, use the –URL parameter to send the data to a specified share. For example:

      -

      Send-AppVClientReport –URL \\Myshare\MyData\ -DeleteOnSuccess

      -

      The previous example will send the reporting data to \\MyShare\MyData\ location indicated by the -URL parameter. After the data has been sent, the cache is cleared.

      +

      Send-AppVClientReport –URL \Myshare\MyData\ -DeleteOnSuccess

      +

      The previous example will send the reporting data to \MyShare\MyData</strong> location indicated by the -URL parameter. After the data has been sent, the cache is cleared.

      -Note   -

      If a location other than the Reporting Server is specified, the data is sent using .xml format with no additional processing.

      +Note

      If a location other than the Reporting Server is specified, the data is sent using .xml format with no additional processing.

      -  +
      -  + ### Creating Reports @@ -317,9 +317,9 @@ You should also ensure that the reporting server web service’s **Maximum Concu [How to install the Reporting Server on a Standalone Computer and Connect it to the Database](how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database51.md) -  + -  + diff --git a/mdop/appv-v5/about-app-v-51.md b/mdop/appv-v5/about-app-v-51.md index 8479cbe469..dc68560972 100644 --- a/mdop/appv-v5/about-app-v-51.md +++ b/mdop/appv-v5/about-app-v-51.md @@ -55,17 +55,17 @@ See the following links for the App-V 5.1 software prerequisites and supported c -

      [App-V 5.1 Prerequisites](app-v-51-prerequisites.md)

      +

      App-V 5.1 Prerequisites

      Prerequisite software that you must install before starting the App-V 5.1 installation

      -

      [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md)

      +

      App-V 5.1 Supported Configurations

      Supported operating systems and hardware requirements for the App-V Server, Sequencer, and Client components

      -  + **Support for using Configuration Manager with App-V:** App-V 5.1 supports System Center 2012 R2 Configuration Manager SP1. See [Planning for App-V Integration with Configuration Manager](https://technet.microsoft.com/library/jj822982.aspx) for information about integrating your App-V environment with Configuration Manager and Configuration Manager. @@ -98,19 +98,18 @@ Review the following information before you start the upgrade:
    4. App-V Client or App-V Remote Desktop Services (RDS) Client

    -Note   -

    Prior to App-V 5.0 SP2, the Client Management User Interface (UI) was provided with the App-V Client installation. For App-V 5.0 SP2 installations (or later), you can use the Client Management UI by downloading from [Application Virtualization 5.0 Client UI Application](https://www.microsoft.com/download/details.aspx?id=41186).

    +Note

    Prior to App-V 5.0 SP2, the Client Management User Interface (UI) was provided with the App-V Client installation. For App-V 5.0 SP2 installations (or later), you can use the Client Management UI by downloading from Application Virtualization 5.0 Client UI Application.

    -  +

    Upgrading from App-V 4.x

    You must first upgrade to App-V 5.0. You cannot upgrade directly from App-V 4.x to App-V 5.1. For more information, see:

    @@ -129,7 +128,7 @@ Review the following information before you start the upgrade: -  + ### Steps to upgrade the App-V infrastructure @@ -150,11 +149,10 @@ Complete the following steps to upgrade each component of the App-V infrastructu

    Step 1: Upgrade the App-V Server.

    -Note   -

    If you are not using the App-V Server, skip this step and go to the next step.

    +Note

    If you are not using the App-V Server, skip this step and go to the next step.

    -  +

    Follow these steps:

      @@ -177,36 +175,36 @@ Complete the following steps to upgrade each component of the App-V infrastructu

      SQL scripts

      -

      Follow the steps in [How to Deploy the App-V Databases by Using SQL Scripts](how-to-deploy-the-app-v-databases-by-using-sql-scripts.md).

      +

      Follow the steps in How to Deploy the App-V Databases by Using SQL Scripts.

      -
    1. If you are upgrading the App-V Server from App-V 5.0 SP1 Hotfix Package 3 or later, complete the steps in section [Check registry keys after installing the App-V 5.0 SP3 Server](check-reg-key-svr.md).

    2. -
    3. Follow the steps in [How to Deploy the App-V 5.1 Server](how-to-deploy-the-app-v-51-server.md)

    4. -

       

      +
    5. If you are upgrading the App-V Server from App-V 5.0 SP1 Hotfix Package 3 or later, complete the steps in section Check registry keys after installing the App-V 5.0 SP3 Server.

    6. +
    7. Follow the steps in How to Deploy the App-V 5.1 Server

    8. +

    Step 2: Upgrade the App-V Sequencer.

    -

    See [How to Install the Sequencer](how-to-install-the-sequencer-beta-gb18030.md).

    +

    See How to Install the Sequencer.

    Step 3: Upgrade the App-V Client or App-V RDS Client.

    -

    See [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md).

    +

    See How to Deploy the App-V Client.

    -  + ### Converting packages created using a prior version of App-V Use the package converter utility to upgrade virtual application packages created using versions of App-V prior to App-V 5.0. The package converter uses PowerShell to convert packages and can help automate the process if you have many packages that require conversion. -**Note**   +**Note** App-V 5.1 packages are exactly the same as App-V 5.0 packages. There has been no change in the package format between the versions and so there is no need to convert App-V 5.0 packages to App-V 5.1 packages. -  + ## What’s New in App-V 5.1 @@ -249,7 +247,7 @@ The following table lists the Windows 10 support for App-V. Windows 10 is not su -  + ### App-V Management Console Changes @@ -294,7 +292,7 @@ The Management Console UI no longer requires Silverlight. The 5.1 Management Con -  + ### Console pages are now separate URLs @@ -318,7 +316,7 @@ The Management Console UI no longer requires Silverlight. The 5.1 Management Con -  + ### New, separate CONNECTION GROUPS page and menu option @@ -341,7 +339,7 @@ The Management Console UI no longer requires Silverlight. The 5.1 Management Con -  + ### Menu options for packages have changed @@ -397,7 +395,7 @@ The Management Console UI no longer requires Silverlight. The 5.1 Management Con -  + ### Icons in left pane have new colors and text @@ -417,10 +415,10 @@ You can import and export the AppxManifest.xml file. To export the manifest file After you make your changes, click **Import...** and select the file you edited. After you successfully import it back in, the manifest file is immediately updated within the package editor. -**Caution**   +**Caution** When you import the file, your changes are validated against the XML schema. If the file is not valid, you will receive an error. Be aware that it is possible to import a file that is validated against the XML schema, but that might still fail to run for other reasons. -  + ### Addition of Windows 10 to operating systems list @@ -519,9 +517,9 @@ App-V is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part [Release Notes for App-V 5.1](release-notes-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/about-client-configuration-settings.md b/mdop/appv-v5/about-client-configuration-settings.md index b4e710eab0..160b670a59 100644 --- a/mdop/appv-v5/about-client-configuration-settings.md +++ b/mdop/appv-v5/about-client-configuration-settings.md @@ -127,153 +127,143 @@ The following table displays information about the App-V 5.0 client configuratio

    Name

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    PUBLISHINGSERVERNAME

    Displays the name of publishing server.

    String

    -

    Publishing\Servers\{serverId}\FriendlyName

    +

    Publishing\Servers{serverId}\FriendlyName

    Policy value not written (same as Not Configured)

    URL

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    PUBLISHINGSERVERURL

    Displays the URL of publishing server.

    String

    -

    Publishing\Servers\{serverId}\URL

    +

    Publishing\Servers{serverId}\URL

    Policy value not written (same as Not Configured)

    GlobalRefreshEnabled

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    GLOBALREFRESHENABLED

    Enables global publishing refresh (Boolean)

    True(enabled); False(Disabled state)

    -

    Publishing\Servers\{serverId}\GlobalEnabled

    +

    Publishing\Servers{serverId}\GlobalEnabled

    False

    GlobalRefreshOnLogon

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    GLOBALREFRESHONLOGON

    Triggers a global publishing refresh on logon. ( Boolean)

    True(enabled); False(Disabled state)

    -

    Publishing\Servers\{serverId}\GlobalLogonRefresh

    +

    Publishing\Servers{serverId}\GlobalLogonRefresh

    False

    GlobalRefreshInterval

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +
    -

    GLOBALREFRESHINTERVAL  

    +

    GLOBALREFRESHINTERVAL

    Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0.

    Integer (0-744

    -

    Publishing\Servers\{serverId}\GlobalPeriodicRefreshInterval

    +

    Publishing\Servers{serverId}\GlobalPeriodicRefreshInterval

    0

    GlobalRefreshIntervalUnit

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    GLOBALREFRESHINTERVALUNI

    -

    Specifies the interval unit (Hour 0-23, Day 0-31). 

    +

    Specifies the interval unit (Hour 0-23, Day 0-31).

    0 for hour, 1 for day

    -

    Publishing\Servers\{serverId}\GlobalPeriodicRefreshIntervalUnit

    +

    Publishing\Servers{serverId}\GlobalPeriodicRefreshIntervalUnit

    1

    UserRefreshEnabled

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +
    -

    USERREFRESHENABLED 

    +

    USERREFRESHENABLED

    Enables user publishing refresh (Boolean)

    True(enabled); False(Disabled state)

    -

    Publishing\Servers\{serverId}\UserEnabled

    +

    Publishing\Servers{serverId}\UserEnabled

    False

    UserRefreshOnLogon

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +

    USERREFRESHONLOGON

    Triggers a user publishing refresh onlogon. ( Boolean)

    Word count (with spaces): 60

    True(enabled); False(Disabled state)

    -

    Publishing\Servers\{serverId}\UserLogonRefresh

    +

    Publishing\Servers{serverId}\UserLogonRefresh

    False

    UserRefreshInterval

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +
    -

    USERREFRESHINTERVAL     

    +

    USERREFRESHINTERVAL

    Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0.

    Word count (with spaces): 85

    Integer (0-744 Hours)

    -

    Publishing\Servers\{serverId}\UserPeriodicRefreshInterval

    +

    Publishing\Servers{serverId}\UserPeriodicRefreshInterval

    0

    UserRefreshIntervalUnit

    -Note   -

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    +Note

    This setting cannot be modified using the set-AppvclientConfiguration cmdLet. You must use the Set-AppvPublishingServer cmdlet.

    -  +
    -

    USERREFRESHINTERVALUNIT  

    -

    Specifies the interval unit (Hour 0-23, Day 0-31). 

    +

    USERREFRESHINTERVALUNIT

    +

    Specifies the interval unit (Hour 0-23, Day 0-31).

    0 for hour, 1 for day

    -

    Publishing\Servers\{serverId}\UserPeriodicRefreshIntervalUnit

    +

    Publishing\Servers{serverId}\UserPeriodicRefreshIntervalUnit

    1

    @@ -303,7 +293,7 @@ The following table displays information about the App-V 5.0 client configuratio

    RoamingFileExclusions

    ROAMINGFILEEXCLUSIONS

    -

    Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:  /ROAMINGFILEEXCLUSIONS='desktop;my pictures'

    +

    Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /ROAMINGFILEEXCLUSIONS='desktop;my pictures'

    @@ -311,7 +301,7 @@ The following table displays information about the App-V 5.0 client configuratio

    RoamingRegistryExclusions

    ROAMINGREGISTRYEXCLUSIONS

    -

    Specifies the registry paths that do not roam with a user profile. Example usage: /ROAMINGREGISTRYEXCLUSIONS=software\\classes;software\\clients

    +

    Specifies the registry paths that do not roam with a user profile. Example usage: /ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients

    String

    Integration\RoamingReglstryExclusions

    Policy value not written (same as Not Configured)

    @@ -337,7 +327,7 @@ The following table displays information about the App-V 5.0 client configuratio

    Not available.

    A comma -delineated list of file name extensions that can be used to determine if a locally installed application can be run in the virtual environment.

    When shortcuts, FTAs, and other extension points are created during publishing, App-V will compare the file name extension to the list if the application that is associated with the extension point is locally installed. If the extension is located, the RunVirtual command line parameter will be added, and the application will run virtually.

    -

    For more information about the RunVirtual parameter, see [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md).

    +

    For more information about the RunVirtual parameter, see Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications.

    String

    Integration\VirtualizableExtensions

    Policy value not written

    @@ -379,11 +369,10 @@ The following table displays information about the App-V 5.0 client configuratio

    Not available.

    Specifies the time to initiate the client to send data to the reporting server. You must specify a valid integer between 0-23 corresponding to the hour of the day. By default the ReportingStartTime will start on the current day at 10 P.M.or 22.

    -Note   -

    You should configure this setting to a time when computers running the App-V 5.0 client are least likely to be offline.

    +Note

    You should configure this setting to a time when computers running the App-V 5.0 client are least likely to be offline.

    -  +

    Integer (0 – 23)

    Reporting\ StartTime

    @@ -408,11 +397,10 @@ The following table displays information about the App-V 5.0 client configuratio

    EnableDynamicVirtualization

    -Important   -

    This setting is available only with App-V 5.0 SP2 or later.

    +Important

    This setting is available only with App-V 5.0 SP2 or later.

    -  +

    Not available.

    Enables supported Shell Extensions, Browser Helper Objects, and Active X controls to be virtualized and run with virtual applications.

    @@ -423,11 +411,10 @@ The following table displays information about the App-V 5.0 client configuratio

    EnablePublishingRefreshUI

    -Important   -

    This setting is available only with App-V 5.0 SP2.

    +Important

    This setting is available only with App-V 5.0 SP2.

    -  +

    Not available.

    Enables the publishing refresh progress bar for the computer running the App-V 5.0 Client.

    @@ -438,11 +425,10 @@ The following table displays information about the App-V 5.0 client configuratio

    HideUI

    -Important   -

    This setting is available only with App-V 5.0 SP2.

    +Important

    This setting is available only with App-V 5.0 SP2.

    -  +

    Not available.

    Hides the publishing refresh progress bar.

    @@ -461,7 +447,7 @@ The following table displays information about the App-V 5.0 client configuratio -  + @@ -477,9 +463,9 @@ The following table displays information about the App-V 5.0 client configuratio [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md) -  - -  + + + diff --git a/mdop/appv-v5/about-the-connection-group-file.md b/mdop/appv-v5/about-the-connection-group-file.md index 8697d90f82..a51728aceb 100644 --- a/mdop/appv-v5/about-the-connection-group-file.md +++ b/mdop/appv-v5/about-the-connection-group-file.md @@ -47,12 +47,12 @@ ms.date: 06/16/2016

    Example file path

    -

    %APPDATA%\Microsoft\AppV\Client\Catalog\PackageGroups\{6CCC7575-162E-4152-9407-ED411DA138F4}\{4D1E16E1-8EF8-41ED-92D5-8910A8527F96}.

    +

    %APPDATA%\Microsoft\AppV\Client\Catalog\PackageGroups{6CCC7575-162E-4152-9407-ED411DA138F4}{4D1E16E1-8EF8-41ED-92D5-8910A8527F96}.

    -  + ## Structure of the connection group XML file @@ -87,7 +87,7 @@ The following table describes the parameters in the XML file that define the con

    Schema name

    Name of the schema.

    Applicable starting in App-V 5.0 SP3: If you want to use the new “optional packages” and “use any version” features that are described in this table, you must specify the following schema in the XML file:

    -

    xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup"

    +

    xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup";

    AppConnectionGroupId

    @@ -112,7 +112,7 @@ The following table describes the parameters in the XML file that define the con -  + ### Parameters that define the packages in the connection group @@ -146,24 +146,66 @@ In the <Packages> section of the connection group XML file, you list the m
  • “true” – package is optional in the connection group

  • “false” – package is required in the connection group

  • -

    See [How to Use Optional Packages in Connection Groups](how-to-use-optional-packages-in-connection-groups.md).

    +

    See How to Use Optional Packages in Connection Groups.

    -  + ### App-V 5.0 SP3 example connection group XML file The following example connection group XML file shows examples of the fields in the previous tables and highlights the items that are new for App-V 5.0 SP3. -````` `` `` `` ` +```XML + + + + + + + +``` ### App-V 5.0 through App-V 5.0 SP2 example connection group XML file The following example connection group XML file applies to App-V 5.0 through App-V 5.0 SP2. It shows examples of the fields in the previous table, but it excludes the changes described above for App-V 5.0 SP3. -````` `` `` `` ` +```XML + + + + + + +Configuring the priority of packages in a connection group @@ -179,7 +221,7 @@ You can use the connection group file to configure each connection group by usin **Note**   Priority is required only if the package is associated with more than one connection group. -   + - Specify package precedence within the connection group. @@ -274,7 +316,7 @@ The virtual application Microsoft Outlook is running in virtual environment **XY -  + @@ -286,9 +328,9 @@ The virtual application Microsoft Outlook is running in virtual environment **XY [Managing Connection Groups](managing-connection-groups.md) -  + -  + diff --git a/mdop/appv-v5/about-the-connection-group-file51.md b/mdop/appv-v5/about-the-connection-group-file51.md index 3261158e05..dc1e42ccbb 100644 --- a/mdop/appv-v5/about-the-connection-group-file51.md +++ b/mdop/appv-v5/about-the-connection-group-file51.md @@ -47,12 +47,12 @@ ms.date: 06/16/2016

    Example file path

    -

    %APPDATA%\Microsoft\AppV\Client\Catalog\PackageGroups\{6CCC7575-162E-4152-9407-ED411DA138F4}\{4D1E16E1-8EF8-41ED-92D5-8910A8527F96}.

    +

    %APPDATA%\Microsoft\AppV\Client\Catalog\PackageGroups{6CCC7575-162E-4152-9407-ED411DA138F4}{4D1E16E1-8EF8-41ED-92D5-8910A8527F96}.

    -  + ## Structure of the connection group XML file @@ -87,7 +87,7 @@ The following table describes the parameters in the XML file that define the con

    Schema name

    Name of the schema.

    Applicable starting in App-V 5.0 SP3: If you want to use the new “optional packages” and “use any version” features that are described in this table, you must specify the following schema in the XML file:

    -

    xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup"

    +

    xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup";

    AppConnectionGroupId

    @@ -112,7 +112,7 @@ The following table describes the parameters in the XML file that define the con -  + ### Parameters that define the packages in the connection group @@ -146,24 +146,66 @@ In the <Packages> section of the connection group XML file, you list the m
  • “true” – package is optional in the connection group

  • “false” – package is required in the connection group

  • -

    See [How to Use Optional Packages in Connection Groups](how-to-use-optional-packages-in-connection-groups51.md).

    +

    See How to Use Optional Packages in Connection Groups.

    -  + ### App-V example connection group XML file The following example connection group XML file shows examples of the fields in the previous tables and highlights the items that are new starting in App-V 5.0 SP3. -````` `` `` `` ` +```XML + + + + + + + +``` ### App-V 5.0 through App-V 5.0 SP2 example connection group XML file The following example connection group XML file applies to App-V 5.0 through App-V 5.0 SP2. It shows examples of the fields in the previous table, but it excludes the changes described above for App-V 5.0 SP3. -````` `` `` `` ` +```XML + + + + + + + +``` ## Configuring the priority of packages in a connection group @@ -179,7 +221,7 @@ You can use the connection group file to configure each connection group by usin **Note**   Priority is required only if the package is associated with more than one connection group. -   + - Specify package precedence within the connection group. @@ -274,7 +316,7 @@ The virtual application Microsoft Outlook is running in virtual environment **XY -  + @@ -286,9 +328,9 @@ The virtual application Microsoft Outlook is running in virtual environment **XY [Managing Connection Groups](managing-connection-groups51.md) -  + -  + diff --git a/mdop/appv-v5/accessibility-for-app-v-50.md b/mdop/appv-v5/accessibility-for-app-v-50.md index 2e6d737671..212a97c555 100644 --- a/mdop/appv-v5/accessibility-for-app-v-50.md +++ b/mdop/appv-v5/accessibility-for-app-v-50.md @@ -25,7 +25,7 @@ Microsoft is committed to making its products and services easier for everyone t **Important**   The information in this section only applies to the App-V 5.0 sequencer. For specific information about the App-V 5.0 server, see the Keyboard Shortcuts for the App-V 5.0 Management Server section of this document. -  + Access keys let you quickly use a command by pressing a few keys. You can get to most commands by using two keystrokes. To use an access key: @@ -38,7 +38,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Keyboard Shortcuts for the App-V 5.0 Management Server @@ -80,7 +80,7 @@ Keyboard Shortcuts for the App-V 5.0 Management Server: -  + ## Documentation in Alternative Formats @@ -114,13 +114,13 @@ For information about the availability of Microsoft product documentation and bo

    (609) 987-8116

    -

    [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

    +

    http://www.learningally.org/

    Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

    -  + ## Customer Service for People with Hearing Impairments @@ -143,9 +143,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with App-V 5.0](getting-started-with-app-v-50--rtm.md) -  + -  + diff --git a/mdop/appv-v5/accessibility-for-app-v-51.md b/mdop/appv-v5/accessibility-for-app-v-51.md index bcde953270..4203a2e9ff 100644 --- a/mdop/appv-v5/accessibility-for-app-v-51.md +++ b/mdop/appv-v5/accessibility-for-app-v-51.md @@ -51,7 +51,7 @@ Following are the keyboard Shortcuts for the App-V 5.1 Management Server: -  + ## Keyboard Shortcuts for the App-V 5.1 Sequencer @@ -81,14 +81,14 @@ Following are the keyboard shortcuts for the Virtual Registry tab in the package -  + ### Access Any Command with a Few Keystrokes **Important**   The information in this section only applies to the App-V 5.1 sequencer. For specific information about the App-V 5.1 server, see the Keyboard Shortcuts for the App-V 5.1 Management Server section of this document. -  + Access keys let you quickly use a command by pressing a few keys. You can get to most commands by using two keystrokes. To use an access key: @@ -101,7 +101,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in Alternative Formats @@ -135,13 +135,13 @@ For information about the availability of Microsoft product documentation and bo

    (609) 987-8116

    -

    [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

    +

    http://www.learningally.org/

    Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

    -  + ## Customer Service for People with Hearing Impairments @@ -164,9 +164,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with App-V 5.1](getting-started-with-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/administering-app-v-51-by-using-powershell.md b/mdop/appv-v5/administering-app-v-51-by-using-powershell.md index 02dc48a963..f886b1e0a0 100644 --- a/mdop/appv-v5/administering-app-v-51-by-using-powershell.md +++ b/mdop/appv-v5/administering-app-v-51-by-using-powershell.md @@ -37,54 +37,54 @@ Use the following PowerShell procedures to perform various App-V 5.1 tasks. -

    [How to Load the PowerShell Cmdlets and Get Cmdlet Help](how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-51.md)

    +

    How to Load the PowerShell Cmdlets and Get Cmdlet Help

    Describes how to install the PowerShell cmdlets and find cmdlet help and examples.

    -

    [How to Manage App-V 5.1 Packages Running on a Stand-Alone Computer by Using PowerShell](how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md)

    +

    How to Manage App-V 5.1 Packages Running on a Stand-Alone Computer by Using PowerShell

    Describes how to manage the client package lifecycle on a stand-alone computer using PowerShell.

    -

    [How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell](how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell51.md)

    +

    How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell

    Describes how to manage connection groups using PowerShell.

    -

    [How to Modify Client Configuration by Using PowerShell](how-to-modify-client-configuration-by-using-powershell51.md)

    +

    How to Modify Client Configuration by Using PowerShell

    Describes how to modify the client using PowerShell.

    -

    [How to Apply the User Configuration File by Using PowerShell](how-to-apply-the-user-configuration-file-by-using-powershell51.md)

    +

    How to Apply the User Configuration File by Using PowerShell

    Describes how to apply a user configuration file using PowerShell.

    -

    [How to Apply the Deployment Configuration File by Using PowerShell](how-to-apply-the-deployment-configuration-file-by-using-powershell51.md)

    +

    How to Apply the Deployment Configuration File by Using PowerShell

    Describes how to apply a deployment configuration file using PowerShell.

    -

    [How to Sequence a Package by Using PowerShell](how-to-sequence-a-package--by-using-powershell-51.md)

    +

    How to Sequence a Package by Using PowerShell

    Describes how to create a new package using PowerShell.

    -

    [How to Create a Package Accelerator by Using PowerShell](how-to-create-a-package-accelerator-by-using-powershell51.md)

    +

    How to Create a Package Accelerator by Using PowerShell

    Describes how to create a package accelerator using PowerShell. You can use package accelerators automatically sequence large, complex applications.

    -

    [How to Enable Reporting on the App-V 5.1 Client by Using PowerShell](how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md)

    +

    How to Enable Reporting on the App-V 5.1 Client by Using PowerShell

    Describes how to enable the computer running the App-V 5.1 to send reporting information.

    -

    [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell](how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md)

    +

    How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell

    Describes how to take an array of account names and to convert each of them to the corresponding SID in standard and hexadecimal formats.

    -  + **Important**   Make sure that any script you execute with your App-V packages matches the execution policy that you have configured for PowerShell. -  + ## PowerShell Error Handling @@ -121,7 +121,7 @@ Use the following table for information about App-V 5.1 PowerShell error handlin -  + @@ -133,9 +133,9 @@ Use the following table for information about App-V 5.1 PowerShell error handlin [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/administering-app-v-51-virtual-applications-by-using-the-management-console.md b/mdop/appv-v5/administering-app-v-51-virtual-applications-by-using-the-management-console.md index 779a16968f..c7353edde7 100644 --- a/mdop/appv-v5/administering-app-v-51-virtual-applications-by-using-the-management-console.md +++ b/mdop/appv-v5/administering-app-v-51-virtual-applications-by-using-the-management-console.md @@ -89,12 +89,12 @@ The main elements of the App-V 5.1 Management Console are: -  + **Important**   JavaScript must be enabled on the browser that opens the Web Management Console. -  + @@ -108,9 +108,9 @@ JavaScript must be enabled on the browser that opens the Web Management Console. - [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/administering-app-v-by-using-powershell.md b/mdop/appv-v5/administering-app-v-by-using-powershell.md index 8ad909ee12..bb48457dc6 100644 --- a/mdop/appv-v5/administering-app-v-by-using-powershell.md +++ b/mdop/appv-v5/administering-app-v-by-using-powershell.md @@ -37,49 +37,49 @@ Use the following PowerShell procedures to perform various App-V 5.0 tasks. -

    [How to Load the PowerShell Cmdlets and Get Cmdlet Help](how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md)

    +

    How to Load the PowerShell Cmdlets and Get Cmdlet Help

    Describes how to install the PowerShell cmdlets and find cmdlet help and examples.

    -

    [How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell](how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md)

    +

    How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell

    Describes how to manage the client package lifecycle on a stand-alone computer using PowerShell.

    -

    [How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell](how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell.md)

    +

    How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell

    Describes how to manage connection groups using PowerShell.

    -

    [How to Modify Client Configuration by Using PowerShell](how-to-modify-client-configuration-by-using-powershell.md)

    +

    How to Modify Client Configuration by Using PowerShell

    Describes how to modify the client using PowerShell.

    -

    [How to Apply the User Configuration File by Using PowerShell](how-to-apply-the-user-configuration-file-by-using-powershell.md)

    +

    How to Apply the User Configuration File by Using PowerShell

    Describes how to apply a user configuration file using PowerShell.

    -

    [How to Apply the Deployment Configuration File by Using PowerShell](how-to-apply-the-deployment-configuration-file-by-using-powershell.md)

    +

    How to Apply the Deployment Configuration File by Using PowerShell

    Describes how to apply a deployment configuration file using PowerShell.

    -

    [How to Sequence a Package by Using PowerShell](how-to-sequence-a-package--by-using-powershell-50.md)

    +

    How to Sequence a Package by Using PowerShell

    Describes how to create a new package using PowerShell.

    -

    [How to Create a Package Accelerator by Using PowerShell](how-to-create-a-package-accelerator-by-using-powershell.md)

    +

    How to Create a Package Accelerator by Using PowerShell

    Describes how to create a package accelerator using PowerShell. You can use package accelerators automatically sequence large, complex applications.

    -

    [How to Enable Reporting on the App-V 5.0 Client by Using PowerShell](how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md)

    +

    How to Enable Reporting on the App-V 5.0 Client by Using PowerShell

    Describes how to enable the computer running the App-V 5.0 to send reporting information.

    -

    [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell](how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md)

    +

    How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell

    Describes how to take an array of account names and to convert each of them to the corresponding SID in standard and hexadecimal formats.

    -  + ## PowerShell Error Handling @@ -116,7 +116,7 @@ Use the following table for information about App-V 5.0 PowerShell error handlin -  + @@ -128,9 +128,9 @@ Use the following table for information about App-V 5.0 PowerShell error handlin [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/app-v-50-capacity-planning.md b/mdop/appv-v5/app-v-50-capacity-planning.md index 7e3145dd58..08dd56a49b 100644 --- a/mdop/appv-v5/app-v-50-capacity-planning.md +++ b/mdop/appv-v5/app-v-50-capacity-planning.md @@ -22,7 +22,7 @@ The following recommendations can be used as a baseline to help determine capaci **Important**   Use the information in this section only as a general guide for planning your App-V 5.0 deployment. Your system capacity requirements will depend on the specific details of your hardware and application environment. Additionally, the performance numbers displayed in this document are examples and your results may vary. -  + ## Determine the Project Scope @@ -52,7 +52,7 @@ Before you design the App-V 5.0 infrastructure, you must determine the project -  + ## Determine Which App-V 5.0 Infrastructure is Required @@ -62,7 +62,7 @@ Both of the following models require the App-V 5.0 client to be installed on the You can also manage your App-V 5.0 environment using an Electronic Software Distribution (ESD) solution such as Microsoft Systems Center Configuration Manager. For more information see [Deploying App-V 5.0 Packages by Using Electronic Software Distribution (ESD)](deploying-app-v-50-packages-by-using-electronic-software-distribution--esd-.md). -  + - **Standalone Model** - The standalone model allows virtual applications to be Windows Installer-enabled for distribution without streaming. App-V 5.0 in Standalone Mode consists of the sequencer and the client; no additional components are required. Applications are prepared for virtualization using a process called sequencing. For more information see, [Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md). The stand-alone model is recommended for the following scenarios: @@ -77,7 +77,7 @@ You can also manage your App-V 5.0 environment using an Electronic Software Dist **Important**   The App-V 5.0 full infrastructure model requires Microsoft SQL Server to store configuration data. For more information see [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md). -   + - When you want to use the Management Server to publish the application to target computers. @@ -93,7 +93,7 @@ The following section provides information about end-to-end App-V 5.0 sizing and **Note**   Round trip response time on the client is the time taken by the computer running the App-V 5.0 client to receive a successful notification from the publishing server. Round trip response time on the publishing server is the time taken by the computer running the publishing server to receive a successful package metadata update from the management server. -  + - 20,000 clients can target a single publishing server to obtain the package refreshes in an acceptable round trip time. (<3 seconds) @@ -107,7 +107,7 @@ The App-V 5.0 publishing servers require the management server for package refre **Note**   The default refresh time on the App-V 5.0 publishing server is ten minutes. -  + When multiple simultaneous publishing servers contact a single management server for package metadata refreshes, the following three factors influence the round trip response time on the publishing server: @@ -122,7 +122,7 @@ The following table displays more information about each factor that impacts rou **Note**   Round trip response time is the time taken by the computer running the App-V 5.0 publishing server to receive a successful package metadata update from the management server. -  + @@ -166,7 +166,7 @@ Round trip response time is the time taken by the computer running the App-V 5.0
    -  + The following table displays sample values for each of the previous factors. In each variation, 120 packages are refreshed from the App-V 5.0management server. @@ -359,7 +359,7 @@ The following table displays sample values for each of the previous factors. In -  + The CPU utilization of the computer running the management server is around 25% irrespective of the number of publishing servers targeting it. The Microsoft SQL Server database transactions/sec, batch requests/sec and user connections are identical irrespective of the number of publishing servers. For example: Transactions/sec is ~30, batch requests ~200, and user connects ~6. @@ -460,7 +460,7 @@ Using a geographically distributed deployment, where the management server & pub -  + Whether the management server and publishing servers are connected over a slow link network, or a high speed network, the management server can handle approximately 15,000 package refresh requests in 30 minutes. @@ -472,7 +472,7 @@ App-V 5.0 clients send reporting data to the reporting server. The reporting ser **Note**   Round trip response time is the time taken by the computer running the App-V 5.0 client to send the reporting information to the reporting server and receive a successful notification from the reporting server. -  + @@ -518,7 +518,7 @@ Round trip response time is the time taken by the computer running the App-V 5.0
    -  + **Calculating random delay**: @@ -542,7 +542,7 @@ The following list displays the main factors to consider when setting up the App - The available network bandwidth in your environment between the client and the App-V 5.0 publishing server. -  + @@ -585,12 +585,12 @@ The following list displays the main factors to consider when setting up the App
    -  + **Note**   The publishing server CPU usage is always high during the time interval when it has to process simultaneous requests (>90% in most cases). The publishing server can handle ~1500 client requests in 1 second. -  + @@ -732,7 +732,7 @@ The publishing server CPU usage is always high during the time interval when it
    -  + ## App-V 5.0 Streaming Capacity Planning Recommendations @@ -748,7 +748,7 @@ The following list identifies the main factors to consider when setting up the A - The available network bandwidth in your environment between the client and the streaming server. -  + @@ -788,7 +788,7 @@ The following list identifies the main factors to consider when setting up the A
    -  + The following table displays sample values for each of the factors in the previous list: @@ -917,14 +917,14 @@ The following table displays sample values for each of the factors in the previo -  + Each App-V 5.0 streaming server should be able to handle a minimum of 200 clients concurrently streaming virtualized applications. **Note**   The actual time to it will take to stream is determined primarily by the number of clients streaming simultaneously, number of packages, package size, the server’s network activity, and network conditions. -  + For example, an average user can stream a 100 MB package in less than 2 minutes, when 100 simultaneous clients are streaming from the server. However, a package of size 1 GB could take up to 30 minutes. In most real world environments streaming demand is not uniformly distributed, you will need to understand the approximate peak streaming requirements present in your environment in order to properly size the number of required streaming servers. @@ -953,9 +953,9 @@ Although there are a number of fault-tolerance strategies and technologies avail [Planning to Deploy App-V](planning-to-deploy-app-v.md) -  + -  + diff --git a/mdop/appv-v5/app-v-50-deployment-checklist.md b/mdop/appv-v5/app-v-50-deployment-checklist.md index 66951808f4..7c93ec0b2e 100644 --- a/mdop/appv-v5/app-v-50-deployment-checklist.md +++ b/mdop/appv-v5/app-v-50-deployment-checklist.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 This checklist can be used to help you during Microsoft Application Virtualization (App-V) 5.0 deployment. -**Note**   +**Note** This checklist outlines the recommended steps and a high-level list of items to consider when deploying App-V 5.0 features. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,37 +43,36 @@ This checklist outlines the recommended steps and a high-level list of items to - + - +
    Checklist box

    Complete the planning phase to prepare the computing environment for App-V 5.0 deployment.

    [App-V 5.0 Planning Checklist](app-v-50-planning-checklist.md)

    App-V 5.0 Planning Checklist

    Checklist box

    Review the App-V 5.0 supported configurations information to make sure selected client and server computers are supported for App-V 5.0 feature installation.

    [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md)

    App-V 5.0 Supported Configurations

    Checklist box

    Run App-V 5.0 Setup to deploy the required App-V 5.0 features for your environment.

    -Note   -

    Keep track of the names of the servers and associated URL’s created during installation. This information will be used throughout the installation process.

    +Note

    Keep track of the names of the servers and associated URL’s created during installation. This information will be used throughout the installation process.

    -  +

    -  + @@ -85,9 +84,9 @@ This checklist outlines the recommended steps and a high-level list of items to [Deploying App-V 5.0](deploying-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-50-planning-checklist.md b/mdop/appv-v5/app-v-50-planning-checklist.md index fdf893496a..30a1d1f33e 100644 --- a/mdop/appv-v5/app-v-50-planning-checklist.md +++ b/mdop/appv-v5/app-v-50-planning-checklist.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for an App-V 5.0 deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,43 +43,43 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - + - + - + - +
    Checklist box

    Review the getting started information about App-V 5.0 to gain a basic understanding of the product before beginning deployment planning.

    [Getting Started with App-V 5.0](getting-started-with-app-v-50--rtm.md)

    Getting Started with App-V 5.0

    Checklist box

    Plan for App-V 5.0 1.0 Deployment Prerequisites and prepare your computing environment.

    [App-V 5.0 Prerequisites](app-v-50-prerequisites.md)

    App-V 5.0 Prerequisites

    Checklist box

    If you plan to use the App-V 5.0 management server, plan for the required roles.

    [Planning for the App-V 5.0 Server Deployment](planning-for-the-app-v-50-server-deployment.md)

    Planning for the App-V 5.0 Server Deployment

    Checklist box

    Plan for the App-V 5.0 sequencer and client so you to create and run virtualized applications.

    [Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md)

    Planning for the App-V 5.0 Sequencer and Client Deployment

    Checklist box

    If applicable, review the options and steps for migrating from a previous version of App-V.

    [Planning for Migrating from a Previous Version of App-V](planning-for-migrating-from-a-previous-version-of-app-v.md)

    Planning for Migrating from a Previous Version of App-V

    Checklist box

    Plan for running App-V 5.0 clients using in shared content store mode.

    [How to Install the App-V 5.0 Client for Shared Content Store Mode](how-to-install-the-app-v-50-client-for-shared-content-store-mode.md)

    How to Install the App-V 5.0 Client for Shared Content Store Mode

    -  + @@ -91,9 +91,9 @@ This checklist outlines the recommended steps and a high-level list of items to [Planning for App-V 5.0](planning-for-app-v-50-rc.md) -  + -  + diff --git a/mdop/appv-v5/app-v-50-prerequisites.md b/mdop/appv-v5/app-v-50-prerequisites.md index 369819039b..2ec3a98531 100644 --- a/mdop/appv-v5/app-v-50-prerequisites.md +++ b/mdop/appv-v5/app-v-50-prerequisites.md @@ -19,7 +19,7 @@ ms.date: 08/30/2016 Before you begin the Microsoft Application Virtualization (App-V) 5.0 Setup, you should make sure that you have met the prerequisites to install the product. This topic contains information to help you successfully plan for preparing your computing environment before you deploy the App-V 5.0 features. -**Important**   +**Important** **The prerequisites in this article apply only to App-V 5.0**. For additional prerequisites that apply to App-V 5.0 Service Packs, see the following web pages: - [What's new in App-V 5.0 SP1](whats-new-in-app-v-50-sp1.md) @@ -28,7 +28,7 @@ Before you begin the Microsoft Application Virtualization (App-V) 5.0 Setup, you - [App-V 5.0 SP3 Prerequisites](app-v-50-sp3-prerequisites.md) -  + The following table lists prerequisite information that pertains to specific operating systems. @@ -53,7 +53,7 @@ The following table lists prerequisite information that pertains to specific ope

    The following prerequisites are already installed:

    • Microsoft .NET Framework 4.5 – you do not need Microsoft .NET Framework 4

    • -
    • Windows PowerShell 3.0

    • +
    • Windows PowerShell 3.0

    @@ -63,21 +63,21 @@ The following table lists prerequisite information that pertains to specific ope
  • Windows Server 2008

  • You may want to download the following KB:

    -

    [Microsoft Security Advisory: Insecure library loading could allow remote code execution](https://support.microsoft.com/kb/2533623)

    +

    Microsoft Security Advisory: Insecure library loading could allow remote code execution

    Be sure to check for subsequent KBs that have superseded this one, and note that some KBs may require that you uninstall previous updates.

    -  + ## Installation prerequisites for App-V 5.0 -**Note**   -The following prerequisites are already installed for computers that run Windows 8. +**Note** +The following prerequisites are already installed for computers that run Windows 8. + -  Each of the App-V 5.0 features have specific prerequisites that must be met before the App-V 5.0 features can be successfully installed. @@ -100,48 +100,46 @@ The following table lists the installation prerequisites for the App-V 5.0 clien

    Software requirements

    -  + ### Prerequisites for the App-V 5.0 Remote Desktop Services client -**Note**   -The following prerequisites are already installed for computers that run Windows Server 2012. +**Note** +The following prerequisites are already installed for computers that run Windows Server 2012. + -  The following table lists the installation prerequisites for the App-V 5.0 Remote Desktop Services client: @@ -160,55 +158,53 @@ The following table lists the installation prerequisites for the App-V 5.0 Remot

    Software requirements

    -  + ### Prerequisites for the App-V 5.0 Sequencer -**Note**   -The following prerequisites are already installed for computers that run Windows 8 and Windows Server 2012. +**Note** +The following prerequisites are already installed for computers that run Windows 8 and Windows Server 2012. + -  The following table lists the installation prerequisites for the App-V 5.0 Sequencer. If possible, the computer that runs the Sequencer should have the same hardware and software configurations as the computers that will run the virtual applications. -**Note**   +**Note** If the system requirements of a locally installed application exceed the requirements of the Sequencer, you must meet the requirements of that application. Additionally, because the sequencing process is system resource-intensive, we recommend that the computer that runs the Sequencer has plenty of memory, a fast processor, and a fast hard drive. For more information see [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md). -  + @@ -225,62 +221,61 @@ If the system requirements of a locally installed application exceed the require

    Software requirements

    -  + ### Prerequisites for the App-V 5.0 server -**Note**   -The following prerequisites are already installed for computers that run Windows Server 2012: +**Note** +The following prerequisites are already installed for computers that run Windows Server 2012: - Microsoft .NET Framework 4.5. This eliminates the Microsoft .NET Framework 4 requirement. -- Windows PowerShell 3.0 +- Windows PowerShell 3.0 - Download and install [KB2533623](https://support.microsoft.com/kb/2533623) (http://support.microsoft.com/kb/2533623) - **Important**   + **Important** You can still download install the previous KB. However, it may have been replaced with a more recent version. -   -  + + The following table lists the installation prerequisites for the App-V 5.0 server. The account that you use to install the server components must have administrative rights on the computer that you are installing on. This account must also have the ability to query Active Directory Directory Services. Before you install and configure the App-V 5.0 servers, you must specify a port where each component will be hosted. You must also add the associated firewall rules to allow incoming requests to the specified ports. -**Note**   +**Note** Web Distributed Authoring and Versioning (WebDAV) is automatically disabled for the Management Service. -  + The App-V 5.0 server is supported for a standalone deployment, where all the components are deployed on the same server, and a distributed deployment. Depending on the topology that you use to deploy the App-V 5.0 server, the data that you will need for each component will slightly change. -**Important**   +**Important** The installation of the App-V 5.0 server on a computer that runs any previous version or component of App-V is not supported. Additionally, the installation of the server components on a computer that runs Server Core or a Domain Controller is also not supported. -  + @@ -297,27 +292,25 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve @@ -423,7 +412,7 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve

    Management Server

    The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 management server.

    @@ -326,11 +319,10 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
  • Location of the App-V 5.0 management database - SQL Server Name, SQL Instance Name, Database Name.

  • Access rights for the App-V 5.0 management console - This is the user or the group that should be granted access to the management console at the end of the deployment. After the deployment, only these users will have access to the management console until additional administrators are added through the management console.

    -Note   -

    Security groups and single users are not supported. You must specify an AD DS group.

    +Note

    Security groups and single users are not supported. You must specify an AD DS group.

    -  +
  • App-V 5.0 management service website name – specify a name for the website or use the default name.

  • App-V 5.0 management service port binding - this should be a unique port number that is not used by another website on the computer.

  • @@ -341,15 +333,14 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve

    Management Database

    -Note   -

    The database is required only when using the App-V 5.0 management server.

    +Note

    The database is required only when using the App-V 5.0 management server.

    -  +

    The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 management database.

      @@ -358,20 +349,19 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve
    • Custom App-V 5.0 database name (if applicable) – you must specify a unique database name. The default value for the management database is AppVManagement.

    • App-V 5.0 management server location – specifies the machine account on which the management server is deployed. This should be specified in the following format Domain\MachineAccount.

    • App-V 5.0 management server installation administrator - specifies the account that will be used to install the App-V 5.0 management server. You should use the following format: Domain\AdministratorLoginName.

    • -
    • Microsoft SQL Server Service Agent - configure the computer running the App-V 5.0 Management Database so that Microsoft SQL Server Agent service is restarted automatically. For more information see [Configure SQL Server Agent to Restart Services Automatically](https://go.microsoft.com/fwlink/?LinkId=273725) (https://go.microsoft.com/fwlink/?LinkId=273725).

    • +
    • Microsoft SQL Server Service Agent - configure the computer running the App-V 5.0 Management Database so that Microsoft SQL Server Agent service is restarted automatically. For more information see Configure SQL Server Agent to Restart Services Automatically (https://go.microsoft.com/fwlink/?LinkId=273725).

    Reporting Server

      -
    • [Microsoft .NET Framework 4 (Full Package)](https://www.microsoft.com/download/details.aspx?id=17718) (http://www.microsoft.com/download/details.aspx?id=17718)

    • -
    • [Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=267110)(https://go.microsoft.com/fwlink/?LinkId=267110)

    • +
    • Microsoft .NET Framework 4 (Full Package) (http://www.microsoft.com/download/details.aspx?id=17718)

    • +
    • Microsoft Visual C++ 2010 SP1 Redistributable Package (x86)(https://go.microsoft.com/fwlink/?LinkId=267110)

    • -Note   -

      To help reduce the risk of unwanted or malicious data being sent to the reporting server, you should restrict access to the Reporting Web Service per your corporate security policy.

      +Note

      To help reduce the risk of unwanted or malicious data being sent to the reporting server, you should restrict access to the Reporting Web Service per your corporate security policy.

      -  +

      Windows Web Server with the IIS role with the following features: Common HTTP Features (static content and default document), Application Development (ASP.NET, .NET Extensibility, ISAPI Extensions and ISAPI Filters), Security (Windows Authentication, Request Filtering), Security (Windows Authentication, Request Filtering), Management Tools (IIS Management Console)

    • 64-bit ASP.NET registration

    • @@ -384,15 +374,14 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve

    Reporting Database

    -Note   -

    The database is required only when using the App-V 5.0 reporting server.

    +Note

    The database is required only when using the App-V 5.0 reporting server.

    -  +

    The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 reporting database.

      @@ -407,15 +396,15 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve

    Publishing Server

    The App-V 5.0 server components are dependent but they have varying requirements and installation options that must be deployed. Use the following information to prepare your environment to run the App-V 5.0 publishing server.

    • Installation location - by default this component is installed to %PROGRAMFILES%\Microsoft Application Virtualization Server.

    • -
    • App-V 5.0 management service URL – specifies the URL of the App-V 5.0 management service. This is the port that the publishing server communicates with, and it should be specified using the following format: http://localhost:12345.

    • +
    • App-V 5.0 management service URL – specifies the URL of the App-V 5.0 management service. This is the port that the publishing server communicates with, and it should be specified using the following format: http://localhost:12345.

    • App-V 5.0 publishing service website name – specifies the name of the website or the default name that will be used.

    • App-V 5.0 publishing service port binding - This should be a unique port number that is not already used by another website that runs on the computer.

    -  + @@ -437,9 +426,9 @@ The installation of the App-V 5.0 server on a computer that runs any previous ve [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-50-security-considerations.md b/mdop/appv-v5/app-v-50-security-considerations.md index 1d1ed5cebd..851f1204db 100644 --- a/mdop/appv-v5/app-v-50-security-considerations.md +++ b/mdop/appv-v5/app-v-50-security-considerations.md @@ -19,10 +19,10 @@ ms.date: 08/30/2016 This topic contains a brief overview of the accounts and groups, log files, and other security-related considerations for App-V 5.0. -**Important**   +**Important** App-V 5.0 is not a security product and does not provide any guarantees for a secure environment. -  + ## PackageStoreAccessControl (PSAC) feature has been deprecated @@ -45,14 +45,14 @@ Effective as of June, 2014, the PackageStoreAccessControl (PSAC) feature that wa A best practice for user account management is to create domain global groups and add user accounts to them. Then, add the domain global accounts to the necessary App-V 5.0 local groups on the App-V 5.0 servers. -**Note**   +**Note** App-V client computer accounts that need to connect to the publishing server must be part of the publishing server’s **Users** local group. By default, all computers in the domain are part of the **Authorized Users** group, which is part of the **Users** local group. -  + ### App-V 5.0 server security -No groups are created automatically during App-V 5.0 Setup. You should create the following Active Directory Domain Services global groups to manage App-V 5.0 server operations. +No groups are created automatically during App-V 5.0 Setup. You should create the following Active Directory Domain Services global groups to manage App-V 5.0 server operations. @@ -70,11 +70,10 @@ No groups are created automatically during App-V 5.0 Setup. You should create th @@ -84,38 +83,36 @@ No groups are created automatically during App-V 5.0 Setup. You should create th

    App-V Management Admin group

    Used to manage the App-V 5.0 management server. This group is created during the App-V 5.0 Management Server installation.

    -Important   -

    There is no method to create the group using the management console after you have completed the installation.

    +Important

    There is no method to create the group using the management console after you have completed the installation.

    -  +

    App-V Management Service install admin account

    -Note   -

    This is only required if management database is being installed separately from the service.

    +Note

    This is only required if management database is being installed separately from the service.

    -  +

    Provides public access to schema-version table in management database. This account should be created during the App-V 5.0 management database installation.

    App-V Reporting Service install admin account

    -Note   -

    This is only required if reporting database is being installed separately from the service.

    +Note

    This is only required if reporting database is being installed separately from the service.

    -  +

    Public access to schema-version table in reporting database. This account should be created during the App-V 5.0 reporting database installation.

    -  + Consider the following additional information: - Access to the package shares - If a share exists on the same computer as the management Server, the **Network** service requires read access to the share. In addition, each App-V client computer must have read access to the package share. - **Note**   + **Note** In previous versions of App-V, package share was referred to as content share. -   + - Registering publishing servers with Management Server - A publishing server must be registered with the Management server. For example, it must be added to the database, so that the Publishing server machine accounts are able to call into the Management service API. @@ -153,9 +150,9 @@ During App-V 5.0 Setup, setup log files are created in the **%temp%** folder of -  - -  + + + diff --git a/mdop/appv-v5/app-v-50-sp3-prerequisites.md b/mdop/appv-v5/app-v-50-sp3-prerequisites.md index 7cb8c9b98f..c8c4111e86 100644 --- a/mdop/appv-v5/app-v-50-sp3-prerequisites.md +++ b/mdop/appv-v5/app-v-50-sp3-prerequisites.md @@ -48,13 +48,12 @@ The following table indicates the software that is already installed for differe

    The following prerequisite software is already installed:

    • Microsoft .NET Framework 4.5

    • -
    • Windows PowerShell 3.0

      +
    • Windows PowerShell 3.0

      -Note   -

      Installing PowerShell 3.0 requires a restart.

      +Note

      Installing PowerShell 3.0 requires a restart.

      -  +
    @@ -65,7 +64,7 @@ The following table indicates the software that is already installed for differe -  + ## App-V Server prerequisite software @@ -117,7 +116,7 @@ Install the required prerequisite software for the App-V 5.0 SP3 Server componen -  + ### Management server prerequisite software @@ -135,22 +134,22 @@ Install the required prerequisite software for the App-V 5.0 SP3 Server componen

    Supported version of SQL Server

    -

    For supported versions, see [App-V 5.0 SP3 Supported Configurations](app-v-50-sp3-supported-configurations.md).

    +

    For supported versions, see App-V 5.0 SP3 Supported Configurations.

    -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Windows PowerShell 3.0

    +

    Installing PowerShell 3.0 requires a restart.

    -

    Download and install [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    Download and install KB2533623

    Applies to Windows 7 only.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -216,7 +215,7 @@ Install the required prerequisite software for the App-V 5.0 SP3 Server componen -  + ### Management server database prerequisite software @@ -235,11 +234,11 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -269,12 +268,12 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana

    Microsoft SQL Server Service Agent

    -

    Configure the Management database computer so that the Microsoft SQL Server Agent service is restarted automatically. For instructions, see [Configure SQL Server Agent to Restart Services Automatically](https://technet.microsoft.com/magazine/gg313742.aspx).

    +

    Configure the Management database computer so that the Microsoft SQL Server Agent service is restarted automatically. For instructions, see Configure SQL Server Agent to Restart Services Automatically.

    -  + ### Publishing server prerequisite software @@ -291,11 +290,11 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -355,15 +354,15 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana

    Management server and Publishing server are installed on the same server

    -

    http://localhost:12345

    +

    http://localhost:12345

    Management server and Publishing server are installed on different servers

    -

    http://MyAppvServer.MyDomain.com

    +

    http://MyAppvServer.MyDomain.com

    -

     

    +

    @@ -377,7 +376,7 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana -  + ### Reporting server prerequisite software @@ -395,14 +394,14 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana

    Supported version of SQL Server

    -

    For supported versions, see [App-V 5.0 SP3 Supported Configurations](app-v-50-sp3-supported-configurations.md).

    +

    For supported versions, see App-V 5.0 SP3 Supported Configurations.

    -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -457,7 +456,7 @@ The Management database is required only if you are using the App-V 5.0 SP3 Mana -  + ### Reporting database prerequisite software @@ -476,11 +475,11 @@ The Reporting database is required only if you are using the App-V 5.0 SP3 Repor -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -515,7 +514,7 @@ The Reporting database is required only if you are using the App-V 5.0 SP3 Repor -  + ## App-V client prerequisite software @@ -535,26 +534,26 @@ Install the following prerequisite software for the App-V client. -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    -  + ## Remote Desktop Services client prerequisite software @@ -574,26 +573,26 @@ Install the following prerequisite software for the App-V Remote Desktop Service -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    -  + ## Sequencer prerequisite software @@ -617,26 +616,26 @@ Install the following prerequisite software for the App-V Remote Desktop Service -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    -  + @@ -650,9 +649,9 @@ Install the following prerequisite software for the App-V Remote Desktop Service [App-V 5.0 SP3 Supported Configurations](app-v-50-sp3-supported-configurations.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-50-sp3-supported-configurations.md b/mdop/appv-v5/app-v-50-sp3-supported-configurations.md index a8333064ff..fd9359c9d4 100644 --- a/mdop/appv-v5/app-v-50-sp3-supported-configurations.md +++ b/mdop/appv-v5/app-v-50-sp3-supported-configurations.md @@ -47,7 +47,7 @@ The following table lists the operating systems that are supported for the App-V **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. -  + @@ -81,12 +81,12 @@ Microsoft provides support for the current service pack and, in some cases, the
    -  + **Important**   Deployment of the Management server role to a computer with Remote Desktop Sharing (RDS) enabled is not supported. -  + ### Management server hardware requirements @@ -132,7 +132,7 @@ The following table lists the SQL Server versions that are supported for the App -  + ### Publishing server operating system requirements @@ -170,7 +170,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Publishing server hardware requirements @@ -218,7 +218,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Reporting server hardware requirements @@ -266,7 +266,7 @@ The following table lists the SQL Server versions that are supported for the App -  + ## App-V client system requirements @@ -305,7 +305,7 @@ The following table lists the operating systems that are supported for the App-V -  + The following App-V client installation scenarios are not supported, except as noted: @@ -362,7 +362,7 @@ The following table lists the operating systems that are supported for App-V 5.0 -  + ### Remote Desktop Services client hardware requirements @@ -426,7 +426,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Sequencer hardware requirements @@ -457,9 +457,9 @@ For more information about how Configuration Manager integrates with App-V, see [App-V 5.0 SP3 Prerequisites](app-v-50-sp3-prerequisites.md) -  + -  + diff --git a/mdop/appv-v5/app-v-50-supported-configurations.md b/mdop/appv-v5/app-v-50-supported-configurations.md index a5feb193ce..b70976d075 100644 --- a/mdop/appv-v5/app-v-50-supported-configurations.md +++ b/mdop/appv-v5/app-v-50-supported-configurations.md @@ -19,7 +19,7 @@ ms.date: 08/30/2016 This topic specifies the requirements that are necessary to install and run Microsoft Application Virtualization (App-V) 5.0 in your environment. -**Important**   +**Important** **The supported configurations in this article apply only to App-V 5.0**. For supported configurations that apply to App-V 5.0 Service Packs, see the following web pages: - [What's new in App-V 5.0 SP1](whats-new-in-app-v-50-sp1.md) @@ -28,24 +28,24 @@ This topic specifies the requirements that are necessary to install and run Micr - [App-V 5.0 SP3 Supported Configurations](app-v-50-sp3-supported-configurations.md) -  + ## App-V 5.0 server system requirements -**Important**   +**Important** The App-V 5.0 server does not support the following scenarios: -  + - Deployment to a computer that runs Microsoft Windows Server Core. - Deployment to a computer that runs a previous version of App-V 5.0 server components. - **Note**   - You can install App-V 5.0 side-by-side with the App-V 4.5 Lightweight Streaming Server (LWS) server only. Deployment of App-V 5.0 side-by-side with the App-V 4.5 Application Virtualization Management Service (HWS) server is not supported. + **Note** + You can install App-V 5.0 side-by-side with the App-V 4.5 Lightweight Streaming Server (LWS) server only. Deployment of App-V 5.0 side-by-side with the App-V 4.5 Application Virtualization Management Service (HWS) server is not supported. + -   - Deployment to a computer that runs Microsoft SQL Server Express edition. @@ -59,10 +59,10 @@ The App-V 5.0 server does not support the following scenarios: The following table lists the operating systems that are supported for the App-V 5.0 management server installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -81,19 +81,19 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + - + @@ -101,12 +101,12 @@ Microsoft provides support for the current service pack and, in some cases, the

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    R2

    SP1 and higher

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    R2

    64-bit

    -  -**Important**   + +**Important** Deployment of the management server role to a computer with Remote Desktop Sharing (RDS) enabled is not supported. -  + ### Management Server hardware requirements @@ -120,10 +120,10 @@ Deployment of the management server role to a computer with Remote Desktop Shari The following table lists the operating systems that are supported for the App-V 5.0 publishing server installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -142,19 +142,19 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + - + @@ -162,7 +162,7 @@ Microsoft provides support for the current service pack and, in some cases, the

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    R2

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    R2

    64-bit

    -  + ### Publishing Server hardware requirements @@ -176,10 +176,10 @@ Microsoft provides support for the current service pack and, in some cases, the The following table lists the operating systems that are supported for the App-V 5.0 reporting server installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -198,19 +198,19 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + - + @@ -218,7 +218,7 @@ Microsoft provides support for the current service pack and, in some cases, the

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    Microsoft Windows Server 2008 (Standard, Enterprise, Datacenter, or Web Server)

    R2

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    64-bit

    Microsoft Windows Server 2012 (Standard, Datacenter)

    Microsoft Windows Server 2012 (Standard, Datacenter)

    R2

    64-bit

    -  + ### Reporting Server hardware requirements @@ -228,9 +228,9 @@ Microsoft provides support for the current service pack and, in some cases, the - Disk space—200 MB available hard disk space -### SQL Server database requirements +### SQL Server database requirements -The following table lists the SQL Server versions that are supported for the App-V 5.0 database and server installation. +The following table lists the SQL Server versions that are supported for the App-V 5.0 database and server installation. @@ -252,7 +252,7 @@ The following table lists the SQL Server versions that are supported for the Ap - @@ -260,7 +260,7 @@ The following table lists the SQL Server versions that are supported for the Ap - @@ -268,7 +268,7 @@ The following table lists the SQL Server versions that are supported for the Ap - @@ -277,17 +277,17 @@ The following table lists the SQL Server versions that are supported for the Ap

    Management / Reporting

    Microsoft SQL Server 2008

    +

    Microsoft SQL Server 2008

    (Standard, Enterprise, Datacenter, or the Developer Edition with the following feature: Database Engine Services.)

    Management / Reporting

    Microsoft SQL Server 2008 

    +

    Microsoft SQL Server 2008

    (Standard, Enterprise, Datacenter, or the Developer Edition with the following feature: Database Engine Services.)

    R2

    SP2

    Management / Reporting

    Microsoft SQL Server 2012

    +

    Microsoft SQL Server 2012

    (Standard, Enterprise, Datacenter, or the Developer Edition with the following feature: Database Engine Services.)

    -  + ## App-V 5.0 client system requirements The following table lists the operating systems that are supported for the App-V 5.0 client installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -304,22 +304,21 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + @@ -328,13 +327,13 @@ Microsoft provides support for the current service pack and, in some cases, the

    Microsoft Windows 7

    Microsoft Windows 7

    SP1

    32-bit or 64-bit

    Microsoft Windows 8

    Microsoft Windows 8

    32-bit or 64-bit

    -Important   -

    Windows 8.1 is only supported by App-V 5.0 SP2

    +Important

    Windows 8.1 is only supported by App-V 5.0 SP2

    -  +

    Windows 8.1

    -  + The following App-V client installation scenarios are not supported, except as noted: - Computers that run Windows Server -- Computers that run App-V 4.6 SP1 or earlier versions +- Computers that run App-V 4.6 SP1 or earlier versions - The App-V 5.0 Remote Desktop services client is supported only for RDS-enabled servers @@ -353,34 +352,34 @@ The following list displays the supported hardware configuration for the App-V 5 The following table lists the operating systems that are supported for App-V 5.0 Remote Desktop client installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + Operating system Edition Service pack -Microsoft Windows Server 2008 +Microsoft Windows Server 2008 R2 SP1 -Microsoft Windows Server 2012 +Microsoft Windows Server 2012 -**Important**   -Windows Server 2012 R2 is only supported by App-V 5.0 SP2 +**Important** +Windows Server 2012 R2 is only supported by App-V 5.0 SP2 -  -Microsoft Windows Server 2012 (Standard, Datacenter) + +Microsoft Windows Server 2012 (Standard, Datacenter) R2 64-bit -  + ### Remote Desktop client hardware requirements @@ -397,10 +396,10 @@ The following list displays the supported hardware configuration for the App-V 5 The following table lists the operating systems that are supported for App-V 5.0 Sequencer installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -419,24 +418,23 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + @@ -444,26 +442,25 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + +

    Microsoft Windows Server 2012

    @@ -471,12 +468,12 @@ Microsoft provides support for the current service pack and, in some cases, the

    Microsoft Windows 7

    Microsoft Windows 7

    SP1

    32-bit and 64-bit

    Microsoft Windows 8

    Microsoft Windows 8

    32-bit and 64-bit

    -Important   -

    Windows 8.1 is only supported by App-V 5.0 SP2

    +Important

    Windows 8.1 is only supported by App-V 5.0 SP2

    -  +

    Windows 8.1

    32-bit or 64-bit

    Microsoft Windows Server 2008

    Microsoft Windows Server 2008

    R2

    SP1

    32-bit and 64-bit

    Microsoft Windows Server 2012

    Microsoft Windows Server 2012

    32-bit and 64-bit

    -Important   -

    Windows Server 2012 R2 is only supported by App-V 5.0 SP2

    +Important

    Windows Server 2012 R2 is only supported by App-V 5.0 SP2

    -  +
    -

    Microsoft Windows Server 2012

    R2

    64-bit

    -  + ## Supported versions of System Center Configuration Manager -You can use Microsoft System Center 2012 Configuration Manager or System Center 2012 R2 Configuration Manager to manage App-V virtual applications, reporting, and other functions. The following table lists the supported versions of Configuration Manager for each applicable version of App-V. +You can use Microsoft System Center 2012 Configuration Manager or System Center 2012 R2 Configuration Manager to manage App-V virtual applications, reporting, and other functions. The following table lists the supported versions of Configuration Manager for each applicable version of App-V. @@ -491,7 +488,7 @@ You can use Microsoft System Center 2012 Configuration Manager or System Cen - +

    Microsoft System Center 2012 Configuration Manager

    Microsoft System Center 2012 Configuration Manager

    • App-V 5.0

    • App-V 5.0 SP1

    • @@ -509,7 +506,7 @@ You can use Microsoft System Center 2012 Configuration Manager or System Cen
    -  + For more information about how Configuration Manager integrates with App-V, see [Planning for App-V Integration with Configuration Manager](https://technet.microsoft.com/library/jj822982.aspx). @@ -525,9 +522,9 @@ For more information about how Configuration Manager integrates with App-V, see [App-V 5.0 Prerequisites](app-v-50-prerequisites.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-51-capacity-planning.md b/mdop/appv-v5/app-v-51-capacity-planning.md index fd58ec34a1..70a60911a1 100644 --- a/mdop/appv-v5/app-v-51-capacity-planning.md +++ b/mdop/appv-v5/app-v-51-capacity-planning.md @@ -22,7 +22,7 @@ The following recommendations can be used as a baseline to help determine capaci **Important**   Use the information in this section only as a general guide for planning your App-V 5.1 deployment. Your system capacity requirements will depend on the specific details of your hardware and application environment. Additionally, the performance numbers displayed in this document are examples and your results may vary. -  + ## Determine the Project Scope @@ -52,7 +52,7 @@ Before you design the App-V 5.1 infrastructure, you must determine the project -  + ## Determine Which App-V 5.1 Infrastructure is Required @@ -62,7 +62,7 @@ Both of the following models require the App-V 5.1 client to be installed on the You can also manage your App-V 5.1 environment using an Electronic Software Distribution (ESD) solution such as Microsoft Systems Center Configuration Manager. For more information see [How to deploy App-V 5.1 Packages Using Electronic Software Distribution](how-to-deploy-app-v-51-packages-using-electronic-software-distribution.md). -  + - **Standalone Model** - The standalone model allows virtual applications to be Windows Installer-enabled for distribution without streaming. App-V 5.1 in Standalone Mode consists of the sequencer and the client; no additional components are required. Applications are prepared for virtualization using a process called sequencing. For more information see, [Planning for the App-V 5.1 Sequencer and Client Deployment](planning-for-the-app-v-51-sequencer-and-client-deployment.md). The stand-alone model is recommended for the following scenarios: @@ -77,7 +77,7 @@ You can also manage your App-V 5.1 environment using an Electronic Software Dist **Important**   The App-V 5.1 full infrastructure model requires Microsoft SQL Server to store configuration data. For more information see [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md). -   + - When you want to use the Management Server to publish the application to target computers. @@ -93,7 +93,7 @@ The following section provides information about end-to-end App-V 5.1 sizing and **Note**   Round trip response time on the client is the time taken by the computer running the App-V 5.1 client to receive a successful notification from the publishing server. Round trip response time on the publishing server is the time taken by the computer running the publishing server to receive a successful package metadata update from the management server. -  + - 20,000 clients can target a single publishing server to obtain the package refreshes in an acceptable round trip time. (<3 seconds) @@ -107,7 +107,7 @@ The App-V 5.1 publishing servers require the management server for package refre **Note**   The default refresh time on the App-V 5.1 publishing server is ten minutes. -  + When multiple simultaneous publishing servers contact a single management server for package metadata refreshes, the following three factors influence the round trip response time on the publishing server: @@ -122,7 +122,7 @@ The following table displays more information about each factor that impacts rou **Note**   Round trip response time is the time taken by the computer running the App-V 5.1 publishing server to receive a successful package metadata update from the management server. -  + @@ -166,7 +166,7 @@ Round trip response time is the time taken by the computer running the App-V 5.1
    -  + The following table displays sample values for each of the previous factors. In each variation, 120 packages are refreshed from the App-V 5.1management server. @@ -359,7 +359,7 @@ The following table displays sample values for each of the previous factors. In -  + The CPU utilization of the computer running the management server is around 25% irrespective of the number of publishing servers targeting it. The Microsoft SQL Server database transactions/sec, batch requests/sec and user connections are identical irrespective of the number of publishing servers. For example: Transactions/sec is ~30, batch requests ~200, and user connects ~6. @@ -460,7 +460,7 @@ Using a geographically distributed deployment, where the management server & pub -  + Whether the management server and publishing servers are connected over a slow link network, or a high speed network, the management server can handle approximately 15,000 package refresh requests in 30 minutes. @@ -472,7 +472,7 @@ App-V 5.1 clients send reporting data to the reporting server. The reporting ser **Note**   Round trip response time is the time taken by the computer running the App-V 5.1 client to send the reporting information to the reporting server and receive a successful notification from the reporting server. -  + @@ -518,7 +518,7 @@ Round trip response time is the time taken by the computer running the App-V 5.1
    -  + **Calculating random delay**: @@ -542,7 +542,7 @@ The following list displays the main factors to consider when setting up the App - The available network bandwidth in your environment between the client and the App-V 5.1 publishing server. -  + @@ -585,12 +585,12 @@ The following list displays the main factors to consider when setting up the App
    -  + **Note**   The publishing server CPU usage is always high during the time interval when it has to process simultaneous requests (>90% in most cases). The publishing server can handle ~1500 client requests in 1 second. -  + @@ -732,7 +732,7 @@ The publishing server CPU usage is always high during the time interval when it
    -  + ## App-V 5.1 Streaming Capacity Planning Recommendations @@ -748,7 +748,7 @@ The following list identifies the main factors to consider when setting up the A - The available network bandwidth in your environment between the client and the streaming server. -  + @@ -788,7 +788,7 @@ The following list identifies the main factors to consider when setting up the A
    -  + The following table displays sample values for each of the factors in the previous list: @@ -917,14 +917,14 @@ The following table displays sample values for each of the factors in the previo -  + Each App-V 5.1 streaming server should be able to handle a minimum of 200 clients concurrently streaming virtualized applications. **Note**   The actual time to it will take to stream is determined primarily by the number of clients streaming simultaneously, number of packages, package size, the server’s network activity, and network conditions. -  + For example, an average user can stream a 100 MB package in less than 2 minutes, when 100 simultaneous clients are streaming from the server. However, a package of size 1 GB could take up to 30 minutes. In most real world environments streaming demand is not uniformly distributed, you will need to understand the approximate peak streaming requirements present in your environment in order to properly size the number of required streaming servers. @@ -953,9 +953,9 @@ Although there are a number of fault-tolerance strategies and technologies avail [Planning to Deploy App-V](planning-to-deploy-app-v51.md) -  + -  + diff --git a/mdop/appv-v5/app-v-51-deployment-checklist.md b/mdop/appv-v5/app-v-51-deployment-checklist.md index ce77e53a6c..47165a6b5b 100644 --- a/mdop/appv-v5/app-v-51-deployment-checklist.md +++ b/mdop/appv-v5/app-v-51-deployment-checklist.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 This checklist can be used to help you during Microsoft Application Virtualization (App-V) 5.1 deployment. -**Note**   +**Note** This checklist outlines the recommended steps and a high-level list of items to consider when deploying App-V 5.1 features. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,37 +43,36 @@ This checklist outlines the recommended steps and a high-level list of items to - + - +
    Checklist box

    Complete the planning phase to prepare the computing environment for App-V 5.1 deployment.

    [App-V 5.1 Planning Checklist](app-v-51-planning-checklist.md)

    App-V 5.1 Planning Checklist

    Checklist box

    Review the App-V 5.1 supported configurations information to make sure selected client and server computers are supported for App-V 5.1 feature installation.

    [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md)

    App-V 5.1 Supported Configurations

    Checklist box

    Run App-V 5.1 Setup to deploy the required App-V 5.1 features for your environment.

    -Note   -

    Keep track of the names of the servers and associated URL’s created during installation. This information will be used throughout the installation process.

    +Note

    Keep track of the names of the servers and associated URL’s created during installation. This information will be used throughout the installation process.

    -  +

    -  + @@ -85,9 +84,9 @@ This checklist outlines the recommended steps and a high-level list of items to [Deploying App-V 5.1](deploying-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-51-planning-checklist.md b/mdop/appv-v5/app-v-51-planning-checklist.md index 0d2300b51e..c2dab9f0b8 100644 --- a/mdop/appv-v5/app-v-51-planning-checklist.md +++ b/mdop/appv-v5/app-v-51-planning-checklist.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for an App-V 5.1 deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,43 +43,43 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - + - + - + - +
    Checklist box

    Review the getting started information about App-V 5.1 to gain a basic understanding of the product before beginning deployment planning.

    [Getting Started with App-V 5.1](getting-started-with-app-v-51.md)

    Getting Started with App-V 5.1

    Checklist box

    Plan for App-V 5.1 1.0 Deployment Prerequisites and prepare your computing environment.

    [App-V 5.1 Prerequisites](app-v-51-prerequisites.md)

    App-V 5.1 Prerequisites

    Checklist box

    If you plan to use the App-V 5.1 management server, plan for the required roles.

    [Planning for the App-V 5.1 Server Deployment](planning-for-the-app-v-51-server-deployment.md)

    Planning for the App-V 5.1 Server Deployment

    Checklist box

    Plan for the App-V 5.1 sequencer and client so you to create and run virtualized applications.

    [Planning for the App-V 5.1 Sequencer and Client Deployment](planning-for-the-app-v-51-sequencer-and-client-deployment.md)

    Planning for the App-V 5.1 Sequencer and Client Deployment

    Checklist box

    If applicable, review the options and steps for migrating from a previous version of App-V.

    [Planning for Migrating from a Previous Version of App-V](planning-for-migrating-from-a-previous-version-of-app-v51.md)

    Planning for Migrating from a Previous Version of App-V

    Checklist box

    Plan for running App-V 5.1 clients using in shared content store mode.

    [How to Install the App-V 5.1 Client for Shared Content Store Mode](how-to-install-the-app-v-51-client-for-shared-content-store-mode.md)

    How to Install the App-V 5.1 Client for Shared Content Store Mode

    -  + @@ -91,9 +91,9 @@ This checklist outlines the recommended steps and a high-level list of items to [Planning for App-V 5.1](planning-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/app-v-51-prerequisites.md b/mdop/appv-v5/app-v-51-prerequisites.md index af9b51188d..7931176dcc 100644 --- a/mdop/appv-v5/app-v-51-prerequisites.md +++ b/mdop/appv-v5/app-v-51-prerequisites.md @@ -46,11 +46,10 @@ The following table indicates the software that is already installed for differe

    Windows 8.1

    All of the prerequisite software is already installed.

    -Note   -

    If you are running Windows 8, upgrade to Windows 8.1 before using App-V 5.1.

    +Note

    If you are running Windows 8, upgrade to Windows 8.1 before using App-V 5.1.

    -  +
    @@ -58,13 +57,12 @@ The following table indicates the software that is already installed for differe

    The following prerequisite software is already installed:

    • Microsoft .NET Framework 4.5

    • -
    • Windows PowerShell 3.0

      +
    • Windows PowerShell 3.0

      -Note   -

      Installing PowerShell 3.0 requires a restart.

      +Note

      Installing PowerShell 3.0 requires a restart.

      -  +
    @@ -75,7 +73,7 @@ The following table indicates the software that is already installed for differe -  + ## App-V Server prerequisite software @@ -127,7 +125,7 @@ Install the required prerequisite software for the App-V 5.1 Server components. -  + ### Management server prerequisite software @@ -145,22 +143,22 @@ Install the required prerequisite software for the App-V 5.1 Server components.

    Supported version of SQL Server

    -

    For supported versions, see [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md).

    +

    For supported versions, see App-V 5.1 Supported Configurations.

    -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Windows PowerShell 3.0

    +

    Installing PowerShell 3.0 requires a restart.

    -

    Download and install [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    Download and install KB2533623

    Applies to Windows 7 only.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -222,12 +220,12 @@ Install the required prerequisite software for the App-V 5.1 Server components. -  -**Important**   + +**Important** JavaScript must be enabled on the browser that opens the Web Management Console. -  + ### Management server database prerequisite software @@ -246,11 +244,11 @@ The Management database is required only if you are using the App-V 5.1 Manageme -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -280,12 +278,12 @@ The Management database is required only if you are using the App-V 5.1 Manageme

    Microsoft SQL Server Service Agent

    -

    Configure the Management database computer so that the Microsoft SQL Server Agent service is restarted automatically. For instructions, see [Configure SQL Server Agent to Restart Services Automatically](https://technet.microsoft.com/magazine/gg313742.aspx).

    +

    Configure the Management database computer so that the Microsoft SQL Server Agent service is restarted automatically. For instructions, see Configure SQL Server Agent to Restart Services Automatically.

    -  + ### Publishing server prerequisite software @@ -302,11 +300,11 @@ The Management database is required only if you are using the App-V 5.1 Manageme -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -366,15 +364,15 @@ The Management database is required only if you are using the App-V 5.1 Manageme

    Management server and Publishing server are installed on the same server

    -

    http://localhost:12345

    +

    http://localhost:12345

    Management server and Publishing server are installed on different servers

    -

    http://MyAppvServer.MyDomain.com

    +

    http://MyAppvServer.MyDomain.com

    -

     

    +

    @@ -388,7 +386,7 @@ The Management database is required only if you are using the App-V 5.1 Manageme -  + ### Reporting server prerequisite software @@ -406,14 +404,14 @@ The Management database is required only if you are using the App-V 5.1 Manageme

    Supported version of SQL Server

    -

    For supported versions, see [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md).

    +

    For supported versions, see App-V 5.1 Supported Configurations.

    -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -468,7 +466,7 @@ The Management database is required only if you are using the App-V 5.1 Manageme -  + ### Reporting database prerequisite software @@ -487,11 +485,11 @@ The Reporting database is required only if you are using the App-V 5.1 Reporting -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    @@ -526,7 +524,7 @@ The Reporting database is required only if you are using the App-V 5.1 Reporting -  + ## App-V client prerequisite software @@ -546,26 +544,26 @@ Install the following prerequisite software for the App-V client. -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    -  + ## Remote Desktop Services client prerequisite software @@ -585,26 +583,26 @@ Install the following prerequisite software for the App-V Remote Desktop Service -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -

    [Visual C++ Redistributable Packages for Visual Studio 2013](https://www.microsoft.com/download/details.aspx?id=40784)

    +

    Visual C++ Redistributable Packages for Visual Studio 2013

    -  + ## Sequencer prerequisite software @@ -628,22 +626,22 @@ Install the following prerequisite software for the App-V Remote Desktop Service -

    [Microsoft .NET Framework 4.5.1 (Web Installer)](https://www.microsoft.com//download/details.aspx?id=40773)

    +

    Microsoft .NET Framework 4.5.1 (Web Installer)

    -

    [Windows PowerShell 3.0](https://www.microsoft.com/download/details.aspx?id=34595)

    +

    Windows PowerShell 3.0

    -

    Installing PowerShell 3.0 requires a restart.

    +

    Installing PowerShell 3.0 requires a restart.

    -

    [KB2533623](https://support.microsoft.com/kb/2533623)

    +

    KB2533623

    Applies to Windows 7 only: Download and install the KB.

    -  + @@ -657,9 +655,9 @@ Install the following prerequisite software for the App-V Remote Desktop Service [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-51-security-considerations.md b/mdop/appv-v5/app-v-51-security-considerations.md index 0afb1b8b1f..9b8aaf264e 100644 --- a/mdop/appv-v5/app-v-51-security-considerations.md +++ b/mdop/appv-v5/app-v-51-security-considerations.md @@ -19,10 +19,10 @@ ms.date: 08/30/2016 This topic contains a brief overview of the accounts and groups, log files, and other security-related considerations for Microsoft Application Virtualization (App-V) 5.1. -**Important**   +**Important** App-V 5.1 is not a security product and does not provide any guarantees for a secure environment. -  + ## PackageStoreAccessControl (PSAC) feature has been deprecated @@ -45,14 +45,14 @@ Effective as of June, 2014, the PackageStoreAccessControl (PSAC) feature that wa A best practice for user account management is to create domain global groups and add user accounts to them. Then, add the domain global accounts to the necessary App-V 5.1 local groups on the App-V 5.1 servers. -**Note**   +**Note** App-V client computer accounts that need to connect to the publishing server must be part of the publishing server’s **Users** local group. By default, all computers in the domain are part of the **Authorized Users** group, which is part of the **Users** local group. -  + ### App-V 5.1 server security -No groups are created automatically during App-V 5.1 Setup. You should create the following Active Directory Domain Services global groups to manage App-V 5.1 server operations. +No groups are created automatically during App-V 5.1 Setup. You should create the following Active Directory Domain Services global groups to manage App-V 5.1 server operations. @@ -70,11 +70,10 @@ No groups are created automatically during App-V 5.1 Setup. You should create th @@ -84,38 +83,36 @@ No groups are created automatically during App-V 5.1 Setup. You should create th

    App-V Management Admin group

    Used to manage the App-V 5.1 management server. This group is created during the App-V 5.1 Management Server installation.

    -Important   -

    There is no method to create the group using the management console after you have completed the installation.

    +Important

    There is no method to create the group using the management console after you have completed the installation.

    -  +

    App-V Management Service install admin account

    -Note   -

    This is only required if management database is being installed separately from the service.

    +Note

    This is only required if management database is being installed separately from the service.

    -  +

    Provides public access to schema-version table in management database. This account should be created during the App-V 5.1 management database installation.

    App-V Reporting Service install admin account

    -Note   -

    This is only required if reporting database is being installed separately from the service.

    +Note

    This is only required if reporting database is being installed separately from the service.

    -  +

    Public access to schema-version table in reporting database. This account should be created during the App-V 5.1 reporting database installation.

    -  + Consider the following additional information: - Access to the package shares - If a share exists on the same computer as the management Server, the **Network** service requires read access to the share. In addition, each App-V client computer must have read access to the package share. - **Note**   + **Note** In previous versions of App-V, package share was referred to as content share. -   + - Registering publishing servers with Management Server - A publishing server must be registered with the Management server. For example, it must be added to the database, so that the Publishing server machine accounts are able to call into the Management service API. @@ -140,9 +137,9 @@ During App-V 5.1 Setup, setup log files are created in the **%temp%** folder of [Preparing Your Environment for App-V 5.1](preparing-your-environment-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/app-v-51-supported-configurations.md b/mdop/appv-v5/app-v-51-supported-configurations.md index ca5ceb725b..f8debb839c 100644 --- a/mdop/appv-v5/app-v-51-supported-configurations.md +++ b/mdop/appv-v5/app-v-51-supported-configurations.md @@ -45,7 +45,7 @@ The following table lists the operating systems that are supported for the App-V **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. -  + @@ -84,12 +84,12 @@ Microsoft provides support for the current service pack and, in some cases, the
    -  + **Important**   Deployment of the Management server role to a computer with Remote Desktop Sharing (RDS) enabled is not supported. -  + ### Management server hardware requirements @@ -135,7 +135,7 @@ The following table lists the SQL Server versions that are supported for the App -  + ### Publishing server operating system requirements @@ -178,7 +178,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Publishing server hardware requirements @@ -231,7 +231,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Reporting server hardware requirements @@ -279,7 +279,7 @@ The following table lists the SQL Server versions that are supported for the App -  + ## App-V client system requirements @@ -320,7 +320,7 @@ The following table lists the operating systems that are supported for the App-V -  + The following App-V client installation scenarios are not supported, except as noted: @@ -382,7 +382,7 @@ The following table lists the operating systems that are supported for App-V 5.1 -  + ### Remote Desktop Services client hardware requirements @@ -451,7 +451,7 @@ The following table lists the operating systems that are supported for the App-V -  + ### Sequencer hardware requirements @@ -519,7 +519,7 @@ The following App-V and System Center Configuration Manager version matrix shows -  + For more information about how Configuration Manager integrates with App-V, see [Planning for App-V Integration with Configuration Manager](https://technet.microsoft.com/library/jj822982.aspx). @@ -535,9 +535,9 @@ For more information about how Configuration Manager integrates with App-V, see [App-V 5.1 Prerequisites](app-v-51-prerequisites.md) -  + -  + diff --git a/mdop/appv-v5/application-publishing-and-client-interaction.md b/mdop/appv-v5/application-publishing-and-client-interaction.md index 0ff69d39a0..9245cdf4aa 100644 --- a/mdop/appv-v5/application-publishing-and-client-interaction.md +++ b/mdop/appv-v5/application-publishing-and-client-interaction.md @@ -94,7 +94,7 @@ The Sequencer creates App-V packages and produces a virtualized application. The -  + For information about sequencing, see [Application Virtualization 5.0 Sequencing Guide](https://www.microsoft.com/download/details.aspx?id=27760). @@ -164,7 +164,7 @@ The appv file contains the following folder and files, which are used when creat -  + ## App-V client data storage locations @@ -233,7 +233,7 @@ The App-V client performs tasks to ensure that virtual applications run properly -  + Additional details for the table are provided in the section below and throughout the document. @@ -256,7 +256,7 @@ If the App-V Client is configured in Shared Content Store mode, no data is writt **Note**   The machine and package store must be located on a local drive, even when you’re using Shared Content Store configurations for the App-V Client. -  + ### Package catalogs @@ -282,7 +282,7 @@ The App-V Client manages the following two file-based locations:

    Default storage location

    -

    %programdata%\Microsoft\AppV\Client\Catalog\

    +

    %programdata%\Microsoft\AppV\Client\Catalog</code>

    This location is not the same as the Package Store location. The Package Store is the golden or pristine copy of the package files.

    @@ -309,7 +309,7 @@ The App-V Client manages the following two file-based locations: -  + ### User catalog @@ -348,7 +348,7 @@ The App-V Client manages the following two file-based locations: -  + ### Shortcut backups @@ -383,12 +383,12 @@ When a new package is added to the App-V Client, a copy of the REGISTRY.DAT file

    Registry.dat from Package Store

     > 

    -

    %ProgramData%\Microsoft\AppV\Client\Vreg\{VersionGuid}.dat

    +

    %ProgramData%\Microsoft\AppV\Client\Vreg{VersionGuid}.dat

    -  + When the first application from the package is launched on the client, the client stages or copies the contents out of the hive file, re-creating the package registry data in an alternate location `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Client\Packages\PackageGuid\Versions\VersionGuid\REGISTRY`. The staged registry data has two distinct types of machine data and user data. Machine data is shared across all users on the machine. User data is staged for each user to a userspecific location `HKCU\Software\Microsoft\AppV\Client\Packages\PackageGuid\Registry\User`. The machine data is ultimately removed at package removal time, and the user data is removed on a user unpublish operation. @@ -442,9 +442,9 @@ There are two package registry locations and two connection group locations wher -  + -  + **Connection Group VReg:** @@ -482,9 +482,9 @@ There are two package registry locations and two connection group locations wher -  + -  + There are two COW locations for HKLM; elevated and non-elevated processes. Elevated processes always write HKLM changes to the secure COW under HKLM. Non-elevated processes always write HKLM changes to the non-secure COW under HKCU\\Software\\Classes. When an application reads changes from HKLM, elevated processes will read changes from the secure COW under HKLM. Non-elevated reads from both, favoring the changes made in the unsecure COW first. @@ -569,9 +569,9 @@ The App-V Client can be configured to change the default behavior of streaming. -  + -  + These settings affect the behavior of streaming App-V package assets to the client. By default, App-V only downloads the assets required after downloading the initial publishing and primary feature blocks. There are three specific behaviors around streaming packages that must be explained: @@ -623,7 +623,7 @@ Together, these files and registry settings represent the user’s catalog, so e **Note**   The **Repair-AppvClientPackage** cmdlet does not repair the publishing state of packages, where the user’s App-V state under `HKEY_CURRENT_USER` is missing or mismatched with the data in %appdata%. -  + ### Registry-based data @@ -645,8 +645,8 @@ App-V registry roaming falls into two scenarios, as shown in the following table

    Applications that are run as standard users

    When a standard user launches an App-V application, both HKLM and HKCU for App-V applications are stored in the HKCU hive on the machine. This presents as two distinct paths:

      -
    • HKLM: HKCU\SOFTWARE\Classes\AppV\Client\Packages\{PkgGUID}\REGISTRY\MACHINE\SOFTWARE

    • -
    • HKCU: HKCU\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\REGISTRY\USER\{UserSID}\SOFTWARE

    • +
    • HKLM: HKCU\SOFTWARE\Classes\AppV\Client\Packages{PkgGUID}\REGISTRY\MACHINE\SOFTWARE

    • +
    • HKCU: HKCU\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}\REGISTRY\USER{UserSID}\SOFTWARE

    The locations are enabled for roaming based on the operating system settings.

    @@ -659,14 +659,14 @@ App-V registry roaming falls into two scenarios, as shown in the following table

    In this scenario, these settings are not roamed with normal operating system roaming configurations, and the resulting registry keys and values are stored in the following location:

      -
    • HKLM\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\{UserSID}\REGISTRY\MACHINE\SOFTWARE

    • -
    • HKCU\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\Registry\User\{UserSID}\SOFTWARE

    • +
    • HKLM\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}{UserSID}\REGISTRY\MACHINE\SOFTWARE

    • +
    • HKCU\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}\Registry\User{UserSID}\SOFTWARE

    -  + ### App-V and folder redirection @@ -690,30 +690,30 @@ The following table shows local and roaming locations, when folder redirection h

    ProgramFilesX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\ProgramFilesX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\ProgramFilesX86

    SystemX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\SystemX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\SystemX86

    Windows

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\Windows

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\Windows

    appv_ROOT

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\appv_ROOT

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\appv_ROOT

    AppData

    -

    C:\users\jsmith\AppData\Roaming\Microsoft\AppV\Client\VFS\<GUID>\AppData

    +

    C:\users\jsmith\AppData<strong>Roaming\Microsoft\AppV\Client\VFS&lt;GUID>\AppData

    -  + -  + The following table shows local and roaming locations, when folder redirection has been implemented for %AppData%, and the location has been redirected (typically to a network location). @@ -731,30 +731,30 @@ The following table shows local and roaming locations, when folder redirection h

    ProgramFilesX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\ProgramFilesX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\ProgramFilesX86

    SystemX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\SystemX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\SystemX86

    Windows

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\Windows

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\Windows

    appv_ROOT

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\appv_ROOT

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\appv_ROOT

    AppData

    -

    \\Fileserver\users\jsmith\roaming\Microsoft\AppV\Client\VFS\<GUID>\AppData

    +

    \Fileserver\users\jsmith\roaming\Microsoft\AppV\Client\VFS&lt;GUID>\AppData

    -  + -  + The current App-V Client VFS driver cannot write to network locations, so the App-V Client detects the presence of folder redirection and copies the data on the local drive during publishing and when the virtual environment starts. After the user closes the App-V application and the App-V Client closes the virtual environment, the local storage of the VFS AppData is copied back to the network, enabling roaming to additional machines, where the process will be repeated. The detailed steps of the processes are: @@ -888,7 +888,7 @@ Adding an App-V package to the client is the first step of the publishing refres **Note**   This will not perform a package deletion but rather remove integration points for the specific target (user or machine) and remove user catalog files (machine catalog files for globally published). -   + 6. Invoke background load mounting based on client configuration. @@ -897,7 +897,7 @@ Adding an App-V package to the client is the first step of the publishing refres **Note**   This condition occurs as a product of removal without unpublishing with background addition of the package. -   + This completes an App-V package add of the publishing refresh process. The next step is publishing the package to the specific target (machine or user). @@ -926,7 +926,7 @@ During the Publishing Refresh operation, the specific publishing operation (Publ **Note**   This enables restore extension points if the package is unpublished. -   + 3. Run scripts targeted for publishing timing. @@ -1017,7 +1017,7 @@ The App-V 5 package upgrade process differs from the older versions of App-V. Ap -  + When a task is placed in a pending state, the App-V client also generates a registry key for the pending task, as follows: @@ -1044,7 +1044,7 @@ When a task is placed in a pending state, the App-V client also generates a regi -  + The following operations must be completed before users can use the newer version of the package: @@ -1071,7 +1071,7 @@ The following operations must be completed before users can use the newer versio -  + Use the following example scenarios as a guide for updating packages. @@ -1101,7 +1101,7 @@ Use the following example scenarios as a guide for updating packages. -  + ### Global vs user publishing @@ -1240,7 +1240,7 @@ In this example: - `"[{AppVPackageRoot}]\Reader\AcroRd32.exe" "%1"` is the command line, which points to the application executable -  + ### Shell extensions @@ -1307,7 +1307,7 @@ The following table displays the supported shell extensions. -  + ### COM @@ -1372,7 +1372,7 @@ In this example: - `[{ProgramFilesX86}]\Mozilla Thunderbird\mozMapi32_InUse.dll` is the MAPI dll registration -  + ### URL Protocol handler @@ -1493,7 +1493,7 @@ Extension points are not all published the same way, where some extension points -  + ## Dynamic configuration processing @@ -1596,7 +1596,7 @@ During publishing of an App-V package with SxS assemblies the App-V Client will **Note**   UnPublishing or removing a package with an assembly does not remove the assemblies for that package. -  + ## Client logging @@ -1610,7 +1610,7 @@ In App-V 5.0 SP3, some logs have been consolidated and moved to the following lo For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved). -  + There are three specific categories of events recorded described below. @@ -1625,9 +1625,9 @@ There are three specific categories of events recorded described below. -  + -  + diff --git a/mdop/appv-v5/application-publishing-and-client-interaction51.md b/mdop/appv-v5/application-publishing-and-client-interaction51.md index cf17ccd5ba..02452e7e45 100644 --- a/mdop/appv-v5/application-publishing-and-client-interaction51.md +++ b/mdop/appv-v5/application-publishing-and-client-interaction51.md @@ -94,7 +94,7 @@ The Sequencer creates App-V packages and produces a virtualized application. The -  + For information about sequencing, see [Application Virtualization Sequencing Guide](https://go.microsoft.com/fwlink/?LinkID=269810). @@ -164,7 +164,7 @@ The appv file contains the following folder and files, which are used when creat -  + ## App-V client data storage locations @@ -233,7 +233,7 @@ The App-V client performs tasks to ensure that virtual applications run properly -  + Additional details for the table are provided in the section below and throughout the document. @@ -256,7 +256,7 @@ If the App-V Client is configured in Shared Content Store mode, no data is writt **Note**   The machine and package store must be located on a local drive, even when you’re using Shared Content Store configurations for the App-V Client. -  + ### Package catalogs @@ -282,7 +282,7 @@ The App-V Client manages the following two file-based locations:

    Default storage location

    -

    %programdata%\Microsoft\AppV\Client\Catalog\

    +

    %programdata%\Microsoft\AppV\Client\Catalog</code>

    This location is not the same as the Package Store location. The Package Store is the golden or pristine copy of the package files.

    @@ -309,7 +309,7 @@ The App-V Client manages the following two file-based locations: -  + ### User catalog @@ -348,7 +348,7 @@ The App-V Client manages the following two file-based locations: -  + ### Shortcut backups @@ -383,12 +383,12 @@ When a new package is added to the App-V Client, a copy of the REGISTRY.DAT file

    Registry.dat from Package Store

     > 

    -

    %ProgramData%\Microsoft\AppV\Client\Vreg\{VersionGuid}.dat

    +

    %ProgramData%\Microsoft\AppV\Client\Vreg{VersionGuid}.dat

    -  + When the first application from the package is launched on the client, the client stages or copies the contents out of the hive file, re-creating the package registry data in an alternate location `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Client\Packages\PackageGuid\Versions\VersionGuid\REGISTRY`. The staged registry data has two distinct types of machine data and user data. Machine data is shared across all users on the machine. User data is staged for each user to a userspecific location `HKCU\Software\Microsoft\AppV\Client\Packages\PackageGuid\Registry\User`. The machine data is ultimately removed at package removal time, and the user data is removed on a user unpublish operation. @@ -442,9 +442,9 @@ There are two package registry locations and two connection group locations wher -  + -  + **Connection Group VReg:** @@ -482,9 +482,9 @@ There are two package registry locations and two connection group locations wher -  + -  + There are two COW locations for HKLM; elevated and non-elevated processes. Elevated processes always write HKLM changes to the secure COW under HKLM. Non-elevated processes always write HKLM changes to the non-secure COW under HKCU\\Software\\Classes. When an application reads changes from HKLM, elevated processes will read changes from the secure COW under HKLM. Non-elevated reads from both, favoring the changes made in the unsecure COW first. @@ -569,9 +569,9 @@ The App-V Client can be configured to change the default behavior of streaming. -  + -  + These settings affect the behavior of streaming App-V package assets to the client. By default, App-V only downloads the assets required after downloading the initial publishing and primary feature blocks. There are three specific behaviors around streaming packages that must be explained: @@ -623,7 +623,7 @@ Together, these files and registry settings represent the user’s catalog, so e **Note**   The **Repair-AppvClientPackage** cmdlet does not repair the publishing state of packages, where the user’s App-V state under `HKEY_CURRENT_USER` is missing or mismatched with the data in %appdata%. -  + ### Registry-based data @@ -645,8 +645,8 @@ App-V registry roaming falls into two scenarios, as shown in the following table

    Applications that are run as standard users

    When a standard user launches an App-V application, both HKLM and HKCU for App-V applications are stored in the HKCU hive on the machine. This presents as two distinct paths:

      -
    • HKLM: HKCU\SOFTWARE\Classes\AppV\Client\Packages\{PkgGUID}\REGISTRY\MACHINE\SOFTWARE

    • -
    • HKCU: HKCU\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\REGISTRY\USER\{UserSID}\SOFTWARE

    • +
    • HKLM: HKCU\SOFTWARE\Classes\AppV\Client\Packages{PkgGUID}\REGISTRY\MACHINE\SOFTWARE

    • +
    • HKCU: HKCU\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}\REGISTRY\USER{UserSID}\SOFTWARE

    The locations are enabled for roaming based on the operating system settings.

    @@ -659,14 +659,14 @@ App-V registry roaming falls into two scenarios, as shown in the following table

    In this scenario, these settings are not roamed with normal operating system roaming configurations, and the resulting registry keys and values are stored in the following location:

      -
    • HKLM\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\{UserSID}\REGISTRY\MACHINE\SOFTWARE

    • -
    • HKCU\SOFTWARE\Microsoft\AppV\Client\Packages\{PkgGUID}\Registry\User\{UserSID}\SOFTWARE

    • +
    • HKLM\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}{UserSID}\REGISTRY\MACHINE\SOFTWARE

    • +
    • HKCU\SOFTWARE\Microsoft\AppV\Client\Packages{PkgGUID}\Registry\User{UserSID}\SOFTWARE

    -  + ### App-V and folder redirection @@ -690,30 +690,30 @@ The following table shows local and roaming locations, when folder redirection h

    ProgramFilesX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\ProgramFilesX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\ProgramFilesX86

    SystemX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\SystemX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\SystemX86

    Windows

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\Windows

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\Windows

    appv_ROOT

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\appv_ROOT

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\appv_ROOT

    AppData

    -

    C:\users\jsmith\AppData\Roaming\Microsoft\AppV\Client\VFS\<GUID>\AppData

    +

    C:\users\jsmith\AppData<strong>Roaming\Microsoft\AppV\Client\VFS&lt;GUID>\AppData

    -  + -  + The following table shows local and roaming locations, when folder redirection has been implemented for %AppData%, and the location has been redirected (typically to a network location). @@ -731,30 +731,30 @@ The following table shows local and roaming locations, when folder redirection h

    ProgramFilesX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\ProgramFilesX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\ProgramFilesX86

    SystemX86

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\SystemX86

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\SystemX86

    Windows

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\Windows

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\Windows

    appv_ROOT

    -

    C:\users\jsmith\AppData\Local\Microsoft\AppV\Client\VFS\<GUID>\appv_ROOT

    +

    C:\users\jsmith\AppData<strong>Local\Microsoft\AppV\Client\VFS&lt;GUID>\appv_ROOT

    AppData

    -

    \\Fileserver\users\jsmith\roaming\Microsoft\AppV\Client\VFS\<GUID>\AppData

    +

    \Fileserver\users\jsmith\roaming\Microsoft\AppV\Client\VFS&lt;GUID>\AppData

    -  + -  + The current App-V Client VFS driver cannot write to network locations, so the App-V Client detects the presence of folder redirection and copies the data on the local drive during publishing and when the virtual environment starts. After the user closes the App-V application and the App-V Client closes the virtual environment, the local storage of the VFS AppData is copied back to the network, enabling roaming to additional machines, where the process will be repeated. The detailed steps of the processes are: @@ -888,7 +888,7 @@ Adding an App-V package to the client is the first step of the publishing refres **Note**   This will not perform a package deletion but rather remove integration points for the specific target (user or machine) and remove user catalog files (machine catalog files for globally published). -   + 6. Invoke background load mounting based on client configuration. @@ -897,7 +897,7 @@ Adding an App-V package to the client is the first step of the publishing refres **Note**   This condition occurs as a product of removal without unpublishing with background addition of the package. -   + This completes an App-V package add of the publishing refresh process. The next step is publishing the package to the specific target (machine or user). @@ -926,7 +926,7 @@ During the Publishing Refresh operation, the specific publishing operation (Publ **Note**   This enables restore extension points if the package is unpublished. -   + 3. Run scripts targeted for publishing timing. @@ -1017,7 +1017,7 @@ The App-V 5 package upgrade process differs from the older versions of App-V. Ap -  + When a task is placed in a pending state, the App-V client also generates a registry key for the pending task, as follows: @@ -1044,7 +1044,7 @@ When a task is placed in a pending state, the App-V client also generates a regi -  + The following operations must be completed before users can use the newer version of the package: @@ -1071,7 +1071,7 @@ The following operations must be completed before users can use the newer versio -  + Use the following example scenarios as a guide for updating packages. @@ -1101,7 +1101,7 @@ Use the following example scenarios as a guide for updating packages. -  + ### Global vs user publishing @@ -1240,7 +1240,7 @@ In this example: - `"[{AppVPackageRoot}]\Reader\AcroRd32.exe" "%1"` is the command line, which points to the application executable -  + ### Shell extensions @@ -1307,7 +1307,7 @@ The following table displays the supported shell extensions. -  + ### COM @@ -1372,7 +1372,7 @@ In this example: - `[{ProgramFilesX86}]\Mozilla Thunderbird\mozMapi32_InUse.dll` is the MAPI dll registration -  + ### URL Protocol handler @@ -1493,7 +1493,7 @@ Extension points are not all published the same way, where some extension points -  + ## Dynamic configuration processing @@ -1596,7 +1596,7 @@ During publishing of an App-V package with SxS assemblies the App-V Client will **Note**   UnPublishing or removing a package with an assembly does not remove the assemblies for that package. -  + ## Client logging @@ -1610,7 +1610,7 @@ In App-V 5.0 SP3, some logs were consolidated and moved to the following locatio For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved). -  + There are three specific categories of events recorded described below. @@ -1625,9 +1625,9 @@ There are three specific categories of events recorded described below. -  + -  + diff --git a/mdop/appv-v5/creating-and-managing-app-v-50-virtualized-applications.md b/mdop/appv-v5/creating-and-managing-app-v-50-virtualized-applications.md index c9b1def61b..ca24494376 100644 --- a/mdop/appv-v5/creating-and-managing-app-v-50-virtualized-applications.md +++ b/mdop/appv-v5/creating-and-managing-app-v-50-virtualized-applications.md @@ -22,7 +22,7 @@ After you have properly deployed the Microsoft Application Virtualization (App-V **Note**   For more information about configuring the Microsoft Application Virtualization (App-V) 5.0 sequencer, sequencing best practices, and an example of creating and updating a virtual application, see the [Microsoft Application Virtualization 5.0 Sequencing Guide](https://download.microsoft.com/download/F/7/8/F784A197-73BE-48FF-83DA-4102C05A6D44/App-V 5.0 Sequencing Guide.docx) (http://download.microsoft.com/download/F/7/8/F784A197-73BE-48FF-83DA-4102C05A6D44/App-V 5.0 Sequencing Guide.docx). -  + ## Sequencing an application @@ -38,7 +38,7 @@ You can use the App-V 5.0 Sequencer to perform the following tasks: **Note**   You must create shortcuts and save them to an available network location to allow roaming. If a shortcut is created and saved in a private location, the package must be published locally to the computer running the App-V 5.0 client. -   + - Convert existing virtual packages. @@ -59,7 +59,7 @@ When you use the sequencer to create a new virtual application, the following li **Important**   You must configure the %TMP% and %TEMP% folders that the package converter uses to be a secure location and directory. A secure location is only accessible by an administrator. Additionally, when you sequence the package you should save the package to a location that is secure, or make sure that no other user is allowed to be logged in during the conversion and monitoring process. -  + The **Options** dialog box in the sequencer console contains the following tabs: @@ -68,7 +68,7 @@ The **Options** dialog box in the sequencer console contains the following tabs: **Important**   Package Accelerators created using App-V 4.6 are not supported by App-V 5.0. -   + - **Parse Items**. This tab displays the associated file path locations that will be parsed or tokenized into in the virtual environment. Tokens are useful for adding files using the **Package Files** tab in **Advanced Editing**. @@ -146,7 +146,7 @@ The following table lists the supported shell extensions: -  + ## Copy on Write (CoW) file extension support @@ -273,7 +273,7 @@ The following table displays the file types that can exist in a virtual package .wsh -  + ## Modifying an existing virtual application package @@ -305,7 +305,7 @@ A template can specify and store multiple settings as follows: **Note**   Package accelerators created using a previous version of App-V must be recreated using App-V 5.0. -  + You can use App-V 5.0 package accelerators to automatically generate a new virtual application packages. After you have successfully created a package accelerator, you can reuse and share the package accelerator. @@ -334,9 +334,9 @@ You can also find additional information about sequencing errors using the Windo - [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/creating-and-managing-app-v-51-virtualized-applications.md b/mdop/appv-v5/creating-and-managing-app-v-51-virtualized-applications.md index aa070a51f5..c781eb4fea 100644 --- a/mdop/appv-v5/creating-and-managing-app-v-51-virtualized-applications.md +++ b/mdop/appv-v5/creating-and-managing-app-v-51-virtualized-applications.md @@ -38,7 +38,7 @@ You can use the App-V 5.1 Sequencer to perform the following tasks: **Note**   You must create shortcuts and save them to an available network location to allow roaming. If a shortcut is created and saved in a private location, the package must be published locally to the computer running the App-V 5.1 client. -  + - Convert existing virtual packages. The sequencer uses the **%TMP% \\ Scratch** or **%TEMP% \\ Scratch** directory and the **Temp** directory to store temporary files during sequencing. On the computer that runs the sequencer, you should configure these directories with free disk space equivalent to the estimated application installation requirements. Configuring the temp directories and the Temp directory on different hard drive partitions can help improve performance during sequencing. diff --git a/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v.md b/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v.md index ba43f84195..88c3436957 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v.md +++ b/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v.md @@ -70,7 +70,7 @@ The following table shows the App-V versions, methods of Office package creation -  + ## Creating Office 2010 App-V 5.0 using the sequencer @@ -182,7 +182,7 @@ The following table provides a full list of supported integration points for Off

    Active X Controls:

    -

    For more information on ActiveX controls, refer to [ActiveX Control API Reference](https://go.microsoft.com/fwlink/p/?LinkId=331361).

    +

    For more information on ActiveX controls, refer to ActiveX Control API Reference.

    @@ -273,7 +273,7 @@ The following table provides a full list of supported integration points for Off -  + ## Additional resources @@ -305,9 +305,9 @@ The following table provides a full list of supported integration points for Off -  + -  + diff --git a/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v51.md b/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v51.md index d41897ce13..8e68496eec 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v51.md +++ b/mdop/appv-v5/deploying-microsoft-office-2010-by-using-app-v51.md @@ -71,7 +71,7 @@ The following table shows the App-V versions, methods of Office package creation -  + ## Creating Office 2010 App-V 5.1 using the sequencer @@ -183,7 +183,7 @@ The following table provides a full list of supported integration points for Off

    Active X Controls:

    -

    For more information on ActiveX controls, refer to [ActiveX Control API Reference](https://go.microsoft.com/fwlink/p/?LinkId=331361).

    +

    For more information on ActiveX controls, refer to ActiveX Control API Reference.

    @@ -274,7 +274,7 @@ The following table provides a full list of supported integration points for Off -  + ## Additional resources @@ -306,9 +306,9 @@ The following table provides a full list of supported integration points for Off -  + -  + diff --git a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md index ce433a1185..cd697fed7c 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md +++ b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md @@ -51,7 +51,7 @@ Use the following table to get information about supported versions of Office an -

    [Planning for Using App-V with Office](planning-for-using-app-v-with-office.md#bkmk-office-vers-supp-appv)

    +

    Planning for Using App-V with Office

    • Supported versions of Office

    • Supported deployment types (for example, desktop, personal Virtual Desktop Infrastructure (VDI), pooled VDI)

    • @@ -59,13 +59,13 @@ Use the following table to get information about supported versions of Office an
    -

    [Planning for Using App-V with Office](planning-for-using-app-v-with-office.md#bkmk-plan-coexisting)

    +

    Planning for Using App-V with Office

    Considerations for installing different versions of Office on the same computer

    -  + ### Packaging, publishing, and deployment requirements @@ -88,7 +88,7 @@ Before you deploy Office by using App-V, review the following requirements.
    • All of the Office applications that you want to deploy to users must be in a single package.

    • In App-V 5.0 and later, you must use the Office Deployment Tool to create packages. You cannot use the Sequencer.

    • -
    • If you are deploying Microsoft Visio 2013 and Microsoft Project 2013 along with Office, you must include them in the same package with Office. For more information, see [Deploying Visio 2013 and Project 2013 with Office](#bkmk-deploy-visio-project).

    • +
    • If you are deploying Microsoft Visio 2013 and Microsoft Project 2013 along with Office, you must include them in the same package with Office. For more information, see Deploying Visio 2013 and Project 2013 with Office.

    @@ -105,7 +105,7 @@ Before you deploy Office by using App-V, review the following requirements.
  • Visio Pro for Office 365

  • Project Pro for Office 365

  • -

    You must enable [shared computer activation](https://technet.microsoft.com/library/dn782860.aspx).

    +

    You must enable shared computer activation.

    You don’t use shared computer activation if you’re deploying a volume licensed product, such as:

    • Office Professional Plus 2013

    • @@ -116,7 +116,7 @@ Before you deploy Office by using App-V, review the following requirements. -  + ### Excluding Office applications from a package @@ -138,27 +138,27 @@ The following table describes the recommended methods for excluding specific Off

      Use the ExcludeApp setting when you create the package by using the Office Deployment Tool.

      • Enables you to exclude specific Office applications from the package when the Office Deployment Tool creates the package. For example, you can use this setting to create a package that contains only Microsoft Word.

      • -
      • For more information, see [ExcludeApp element](https://technet.microsoft.com/library/jj219426.aspx#bkmk-excludeappelement).

      • +
      • For more information, see ExcludeApp element.

      Modify the DeploymentConfig.xml file

      • Modify the DeploymentConfig.xml file after the package has been created. This file contains the default package settings for all users on a computer that is running the App-V Client.

      • -
      • For more information, see [Disabling Office 2013 applications](#bkmk-disable-office-apps).

      • +
      • For more information, see Disabling Office 2013 applications.

      -  + ## Creating an Office 2013 package for App-V with the Office Deployment Tool Complete the following steps to create an Office 2013 package for App-V 5.0 or later. -**Important**   +**Important** In App-V 5.0 and later, you must the Office Deployment Tool to create a package. You cannot use the Sequencer to create packages. @@ -193,9 +193,9 @@ The computer on which you are installing the Office Deployment Tool must have: -**Note**   +**Note** In this topic, the term “Office 2013 App-V package” refers to subscription licensing and volume licensing. -  + ### Create Office 2013 App-V Packages Using Office Deployment Tool @@ -221,120 +221,120 @@ After you download the Office Deployment Tool, you can use it to get the latest The XML file that is included in the Office Deployment Tool specifies the product details, such as the languages and Office applications included. -1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: +1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: - 1. Open the sample XML file in Notepad or your favorite text editor. + 1. Open the sample XML file in Notepad or your favorite text editor. - 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2013 applications. The following is a basic example of the configuration.xml file: + 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2013 applications. The following is a basic example of the configuration.xml file: - ``` syntax - - - - - - - - - - - ``` + ``` syntax + + + + + + + + + + + ``` - **Note**   - The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. + **Note** + The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. - The above XML configuration file specifies that Office 2013 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2013, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2013 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: + The above XML configuration file specifies that Office 2013 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2013, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2013 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      InputDescriptionExample

      Add element

      Specifies the products and languages to include in the package.

      N/A

      OfficeClientEdition (attribute of Add element)

      Specifies the edition of Office 2013 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

      OfficeClientEdition="32"

      -

      OfficeClientEdition="64"

      Product element

      Specifies the application. Project 2013 and Visio 2013 must be specified here as an added product to be included in the applications.

      Product ID ="O365ProPlusRetail "

      -

      Product ID ="VisioProRetail"

      -

      Product ID ="ProjectProRetail"

      -

      Product ID ="ProPlusVolume"

      -

      Product ID ="VisioProVolume"

      -

      Product ID = "ProjectProVolume"

      Language element

      Specifies the language supported in the applications

      Language ID="en-us"

      Version (attribute of Add element)

      Optional. Specifies a build to use for the package

      -

      Defaults to latest advertised build (as defined in v32.CAB at the Office source).

      15.1.2.3

      SourcePath (attribute of Add element)

      Specifies the location in which the applications will be saved to.

      Sourcepath = "\\Server\Office2013”

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      InputDescriptionExample

      Add element

      Specifies the products and languages to include in the package.

      N/A

      OfficeClientEdition (attribute of Add element)

      Specifies the edition of Office 2013 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

      OfficeClientEdition="32"

      +

      OfficeClientEdition="64"

      Product element

      Specifies the application. Project 2013 and Visio 2013 must be specified here as an added product to be included in the applications.

      Product ID ="O365ProPlusRetail "

      +

      Product ID ="VisioProRetail"

      +

      Product ID ="ProjectProRetail"

      +

      Product ID ="ProPlusVolume"

      +

      Product ID ="VisioProVolume"

      +

      Product ID = "ProjectProVolume"

      Language element

      Specifies the language supported in the applications

      Language ID="en-us"

      Version (attribute of Add element)

      Optional. Specifies a build to use for the package

      +

      Defaults to latest advertised build (as defined in v32.CAB at the Office source).

      15.1.2.3

      SourcePath (attribute of Add element)

      Specifies the location in which the applications will be saved to.

      Sourcepath = "\Server\Office2013”

      - After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2013 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. + After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2013 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. -2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2013 applications that will later be converted into an App-V package. Below is an example command with description of details: +2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2013 applications that will later be converted into an App-V package. Below is an example command with description of details: - ``` syntax - \\server\Office2013\setup.exe /download \\server\Office2013\Customconfig.xml - ``` + ``` syntax + \\server\Office2013\setup.exe /download \\server\Office2013\Customconfig.xml + ``` - In the example: + In the example: + + + + + + + + + + + + + + + + + + + + + + + + +

      \server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /download

      downloads the Office 2013 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2013 App-V package with Volume Licensing.

      \server\Office2013\Customconfig.xml

      passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \Server\Office2013.

      - - - - - - - - - - - - - - - - - - - - - - - -

      \\server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /download

      downloads the Office 2013 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2013 App-V package with Volume Licensing.

      \\server\Office2013\Customconfig.xml

      passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \\Server\Office2013.

      -   ### Convert the Office applications into an App-V package @@ -386,180 +386,181 @@ After you download the Office 2013 applications through the Office Deployment To -  + **How to convert the Office applications into an App-V package** -1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: +1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      ParameterWhat to change the value to

      SourcePath

      Point to the Office applications downloaded earlier.

      ProductID

      Specify the type of licensing, as shown in the following examples:

      -
        -
      • Subscription Licensing

        -
        <Configuration>
        -       <Add SourcePath= "\\server\Office 2013" OfficeClientEdition="32" >
        -        <Product ID="O365ProPlusRetail">
        -          <Language ID="en-us" />
        -        </Product>
        -        <Product ID="VisioProRetail">
        -          <Language ID="en-us" />
        -        </Product>
        -      </Add>
        -    </Configuration> 
        -

        In this example, the following changes were made to create a package with Subscription licensing:

        - - - - - - - - - - - - - - - - - - - -

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to O365ProPlusRetail.

        Product ID

        for Visio was changed to VisioProRetail.

        -

         

        -

      • -
      • Volume Licensing

        -
        <Configuration>
        -       <Add SourcePath= "\\Server\Office2013" OfficeClientEdition="32" >
        -        <Product ID="ProPlusVolume">
        -          <Language ID="en-us" />
        -        </Product>
        -        <Product ID="VisioProVolume">
        -          <Language ID="en-us" />
        -        </Product>
        -      </Add>
        -    </Configuration>
        -

        In this example, the following changes were made to create a package with Volume licensing:

        - - - - - - - - - - - - - - - - - - - -

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to ProPlusVolume.

        Product ID

        for Visio was changed to VisioProVolume.

        -

         

        -

      • -

      ExcludeApp (optional)

      Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

      PACKAGEGUID (optional)

      By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

      -

      An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users.

      -
      - Note   -

      Even if you use unique package IDs, you can still deploy only one App-V package to a single device.

      -
      -
      -   -
      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      ParameterWhat to change the value to

      SourcePath

      Point to the Office applications downloaded earlier.

      ProductID

      Specify the type of licensing, as shown in the following examples:

      +
        +
      • Subscription Licensing

        +
        <Configuration>
        +      <Add SourcePath= "\server\Office 2013" OfficeClientEdition="32" >
        +       <Product ID="O365ProPlusRetail">
        +         <Language ID="en-us" />
        +       </Product>
        +       <Product ID="VisioProRetail">
        +         <Language ID="en-us" />
        +       </Product>
        +     </Add>
        +   </Configuration> 
        +

        In this example, the following changes were made to create a package with Subscription licensing:

        + + + + + + + + + + + + + + + + + + + +

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to O365ProPlusRetail.

        Product ID

        for Visio was changed to VisioProRetail.

        +

        +

      • +
      • Volume Licensing

        +
        <Configuration>
        +      <Add SourcePath= "\Server\Office2013" OfficeClientEdition="32" >
        +       <Product ID="ProPlusVolume">
        +         <Language ID="en-us" />
        +       </Product>
        +       <Product ID="VisioProVolume">
        +         <Language ID="en-us" />
        +       </Product>
        +     </Add>
        +   </Configuration>
        +

        In this example, the following changes were made to create a package with Volume licensing:

        + + + + + + + + + + + + + + + + + + + +

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to ProPlusVolume.

        Product ID

        for Visio was changed to VisioProVolume.

        +

        +

      • +

      ExcludeApp (optional)

      Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

      PACKAGEGUID (optional)

      By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

      +

      An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users.

      +
      + Note

      Even if you use unique package IDs, you can still deploy only one App-V package to a single device.

      +
      +
      -   +
      -2. Use the /packager command to convert the Office applications to an Office 2013 App-V package. - For example: - ``` syntax - \\server\Office2013\setup.exe /packager \\server\Office2013\Customconfig.xml \\server\share\Office2013AppV - ``` +2. Use the /packager command to convert the Office applications to an Office 2013 App-V package. - In the example: + For example: - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      \\server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /packager

      creates the Office 2013 App-V package with Volume Licensing as specified in the customConfig.xml file.

      \\server\Office2013\Customconfig.xml

      passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

      \\server\share\Office 2013AppV

      specifies the location of the newly created Office App-V package.

      + ``` syntax + \\server\Office2013\setup.exe /packager \\server\Office2013\Customconfig.xml \\server\share\Office2013AppV + ``` -   + In the example: - After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: + + + + + + + + + + + + + + + + + + + + + + + + + + + +

      \server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /packager

      creates the Office 2013 App-V package with Volume Licensing as specified in the customConfig.xml file.

      \server\Office2013\Customconfig.xml

      passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

      \server\share\Office 2013AppV

      specifies the location of the newly created Office App-V package.

      - - **App-V Packages** – contains an Office 2013 App-V package and two deployment configuration files. - - **WorkingDir** - **Note**   - To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ +After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: -   +- **App-V Packages** – contains an Office 2013 App-V package and two deployment configuration files. -3. Verify that the Office 2013 App-V package works correctly: +- **WorkingDir** - 1. Publish the Office 2013 App-V package, which you created globally, to a test computer, and verify that the Office 2013 shortcuts appear. +**Note** +To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ - 2. Start a few Office 2013 applications, such as Excel or Word, to ensure that your package is working as expected. + + +3. Verify that the Office 2013 App-V package works correctly: + + 1. Publish the Office 2013 App-V package, which you created globally, to a test computer, and verify that the Office 2013 shortcuts appear. + + 2. Start a few Office 2013 applications, such as Excel or Word, to ensure that your package is working as expected. ## Publishing the Office package for App-V 5.0 @@ -604,7 +605,7 @@ Deploy the App-V package for Office 2013 by using the same methods you use for a -  + ### How to publish an Office package @@ -647,10 +648,10 @@ Use the steps in this section to enable Office plug-ins with your Office package 5. Add the Office 2013 App-V package and the plug-ins package you sequenced to the Connection Group you created. - **Important**   + **Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2013 App-V package first, and then add the plug-in App-V package. -   + 6. Ensure that both packages are published to the target computer and that the plug-in package is published globally to match the global settings of the published Office 2013 App-V package. @@ -670,10 +671,10 @@ Use the steps in this section to enable Office plug-ins with your Office package You may want to disable specific applications in your Office App-V package. For instance, you can disable Access, but leave all other Office application main available. When you disable an application, the end user will no longer see the shortcut for that application. You do not have to re-sequence the application. When you change the Deployment Configuration File after the Office 2013 App-V package has been published, you will save the changes, add the Office 2013 App-V package, and then republish it with the new Deployment Configuration File to apply the new settings to Office 2013 App-V Package applications. -**Note**   +**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. For more information, see [Reference for Click-to-Run configuration.xml file](https://technet.microsoft.com/library/jj219426.aspx). -  + **To disable an Office 2013 application** @@ -758,14 +759,14 @@ To upgrade an Office 2013 package, use the Office Deployment Tool. To upgrade a 1. Create a new Office 2013 package through the Office Deployment Tool that uses the most recent Office 2013 application software. The most recent Office 2013 bits can always be obtained through the download stage of creating an Office 2013 App-V Package. The newly created Office 2013 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. - **Note**   + **Note** Office App-V packages have two Version IDs: - An Office 2013 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool. - A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2013 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2013 package. -   + 2. Globally publish the newly created Office 2013 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2013 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. @@ -808,7 +809,7 @@ The following table describes the requirements and options for deploying Visio 2

      How do I package and publish Visio 2013 and Project 2013 with Office?

      You must include Visio 2013 and Project 2013 in the same package with Office.

      -

      If you aren’t deploying Office, you can create a package that contains Visio and/or Project, as long as you follow [Deploying Microsoft Office 2010 by Using App-V](../appv-v5/deploying-microsoft-office-2010-by-using-app-v.md).

      +

      If you aren’t deploying Office, you can create a package that contains Visio and/or Project, as long as you follow Deploying Microsoft Office 2010 by Using App-V.

      How can I deploy Visio 2013 and Project 2013 to specific users?

      @@ -839,17 +840,17 @@ The following table describes the requirements and options for deploying Visio 2
      1. Create a package that contains Office, Visio, and Project.

      2. Deploy the package to all users.

      3. -
      4. Use [Microsoft AppLocker](https://technet.microsoft.com/library/dd723678.aspx) to prevent specific users from using Visio and Project.

      5. +
      6. Use Microsoft AppLocker to prevent specific users from using Visio and Project.

      -

       

      +

      -  + ## Additional resources @@ -883,9 +884,9 @@ The following table describes the requirements and options for deploying Visio 2 -  - -  + + + diff --git a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md index 3cdaab8529..a5afa4ef90 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md +++ b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md @@ -51,7 +51,7 @@ Use the following table to get information about supported versions of Office an -

      [Planning for Using App-V with Office](planning-for-using-app-v-with-office51.md#bkmk-office-vers-supp-appv)

      +

      Planning for Using App-V with Office

      • Supported versions of Office

      • Supported deployment types (for example, desktop, personal Virtual Desktop Infrastructure (VDI), pooled VDI)

      • @@ -59,13 +59,13 @@ Use the following table to get information about supported versions of Office an
      -

      [Planning for Using App-V with Office](planning-for-using-app-v-with-office51.md#bkmk-plan-coexisting)

      +

      Planning for Using App-V with Office

      Considerations for installing different versions of Office on the same computer

      -  + ### Packaging, publishing, and deployment requirements Before you deploy Office by using App-V, review the following requirements. @@ -87,7 +87,7 @@ Before you deploy Office by using App-V, review the following requirements.
      • All of the Office applications that you want to deploy to users must be in a single package.

      • In App-V 5.1 and later, you must use the Office Deployment Tool to create packages. You cannot use the Sequencer.

      • -
      • If you are deploying Microsoft Visio 2013 and Microsoft Project 2013 along with Office, you must include them in the same package with Office. For more information, see [Deploying Visio 2013 and Project 2013 with Office](#bkmk-deploy-visio-project).

      • +
      • If you are deploying Microsoft Visio 2013 and Microsoft Project 2013 along with Office, you must include them in the same package with Office. For more information, see Deploying Visio 2013 and Project 2013 with Office.

      @@ -104,7 +104,7 @@ Before you deploy Office by using App-V, review the following requirements.
    • Visio Pro for Office 365

    • Project Pro for Office 365

    -

    You must enable [shared computer activation](https://technet.microsoft.com/library/dn782860.aspx).

    +

    You must enable shared computer activation.

    You don’t use shared computer activation if you’re deploying a volume licensed product, such as:

    • Office Professional Plus 2013

    • @@ -115,7 +115,7 @@ Before you deploy Office by using App-V, review the following requirements. -  + ### Excluding Office applications from a package @@ -137,30 +137,30 @@ The following table describes the recommended methods for excluding specific Off

      Use the ExcludeApp setting when you create the package by using the Office Deployment Tool.

      • Enables you to exclude specific Office applications from the package when the Office Deployment Tool creates the package. For example, you can use this setting to create a package that contains only Microsoft Word.

      • -
      • For more information, see [ExcludeApp element](https://technet.microsoft.com/library/jj219426.aspx#bkmk-excludeappelement).

      • +
      • For more information, see ExcludeApp element.

      Modify the DeploymentConfig.xml file

      • Modify the DeploymentConfig.xml file after the package has been created. This file contains the default package settings for all users on a computer that is running the App-V Client.

      • -
      • For more information, see [Disabling Office 2013 applications](#bkmk-disable-office-apps).

      • +
      • For more information, see Disabling Office 2013 applications.

      -  + ## Creating an Office 2013 package for App-V with the Office Deployment Tool Complete the following steps to create an Office 2013 package for App-V 5.1 or later. -**Important**   +**Important** In App-V 5.1 and later, you must the Office Deployment Tool to create a package. You cannot use the Sequencer to create packages. -  + ### Review prerequisites for using the Office Deployment Tool @@ -192,12 +192,12 @@ The computer on which you are installing the Office Deployment Tool must have: -  -**Note**   + +**Note** In this topic, the term “Office 2013 App-V package” refers to subscription licensing and volume licensing. -  + ### Create Office 2013 App-V Packages Using Office Deployment Tool @@ -242,105 +242,107 @@ The XML file that is included in the Office Deployment Tool specifies the produc ``` - **Note**   + **Note** The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. -   - The above XML configuration file specifies that Office 2013 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2013, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2013 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      InputDescriptionExample

      Add element

      Specifies the products and languages to include in the package.

      N/A

      OfficeClientEdition (attribute of Add element)

      Specifies the edition of Office 2013 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

      OfficeClientEdition="32"

      -

      OfficeClientEdition="64"

      Product element

      Specifies the application. Project 2013 and Visio 2013 must be specified here as an added product to be included in the applications.

      Product ID ="O365ProPlusRetail "

      -

      Product ID ="VisioProRetail"

      -

      Product ID ="ProjectProRetail"

      -

      Product ID ="ProPlusVolume"

      -

      Product ID ="VisioProVolume"

      -

      Product ID = "ProjectProVolume"

      Language element

      Specifies the language supported in the applications

      Language ID="en-us"

      Version (attribute of Add element)

      Optional. Specifies a build to use for the package

      -

      Defaults to latest advertised build (as defined in v32.CAB at the Office source).

      15.1.2.3

      SourcePath (attribute of Add element)

      Specifies the location in which the applications will be saved to.

      Sourcepath = "\\Server\Office2013”

      - -   - - After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2013 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. - -2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2013 applications that will later be converted into an App-V package. Below is an example command with description of details: - - ``` syntax - \\server\Office2013\setup.exe /download \\server\Office2013\Customconfig.xml - ``` - - In the example: +~~~ + The above XML configuration file specifies that Office 2013 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2013, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2013 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: - - + + + + + + + + + + - - + + + - - + + + - - + + + - - + + + + + + + + + + + + +
      InputDescriptionExample

      \\server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Add element

      Specifies the products and languages to include in the package.

      N/A

      Setup.exe

      is the Office Deployment Tool.

      OfficeClientEdition (attribute of Add element)

      Specifies the edition of Office 2013 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

      OfficeClientEdition="32"

      +

      OfficeClientEdition="64"

      /download

      downloads the Office 2013 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2013 App-V package with Volume Licensing.

      Product element

      Specifies the application. Project 2013 and Visio 2013 must be specified here as an added product to be included in the applications.

      Product ID ="O365ProPlusRetail "

      +

      Product ID ="VisioProRetail"

      +

      Product ID ="ProjectProRetail"

      +

      Product ID ="ProPlusVolume"

      +

      Product ID ="VisioProVolume"

      +

      Product ID = "ProjectProVolume"

      \\server\Office2013\Customconfig.xml

      passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \\Server\Office2013.

      Language element

      Specifies the language supported in the applications

      Language ID="en-us"

      Version (attribute of Add element)

      Optional. Specifies a build to use for the package

      +

      Defaults to latest advertised build (as defined in v32.CAB at the Office source).

      15.1.2.3

      SourcePath (attribute of Add element)

      Specifies the location in which the applications will be saved to.

      Sourcepath = "\\Server\Office2013”

      -   + + + After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2013 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. +~~~ + +2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2013 applications that will later be converted into an App-V package. Below is an example command with description of details: + + ``` syntax + \\server\Office2013\setup.exe /download \\server\Office2013\Customconfig.xml + ``` + + In the example: + + + + + + + + + + + + + + + + + + + + + + + + +

      \server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /download

      downloads the Office 2013 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2013 App-V package with Volume Licensing.

      \server\Office2013\Customconfig.xml

      passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \Server\Office2013.

      + + ### Convert the Office applications into an App-V package @@ -392,180 +394,181 @@ After you download the Office 2013 applications through the Office Deployment To -  + **How to convert the Office applications into an App-V package** -1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: +1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      ParameterWhat to change the value to

      SourcePath

      Point to the Office applications downloaded earlier.

      ProductID

      Specify the type of licensing, as shown in the following examples:

      -
        -
      • Subscription Licensing

        -
        <Configuration>
        -       <Add SourcePath= "\\server\Office 2013" OfficeClientEdition="32" >
        -        <Product ID="O365ProPlusRetail">
        -          <Language ID="en-us" />
        -        </Product>
        -        <Product ID="VisioProRetail">
        -          <Language ID="en-us" />
        -        </Product>
        -      </Add>
        -    </Configuration> 
        -

        In this example, the following changes were made to create a package with Subscription licensing:

        - - - - - - - - - - - - - - - - - - - -

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to O365ProPlusRetail.

        Product ID

        for Visio was changed to VisioProRetail.

        -

         

        -

      • -
      • Volume Licensing

        -
        <Configuration>
        -       <Add SourcePath= "\\Server\Office2013" OfficeClientEdition="32" >
        -        <Product ID="ProPlusVolume">
        -          <Language ID="en-us" />
        -        </Product>
        -        <Product ID="VisioProVolume">
        -          <Language ID="en-us" />
        -        </Product>
        -      </Add>
        -    </Configuration>
        -

        In this example, the following changes were made to create a package with Volume licensing:

        - - - - - - - - - - - - - - - - - - - -

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to ProPlusVolume.

        Product ID

        for Visio was changed to VisioProVolume.

        -

         

        -

      • -

      ExcludeApp (optional)

      Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

      PACKAGEGUID (optional)

      By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

      -

      An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users.

      -
      - Note   -

      Even if you use unique package IDs, you can still deploy only one App-V package to a single device.

      -
      -
      -   -
      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      ParameterWhat to change the value to

      SourcePath

      Point to the Office applications downloaded earlier.

      ProductID

      Specify the type of licensing, as shown in the following examples:

      +
        +
      • Subscription Licensing

        +
        <Configuration>
        +      <Add SourcePath= "\server\Office 2013" OfficeClientEdition="32" >
        +       <Product ID="O365ProPlusRetail">
        +         <Language ID="en-us" />
        +       </Product>
        +       <Product ID="VisioProRetail">
        +         <Language ID="en-us" />
        +       </Product>
        +     </Add>
        +   </Configuration> 
        +

        In this example, the following changes were made to create a package with Subscription licensing:

        + + + + + + + + + + + + + + + + + + + +

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to O365ProPlusRetail.

        Product ID

        for Visio was changed to VisioProRetail.

        +

        +

      • +
      • Volume Licensing

        +
        <Configuration>
        +      <Add SourcePath= "\Server\Office2013" OfficeClientEdition="32" >
        +       <Product ID="ProPlusVolume">
        +         <Language ID="en-us" />
        +       </Product>
        +       <Product ID="VisioProVolume">
        +         <Language ID="en-us" />
        +       </Product>
        +     </Add>
        +   </Configuration>
        +

        In this example, the following changes were made to create a package with Volume licensing:

        + + + + + + + + + + + + + + + + + + + +

        SourcePath

        is the path, which was changed to point to the Office applications that were downloaded earlier.

        Product ID

        for Office was changed to ProPlusVolume.

        Product ID

        for Visio was changed to VisioProVolume.

        +

        +

      • +

      ExcludeApp (optional)

      Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

      PACKAGEGUID (optional)

      By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

      +

      An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users.

      +
      + Note

      Even if you use unique package IDs, you can still deploy only one App-V package to a single device.

      +
      +
      -   +
      -2. Use the /packager command to convert the Office applications to an Office 2013 App-V package. - For example: - ``` syntax - \\server\Office2013\setup.exe /packager \\server\Office2013\Customconfig.xml \\server\share\Office2013AppV - ``` +2. Use the /packager command to convert the Office applications to an Office 2013 App-V package. - In the example: + For example: - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      \\server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /packager

      creates the Office 2013 App-V package with Volume Licensing as specified in the customConfig.xml file.

      \\server\Office2013\Customconfig.xml

      passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

      \\server\share\Office 2013AppV

      specifies the location of the newly created Office App-V package.

      + ``` syntax + \\server\Office2013\setup.exe /packager \\server\Office2013\Customconfig.xml \\server\share\Office2013AppV + ``` -   + In the example: - After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: + + + + + + + + + + + + + + + + + + + + + + + + + + + +

      \server\Office2013

      is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

      Setup.exe

      is the Office Deployment Tool.

      /packager

      creates the Office 2013 App-V package with Volume Licensing as specified in the customConfig.xml file.

      \server\Office2013\Customconfig.xml

      passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

      \server\share\Office 2013AppV

      specifies the location of the newly created Office App-V package.

      - - **App-V Packages** – contains an Office 2013 App-V package and two deployment configuration files. - - **WorkingDir** - **Note**   - To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ +After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: -   +- **App-V Packages** – contains an Office 2013 App-V package and two deployment configuration files. -3. Verify that the Office 2013 App-V package works correctly: +- **WorkingDir** - 1. Publish the Office 2013 App-V package, which you created globally, to a test computer, and verify that the Office 2013 shortcuts appear. +**Note** +To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ - 2. Start a few Office 2013 applications, such as Excel or Word, to ensure that your package is working as expected. + + +3. Verify that the Office 2013 App-V package works correctly: + + 1. Publish the Office 2013 App-V package, which you created globally, to a test computer, and verify that the Office 2013 shortcuts appear. + + 2. Start a few Office 2013 applications, such as Excel or Word, to ensure that your package is working as expected. ## Publishing the Office package for App-V 5.1 @@ -610,7 +613,7 @@ Deploy the App-V package for Office 2013 by using the same methods you use for a -  + ### How to publish an Office package @@ -653,10 +656,10 @@ Use the steps in this section to enable Office plug-ins with your Office package 5. Add the Office 2013 App-V package and the plug-ins package you sequenced to the Connection Group you created. - **Important**   + **Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2013 App-V package first, and then add the plug-in App-V package. -   + 6. Ensure that both packages are published to the target computer and that the plug-in package is published globally to match the global settings of the published Office 2013 App-V package. @@ -676,10 +679,10 @@ Use the steps in this section to enable Office plug-ins with your Office package You may want to disable specific applications in your Office App-V package. For instance, you can disable Access, but leave all other Office application main available. When you disable an application, the end user will no longer see the shortcut for that application. You do not have to re-sequence the application. When you change the Deployment Configuration File after the Office 2013 App-V package has been published, you will save the changes, add the Office 2013 App-V package, and then republish it with the new Deployment Configuration File to apply the new settings to Office 2013 App-V Package applications. -**Note**   +**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. For more information, see [Reference for Click-to-Run configuration.xml file](https://technet.microsoft.com/library/jj219426.aspx). -  + **To disable an Office 2013 application** @@ -764,14 +767,14 @@ To upgrade an Office 2013 package, use the Office Deployment Tool. To upgrade a 1. Create a new Office 2013 package through the Office Deployment Tool that uses the most recent Office 2013 application software. The most recent Office 2013 bits can always be obtained through the download stage of creating an Office 2013 App-V Package. The newly created Office 2013 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. - **Note**   + **Note** Office App-V packages have two Version IDs: - An Office 2013 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool. - A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2013 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2013 package. -   + 2. Globally publish the newly created Office 2013 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2013 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. @@ -814,7 +817,7 @@ The following table describes the requirements and options for deploying Visio 2

      How do I package and publish Visio 2013 and Project 2013 with Office?

      You must include Visio 2013 and Project 2013 in the same package with Office.

      -

      If you aren’t deploying Office, you can create a package that contains Visio and/or Project, as long as you follow [Deploying Microsoft Office 2010 by Using App-V](../appv-v5/deploying-microsoft-office-2010-by-using-app-v.md).

      +

      If you aren’t deploying Office, you can create a package that contains Visio and/or Project, as long as you follow Deploying Microsoft Office 2010 by Using App-V.

      How can I deploy Visio 2013 and Project 2013 to specific users?

      @@ -845,17 +848,17 @@ The following table describes the requirements and options for deploying Visio 2
      1. Create a package that contains Office, Visio, and Project.

      2. Deploy the package to all users.

      3. -
      4. Use [Microsoft AppLocker](https://technet.microsoft.com/library/dd723678.aspx) to prevent specific users from using Visio and Project.

      5. +
      6. Use Microsoft AppLocker to prevent specific users from using Visio and Project.

      -

       

      +

      -  + ## Additional resources @@ -889,9 +892,9 @@ The following table describes the requirements and options for deploying Visio 2 -  - -  + + + diff --git a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v.md b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v.md index d66760f8e6..b60166ff33 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v.md +++ b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v.md @@ -51,7 +51,7 @@ Use the following table to get information about supported versions of Office an -

      [Supported versions of Microsoft Office](planning-for-using-app-v-with-office.md#bkmk-office-vers-supp-appv)

      +

      Supported versions of Microsoft Office

      • Supported versions of Office

      • Supported deployment types (for example, desktop, personal Virtual Desktop Infrastructure (VDI), pooled VDI)

      • @@ -59,13 +59,13 @@ Use the following table to get information about supported versions of Office an
      -

      [Planning for Using App-V with coexisting versions of Office](planning-for-using-app-v-with-office.md#bkmk-plan-coexisting)

      +

      Planning for Using App-V with coexisting versions of Office

      Considerations for installing different versions of Office on the same computer

      -  + ### Packaging, publishing, and deployment requirements @@ -89,7 +89,7 @@ Before you deploy Office by using App-V, review the following requirements.
      • All of the Office applications that you want to deploy to users must be in a single package.

      • In App-V 5.0 and later, you must use the Office Deployment Tool to create packages. You cannot use the Sequencer.

      • -
      • If you are deploying Microsoft Visio 2016 and Microsoft Project 2016 along with Office, you must include them in the same package with Office. For more information, see [Deploying Visio 2016 and Project 2016 with Office](#bkmk-deploy-visio-project).

      • +
      • If you are deploying Microsoft Visio 2016 and Microsoft Project 2016 along with Office, you must include them in the same package with Office. For more information, see Deploying Visio 2016 and Project 2016 with Office.

      @@ -106,13 +106,13 @@ Before you deploy Office by using App-V, review the following requirements.
    • Visio Pro for Office 365

    • Project Pro for Office 365

    -

    You must enable [shared computer activation](https://technet.microsoft.com/library/dn782860.aspx).

    +

    You must enable shared computer activation.

    -  + ### Excluding Office applications from a package @@ -134,20 +134,20 @@ The following table describes the recommended methods for excluding specific Off

    Use the ExcludeApp setting when you create the package by using the Office Deployment Tool.

    • Enables you to exclude specific Office applications from the package when the Office Deployment Tool creates the package. For example, you can use this setting to create a package that contains only Microsoft Word.

    • -
    • For more information, see [ExcludeApp element](https://technet.microsoft.com/library/jj219426.aspx#bkmk-excludeappelement).

    • +
    • For more information, see ExcludeApp element.

    Modify the DeploymentConfig.xml file

    • Modify the DeploymentConfig.xml file after the package has been created. This file contains the default package settings for all users on a computer that is running the App-V Client.

    • -
    • For more information, see [Disabling Office 2016 applications](#bkmk-disable-office-apps).

    • +
    • For more information, see Disabling Office 2016 applications.

    -  + ## Creating an Office 2016 package for App-V with the Office Deployment Tool @@ -188,8 +188,8 @@ The computer on which you are installing the Office Deployment Tool must have: ->**Note**  In this topic, the term “Office 2016 App-V package” refers to subscription licensing. -  +>**Note** In this topic, the term “Office 2016 App-V package” refers to subscription licensing. + ### Create Office 2016 App-V Packages Using Office Deployment Tool @@ -203,12 +203,12 @@ Office 2016 App-V Packages are created using the Office Deployment Tool, which g 1. Download the [Office 2016 Deployment Tool for Click-to-Run](https://www.microsoft.com/download/details.aspx?id=49117). ->**Important** You must use the Office 2016 Deployment Tool to create Office 2016 App-V Packages. -2. Run the .exe file and extract its features into the desired location. To make this process easier, you can create a shared network folder where the features will be saved. +> **Important** You must use the Office 2016 Deployment Tool to create Office 2016 App-V Packages. +> 2. Run the .exe file and extract its features into the desired location. To make this process easier, you can create a shared network folder where the features will be saved. Example: \\\\Server\\Office2016 -3. Check that a setup.exe and a configuration.xml file exist and are in the location you specified. +3. Check that a setup.exe and a configuration.xml file exist and are in the location you specified. ### Download Office 2016 applications @@ -216,125 +216,125 @@ After you download the Office Deployment Tool, you can use it to get the latest The XML file that is included in the Office Deployment Tool specifies the product details, such as the languages and Office applications included. -1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: +1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: - 1. Open the sample XML file in Notepad or your favorite text editor. + 1. Open the sample XML file in Notepad or your favorite text editor. - 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the configuration.xml file: + 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the configuration.xml file: - ``` syntax - - - - - - - - - - - ``` + ``` syntax + + + + + + + + + + + ``` - >**Note**  The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. To “uncomment” these lines, remove the "" from the end of the line. + >**Note** The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. To “uncomment” these lines, remove the "" from the end of the line. - The above XML configuration file specifies that Office 2016 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2016, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2016 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: + The above XML configuration file specifies that Office 2016 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2016, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2016 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + +
    InputDescriptionExample

    Add element

    Specifies the products and languages to include in the package.

    N/A

    OfficeClientEdition (attribute of Add element)

    Specifies the edition of Office 2016 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

    OfficeClientEdition="32"

    -

    OfficeClientEdition="64"

    Product element

    Specifies the application. Project 2016 and Visio 2016 must be specified here as an added product to be included in the applications. + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - -
    InputDescriptionExample

    Add element

    Specifies the products and languages to include in the package.

    N/A

    OfficeClientEdition (attribute of Add element)

    Specifies the edition of Office 2016 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

    OfficeClientEdition="32"

    +

    OfficeClientEdition="64"

    Product element

    Specifies the application. Project 2016 and Visio 2016 must be specified here as an added product to be included in the applications. - For more information about the product IDs, see [Product IDs that are supported by the Office Deployment Tool for Click-to-Run](https://support.microsoft.com/kb/2842297) -

    Product ID ="O365ProPlusRetail "

    -

    Product ID ="VisioProRetail"

    -

    Product ID ="ProjectProRetail"

    -

    Language element

    Specifies the language supported in the applications

    Language ID="en-us"

    Version (attribute of Add element)

    Optional. Specifies a build to use for the package

    -

    Defaults to latest advertised build (as defined in v32.CAB at the Office source).

    16.1.2.3

    SourcePath (attribute of Add element)

    Specifies the location in which the applications will be saved to.

    Sourcepath = "\\Server\Office2016”

    Channel (attribute of Add element)

    Optional. Specifies the update channel for the product that you want to download or install.

    For more information about update channels, see Overview of update channels for Office 365 ProPlus.

    Channel="Deferred"

    + For more information about the product IDs, see Product IDs that are supported by the Office Deployment Tool for Click-to-Run +

    Product ID ="O365ProPlusRetail "

    +

    Product ID ="VisioProRetail"

    +

    Product ID ="ProjectProRetail"

    +

    Language element

    Specifies the language supported in the applications

    Language ID="en-us"

    Version (attribute of Add element)

    Optional. Specifies a build to use for the package

    +

    Defaults to latest advertised build (as defined in v32.CAB at the Office source).

    16.1.2.3

    SourcePath (attribute of Add element)

    Specifies the location in which the applications will be saved to.

    Sourcepath = "\Server\Office2016”

    Channel (attribute of Add element)

    Optional. Specifies the update channel for the product that you want to download or install.

    For more information about update channels, see Overview of update channels for Office 365 ProPlus.

    Channel="Deferred"

    - After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2016 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. + After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2016 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. -2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2016 applications that will later be converted into an App-V package. Below is an example command with a description of details: +2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2016 applications that will later be converted into an App-V package. Below is an example command with a description of details: - ``` syntax - \\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml - ``` + ``` syntax + \\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml + ``` - In the example: + In the example: + + + + + + + + + + + + + + + + + + + + + + + + +

    \server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /download

    downloads the Office 2016 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2016 App-V package with Volume Licensing.

    \server\Office2016\Customconfig.xml

    passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \Server\Office2016.

    - - - - - - - - - - - - - - - - - - - - - - - -

    \\server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /download

    downloads the Office 2016 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2016 App-V package with Volume Licensing.

    \\server\Office2016\Customconfig.xml

    passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \\Server\Office2016.

    -   ### Convert the Office applications into an App-V package @@ -380,135 +380,137 @@ After you download the Office 2016 applications through the Office Deployment To -  + **How to convert the Office applications into an App-V package** -1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: +1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterWhat to change the value to

    SourcePath

    Point to the Office applications downloaded earlier.

    ProductID

    Specify Subscription licensing, as shown in the following example:

    -
    <Configuration>
    -       <Add SourcePath= "\\server\Office 2016" OfficeClientEdition="32" >
    -        <Product ID="O365ProPlusRetail">
    -          <Language ID="en-us" />
    -        </Product>
    -        <Product ID="VisioProRetail">
    -          <Language ID="en-us" />
    -        </Product>
    -      </Add>
    -    </Configuration> 
    -

    In this example, the following changes were made to create a package with Subscription licensing:

    - - - - - - - - - - - - - - - - - - - -

    SourcePath

    is the path, which was changed to point to the Office applications that were downloaded earlier.

    Product ID

    for Office was changed to O365ProPlusRetail.

    Product ID

    for Visio was changed to VisioProRetail.

    -

    -

    ExcludeApp (optional)

    Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

    PACKAGEGUID (optional)

    By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

    -

    An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users.

    ->**Note** Even if you use unique package IDs, you can still deploy only one App-V package to a single device. -
    + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterWhat to change the value to

    SourcePath

    Point to the Office applications downloaded earlier.

    ProductID

    Specify Subscription licensing, as shown in the following example:

    +
    <Configuration>
    +      <Add SourcePath= "\server\Office 2016" OfficeClientEdition="32" >
    +       <Product ID="O365ProPlusRetail">
    +         <Language ID="en-us" />
    +       </Product>
    +       <Product ID="VisioProRetail">
    +         <Language ID="en-us" />
    +       </Product>
    +     </Add>
    +   </Configuration> 
    +

    In this example, the following changes were made to create a package with Subscription licensing:

    + + + + + + + + + + + + + + + + + + + +

    SourcePath

    is the path, which was changed to point to the Office applications that were downloaded earlier.

    Product ID

    for Office was changed to O365ProPlusRetail.

    Product ID

    for Visio was changed to VisioProRetail.

    +

    +

    ExcludeApp (optional)

    Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

    PACKAGEGUID (optional)

    By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

    +

    An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users.

    + >Note Even if you use unique package IDs, you can still deploy only one App-V package to a single device. +
    -   -2. Use the /packager command to convert the Office applications to an Office 2016 App-V package. - For example: +2. Use the /packager command to convert the Office applications to an Office 2016 App-V package. - ``` syntax - \\server\Office2016\setup.exe /packager \\server\Office2016\Customconfig.xml \\server\share\Office2016AppV - ``` + For example: - In the example: + ``` syntax + \\server\Office2016\setup.exe /packager \\server\Office2016\Customconfig.xml \\server\share\Office2016AppV + ``` - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    \\server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /packager

    creates the Office 2016 App-V package with the type of licensing specified in the customConfig.xml file.

    \\server\Office2016\Customconfig.xml

    passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

    \\server\share\Office 2016AppV

    specifies the location of the newly created Office App-V package.

    + In the example: -   + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    \server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /packager

    creates the Office 2016 App-V package with the type of licensing specified in the customConfig.xml file.

    \server\Office2016\Customconfig.xml

    passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

    \server\share\Office 2016AppV

    specifies the location of the newly created Office App-V package.

    - After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: - - **App-V Packages** – contains an Office 2016 App-V package and two deployment configuration files. - - **WorkingDir** +~~~ +After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: - **Note** To troubleshoot any issues, see the log files in the %temp% directory (default). +- **App-V Packages** – contains an Office 2016 App-V package and two deployment configuration files. -   +- **WorkingDir** -3. Verify that the Office 2016 App-V package works correctly: +**Note** To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ - 1. Publish the Office 2016 App-V package, which you created globally, to a test computer, and verify that the Office 2016 shortcuts appear. - 2. Start a few Office 2016 applications, such as Excel or Word, to ensure that your package is working as expected. + +3. Verify that the Office 2016 App-V package works correctly: + + 1. Publish the Office 2016 App-V package, which you created globally, to a test computer, and verify that the Office 2016 shortcuts appear. + + 2. Start a few Office 2016 applications, such as Excel or Word, to ensure that your package is working as expected. ## Publishing the Office package for App-V @@ -553,7 +555,7 @@ Deploy the App-V package for Office 2016 by using the same methods you use for a -  + ### How to publish an Office package @@ -594,9 +596,9 @@ Use the steps in this section to enable Office plug-ins with your Office package 5. Add the Office 2016 App-V package and the plug-ins package you sequenced to the Connection Group you created. - >**Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2016 App-V package first, and then add the plug-in App-V package. + >**Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2016 App-V package first, and then add the plug-in App-V package. + -   6. Ensure that both packages are published to the target computer and that the plug-in package is published globally to match the global settings of the published Office 2016 App-V package. @@ -616,8 +618,8 @@ Use the steps in this section to enable Office plug-ins with your Office package You may want to disable specific applications in your Office App-V package. For instance, you can disable Access, but leave all other Office application main available. When you disable an application, the end user will no longer see the shortcut for that application. You do not have to re-sequence the application. When you change the Deployment Configuration File after the Office 2016 App-V package has been published, you will save the changes, add the Office 2016 App-V package, and then republish it with the new Deployment Configuration File to apply the new settings to Office 2016 App-V Package applications. ->**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. -  +>**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. + **To disable an Office 2016 application** @@ -693,18 +695,18 @@ To upgrade an Office 2016 package, use the Office Deployment Tool. To upgrade a **How to upgrade a previously deployed Office 2016 package** -1. Create a new Office 2016 package through the Office Deployment Tool that uses the most recent Office 2016 application software. The most recent Office 2016 bits can always be obtained through the download stage of creating an Office 2016 App-V Package. The newly created Office 2016 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. +1. Create a new Office 2016 package through the Office Deployment Tool that uses the most recent Office 2016 application software. The most recent Office 2016 bits can always be obtained through the download stage of creating an Office 2016 App-V Package. The newly created Office 2016 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. - >**Note** Office App-V packages have two Version IDs: -
      -
    • An Office 2016 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool.
    • -
    • A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2016 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2016 package.
    • -
    -   + > **Note** Office App-V packages have two Version IDs: + >
      + >
    • An Office 2016 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool.
    • + >
    • A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2016 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2016 package.
    • + >
    -2. Globally publish the newly created Office 2016 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2016 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. -3. Upgrades will be applied in the same manner of any globally published App-V Packages. Because applications will probably be in use, upgrades might be delayed until the computer is rebooted. +2. Globally publish the newly created Office 2016 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2016 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. + +3. Upgrades will be applied in the same manner of any globally published App-V Packages. Because applications will probably be in use, upgrades might be delayed until the computer is rebooted. ### Deploying Visio 2016 and Project 2016 with Office @@ -757,17 +759,17 @@ The following table describes the requirements and options for deploying Visio 2
    1. Create a package that contains Office, Visio, and Project.

    2. Deploy the package to all users.

    3. -
    4. Use [Microsoft AppLocker](https://technet.microsoft.com/library/dd723678.aspx) to prevent specific users from using Visio and Project.

    5. +
    6. Use Microsoft AppLocker to prevent specific users from using Visio and Project.

    -

     

    +

    -  + ## Additional resources diff --git a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md index ea9194d26f..e13e27d1f9 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md +++ b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md @@ -51,7 +51,7 @@ Use the following table to get information about supported versions of Office an -

    [Supported versions of Microsoft Office](planning-for-using-app-v-with-office.md#bkmk-office-vers-supp-appv)

    +

    Supported versions of Microsoft Office

    • Supported versions of Office

    • Supported deployment types (for example, desktop, personal Virtual Desktop Infrastructure (VDI), pooled VDI)

    • @@ -59,13 +59,13 @@ Use the following table to get information about supported versions of Office an
    -

    [Planning for Using App-V with coexisting versions of Office](planning-for-using-app-v-with-office.md#bkmk-plan-coexisting)

    +

    Planning for Using App-V with coexisting versions of Office

    Considerations for installing different versions of Office on the same computer

    -  + ### Packaging, publishing, and deployment requirements @@ -89,7 +89,7 @@ Before you deploy Office by using App-V, review the following requirements.
    • All of the Office applications that you want to deploy to users must be in a single package.

    • In App-V 5.1 and later, you must use the Office Deployment Tool to create packages. You cannot use the Sequencer.

    • -
    • If you are deploying Microsoft Visio 2016 and Microsoft Project 2016 along with Office, you must include them in the same package with Office. For more information, see [Deploying Visio 2016 and Project 2016 with Office](#bkmk-deploy-visio-project).

    • +
    • If you are deploying Microsoft Visio 2016 and Microsoft Project 2016 along with Office, you must include them in the same package with Office. For more information, see Deploying Visio 2016 and Project 2016 with Office.

    @@ -106,13 +106,13 @@ Before you deploy Office by using App-V, review the following requirements.
  • Visio Pro for Office 365

  • Project Pro for Office 365

  • -

    You must enable [shared computer activation](https://technet.microsoft.com/library/dn782860.aspx).

    +

    You must enable shared computer activation.

    -  + ### Excluding Office applications from a package @@ -134,20 +134,20 @@ The following table describes the recommended methods for excluding specific Off

    Use the ExcludeApp setting when you create the package by using the Office Deployment Tool.

    • Enables you to exclude specific Office applications from the package when the Office Deployment Tool creates the package. For example, you can use this setting to create a package that contains only Microsoft Word.

    • -
    • For more information, see [ExcludeApp element](https://technet.microsoft.com/library/jj219426.aspx#bkmk-excludeappelement).

    • +
    • For more information, see ExcludeApp element.

    Modify the DeploymentConfig.xml file

    • Modify the DeploymentConfig.xml file after the package has been created. This file contains the default package settings for all users on a computer that is running the App-V Client.

    • -
    • For more information, see [Disabling Office 2016 applications](#bkmk-disable-office-apps).

    • +
    • For more information, see Disabling Office 2016 applications.

    -  + ## Creating an Office 2016 package for App-V with the Office Deployment Tool @@ -188,8 +188,8 @@ The computer on which you are installing the Office Deployment Tool must have: ->**Note**  In this topic, the term “Office 2016 App-V package” refers to subscription licensing. -  +>**Note** In this topic, the term “Office 2016 App-V package” refers to subscription licensing. + ### Create Office 2016 App-V Packages Using Office Deployment Tool @@ -203,12 +203,12 @@ Office 2016 App-V Packages are created using the Office Deployment Tool, which g 1. Download the [Office 2016 Deployment Tool for Click-to-Run](https://www.microsoft.com/download/details.aspx?id=49117). ->**Important** You must use the Office 2016 Deployment Tool to create Office 2016 App-V Packages. -2. Run the .exe file and extract its features into the desired location. To make this process easier, you can create a shared network folder where the features will be saved. +> **Important** You must use the Office 2016 Deployment Tool to create Office 2016 App-V Packages. +> 2. Run the .exe file and extract its features into the desired location. To make this process easier, you can create a shared network folder where the features will be saved. Example: \\\\Server\\Office2016 -3. Check that a setup.exe and a configuration.xml file exist and are in the location you specified. +3. Check that a setup.exe and a configuration.xml file exist and are in the location you specified. ### Download Office 2016 applications @@ -216,125 +216,125 @@ After you download the Office Deployment Tool, you can use it to get the latest The XML file that is included in the Office Deployment Tool specifies the product details, such as the languages and Office applications included. -1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: +1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: - 1. Open the sample XML file in Notepad or your favorite text editor. + 1. Open the sample XML file in Notepad or your favorite text editor. - 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the configuration.xml file: + 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the configuration.xml file: - ``` syntax - - - - - - - - - - - ``` + ``` syntax + + + + + + + + + + + ``` - >**Note**  The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. To “uncomment” these lines, remove the "" from the end of the line. + >**Note** The configuration XML is a sample XML file. The file includes lines that are commented out. You can “uncomment” these lines to customize additional settings with the file. To “uncomment” these lines, remove the "" from the end of the line. - The above XML configuration file specifies that Office 2016 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2016, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2016 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: + The above XML configuration file specifies that Office 2016 ProPlus 32-bit edition, including Visio ProPlus, will be downloaded in English to the \\\\server\\Office 2016, which is the location where Office applications will be saved to. Note that the Product ID of the applications will not affect the final licensing of Office. Office 2016 App-V packages with various licensing can be created from the same applications through specifying licensing in a later stage. The table below summarizes the customizable attributes and elements of XML file: - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + +
    InputDescriptionExample

    Add element

    Specifies the products and languages to include in the package.

    N/A

    OfficeClientEdition (attribute of Add element)

    Specifies the edition of Office 2016 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

    OfficeClientEdition="32"

    -

    OfficeClientEdition="64"

    Product element

    Specifies the application. Project 2016 and Visio 2016 must be specified here as an added product to be included in the applications. + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - -
    InputDescriptionExample

    Add element

    Specifies the products and languages to include in the package.

    N/A

    OfficeClientEdition (attribute of Add element)

    Specifies the edition of Office 2016 product to use: 32-bit or 64-bit. The operation fails if OfficeClientEdition is not set to a valid value.

    OfficeClientEdition="32"

    +

    OfficeClientEdition="64"

    Product element

    Specifies the application. Project 2016 and Visio 2016 must be specified here as an added product to be included in the applications. - For more information about the product IDs, see [Product IDs that are supported by the Office Deployment Tool for Click-to-Run](https://support.microsoft.com/kb/2842297) -

    Product ID ="O365ProPlusRetail "

    -

    Product ID ="VisioProRetail"

    -

    Product ID ="ProjectProRetail"

    -

    Language element

    Specifies the language supported in the applications

    Language ID="en-us"

    Version (attribute of Add element)

    Optional. Specifies a build to use for the package

    -

    Defaults to latest advertised build (as defined in v32.CAB at the Office source).

    16.1.2.3

    SourcePath (attribute of Add element)

    Specifies the location in which the applications will be saved to.

    Sourcepath = "\\Server\Office2016”

    Branch (attribute of Add element)

    Optional. Specifies the update branch for the product that you want to download or install.

    For more information about update branches, see Overview of update branches for Office 365 ProPlus.

    Branch = "Business"

    + For more information about the product IDs, see Product IDs that are supported by the Office Deployment Tool for Click-to-Run +

    Product ID ="O365ProPlusRetail "

    +

    Product ID ="VisioProRetail"

    +

    Product ID ="ProjectProRetail"

    +

    Language element

    Specifies the language supported in the applications

    Language ID="en-us"

    Version (attribute of Add element)

    Optional. Specifies a build to use for the package

    +

    Defaults to latest advertised build (as defined in v32.CAB at the Office source).

    16.1.2.3

    SourcePath (attribute of Add element)

    Specifies the location in which the applications will be saved to.

    Sourcepath = "\Server\Office2016”

    Branch (attribute of Add element)

    Optional. Specifies the update branch for the product that you want to download or install.

    For more information about update branches, see Overview of update branches for Office 365 ProPlus.

    Branch = "Business"

    - After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2016 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. + After editing the configuration.xml file to specify the desired product, languages, and also the location which the Office 2016 applications will be saved onto, you can save the configuration file, for example, as Customconfig.xml. -2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2016 applications that will later be converted into an App-V package. Below is an example command with a description of details: +2. **Download the applications into the specified location:** Use an elevated command prompt and a 64 bit operating system to download the Office 2016 applications that will later be converted into an App-V package. Below is an example command with a description of details: - ``` syntax - \\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml - ``` + ``` syntax + \\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml + ``` - In the example: + In the example: + + + + + + + + + + + + + + + + + + + + + + + + +

    \server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /download

    downloads the Office 2016 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2016 App-V package with Volume Licensing.

    \server\Office2016\Customconfig.xml

    passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \Server\Office2016.

    - - - - - - - - - - - - - - - - - - - - - - - -

    \\server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /download

    downloads the Office 2016 applications that you specify in the customConfig.xml file. These bits can be later converted in an Office 2016 App-V package with Volume Licensing.

    \\server\Office2016\Customconfig.xml

    passes the XML configuration file required to complete the download process, in this example, customconfig.xml. After using the download command, Office applications should be found in the location specified in the configuration xml file, in this example \\Server\Office2016.

    -   ### Convert the Office applications into an App-V package @@ -380,135 +380,137 @@ After you download the Office 2016 applications through the Office Deployment To -  + **How to convert the Office applications into an App-V package** -1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: +1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - - - - - - - - - - - - - - - - - - - - - - - - - + + +
    ParameterWhat to change the value to

    SourcePath

    Point to the Office applications downloaded earlier.

    ProductID

    Specify Subscription licensing, as shown in the following example:

    -
    <Configuration>
    -       <Add SourcePath= "\\server\Office 2016" OfficeClientEdition="32" >
    -        <Product ID="O365ProPlusRetail">
    -          <Language ID="en-us" />
    -        </Product>
    -        <Product ID="VisioProRetail">
    -          <Language ID="en-us" />
    -        </Product>
    -      </Add>
    -    </Configuration> 
    -

    In this example, the following changes were made to create a package with Subscription licensing:

    - - - - - - - - - - - - - - - - - - - -

    SourcePath

    is the path, which was changed to point to the Office applications that were downloaded earlier.

    Product ID

    for Office was changed to O365ProPlusRetail.

    Product ID

    for Visio was changed to VisioProRetail.

    -

    -

    ExcludeApp (optional)

    Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

    PACKAGEGUID (optional)

    By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

    -

    An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users.

    + + + + + + + + + + + + + + + + + + + + + + + + + - - -
    ParameterWhat to change the value to

    SourcePath

    Point to the Office applications downloaded earlier.

    ProductID

    Specify Subscription licensing, as shown in the following example:

    +
    <Configuration>
    +      <Add SourcePath= "\server\Office 2016" OfficeClientEdition="32" >
    +       <Product ID="O365ProPlusRetail">
    +         <Language ID="en-us" />
    +       </Product>
    +       <Product ID="VisioProRetail">
    +         <Language ID="en-us" />
    +       </Product>
    +     </Add>
    +   </Configuration> 
    +

    In this example, the following changes were made to create a package with Subscription licensing:

    + + + + + + + + + + + + + + + + + + + +

    SourcePath

    is the path, which was changed to point to the Office applications that were downloaded earlier.

    Product ID

    for Office was changed to O365ProPlusRetail.

    Product ID

    for Visio was changed to VisioProRetail.

    +

    +

    ExcludeApp (optional)

    Lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath.

    PACKAGEGUID (optional)

    By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server.

    +

    An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users.

    - >**Note** Even if you use unique package IDs, you can still deploy only one App-V package to a single device. -
    + >Note Even if you use unique package IDs, you can still deploy only one App-V package to a single device. +
    -   -2. Use the /packager command to convert the Office applications to an Office 2016 App-V package. - For example: +2. Use the /packager command to convert the Office applications to an Office 2016 App-V package. - ``` syntax - \\server\Office2016\setup.exe /packager \\server\Office2016\Customconfig.xml \\server\share\Office2016AppV - ``` + For example: - In the example: + ``` syntax + \\server\Office2016\setup.exe /packager \\server\Office2016\Customconfig.xml \\server\share\Office2016AppV + ``` - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    \\server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /packager

    creates the Office 2016 App-V package with the type of licensing specified in the customConfig.xml file.

    \\server\Office2016\Customconfig.xml

    passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

    \\server\share\Office 2016AppV

    specifies the location of the newly created Office App-V package.

    + In the example: -   + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    \server\Office2016

    is the network share location that contains the Office Deployment Tool and the custom Configuration.xml file, Customconfig.xml.

    Setup.exe

    is the Office Deployment Tool.

    /packager

    creates the Office 2016 App-V package with the type of licensing specified in the customConfig.xml file.

    \server\Office2016\Customconfig.xml

    passes the configuration XML file (in this case customConfig) that has been prepared for the packaging stage.

    \server\share\Office 2016AppV

    specifies the location of the newly created Office App-V package.

    - After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: - - **App-V Packages** – contains an Office 2016 App-V package and two deployment configuration files. - - **WorkingDir** +~~~ +After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: - **Note** To troubleshoot any issues, see the log files in the %temp% directory (default). +- **App-V Packages** – contains an Office 2016 App-V package and two deployment configuration files. -   +- **WorkingDir** -3. Verify that the Office 2016 App-V package works correctly: +**Note** To troubleshoot any issues, see the log files in the %temp% directory (default). +~~~ - 1. Publish the Office 2016 App-V package, which you created globally, to a test computer, and verify that the Office 2016 shortcuts appear. - 2. Start a few Office 2016 applications, such as Excel or Word, to ensure that your package is working as expected. + +3. Verify that the Office 2016 App-V package works correctly: + + 1. Publish the Office 2016 App-V package, which you created globally, to a test computer, and verify that the Office 2016 shortcuts appear. + + 2. Start a few Office 2016 applications, such as Excel or Word, to ensure that your package is working as expected. ## Publishing the Office package for App-V @@ -553,7 +555,7 @@ Deploy the App-V package for Office 2016 by using the same methods you use for a -  + ### How to publish an Office package @@ -594,9 +596,9 @@ Use the steps in this section to enable Office plug-ins with your Office package 5. Add the Office 2016 App-V package and the plug-ins package you sequenced to the Connection Group you created. - >**Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2016 App-V package first, and then add the plug-in App-V package. + >**Important** The order of the packages in the Connection Group determines the order in which the package contents are merged. In your Connection group descriptor file, add the Office 2016 App-V package first, and then add the plug-in App-V package. + -   6. Ensure that both packages are published to the target computer and that the plug-in package is published globally to match the global settings of the published Office 2016 App-V package. @@ -616,8 +618,8 @@ Use the steps in this section to enable Office plug-ins with your Office package You may want to disable specific applications in your Office App-V package. For instance, you can disable Access, but leave all other Office application main available. When you disable an application, the end user will no longer see the shortcut for that application. You do not have to re-sequence the application. When you change the Deployment Configuration File after the Office 2016 App-V package has been published, you will save the changes, add the Office 2016 App-V package, and then republish it with the new Deployment Configuration File to apply the new settings to Office 2016 App-V Package applications. ->**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. -  +>**Note** To exclude specific Office applications (for example, Access and InfoPath) when you create the App-V package with the Office Deployment Tool, use the **ExcludeApp** setting. + **To disable an Office 2016 application** @@ -693,18 +695,18 @@ To upgrade an Office 2016 package, use the Office Deployment Tool. To upgrade a **How to upgrade a previously deployed Office 2016 package** -1. Create a new Office 2016 package through the Office Deployment Tool that uses the most recent Office 2016 application software. The most recent Office 2016 bits can always be obtained through the download stage of creating an Office 2016 App-V Package. The newly created Office 2016 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. +1. Create a new Office 2016 package through the Office Deployment Tool that uses the most recent Office 2016 application software. The most recent Office 2016 bits can always be obtained through the download stage of creating an Office 2016 App-V Package. The newly created Office 2016 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. - >**Note** Office App-V packages have two Version IDs: -
      -
    • An Office 2016 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool.
    • -
    • A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2016 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2016 package.
    • -
    -   + > **Note** Office App-V packages have two Version IDs: + >
      + >
    • An Office 2016 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool.
    • + >
    • A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2016 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2016 package.
    • + >
    -2. Globally publish the newly created Office 2016 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2016 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. -3. Upgrades will be applied in the same manner of any globally published App-V Packages. Because applications will probably be in use, upgrades might be delayed until the computer is rebooted. +2. Globally publish the newly created Office 2016 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2016 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. + +3. Upgrades will be applied in the same manner of any globally published App-V Packages. Because applications will probably be in use, upgrades might be delayed until the computer is rebooted. ### Deploying Visio 2016 and Project 2016 with Office @@ -757,12 +759,12 @@ The following table describes the requirements and options for deploying Visio 2
    1. Create a package that contains Office, Visio, and Project.

    2. Deploy the package to all users.

    3. -
    4. Use [Microsoft AppLocker](https://technet.microsoft.com/library/dd723678.aspx) to prevent specific users from using Visio and Project.

    5. +
    6. Use Microsoft AppLocker to prevent specific users from using Visio and Project.

    -

     

    +

    diff --git a/mdop/appv-v5/deploying-the-app-v-50-sequencer-and-client.md b/mdop/appv-v5/deploying-the-app-v-50-sequencer-and-client.md index db13ee2df3..1ad01a6915 100644 --- a/mdop/appv-v5/deploying-the-app-v-50-sequencer-and-client.md +++ b/mdop/appv-v5/deploying-the-app-v-50-sequencer-and-client.md @@ -45,7 +45,7 @@ You can use the Microsoft ADMX template to configure the client settings for the **Important**   You can obtain the App-V 5.0 ADMX template from the Microsoft Download Center. -  + After you download and install the ADMX template, perform the following steps on the computer that you will use to manage Group Policy. This is typically the Domain Controller. @@ -67,7 +67,7 @@ The App-V 5.0 Shared Content Store (SCS) mode enables the SCS App-V 5.0 clients **Important**   If the App-V 5.0 client is configured to run in the SCS mode, the location where the App-V 5.0 packages are streamed from must be available, otherwise, the virtualized package will fail. Additionally, we do not recommend deployment of virtualized applications to computers that run the App-V 5.0 client in the SCS mode across the internet. -  + Additionally, the SCS is not a physical location that contains virtualized packages. It is a mode that allows the App-V 5.0 client to stream the required virtualized package data across the network. @@ -115,9 +115,9 @@ In App-V 5.0 SP3, some logs have been consolidated. See [About App-V 5.0 SP3](ab -  + -  + diff --git a/mdop/appv-v5/deploying-the-app-v-50-server.md b/mdop/appv-v5/deploying-the-app-v-50-server.md index 41f8698647..a9c5cecc6e 100644 --- a/mdop/appv-v5/deploying-the-app-v-50-server.md +++ b/mdop/appv-v5/deploying-the-app-v-50-server.md @@ -24,7 +24,7 @@ For information about deploying the App-V 5.0 SP3 Server, see [About App-V 5.0 S **Important**   Before you install and configure the App-V 5.0 servers, you must specify a port where each component will be hosted. You must also add the associated firewall rules to allow incoming requests to access the specified ports. The installer does not modify firewall settings. -  + ## App-V 5.0 Server overview @@ -73,7 +73,7 @@ You can also deploy the App-V 5.0 clients and packages by using an ESD without h **Note**   The App-V 5.0 reporting server and reporting database can still be deployed alongside the ESD to collect the reporting data from the App-V 5.0 clients. However, the other three server components should not be deployed, because they will conflict with the ESD functionality. -  + [Deploying App-V 5.0 Packages by Using Electronic Software Distribution (ESD)](deploying-app-v-50-packages-by-using-electronic-software-distribution--esd-.md) @@ -119,9 +119,9 @@ Use the following link for more information [About App-V 5.0 Reporting](about-ap -  + -  + diff --git a/mdop/appv-v5/deploying-the-app-v-51-sequencer-and-client.md b/mdop/appv-v5/deploying-the-app-v-51-sequencer-and-client.md index 6c98f04e77..0811cc8ca8 100644 --- a/mdop/appv-v5/deploying-the-app-v-51-sequencer-and-client.md +++ b/mdop/appv-v5/deploying-the-app-v-51-sequencer-and-client.md @@ -45,7 +45,7 @@ You can use the Microsoft ADMX template to configure the client settings for the **Important**   You can obtain the App-V 5.1 ADMX template from the Microsoft Download Center. -  + After you download and install the ADMX template, perform the following steps on the computer that you will use to manage Group Policy. This is typically the Domain Controller. @@ -67,7 +67,7 @@ The App-V 5.1 Shared Content Store (SCS) mode enables the SCS App-V 5.1 clients **Important**   If the App-V 5.1 client is configured to run in the SCS mode, the location where the App-V 5.1 packages are streamed from must be available, otherwise, the virtualized package will fail. Additionally, we do not recommend deployment of virtualized applications to computers that run the App-V 5.1 client in the SCS mode across the internet. -  + Additionally, the SCS is not a physical location that contains virtualized packages. It is a mode that allows the App-V 5.1 client to stream the required virtualized package data across the network. @@ -113,9 +113,9 @@ You can use the App-V 5.1 Sequencer log information to help troubleshoot the Seq -  + -  + diff --git a/mdop/appv-v5/deploying-the-app-v-51-server.md b/mdop/appv-v5/deploying-the-app-v-51-server.md index 6e7325a0c2..10380a684e 100644 --- a/mdop/appv-v5/deploying-the-app-v-51-server.md +++ b/mdop/appv-v5/deploying-the-app-v-51-server.md @@ -24,7 +24,7 @@ For information about deploying the App-V Server, see [About App-V 5.1](about-ap **Important**   Before you install and configure the App-V 5.1 servers, you must specify a port where each component will be hosted. You must also add the associated firewall rules to allow incoming requests to access the specified ports. The installer does not modify firewall settings. -  + ## App-V 5.1 Server overview @@ -73,7 +73,7 @@ You can also deploy the App-V 5.1 clients and packages by using an ESD without h **Note**   The App-V 5.1 reporting server and reporting database can still be deployed alongside the ESD to collect the reporting data from the App-V 5.1 clients. However, the other three server components should not be deployed, because they will conflict with the ESD functionality. -  + [Deploying App-V 5.1 Packages by Using Electronic Software Distribution (ESD)](deploying-app-v-51-packages-by-using-electronic-software-distribution--esd-.md) @@ -119,9 +119,9 @@ Use the following link for more information [About App-V 5.1 Reporting](about-ap -  + -  + diff --git a/mdop/appv-v5/getting-started-with-app-v-50--rtm.md b/mdop/appv-v5/getting-started-with-app-v-50--rtm.md index dab81dc002..861662bca5 100644 --- a/mdop/appv-v5/getting-started-with-app-v-50--rtm.md +++ b/mdop/appv-v5/getting-started-with-app-v-50--rtm.md @@ -56,7 +56,7 @@ App-V consists of the following elements:
  • Retrieves virtual applications

  • Publishes the applications on the clients

  • Automatically sets up and manages virtual environments at runtime on Windows endpoints.

  • -
  • Stores user-specific virtual application settings, such as registry and file changes, in each user's profile.

  • +
  • Stores user-specific virtual application settings, such as registry and file changes, in each user's profile.

  • @@ -78,7 +78,7 @@ App-V consists of the following elements: -  + For more information about these elements, see [High Level Architecture for App-V 5.0](high-level-architecture-for-app-v-50.md). @@ -87,7 +87,7 @@ If you are new to this product, we recommend that you read the documentation tho **Note**   A downloadable version of this administrator’s guide is not available. However, you can learn about a special mode of the TechNet Library that allows you to select articles, group them in a collection, and print them or export them to a file at (https://go.microsoft.com/fwlink/?LinkId=272491). -  + This section of the App-V 5.0 Administrator’s Guide includes high-level information about App-V 5.0 to provide you with a basic understanding of the product before you begin the deployment planning. @@ -140,9 +140,9 @@ This section of the App-V 5.0 Administrator’s Guide includes high-level inform -  + -  + diff --git a/mdop/appv-v5/getting-started-with-app-v-51.md b/mdop/appv-v5/getting-started-with-app-v-51.md index 6303e011c1..f508e2c3a6 100644 --- a/mdop/appv-v5/getting-started-with-app-v-51.md +++ b/mdop/appv-v5/getting-started-with-app-v-51.md @@ -56,7 +56,7 @@ App-V consists of the following elements:
  • Retrieves virtual applications

  • Publishes the applications on the clients

  • Automatically sets up and manages virtual environments at runtime on Windows endpoints.

  • -
  • Stores user-specific virtual application settings, such as registry and file changes, in each user's profile.

  • +
  • Stores user-specific virtual application settings, such as registry and file changes, in each user's profile.

  • @@ -78,7 +78,7 @@ App-V consists of the following elements: -  + For more information about these elements, see [High Level Architecture for App-V 5.1](high-level-architecture-for-app-v-51.md). @@ -87,7 +87,7 @@ If you are new to this product, we recommend that you read the documentation tho **Note**   A downloadable version of this administrator’s guide is not available. However, you can learn about a special mode of the TechNet Library that allows you to select articles, group them in a collection, and print them or export them to a file at (https://go.microsoft.com/fwlink/?LinkId=272491). -  + This section of the App-V 5.1 Administrator’s Guide includes high-level information about App-V 5.1 to provide you with a basic understanding of the product before you begin the deployment planning. @@ -130,9 +130,9 @@ This section of the App-V 5.1 Administrator’s Guide includes high-level inform -  + -  + diff --git a/mdop/appv-v5/high-level-architecture-for-app-v-50.md b/mdop/appv-v5/high-level-architecture-for-app-v-50.md index c3938da7ea..e23df5f0a1 100644 --- a/mdop/appv-v5/high-level-architecture-for-app-v-50.md +++ b/mdop/appv-v5/high-level-architecture-for-app-v-50.md @@ -64,12 +64,12 @@ A typical App-V 5.0 implementation consists of the following elements. -  + **Note**   If you are using App-V 5.0 with Electronic Software Distribution (ESD) you are not required to use the App-V 5.0 Management server, however you can still utilize the reporting and streaming functionality of App-V 5.0. -  + @@ -81,9 +81,9 @@ If you are using App-V 5.0 with Electronic Software Distribution (ESD) you are n [Getting Started with App-V 5.0](getting-started-with-app-v-50--rtm.md) -  + -  + diff --git a/mdop/appv-v5/high-level-architecture-for-app-v-51.md b/mdop/appv-v5/high-level-architecture-for-app-v-51.md index 03d0bf6b11..af616233b3 100644 --- a/mdop/appv-v5/high-level-architecture-for-app-v-51.md +++ b/mdop/appv-v5/high-level-architecture-for-app-v-51.md @@ -64,12 +64,12 @@ A typical App-V 5.1 implementation consists of the following elements. -  + **Note**   If you are using App-V 5.1 with Electronic Software Distribution (ESD) you are not required to use the App-V 5.1 Management server, however you can still utilize the reporting and streaming functionality of App-V 5.1. -  + @@ -81,9 +81,9 @@ If you are using App-V 5.1 with Electronic Software Distribution (ESD) you are n [Getting Started with App-V 5.1](getting-started-with-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-access-the-client-management-console.md b/mdop/appv-v5/how-to-access-the-client-management-console.md index 40f15bb4e5..1e5fc68d4b 100644 --- a/mdop/appv-v5/how-to-access-the-client-management-console.md +++ b/mdop/appv-v5/how-to-access-the-client-management-console.md @@ -22,7 +22,7 @@ Use the App-V 5.0 client management console to manage packages on the computer r **Note**   To perform all of the actions available using the client management console, you must have administrative access on the computer running the App-V 5.0 client. -  + Use the following procedure to access the client management console. @@ -33,7 +33,7 @@ Use the following procedure to access the client management console. **Note**   For computers running the App-V 5.0 Remote Desktop Services client version, to access client management console follow step 1 of this procedure on the server running the client. -   + 2. When the App-V 5.0 client management console is displayed, click the tab you want to review and perform any required tasks. For more information about the client management console tasks see, [Using the App-V 5.0 Client Management Console](using-the-app-v-50-client-management-console.md). @@ -44,9 +44,9 @@ Use the following procedure to access the client management console. [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-access-the-client-management-console51.md b/mdop/appv-v5/how-to-access-the-client-management-console51.md index f3839935f5..e98a45a0a3 100644 --- a/mdop/appv-v5/how-to-access-the-client-management-console51.md +++ b/mdop/appv-v5/how-to-access-the-client-management-console51.md @@ -22,7 +22,7 @@ Use the App-V 5.1 client management console to manage packages on the computer r **Note**   To perform all of the actions available using the client management console, you must have administrative access on the computer running the App-V 5.1 client. -  + Use the following procedure to access the client management console. @@ -33,7 +33,7 @@ Use the following procedure to access the client management console. **Note**   For computers running the App-V 5.1 Remote Desktop Services client version, to access client management console follow step 1 of this procedure on the server running the client. -   + 2. When the App-V 5.1 client management console is displayed, click the tab you want to review and perform any required tasks. For more information about the client management console tasks see, [Using the App-V 5.1 Client Management Console](using-the-app-v-51-client-management-console.md). @@ -44,9 +44,9 @@ Use the following procedure to access the client management console. [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-51-gb18030.md b/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-51-gb18030.md index d24a45d2c4..0d643c8054 100644 --- a/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-51-gb18030.md +++ b/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-51-gb18030.md @@ -34,7 +34,7 @@ You can the following procedure to add or upgrade a package to the App-V 5.1 Man **Important**   You must select a package with the **.appv** file name extension. -   + 4. The page displays the status message **Adding <Packagename>**. Click **IMPORT STATUS** to check the status of a package that you have imported. @@ -49,9 +49,9 @@ You can the following procedure to add or upgrade a package to the App-V 5.1 Man [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-beta-gb18030.md b/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-beta-gb18030.md index 40a7b15611..6ffae20774 100644 --- a/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-beta-gb18030.md +++ b/mdop/appv-v5/how-to-add-or-upgrade-packages-by-using-the-management-console-beta-gb18030.md @@ -34,7 +34,7 @@ You can the following procedure to add or upgrade a package to the App-V 5.0 Man **Important**   You must select a package with the **.appv** file name extension. -   + 4. The page displays the status message **Adding <Packagename>**. Click **IMPORT STATUS** to check the status of a package that you have imported. @@ -49,9 +49,9 @@ You can the following procedure to add or upgrade a package to the App-V 5.0 Man [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups.md b/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups.md index ebe5a92d02..a04d25f7ae 100644 --- a/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups.md +++ b/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups.md @@ -22,7 +22,7 @@ You can configure the App-V client so that only administrators (not end users) c **Note**   **This feature is supported starting in App-V 5.0 SP3.** -  + Use one of the following methods to allow only administrators to enable or disable connection groups. @@ -56,7 +56,7 @@ Use one of the following methods to allow only administrators to enable or disab -  + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). @@ -65,9 +65,9 @@ Use one of the following methods to allow only administrators to enable or disab [Managing Connection Groups](managing-connection-groups.md) -  + -  + diff --git a/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups51.md b/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups51.md index fb60c0628f..1a6a35f007 100644 --- a/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups51.md +++ b/mdop/appv-v5/how-to-allow-only-administrators-to-enable-connection-groups51.md @@ -22,7 +22,7 @@ You can configure the App-V client so that only administrators (not end users) c **Note**   **This feature is supported starting in App-V 5.0 SP3.** -  + Use one of the following methods to allow only administrators to enable or disable connection groups. @@ -56,7 +56,7 @@ Use one of the following methods to allow only administrators to enable or disab -  + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). @@ -65,9 +65,9 @@ Use one of the following methods to allow only administrators to enable or disab [Managing Connection Groups](managing-connection-groups51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell.md b/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell.md index 6555bb02e3..8e30f21d57 100644 --- a/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell.md +++ b/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell.md @@ -29,23 +29,25 @@ The dynamic deployment configuration file is applied when a package is added or **Add-AppVClientPackage –Path c:\\Packages\\Contoso\\MyApp.appv -DynamicDeploymentConfiguration c:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml** - **Note**   + **Note** This command captures the resulting object into $pkg. If the package is already present on the computer, the **Set-AppVclientPackage** cmdlet can be used to apply the deployment configuration document: **Set-AppVClientPackage –Name Myapp –Path c:\\Packages\\Contoso\\MyApp.appv -DynamicDeploymentConfiguration c:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml** -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell51.md b/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell51.md index 69344880d1..dac9fedce1 100644 --- a/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell51.md +++ b/mdop/appv-v5/how-to-apply-the-deployment-configuration-file-by-using-powershell51.md @@ -29,23 +29,25 @@ The dynamic deployment configuration file is applied when a package is added or **Add-AppVClientPackage –Path c:\\Packages\\Contoso\\MyApp.appv -DynamicDeploymentConfiguration c:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml** - **Note**   + **Note** This command captures the resulting object into $pkg. If the package is already present on the computer, the **Set-AppVclientPackage** cmdlet can be used to apply the deployment configuration document: **Set-AppVClientPackage –Name Myapp –Path c:\\Packages\\Contoso\\MyApp.appv -DynamicDeploymentConfiguration c:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml** -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-50.md b/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-50.md index 5ec2a3cf5a..2afafa6b63 100644 --- a/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-50.md +++ b/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-50.md @@ -38,7 +38,7 @@ Use the following procedure to configure access to virtualized packages. **Note**   Ensure that you provide an associated domain name for the group that you are searching for. -   + 3. To grant access to the package, select the desired group and click **Grant Access**. The newly added group is displayed in the **AD ENTITIES WITH ACCESS** pane. @@ -67,9 +67,9 @@ Use the following procedure to configure access to virtualized packages. [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-51.md b/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-51.md index 972427f79a..b7683c7b78 100644 --- a/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-51.md +++ b/mdop/appv-v5/how-to-configure-access-to-packages-by-using-the-management-console-51.md @@ -38,7 +38,7 @@ Use the following procedure to configure access to virtualized packages. **Note**   Ensure that you provide an associated domain name for the group that you are searching for. -   + 3. To grant access to the package, select the desired group and click **Grant Access**. The newly added group is displayed in the **AD ENTITIES WITH ACCESS** pane. @@ -67,9 +67,9 @@ Use the following procedure to configure access to virtualized packages. [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-51.md b/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-51.md index 2d78cc9bcb..8e6b0c9389 100644 --- a/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-51.md +++ b/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-51.md @@ -24,7 +24,7 @@ Use the following steps to configure the App-V 5.1 client to receive updates fro **Note**   For the following procedures the management server was installed on a computer named **MyMgmtSrv**, and the publishing server was installed on a computer named **MyPubSrv**. -  + **To configure the App-V 5.1 client to receive updates from the publishing server** @@ -77,9 +77,9 @@ For the following procedures the management server was installed on a computer n [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-beta.md b/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-beta.md index 8728453005..9120a87f6f 100644 --- a/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-beta.md +++ b/mdop/appv-v5/how-to-configure-the-client-to-receive-package-and-connection-groups-updates-from-the-publishing-server-beta.md @@ -24,7 +24,7 @@ Use the following steps to configure the App-V 5.0 client to receive updates fro **Note**   For the following procedures the management server was installed on a computer named **MyMgmtSrv**, and the publishing server was installed on a computer named **MyPubSrv**. -  + **To configure the App-V 5.0 client to receive updates from the publishing server** @@ -77,9 +77,9 @@ For the following procedures the management server was installed on a computer n [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v.md b/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v.md index af35ad78e4..2c1debb1f6 100644 --- a/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v.md +++ b/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v.md @@ -19,19 +19,19 @@ ms.date: 06/16/2016 You can use the package converter utility to upgrade virtual application packages that have been created with previous versions of App-V. -**Note**   +**Note** If you are running a computer with a 64-bit architecture, you must use the x86 version of PowerShell. -  -The package converter can only directly convert packages that were created by using the App-V 4.5 sequencer or a subsequent version. Packages that were created using a version prior to App-V 4.5 must be upgraded to the App-V 4.5 or App-V 4.6 format before conversion. + +The package converter can only directly convert packages that were created by using the App-V 4.5 sequencer or a subsequent version. Packages that were created using a version prior to App-V 4.5 must be upgraded to the App-V 4.5 or App-V 4.6 format before conversion. The following information provides direction for converting existing virtual application packages. -**Important**   +**Important** You must configure the package converter to always save the package ingredients file to a secure location and directory. A secure location is accessible only by an administrator. Additionally, when you deploy the package, you should save the package to a location that is secure, or make sure that no other user is allowed to be logged in during the conversion process. -  + **Getting started** @@ -43,39 +43,41 @@ You must configure the package converter to always save the package ingredients Import-Module AppVPkgConverter ``` -3. +3. - The following cmdlets are available: + The following cmdlets are available: - - Test-AppvLegacyPackage – This cmdlet is designed to check packages. It will return information about any failures with the package such as missing **.sft** files, an invalid source, **.osd** file errors, or invalid package version. This cmdlet will not parse the **.sft** file or do any in depth validation. For information about options and basic functionality for this cmdlet, using the PowerShell cmdline, type `Test-AppvLegacyPackage -?`. + - Test-AppvLegacyPackage – This cmdlet is designed to check packages. It will return information about any failures with the package such as missing **.sft** files, an invalid source, **.osd** file errors, or invalid package version. This cmdlet will not parse the **.sft** file or do any in depth validation. For information about options and basic functionality for this cmdlet, using the PowerShell cmdline, type `Test-AppvLegacyPackage -?`. - - ConvertFrom-AppvLegacyPackage – To convert an existing package, type `ConvertFrom-AppvLegacyPackage c:\contentStore c:\convertedPackages`. In this command, `c:\contentStore` represents the location of the existing package and `c:\convertedPackages` is the output directory to which the resulting App-V 5.0 virtual application package file will be saved. By default, if you do not specify a new name, the old package name will be used for the App-V 5.0 filename. + - ConvertFrom-AppvLegacyPackage – To convert an existing package, type `ConvertFrom-AppvLegacyPackage c:\contentStore c:\convertedPackages`. In this command, `c:\contentStore` represents the location of the existing package and `c:\convertedPackages` is the output directory to which the resulting App-V 5.0 virtual application package file will be saved. By default, if you do not specify a new name, the old package name will be used for the App-V 5.0 filename. - Additionally, the package converter optimizes performance of packages in App-V 5.0 by setting the package to stream fault the App-V package.  This is more performant than the primary feature block and fully downloading the package. The flag **DownloadFullPackageOnFirstLaunch** allows you to convert the package and set the package to be fully downloaded by default. + Additionally, the package converter optimizes performance of packages in App-V 5.0 by setting the package to stream fault the App-V package. This is more performant than the primary feature block and fully downloading the package. The flag **DownloadFullPackageOnFirstLaunch** allows you to convert the package and set the package to be fully downloaded by default. - **Note**   - Before you specify the output directory, you must create the output directory. + **Note** + Before you specify the output directory, you must create the output directory. -   - **Advanced Conversion Tips** - - Piping - PowerShell supports piping. Piping allows you to call `dir c:\contentStore\myPackage | Test-AppvLegacyPackage`. In this example, the directory object that represents `myPackage` will be given as input to the `Test-AppvLegacyPackage` command and bound to the `-Source` parameter. Piping like this is especially useful when you want to batch commands together; for example, `dir .\ | Test-AppvLegacyPackage | ConvertFrom-AppvLegacyAppvPackage -Target .\ConvertedPackages`. This piped command would test the packages and then pass those objects on to actually be converted. You can also apply a filter on packages without errors or only specify a directory which contains an **.sprj** file or pipe them to another cmdlet that adds the filtered package to the server or publishes them to the App-V 5.0 client. +~~~ +**Advanced Conversion Tips** - - Batching - The PowerShell command enables batching. More specifically, the cmdlets support taking a string\[\] object for the `-Source` parameter which represents a list of directory paths. This allows you to enter `$packages = dir c:\contentStore` and then call `ConvertFrom-AppvLegacyAppvPackage-Source $packages -Target c:\ConvertedPackages` or to use piping and call `dir c:\ContentStore | ConvertFrom-AppvLegacyAppvPackage -Target C:\ConvertedPackages`. +- Piping - PowerShell supports piping. Piping allows you to call `dir c:\contentStore\myPackage | Test-AppvLegacyPackage`. In this example, the directory object that represents `myPackage` will be given as input to the `Test-AppvLegacyPackage` command and bound to the `-Source` parameter. Piping like this is especially useful when you want to batch commands together; for example, `dir .\ | Test-AppvLegacyPackage | ConvertFrom-AppvLegacyAppvPackage -Target .\ConvertedPackages`. This piped command would test the packages and then pass those objects on to actually be converted. You can also apply a filter on packages without errors or only specify a directory which contains an **.sprj** file or pipe them to another cmdlet that adds the filtered package to the server or publishes them to the App-V 5.0 client. - - Other functionality - PowerShell has other built-in functionality for features such as aliases, piping, lazy-binding, .NET object, and many others. All of these are usable in PowerShell and can help you create advanced scenarios for the Package Converter. +- Batching - The PowerShell command enables batching. More specifically, the cmdlets support taking a string\[\] object for the `-Source` parameter which represents a list of directory paths. This allows you to enter `$packages = dir c:\contentStore` and then call `ConvertFrom-AppvLegacyAppvPackage-Source $packages -Target c:\ConvertedPackages` or to use piping and call `dir c:\ContentStore | ConvertFrom-AppvLegacyAppvPackage -Target C:\ConvertedPackages`. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +- Other functionality - PowerShell has other built-in functionality for features such as aliases, piping, lazy-binding, .NET object, and many others. All of these are usable in PowerShell and can help you create advanced scenarios for the Package Converter. + +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v51.md b/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v51.md index 12f45796f2..b146f4dd7f 100644 --- a/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v51.md +++ b/mdop/appv-v5/how-to-convert-a-package-created-in-a-previous-version-of-app-v51.md @@ -19,19 +19,19 @@ ms.date: 06/16/2016 You can use the package converter utility to upgrade virtual application packages that have been created with previous versions of App-V. -**Note**   +**Note** If you are running a computer with a 64-bit architecture, you must use the x86 version of PowerShell. -  -The package converter can only directly convert packages that were created by using the App-V 4.5 sequencer or a subsequent version. Packages that were created using a version prior to App-V 4.5 must be upgraded to the App-V 4.5 or App-V 4.6 format before conversion. + +The package converter can only directly convert packages that were created by using the App-V 4.5 sequencer or a subsequent version. Packages that were created using a version prior to App-V 4.5 must be upgraded to the App-V 4.5 or App-V 4.6 format before conversion. The following information provides direction for converting existing virtual application packages. -**Important**   +**Important** You must configure the package converter to always save the package ingredients file to a secure location and directory. A secure location is accessible only by an administrator. Additionally, when you deploy the package, you should save the package to a location that is secure, or make sure that no other user is allowed to be logged in during the conversion process. -  + **App-V 4.6 installation folder is redirected to virtual file system root** @@ -53,31 +53,33 @@ Prior to App-V 5.1, the 4.6 root folder was not recognized and could not be acce - ConvertFrom-AppvLegacyPackage – To convert an existing package, type `ConvertFrom-AppvLegacyPackage c:\contentStore c:\convertedPackages`. In this command, `c:\contentStore` represents the location of the existing package and `c:\convertedPackages` is the output directory to which the resulting App-V 5.1 virtual application package file will be saved. By default, if you do not specify a new name, the old package name will be used for the App-V 5.1 filename. - Additionally, the package converter optimizes performance of packages in App-V 5.1 by setting the package to stream fault the App-V package.  This is more performant than the primary feature block and fully downloading the package. The flag **DownloadFullPackageOnFirstLaunch** allows you to convert the package and set the package to be fully downloaded by default. + Additionally, the package converter optimizes performance of packages in App-V 5.1 by setting the package to stream fault the App-V package. This is more performant than the primary feature block and fully downloading the package. The flag **DownloadFullPackageOnFirstLaunch** allows you to convert the package and set the package to be fully downloaded by default. - **Note**   + **Note** Before you specify the output directory, you must create the output directory. -   - **Advanced Conversion Tips** - - Piping - PowerShell supports piping. Piping allows you to call `dir c:\contentStore\myPackage | Test-AppvLegacyPackage`. In this example, the directory object that represents `myPackage` will be given as input to the `Test-AppvLegacyPackage` command and bound to the `-Source` parameter. Piping like this is especially useful when you want to batch commands together; for example, `dir .\ | Test-AppvLegacyPackage | ConvertFrom-AppvLegacyAppvPackage -Target .\ConvertedPackages`. This piped command would test the packages and then pass those objects on to actually be converted. You can also apply a filter on packages without errors or only specify a directory which contains an **.sprj** file or pipe them to another cmdlet that adds the filtered package to the server or publishes them to the App-V 5.1 client. +~~~ +**Advanced Conversion Tips** - - Batching - The PowerShell command enables batching. More specifically, the cmdlets support taking a string\[\] object for the `-Source` parameter which represents a list of directory paths. This allows you to enter `$packages = dir c:\contentStore` and then call `ConvertFrom-AppvLegacyAppvPackage-Source $packages -Target c:\ConvertedPackages` or to use piping and call `dir c:\ContentStore | ConvertFrom-AppvLegacyAppvPackage -Target C:\ConvertedPackages`. +- Piping - PowerShell supports piping. Piping allows you to call `dir c:\contentStore\myPackage | Test-AppvLegacyPackage`. In this example, the directory object that represents `myPackage` will be given as input to the `Test-AppvLegacyPackage` command and bound to the `-Source` parameter. Piping like this is especially useful when you want to batch commands together; for example, `dir .\ | Test-AppvLegacyPackage | ConvertFrom-AppvLegacyAppvPackage -Target .\ConvertedPackages`. This piped command would test the packages and then pass those objects on to actually be converted. You can also apply a filter on packages without errors or only specify a directory which contains an **.sprj** file or pipe them to another cmdlet that adds the filtered package to the server or publishes them to the App-V 5.1 client. - - Other functionality - PowerShell has other built-in functionality for features such as aliases, piping, lazy-binding, .NET object, and many others. All of these are usable in PowerShell and can help you create advanced scenarios for the Package Converter. +- Batching - The PowerShell command enables batching. More specifically, the cmdlets support taking a string\[\] object for the `-Source` parameter which represents a list of directory paths. This allows you to enter `$packages = dir c:\contentStore` and then call `ConvertFrom-AppvLegacyAppvPackage-Source $packages -Target c:\ConvertedPackages` or to use piping and call `dir c:\ContentStore | ConvertFrom-AppvLegacyAppvPackage -Target C:\ConvertedPackages`. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +- Other functionality - PowerShell has other built-in functionality for features such as aliases, piping, lazy-binding, .NET object, and many others. All of these are usable in PowerShell and can help you create advanced scenarios for the Package Converter. + +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-a-connection-group.md b/mdop/appv-v5/how-to-create-a-connection-group.md index 481b85fb1f..b9ab2dc072 100644 --- a/mdop/appv-v5/how-to-create-a-connection-group.md +++ b/mdop/appv-v5/how-to-create-a-connection-group.md @@ -42,7 +42,7 @@ When you place packages in a connection group, their package root paths are merg **Important**   By default, the Active Directory Domain Services access configurations that are associated with a specific application are not added to the connection group. To transfer the Active Directory access configuration, select **ADD PACKAGE ACCESS TO GROUP ACCESS**, which is located in the **PACKAGES IN** pane. -   + 7. After adding all the applications and configuring Active Directory access, click **Apply**. @@ -55,9 +55,9 @@ When you place packages in a connection group, their package root paths are merg [Managing Connection Groups](managing-connection-groups.md) -  + -  + diff --git a/mdop/appv-v5/how-to-create-a-connection-group51.md b/mdop/appv-v5/how-to-create-a-connection-group51.md index b1f29f2468..f5605affe1 100644 --- a/mdop/appv-v5/how-to-create-a-connection-group51.md +++ b/mdop/appv-v5/how-to-create-a-connection-group51.md @@ -40,7 +40,7 @@ When you place packages in a connection group, their package root paths are merg **Important**   By default, the Active Directory Domain Services access configurations that are associated with a specific application are not added to the connection group. To transfer the Active Directory access configuration, select **ADD PACKAGE ACCESS TO GROUP ACCESS**, which is located in the **PACKAGES IN** pane. -   + 6. After adding all the applications and configuring Active Directory access, click **Apply**. @@ -53,9 +53,9 @@ When you place packages in a connection group, their package root paths are merg [Managing Connection Groups](managing-connection-groups51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-create-a-custom-configuration-file-by-using-the-app-v-51-management-console.md b/mdop/appv-v5/how-to-create-a-custom-configuration-file-by-using-the-app-v-51-management-console.md index d35cd476a3..eb1da74435 100644 --- a/mdop/appv-v5/how-to-create-a-custom-configuration-file-by-using-the-app-v-51-management-console.md +++ b/mdop/appv-v5/how-to-create-a-custom-configuration-file-by-using-the-app-v-51-management-console.md @@ -31,21 +31,23 @@ Use the following procedure to create a Dynamic User Configuration file by using 4. Click **Advanced**, and then click **Export Configuration**. Type in a filename and click **Save**. Now you can edit the file to configure a package for a user. - **Note**   + **Note** To export a configuration while running on Windows Server, you must disable "IE Enhanced Security Configuration". If this is enabled and set to block downloads, you cannot download anything from the App-V Server. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-a-package-accelerator.md b/mdop/appv-v5/how-to-create-a-package-accelerator.md index d10d4468fa..3ca349472c 100644 --- a/mdop/appv-v5/how-to-create-a-package-accelerator.md +++ b/mdop/appv-v5/how-to-create-a-package-accelerator.md @@ -19,81 +19,87 @@ ms.date: 06/16/2016 App-V 5.0 package accelerators automatically generate new virtual application packages. -**Note**   +**Note** You can use PowerShell to create a package accelerator. For more information see [How to Create a Package Accelerator by Using PowerShell](how-to-create-a-package-accelerator-by-using-powershell.md). -  + Use the following procedure to create a package accelerator. -**Important**   +**Important** Package Accelerators can contain password and user-specific information. Therefore you must save Package Accelerators and the associated installation media in a secure location, and you should digitally sign the Package Accelerator after you create it so that the publisher can be verified when the App-V 5.0 Package Accelerator is applied. -  -**Important**   + +**Important** Before you begin the following procedure, you should perform the following: - Copy the virtual application package that you will use to create the package accelerator locally to the computer running the sequencer. - Copy all required installation files associated with the virtual application package to the computer running the sequencer. -  + **To create a package accelerator** -1. **Important**   +1. **Important** The App-V 5.0 Sequencer does not grant any license rights to the software application you are using to create the Package Accelerator. You must abide by all end user license terms for the application you are using. It is your responsibility to make sure the software application’s license terms allow you to create a Package Accelerator using App-V 5.0 Sequencer. -   - To start the App-V 5.0 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. -2. To start the App-V 5.0 **Create Package Accelerator** wizard, in the App-V 5.0 sequencer console, click **Tools** / **Create Accelerator**. +~~~ +To start the App-V 5.0 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. +~~~ -3. On the **Select Package** page, to specify an existing virtual application package to use to create the Package Accelerator, click **Browse**, and locate the existing virtual application package (.appv file). +2. To start the App-V 5.0 **Create Package Accelerator** wizard, in the App-V 5.0 sequencer console, click **Tools** / **Create Accelerator**. - **Tip**   - Copy the files associated with the virtual application package you plan to use locally to the computer running the Sequencer. +3. On the **Select Package** page, to specify an existing virtual application package to use to create the Package Accelerator, click **Browse**, and locate the existing virtual application package (.appv file). -   + **Tip** + Copy the files associated with the virtual application package you plan to use locally to the computer running the Sequencer. - Click **Next**. -4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. - **Tip**   - Copy the folder that contains the required installation files to the computer running the Sequencer. +~~~ +Click **Next**. +~~~ -   +4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. -5. If the application is already installed on the computer running the sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. + **Tip** + Copy the folder that contains the required installation files to the computer running the Sequencer. -6. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. - **Note**   - You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. -   +5. If the application is already installed on the computer running the sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. -7. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the package accelerator. Select only files that are required for the application to run successfully, and then click **Next**. +6. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. -8. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. + **Note** + You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. - If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. -9. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. + +7. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the package accelerator. Select only files that are required for the application to run successfully, and then click **Next**. + +8. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. + + If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. + +9. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. 10. On the **Create Package Accelerator** page, to specify where to save the Package Accelerator, click **Browse** and select the directory. 11. On the **Completion** page, to close the **Create Package Accelerator** wizard, click **Close**. - **Important**   - To help ensure that the package accelerator is as secure as possible, and so that the publisher can be verified when the package accelerator is applied, you should always digitally sign the package accelerator. + **Important** + To help ensure that the package accelerator is as secure as possible, and so that the publisher can be verified when the package accelerator is applied, you should always digitally sign the package accelerator. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics @@ -102,9 +108,9 @@ Before you begin the following procedure, you should perform the following: [How to Create a Virtual Application Package Using an App-V Package Accelerator](how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-a-package-accelerator51.md b/mdop/appv-v5/how-to-create-a-package-accelerator51.md index 46a6825827..45092fa865 100644 --- a/mdop/appv-v5/how-to-create-a-package-accelerator51.md +++ b/mdop/appv-v5/how-to-create-a-package-accelerator51.md @@ -19,81 +19,87 @@ ms.date: 06/16/2016 App-V 5.1 package accelerators automatically generate new virtual application packages. -**Note**   +**Note** You can use PowerShell to create a package accelerator. For more information see [How to Create a Package Accelerator by Using PowerShell](how-to-create-a-package-accelerator-by-using-powershell51.md). -  + Use the following procedure to create a package accelerator. -**Important**   +**Important** Package Accelerators can contain password and user-specific information. Therefore you must save Package Accelerators and the associated installation media in a secure location, and you should digitally sign the Package Accelerator after you create it so that the publisher can be verified when the App-V 5.1 Package Accelerator is applied. -  -**Important**   + +**Important** Before you begin the following procedure, you should perform the following: - Copy the virtual application package that you will use to create the package accelerator locally to the computer running the sequencer. - Copy all required installation files associated with the virtual application package to the computer running the sequencer. -  + **To create a package accelerator** -1. **Important**   +1. **Important** The App-V 5.1 Sequencer does not grant any license rights to the software application you are using to create the Package Accelerator. You must abide by all end user license terms for the application you are using. It is your responsibility to make sure the software application’s license terms allow you to create a Package Accelerator using App-V 5.1 Sequencer. -   - To start the App-V 5.1 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. -2. To start the App-V 5.1 **Create Package Accelerator** wizard, in the App-V 5.1 sequencer console, click **Tools** / **Create Accelerator**. +~~~ +To start the App-V 5.1 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. +~~~ -3. On the **Select Package** page, to specify an existing virtual application package to use to create the Package Accelerator, click **Browse**, and locate the existing virtual application package (.appv file). +2. To start the App-V 5.1 **Create Package Accelerator** wizard, in the App-V 5.1 sequencer console, click **Tools** / **Create Accelerator**. - **Tip**   - Copy the files associated with the virtual application package you plan to use locally to the computer running the Sequencer. +3. On the **Select Package** page, to specify an existing virtual application package to use to create the Package Accelerator, click **Browse**, and locate the existing virtual application package (.appv file). -   + **Tip** + Copy the files associated with the virtual application package you plan to use locally to the computer running the Sequencer. - Click **Next**. -4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. - **Tip**   - Copy the folder that contains the required installation files to the computer running the Sequencer. +~~~ +Click **Next**. +~~~ -   +4. On the **Installation Files** page, to specify the folder that contains the installation files that you used to create the original virtual application package, click **Browse**, and then select the directory that contains the installation files. -5. If the application is already installed on the computer running the sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. + **Tip** + Copy the folder that contains the required installation files to the computer running the Sequencer. -6. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. - **Note**   - You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. -   +5. If the application is already installed on the computer running the sequencer, to specify the installation file, select **Files installed on local system**. To use this option, the application must already be installed in the default installation location. -7. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the package accelerator. Select only files that are required for the application to run successfully, and then click **Next**. +6. On the **Gathering Information** page, review the files that were not found in the location specified on the **Installation Files** page of this wizard. If the files displayed are not required, select **Remove these files**, and then click **Next**. If the files are required, click **Previous** and copy the required files to the directory specified on the **Installation Files** page. -8. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. + **Note** + You must either remove the unrequired files, or click **Previous** and locate the required files to advance to the next page of this wizard. - If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. -9. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. + +7. On the **Select Files** page, carefully review the files that were detected, and clear any file that should be removed from the package accelerator. Select only files that are required for the application to run successfully, and then click **Next**. + +8. On the **Verify Applications** page, confirm that all installation files that are required to build the package are displayed. When the Package Accelerator is used to create a new package, all installation files displayed in the **Applications** pane are required to create the package. + + If necessary, to add additional Installer files, click **Add**. To remove unnecessary installation files, select the Installer file, and then click **Delete**. To edit the properties associated with an installer, click **Edit**. The installation files specified in this step will be required when the Package Accelerator is used to create a new virtual application package. After you have confirmed the information displayed, click **Next**. + +9. On the **Select Guidance** page, to specify a file that contains information about how the Package Accelerator, click **Browse**. For example, this file can contain information about how the computer running the Sequencer should be configured, application prerequisite information for target computers, and general notes. You should provide all required information for the Package Accelerator to be successfully applied. The file you select must be in rich text (.rtf) or text file (.txt) format. Click **Next**. 10. On the **Create Package Accelerator** page, to specify where to save the Package Accelerator, click **Browse** and select the directory. 11. On the **Completion** page, to close the **Create Package Accelerator** wizard, click **Close**. - **Important**   - To help ensure that the package accelerator is as secure as possible, and so that the publisher can be verified when the package accelerator is applied, you should always digitally sign the package accelerator. + **Important** + To help ensure that the package accelerator is as secure as possible, and so that the publisher can be verified when the package accelerator is applied, you should always digitally sign the package accelerator. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics @@ -102,9 +108,9 @@ Before you begin the following procedure, you should perform the following: [How to Create a Virtual Application Package Using an App-V Package Accelerator](how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator.md b/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator.md index b0cbad1eb9..5520322085 100644 --- a/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator.md +++ b/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator.md @@ -17,17 +17,17 @@ ms.date: 06/16/2016 # How to Create a Virtual Application Package Using an App-V Package Accelerator -**Important**   +**Important** The App-V 5.0 Sequencer does not grant any license rights to the software application that you use to create the Package Accelerator. You must abide by all end user license terms for the application that you use. It is your responsibility to make sure that the software application’s license terms allow you to create a Package Accelerator with the App-V 5.0 Sequencer. -  + Use the following procedure to create a virtual application package with the App-V 5.0 Package Accelerator. -**Note**   +**Note** Before you start this procedure, copy the required Package Accelerator locally to the computer that runs the App-V 5.0 Sequencer. You should also copy all required installation files for the package to a local directory on the computer that runs the Sequencer. This is the directory that you have to specify in step 5 of this procedure. -  + **To create a virtual application package with an App-V 5.0 Package Accelerator** @@ -37,10 +37,10 @@ Before you start this procedure, copy the required Package Accelerator locally t 3. To specify the package accelerator that will be used to create the new virtual application package, click **Browse** on the **Select Package Accelerator** page. Click **Next**. - **Important**   + **Important** If the publisher of the package accelerator cannot be verified and does not contain a valid digital signature, then before you click **Run**, you must confirm that you trust the source of the package accelerator. Confirm your choice in the **Security Warning** dialog box. -   + 4. On the **Guidance** page, review the publishing guidance information that is displayed in the information pane. This information was added when the Package Accelerator was created and it contains guidance about how to create and publish the package. To export the guidance information to a text (.txt) file, click **Export** and specify the location where the file should be saved, and then click **Next**. @@ -48,7 +48,7 @@ Before you start this procedure, copy the required Package Accelerator locally t Alternatively, if you have already copied the installation files to a directory on this computer, click **Make New Folder**, browse to the folder that contains the installation files, and then click **Next**. - **Note**   + **Note** You can specify the following types of supported installation files: - Windows Installer files (**.msi**) @@ -61,44 +61,46 @@ Before you start this procedure, copy the required Package Accelerator locally t The following file types are not supported: **.msp** and **.exe** files. If you specify an **.exe** file, you must extract the installation files manually. -   - If the package accelerator requires an application to be installed before you apply the Package Accelerator, and if you have already installed the required application, select **I have installed all applications**, and then click **Next** on the **Local Installation** page. -6. On the **Package Name** page, specify a name that will be associated with the package. The name that you specify identifies the package in the App-V Management Console. Click **Next**. +~~~ +If the package accelerator requires an application to be installed before you apply the Package Accelerator, and if you have already installed the required application, select **I have installed all applications**, and then click **Next** on the **Local Installation** page. +~~~ -7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package that you are creating. To confirm the location where the package is created, review the information that is displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. +6. On the **Package Name** page, specify a name that will be associated with the package. The name that you specify identifies the package in the App-V Management Console. Click **Next**. - To create the package, click **Create**. After the package is created, click **Next**. +7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package that you are creating. To confirm the location where the package is created, review the information that is displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. -8. On the **Configure Software** page, to enable the Sequencer to configure the applications that are contained in the package, select **Configure Software**. In this step you can configure any associated tasks that must be completed in order to run the application on the target computers. For example, you can configure any associated license agreements. + To create the package, click **Create**. After the package is created, click **Next**. - If you select **Configure Software**, the following items can be configured using the Sequencer as part of this step: +8. On the **Configure Software** page, to enable the Sequencer to configure the applications that are contained in the package, select **Configure Software**. In this step you can configure any associated tasks that must be completed in order to run the application on the target computers. For example, you can configure any associated license agreements. - - **Load Package**. The Sequencer loads the files that are associated with the package. It can take several seconds to an hour to decode the package. + If you select **Configure Software**, the following items can be configured using the Sequencer as part of this step: - - **Run Each Program**. Optionally run the programs that are contained in the package. This step is helpful to complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at once, select at least one program, and then click **Run All**. To run specific programs, select the program or programs that you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. + - **Load Package**. The Sequencer loads the files that are associated with the package. It can take several seconds to an hour to decode the package. - - **Save Package**. The Sequencer saves the package. + - **Run Each Program**. Optionally run the programs that are contained in the package. This step is helpful to complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at once, select at least one program, and then click **Run All**. To run specific programs, select the program or programs that you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. - - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. + - **Save Package**. The Sequencer saves the package. - If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. + - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. -9. On the **Completion** page, after you review the information that is displayed in the **Virtual Application Package Report** pane, click **Close**. + If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. - The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about how to modify a package, see [How to Modify an Existing Virtual Application Package](how-to-modify-an-existing-virtual-application-package-beta.md). +9. On the **Completion** page, after you review the information that is displayed in the **Virtual Application Package Report** pane, click **Close**. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about how to modify a package, see [How to Modify an Existing Virtual Application Package](how-to-modify-an-existing-virtual-application-package-beta.md). + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator51.md b/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator51.md index 3944b0df6d..2552432acc 100644 --- a/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator51.md +++ b/mdop/appv-v5/how-to-create-a-virtual-application-package-using-an-app-v-package-accelerator51.md @@ -17,17 +17,17 @@ ms.date: 06/16/2016 # How to Create a Virtual Application Package Using an App-V Package Accelerator -**Important**   +**Important** The App-V 5.1 Sequencer does not grant any license rights to the software application that you use to create the Package Accelerator. You must abide by all end user license terms for the application that you use. It is your responsibility to make sure that the software application’s license terms allow you to create a Package Accelerator with the App-V 5.1 Sequencer. -  + Use the following procedure to create a virtual application package with the App-V 5.1 Package Accelerator. -**Note**   +**Note** Before you start this procedure, copy the required Package Accelerator locally to the computer that runs the App-V 5.1 Sequencer. You should also copy all required installation files for the package to a local directory on the computer that runs the Sequencer. This is the directory that you have to specify in step 5 of this procedure. -  + **To create a virtual application package with an App-V 5.1 Package Accelerator** @@ -37,10 +37,10 @@ Before you start this procedure, copy the required Package Accelerator locally t 3. To specify the package accelerator that will be used to create the new virtual application package, click **Browse** on the **Select Package Accelerator** page. Click **Next**. - **Important**   + **Important** If the publisher of the package accelerator cannot be verified and does not contain a valid digital signature, then before you click **Run**, you must confirm that you trust the source of the package accelerator. Confirm your choice in the **Security Warning** dialog box. -   + 4. On the **Guidance** page, review the publishing guidance information that is displayed in the information pane. This information was added when the Package Accelerator was created and it contains guidance about how to create and publish the package. To export the guidance information to a text (.txt) file, click **Export** and specify the location where the file should be saved, and then click **Next**. @@ -48,7 +48,7 @@ Before you start this procedure, copy the required Package Accelerator locally t Alternatively, if you have already copied the installation files to a directory on this computer, click **Make New Folder**, browse to the folder that contains the installation files, and then click **Next**. - **Note**   + **Note** You can specify the following types of supported installation files: - Windows Installer files (**.msi**) @@ -61,44 +61,46 @@ Before you start this procedure, copy the required Package Accelerator locally t The following file types are not supported: **.msp** and **.exe** files. If you specify an **.exe** file, you must extract the installation files manually. -   - If the package accelerator requires an application to be installed before you apply the Package Accelerator, and if you have already installed the required application, select **I have installed all applications**, and then click **Next** on the **Local Installation** page. -6. On the **Package Name** page, specify a name that will be associated with the package. The name that you specify identifies the package in the App-V Management Console. Click **Next**. +~~~ +If the package accelerator requires an application to be installed before you apply the Package Accelerator, and if you have already installed the required application, select **I have installed all applications**, and then click **Next** on the **Local Installation** page. +~~~ -7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package that you are creating. To confirm the location where the package is created, review the information that is displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. +6. On the **Package Name** page, specify a name that will be associated with the package. The name that you specify identifies the package in the App-V Management Console. Click **Next**. - To create the package, click **Create**. After the package is created, click **Next**. +7. On the **Create Package** page, provide comments that will be associated with the package. The comments should contain identifying information about the package that you are creating. To confirm the location where the package is created, review the information that is displayed in **Save Location**. To compress the package, select **Compress Package**. Select the **Compress Package** check box if the package will be streamed across the network, or when the package size exceeds 4 GB. -8. On the **Configure Software** page, to enable the Sequencer to configure the applications that are contained in the package, select **Configure Software**. In this step you can configure any associated tasks that must be completed in order to run the application on the target computers. For example, you can configure any associated license agreements. + To create the package, click **Create**. After the package is created, click **Next**. - If you select **Configure Software**, the following items can be configured using the Sequencer as part of this step: +8. On the **Configure Software** page, to enable the Sequencer to configure the applications that are contained in the package, select **Configure Software**. In this step you can configure any associated tasks that must be completed in order to run the application on the target computers. For example, you can configure any associated license agreements. - - **Load Package**. The Sequencer loads the files that are associated with the package. It can take several seconds to an hour to decode the package. + If you select **Configure Software**, the following items can be configured using the Sequencer as part of this step: - - **Run Each Program**. Optionally run the programs that are contained in the package. This step is helpful to complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at once, select at least one program, and then click **Run All**. To run specific programs, select the program or programs that you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. + - **Load Package**. The Sequencer loads the files that are associated with the package. It can take several seconds to an hour to decode the package. - - **Save Package**. The Sequencer saves the package. + - **Run Each Program**. Optionally run the programs that are contained in the package. This step is helpful to complete any associated license or configuration tasks that are required to run the application before you deploy and run the package on target computers. To run all the programs at once, select at least one program, and then click **Run All**. To run specific programs, select the program or programs that you want to run, and then click **Run Selected**. Complete the required configuration tasks, and then close the applications. It can take several minutes for all programs to run. Click **Next**. - - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. + - **Save Package**. The Sequencer saves the package. - If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. + - **Primary Feature Block**. The Sequencer optimizes the package for streaming by rebuilding the primary feature block. -9. On the **Completion** page, after you review the information that is displayed in the **Virtual Application Package Report** pane, click **Close**. + If you do not want to configure the applications, click **Skip this step**, and to go to step 9 of this procedure, and then click **Next**. - The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about how to modify a package, see [How to Modify an Existing Virtual Application Package](how-to-modify-an-existing-virtual-application-package-beta.md). +9. On the **Completion** page, after you review the information that is displayed in the **Virtual Application Package Report** pane, click **Close**. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + The package is now available in the Sequencer. To edit the package properties, click **Edit \[Package Name\]**. For more information about how to modify a package, see [How to Modify an Existing Virtual Application Package](how-to-modify-an-existing-virtual-application-package-beta.md). + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-create-and-use-a-project-template.md b/mdop/appv-v5/how-to-create-and-use-a-project-template.md index 092938935c..199c3b09bf 100644 --- a/mdop/appv-v5/how-to-create-and-use-a-project-template.md +++ b/mdop/appv-v5/how-to-create-and-use-a-project-template.md @@ -33,10 +33,10 @@ Use the following procedures to create and apply a new template. **Note**   If the virtual application package is currently open in the App-V 5.0 Sequencer console, skip to step 3 of this procedure. -2. To open the existing virtual application package that contains the settings you want to save with the App-V 5.0 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**. +2. To open the existing virtual application package that contains the settings you want to save with the App-V 5.0 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**. -3. In the App-V 5.0 Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V 5.0 project template. Click Save. -The new App-V 5.0 project template is saved in the directory specified in step 3 of this procedure. +3. In the App-V 5.0 Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V 5.0 project template. Click Save. + The new App-V 5.0 project template is saved in the directory specified in step 3 of this procedure. **To apply a project template** diff --git a/mdop/appv-v5/how-to-create-and-use-a-project-template51.md b/mdop/appv-v5/how-to-create-and-use-a-project-template51.md index da09842a7e..cc1d47dba3 100644 --- a/mdop/appv-v5/how-to-create-and-use-a-project-template51.md +++ b/mdop/appv-v5/how-to-create-and-use-a-project-template51.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 You can use an App-V 5.1 project template to save commonly applied settings associated with an existing virtual application package. These settings can then be applied when you create new virtual application packages in your environment. Using a project template can streamline the process of creating virtual application packages. -**Note**   +**Note** You can, and often should apply an App-V 5.1 project template during a package upgrade. For example, if you sequenced an application with a custom exclusion list, it is recommended that an associated template is created and saved for later use while upgrading the sequenced application. -  + App-V 5.1 project templates differ from App-V 5.1 Application Accelerators because App-V 5.1 Application Accelerators are application-specific, and App-V 5.1 project templates can be applied to multiple applications. @@ -32,42 +32,46 @@ Use the following procedures to create and apply a new template. 1. To start the App-V 5.1 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. -2. **Note**   +2. **Note** If the virtual application package is currently open in the App-V 5.1 Sequencer console, skip to step 3 of this procedure. -   - To open the existing virtual application package that contains the settings you want to save with the App-V 5.1 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**. -3. In the App-V 5.1 Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V 5.1 project template. Click Save. +~~~ +To open the existing virtual application package that contains the settings you want to save with the App-V 5.1 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**. +~~~ - The new App-V 5.1 project template is saved in the directory specified in step 3 of this procedure. +3. In the App-V 5.1 Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V 5.1 project template. Click Save. + + The new App-V 5.1 project template is saved in the directory specified in step 3 of this procedure. **To apply a project template** -1. **Important**   +1. **Important** Creating a virtual application package using a project template in conjunction with a Package Accelerator is not supported. -   - To start the App-V 5.1 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. -2. To create or upgrade a new virtual application package by using an App-V 5.1 project template, click **File** / **New From Template**. +~~~ +To start the App-V 5.1 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. +~~~ -3. To select the project template that you want to use, browse to the directory where the project template is saved, select the project template, and then click **Open**. +2. To create or upgrade a new virtual application package by using an App-V 5.1 project template, click **File** / **New From Template**. - Create the new virtual application package. The settings saved with the specified template will be applied to the new virtual application package that you are creating. +3. To select the project template that you want to use, browse to the directory where the project template is saved, select the project template, and then click **Open**. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + Create the new virtual application package. The settings saved with the specified template will be applied to the new virtual application package that you are creating. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-deploy-app-v-50-packages-using-electronic-software-distribution.md b/mdop/appv-v5/how-to-deploy-app-v-50-packages-using-electronic-software-distribution.md index 8069130ba6..cb240b0114 100644 --- a/mdop/appv-v5/how-to-deploy-app-v-50-packages-using-electronic-software-distribution.md +++ b/mdop/appv-v5/how-to-deploy-app-v-50-packages-using-electronic-software-distribution.md @@ -45,12 +45,12 @@ Use one of the following methods to publish packages to App-V client computers w

    PowerShell

    -

    Use PowerShell cmdlets to deploy virtualized applications. For more information about using PowerShell and App-V 5.0, see [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md).

    +

    Use PowerShell cmdlets to deploy virtualized applications. For more information about using PowerShell and App-V 5.0, see Administering App-V by Using PowerShell.

    -  + **To deploy App-V 5.0 packages by using an ESD** @@ -69,9 +69,9 @@ Use one of the following methods to publish packages to App-V client computers w [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-deploy-app-v-51-packages-using-electronic-software-distribution.md b/mdop/appv-v5/how-to-deploy-app-v-51-packages-using-electronic-software-distribution.md index fd0877886a..6171caac63 100644 --- a/mdop/appv-v5/how-to-deploy-app-v-51-packages-using-electronic-software-distribution.md +++ b/mdop/appv-v5/how-to-deploy-app-v-51-packages-using-electronic-software-distribution.md @@ -45,12 +45,12 @@ Use one of the following methods to publish packages to App-V client computers w

    PowerShell

    -

    Use PowerShell cmdlets to deploy virtualized applications. For more information about using PowerShell and App-V 5.1, see [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md).

    +

    Use PowerShell cmdlets to deploy virtualized applications. For more information about using PowerShell and App-V 5.1, see Administering App-V 5.1 by Using PowerShell.

    -  + **To deploy App-V 5.1 packages by using an ESD** @@ -69,9 +69,9 @@ Use one of the following methods to publish packages to App-V client computers w [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-50-server-50sp3.md b/mdop/appv-v5/how-to-deploy-the-app-v-50-server-50sp3.md index e728860b48..4c309e2617 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-50-server-50sp3.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-50-server-50sp3.md @@ -33,126 +33,126 @@ Use the following procedure to install the App-V 5.0 server. For information abo **To install the App-V 5.0 server** -1. Copy the App-V 5.0 server installation files to the computer on which you want to install it. +1. Copy the App-V 5.0 server installation files to the computer on which you want to install it. -2. Start the App-V 5.0 server installation by right-clicking and running **appv\_server\_setup.exe** as an administrator, and then click **Install**. +2. Start the App-V 5.0 server installation by right-clicking and running **appv\_server\_setup.exe** as an administrator, and then click **Install**. -3. Review and accept the license terms, and choose whether to enable Microsoft updates. +3. Review and accept the license terms, and choose whether to enable Microsoft updates. -4. On the **Feature Selection** page, select all of the following components. +4. On the **Feature Selection** page, select all of the following components. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ComponentDescription

    Management server

    Provides overall management functionality for the App-V infrastructure.

    Management database

    Facilitates database predeployments for App-V management.

    Publishing server

    Provides hosting and streaming functionality for virtual applications.

    Reporting server

    Provides App-V 5.0 reporting services.

    Reporting database

    Facilitates database predeployments for App-V reporting.

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ComponentDescription

    Management server

    Provides overall management functionality for the App-V infrastructure.

    Management database

    Facilitates database predeployments for App-V management.

    Publishing server

    Provides hosting and streaming functionality for virtual applications.

    Reporting server

    Provides App-V 5.0 reporting services.

    Reporting database

    Facilitates database predeployments for App-V reporting.

    -   + -5. On the **Installation Location** page, accept the default location where the selected components will be installed, or change the location by typing a new path on the **Installation Location** line. +5. On the **Installation Location** page, accept the default location where the selected components will be installed, or change the location by typing a new path on the **Installation Location** line. -6. On the initial **Create New Management Database** page, configure the **Microsoft SQL Server instance** and **Management Server database** by selecting the appropriate option below. +6. On the initial **Create New Management Database** page, configure the **Microsoft SQL Server instance** and **Management Server database** by selecting the appropriate option below. - - - - - - - - - - - - - - - - - - - - - -
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    -

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    -

    Not supported: A server name using the format ServerName\INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    -

    The database name must be unique, or the installation will fail.

    + + + + + + + + + + + + + + + + + + + + + +
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    +

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    +

    Not supported: A server name using the format ServerName<strong>INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    +

    The database name must be unique, or the installation will fail.

    -   + -7. On the **Configure** page, accept the default value **Use this local computer**. +7. On the **Configure** page, accept the default value **Use this local computer**. - **Note**   - If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. + **Note** + If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. -   + -8. On the initial **Create New Reporting Database** page, configure the **Microsoft SQL Server instance** and **Reporting Server database** by selecting the appropriate option below. +8. On the initial **Create New Reporting Database** page, configure the **Microsoft SQL Server instance** and **Reporting Server database** by selecting the appropriate option below. - - - - - - - - - - - - - - - - - - - - - -
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    -

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    -

    Not supported: A server name using the format ServerName\INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    -

    The database name must be unique, or the installation will fail.

    + + + + + + + + + + + + + + + + + + + + + +
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    +

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    +

    Not supported: A server name using the format ServerName<strong>INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    +

    The database name must be unique, or the installation will fail.

    -   + -9. On the **Configure** page, accept the default value: **Use this local computer**. +9. On the **Configure** page, accept the default value: **Use this local computer**. - **Note**   - If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. + **Note** + If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. -   + 10. On the **Configure** (Management Server Configuration) page, specify the following: @@ -185,7 +185,7 @@ Use the following procedure to install the App-V 5.0 server. For information abo -   + 11. On the **Configure** **Publishing Server Configuration** page, specify the following: @@ -203,7 +203,7 @@ Use the following procedure to install the App-V 5.0 server. For information abo

    Specify the URL for the management service.

    -

    Example: http://localhost:12345

    +

    Example: http://localhost:12345

    Website name: Specify the custom name that will be used to run the publishing service.

    @@ -217,7 +217,7 @@ Use the following procedure to install the App-V 5.0 server. For information abo -   + 12. On the **Reporting Server** page, specify the following: @@ -245,7 +245,7 @@ Use the following procedure to install the App-V 5.0 server. For information abo -   + 13. To start the installation, click **Install** on the **Ready** page, and then click **Close** on the **Finished** page. @@ -270,9 +270,9 @@ Use the following procedure to install the App-V 5.0 server. For information abo [How to Enable Reporting on the App-V 5.0 Client by Using PowerShell](how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-50-server-using-a-script.md b/mdop/appv-v5/how-to-deploy-the-app-v-50-server-using-a-script.md index 850e2a621d..fdaab43d4a 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-50-server-using-a-script.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-50-server-using-a-script.md @@ -69,7 +69,7 @@ Use the following tables for more information about installing the App-V 5.0 ser -   + @@ -151,7 +151,7 @@ Use the following tables for more information about installing the App-V 5.0 ser
    -   + @@ -623,7 +623,7 @@ Use the following tables for more information about installing the App-V 5.0 ser
    -   + ### Parameters for using an Existing Reporting Server Database @@ -648,11 +648,11 @@ Use the following tables for more information about installing the App-V 5.0 ser

    Specifies the name of the remote computer that SQL Server is installed on. Takes a string. E.g. /EXISTING_REPORTING_DB_ REMOTE_SQL_SERVER_NAME="mycomputer1"

    -

    /EXISTING_ REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    +

    /EXISTING_ REPORTING DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance is to be used. Switch parameter so no value is expected.

    -

    /EXISTING_ REPORTING_DB_CUSTOM_SQLINSTANCE

    +

    /EXISTING REPORTING_DB_CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that should be used. Takes a string. E.g. /EXISTING_REPORTING_DB_ CUSTOM_SQLINSTANCE="MYSQLSERVER"

    @@ -737,19 +737,19 @@ Use the following tables for more information about installing the App-V 5.0 ser

    /EXISTING_MANAGEMENT_DB_NAME

    Specifies the name of the existing management database that should be used. Example usage: /EXISITING_MANAGEMENT_DB_NAME=”AppVMgmtDB”. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    -

    Got a suggestion for App-V? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). Got an App-V issue? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv).

    +

    Got a suggestion for App-V? Add or vote on suggestions here. Got an App-V issue? Use the App-V TechNet Forum.

    -   + ## Related topics [Deploying the App-V 5.0 Server](deploying-the-app-v-50-server.md) -  + -  + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-51-server-using-a-script.md b/mdop/appv-v5/how-to-deploy-the-app-v-51-server-using-a-script.md index 2318ddce47..597cd51d2b 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-51-server-using-a-script.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-51-server-using-a-script.md @@ -23,770 +23,772 @@ In order to complete the **appv\_server\_setup.exe** Server setup successfully u - Use the following tables for more information about installing the App-V 5.1 server using the command line. - **Note**   + **Note** The information in the following tables can also be accessed using the command line by typing the following command: **appv\_server\_setup.exe /?**. -   - **Common parameters and Examples** - - - - - - - - - - - -

    To Install the Management server and Management database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /MANAGEMENT_DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • -
    • /MANAGEMENT_DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /MANAGEMENT_SERVER

    -

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    -

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    -

    /MANAGEMENT_WEBSITE_PORT=”8080”

    -

    /DB_PREDEPLOY_MANAGEMENT

    -

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /MANAGEMENT_DB_NAME=”AppVManagement”

    +~~~ +**Common parameters and Examples** -   + ++++ + + + + + + +

    To Install the Management server and Management database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /MANAGEMENT_DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • +
    • /MANAGEMENT_DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /MANAGEMENT_SERVER

    +

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    +

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    +

    /MANAGEMENT_WEBSITE_PORT=”8080”

    +

    /DB_PREDEPLOY_MANAGEMENT

    +

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /MANAGEMENT_DB_NAME=”AppVManagement”

    - - - - - - - - - - - -

    To Install the Management server using an existing Management database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    • -
    • /EXISTING_MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /EXISTING_MANAGEMENT_DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    • -
    • /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • -
    • /EXISTING_MANAGEMENT_DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /MANAGEMENT_SERVER

    -

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    -

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    -

    /MANAGEMENT_WEBSITE_PORT=”8080”

    -

    /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    -

    /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE =”SqlInstanceName”

    -

    /EXISTING_MANAGEMENT_DB_NAME =”AppVManagement”

    -   - - - - - - - - - - - -

    To install the Management server using an existing Management database on a remote machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    • -
    • /EXISTING_MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /EXISTING_MANAGEMENT_DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /MANAGEMENT_SERVER

    • -
    • /MANAGEMENT_ADMINACCOUNT

    • -
    • /MANAGEMENT_WEBSITE_NAME

    • -
    • /MANAGEMENT_WEBSITE_PORT

    • -
    • /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    • -
    • /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • -
    • /EXISTING_MANAGEMENT_DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /MANAGEMENT_SERVER

    -

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    -

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    -

    /MANAGEMENT_WEBSITE_PORT=”8080”

    -

    /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME=”SqlServermachine.domainName”

    -

    /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE =”SqlInstanceName”

    -

    /EXISTING_MANAGEMENT_DB_NAME =”AppVManagement”

    + ++++ + + + + + + +

    To Install the Management server using an existing Management database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    • +
    • /EXISTING_MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /EXISTING_MANAGEMENT_DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    • +
    • /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • +
    • /EXISTING_MANAGEMENT_DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /MANAGEMENT_SERVER

    +

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    +

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    +

    /MANAGEMENT_WEBSITE_PORT=”8080”

    +

    /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    +

    /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE =”SqlInstanceName”

    +

    /EXISTING_MANAGEMENT_DB_NAME =”AppVManagement”

    -   - - - - - - - - - - - -

    To Install the Management database and the Management Server on the same computer.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /MANAGEMENT_DB_NAME

    • -
    • /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    • -
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • -
    • /MANAGEMENT_DB_NAME

    • -
    • /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    • -
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /DB_PREDEPLOY_MANAGEMENT

    -

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /MANAGEMENT_DB_NAME=”AppVManagement”

    -

    /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    -

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    -   + ++++ + + + + + + +

    To install the Management server using an existing Management database on a remote machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    • +
    • /EXISTING_MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /EXISTING_MANAGEMENT_DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /MANAGEMENT_SERVER

    • +
    • /MANAGEMENT_ADMINACCOUNT

    • +
    • /MANAGEMENT_WEBSITE_NAME

    • +
    • /MANAGEMENT_WEBSITE_PORT

    • +
    • /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    • +
    • /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • +
    • /EXISTING_MANAGEMENT_DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /MANAGEMENT_SERVER

    +

    /MANAGEMENT_ADMINACCOUNT=”Domain\AdminGroup”

    +

    /MANAGEMENT_WEBSITE_NAME=”Microsoft AppV Management Service”

    +

    /MANAGEMENT_WEBSITE_PORT=”8080”

    +

    /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME=”SqlServermachine.domainName”

    +

    /EXISTING_MANAGEMENT_DB_CUSTOM_SQLINSTANCE =”SqlInstanceName”

    +

    /EXISTING_MANAGEMENT_DB_NAME =”AppVManagement”

    - - - - - - - - - - - -

    To install the Management database on a different computer than the Management server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /MANAGEMENT_DB_NAME

    • -
    • /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    • -
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /DB_PREDEPLOY_MANAGEMENT

    • -
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • -
    • /MANAGEMENT_DB_NAME

    • -
    • /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    • -
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /DB_PREDEPLOY_MANAGEMENT

    -

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /MANAGEMENT_DB_NAME=”AppVManagement”

    -

    /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT=”Domain\MachineAccount”

    -

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    -   - - - - - - - - - - - -

    To Install the publishing server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /PUBLISHING_SERVER

    • -
    • /PUBLISHING_MGT_SERVER

    • -
    • /PUBLISHING_WEBSITE_NAME

    • -
    • /PUBLISHING_WEBSITE_PORT

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /PUBLISHING_SERVER

    -

    /PUBLISHING_MGT_SERVER=”http://ManagementServerName:ManagementPort”

    -

    /PUBLISHING_WEBSITE_NAME=”Microsoft AppV Publishing Service”

    -

    /PUBLISHING_WEBSITE_PORT=”8081”

    + ++++ + + + + + + +

    To Install the Management database and the Management Server on the same computer.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /MANAGEMENT_DB_NAME

    • +
    • /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    • +
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • +
    • /MANAGEMENT_DB_NAME

    • +
    • /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    • +
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /DB_PREDEPLOY_MANAGEMENT

    +

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /MANAGEMENT_DB_NAME=”AppVManagement”

    +

    /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    +

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    -   - - - - - - - - - - - -

    To Install the Reporting server and Reporting database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /REPORTING _DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _ADMINACCOUNT

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • -
    • /REPORTING _DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -
      -
    • /appv_server_setup.exe /QUIET

    • -
    • /REPORTING_SERVER

    • -
    • /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    • -
    • /REPORTING_WEBSITE_PORT=”8082”

    • -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    • -
    • /REPORTING_DB_NAME=”AppVReporting”

    • -
    -   + ++++ + + + + + + +

    To install the Management database on a different computer than the Management server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /MANAGEMENT_DB_NAME

    • +
    • /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    • +
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /DB_PREDEPLOY_MANAGEMENT

    • +
    • /MANAGEMENT_DB_CUSTOM_SQLINSTANCE

    • +
    • /MANAGEMENT_DB_NAME

    • +
    • /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    • +
    • /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /DB_PREDEPLOY_MANAGEMENT

    +

    /MANAGEMENT_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /MANAGEMENT_DB_NAME=”AppVManagement”

    +

    /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT=”Domain\MachineAccount”

    +

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    - - - - - - - - - - - -

    To Install the Reporting server and using an existing Reporting database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    • -
    • /EXISTING_REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /EXISTING_REPORTING _DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _ADMINACCOUNT

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    • -
    • /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE

    • -
    • /EXISTING_REPORTING _DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /REPORTING_SERVER

    -

    /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    -

    /REPORTING_WEBSITE_PORT=”8082”

    -

    /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    -

    /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /EXITING_REPORTING_DB_NAME=”AppVReporting”

    -   - - - - - - - - - - - -

    To Install the Reporting server using an existing Reporting database on a remote machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    • -
    • /EXISTING_REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /EXISTING_REPORTING _DB_NAME

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /REPORTING _SERVER

    • -
    • /REPORTING _ADMINACCOUNT

    • -
    • /REPORTING _WEBSITE_NAME

    • -
    • /REPORTING _WEBSITE_PORT

    • -
    • /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    • -
    • /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE

    • -
    • /EXISTING_REPORTING _DB_NAME

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /REPORTING_SERVER

    -

    /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    -

    /REPORTING_WEBSITE_PORT=”8082”

    -

    /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME=”SqlServerMachine.DomainName”

    -

    /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /EXITING_REPORTING_DB_NAME=”AppVReporting”

    + ++++ + + + + + + +

    To Install the publishing server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /PUBLISHING_SERVER

    • +
    • /PUBLISHING_MGT_SERVER

    • +
    • /PUBLISHING_WEBSITE_NAME

    • +
    • /PUBLISHING_WEBSITE_PORT

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /PUBLISHING_SERVER

    +

    /PUBLISHING_MGT_SERVER=”http://ManagementServerName:ManagementPort”

    +

    /PUBLISHING_WEBSITE_NAME=”Microsoft AppV Publishing Service”

    +

    /PUBLISHING_WEBSITE_PORT=”8081”

    -   - - - - - - - - - - - -

    To install the Reporting database on the same computer as the Reporting server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /REPORTING _DB_NAME

    • -
    • /REPORTING_SERVER_MACHINE_USE_LOCAL

    • -
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • -
    • /REPORTING _DB_NAME

    • -
    • /REPORTING_SERVER_MACHINE_USE_LOCAL

    • -
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /DB_PREDEPLOY_REPORTING

    -

    /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /REPORTING_DB_NAME=”AppVReporting”

    -

    /REPORTING_SERVER_MACHINE_USE_LOCAL

    -

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    -   + ++++ + + + + + + +

    To Install the Reporting server and Reporting database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /REPORTING _DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _ADMINACCOUNT

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • +
    • /REPORTING _DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +
      +
    • /appv_server_setup.exe /QUIET

    • +
    • /REPORTING_SERVER

    • +
    • /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    • +
    • /REPORTING_WEBSITE_PORT=”8082”

    • +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    • +
    • /REPORTING_DB_NAME=”AppVReporting”

    • +
    - - - - - - - - - - - -

    To install the Reporting database on a different computer than the Reporting server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    -
      -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • -
    • /REPORTING _DB_NAME

    • -
    • /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    • -
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    To use a custom instance of Microsoft SQL Server, use these parameters:

    -
      -
    • /DB_PREDEPLOY_REPORTING

    • -
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • -
    • /REPORTING _DB_NAME

    • -
    • /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    • -
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • -
    -

    Using a custom instance of Microsoft SQL Server example:

    -

    /appv_server_setup.exe /QUIET

    -

    /DB_PREDEPLOY_REPORTING

    -

    /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    -

    /REPORTING_DB_NAME=”AppVReporting”

    -

    /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT=”Domain\MachineAccount”

    -

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    -   - **Parameter Definitions** + ++++ + + + + + + +

    To Install the Reporting server and using an existing Reporting database on a local machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    • +
    • /EXISTING_REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /EXISTING_REPORTING _DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _ADMINACCOUNT

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    • +
    • /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE

    • +
    • /EXISTING_REPORTING _DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /REPORTING_SERVER

    +

    /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    +

    /REPORTING_WEBSITE_PORT=”8082”

    +

    /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    +

    /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /EXITING_REPORTING_DB_NAME=”AppVReporting”

    - **General Parameters** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /QUIET

    Specifies silent install.

    /UNINSTALL

    Specifies an uninstall.

    /LAYOUT

    Specifies layout action. This extracts the MSIs and script files to a folder without actually installing the product. No value is expected.

    /LAYOUTDIR

    Specifies the layout directory. Takes a string. For example, /LAYOUTDIR=”C:\Application Virtualization Server”

    /INSTALLDIR

    Specifies the installation directory. Takes a string. E.g. /INSTALLDIR=”C:\Program Files\Application Virtualization\Server”

    /MUOPTIN

    Enables Microsoft Update. No value is expected

    /ACCEPTEULA

    Accepts the license agreement. This is required for an unattended installation. Example usage: /ACCEPTEULA or /ACCEPTEULA=1.

    -   + ++++ + + + + + + +

    To Install the Reporting server using an existing Reporting database on a remote machine.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    • +
    • /EXISTING_REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /EXISTING_REPORTING _DB_NAME

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /REPORTING _SERVER

    • +
    • /REPORTING _ADMINACCOUNT

    • +
    • /REPORTING _WEBSITE_NAME

    • +
    • /REPORTING _WEBSITE_PORT

    • +
    • /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    • +
    • /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE

    • +
    • /EXISTING_REPORTING _DB_NAME

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /REPORTING_SERVER

    +

    /REPORTING_WEBSITE_NAME=”Microsoft AppV Reporting Service”

    +

    /REPORTING_WEBSITE_PORT=”8082”

    +

    /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME=”SqlServerMachine.DomainName”

    +

    /EXISTING_REPORTING _DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /EXITING_REPORTING_DB_NAME=”AppVReporting”

    - **Management Server Installation Parameters** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /MANAGEMENT_SERVER

    Specifies that the management server will be installed. No value is expected

    /MANAGEMENT_ADMINACCOUNT

    Specifies the account that will be allowed to Administrator access to the management server This account can be an individual user account or a group. Example usage: /MANAGEMENT_ADMINACCOUNT=”mydomain\admin”. If /MANAGEMENT_SERVER is not specified, this will be ignored. Specifies the account that will be allowed to Administrator access to the management server. This can be a user account or a group. For example, /MANAGEMENT_ADMINACCOUNT="mydomain\admin".

    /MANAGEMENT_WEBSITE_NAME

    Specifies name of the website that will be created for the management service. For example, /MANAGEMENT_WEBSITE_NAME=”Microsoft App-V Management Service”

    MANAGEMENT_WEBSITE_PORT

    Specifies the port number that will be used by the management service will use. For example, /MANAGEMENT_WEBSITE_PORT=82.

    -   + ++++ + + + + + + +

    To install the Reporting database on the same computer as the Reporting server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /REPORTING _DB_NAME

    • +
    • /REPORTING_SERVER_MACHINE_USE_LOCAL

    • +
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • +
    • /REPORTING _DB_NAME

    • +
    • /REPORTING_SERVER_MACHINE_USE_LOCAL

    • +
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /DB_PREDEPLOY_REPORTING

    +

    /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /REPORTING_DB_NAME=”AppVReporting”

    +

    /REPORTING_SERVER_MACHINE_USE_LOCAL

    +

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    - **Parameters for the Management Server Database** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /DB_PREDEPLOY_MANAGEMENT

    Specifies that the management database will be installed. You must have sufficient database permissions to complete this installation. No value is expected

    /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance should be used. No value is expected.

    /MANAGEMENT_DB_ CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that should be used to create a new database. Example usage: /MANAGEMENT_DB_ CUSTOM_SQLINSTANCE=”MYSQLSERVER”. If /DB_PREDEPLOY_MANAGEMENT is not specified, this will be ignored.

    /MANAGEMENT_DB_NAME

    Specifies the name of the new management database that should be created. Example usage: /MANAGEMENT_DB_NAME=”AppVMgmtDB”. If /DB_PREDEPLOY_MANAGEMENT is not specified, this will be ignored.

    /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    Indicates if the management server that will be accessing the database is installed on the local server. Switch parameter so no value is expected.

    /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    Specifies the machine account of the remote machine that the management server will be installed on. Example usage: /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT=”domain\computername”

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    Indicates the Administrator account that will be used to install the management server. Example usage: /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT =”domain\alias”

    -   + ++++ + + + + + + +

    To install the Reporting database on a different computer than the Reporting server.

    To use the default instance of Microsoft SQL Server, use the following parameters:

    +
      +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    • +
    • /REPORTING _DB_NAME

    • +
    • /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    • +
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    To use a custom instance of Microsoft SQL Server, use these parameters:

    +
      +
    • /DB_PREDEPLOY_REPORTING

    • +
    • /REPORTING _DB_CUSTOM_SQLINSTANCE

    • +
    • /REPORTING _DB_NAME

    • +
    • /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    • +
    • /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    • +
    +

    Using a custom instance of Microsoft SQL Server example:

    +

    /appv_server_setup.exe /QUIET

    +

    /DB_PREDEPLOY_REPORTING

    +

    /REPORTING_DB_CUSTOM_SQLINSTANCE=”SqlInstanceName”

    +

    /REPORTING_DB_NAME=”AppVReporting”

    +

    /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT=”Domain\MachineAccount”

    +

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT=”Domain\InstallAdminAccount”

    - **Parameters for Installing Publishing Server** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /PUBLISHING_SERVER

    Specifies that the Publishing Server will be installed. No value is expected

    /PUBLISHING_MGT_SERVER

    Specifies the URL to Management Service the Publishing server will connect to. Example usage: http://<management server name>:<Management server port number>. If /PUBLISHING_SERVER is not used, this parameter will be ignored

    /PUBLISHING_WEBSITE_NAME

    Specifies name of the website that will be created for the publishing service. For example, /PUBLISHING_WEBSITE_NAME=”Microsoft App-V Publishing Service”

    /PUBLISHING_WEBSITE_PORT

    Specifies the port number used by the publishing service. For example, /PUBLISHING_WEBSITE_PORT=83

    -   +**Parameter Definitions** - **Parameters for Reporting Server** +**General Parameters** - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /REPORTING_SERVER

    Specifies that the Reporting Server will be installed. No value is expected

    /REPORTING_WEBSITE_NAME

    Specifies name of the website that will be created for the Reporting Service. E.g. /REPORTING_WEBSITE_NAME="Microsoft App-V ReportingService"

    /REPORTING_WEBSITE_PORT

    Specifies the port number that the Reporting Service will use. E.g. /REPORTING_WEBSITE_PORT=82

    + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /QUIET

    Specifies silent install.

    /UNINSTALL

    Specifies an uninstall.

    /LAYOUT

    Specifies layout action. This extracts the MSIs and script files to a folder without actually installing the product. No value is expected.

    /LAYOUTDIR

    Specifies the layout directory. Takes a string. For example, /LAYOUTDIR=”C:\Application Virtualization Server”

    /INSTALLDIR

    Specifies the installation directory. Takes a string. E.g. /INSTALLDIR=”C:\Program Files\Application Virtualization\Server”

    /MUOPTIN

    Enables Microsoft Update. No value is expected

    /ACCEPTEULA

    Accepts the license agreement. This is required for an unattended installation. Example usage: /ACCEPTEULA or /ACCEPTEULA=1.

    -   - **Parameters for using an Existing Reporting Server Database** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    Indicates that the Microsoft SQL Server is installed on the local server. Switch parameter so no value is expected.

    /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    Specifies the name of the remote computer that SQL Server is installed on. Takes a string. E.g. /EXISTING_REPORTING_DB_ REMOTE_SQL_SERVER_NAME="mycomputer1"

    /EXISTING_ REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance is to be used. Switch parameter so no value is expected.

    /EXISTING_ REPORTING_DB_CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that should be used. Takes a string. E.g. /EXISTING_REPORTING_DB_ CUSTOM_SQLINSTANCE="MYSQLSERVER"

    /EXISTING_ REPORTING _DB_NAME

    Specifies the name of the existing Reporting database that should be used. Takes a string. E.g. /EXISITING_REPORTING_DB_NAME="AppVReporting"

    +**Management Server Installation Parameters** -   + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /MANAGEMENT_SERVER

    Specifies that the management server will be installed. No value is expected

    /MANAGEMENT_ADMINACCOUNT

    Specifies the account that will be allowed to Administrator access to the management server This account can be an individual user account or a group. Example usage: /MANAGEMENT_ADMINACCOUNT=”mydomain\admin”. If /MANAGEMENT_SERVER is not specified, this will be ignored. Specifies the account that will be allowed to Administrator access to the management server. This can be a user account or a group. For example, /MANAGEMENT_ADMINACCOUNT="mydomain\admin".

    /MANAGEMENT_WEBSITE_NAME

    Specifies name of the website that will be created for the management service. For example, /MANAGEMENT_WEBSITE_NAME=”Microsoft App-V Management Service”

    MANAGEMENT_WEBSITE_PORT

    Specifies the port number that will be used by the management service will use. For example, /MANAGEMENT_WEBSITE_PORT=82.

    - **Parameters for installing Reporting Server Database** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /DB_PREDEPLOY_REPORTING

    Specifies that the Reporting Database will be installed. DBA permissions are required for this installation. No value is expected

    /REPORTING_DB_SQLINSTANCE_USE_DEFAULT

    Specifies the name of the custom SQL instance that should be used. Takes a string. E.g. /REPORTING_DB_ CUSTOM_SQLINSTANCE="MYSQLSERVER"

    /REPORTING_DB_NAME

    Specifies the name of the new Reporting database that should be created. Takes a string. E.g. /REPORTING_DB_NAME="AppVMgmtDB"

    /REPORTING_SERVER_MACHINE_USE_LOCAL

    Indicates that the Reporting server that will be accessing the database is installed on the local server. Switch parameter so no value is expected.

    /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    Specifies the machine account of the remote machine that the Reporting server will be installed on. Takes a string. E.g. /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT = "domain\computername"

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    Indicates the Administrator account that will be used to install the App-V Reporting Server. Takes a string. E.g. /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT = "domain\alias"

    -   +**Parameters for the Management Server Database** - **Parameters for using an existing Management Server Database** + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /DB_PREDEPLOY_MANAGEMENT

    Specifies that the management database will be installed. You must have sufficient database permissions to complete this installation. No value is expected

    /MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance should be used. No value is expected.

    /MANAGEMENT_DB_ CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that should be used to create a new database. Example usage: /MANAGEMENT_DB_ CUSTOM_SQLINSTANCE=”MYSQLSERVER”. If /DB_PREDEPLOY_MANAGEMENT is not specified, this will be ignored.

    /MANAGEMENT_DB_NAME

    Specifies the name of the new management database that should be created. Example usage: /MANAGEMENT_DB_NAME=”AppVMgmtDB”. If /DB_PREDEPLOY_MANAGEMENT is not specified, this will be ignored.

    /MANAGEMENT_SERVER_MACHINE_USE_LOCAL

    Indicates if the management server that will be accessing the database is installed on the local server. Switch parameter so no value is expected.

    /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT

    Specifies the machine account of the remote machine that the management server will be installed on. Example usage: /MANAGEMENT_REMOTE_SERVER_MACHINE_ACCOUNT=”domain\computername”

    /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT

    Indicates the Administrator account that will be used to install the management server. Example usage: /MANAGEMENT_SERVER_INSTALL_ADMIN_ACCOUNT =”domain\alias”

    + + + +**Parameters for Installing Publishing Server** + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /PUBLISHING_SERVER

    Specifies that the Publishing Server will be installed. No value is expected

    /PUBLISHING_MGT_SERVER

    Specifies the URL to Management Service the Publishing server will connect to. Example usage: http://<management server name>:<Management server port number>. If /PUBLISHING_SERVER is not used, this parameter will be ignored

    /PUBLISHING_WEBSITE_NAME

    Specifies name of the website that will be created for the publishing service. For example, /PUBLISHING_WEBSITE_NAME=”Microsoft App-V Publishing Service”

    /PUBLISHING_WEBSITE_PORT

    Specifies the port number used by the publishing service. For example, /PUBLISHING_WEBSITE_PORT=83

    + + + +**Parameters for Reporting Server** + + ++++ + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /REPORTING_SERVER

    Specifies that the Reporting Server will be installed. No value is expected

    /REPORTING_WEBSITE_NAME

    Specifies name of the website that will be created for the Reporting Service. E.g. /REPORTING_WEBSITE_NAME="Microsoft App-V ReportingService"

    /REPORTING_WEBSITE_PORT

    Specifies the port number that the Reporting Service will use. E.g. /REPORTING_WEBSITE_PORT=82

    + + + +**Parameters for using an Existing Reporting Server Database** + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /EXISTING_REPORTING_DB_SQL_SERVER_USE_LOCAL

    Indicates that the Microsoft SQL Server is installed on the local server. Switch parameter so no value is expected.

    /EXISTING_REPORTING_DB_REMOTE_SQL_SERVER_NAME

    Specifies the name of the remote computer that SQL Server is installed on. Takes a string. E.g. /EXISTING_REPORTING_DB_ REMOTE_SQL_SERVER_NAME="mycomputer1"

    /EXISTING_ REPORTING _DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance is to be used. Switch parameter so no value is expected.

    /EXISTING_ REPORTING_DB_CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that should be used. Takes a string. E.g. /EXISTING_REPORTING_DB_ CUSTOM_SQLINSTANCE="MYSQLSERVER"

    /EXISTING_ REPORTING _DB_NAME

    Specifies the name of the existing Reporting database that should be used. Takes a string. E.g. /EXISITING_REPORTING_DB_NAME="AppVReporting"

    + + + +**Parameters for installing Reporting Server Database** + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /DB_PREDEPLOY_REPORTING

    Specifies that the Reporting Database will be installed. DBA permissions are required for this installation. No value is expected

    /REPORTING_DB_SQLINSTANCE_USE_DEFAULT

    Specifies the name of the custom SQL instance that should be used. Takes a string. E.g. /REPORTING_DB_ CUSTOM_SQLINSTANCE="MYSQLSERVER"

    /REPORTING_DB_NAME

    Specifies the name of the new Reporting database that should be created. Takes a string. E.g. /REPORTING_DB_NAME="AppVMgmtDB"

    /REPORTING_SERVER_MACHINE_USE_LOCAL

    Indicates that the Reporting server that will be accessing the database is installed on the local server. Switch parameter so no value is expected.

    /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT

    Specifies the machine account of the remote machine that the Reporting server will be installed on. Takes a string. E.g. /REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT = "domain\computername"

    /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT

    Indicates the Administrator account that will be used to install the App-V Reporting Server. Takes a string. E.g. /REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT = "domain\alias"

    + + + +**Parameters for using an existing Management Server Database** + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterInformation

    /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    Indicates that the SQL Server is installed on the local server. Switch parameter so no value is expected.If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    Specifies the name of the remote computer that SQL Server is installed on. Takes a string. E.g. /EXISTING_MANAGEMENT_DB_ REMOTE_SQL_SERVER_NAME="mycomputer1"

    /EXISTING_ MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance is to be used. Switch parameter so no value is expected. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_ CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that will be used. Example usage /EXISTING_MANAGEMENT_DB_ CUSTOM_SQLINSTANCE=”AppVManagement”. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_NAME

    Specifies the name of the existing management database that should be used. Example usage: /EXISITING_MANAGEMENT_DB_NAME=”AppVMgmtDB”. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    +

    +

    Got a suggestion for App-V? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). Got an App-V issue? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv).

    +~~~ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ParameterInformation

    /EXISTING_MANAGEMENT_DB_SQL_SERVER_USE_LOCAL

    Indicates that the SQL Server is installed on the local server. Switch parameter so no value is expected.If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_REMOTE_SQL_SERVER_NAME

    Specifies the name of the remote computer that SQL Server is installed on. Takes a string. E.g. /EXISTING_MANAGEMENT_DB_ REMOTE_SQL_SERVER_NAME="mycomputer1"

    /EXISTING_ MANAGEMENT_DB_SQLINSTANCE_USE_DEFAULT

    Indicates that the default SQL instance is to be used. Switch parameter so no value is expected. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_ CUSTOM_SQLINSTANCE

    Specifies the name of the custom SQL instance that will be used. Example usage /EXISTING_MANAGEMENT_DB_ CUSTOM_SQLINSTANCE=”AppVManagement”. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    /EXISTING_MANAGEMENT_DB_NAME

    Specifies the name of the existing management database that should be used. Example usage: /EXISITING_MANAGEMENT_DB_NAME=”AppVMgmtDB”. If /DB_PREDEPLOY_MANAGEMENT is specified, this will be ignored.

    -

    -

    Got a suggestion for App-V? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). Got an App-V issue? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv).

    -   ## Related topics [Deploying the App-V 5.1 Server](deploying-the-app-v-51-server.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-51-server.md b/mdop/appv-v5/how-to-deploy-the-app-v-51-server.md index 2c6c002009..97b1877022 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-51-server.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-51-server.md @@ -33,126 +33,126 @@ Use the following procedure to install the Microsoft Application Virtualization **To install the App-V 5.1 server** -1. Copy the App-V 5.1 server installation files to the computer on which you want to install it. +1. Copy the App-V 5.1 server installation files to the computer on which you want to install it. -2. Start the App-V 5.1 server installation by right-clicking and running **appv\_server\_setup.exe** as an administrator, and then click **Install**. +2. Start the App-V 5.1 server installation by right-clicking and running **appv\_server\_setup.exe** as an administrator, and then click **Install**. -3. Review and accept the license terms, and choose whether to enable Microsoft updates. +3. Review and accept the license terms, and choose whether to enable Microsoft updates. -4. On the **Feature Selection** page, select all of the following components. +4. On the **Feature Selection** page, select all of the following components. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    ComponentDescription

    Management server

    Provides overall management functionality for the App-V infrastructure.

    Management database

    Facilitates database predeployments for App-V management.

    Publishing server

    Provides hosting and streaming functionality for virtual applications.

    Reporting server

    Provides App-V 5.1 reporting services.

    Reporting database

    Facilitates database predeployments for App-V reporting.

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ComponentDescription

    Management server

    Provides overall management functionality for the App-V infrastructure.

    Management database

    Facilitates database predeployments for App-V management.

    Publishing server

    Provides hosting and streaming functionality for virtual applications.

    Reporting server

    Provides App-V 5.1 reporting services.

    Reporting database

    Facilitates database predeployments for App-V reporting.

    -   + -5. On the **Installation Location** page, accept the default location where the selected components will be installed, or change the location by typing a new path on the **Installation Location** line. +5. On the **Installation Location** page, accept the default location where the selected components will be installed, or change the location by typing a new path on the **Installation Location** line. -6. On the initial **Create New Management Database** page, configure the **Microsoft SQL Server instance** and **Management Server database** by selecting the appropriate option below. +6. On the initial **Create New Management Database** page, configure the **Microsoft SQL Server instance** and **Management Server database** by selecting the appropriate option below. - - - - - - - - - - - - - - - - - - - - - -
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    -

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    -

    Not supported: A server name using the format ServerName\INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    -

    The database name must be unique, or the installation will fail.

    + + + + + + + + + + + + + + + + + + + + + +
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    +

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    +

    Not supported: A server name using the format ServerName<strong>INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    +

    The database name must be unique, or the installation will fail.

    -   + -7. On the **Configure** page, accept the default value **Use this local computer**. +7. On the **Configure** page, accept the default value **Use this local computer**. - **Note**   - If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. + **Note** + If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. -   + -8. On the initial **Create New Reporting Database** page, configure the **Microsoft SQL Server instance** and **Reporting Server database** by selecting the appropriate option below. +8. On the initial **Create New Reporting Database** page, configure the **Microsoft SQL Server instance** and **Reporting Server database** by selecting the appropriate option below. - - - - - - - - - - - - - - - - - - - - - -
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    -

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    -

    Not supported: A server name using the format ServerName\INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    -

    The database name must be unique, or the installation will fail.

    + + + + + + + + + + + + + + + + + + + + + +
    MethodWhat you need to do

    You are using a custom Microsoft SQL Server instance.

    Select Use the custom instance, and type the name of the instance.

    +

    Use the format INSTANCENAME. The assumed installation location is the local computer.

    +

    Not supported: A server name using the format ServerName<strong>INSTANCE.

    You are using a custom database name.

    Select Custom configuration and type the database name.

    +

    The database name must be unique, or the installation will fail.

    -   + -9. On the **Configure** page, accept the default value: **Use this local computer**. +9. On the **Configure** page, accept the default value: **Use this local computer**. - **Note**   - If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. + **Note** + If you are installing the Management server and Management database side by side, some options on this page are not available. In this case, the appropriate options are selected by default and cannot be changed. -   + 10. On the **Configure** (Management Server Configuration) page, specify the following: @@ -185,7 +185,7 @@ Use the following procedure to install the Microsoft Application Virtualization -   + 11. On the **Configure** **Publishing Server Configuration** page, specify the following: @@ -203,7 +203,7 @@ Use the following procedure to install the Microsoft Application Virtualization

    Specify the URL for the management service.

    -

    Example: http://localhost:12345

    +

    Example: http://localhost:12345

    Website name: Specify the custom name that will be used to run the publishing service.

    @@ -217,7 +217,7 @@ Use the following procedure to install the Microsoft Application Virtualization -   + 12. On the **Reporting Server** page, specify the following: @@ -245,7 +245,7 @@ Use the following procedure to install the Microsoft Application Virtualization -   + 13. To start the installation, click **Install** on the **Ready** page, and then click **Close** on the **Finished** page. @@ -268,9 +268,9 @@ Use the following procedure to install the Microsoft Application Virtualization [How to Deploy the App-V 5.1 Server Using a Script](how-to-deploy-the-app-v-51-server-using-a-script.md) -  + -  + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-51gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-51gb18030.md index 7c88dabe76..f89ee280f9 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-51gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-51gb18030.md @@ -21,36 +21,36 @@ Use the following procedure to install the Microsoft Application Virtualization **What to do before you start** -1. Review and install the software prerequisites: +1. Review and install the software prerequisites: - Install the prerequisite software that corresponds to the version of App-V that you are installing: + Install the prerequisite software that corresponds to the version of App-V that you are installing: - - [About App-V 5.1](about-app-v-51.md) + - [About App-V 5.1](about-app-v-51.md) - - [App-V 5.1 Prerequisites](app-v-51-prerequisites.md) + - [App-V 5.1 Prerequisites](app-v-51-prerequisites.md) -2. Review the client coexistence and unsupported scenarios, as applicable to your installation: +2. Review the client coexistence and unsupported scenarios, as applicable to your installation: - - - - - - - - - - - - - - - -

    Deploying coexisting App-V clients

    [Planning for the App-V 5.1 Sequencer and Client Deployment](planning-for-the-app-v-51-sequencer-and-client-deployment.md)

    Unsupported or limited installation scenarios

    See the client section in [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md)

    + + + + + + + + + + + + + + + +

    Deploying coexisting App-V clients

    Planning for the App-V 5.1 Sequencer and Client Deployment

    Unsupported or limited installation scenarios

    See the client section in App-V 5.1 Supported Configurations

    -   -3. Review the locations for client registry, log, and troubleshooting information: + +3. Review the locations for client registry, log, and troubleshooting information: @@ -76,9 +76,9 @@ Use the following procedure to install the Microsoft Application Virtualization

    Event logs / Applications and Services Logs / Microsoft / AppV

  • In App-V 5.0 SP3, some logs were consolidated and moved to the following location:

    Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

    -

    For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

  • +

    For a list of the moved logs, see About App-V 5.0 SP3.

  • Packages that are currently stored on computers that run the App-V 5.1 Client are saved to the following location:

    -

    C:\ProgramData\App-V\<package id>\<version id>

  • +

    C:\ProgramData\App-V&lt;package id>&lt;version id>

    @@ -88,7 +88,7 @@ Use the following procedure to install the Microsoft Application Virtualization
    -  + **To install the App-V 5.1 Client** @@ -117,7 +117,7 @@ Use the following procedure to install the Microsoft Application Virtualization -   + 2. Double-click the installation file, and click **Install**. Before the installation begins, the installer checks the computer for any missing [App-V 5.1 Prerequisites](app-v-51-prerequisites.md). @@ -133,151 +133,151 @@ Use the following procedure to install the Microsoft Application Virtualization - **language pack** - **Note**   + **Note** After the installation, only the .exe file can be uninstalled. -   + **To install the App-V 5.1 client using a script** -1. Install all of the required prerequisite software on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If you install the client by using an .msi file, the installation will fail if any prerequisites are missing. +1. Install all of the required prerequisite software on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If you install the client by using an .msi file, the installation will fail if any prerequisites are missing. -2. To use a script to install the App-V 5.1 client, use the following parameters with **appv\_client\_setup.exe**. +2. To use a script to install the App-V 5.1 client, use the following parameters with **appv\_client\_setup.exe**. - **Note**   - The client Windows Installer (.msi) supports the same set of switches, except for the **/LOG** parameter. + **Note** + The client Windows Installer (.msi) supports the same set of switches, except for the **/LOG** parameter. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    /INSTALLDIR

    Specifies the installation directory. Example usage: /INSTALLDIR=C:\Program Files\AppV Client

    /CEIPOPTIN

    Enables participation in the Customer Experience Improvement Program. Example usage: /CEIPOPTIN=[0|1]

    /MUOPTIN

    Enables Microsoft Update. Example usage: /MUOPTIN=[0|1]

    /PACKAGEINSTALLATIONROOT

    Specifies the directory in which to install all new applications and updates. Example usage: /PACKAGEINSTALLATIONROOT='C:\App-V Packages'

    /PACKAGESOURCEROOT

    Overrides the source location for downloading package content. Example usage: /PACKAGESOURCEROOT='http://packageStore'

    /AUTOLOAD

    Specifies how new packages will be loaded by App-V 5.1 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0].Example usage: /AUTOLOAD=[0|1|2]

    /SHAREDCONTENTSTOREMODE

    Specifies that streamed package contents will be not be saved to the local hard disk. Example usage: /SHAREDCONTENTSTOREMODE=[0|1]

    /MIGRATIONMODE

    Allows the App-V 5.1 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage: /MIGRATIONMODE=[0|1]

    /ENABLEPACKAGESCRIPTS

    Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage: /ENABLEPACKAGESCRIPTS=[0|1]

    /ROAMINGREGISTRYEXCLUSIONS

    Specifies the registry paths that will not roam with a user profile. Example usage: /ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients

    /ROAMINGFILEEXCLUSIONS

    Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /ROAMINGFILEEXCLUSIONS 'desktop;my pictures'

    /S[1-5]PUBLISHINGSERVERNAME

    Displays the name of the publishing server. Example usage: /S2PUBLISHINGSERVERNAME=MyPublishingServer

    /S[1-5]PUBLISHINGSERVERURL

    Displays the URL of the publishing server. Example usage: /S2PUBLISHINGSERVERURL=\pubserver

    /S[1-5]GLOBALREFRESHENABLED -

    Enables a global publishing refresh. Example usage: /S2GLOBALREFRESHENABLED=[0|1]

    /S[1-5]GLOBALREFRESHONLOGON

    Initiates a global publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

    /S[1-5]GLOBALREFRESHINTERVAL -

    Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

    /S[1-5]GLOBALREFRESHINTERVALUNIT

    Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2GLOBALREFRESHINTERVALUNIT=[0|1]

    /S[1-5]USERREFRESHENABLED

    Enables user publishing refresh. Example usage: /S2USERREFRESHENABLED=[0|1]

    /S[1-5]USERREFRESHONLOGON

    Initiates a user publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

    /S[1-5]USERREFRESHINTERVAL -

    Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

    /S[1-5]USERREFRESHINTERVALUNIT

    Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2USERREFRESHINTERVALUNIT=[0|1]

    /Log

    Specifies a location where the log information is saved. The default location is %Temp%. Example usage: /log C:\logs\log.log

    /q

    Specifies an unattended installation.

    /REPAIR

    Repairs a previous client installation.

    /NORESTART

    Prevents the computer from rebooting after the client installation.

    +

    The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.1 and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V.

    /UNINSTALL

    Uninstalls the client.

    /ACCEPTEULA

    Accepts the license agreement. This is required for an unattended installation. Example usage: /ACCEPTEULA or /ACCEPTEULA=1.

    /LAYOUT

    Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.1. No value is expected.

    /LAYOUTDIR

    Specifies the layout directory. Requires a string value. Example usage: /LAYOUTDIR=”C:\Application Virtualization Client”.

    /?, /h, /help

    Requests help about the previous installation parameters.

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    /INSTALLDIR

    Specifies the installation directory. Example usage: /INSTALLDIR=C:\Program Files\AppV Client

    /CEIPOPTIN

    Enables participation in the Customer Experience Improvement Program. Example usage: /CEIPOPTIN=[0|1]

    /MUOPTIN

    Enables Microsoft Update. Example usage: /MUOPTIN=[0|1]

    /PACKAGEINSTALLATIONROOT

    Specifies the directory in which to install all new applications and updates. Example usage: /PACKAGEINSTALLATIONROOT='C:\App-V Packages'

    /PACKAGESOURCEROOT

    Overrides the source location for downloading package content. Example usage: /PACKAGESOURCEROOT='http://packageStore'

    /AUTOLOAD

    Specifies how new packages will be loaded by App-V 5.1 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0].Example usage: /AUTOLOAD=[0|1|2]

    /SHAREDCONTENTSTOREMODE

    Specifies that streamed package contents will be not be saved to the local hard disk. Example usage: /SHAREDCONTENTSTOREMODE=[0|1]

    /MIGRATIONMODE

    Allows the App-V 5.1 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage: /MIGRATIONMODE=[0|1]

    /ENABLEPACKAGESCRIPTS

    Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage: /ENABLEPACKAGESCRIPTS=[0|1]

    /ROAMINGREGISTRYEXCLUSIONS

    Specifies the registry paths that will not roam with a user profile. Example usage: /ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients

    /ROAMINGFILEEXCLUSIONS

    Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /ROAMINGFILEEXCLUSIONS 'desktop;my pictures'

    /S[1-5]PUBLISHINGSERVERNAME

    Displays the name of the publishing server. Example usage: /S2PUBLISHINGSERVERNAME=MyPublishingServer

    /S[1-5]PUBLISHINGSERVERURL

    Displays the URL of the publishing server. Example usage: /S2PUBLISHINGSERVERURL=\\pubserver

    /S[1-5]GLOBALREFRESHENABLED -

    Enables a global publishing refresh. Example usage: /S2GLOBALREFRESHENABLED=[0|1]

    /S[1-5]GLOBALREFRESHONLOGON

    Initiates a global publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

    /S[1-5]GLOBALREFRESHINTERVAL -

    Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

    /S[1-5]GLOBALREFRESHINTERVALUNIT

    Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2GLOBALREFRESHINTERVALUNIT=[0|1]

    /S[1-5]USERREFRESHENABLED

    Enables user publishing refresh. Example usage: /S2USERREFRESHENABLED=[0|1]

    /S[1-5]USERREFRESHONLOGON

    Initiates a user publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

    /S[1-5]USERREFRESHINTERVAL -

    Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

    /S[1-5]USERREFRESHINTERVALUNIT

    Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2USERREFRESHINTERVALUNIT=[0|1]

    /Log

    Specifies a location where the log information is saved. The default location is %Temp%. Example usage: /log C:\logs\log.log

    /q

    Specifies an unattended installation.

    /REPAIR

    Repairs a previous client installation.

    /NORESTART

    Prevents the computer from rebooting after the client installation.

    -

    The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.1 and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V.

    /UNINSTALL

    Uninstalls the client.

    /ACCEPTEULA

    Accepts the license agreement. This is required for an unattended installation. Example usage: /ACCEPTEULA or /ACCEPTEULA=1.

    /LAYOUT

    Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.1. No value is expected.

    /LAYOUTDIR

    Specifies the layout directory. Requires a string value. Example usage: /LAYOUTDIR=”C:\Application Virtualization Client”.

    /?, /h, /help

    Requests help about the previous installation parameters.

    -   **To install the App-V 5.1 client by using the Windows Installer (.msi) file** @@ -314,7 +314,7 @@ Use the following procedure to install the Microsoft Application Virtualization -   + 4. Using the information in the following table, select the appropriate language pack **.msi** to install, based on the desired language for the target computer. The **xxxx** in the table refers to the target locale of the language pack. @@ -349,9 +349,11 @@ Use the following procedure to install the Microsoft Application Virtualization -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics @@ -362,9 +364,9 @@ Use the following procedure to install the Microsoft Application Virtualization [How to Uninstall the App-V 5.1 Client](how-to-uninstall-the-app-v-51-client.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md index 9db502712f..930cf3c6f7 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md @@ -33,30 +33,36 @@ Use the following procedure to install the Microsoft Application Virtualization 2. Review the client coexistence and unsupported scenarios, as applicable to your installation: - | | | - |---|---| - |Deploying coexisting App-V clients |[Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md) | - |Unsupported or limited installation scenarios |[App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md) | + + | | | + |-----------------------------------------------|----------------------------------------------------------------------------------------------------------------------------| + | Deploying coexisting App-V clients | [Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md) | + | Unsupported or limited installation scenarios | [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md) | + --- -   + 3. Review the locations for client registry, log, and troubleshooting information: - | | | - |---|---| - |Client registry information |
    • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

    • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

      C:\ProgramData\App-V

      However, you can reconfigure this location with the following registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

    | - |Client log files |
    • For log file information that is associated with the App-V 5.0 Client, search in the following log:

      Event logs/Applications and Services Logs/Microsoft/AppV

    • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

      Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

      For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

    • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

      C:\ProgramData\App-V\<_package id_>\<_version id_>

    | - |Client installation troubleshooting information |See the error log in the **%temp%** folder. To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. | + + | | | + |-------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| + | Client registry information |
    • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

    • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

      C:\ProgramData\App-V

      However, you can reconfigure this location with the following registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

    | + | Client log files |
    • For log file information that is associated with the App-V 5.0 Client, search in the following log:

      Event logs/Applications and Services Logs/Microsoft/AppV

    • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

      Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

      For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

    • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

      C:\ProgramData\App-V\<package id>\<version id>

    | + | Client installation troubleshooting information | See the error log in the **%temp%** folder. To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. | + --- - + **To install the App-V 5.0 Client** 1. Copy the App-V 5.0 client installation file to the computer on which it will be installed.

    Choose from the following client types: - |Client type |File to use | - |---|---| - |Standard version of the client |**appv_client_setup.exe** | - |Remote Desktop Services version of the client |**appv_client_setup_rds.exe** | + + | Client type | File to use | + |-----------------------------------------------|-------------------------------| + | Standard version of the client | **appv_client_setup.exe** | + | Remote Desktop Services version of the client | **appv_client_setup_rds.exe** | + --- 2. Double-click the installation file, and click **Install**. Before the installation begins, the installer checks the computer for any missing [App-V 5.0 Prerequisites](app-v-50-prerequisites.md). @@ -72,7 +78,7 @@ Use the following procedure to install the Microsoft Application Virtualization - **.msi** - **language pack** - + >[!NOTE] >After the installation, only the .exe file can be uninstalled. @@ -86,38 +92,39 @@ Use the following procedure to install the Microsoft Application Virtualization >[!NOTE] >The client Windows Installer (.msi) supports the same set of switches, except for the **/LOG** parameter. - | | | - |---|---| - |/INSTALLDIR |Specifies the installation directory. Example usage:

    **/INSTALLDIR=C:\Program Files\AppV Client** | - |/CEIPOPTIN |Enables participation in the Customer Experience Improvement Program. Example usage:

    **/CEIPOPTIN=[0\|1\]** | - |/MUOPTIN |Enables Microsoft Update. Example usage:

    **/MUOPTIN=[0\|1\]** | - |/PACKAGEINSTALLATIONROOT |Specifies the directory in which to install all new applications and updates. Example usage:

    **/PACKAGEINSTALLATIONROOT='C:\App-V Packages'** | - |/PACKAGESOURCEROOT |Overrides the source location for downloading package content. Example usage:

    **/PACKAGESOURCEROOT='http://packageStore'** | - |/AUTOLOAD |Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0]. Example usage:

    **/AUTOLOAD=[0\|1\|2\]** | - |/SHAREDCONTENTSTOREMODE |Specifies that streamed package contents will be not be saved to the local hard disk. Example usage:

    **/SHAREDCONTENTSTOREMODE=[0\|1\]** | - |/MIGRATIONMODE |Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage:

    **/MIGRATIONMODE=[0\|1\]** | - |/ENABLEPACKAGESCRIPTS |Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage:

    **/ENABLEPACKAGESCRIPTS=[0\|1\]** | - |/ROAMINGREGISTRYEXCLUSIONS |Specifies the registry paths that will not roam with a user profile. Example usage:

    **/ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients** | - |/ROAMINGFILEEXCLUSIONS |Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:

    **/ROAMINGFILEEXCLUSIONS 'desktop;my pictures'** | - |/S[1-5]PUBLISHINGSERVERNAME |Displays the name of the publishing server. Example usage:

    **/S2PUBLISHINGSERVERNAME=MyPublishingServer** | - |/S[1-5]PUBLISHINGSERVERURL |Displays the URL of the publishing server. Example usage:

    **/S2PUBLISHINGSERVERURL=\\pubserver** | - |/S[1-5]GLOBALREFRESHENABLED|Enables a global publishing refresh. Example usage:

    **/S2GLOBALREFRESHENABLED=[0\|1\]** | - |/S[1-5]GLOBALREFRESHONLOGON |Initiates a global publishing refresh when a user logs on. Example usage:

    **/S2LOGONREFRESH=[0\|1\]** | - |/S[1-5]GLOBALREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | - |/S[1-5]GLOBALREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

    **/S2GLOBALREFRESHINTERVALUNIT=[0\|1\]** | - |/S[1-5]USERREFRESHENABLED |Enables user publishing refresh. Example usage: **/S2USERREFRESHENABLED=[0\|1\]** | - |/S[1-5]USERREFRESHONLOGON |Initiates a user publishing refresh when a user logs on. Example usage:

    **/S2LOGONREFRESH=[0\|1\]** | - |/S[1-5]USERREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | - |/S[1-5]USERREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

    **/S2USERREFRESHINTERVALUNIT=[0\|1\]** | - |/Log |Specifies a location where the log information is saved. The default location is %Temp%. Example usage:

    **/log C:\logs\log.log** | - |/q |Specifies an unattended installation. | - |/REPAIR |Repairs a previous client installation. | - |/NORESTART |Prevents the computer from rebooting after the client installation.

    The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | - |/UNINSTALL |Uninstalls the client. | - |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

    **/ACCEPTEULA** or **/ACCEPTEULA=1** | - |/LAYOUT |Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected. | - |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

    **/LAYOUTDIR=”C:\Application Virtualization Client”** | - |/?, /h, /help |Requests help about the previous installation parameters. | + | | | + |----------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| + | /INSTALLDIR | Specifies the installation directory. Example usage:

    **/INSTALLDIR=C:\Program Files\AppV Client** | + | /CEIPOPTIN | Enables participation in the Customer Experience Improvement Program. Example usage:

    **/CEIPOPTIN=[0\|1\]** | + | /MUOPTIN | Enables Microsoft Update. Example usage:

    **/MUOPTIN=[0\|1\]** | + | /PACKAGEINSTALLATIONROOT | Specifies the directory in which to install all new applications and updates. Example usage:

    **/PACKAGEINSTALLATIONROOT='C:\App-V Packages'** | + | /PACKAGESOURCEROOT | Overrides the source location for downloading package content. Example usage:

    **/PACKAGESOURCEROOT=''** | + | /AUTOLOAD | Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0]. Example usage:

    **/AUTOLOAD=[0\|1\|2\]** | + | /SHAREDCONTENTSTOREMODE | Specifies that streamed package contents will be not be saved to the local hard disk. Example usage:

    **/SHAREDCONTENTSTOREMODE=[0\|1\]** | + | /MIGRATIONMODE | Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage:

    **/MIGRATIONMODE=[0\|1\]** | + | /ENABLEPACKAGESCRIPTS | Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage:

    **/ENABLEPACKAGESCRIPTS=[0\|1\]** | + | /ROAMINGREGISTRYEXCLUSIONS | Specifies the registry paths that will not roam with a user profile. Example usage:

    **/ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients** | + | /ROAMINGFILEEXCLUSIONS | Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:

    **/ROAMINGFILEEXCLUSIONS 'desktop;my pictures'** | + | /S[1-5]PUBLISHINGSERVERNAME | Displays the name of the publishing server. Example usage:

    **/S2PUBLISHINGSERVERNAME=MyPublishingServer** | + | /S[1-5]PUBLISHINGSERVERURL | Displays the URL of the publishing server. Example usage:

    **/S2PUBLISHINGSERVERURL=\\pubserver** | + | /S[1-5]GLOBALREFRESHENABLED | Enables a global publishing refresh. Example usage:

    **/S2GLOBALREFRESHENABLED=[0\|1\]** | + | /S[1-5]GLOBALREFRESHONLOGON | Initiates a global publishing refresh when a user logs on. Example usage:

    **/S2LOGONREFRESH=[0\|1\]** | + | /S[1-5]GLOBALREFRESHINTERVAL | Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | + | /S[1-5]GLOBALREFRESHINTERVALUNIT | Specifies the interval unit (Hours[0], Days[1]). Example usage:

    **/S2GLOBALREFRESHINTERVALUNIT=[0\|1\]** | + | /S[1-5]USERREFRESHENABLED | Enables user publishing refresh. Example usage: **/S2USERREFRESHENABLED=[0\|1\]** | + | /S[1-5]USERREFRESHONLOGON | Initiates a user publishing refresh when a user logs on. Example usage:

    **/S2LOGONREFRESH=[0\|1\]** | + | /S[1-5]USERREFRESHINTERVAL | Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | + | /S[1-5]USERREFRESHINTERVALUNIT | Specifies the interval unit (Hours[0], Days[1]). Example usage:

    **/S2USERREFRESHINTERVALUNIT=[0\|1\]** | + | /Log | Specifies a location where the log information is saved. The default location is %Temp%. Example usage:

    **/log C:\logs\log.log** | + | /q | Specifies an unattended installation. | + | /REPAIR | Repairs a previous client installation. | + | /NORESTART | Prevents the computer from rebooting after the client installation.

    The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | + | /UNINSTALL | Uninstalls the client. | + | /ACCEPTEULA | Accepts the license agreement. This is required for an unattended installation. Example usage:

    **/ACCEPTEULA** or **/ACCEPTEULA=1** | + | /LAYOUT | Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected. | + | /LAYOUTDIR | Specifies the layout directory. Requires a string value. Example usage:

    **/LAYOUTDIR=”C:\Application Virtualization Client”** | + | /?, /h, /help | Requests help about the previous installation parameters. | + --- **To install the App-V 5.0 client by using the Windows Installer (.msi) file** @@ -128,13 +135,15 @@ Use the following procedure to install the Microsoft Application Virtualization 3. Deploy one of the following Windows Installer files to the target computer. The file that you specify must match the configuration of the target computer. - |Type of deployment |Deploy this file | - |---|---| - |Computer is running a 32-bit Microsoft Windows operating system |appv_client_MSI_x86.msi | - |Computer is running a 64-bit Microsoft Windows operating system |appv_client_MSI_x64.msi | - |You are deploying the App-V 5.0 Remote Desktop Services client |appv_client_rds_MSI_x64.msi | + + | Type of deployment | Deploy this file | + |-----------------------------------------------------------------|-----------------------------| + | Computer is running a 32-bit Microsoft Windows operating system | appv_client_MSI_x86.msi | + | Computer is running a 64-bit Microsoft Windows operating system | appv_client_MSI_x64.msi | + | You are deploying the App-V 5.0 Remote Desktop Services client | appv_client_rds_MSI_x64.msi | + --- -  + 4. Using the information in the following table, select the appropriate language pack **.msi** to install, based on the desired language for the target computer. The **xxxx** in the table refers to the target locale of the language pack. **What to know before you start:** @@ -145,12 +154,13 @@ Use the following procedure to install the Microsoft Application Virtualization - To deploy additional language packs on a target computer, use the procedure **To install the App-V 5.0 client by using Windows Installer (.msi) file**. - |Type of deployment |Deploy this file | - |---|---| - |Computer is running a 32-bit Microsoft Windows operating system |appv_client_LP_xxxx_ x86.msi | - |Computer is running a 64-bit Microsoft Windows operating system |appv_client_LP_xxxx_ x64.msi | + | Type of deployment | Deploy this file | + |-----------------------------------------------------------------|------------------------------| + | Computer is running a 32-bit Microsoft Windows operating system | appv_client_LP_xxxx_ x86.msi | + | Computer is running a 64-bit Microsoft Windows operating system | appv_client_LP_xxxx_ x64.msi | + --- - + **Got a suggestion for App-V**? Add or vote on [suggestions](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).

    **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts.md b/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts.md index cfcbfcabbc..d203c1c67e 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts.md @@ -25,49 +25,50 @@ Use the following instructions to use SQL scripts, rather than the Windows Insta **How to install the App-V databases by using SQL scripts** -1. Before you install the database scripts, review and keep a copy of the App-V license terms. By running the database scripts, you are agreeing to the license terms. If you do not accept them, you should not use this software. +1. Before you install the database scripts, review and keep a copy of the App-V license terms. By running the database scripts, you are agreeing to the license terms. If you do not accept them, you should not use this software. -2. Copy the **appv\_server\_setup.exe** from the App-V release media to a temporary location. +2. Copy the **appv\_server\_setup.exe** from the App-V release media to a temporary location. -3. From a command prompt, run **appv\_server\_setup.exe** and specify a temporary location for extracting the database scripts. +3. From a command prompt, run **appv\_server\_setup.exe** and specify a temporary location for extracting the database scripts. - Example: appv\_server\_setup.exe /layout c:\\<temporary location path> + Example: appv\_server\_setup.exe /layout c:\\<temporary location path> -4. Browse to the temporary location that you created, open the extracted **DatabaseScripts** folder, and review the appropriate Readme.txt file for instructions: +4. Browse to the temporary location that you created, open the extracted **DatabaseScripts** folder, and review the appropriate Readme.txt file for instructions: - - - - - - - - - - - - - - - - - - - - - -
    DatabaseLocation of Readme.txt file to use

    Management database

    ManagementDatabase subfolder

    -
    - Important   -

    If you are upgrading to or installing the App-V 5.0 SP3 Management database, see [SQL scripts to install or upgrade the App-V 5.0 SP3 Management Server database fail](https://support.microsoft.com/kb/3031340).

    -
    -
    -   -

    Reporting database

    ReportingDatabase subfolder

    + + + + + + + + + + + + + + + + + + + + + +
    DatabaseLocation of Readme.txt file to use

    Management database

    ManagementDatabase subfolder

    +
    + Important

    If you are upgrading to or installing the App-V 5.0 SP3 Management database, see SQL scripts to install or upgrade the App-V 5.0 SP3 Management Server database fail.

    +
    +
    -   +

    Reporting database

    ReportingDatabase subfolder

    - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics @@ -76,9 +77,9 @@ Use the following instructions to use SQL scripts, rather than the Windows Insta [How to Deploy the App-V 5.0 Server](how-to-deploy-the-app-v-50-server-50sp3.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts51.md b/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts51.md index 4052c43fe4..c8faae6bae 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts51.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-databases-by-using-sql-scripts51.md @@ -23,10 +23,10 @@ Use the following instructions to use SQL scripts, rather than the Windows Insta - Upgrade the App-V databases to a later version -**Note**   +**Note** If you have already deployed the App-V 5.0 SP3 database, the SQL scripts are not required to upgrade to App-V 5.1. -  + **How to install the App-V databases by using SQL scripts** @@ -63,19 +63,21 @@ If you have already deployed the App-V 5.0 SP3 database, the SQL scripts are not -   - **Caution**   - The readme.txt file in the ManagementDatabase subfolder is out of date. The information in the updated readme files below is the most current and should supersede the readme information provided in the **DatabaseScripts** folders. -   +~~~ +**Caution** +The readme.txt file in the ManagementDatabase subfolder is out of date. The information in the updated readme files below is the most current and should supersede the readme information provided in the **DatabaseScripts** folders. - **Important**   - The InsertVersionInfo.sql script is not required for versions of the App-V management database later than App-V 5.0 SP3. - The Permissions.sql script should be updated according to **Step 2** in [KB article 3031340](https://support.microsoft.com/kb/3031340). **Step 1** is not required for versions of App-V later than App-V 5.0 SP3. -   +**Important** +The InsertVersionInfo.sql script is not required for versions of the App-V management database later than App-V 5.0 SP3. + +The Permissions.sql script should be updated according to **Step 2** in [KB article 3031340](https://support.microsoft.com/kb/3031340). **Step 1** is not required for versions of App-V later than App-V 5.0 SP3. +~~~ + + **Updated management database README file content** @@ -209,7 +211,7 @@ Steps to install "AppVReporting" schema in SQL SERVER. 2. Run the following scripts against the "AppVReporting" database using the same account as above in order. - + CreateTables.sql CreateReportingStoredProcs.sql CreateStoredProcs.sql @@ -229,9 +231,9 @@ Steps to install "AppVReporting" schema in SQL SERVER. [How to Deploy the App-V 5.1 Server](how-to-deploy-the-app-v-51-server.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md b/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md index a7d1c1b3f9..34ed292cca 100644 --- a/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md +++ b/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md @@ -21,76 +21,75 @@ Use the following procedure to configure the App-V 5.0 for reporting. **To configure the computer running the App-V 5.0 client for reporting** -1. Install the App-V 5.0 client. For more information about installing the client see [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md). +1. Install the App-V 5.0 client. For more information about installing the client see [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md). -2. After you have installed the App-V 5.0 client, use the **Set-AppvClientConfiguration** PowerShell to configure appropriate Reporting Configuration settings: +2. After you have installed the App-V 5.0 client, use the **Set-AppvClientConfiguration** PowerShell to configure appropriate Reporting Configuration settings: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, http://<reportingservername>:<reportingportnumber>.

    -
    - Note   -

    This is the port number that was assigned during the Reporting Server setup

    -
    -
    -   -

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, http://<reportingservername>:<reportingportnumber>.

    +
    + Note

    This is the port number that was assigned during the Reporting Server setup

    +
    +
    -   +

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    -3. After the appropriate settings have been configured, the computer running the App-V 5.0 client will automatically collect data and will send the data back to the reporting server. - Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** PowerShell cmdlet. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +3. After the appropriate settings have been configured, the computer running the App-V 5.0 client will automatically collect data and will send the data back to the reporting server. + + Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** PowerShell cmdlet. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md b/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md index 9782009db7..0bbe4ac487 100644 --- a/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md +++ b/mdop/appv-v5/how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md @@ -21,76 +21,75 @@ Use the following procedure to configure the App-V 5.1 for reporting. **To configure the computer running the App-V 5.1 client for reporting** -1. Install the App-V 5.1 client. For more information about installing the client see [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-51gb18030.md). +1. Install the App-V 5.1 client. For more information about installing the client see [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-51gb18030.md). -2. After you have installed the App-V 5.1 client, use the **Set-AppvClientConfiguration** PowerShell to configure appropriate Reporting Configuration settings: +2. After you have installed the App-V 5.1 client, use the **Set-AppvClientConfiguration** PowerShell to configure appropriate Reporting Configuration settings: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, http://<reportingservername>:<reportingportnumber>.

    -
    - Note   -

    This is the port number that was assigned during the Reporting Server setup

    -
    -
    -   -

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, http://<reportingservername>:<reportingportnumber>.

    +
    + Note

    This is the port number that was assigned during the Reporting Server setup

    +
    +
    -   +

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    -3. After the appropriate settings have been configured, the computer running the App-V 5.1 client will automatically collect data and will send the data back to the reporting server. - Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** PowerShell cmdlet. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +3. After the appropriate settings have been configured, the computer running the App-V 5.1 client will automatically collect data and will send the data back to the reporting server. + + Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** PowerShell cmdlet. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-app-v-50-client-for-shared-content-store-mode.md b/mdop/appv-v5/how-to-install-the-app-v-50-client-for-shared-content-store-mode.md index 1851109ac9..f4f3e227c2 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-50-client-for-shared-content-store-mode.md +++ b/mdop/appv-v5/how-to-install-the-app-v-50-client-for-shared-content-store-mode.md @@ -22,7 +22,7 @@ Use the following procedure to install the Microsoft Application Virtualization **Note**   Before performing this procedure if necessary uninstall any existing version of the App-V 5.0 client. -  + For more information about SCS mode, see [Shared Content Store in Microsoft App-V 5.0 – Behind the Scenes](https://go.microsoft.com/fwlink/?LinkId=316879) (https://go.microsoft.com/fwlink/?LinkId=316879). @@ -37,7 +37,7 @@ For more information about SCS mode, see [Shared Content Store in Microsoft App- **Important**   You must perform a silent installation or the installation will fail. -   + 2. After you have completed the installation you can deploy packages to the computer running the client and all package contents will be streamed across the network. @@ -48,9 +48,9 @@ For more information about SCS mode, see [Shared Content Store in Microsoft App- [Deploying the App-V 5.0 Sequencer and Client](deploying-the-app-v-50-sequencer-and-client.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-app-v-51-client-for-shared-content-store-mode.md b/mdop/appv-v5/how-to-install-the-app-v-51-client-for-shared-content-store-mode.md index 94f6a92aa3..25741ffb48 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-51-client-for-shared-content-store-mode.md +++ b/mdop/appv-v5/how-to-install-the-app-v-51-client-for-shared-content-store-mode.md @@ -22,7 +22,7 @@ Use the following procedure to install the Microsoft Application Virtualization **Note**   Before performing this procedure if necessary uninstall any existing version of the App-V 5.1 client. -  + For more information about SCS mode, see [Shared Content Store in Microsoft App-V 5.0 – Behind the Scenes](https://go.microsoft.com/fwlink/?LinkId=316879) (https://go.microsoft.com/fwlink/?LinkId=316879). @@ -37,7 +37,7 @@ For more information about SCS mode, see [Shared Content Store in Microsoft App- **Important**   You must perform a silent installation or the installation will fail. -   + 2. After you have completed the installation you can deploy packages to the computer running the client and all package contents will be streamed across the network. @@ -48,9 +48,9 @@ For more information about SCS mode, see [Shared Content Store in Microsoft App- [Deploying the App-V 5.1 Sequencer and Client](deploying-the-app-v-51-sequencer-and-client.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md index 5f45f87b8f..e0ab454188 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md +++ b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md @@ -37,357 +37,357 @@ Before attempting this procedure, you should read and understand the information **To convert any number of Active Directory Domain Services (AD DS) user or machine accounts into formatted Security Identifiers (SIDs)** -1. Copy the following script into a text editor and save it as a PowerShell script file, for example **ConvertToSIDs.ps1**. +1. Copy the following script into a text editor and save it as a PowerShell script file, for example **ConvertToSIDs.ps1**. -2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. +2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. - ``` syntax - <# - ``` + ``` syntax + <# + ``` - ``` syntax - .SYNOPSIS - ``` + ``` syntax + .SYNOPSIS + ``` - ``` syntax - This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. - ``` + ``` syntax + This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. + ``` - ``` syntax - .DESCRIPTION - ``` + ``` syntax + .DESCRIPTION + ``` - ``` syntax - This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. - ``` + ``` syntax + This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. + ``` - ``` syntax - .INPUTS - ``` + ``` syntax + .INPUTS + ``` - ``` syntax - The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. - ``` + ``` syntax + The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. + ``` - ``` syntax - .OUTPUTS - ``` + ``` syntax + .OUTPUTS + ``` - ``` syntax - A list of account names with the corresponding SID in standard and hexadecimal formats - ``` + ``` syntax + A list of account names with the corresponding SID in standard and hexadecimal formats + ``` - ``` syntax - .EXAMPLE - ``` + ``` syntax + .EXAMPLE + ``` - ``` syntax - .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List - ``` + ``` syntax + .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List + ``` - ``` syntax - .EXAMPLE - ``` + ``` syntax + .EXAMPLE + ``` - ``` syntax - $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") - ``` + ``` syntax + $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") + ``` - ``` syntax - .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 - ``` + ``` syntax + .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 + ``` - ``` syntax -#> - ``` + ``` syntax + #> + ``` - ``` syntax - ``` + ``` syntax + ``` - []() + []() - []() + []() - ``` syntax - function ConvertSIDToHexFormat - ``` + ``` syntax + function ConvertSIDToHexFormat + ``` - { + { -    param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) + param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) - ``` syntax - ``` + ``` syntax + ``` - ``` syntax -    $sb = New-Object System.Text.StringBuilder - ``` + ``` syntax + $sb = New-Object System.Text.StringBuilder + ``` - ``` syntax -     [int] $binLength = $sidToConvert.BinaryLength - ``` + ``` syntax + [int] $binLength = $sidToConvert.BinaryLength + ``` - ``` syntax -     [Byte[]] $byteArray = New-Object Byte[] $binLength - ``` + ``` syntax + [Byte[]] $byteArray = New-Object Byte[] $binLength + ``` - ``` syntax -    $sidToConvert.GetBinaryForm($byteArray, 0) - ``` + ``` syntax + $sidToConvert.GetBinaryForm($byteArray, 0) + ``` - ``` syntax -    foreach($byte in $byteArray) - ``` + ``` syntax + foreach($byte in $byteArray) + ``` - ``` syntax -    { - ``` + ``` syntax + { + ``` - ``` syntax -    $sb.Append($byte.ToString("X2")) |Out-Null - ``` + ``` syntax + $sb.Append($byte.ToString("X2")) |Out-Null + ``` - ``` syntax -    } - ``` + ``` syntax + } + ``` - ``` syntax -    return $sb.ToString() - ``` + ``` syntax + return $sb.ToString() + ``` - ``` syntax - } - ``` + ``` syntax + } + ``` - ``` syntax - [string[]]$myArgs = $args - ``` + ``` syntax + [string[]]$myArgs = $args + ``` - ``` syntax - if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) - ``` + ``` syntax + if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) + ``` - { + { - ``` syntax - [string]::Format("{0}====== Description ======{0}{0}" + - ``` + ``` syntax + [string]::Format("{0}====== Description ======{0}{0}" + + ``` - ``` syntax - "  Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + - ``` + ``` syntax + " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + + ``` - ``` syntax -                "  Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + - ``` + ``` syntax + " Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + + ``` - ``` syntax -                "  The output is written to the console in the format 'Account name    SID as string   SID as hexadecimal'{0}" + - ``` + ``` syntax + " The output is written to the console in the format 'Account name SID as string SID as hexadecimal'{0}" + + ``` - ``` syntax -                "  And can be written out to a file using standard PowerShell redirection{0}" + - ``` + ``` syntax + " And can be written out to a file using standard PowerShell redirection{0}" + + ``` - ``` syntax -                "  Please specify user accounts in the format 'DOMAIN\username'{0}" + - ``` + ``` syntax + " Please specify user accounts in the format 'DOMAIN\username'{0}" + + ``` - ``` syntax -                "  Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + - ``` + ``` syntax + " Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + + ``` - ``` syntax -                "  For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + - ``` + ``` syntax + " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + + ``` - ``` syntax -                "{0}====== Arguments ======{0}" + - ``` + ``` syntax + "{0}====== Arguments ======{0}" + + ``` - ``` syntax -                "{0}  /?    Show this help message", [Environment]::NewLine) - ``` + ``` syntax + "{0} /? Show this help message", [Environment]::NewLine) + ``` - ``` syntax - { - ``` + ``` syntax + { + ``` - ``` syntax - else - ``` + ``` syntax + else + ``` - ``` syntax - {  -     #If an array was passed in, try to split it - ``` + ``` syntax + { + #If an array was passed in, try to split it + ``` - ``` syntax -     if($myArgs.Length -eq 1) - ``` + ``` syntax + if($myArgs.Length -eq 1) + ``` - ``` syntax -     { - ``` + ``` syntax + { + ``` - ``` syntax -         $myArgs = $myArgs.Split(' ') - ``` + ``` syntax + $myArgs = $myArgs.Split(' ') + ``` - ``` syntax -     } - ``` + ``` syntax + } + ``` - ``` syntax + ``` syntax -     #Parse the arguments for account names - ``` + #Parse the arguments for account names + ``` - ``` syntax -     foreach($accountName in $myArgs) - ``` + ``` syntax + foreach($accountName in $myArgs) + ``` - ``` syntax -     {    - ``` + ``` syntax + { + ``` - ``` syntax -         [string[]] $splitString = $accountName.Split('\')  # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject - ``` + ``` syntax + [string[]] $splitString = $accountName.Split('\') # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject + ``` - ``` syntax -         if($splitString.Length -ne 2) - ``` + ``` syntax + if($splitString.Length -ne 2) + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) - ``` + ``` syntax + $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) + ``` - ``` syntax -             Write-Error -Message $message - ``` + ``` syntax + Write-Error -Message $message + ``` - ``` syntax -             continue - ``` + ``` syntax + continue + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax -         - ``` + ``` syntax + + ``` - ``` syntax -         #Convert any account names to SIDs - ``` + ``` syntax + #Convert any account names to SIDs + ``` - ``` syntax -         try - ``` + ``` syntax + try + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) - ``` + ``` syntax + [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) + ``` - ``` syntax -             [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) - ``` + ``` syntax + [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax -         catch [System.Security.Principal.IdentityNotMappedException] - ``` + ``` syntax + catch [System.Security.Principal.IdentityNotMappedException] + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) - ``` + ``` syntax + $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) + ``` - ``` syntax -             Write-Error -Message $message - ``` + ``` syntax + Write-Error -Message $message + ``` - ``` syntax -             continue - ``` + ``` syntax + continue + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax + ``` syntax -         #Convert regular SID to binary format used by SQL - ``` + #Convert regular SID to binary format used by SQL + ``` - ``` syntax -         $hexSIDString = ConvertSIDToHexFormat $SID - ``` + ``` syntax + $hexSIDString = ConvertSIDToHexFormat $SID + ``` - ``` syntax -         -         $SIDs = New-Object PSObject - ``` + ``` syntax + + $SIDs = New-Object PSObject + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty Account $accountName - ``` + ``` syntax + $SIDs | Add-Member NoteProperty Account $accountName + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty SID $SID.ToString() - ``` + ``` syntax + $SIDs | Add-Member NoteProperty SID $SID.ToString() + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString - ``` + ``` syntax + $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString + ``` - ``` syntax + ``` syntax -         Write-Output $SIDs - ``` + Write-Output $SIDs + ``` - ``` syntax -     } - ``` + ``` syntax + } + ``` - ``` syntax - } - ``` + ``` syntax + } + ``` -3. Run the script you saved in step one of this procedure passing the accounts to convert as arguments. +3. Run the script you saved in step one of this procedure passing the accounts to convert as arguments. - For example, + For example, - **.\\ConvertToSID.ps1 DOMAIN\\user\_account1 DOMAIN\\machine\_account1$ DOMAIN\\user\_account2 | Format-List” or “$accountsArray = @("DOMAIN\\user\_account1", "DOMAIN\\machine\_account1$", "DOMAIN\_user\_account2")** + **.\\ConvertToSID.ps1 DOMAIN\\user\_account1 DOMAIN\\machine\_account1$ DOMAIN\\user\_account2 | Format-List” or “$accountsArray = @("DOMAIN\\user\_account1", "DOMAIN\\machine\_account1$", "DOMAIN\_user\_account2")** - **.\\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\\SIDs.txt -Width 200”** + **.\\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\\SIDs.txt -Width 200”** - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md index 5377e6c956..d40e38cbd7 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md +++ b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md @@ -37,357 +37,357 @@ Before attempting this procedure, you should read and understand the information **To convert any number of Active Directory Domain Services (AD DS) user or machine accounts into formatted Security Identifiers (SIDs)** -1. Copy the following script into a text editor and save it as a PowerShell script file, for example **ConvertToSIDs.ps1**. +1. Copy the following script into a text editor and save it as a PowerShell script file, for example **ConvertToSIDs.ps1**. -2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. +2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. - ``` syntax - <# - ``` + ``` syntax + <# + ``` - ``` syntax - .SYNOPSIS - ``` + ``` syntax + .SYNOPSIS + ``` - ``` syntax - This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. - ``` + ``` syntax + This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. + ``` - ``` syntax - .DESCRIPTION - ``` + ``` syntax + .DESCRIPTION + ``` - ``` syntax - This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. - ``` + ``` syntax + This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. + ``` - ``` syntax - .INPUTS - ``` + ``` syntax + .INPUTS + ``` - ``` syntax - The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. - ``` + ``` syntax + The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. + ``` - ``` syntax - .OUTPUTS - ``` + ``` syntax + .OUTPUTS + ``` - ``` syntax - A list of account names with the corresponding SID in standard and hexadecimal formats - ``` + ``` syntax + A list of account names with the corresponding SID in standard and hexadecimal formats + ``` - ``` syntax - .EXAMPLE - ``` + ``` syntax + .EXAMPLE + ``` - ``` syntax - .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List - ``` + ``` syntax + .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List + ``` - ``` syntax - .EXAMPLE - ``` + ``` syntax + .EXAMPLE + ``` - ``` syntax - $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") - ``` + ``` syntax + $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") + ``` - ``` syntax - .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 - ``` + ``` syntax + .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 + ``` - ``` syntax -#> - ``` + ``` syntax + #> + ``` - ``` syntax - ``` + ``` syntax + ``` - []() + []() - []() + []() - ``` syntax - function ConvertSIDToHexFormat - ``` + ``` syntax + function ConvertSIDToHexFormat + ``` - { + { -    param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) + param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) - ``` syntax - ``` + ``` syntax + ``` - ``` syntax -    $sb = New-Object System.Text.StringBuilder - ``` + ``` syntax + $sb = New-Object System.Text.StringBuilder + ``` - ``` syntax -     [int] $binLength = $sidToConvert.BinaryLength - ``` + ``` syntax + [int] $binLength = $sidToConvert.BinaryLength + ``` - ``` syntax -     [Byte[]] $byteArray = New-Object Byte[] $binLength - ``` + ``` syntax + [Byte[]] $byteArray = New-Object Byte[] $binLength + ``` - ``` syntax -    $sidToConvert.GetBinaryForm($byteArray, 0) - ``` + ``` syntax + $sidToConvert.GetBinaryForm($byteArray, 0) + ``` - ``` syntax -    foreach($byte in $byteArray) - ``` + ``` syntax + foreach($byte in $byteArray) + ``` - ``` syntax -    { - ``` + ``` syntax + { + ``` - ``` syntax -    $sb.Append($byte.ToString("X2")) |Out-Null - ``` + ``` syntax + $sb.Append($byte.ToString("X2")) |Out-Null + ``` - ``` syntax -    } - ``` + ``` syntax + } + ``` - ``` syntax -    return $sb.ToString() - ``` + ``` syntax + return $sb.ToString() + ``` - ``` syntax - } - ``` + ``` syntax + } + ``` - ``` syntax - [string[]]$myArgs = $args - ``` + ``` syntax + [string[]]$myArgs = $args + ``` - ``` syntax - if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) - ``` + ``` syntax + if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) + ``` - { + { - ``` syntax - [string]::Format("{0}====== Description ======{0}{0}" + - ``` + ``` syntax + [string]::Format("{0}====== Description ======{0}{0}" + + ``` - ``` syntax - "  Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + - ``` + ``` syntax + " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + + ``` - ``` syntax -                "  Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + - ``` + ``` syntax + " Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + + ``` - ``` syntax -                "  The output is written to the console in the format 'Account name    SID as string   SID as hexadecimal'{0}" + - ``` + ``` syntax + " The output is written to the console in the format 'Account name SID as string SID as hexadecimal'{0}" + + ``` - ``` syntax -                "  And can be written out to a file using standard PowerShell redirection{0}" + - ``` + ``` syntax + " And can be written out to a file using standard PowerShell redirection{0}" + + ``` - ``` syntax -                "  Please specify user accounts in the format 'DOMAIN\username'{0}" + - ``` + ``` syntax + " Please specify user accounts in the format 'DOMAIN\username'{0}" + + ``` - ``` syntax -                "  Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + - ``` + ``` syntax + " Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + + ``` - ``` syntax -                "  For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + - ``` + ``` syntax + " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + + ``` - ``` syntax -                "{0}====== Arguments ======{0}" + - ``` + ``` syntax + "{0}====== Arguments ======{0}" + + ``` - ``` syntax -                "{0}  /?    Show this help message", [Environment]::NewLine) - ``` + ``` syntax + "{0} /? Show this help message", [Environment]::NewLine) + ``` - ``` syntax - { - ``` + ``` syntax + { + ``` - ``` syntax - else - ``` + ``` syntax + else + ``` - ``` syntax - {  -     #If an array was passed in, try to split it - ``` + ``` syntax + { + #If an array was passed in, try to split it + ``` - ``` syntax -     if($myArgs.Length -eq 1) - ``` + ``` syntax + if($myArgs.Length -eq 1) + ``` - ``` syntax -     { - ``` + ``` syntax + { + ``` - ``` syntax -         $myArgs = $myArgs.Split(' ') - ``` + ``` syntax + $myArgs = $myArgs.Split(' ') + ``` - ``` syntax -     } - ``` + ``` syntax + } + ``` - ``` syntax + ``` syntax -     #Parse the arguments for account names - ``` + #Parse the arguments for account names + ``` - ``` syntax -     foreach($accountName in $myArgs) - ``` + ``` syntax + foreach($accountName in $myArgs) + ``` - ``` syntax -     {    - ``` + ``` syntax + { + ``` - ``` syntax -         [string[]] $splitString = $accountName.Split('\')  # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject - ``` + ``` syntax + [string[]] $splitString = $accountName.Split('\') # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject + ``` - ``` syntax -         if($splitString.Length -ne 2) - ``` + ``` syntax + if($splitString.Length -ne 2) + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) - ``` + ``` syntax + $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) + ``` - ``` syntax -             Write-Error -Message $message - ``` + ``` syntax + Write-Error -Message $message + ``` - ``` syntax -             continue - ``` + ``` syntax + continue + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax -         - ``` + ``` syntax + + ``` - ``` syntax -         #Convert any account names to SIDs - ``` + ``` syntax + #Convert any account names to SIDs + ``` - ``` syntax -         try - ``` + ``` syntax + try + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) - ``` + ``` syntax + [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) + ``` - ``` syntax -             [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) - ``` + ``` syntax + [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax -         catch [System.Security.Principal.IdentityNotMappedException] - ``` + ``` syntax + catch [System.Security.Principal.IdentityNotMappedException] + ``` - ``` syntax -         { - ``` + ``` syntax + { + ``` - ``` syntax -             $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) - ``` + ``` syntax + $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) + ``` - ``` syntax -             Write-Error -Message $message - ``` + ``` syntax + Write-Error -Message $message + ``` - ``` syntax -             continue - ``` + ``` syntax + continue + ``` - ``` syntax -         } - ``` + ``` syntax + } + ``` - ``` syntax + ``` syntax -         #Convert regular SID to binary format used by SQL - ``` + #Convert regular SID to binary format used by SQL + ``` - ``` syntax -         $hexSIDString = ConvertSIDToHexFormat $SID - ``` + ``` syntax + $hexSIDString = ConvertSIDToHexFormat $SID + ``` - ``` syntax -         -         $SIDs = New-Object PSObject - ``` + ``` syntax + + $SIDs = New-Object PSObject + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty Account $accountName - ``` + ``` syntax + $SIDs | Add-Member NoteProperty Account $accountName + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty SID $SID.ToString() - ``` + ``` syntax + $SIDs | Add-Member NoteProperty SID $SID.ToString() + ``` - ``` syntax -         $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString - ``` + ``` syntax + $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString + ``` - ``` syntax + ``` syntax -         Write-Output $SIDs - ``` + Write-Output $SIDs + ``` - ``` syntax -     } - ``` + ``` syntax + } + ``` - ``` syntax - } - ``` + ``` syntax + } + ``` -3. Run the script you saved in step one of this procedure passing the accounts to convert as arguments. +3. Run the script you saved in step one of this procedure passing the accounts to convert as arguments. - For example, + For example, - **.\\ConvertToSID.ps1 DOMAIN\\user\_account1 DOMAIN\\machine\_account1$ DOMAIN\\user\_account2 | Format-List” or “$accountsArray = @("DOMAIN\\user\_account1", "DOMAIN\\machine\_account1$", "DOMAIN\_user\_account2")** + **.\\ConvertToSID.ps1 DOMAIN\\user\_account1 DOMAIN\\machine\_account1$ DOMAIN\\user\_account2 | Format-List” or “$accountsArray = @("DOMAIN\\user\_account1", "DOMAIN\\machine\_account1$", "DOMAIN\_user\_account2")** - **.\\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\\SIDs.txt -Width 200”** + **.\\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\\SIDs.txt -Width 200”** - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services.md b/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services.md index 49ee4acb8b..dd19ea6161 100644 --- a/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services.md +++ b/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to install the database server and management server on different computers. The computer you plan to install the database server on must be running a supported version of Microsoft SQL or the installation will fail. -**Note**   +**Note** After you complete the deployment, the **Microsoft SQL Server name**, **instance name** and **database name** will be required by the administrator installing the service to be able to connect to these databases. -  + **To install the management database and the management server on separate computers** @@ -44,14 +44,16 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 7. On the next **Create New Management Server Database** page, select **Use a remote computer**, and type the remote machine account using the following format: **Domain\\MachineAccount**. - **Note**   + **Note** If you plan to deploy the management server on the same computer you must select **Use this local computer**. -   - Specify the user name for the management server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. -8. To start the installation, click **Install**. +~~~ +Specify the user name for the management server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. +~~~ + +8. To start the installation, click **Install**. **To install the reporting database and the reporting server on separate computers** @@ -73,14 +75,16 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 7. On the next **Create New Reporting Server Database** page, select **Use a remote computer**, and type the remote machine account using the following format: **Domain\\MachineAccount**. - **Note**   + **Note** If you plan to deploy the reporting server on the same computer you must select **Use this local computer**. -   - Specify the user name for the reporting server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. -8. To start the installation, click **Install**. +~~~ +Specify the user name for the reporting server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. +~~~ + +8. To start the installation, click **Install**. **To install the management and reporting databases using App-V 5.0 database scripts** @@ -98,10 +102,10 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 4. For each database, copy the scripts to a share and modify them following the instructions in the readme file. - **Note**   + **Note** For more information about modifying the required SIDs contained in the scripts see, [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell](how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md). -   + 5. Run the scripts on the computer running Microsoft SQL Server. @@ -112,9 +116,9 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance [Deploying App-V 5.0](deploying-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services51.md b/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services51.md index e888c02cc4..77c7a3fd6a 100644 --- a/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services51.md +++ b/mdop/appv-v5/how-to-install-the-management-and-reporting-databases-on-separate-computers-from-the-management-and-reporting-services51.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to install the database server and management server on different computers. The computer you plan to install the database server on must be running a supported version of Microsoft SQL or the installation will fail. -**Note**   +**Note** After you complete the deployment, the **Microsoft SQL Server name**, **instance name** and **database name** will be required by the administrator installing the service to be able to connect to these databases. -  + **To install the management database and the management server on separate computers** @@ -44,14 +44,16 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 7. On the next **Create New Management Server Database** page, select **Use a remote computer**, and type the remote machine account using the following format: **Domain\\MachineAccount**. - **Note**   + **Note** If you plan to deploy the management server on the same computer you must select **Use this local computer**. -   - Specify the user name for the management server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. -8. To start the installation, click **Install**. +~~~ +Specify the user name for the management server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. +~~~ + +8. To start the installation, click **Install**. **To install the reporting database and the reporting server on separate computers** @@ -73,14 +75,16 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 7. On the next **Create New Reporting Server Database** page, select **Use a remote computer**, and type the remote machine account using the following format: **Domain\\MachineAccount**. - **Note**   + **Note** If you plan to deploy the reporting server on the same computer you must select **Use this local computer**. -   - Specify the user name for the reporting server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. -8. To start the installation, click **Install**. +~~~ +Specify the user name for the reporting server **Install Administrator** using the following format: **Domain\\AdministratorLoginName**. Click **Next**. +~~~ + +8. To start the installation, click **Install**. **To install the management and reporting databases using App-V 5.1 database scripts** @@ -98,10 +102,10 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance 4. For each database, copy the scripts to a share and modify them following the instructions in the readme file. - **Note**   + **Note** For more information about modifying the required SIDs contained in the scripts see, [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell](how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md). -   + 5. Run the scripts on the computer running Microsoft SQL Server. @@ -112,9 +116,9 @@ After you complete the deployment, the **Microsoft SQL Server name**, **instance [Deploying App-V 5.1](deploying-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database.md b/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database.md index b0f617583f..05a849b30c 100644 --- a/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database.md +++ b/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database.md @@ -33,33 +33,35 @@ Use the following procedure to install the management server on a standalone com 6. On the **Configure Existing Management Database** page, select **Use a remote SQL Server**, and type the machine name of the computer running Microsoft SQL SQL, for example **SqlServerMachine**. - **Note**   + **Note** If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. -   - For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. - Specify the **SQL Server Database name** that this management server will use, for example **AppvManagement**. +~~~ +For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. -7. On the **Configure Management Server Configuration** page, specify the AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation +Specify the **SQL Server Database name** that this management server will use, for example **AppvManagement**. +~~~ - Specify the **Website Name** that you want to use for the management service. Accept the default if you do not have a custom name. For the **Port Binding**, specify a unique port number to be used, for example **12345**. +7. On the **Configure Management Server Configuration** page, specify the AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation -8. Click **Install**. + Specify the **Website Name** that you want to use for the management service. Accept the default if you do not have a custom name. For the **Port Binding**, specify a unique port number to be used, for example **12345**. -9. To confirm that the setup has completed successfully, open a web browser, and type the following URL: http://managementserver:portnumber/Console.html if the installation was successful you should see the **Silverlight Management Console** appear without any error messages or warnings being displayed. +8. Click **Install**. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +9. To confirm that the setup has completed successfully, open a web browser, and type the following URL: http://managementserver:portnumber/Console.html if the installation was successful you should see the **Silverlight Management Console** appear without any error messages or warnings being displayed. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Deploying App-V 5.0](deploying-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database51.md b/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database51.md index 076de936c5..988a91b3ff 100644 --- a/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database51.md +++ b/mdop/appv-v5/how-to-install-the-management-server-on-a-standalone-computer-and-connect-it-to-the-database51.md @@ -33,33 +33,35 @@ Use the following procedure to install the management server on a standalone com 6. On the **Configure Existing Management Database** page, select **Use a remote SQL Server**, and type the machine name of the computer running Microsoft SQL SQL, for example **SqlServerMachine**. - **Note**   + **Note** If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. -   - For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. - Specify the **SQL Server Database name** that this management server will use, for example **AppvManagement**. +~~~ +For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. -7. On the **Configure Management Server Configuration** page, specify the AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation +Specify the **SQL Server Database name** that this management server will use, for example **AppvManagement**. +~~~ - Specify the **Website Name** that you want to use for the management service. Accept the default if you do not have a custom name. For the **Port Binding**, specify a unique port number to be used, for example **12345**. +7. On the **Configure Management Server Configuration** page, specify the AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation -8. Click **Install**. + Specify the **Website Name** that you want to use for the management service. Accept the default if you do not have a custom name. For the **Port Binding**, specify a unique port number to be used, for example **12345**. -9. To confirm that the setup has completed successfully, open a web browser, and type the following URL: http://managementserver:portnumber/Console. If the installation was successful, you should see the **Management Console** appear without any error messages or warnings being displayed. +8. Click **Install**. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +9. To confirm that the setup has completed successfully, open a web browser, and type the following URL: http://managementserver:portnumber/Console. If the installation was successful, you should see the **Management Console** appear without any error messages or warnings being displayed. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Deploying App-V 5.1](deploying-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer.md b/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer.md index 8946b62adc..22a42e002d 100644 --- a/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer.md +++ b/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer.md @@ -21,62 +21,62 @@ Use the following procedure to install the publishing server on a separate compu **To install the publishing server on a separate computer** -1. Copy the App-V 5.0 server installation files to the computer on which you want to install it on. To start the App-V 5.0 server installation right-click and run **appv\_server\_setup.exe** as an administrator. Click **Install**. +1. Copy the App-V 5.0 server installation files to the computer on which you want to install it on. To start the App-V 5.0 server installation right-click and run **appv\_server\_setup.exe** as an administrator. Click **Install**. -2. On the **Getting Started** page, review and accept the license terms, and click **Next**. +2. On the **Getting Started** page, review and accept the license terms, and click **Next**. -3. On the **Use Microsoft Update to help keep your computer secure and up-to-date** page, to enable Microsoft updates, select **Use Microsoft Update when I check for updates (recommended).** To disable Microsoft updates, select **I don’t want to use Microsoft Update**. Click **Next**. +3. On the **Use Microsoft Update to help keep your computer secure and up-to-date** page, to enable Microsoft updates, select **Use Microsoft Update when I check for updates (recommended).** To disable Microsoft updates, select **I don’t want to use Microsoft Update**. Click **Next**. -4. On the **Feature Selection** page, select the **Publishing Server** checkbox and click **Next**. +4. On the **Feature Selection** page, select the **Publishing Server** checkbox and click **Next**. -5. On the **Installation Location** page, accept the default location and click **Next**. +5. On the **Installation Location** page, accept the default location and click **Next**. -6. On the **Configure Publishing Server Configuration** page, specify the following items: +6. On the **Configure Publishing Server Configuration** page, specify the following items: - - The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. + - The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. - - Specify the website name that you want to use for the publishing service. Accept the default if you do not have a custom name. + - Specify the website name that you want to use for the publishing service. Accept the default if you do not have a custom name. - - For the **Port Binding**, specify a unique port number that will be used by App-V 5.0, for example **54321**. + - For the **Port Binding**, specify a unique port number that will be used by App-V 5.0, for example **54321**. -7. On the **Ready to Install** page, click **Install**. +7. On the **Ready to Install** page, click **Install**. -8. After the installation is complete, the publishing server must be registered with the management server. In the App-V 5.0 management console, use the following steps to register the server: +8. After the installation is complete, the publishing server must be registered with the management server. In the App-V 5.0 management console, use the following steps to register the server: - 1. Open the App-V 5.0 management server console. + 1. Open the App-V 5.0 management server console. - 2. In the left pane, select **Servers**, and then select **Register New Server**. + 2. In the left pane, select **Servers**, and then select **Register New Server**. - 3. Type the name of this server and a description (if required) and click **Add**. + 3. Type the name of this server and a description (if required) and click **Add**. -9. To verify if the publishing server is running correctly, you should import a package to the management server, entitle the package to an AD group, and publish the package. Using an internet browser, open the following URL: **http://publishingserver:pubport**. If the server is running correctly information similar to the following will be displayed: +9. To verify if the publishing server is running correctly, you should import a package to the management server, entitle the package to an AD group, and publish the package. Using an internet browser, open the following URL: http://publishingserver:pubport. If the server is running correctly information similar to the following will be displayed: - `` + `` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - `` + `` - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Deploying App-V 5.0](deploying-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer51.md b/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer51.md index c5da2723e4..b304366dd1 100644 --- a/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer51.md +++ b/mdop/appv-v5/how-to-install-the-publishing-server-on-a-remote-computer51.md @@ -21,62 +21,62 @@ Use the following procedure to install the publishing server on a separate compu **To install the publishing server on a separate computer** -1. Copy the App-V 5.1 server installation files to the computer on which you want to install it on. To start the App-V 5.1 server installation right-click and run **appv\_server\_setup.exe** as an administrator. Click **Install**. +1. Copy the App-V 5.1 server installation files to the computer on which you want to install it on. To start the App-V 5.1 server installation right-click and run **appv\_server\_setup.exe** as an administrator. Click **Install**. -2. On the **Getting Started** page, review and accept the license terms, and click **Next**. +2. On the **Getting Started** page, review and accept the license terms, and click **Next**. -3. On the **Use Microsoft Update to help keep your computer secure and up-to-date** page, to enable Microsoft updates, select **Use Microsoft Update when I check for updates (recommended).** To disable Microsoft updates, select **I don’t want to use Microsoft Update**. Click **Next**. +3. On the **Use Microsoft Update to help keep your computer secure and up-to-date** page, to enable Microsoft updates, select **Use Microsoft Update when I check for updates (recommended).** To disable Microsoft updates, select **I don’t want to use Microsoft Update**. Click **Next**. -4. On the **Feature Selection** page, select the **Publishing Server** checkbox and click **Next**. +4. On the **Feature Selection** page, select the **Publishing Server** checkbox and click **Next**. -5. On the **Installation Location** page, accept the default location and click **Next**. +5. On the **Installation Location** page, accept the default location and click **Next**. -6. On the **Configure Publishing Server Configuration** page, specify the following items: +6. On the **Configure Publishing Server Configuration** page, specify the following items: - - The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. + - The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. - - Specify the website name that you want to use for the publishing service. Accept the default if you do not have a custom name. + - Specify the website name that you want to use for the publishing service. Accept the default if you do not have a custom name. - - For the **Port Binding**, specify a unique port number that will be used by App-V 5.1, for example **54321**. + - For the **Port Binding**, specify a unique port number that will be used by App-V 5.1, for example **54321**. -7. On the **Ready to Install** page, click **Install**. +7. On the **Ready to Install** page, click **Install**. -8. After the installation is complete, the publishing server must be registered with the management server. In the App-V 5.1 management console, use the following steps to register the server: +8. After the installation is complete, the publishing server must be registered with the management server. In the App-V 5.1 management console, use the following steps to register the server: - 1. Open the App-V 5.1 management server console. + 1. Open the App-V 5.1 management server console. - 2. In the left pane, select **Servers**, and then select **Register New Server**. + 2. In the left pane, select **Servers**, and then select **Register New Server**. - 3. Type the name of this server and a description (if required) and click **Add**. + 3. Type the name of this server and a description (if required) and click **Add**. -9. To verify if the publishing server is running correctly, you should import a package to the management server, entitle the package to an AD group, and publish the package. Using an internet browser, open the following URL: **http://publishingserver:pubport**. If the server is running correctly information similar to the following will be displayed: +9. To verify if the publishing server is running correctly, you should import a package to the management server, entitle the package to an AD group, and publish the package. Using an internet browser, open the following URL: http://publishingserver:pubport. If the server is running correctly information similar to the following will be displayed: - `` + `` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - ` ` + ` ` - `` + `` - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Deploying App-V 5.1](deploying-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database.md b/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database.md index a52e6812c2..6cd9f15218 100644 --- a/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database.md +++ b/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to install the reporting server on a standalone computer and connect it to the database. -**Important**   +**Important** Before performing the following procedure you should read and understand [About App-V 5.0 Reporting](about-app-v-50-reporting.md). -  + **To install the reporting server on a standalone computer and connect it to the database** @@ -38,24 +38,26 @@ Before performing the following procedure you should read and understand [About 6. On the **Configure Existing Reporting Database** page, select **Use a remote SQL Server**, and type the machine name of the computer running Microsoft SQL Server, for example **SqlServerMachine**. - **Note**   + **Note** If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. -   - For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. - Specify the **SQL Server Database name** that this reporting server will use, for example **AppvReporting**. +~~~ +For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. -7. On the **Configure Reporting Server Configuration** page. +Specify the **SQL Server Database name** that this reporting server will use, for example **AppvReporting**. +~~~ - - Specify the Website Name that you want to use for the Reporting Service. Leave the default unchanged if you do not have a custom name. +7. On the **Configure Reporting Server Configuration** page. - - For the **Port binding**, specify a unique port number that will be used by App-V 5.0, for example **55555**. You should also ensure that the port specified is not being used by another website. + - Specify the Website Name that you want to use for the Reporting Service. Leave the default unchanged if you do not have a custom name. -8. Click **Install**. + - For the **Port binding**, specify a unique port number that will be used by App-V 5.0, for example **55555**. You should also ensure that the port specified is not being used by another website. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +8. Click **Install**. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -66,9 +68,9 @@ Before performing the following procedure you should read and understand [About [How to Enable Reporting on the App-V 5.0 Client by Using PowerShell](how-to-enable-reporting-on-the-app-v-50-client-by-using-powershell.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database51.md b/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database51.md index b7ec2918c2..4d6223aabf 100644 --- a/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database51.md +++ b/mdop/appv-v5/how-to-install-the-reporting-server-on-a-standalone-computer-and-connect-it-to-the-database51.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to install the reporting server on a standalone computer and connect it to the database. -**Important**   +**Important** Before performing the following procedure you should read and understand [About App-V 5.1 Reporting](about-app-v-51-reporting.md). -  + **To install the reporting server on a standalone computer and connect it to the database** @@ -38,24 +38,26 @@ Before performing the following procedure you should read and understand [About 6. On the **Configure Existing Reporting Database** page, select **Use a remote SQL Server**, and type the machine name of the computer running Microsoft SQL Server, for example **SqlServerMachine**. - **Note**   + **Note** If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. -   - For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. - Specify the **SQL Server Database name** that this reporting server will use, for example **AppvReporting**. +~~~ +For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance** and then type the name of the instance. -7. On the **Configure Reporting Server Configuration** page. +Specify the **SQL Server Database name** that this reporting server will use, for example **AppvReporting**. +~~~ - - Specify the Website Name that you want to use for the Reporting Service. Leave the default unchanged if you do not have a custom name. +7. On the **Configure Reporting Server Configuration** page. - - For the **Port binding**, specify a unique port number that will be used by App-V 5.1, for example **55555**. You should also ensure that the port specified is not being used by another website. + - Specify the Website Name that you want to use for the Reporting Service. Leave the default unchanged if you do not have a custom name. -8. Click **Install**. + - For the **Port binding**, specify a unique port number that will be used by App-V 5.1, for example **55555**. You should also ensure that the port specified is not being used by another website. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +8. Click **Install**. + + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -66,9 +68,9 @@ Before performing the following procedure you should read and understand [About [How to Enable Reporting on the App-V 5.1 Client by Using PowerShell](how-to-enable-reporting-on-the-app-v-51-client-by-using-powershell.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-install-the-sequencer-51beta-gb18030.md b/mdop/appv-v5/how-to-install-the-sequencer-51beta-gb18030.md index ab643ae423..dac6a4e3dc 100644 --- a/mdop/appv-v5/how-to-install-the-sequencer-51beta-gb18030.md +++ b/mdop/appv-v5/how-to-install-the-sequencer-51beta-gb18030.md @@ -24,7 +24,7 @@ Upgrading a previous installation of the App-V sequencer is not supported. **Important**   For a full list of the sequencer requirements see sequencer sections of [App-V 5.1 Prerequisites](app-v-51-prerequisites.md) and [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md). -  + You can also use the command line to install the App-V 5.1 sequencer. The following list displays information about options for installing the sequencer using the command line and **appv\_sequencer\_setup.exe**: @@ -79,7 +79,7 @@ You can also use the command line to install the App-V 5.1 sequencer. The follow -  + **To install the App-V 5.1 sequencer** @@ -104,9 +104,9 @@ You can also use the command line to install the App-V 5.1 sequencer. The follow [Planning to Deploy App-V](planning-to-deploy-app-v51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-install-the-sequencer-beta-gb18030.md b/mdop/appv-v5/how-to-install-the-sequencer-beta-gb18030.md index c83463f6ff..3f7e638081 100644 --- a/mdop/appv-v5/how-to-install-the-sequencer-beta-gb18030.md +++ b/mdop/appv-v5/how-to-install-the-sequencer-beta-gb18030.md @@ -24,7 +24,7 @@ Upgrading a previous installation of the App-V sequencer is not supported. **Important**   For a full list of the sequencer requirements see sequencer sections of [App-V 5.0 Prerequisites](app-v-50-prerequisites.md) and [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md). -  + You can also use the command line to install the App-V 5.0 sequencer. The following list displays information about options for installing the sequencer using the command line and **appv\_sequencer\_setup.exe**: @@ -79,7 +79,7 @@ You can also use the command line to install the App-V 5.0 sequencer. The follow -  + **To install the App-V 5.0 sequencer** @@ -104,9 +104,9 @@ You can also use the command line to install the App-V 5.0 sequencer. The follow [Planning to Deploy App-V](planning-to-deploy-app-v.md) -  + -  + diff --git a/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md b/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md index 64a255bda2..e24a590f0a 100644 --- a/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md +++ b/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-50-sp3.md @@ -48,9 +48,9 @@ Review the following requirements for using the App-V PowerShell cmdlets:

    Users can run App-V Server cmdlets only if you grant them access by using one of the following methods:

    • When you are deploying and configuring the App-V Server:

      -

      Specify an Active Directory group or individual user that has permissions to manage the App-V environment. See [How to Deploy the App-V 5.0 Server](how-to-deploy-the-app-v-50-server-50sp3.md).

    • +

      Specify an Active Directory group or individual user that has permissions to manage the App-V environment. See How to Deploy the App-V 5.0 Server.

    • After you’ve deployed the App-V Server:

      -

      Use the App-V Management console to add an additional Active Directory group or user. See [How to Add or Remove an Administrator by Using the Management Console](how-to-add-or-remove-an-administrator-by-using-the-management-console.md).

    • +

      Use the App-V Management console to add an additional Active Directory group or user. See How to Add or Remove an Administrator by Using the Management Console.

    @@ -91,13 +91,13 @@ Review the following requirements for using the App-V PowerShell cmdlets:

    Run the Set-AppvClientConfiguration cmdlet with the -RequirePublishAsAdmin parameter.

    Enable the “Require publish as administrator” Group Policy setting for App-V Clients.

    -

    [How to Publish a Package by Using the Management Console](how-to-publish-a-package-by-using-the-management-console-50.md)

    +

    How to Publish a Package by Using the Management Console

    @@ -106,7 +106,7 @@ Review the following requirements for using the App-V PowerShell cmdlets: -  + ## Loading the PowerShell cmdlets To load the PowerShell cmdlet modules: @@ -142,7 +142,7 @@ To load the PowerShell cmdlet modules: -  + ## Getting help for the PowerShell cmdlets Starting in App-V 5.0 SP3, cmdlet help is available in two formats: @@ -196,12 +196,12 @@ Starting in App-V 5.0 SP3, cmdlet help is available in two formats:

    On TechNet as web pages

    -

    See the App-V node under [Microsoft Desktop Optimization Pack Automation with Windows PowerShell](https://technet.microsoft.com/library/dn520245.aspx).

    +

    See the App-V node under Microsoft Desktop Optimization Pack Automation with Windows PowerShell.

    -  + ## Displaying the help for a PowerShell cmdlet To display help for a specific PowerShell cmdlet: @@ -212,9 +212,9 @@ To display help for a specific PowerShell cmdlet: **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue**? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). -  + -  + diff --git a/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-51.md b/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-51.md index 0251d9bd78..c8f34160ab 100644 --- a/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-51.md +++ b/mdop/appv-v5/how-to-load-the-powershell-cmdlets-and-get-cmdlet-help-51.md @@ -48,9 +48,9 @@ Review the following requirements for using the App-V PowerShell cmdlets:

    Users can run App-V Server cmdlets only if you grant them access by using one of the following methods:

    • When you are deploying and configuring the App-V Server:

      -

      Specify an Active Directory group or individual user that has permissions to manage the App-V environment. See [How to Deploy the App-V 5.1 Server](how-to-deploy-the-app-v-51-server.md).

    • +

      Specify an Active Directory group or individual user that has permissions to manage the App-V environment. See How to Deploy the App-V 5.1 Server.

    • After you’ve deployed the App-V Server:

      -

      Use the App-V Management console to add an additional Active Directory group or user. See [How to Add or Remove an Administrator by Using the Management Console](how-to-add-or-remove-an-administrator-by-using-the-management-console51.md).

    • +

      Use the App-V Management console to add an additional Active Directory group or user. See How to Add or Remove an Administrator by Using the Management Console.

    @@ -91,13 +91,13 @@ Review the following requirements for using the App-V PowerShell cmdlets:

    Run the Set-AppvClientConfiguration cmdlet with the -RequirePublishAsAdmin parameter.

    Enable the “Require publish as administrator” Group Policy setting for App-V Clients.

    -

    [How to Publish a Package by Using the Management Console](how-to-publish-a-package-by-using-the-management-console-51.md)

    +

    How to Publish a Package by Using the Management Console

    @@ -106,7 +106,7 @@ Review the following requirements for using the App-V PowerShell cmdlets: -  + ## Loading the PowerShell cmdlets @@ -195,7 +195,7 @@ Starting in App-V 5.0 SP3, cmdlet help is available in two formats:

    On TechNet as web pages

    -

    See the App-V node under [Microsoft Desktop Optimization Pack Automation with Windows PowerShell](https://technet.microsoft.com/library/dn520245.aspx).

    +

    See the App-V node under Microsoft Desktop Optimization Pack Automation with Windows PowerShell.

    @@ -209,9 +209,9 @@ To display help for a specific PowerShell cmdlet: **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). -  + -  + diff --git a/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version.md b/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version.md index a759434486..5cfa258188 100644 --- a/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version.md +++ b/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version.md @@ -61,7 +61,7 @@ To upgrade a package in earlier versions of App-V, you had to perform several st
  • Click EDIT in the CONNECTED PACKAGES pane.

  • Select Use Any Version check box next to the package name, and click Apply.

  • -

    For more about adding or upgrading packages, see [How to Add or Upgrade Packages by Using the Management Console](how-to-add-or-upgrade-packages-by-using-the-management-console-beta-gb18030.md).

    +

    For more about adding or upgrading packages, see How to Add or Upgrade Packages by Using the Management Console.

    App-V Client on a Stand-alone computer

    @@ -79,8 +79,8 @@ To upgrade a package in earlier versions of App-V, you had to perform several st

    For more information, see:

    @@ -90,7 +90,7 @@ To upgrade a package in earlier versions of App-V, you had to perform several st -  + @@ -102,9 +102,9 @@ To upgrade a package in earlier versions of App-V, you had to perform several st [Managing Connection Groups](managing-connection-groups.md) -  + -  + diff --git a/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version51.md b/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version51.md index 7f167a4ac0..dd0494ceee 100644 --- a/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version51.md +++ b/mdop/appv-v5/how-to-make-a-connection-group-ignore-the-package-version51.md @@ -61,7 +61,7 @@ To upgrade a package in some earlier versions of App-V, you had to perform sever
  • Click EDIT in the CONNECTED PACKAGES pane.

  • Select Use Any Version check box next to the package name, and click Apply.

  • -

    For more about adding or upgrading packages, see [How to Add or Upgrade Packages by Using the Management Console](how-to-add-or-upgrade-packages-by-using-the-management-console-51-gb18030.md).

    +

    For more about adding or upgrading packages, see How to Add or Upgrade Packages by Using the Management Console.

    App-V Client on a Stand-alone computer

    @@ -79,8 +79,8 @@ To upgrade a package in some earlier versions of App-V, you had to perform sever

    For more information, see:

    @@ -90,7 +90,7 @@ To upgrade a package in some earlier versions of App-V, you had to perform sever -  + @@ -102,9 +102,9 @@ To upgrade a package in some earlier versions of App-V, you had to perform sever [Managing Connection Groups](managing-connection-groups51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md b/mdop/appv-v5/how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md index 4c2c9aed8f..08c7e04567 100644 --- a/mdop/appv-v5/how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md +++ b/mdop/appv-v5/how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md @@ -58,7 +58,7 @@ Use the following information to add a package to a computer. **Important**   This example only adds a package. It does not publish the package to the user or the computer. -  + **Cmdlet**: Add-AppvClientPackage @@ -94,7 +94,7 @@ Use the following information to publish a package that has been added to a spec -  + ## To publish a package to a specific user @@ -102,7 +102,7 @@ Use the following information to publish a package that has been added to a spec **Note**   You must use App-V 5.0 SP2 Hotfix Package 5 or later to use this parameter. -  + An administrator can publish a package to a specific user by specifying the optional **–UserSID** parameter with the **Publish-AppvClientPackage** cmdlet, where **-UserSID** represents the end user’s security identifier (SID). @@ -144,7 +144,7 @@ Use the following information to unpublish a package which has been entitled to **Note**   You must use App-V 5.0 SP2 Hotfix Package 5 or later to use this parameter. -  + An administrator can unpublish a package for a specific user by using the optional **–UserSID** parameter with the **Unpublish-AppvClientPackage** cmdlet, where **-UserSID** represents the end user’s security identifier (SID). @@ -174,7 +174,7 @@ Use the following information to remove a package from the computer. **Note**   App-V cmdlets have been assigned to variables for the previous examples for clarity only; assignment is not a requirement. Most cmdlets can be combined as displayed in [To add and publish a package](#bkmk-add-pub-pkg-standalone-posh). For a detailed tutorial, see [App-V 5.0 Client PowerShell Deep Dive](https://go.microsoft.com/fwlink/?LinkId=324466). -  + ## To enable only administrators to publish or unpublish packages @@ -182,7 +182,7 @@ App-V cmdlets have been assigned to variables for the previous examples for clar **Note**   **This feature is supported starting in App-V 5.0 SP3.** -  + Use the following cmdlet and parameter to enable only administrators (not end users) to publish or unpublish packages: @@ -209,7 +209,7 @@ Use the following cmdlet and parameter to enable only administrators (not end us -  + To use the App-V Management console to set this configuration, see [How to Publish a Package by Using the Management Console](how-to-publish-a-package-by-using-the-management-console-50.md). @@ -249,7 +249,7 @@ To use the App-V Management console to set this configuration, see [How to Publi -  + The pending task will run later, according to the following rules: @@ -276,7 +276,7 @@ The pending task will run later, according to the following rules: -  + For more information about pending tasks, see [About App-V 5.0 SP2](about-app-v-50-sp2.md#bkmk-pkg-upgr-pendg-tasks). @@ -289,9 +289,9 @@ For more information about pending tasks, see [About App-V 5.0 SP2](about-app-v- [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md b/mdop/appv-v5/how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md index 1991de0612..fe66e53ac9 100644 --- a/mdop/appv-v5/how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md +++ b/mdop/appv-v5/how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md @@ -58,7 +58,7 @@ Use the following information to add a package to a computer. **Important**   This example only adds a package. It does not publish the package to the user or the computer. -  + **Cmdlet**: Add-AppvClientPackage @@ -94,7 +94,7 @@ Use the following information to publish a package that has been added to a spec -  + ## To publish a package to a specific user @@ -102,7 +102,7 @@ Use the following information to publish a package that has been added to a spec **Note**   You must use App-V 5.0 SP2 Hotfix Package 5 or later to use this parameter. -  + An administrator can publish a package to a specific user by specifying the optional **–UserSID** parameter with the **Publish-AppvClientPackage** cmdlet, where **-UserSID** represents the end user’s security identifier (SID). @@ -144,7 +144,7 @@ Use the following information to unpublish a package which has been entitled to **Note**   You must use App-V 5.0 SP2 Hotfix Package 5 or later to use this parameter. -  + An administrator can unpublish a package for a specific user by using the optional **–UserSID** parameter with the **Unpublish-AppvClientPackage** cmdlet, where **-UserSID** represents the end user’s security identifier (SID). @@ -174,7 +174,7 @@ Use the following information to remove a package from the computer. **Note**   App-V cmdlets have been assigned to variables for the previous examples for clarity only; assignment is not a requirement. Most cmdlets can be combined as displayed in [To add and publish a package](#bkmk-add-pub-pkg-standalone-posh). For a detailed tutorial, see [App-V 5.0 Client PowerShell Deep Dive](https://go.microsoft.com/fwlink/?LinkId=324466). -  + ## To enable only administrators to publish or unpublish packages @@ -182,7 +182,7 @@ App-V cmdlets have been assigned to variables for the previous examples for clar **Note**   **This feature is supported starting in App-V 5.0 SP3.** -  + Use the following cmdlet and parameter to enable only administrators (not end users) to publish or unpublish packages: @@ -209,7 +209,7 @@ Use the following cmdlet and parameter to enable only administrators (not end us -  + To use the App-V Management console to set this configuration, see [How to Publish a Package by Using the Management Console](how-to-publish-a-package-by-using-the-management-console-51.md). @@ -249,7 +249,7 @@ To use the App-V Management console to set this configuration, see [How to Publi -  + The pending task will run later, according to the following rules: @@ -276,7 +276,7 @@ The pending task will run later, according to the following rules: -  + For more information about pending tasks, see [About App-V 5.0 SP2](about-app-v-50-sp2.md#bkmk-pkg-upgr-pendg-tasks). @@ -289,9 +289,9 @@ For more information about pending tasks, see [About App-V 5.0 SP2](about-app-v- [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell51.md b/mdop/appv-v5/how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell51.md index a8f338283e..fb63bd845f 100644 --- a/mdop/appv-v5/how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell51.md +++ b/mdop/appv-v5/how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell51.md @@ -128,9 +128,11 @@ This topic explains the following procedures: -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics @@ -139,9 +141,9 @@ This topic explains the following procedures: [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md index 68f99e01c1..75bb7066c4 100644 --- a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md +++ b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md @@ -22,43 +22,43 @@ Use the following procedure to migrate extension points from an App-V 4.6 pack **Note**   The following procedure does not require an App-V 5.0 management server. -  + **To migrate extension points from a package from an App-V 4.6 package to a converted App-V 5.0 package using the deployment configuration file** -1. Locate the directory that contains the deployment configuration file for the package you want to migrate. To set the policy, make the following update to the **userConfiguration** section: +1. Locate the directory that contains the deployment configuration file for the package you want to migrate. To set the policy, make the following update to the **userConfiguration** section: - **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>** + **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>** - The following is an example of content from a deployment configuration file: + The following is an example of content from a deployment configuration file: - <?xml version="1.0" ?> + <?xml version="1.0" ?> - <DeploymentConfiguration + <DeploymentConfiguration - xmlns="http://schemas.microsoft.com/appv/2010/deploymentconfiguration" PackageId=<Package ID> DisplayName=<Display Name> + xmlns="" PackageId=<Package ID> DisplayName=<Display Name> - <MachineConfiguration/> + <MachineConfiguration/> - <UserConfiguration> + <UserConfiguration> - <ManagingAuthority TakeoverExtensionPointsFrom46="true" + <ManagingAuthority TakeoverExtensionPointsFrom46="true" - PackageName=<Package ID> + PackageName=<Package ID> - </UserConfiguration> + </UserConfiguration> - </DeploymentConfiguration> + </DeploymentConfiguration> -2. To add the App-V 5.0 package, in an elevated PowerShell command prompt type: +2. To add the App-V 5.0 package, in an elevated PowerShell command prompt type: - PS>**$pkg= Add-AppvClientPackage** **–Path** <Path to package location> -**DynamicDeploymentConfiguration** <Path to the deployment configuration file> + PS>**$pkg= Add-AppvClientPackage** **–Path** <Path to package location> -**DynamicDeploymentConfiguration** <Path to the deployment configuration file> - PS>**Publish-AppVClientPackage $pkg** + PS>**Publish-AppVClientPackage $pkg** -3. To test the migration, open the virtual application using asscoaited FTAs or shortcuts. The application opens with App-V 5.0. Both, the App-V 4.6 package and the converted App-V 5.0 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.0 package. +3. To test the migration, open the virtual application using asscoaited FTAs or shortcuts. The application opens with App-V 5.0. Both, the App-V 4.6 package and the converted App-V 5.0 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.0 package. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -67,9 +67,9 @@ The following procedure does not require an App-V 5.0 management server. [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md index cd86daeff6..19ee17d2ed 100644 --- a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md +++ b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md @@ -23,43 +23,43 @@ Use the following procedure to migrate extension points from an App-V 4.6 packa This procedure assumes that you are running the latest version of App-V 4.6. The following procedure does not require an App-V 5.1 management server. -  + **To migrate extension points from a package from an App-V 4.6 package to a converted App-V 5.1 package using the deployment configuration file** -1. Locate the directory that contains the deployment configuration file for the package you want to migrate. To set the policy, make the following update to the **userConfiguration** section: +1. Locate the directory that contains the deployment configuration file for the package you want to migrate. To set the policy, make the following update to the **userConfiguration** section: - **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>** + **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>** - The following is an example of content from a deployment configuration file: + The following is an example of content from a deployment configuration file: - <?xml version="1.0" ?> + <?xml version="1.0" ?> - <DeploymentConfiguration + <DeploymentConfiguration - xmlns="http://schemas.microsoft.com/appv/2010/deploymentconfiguration" PackageId=<Package ID> DisplayName=<Display Name> + xmlns="" PackageId=<Package ID> DisplayName=<Display Name> - <MachineConfiguration/> + <MachineConfiguration/> - <UserConfiguration> + <UserConfiguration> - <ManagingAuthority TakeoverExtensionPointsFrom46="true" + <ManagingAuthority TakeoverExtensionPointsFrom46="true" - PackageName=<Package ID> + PackageName=<Package ID> - </UserConfiguration> + </UserConfiguration> - </DeploymentConfiguration> + </DeploymentConfiguration> -2. To add the App-V 5.1 package, in an elevated PowerShell command prompt type: +2. To add the App-V 5.1 package, in an elevated PowerShell command prompt type: - PS>**$pkg= Add-AppvClientPackage** **–Path** <Path to package location> -**DynamicDeploymentConfiguration** <Path to the deployment configuration file> + PS>**$pkg= Add-AppvClientPackage** **–Path** <Path to package location> -**DynamicDeploymentConfiguration** <Path to the deployment configuration file> - PS>**Publish-AppVClientPackage $pkg** + PS>**Publish-AppVClientPackage $pkg** -3. To test the migration, open the virtual application using associated FTAs or shortcuts. The application opens with App-V 5.1. Both, the App-V 4.6 package and the converted App-V 5.1 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.1 package. +3. To test the migration, open the virtual application using associated FTAs or shortcuts. The application opens with App-V 5.1. Both, the App-V 4.6 package and the converted App-V 5.1 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.1 package. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -68,9 +68,9 @@ The following procedure does not require an App-V 5.1 management server. [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md index 86e330149b..d93b082e4b 100644 --- a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md +++ b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md @@ -21,40 +21,40 @@ Use the following procedure to migrate packages created with App-V using the use **To convert a package** -1. Locate the user configuration file for the package you want to convert. To set the policy, perform the following updates in the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>**. +1. Locate the user configuration file for the package you want to convert. To set the policy, perform the following updates in the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>**. - The following is an example of a user configuration file: + The following is an example of a user configuration file: - <?xml version="1.0" ?> + <?xml version="1.0" ?> - <UserConfiguration PackageId=<Package ID> DisplayName=<Name of the Package> + <UserConfiguration PackageId=<Package ID> DisplayName=<Name of the Package> - xmlns="http://schemas.microsoft.com/appv/2010/userconfiguration"> <ManagingAuthority TakeoverExtensionPointsFrom46="true" + xmlns="; <ManagingAuthority TakeoverExtensionPointsFrom46="true" - PackageName=<Package ID> + PackageName=<Package ID> - </UserConfiguration> + </UserConfiguration> -2. To add the App-V 5.0 package type the following in an elavted PowerShell command prompt: +2. To add the App-V 5.0 package type the following in an elavted PowerShell command prompt: - PS>**$pkg= Add-AppvClientPackage –Path** <Path to package location> + PS>**$pkg= Add-AppvClientPackage –Path** <Path to package location> - PS>**Publish-AppVClientPackage $pkg -DynamicUserConfiguration** <Path to the user configuration file> + PS>**Publish-AppVClientPackage $pkg -DynamicUserConfiguration** <Path to the user configuration file> -3. Open the application using FTAs or shortcuts now. The application should open using App-V 5.0. +3. Open the application using FTAs or shortcuts now. The application should open using App-V 5.0. - The App-V SP2 package and the converted App-V 5.0 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.0 package. + The App-V SP2 package and the converted App-V 5.0 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.0 package. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md index 985c56d9da..ddcc67a299 100644 --- a/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md +++ b/mdop/appv-v5/how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md @@ -24,31 +24,31 @@ This procedure assumes that you are running the latest version of App-V 4.6. **To convert a package** -1. Locate the user configuration file for the package you want to convert. To set the policy, perform the following updates in the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>**. +1. Locate the user configuration file for the package you want to convert. To set the policy, perform the following updates in the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="true" PackageName=<Package ID>**. - The following is an example of a user configuration file: + The following is an example of a user configuration file: - <?xml version="1.0" ?> + <?xml version="1.0" ?> - <UserConfiguration PackageId=<Package ID> DisplayName=<Name of the Package> + <UserConfiguration PackageId=<Package ID> DisplayName=<Name of the Package> - xmlns="http://schemas.microsoft.com/appv/2010/userconfiguration"> <ManagingAuthority TakeoverExtensionPointsFrom46="true" + xmlns="; <ManagingAuthority TakeoverExtensionPointsFrom46="true" - PackageName=<Package ID> + PackageName=<Package ID> - </UserConfiguration> + </UserConfiguration> -2. To add the App-V 5.1 package, type the following in an elevated PowerShell command prompt window: +2. To add the App-V 5.1 package, type the following in an elevated PowerShell command prompt window: - PS>**$pkg= Add-AppvClientPackage –Path** <Path to package location> + PS>**$pkg= Add-AppvClientPackage –Path** <Path to package location> - PS>**Publish-AppVClientPackage $pkg -DynamicUserConfiguration** <Path to the user configuration file> + PS>**Publish-AppVClientPackage $pkg -DynamicUserConfiguration** <Path to the user configuration file> -3. Open the application using FTAs or shortcuts now. The application should open using App-V 5.1. +3. Open the application using FTAs or shortcuts now. The application should open using App-V 5.1. - The App-V 4.6 package and the converted App-V 5.1 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.1 package. + The App-V 4.6 package and the converted App-V 5.1 package are published to the user, but the FTAs and shortcuts for the applications have been assumed by the App-V 5.1 package. - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -57,9 +57,9 @@ This procedure assumes that you are running the latest version of App-V 4.6. [How to Revert Extension Points From an App-V 5.1 Package to an App-V 4.6 Package for a Specific User](how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-a-specific-user.md) -  + -  + diff --git a/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-51.md b/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-51.md index cde442951e..8a537ea939 100644 --- a/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-51.md +++ b/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-51.md @@ -158,9 +158,9 @@ This topic explains how to: [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-beta.md b/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-beta.md index bb3e5bb221..db77297d82 100644 --- a/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-beta.md +++ b/mdop/appv-v5/how-to-modify-an-existing-virtual-application-package-beta.md @@ -148,9 +148,9 @@ This topic explains how to: [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md b/mdop/appv-v5/how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md index b7e1e1b231..a70a6e6083 100644 --- a/mdop/appv-v5/how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md +++ b/mdop/appv-v5/how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md @@ -26,7 +26,7 @@ Use the App-V 5.0 ADMX template to configure App-V 5.0 client settings using the **Note**   Use the following link to download the App-V 5.0 **ADMX Templates**: . -   + 2. On the computer where you manage group Policy, typically the domain controller, copy the template **.admx** file to the following directory: **<Installation Drive> \\ Windows \\ PolicyDefinitions**. @@ -43,9 +43,9 @@ Use the App-V 5.0 ADMX template to configure App-V 5.0 client settings using the [About Client Configuration Settings](about-client-configuration-settings.md) -  + -  + diff --git a/mdop/appv-v5/how-to-modify-app-v-51-client-configuration-using-the-admx-template-and-group-policy.md b/mdop/appv-v5/how-to-modify-app-v-51-client-configuration-using-the-admx-template-and-group-policy.md index b28bc6c584..b316fe6660 100644 --- a/mdop/appv-v5/how-to-modify-app-v-51-client-configuration-using-the-admx-template-and-group-policy.md +++ b/mdop/appv-v5/how-to-modify-app-v-51-client-configuration-using-the-admx-template-and-group-policy.md @@ -26,7 +26,7 @@ Use the Microsoft Application Virtualization (App-V) 5.1 ADMX template to config **Note**   Use the following link to download the App-V 5.1 **ADMX Templates**: . -   + 2. On the computer where you manage group Policy, typically the domain controller, copy the template **.admx** file to the following directory: **<Installation Drive> \\ Windows \\ PolicyDefinitions**. @@ -43,9 +43,9 @@ Use the Microsoft Application Virtualization (App-V) 5.1 ADMX template to config [About Client Configuration Settings](about-client-configuration-settings51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-50.md b/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-50.md index 2072f02ad1..fb93be080c 100644 --- a/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-50.md +++ b/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-50.md @@ -22,7 +22,7 @@ Use the following procedure to publish an App-V 5.0 package. Once you publish a **Note**   The ability to enable only administrators to publish or unpublish packages (described below) is supported starting in App-V 5.0 SP3. -  + **To publish an App-V 5.0 package** @@ -51,9 +51,9 @@ The ability to enable only administrators to publish or unpublish packages (desc [How to Configure Access to Packages by Using the Management Console](how-to-configure-access-to-packages-by-using-the-management-console-50.md) -  + -  + diff --git a/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-51.md b/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-51.md index a5daad6419..9a64b6ff65 100644 --- a/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-51.md +++ b/mdop/appv-v5/how-to-publish-a-package-by-using-the-management-console-51.md @@ -22,7 +22,7 @@ Use the following procedure to publish an App-V 5.1 package. Once you publish a **Note**   The ability to enable only administrators to publish or unpublish packages (described below) is supported starting in App-V 5.0 SP3. -  + **To publish an App-V 5.1 package** @@ -51,9 +51,9 @@ The ability to enable only administrators to publish or unpublish packages (desc [How to Configure Access to Packages by Using the Management Console](how-to-configure-access-to-packages-by-using-the-management-console-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md index 6e4773ca5f..7c0d2eb7d4 100644 --- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md +++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md @@ -19,7 +19,7 @@ Use the following procedure to revert an App-V 5.0 package to the App-V file for **To revert a package** -1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.0 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to App-V 5.0 for a Specific User](how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md). +1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.0 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to App-V 5.0 for a Specific User](how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-50-for-a-specific-user.md). In the **userConfiguration** section of the deployment configuration file for the converted package, to set the policy, make the following update to the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="false" PackageName=<Package ID>** @@ -27,23 +27,25 @@ Use the following procedure to revert an App-V 5.0 package to the App-V file for PS>**Publish-AppVClientPackage $pkg –DynamicUserConfigurationPath** <path to user configuration file> -3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6 SP2. +3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6 SP2. - **Note**   + **Note** If you do not need the App-V 5.0 package anymore, you can unpublish the App-V 5.0 package and the extension points will automatically revert to App-V 4.6. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md index 430fcc0f18..eb3e8e7dfb 100644 --- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md +++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md @@ -17,11 +17,11 @@ ms.date: 06/21/2016 *Note:** App-V 4.6 has exited Mainstream support. The following assumes that the App-V 4.6 SP3 client is already installed. -Use the following procedure to revert extension points from an App-V 5.0 package to the App-V 4.6 file format using the deployment configuration file. +Use the following procedure to revert extension points from an App-V 5.0 package to the App-V 4.6 file format using the deployment configuration file. **To revert a package** -1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.0 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to a Converted App-V 5.0 Package for All Users on a Specific Computer](how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md). +1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.0 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to a Converted App-V 5.0 Package for All Users on a Specific Computer](how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-50-package-for-all-users-on-a-specific-computer.md). In the **userConfiguration** section of the deployment configuration file for the converted package, to set the policy, make the following update to the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="false" PackageName=<Package ID>** @@ -31,25 +31,27 @@ Use the following procedure to revert extension points from an App-V 5.0 package PS>**Publish-AppVClientPackage $pkg –DynamicUserConfigurationType useDeploymentConfiguration** -3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6 SP2 package. +3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6 SP2 package. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6. - **Note**   - If you do not need the App-V 5.0 package anymore, you can unpublish the App-V 5.0 package and the extension points will automatically revert to App-V 4.6. + **Note** + If you do not need the App-V 5.0 package anymore, you can unpublish the App-V 5.0 package and the extension points will automatically revert to App-V 4.6. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-a-specific-user.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-a-specific-user.md index 57a1c9adf1..b62aea5290 100644 --- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-a-specific-user.md +++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-a-specific-user.md @@ -21,7 +21,7 @@ Use the following procedure to revert an App-V 5.1 package to the App-V file for **To revert a package** -1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.1 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to App-V 5.1 for a Specific User](how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md). +1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.1 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to App-V 5.1 for a Specific User](how-to-migrate-extension-points-from-an-app-v-46-package-to-app-v-51-for-a-specific-user.md). In the **userConfiguration** section of the deployment configuration file for the converted package, to set the policy, make the following update to the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="false" PackageName=<Package ID>** @@ -29,23 +29,25 @@ Use the following procedure to revert an App-V 5.1 package to the App-V file for PS>**Publish-AppVClientPackage $pkg –DynamicUserConfigurationPath** <path to user configuration file> -3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6. +3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6. - **Note**   + **Note** If you do not need the App-V 5.1 package anymore, you can unpublish the App-V 5.1 package and the extension points will automatically revert to App-V 4.6. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md index fab74f6202..7c6b1455cf 100644 --- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md +++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-51-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md @@ -17,11 +17,11 @@ ms.date: 06/21/2016 # How to Revert Extension Points from an App-V 5.1 Package to an App-V 4.6 Package For All Users on a Specific Computer -Use the following procedure to revert extension points from an App-V 5.1 package to the App-V 4.6 file format using the deployment configuration file. +Use the following procedure to revert extension points from an App-V 5.1 package to the App-V 4.6 file format using the deployment configuration file. **To revert a package** -1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.1 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to a Converted App-V 5.1 Package for All Users on a Specific Computer](how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md). +1. Ensure that App-V 4.6 package is published to the users but the FTAs and shortcuts have been assumed by App-V 5.1 package using the following migration method, [How to Migrate Extension Points From an App-V 4.6 Package to a Converted App-V 5.1 Package for All Users on a Specific Computer](how-to-migrate-extension-points-from-an-app-v-46-package-to-a-converted-app-v-51-package-for-all-users-on-a-specific-computer.md). In the **userConfiguration** section of the deployment configuration file for the converted package, to set the policy, make the following update to the **userConfiguration** section: **ManagingAuthority TakeoverExtensionPointsFrom46="false" PackageName=<Package ID>** @@ -31,25 +31,27 @@ Use the following procedure to revert extension points from an App-V 5.1 package PS>**Publish-AppVClientPackage $pkg –DynamicUserConfigurationType useDeploymentConfiguration** -3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6 package. +3. Perform a publishing refresh, or wait for the next scheduled publishing refresh for the App-V 4.6 package. Open the application using FTAs or shortcuts. The Application should now open using App-V 4.6. - **Note**   - If you do not need the App-V 5.1 package anymore, you can unpublish the App-V 5.1 package and the extension points will automatically revert to App-V 4.6. + **Note** + If you do not need the App-V 5.1 package anymore, you can unpublish the App-V 5.1 package and the extension points will automatically revert to App-V 4.6. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-50-beta-gb18030.md b/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-50-beta-gb18030.md index 9170bd64d9..5765532b2a 100644 --- a/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-50-beta-gb18030.md +++ b/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-50-beta-gb18030.md @@ -48,7 +48,7 @@ ms.date: 06/16/2016 -   + 2. Copy all required installation files to the computer that is running the sequencer. @@ -70,208 +70,224 @@ ms.date: 06/16/2016 3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - **Important**   + **Important** If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. -   + 4. On the **Type of Application** page, click the **Standard Application (default)** check box, and then click **Next**. 5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. - **Note**   + **Note** If the specified application installer modifies security access to a file or directory, existing or new, the associated changes will not be captured into the package. -   - If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Perform a Custom Installation** check box, and then Click **Next**. -6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. +~~~ +If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Perform a Custom Installation** check box, and then Click **Next**. +~~~ - The **Primary Virtual Application Directory** displays the path where the application will be installed on target computers. To specify this location, select **Browse**. +6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. - **Note**   - Starting in App-V 5.0 SP3, the primary virtual application directory (PVAD) is hidden, but you can turn it back on. See [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-pvad-hidden). + The **Primary Virtual Application Directory** displays the path where the application will be installed on target computers. To specify this location, select **Browse**. -   + **Note** + Starting in App-V 5.0 SP3, the primary virtual application directory (PVAD) is hidden, but you can turn it back on. See [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-pvad-hidden). - **Important**   - The primary application virtual directory should match the installation location for the application that is being sequenced. For example, if you install Notepad to **C:\\Program Files\\Notepad**; you should configure **C:\\Program Files\\Notepad** as your primary virtual directory. Alternatively, you can choose to set **C:\\Notepad** as the primary virtual application directory, as long as during installation time, you configure the installer to install to **C:\\Notepad**. Editing the Application Virtualization path is an advanced configuration task. For most applications, the default path is recommended for the following reasons: - - Application Compatibility. Some virtualized applications will not function correctly, or will fail to open if the directories are not configured with identical virtual directory paths. - - Performance. Since no file system redirection is required, the runtime performance can improve. +~~~ +**Important** +The primary application virtual directory should match the installation location for the application that is being sequenced. For example, if you install Notepad to **C:\\Program Files\\Notepad**; you should configure **C:\\Program Files\\Notepad** as your primary virtual directory. Alternatively, you can choose to set **C:\\Notepad** as the primary virtual application directory, as long as during installation time, you configure the installer to install to **C:\\Notepad**. Editing the Application Virtualization path is an advanced configuration task. For most applications, the default path is recommended for the following reasons: -   +- Application Compatibility. Some virtualized applications will not function correctly, or will fail to open if the directories are not configured with identical virtual directory paths. - **Tip**   - It is recommended that prior to Sequencing an application, you open the associated installer to determine the default installation directory, and then configure that location as the **Primary Virtual Application Directory**. +- Performance. Since no file system redirection is required, the runtime performance can improve. -   - Click **Next**. -7. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. +**Tip** +It is recommended that prior to Sequencing an application, you open the associated installer to determine the default installation directory, and then configure that location as the **Primary Virtual Application Directory**. - **Important**   - You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. -   - Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. +Click **Next**. +~~~ -8. On the **Installation** page, wait while the sequencer configures the virtualized application package. +7. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. -9. On the **Configure Software** page, optionally run the programs contained in the package. This step allows you to complete any necessary license or configuration tasks before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. You may need to wait several minutes for all programs to run. + **Important** + You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. - **Note**   - To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. -   - Click **Next**. +~~~ +Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. +~~~ + +8. On the **Installation** page, wait while the sequencer configures the virtualized application package. + +9. On the **Configure Software** page, optionally run the programs contained in the package. This step allows you to complete any necessary license or configuration tasks before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. You may need to wait several minutes for all programs to run. + + **Note** + To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. + + + +~~~ +Click **Next**. +~~~ 10. On the **Installation Report** page, you can review information about the virtualized application package you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. 11. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 14 of this procedure. To perform either of the following customizations, select **Customize**. - - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. + - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 12. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. It can take several minutes for all the applications to run. After all applications have run, close each of the applications, and then click **Next**. - **Note**   - If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. + **Note** + If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. + -   13. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select **Allow this package to run on any operating system**. To configure this package to run only on specific operating systems, select **Allow this package to run only on the following operating systems** and select the operating systems that can run this package. Click **Next**. - **Important**   - Make sure that the operating systems you specify here are supported by the application you are sequencing. + **Important** + Make sure that the operating systems you specify here are supported by the application you are sequencing. + -   14. The **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor**. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select **Save the package now** (default). Add optional **Comments** to be associated with the package. Comments are useful for identifying the program version and other information about the package. + To save the package immediately, select **Save the package now** (default). Add optional **Comments** to be associated with the package. Comments are useful for identifying the program version and other information about the package. - **Important**   - The system does not support non-printable characters in **Comments** and **Descriptions**. + **Important** + The system does not support non-printable characters in **Comments** and **Descriptions**. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ 15. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory where the package was created. - The package is now available in the sequencer. + The package is now available in the sequencer. + + **Important** + After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. - **Important**   - After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. -   **To sequence an add-on or plug-in application** 1. - **Note**   + **Note** Before performing the following procedure, install the parent application locally on the computer that is running the sequencer. Or if you have the parent application virtualized, you can follow the steps in the add-on or plug-in workflow to unpack the parent application on the computer. For example, if you are sequencing a plug-in for Microsoft Excel, install Microsoft Excel locally on the computer that is running the sequencer. Also install the parent application in the same directory where the application is installed on target computers. If the plug-in or add-on is going to be used with an existing virtual application package, install the application on the same virtual application drive that was used when you created the parent virtual application package. -   - On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -2. ****In the sequencer, click **Create a New Virtual Application Package**. Select **Create Package (default)**, and then click **Next**. +~~~ +On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. +~~~ -3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. +2. *In the sequencer, click *Create a New Virtual Application Package. Select **Create Package (default)**, and then click **Next**. - **Important**   - If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. +3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. -   + **Important** + If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. -4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. -5. On the **Select Installer** page, click **Browse** and specify the installation file for the add-on or plug-in. If the add-on or plug-in does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. -6. On the **Install Primary** page, ensure that the primary application is installed on the computer that runs the sequencer. Alternatively, you can expand an existing package that has been saved locally on the computer that runs the sequencer. To do this, click **Expand Package**, and then select the package. After you have expanded or installed the parent program, select **I have installed the primary parent program**. +4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. - Click **Next**. +5. On the **Select Installer** page, click **Browse** and specify the installation file for the add-on or plug-in. If the add-on or plug-in does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. -7. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V 5.0 Management Console. The **Primary Virtual Application Directory** displays the path where the application will be installed. To specify this location, type the path, or click **Browse**. +6. On the **Install Primary** page, ensure that the primary application is installed on the computer that runs the sequencer. Alternatively, you can expand an existing package that has been saved locally on the computer that runs the sequencer. To do this, click **Expand Package**, and then select the package. After you have expanded or installed the parent program, select **I have installed the primary parent program**. - **Note**   - Starting in App-V 5.0 SP3, the primary virtual application directory (PVAD) is hidden, but you can turn it back on. See [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-pvad-hidden). + Click **Next**. -   +7. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V 5.0 Management Console. The **Primary Virtual Application Directory** displays the path where the application will be installed. To specify this location, type the path, or click **Browse**. - Click **Next**. + **Note** + Starting in App-V 5.0 SP3, the primary virtual application directory (PVAD) is hidden, but you can turn it back on. See [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-pvad-hidden). -8. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. + +~~~ +Click **Next**. +~~~ + +8. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. + +9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. 10. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 12 of this procedure. To perform either of the following customizations, select **Customize**. - - Optimize how the package will run across a slow or unreliable network. + - Optimize how the package will run across a slow or unreliable network. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 11. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. Streaming improves the experience when the virtual application package is run on target computers on high-latency networks. It can take several minutes for all the applications to run. After all applications have run, close each of the applications. You can also configure the package to be required to be fully downloaded before opening by selecting the **Force applications to be downloaded** check-box. Click **Next**. - **Note**   - If necessary, you can stop an application from loading during this step. In the **Application Launch** dialog box, click **Stop** and select one of the check boxes: **Stop all applications** or **Stop this application only**. + **Note** + If necessary, you can stop an application from loading during this step. In the **Application Launch** dialog box, click **Stop** and select one of the check boxes: **Stop all applications** or **Stop this application only**. + -   12. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box, and then select the operating systems that can run this package. Click **Next**. 13. The **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor** check box. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select **Save the package now**. Optionally, add a **Description** that will be associated with the package. Descriptions are useful for identifying the version and other information about the package. + To save the package immediately, select **Save the package now**. Optionally, add a **Description** that will be associated with the package. Descriptions are useful for identifying the version and other information about the package. - **Important**   - The system does not support non-printable characters in Comments and Descriptions. + **Important** + The system does not support non-printable characters in Comments and Descriptions. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ **To sequence a middleware application** -1. On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. +1. On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -2. ****In the sequencer, click **Create a New Virtual Application Package**. Select **Create Package (default)**, and then click **Next**. +2. *In the sequencer, click *Create a New Virtual Application Package. Select **Create Package (default)**, and then click **Next**. -3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. +3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - **Important**   - If you are required to disable virus scanning software, you should first scan the computer that runs the App-V 5.0 Sequencer in order to ensure that no unwanted or malicious files can be added to the package. + **Important** + If you are required to disable virus scanning software, you should first scan the computer that runs the App-V 5.0 Sequencer in order to ensure that no unwanted or malicious files can be added to the package. -   -4. On the **Type of Application** page, select **Middleware**, and then click **Next**. -5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. +4. On the **Type of Application** page, select **Middleware**, and then click **Next**. -6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. The **Primary Virtual Application Directory** displays the path where the application will be installed. To specify this location, type the path or click **Browse**. +5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. - Click **Next**. +6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. The **Primary Virtual Application Directory** displays the path where the application will be installed. To specify this location, type the path or click **Browse**. -7. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. + Click **Next**. -8. On the **Installation** page, wait while the sequencer configures the virtual application package. +7. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. +8. On the **Installation** page, wait while the sequencer configures the virtual application package. + +9. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. 10. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box and select the operating systems that can run this package. Click **Next**. @@ -279,32 +295,36 @@ ms.date: 06/16/2016 To save the package immediately, select **Save the package now**. Optionally, add a **Description** to be associated with the package. Descriptions are useful for identifying the program version and other information about the package. - **Important**   + **Important** The system does not support non-printable characters in Comments and Descriptions. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ 12. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory specified in step 11 of this procedure. - The package is now available in the sequencer. To edit the package properties, click **Edit \[Package Name\]**. + The package is now available in the sequencer. To edit the package properties, click **Edit \[Package Name\]**. - **Important**   - After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. + **Important** + After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.0](operations-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-51-beta-gb18030.md b/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-51-beta-gb18030.md index fabc1035f8..d836a5126f 100644 --- a/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-51-beta-gb18030.md +++ b/mdop/appv-v5/how-to-sequence-a-new-application-with-app-v-51-beta-gb18030.md @@ -48,7 +48,7 @@ ms.date: 06/16/2016 -   + 2. Copy all required installation files to the computer that is running the sequencer. @@ -74,142 +74,154 @@ ms.date: 06/16/2016 > [!IMPORTANT] > If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. -   - > [!NOTE] - > There is currently no way to disable Windows Defender in Windows 10. If you receive a warning, you can safely ignore it. It is unlikely that Windows Defender will affect sequencing at all. -   +~~~ +> [!NOTE] +> There is currently no way to disable Windows Defender in Windows 10. If you receive a warning, you can safely ignore it. It is unlikely that Windows Defender will affect sequencing at all. +~~~ -4. On the **Type of Application** page, click the **Standard Application (default)** check box, and then click **Next**. -5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. - > [!NOTE] - > If the specified application installer modifies security access to a file or directory, existing or new, the associated changes will not be captured into the package. +4. On the **Type of Application** page, click the **Standard Application (default)** check box, and then click **Next**. -   +5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. - If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Perform a Custom Installation** check box, and then Click **Next**. + > [!NOTE] + > If the specified application installer modifies security access to a file or directory, existing or new, the associated changes will not be captured into the package. -6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. - Click **Next**. -7. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. +~~~ +If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Perform a Custom Installation** check box, and then Click **Next**. +~~~ - > [!IMPORTANT] - > You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. +6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. -   + Click **Next**. - Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. +7. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. -8. On the **Installation** page, wait while the sequencer configures the virtualized application package. + > [!IMPORTANT] + > You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. -9. On the **Configure Software** page, optionally run the programs contained in the package. This step allows you to complete any necessary license or configuration tasks before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. You may need to wait several minutes for all programs to run. - > [!NOTE] - > To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. -   +~~~ +Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. +~~~ - Click **Next**. +8. On the **Installation** page, wait while the sequencer configures the virtualized application package. + +9. On the **Configure Software** page, optionally run the programs contained in the package. This step allows you to complete any necessary license or configuration tasks before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. You may need to wait several minutes for all programs to run. + + > [!NOTE] + > To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. + + + +~~~ +Click **Next**. +~~~ 10. On the **Installation Report** page, you can review information about the virtualized application package you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. 11. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 14 of this procedure. To perform either of the following customizations, select **Customize**. - - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. + - Prepare the virtual package for streaming. Streaming improves the experience when the virtual application package is run on target computers. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 12. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. It can take several minutes for all the applications to run. After all applications have run, close each of the applications, and then click **Next**. - > [!NOTE] - > If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. + > [!NOTE] + > If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. + -   13. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select **Allow this package to run on any operating system**. To configure this package to run only on specific operating systems, select **Allow this package to run only on the following operating systems** and select the operating systems that can run this package. Click **Next**. - > [!IMPORTANT] - > Make sure that the operating systems you specify here are supported by the application you are sequencing. + > [!IMPORTANT] + > Make sure that the operating systems you specify here are supported by the application you are sequencing. + -   14. The **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor**. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. - To save the package immediately, select **Save the package now** (default). Add optional **Comments** to be associated with the package. Comments are useful for identifying the program version and other information about the package. + To save the package immediately, select **Save the package now** (default). Add optional **Comments** to be associated with the package. Comments are useful for identifying the program version and other information about the package. - > [!IMPORTANT] - > The system does not support non-printable characters in **Comments** and **Descriptions**. + > [!IMPORTANT] + > The system does not support non-printable characters in **Comments** and **Descriptions**. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ 15. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory where the package was created. - The package is now available in the sequencer. + The package is now available in the sequencer. + + > [!IMPORTANT] + > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. - > [!IMPORTANT] - > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. -   **To sequence an add-on or plug-in application** -1. > [!NOTE] - > Before performing the following procedure, install the parent application locally on the computer that is running the sequencer. Or if you have the parent application virtualized, you can follow the steps in the add-on or plug-in workflow to unpack the parent application on the computer. - > - > For example, if you are sequencing a plug-in for Microsoft Excel, install Microsoft Excel locally on the computer that is running the sequencer. Also install the parent application in the same directory where the application is installed on target computers. If the plug-in or add-on is going to be used with an existing virtual application package, install the application on the same virtual application drive that was used when you created the parent virtual application package. +1. > [!NOTE] + > Before performing the following procedure, install the parent application locally on the computer that is running the sequencer. Or if you have the parent application virtualized, you can follow the steps in the add-on or plug-in workflow to unpack the parent application on the computer. + > + > For example, if you are sequencing a plug-in for Microsoft Excel, install Microsoft Excel locally on the computer that is running the sequencer. Also install the parent application in the same directory where the application is installed on target computers. If the plug-in or add-on is going to be used with an existing virtual application package, install the application on the same virtual application drive that was used when you created the parent virtual application package. -   - On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -2. ****In the sequencer, click **Create a New Virtual Application Package**. Select **Create Package (default)**, and then click **Next**. +~~~ +On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. +~~~ -3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. +2. *In the sequencer, click *Create a New Virtual Application Package. Select **Create Package (default)**, and then click **Next**. - > [!IMPORTANT] - > If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. +3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. -   + > [!IMPORTANT] + > If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. -4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. -5. On the **Select Installer** page, click **Browse** and specify the installation file for the add-on or plug-in. If the add-on or plug-in does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. -6. On the **Install Primary** page, ensure that the primary application is installed on the computer that runs the sequencer. Alternatively, you can expand an existing package that has been saved locally on the computer that runs the sequencer. To do this, click **Expand Package**, and then select the package. After you have expanded or installed the parent program, select **I have installed the primary parent program**. +4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. - Click **Next**. +5. On the **Select Installer** page, click **Browse** and specify the installation file for the add-on or plug-in. If the add-on or plug-in does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. -7. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V 5.0 Management Console. +6. On the **Install Primary** page, ensure that the primary application is installed on the computer that runs the sequencer. Alternatively, you can expand an existing package that has been saved locally on the computer that runs the sequencer. To do this, click **Expand Package**, and then select the package. After you have expanded or installed the parent program, select **I have installed the primary parent program**. - Click **Next**. + Click **Next**. -8. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. +7. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V 5.0 Management Console. -9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. + Click **Next**. + +8. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. + +9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. 10. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 12 of this procedure. To perform either of the following customizations, select **Customize**. - - Optimize how the package will run across a slow or unreliable network. + - Optimize how the package will run across a slow or unreliable network. - - Specify the operating systems that can run this package. + - Specify the operating systems that can run this package. - Click **Next**. + Click **Next**. 11. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. Streaming improves the experience when the virtual application package is run on target computers on high-latency networks. It can take several minutes for all the applications to run. After all applications have run, close each of the applications. You can also configure the package to be required to be fully downloaded before opening by selecting the **Force applications to be downloaded** check-box. Click **Next**. > [!NOTE] > If necessary, you can stop an application from loading during this step. In the **Application Launch** dialog box, click **Stop** and select one of the check boxes: **Stop all applications** or **Stop this application only**. -   + 12. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box, and then select the operating systems that can run this package. Click **Next**. @@ -220,36 +232,38 @@ ms.date: 06/16/2016 > [!IMPORTANT] > The system does not support non-printable characters in Comments and Descriptions. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ **To sequence a middleware application** -1. On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. +1. On the computer that runs the sequencer, click **All Programs**, and then Click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -2. ****In the sequencer, click **Create a New Virtual Application Package**. Select **Create Package (default)**, and then click **Next**. +2. *In the sequencer, click *Create a New Virtual Application Package. Select **Create Package (default)**, and then click **Next**. -3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. +3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - > [!IMPORTANT] - > If you are required to disable virus scanning software, you should first scan the computer that runs the App-V 5.0 Sequencer in order to ensure that no unwanted or malicious files can be added to the package. + > [!IMPORTANT] + > If you are required to disable virus scanning software, you should first scan the computer that runs the App-V 5.0 Sequencer in order to ensure that no unwanted or malicious files can be added to the package. -   -4. On the **Type of Application** page, select **Middleware**, and then click **Next**. -5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. +4. On the **Type of Application** page, select **Middleware**, and then click **Next**. -6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. +5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Select this option to perform a custom installation** check box, and then click **Next**. - Click **Next**. +6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V 5.0 Management Console. -7. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. + Click **Next**. -8. On the **Installation** page, wait while the sequencer configures the virtual application package. +7. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. +8. On the **Installation** page, wait while the sequencer configures the virtual application package. + +9. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. 10. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box and select the operating systems that can run this package. Click **Next**. @@ -257,32 +271,36 @@ ms.date: 06/16/2016 To save the package immediately, select **Save the package now**. Optionally, add a **Description** to be associated with the package. Descriptions are useful for identifying the program version and other information about the package. - > [!IMPORTANT]   + > [!IMPORTANT] > The system does not support non-printable characters in Comments and Descriptions. -   - The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. + +~~~ +The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. +~~~ 12. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory specified in step 11 of this procedure. - The package is now available in the sequencer. To edit the package properties, click **Edit \[Package Name\]**. + The package is now available in the sequencer. To edit the package properties, click **Edit \[Package Name\]**. - > [!IMPORTANT]   - > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. + > [!IMPORTANT] + > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Operations for App-V 5.1](operations-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-50.md b/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-50.md index 166479c9c7..17f4bffcb4 100644 --- a/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-50.md +++ b/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-50.md @@ -22,7 +22,7 @@ Use the following procedure to create a new App-V 5.0 package using PowerShell. **Note**   Before you use this procedure you must copy the associated installer files to the computer running the sequencer and you have read and understand the sequencer section of [Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md). -  + **To create a new virtual application using PowerShell** @@ -67,9 +67,9 @@ Before you use this procedure you must copy the associated installer files to th [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-51.md b/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-51.md index 59e1460132..a4804fc73e 100644 --- a/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-51.md +++ b/mdop/appv-v5/how-to-sequence-a-package--by-using-powershell-51.md @@ -22,7 +22,7 @@ Use the following procedure to create a new App-V 5.1 package using PowerShell. **Note**   Before you use this procedure you must copy the associated installer files to the computer running the sequencer and you have read and understand the sequencer section of [Planning for the App-V 5.1 Sequencer and Client Deployment](planning-for-the-app-v-51-sequencer-and-client-deployment.md). -  + **To create a new virtual application using PowerShell** @@ -67,9 +67,9 @@ Before you use this procedure you must copy the associated installer files to th [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) -  + -  + diff --git a/mdop/appv-v5/how-to-uninstall-the-app-v-50-client.md b/mdop/appv-v5/how-to-uninstall-the-app-v-50-client.md index 24fc308041..3923ff9ea3 100644 --- a/mdop/appv-v5/how-to-uninstall-the-app-v-50-client.md +++ b/mdop/appv-v5/how-to-uninstall-the-app-v-50-client.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to uninstall the App-V 5.0 client from a computer. When you uninstall the App-V 5.0 client all packages published to the computer running the client are also removed. If the uninstall operation does not complete the packages will need to be re-published to the computer running the App-V 5.0 client. -**Important**   +**Important** You should ensure that the App-V 5.0 client service is running prior to performing the uninstall procedure. -  + **To uninstall the App-V 5.0 Client** @@ -30,28 +30,30 @@ You should ensure that the App-V 5.0 client service is running prior to performi 2. In the dialog box that appears, click **Yes** to continue with the uninstall process. - **Important**   + **Important** The uninstall process cannot be canceled or interrupted. -   + 3. A progress bar shows the time remaining. When this step finishes, you must restart the computer so that all associated drivers can be stopped to complete the uninstall process. - **Note**   + **Note** You can also use the command line to uninstall the App-V 5.0 client with the following switch: **/UNINSTALL**. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Deploying App-V 5.0](deploying-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-uninstall-the-app-v-51-client.md b/mdop/appv-v5/how-to-uninstall-the-app-v-51-client.md index d5e1a81c49..119e3fda37 100644 --- a/mdop/appv-v5/how-to-uninstall-the-app-v-51-client.md +++ b/mdop/appv-v5/how-to-uninstall-the-app-v-51-client.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 Use the following procedure to uninstall the Microsoft Application Virtualization (App-V) 5.1 client from a computer. When you uninstall the App-V 5.1 client all packages published to the computer running the client are also removed. If the uninstall operation does not complete the packages will need to be re-published to the computer running the App-V 5.1 client. -**Important**   +**Important** You should ensure that the App-V 5.1 client service is running prior to performing the uninstall procedure. -  + **To uninstall the App-V 5.1 Client** @@ -30,28 +30,30 @@ You should ensure that the App-V 5.1 client service is running prior to performi 2. In the dialog box that appears, click **Yes** to continue with the uninstall process. - **Important**   + **Important** The uninstall process cannot be canceled or interrupted. -   + 3. A progress bar shows the time remaining. When this step finishes, you must restart the computer so that all associated drivers can be stopped to complete the uninstall process. - **Note**   + **Note** You can also use the command line to uninstall the App-V 5.1 client with the following switch: **/UNINSTALL**. -   - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + +~~~ +**Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). +~~~ ## Related topics [Deploying App-V 5.1](deploying-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md index 41e26ad7ba..06eb564ecc 100644 --- a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md +++ b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md @@ -40,9 +40,9 @@ This procedure assumes that you are running the latest version of App-V 4.6. [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md index 7b22ca4a8e..3f0e318e6e 100644 --- a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md +++ b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md @@ -22,7 +22,7 @@ Starting in Microsoft Application Virtualization (App-V) 5.0 SP3, you can add op **Note**   **Optional packages are supported only in App-V 5.0 SP3.** -  + Before using optional packages, see [Requirements for using optional packages in connection groups](#bkmk-reqs-using-cg). @@ -39,19 +39,19 @@ Before using optional packages, see [Requirements for using optional packages in -

    [Use one connection group, with optional packages, for multiple users who have different packages entitled to them](#bkmk-apps-plugs-optional)

    +

    Use one connection group, with optional packages, for multiple users who have different packages entitled to them

    Use a single connection group to make different groups of applications and plug-ins available to different end users.

    For example, you want to distribute Microsoft Office to all end users, but distribute different plug-ins to different subsets of users.

    -

    [Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group](#bkmk-unpub-del-optl-pkg)

    +

    Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group

    Unpublish, delete, or republish an optional package without having to disable, remove, edit, add, and re-enable the connection group on the App-V Client.

    You can also unpublish the optional package and republish it later without having to disable or republish the connection group.

    -  + ## Use one connection group, with optional packages, for multiple users with different packages entitled to them @@ -119,7 +119,7 @@ Before using optional packages, see [Requirements for using optional packages in

    Example connection group XML document with optional packages:

    <?xml version="1.0" ?>
     <AppConnectionGroup
    -   xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup"
    +   xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup";
        AppConnectionGroupId="8105CCD5-244B-4BA1-8888-E321E688D2CB"
        VersionId="84CE3797-F1CB-4475-A223-757918929EB4"
        DisplayName="Contoso Software Connection Group" >
    @@ -165,7 +165,7 @@ Before using optional packages, see [Requirements for using optional packages in
     
     
     
    - 
    + 
     
     ## Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group
     
    @@ -213,7 +213,7 @@ Before using optional packages, see [Requirements for using optional packages in
     
  • Unpublish-AppvClientPackage

  • Remove-AppvClientPackage

  • -

    For more information, see [How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell](how-to-manage-app-v-50-packages-running-on-a-stand-alone-computer-by-using-powershell.md).

    +

    For more information, see How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell.

    @@ -232,7 +232,7 @@ Before using optional packages, see [Requirements for using optional packages in -  + ## Requirements for using optional packages in connection groups @@ -279,7 +279,7 @@ Review the following requirements before using optional packages in connection g -  + @@ -291,9 +291,9 @@ Review the following requirements before using optional packages in connection g [Managing Connection Groups](managing-connection-groups.md) -  + -  + diff --git a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md index ccbdd3a25b..d507575d2e 100644 --- a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md +++ b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md @@ -22,7 +22,7 @@ Starting in Microsoft Application Virtualization (App-V) 5.0 SP3, you can add op **Note**   **Optional packages are not supported in releases prior to App-V 5.0 SP3.** -  + Before using optional packages, see [Requirements for using optional packages in connection groups](#bkmk-reqs-using-cg). @@ -39,19 +39,19 @@ Before using optional packages, see [Requirements for using optional packages in -

    [Use one connection group, with optional packages, for multiple users who have different packages entitled to them](#bkmk-apps-plugs-optional)

    +

    Use one connection group, with optional packages, for multiple users who have different packages entitled to them

    Use a single connection group to make different groups of applications and plug-ins available to different end users.

    For example, you want to distribute Microsoft Office to all end users, but distribute different plug-ins to different subsets of users.

    -

    [Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group](#bkmk-unpub-del-optl-pkg)

    +

    Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group

    Unpublish, delete, or republish an optional package without having to disable, remove, edit, add, and re-enable the connection group on the App-V Client.

    You can also unpublish the optional package and republish it later without having to disable or republish the connection group.

    -  + ## Use one connection group, with optional packages, for multiple users with different packages entitled to them @@ -118,7 +118,7 @@ Before using optional packages, see [Requirements for using optional packages in

    Example connection group XML document with optional packages:

    <?xml version="1.0" ?>
     <AppConnectionGroup
    -   xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup"
    +   xmlns="http://schemas.microsoft.com/appv/2014/virtualapplicationconnectiongroup";
        AppConnectionGroupId="8105CCD5-244B-4BA1-8888-E321E688D2CB"
        VersionId="84CE3797-F1CB-4475-A223-757918929EB4"
        DisplayName="Contoso Software Connection Group" >
    @@ -164,7 +164,7 @@ Before using optional packages, see [Requirements for using optional packages in
     
     
     
    - 
    + 
     
     ## Unpublish or delete an optional package, or unpublish an optional package and republish it later, without changing the connection group
     
    @@ -212,7 +212,7 @@ Before using optional packages, see [Requirements for using optional packages in
     
  • Unpublish-AppvClientPackage

  • Remove-AppvClientPackage

  • -

    For more information, see [How to Manage App-V 5.1 Packages Running on a Stand-Alone Computer by Using PowerShell](how-to-manage-app-v-51-packages-running-on-a-stand-alone-computer-by-using-powershell.md).

    +

    For more information, see How to Manage App-V 5.1 Packages Running on a Stand-Alone Computer by Using PowerShell.

    @@ -231,7 +231,7 @@ Before using optional packages, see [Requirements for using optional packages in -  + ## Requirements for using optional packages in connection groups @@ -278,7 +278,7 @@ Review the following requirements before using optional packages in connection g -  + @@ -290,9 +290,9 @@ Review the following requirements before using optional packages in connection g [Managing Connection Groups](managing-connection-groups51.md) -  + -  + diff --git a/mdop/appv-v5/managing-connection-groups.md b/mdop/appv-v5/managing-connection-groups.md index 9592d9da68..baca427994 100644 --- a/mdop/appv-v5/managing-connection-groups.md +++ b/mdop/appv-v5/managing-connection-groups.md @@ -22,7 +22,7 @@ Connection groups enable the applications within a package to interact with each **Note**   In previous versions of App-V 5.0, connection groups were referred to as Dynamic Suite Composition. -  + **In this topic:** @@ -33,33 +33,33 @@ In previous versions of App-V 5.0, connection groups were referred to as Dynamic -

    [About the Connection Group Virtual Environment](about-the-connection-group-virtual-environment.md)

    +

    About the Connection Group Virtual Environment

    Describes the connection group virtual environment.

    -

    [About the Connection Group File](about-the-connection-group-file.md)

    +

    About the Connection Group File

    Describes the connection group file.

    -

    [How to Create a Connection Group](how-to-create-a-connection-group.md)

    +

    How to Create a Connection Group

    Explains how to create a new connection group.

    -

    [How to Create a Connection Group with User-Published and Globally Published Packages](how-to-create-a-connection-group-with-user-published-and-globally-published-packages.md)

    +

    How to Create a Connection Group with User-Published and Globally Published Packages

    Explains how to create a new connection group that contains a mix of packages that are published to the user and published globally.

    -

    [How to Delete a Connection Group](how-to-delete-a-connection-group.md)

    +

    How to Delete a Connection Group

    Explains how to delete a connection group.

    -

    [How to Publish a Connection Group](how-to-publish-a-connection-group.md)

    +

    How to Publish a Connection Group

    Explains how to publish a connection group.

    -  + @@ -71,9 +71,9 @@ In previous versions of App-V 5.0, connection groups were referred to as Dynamic - [Operations for App-V 5.0](operations-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/managing-connection-groups51.md b/mdop/appv-v5/managing-connection-groups51.md index 4de9c37aee..06ecc8b46b 100644 --- a/mdop/appv-v5/managing-connection-groups51.md +++ b/mdop/appv-v5/managing-connection-groups51.md @@ -22,7 +22,7 @@ Connection groups enable the applications within a package to interact with each **Note**   In some previous versions of App-V, connection groups were referred to as Dynamic Suite Composition. -  + **In this topic:** @@ -33,33 +33,33 @@ In some previous versions of App-V, connection groups were referred to as Dynami -

    [About the Connection Group Virtual Environment](about-the-connection-group-virtual-environment51.md)

    +

    About the Connection Group Virtual Environment

    Describes the connection group virtual environment.

    -

    [About the Connection Group File](about-the-connection-group-file51.md)

    +

    About the Connection Group File

    Describes the connection group file.

    -

    [How to Create a Connection Group](how-to-create-a-connection-group51.md)

    +

    How to Create a Connection Group

    Explains how to create a new connection group.

    -

    [How to Create a Connection Group with User-Published and Globally Published Packages](how-to-create-a-connection-group-with-user-published-and-globally-published-packages51.md)

    +

    How to Create a Connection Group with User-Published and Globally Published Packages

    Explains how to create a new connection group that contains a mix of packages that are published to the user and published globally.

    -

    [How to Delete a Connection Group](how-to-delete-a-connection-group51.md)

    +

    How to Delete a Connection Group

    Explains how to delete a connection group.

    -

    [How to Publish a Connection Group](how-to-publish-a-connection-group51.md)

    +

    How to Publish a Connection Group

    Explains how to publish a connection group.

    -  + @@ -71,9 +71,9 @@ In some previous versions of App-V, connection groups were referred to as Dynami - [Operations for App-V 5.1](operations-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md b/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md index 925c56feaf..b990ad8485 100644 --- a/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md +++ b/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md @@ -24,7 +24,7 @@ Consider the following sections when you plan your migration strategy: **Note**   For more information about the differences between App-V 4.6 and App-V 5.0, see the **Differences between App-V 4.6 and App-V 5.0 section** of [About App-V 5.0](about-app-v-50.md). -  + ## Converting packages created using a prior version of App-V @@ -34,7 +34,7 @@ Use the package converter utility to upgrade virtual application packages create **Important**   After you convert an existing package you should test the package prior to deploying the package to ensure the conversion process was successful. -  + **What to know before you convert existing packages** @@ -60,7 +60,7 @@ After you convert an existing package you should test the package prior to deplo

    Virtual packages using DSC are not linked after conversion.

    -

    Link the packages using connection groups. See [Managing Connection Groups](managing-connection-groups.md).

    +

    Link the packages using connection groups. See Managing Connection Groups.

    Environment variable conflicts are detected during conversion.

    @@ -73,7 +73,7 @@ After you convert an existing package you should test the package prior to deplo -  + When converting a package check for failing files or shortcuts. Locate the item in App-V 4.6 package. It could possibly be hard-coded path. Convert the path. @@ -82,7 +82,7 @@ It is recommended that you use the App-V 5.0 sequencer for converting critical a If a converted package does not open after you convert it, it is also recommended that you re-sequence the application using the App-V 5.0 sequencer. -  + [How to Convert a Package Created in a Previous Version of App-V](how-to-convert-a-package-created-in-a-previous-version-of-app-v.md) @@ -105,25 +105,25 @@ The following table displays the recommended method for upgrading clients.

    Upgrade your environment to App-V 4.6 SP2

    -

    [Application Virtualization Deployment and Upgrade Considerations](../appv-v4/application-virtualization-deployment-and-upgrade-considerations-copy.md).

    +

    Application Virtualization Deployment and Upgrade Considerations.

    Install the App-V 5.0 client with co-existence enabled.

    -

    [How to Deploy the App-V 4.6 and the App-V 5.0 Client on the Same Computer](how-to-deploy-the-app-v-46-and-the-app-v--50-client-on-the-same-computer.md).

    +

    How to Deploy the App-V 4.6 and the App-V 5.0 Client on the Same Computer.

    Sequence and roll out App-V 5.0 packages. As needed, unpublish App-V 4.6 packages.

    -

    [How to Sequence a New Application with App-V 5.0](how-to-sequence-a-new-application-with-app-v-50-beta-gb18030.md).

    +

    How to Sequence a New Application with App-V 5.0.

    -  + **Important**   You must be running App-V 4.6 SP3 to use coexistence mode. Additionally, when you sequence a package, you must configure the Managing Authority setting, which is in the **User Configuration** is located in the **User Configuration** section. -  + ## Migrating the App-V 5.0 Server Full Infrastructure @@ -144,15 +144,15 @@ There is no direct method to upgrade to a full App-V 5.0 infrastructure. Use the

    Upgrade your environment to App-V 4.6 SP3.

    -

    [Application Virtualization Deployment and Upgrade Considerations](../appv-v4/application-virtualization-deployment-and-upgrade-considerations-copy.md).

    +

    Application Virtualization Deployment and Upgrade Considerations.

    Deploy App-V 5.0 version of the client.

    -

    [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md).

    +

    How to Deploy the App-V Client.

    Install App-V 5.0 server.

    -

    [How to Deploy the App-V 5.0 Server](how-to-deploy-the-app-v-50-server-50sp3.md).

    +

    How to Deploy the App-V 5.0 Server.

    Migrate existing packages.

    @@ -161,7 +161,7 @@ There is no direct method to upgrade to a full App-V 5.0 infrastructure. Use the -  + ## Additional Migration tasks @@ -189,9 +189,9 @@ You can also perform additional migration tasks such as reconfiguring end points [A simplified Microsoft App-V 5.1 Management Server upgrade procedure](https://go.microsoft.com/fwlink/p/?LinkId=786330) -  + -  + diff --git a/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md b/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md index a392a1f2ff..33eb8f92b7 100644 --- a/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md +++ b/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md @@ -25,7 +25,7 @@ App-V 5.1 packages are exactly the same as App-V 5.0 packages. There has been no For more information about the differences between App-V 4.6 and App-V 5.1, see the **Differences between App-V 4.6 and App-V 5.0 section** of [About App-V 5.0](about-app-v-50.md). -  + ## Improvements to the App-V 5.1 Package Converter @@ -62,7 +62,7 @@ You can also use the `–OSDsToIncludeInPackage` parameter with the `ConvertFrom -  + ### Example conversion statement @@ -168,7 +168,7 @@ ConvertFrom-AppvLegacyPackage –SourcePath \\OldPkgStore\ContosoApp\ -  + ## Converting packages created using a prior version of App-V @@ -178,7 +178,7 @@ Use the package converter utility to upgrade virtual application packages create **Important**   After you convert an existing package you should test the package prior to deploying the package to ensure the conversion process was successful. -  + **What to know before you convert existing packages** @@ -196,7 +196,7 @@ After you convert an existing package you should test the package prior to deplo

    Virtual packages using DSC are not linked after conversion.

    -

    Link the packages using connection groups. See [Managing Connection Groups](managing-connection-groups51.md).

    +

    Link the packages using connection groups. See Managing Connection Groups.

    Environment variable conflicts are detected during conversion.

    @@ -209,7 +209,7 @@ After you convert an existing package you should test the package prior to deplo -  + When converting a package check for failing files or shortcuts. Locate the item in App-V 4.6 package. It could possibly be a hard-coded path. Convert the path. @@ -218,7 +218,7 @@ It is recommended that you use the App-V 5.1 sequencer for converting critical a If a converted package does not open after you convert it, it is also recommended that you re-sequence the application using the App-V 5.1 sequencer. -  + [How to Convert a Package Created in a Previous Version of App-V](how-to-convert-a-package-created-in-a-previous-version-of-app-v51.md) @@ -241,25 +241,25 @@ The following table displays the recommended method for upgrading clients.

    Upgrade your environment to the latest version of App-V 4.6

    -

    [Application Virtualization Deployment and Upgrade Considerations](../appv-v4/application-virtualization-deployment-and-upgrade-considerations-copy.md).

    +

    Application Virtualization Deployment and Upgrade Considerations.

    Install the App-V 5.1 client with co-existence enabled.

    -

    [How to Deploy the App-V 4.6 and the App-V 5.1 Client on the Same Computer](how-to-deploy-the-app-v-46-and-the-app-v--51-client-on-the-same-computer.md).

    +

    How to Deploy the App-V 4.6 and the App-V 5.1 Client on the Same Computer.

    Sequence and roll out App-V 5.1 packages. As needed, unpublish App-V 4.6 packages.

    -

    [How to Sequence a New Application with App-V 5.1](how-to-sequence-a-new-application-with-app-v-51-beta-gb18030.md).

    +

    How to Sequence a New Application with App-V 5.1.

    -  + **Important**   You must be running the latest version of App-V 4.6 to use coexistence mode. Additionally, when you sequence a package, you must configure the Managing Authority setting, which is in the **User Configuration** is located in the **User Configuration** section. -  + ## Migrating the App-V 5.1 Server Full Infrastructure @@ -280,15 +280,15 @@ There is no direct method to upgrade to a full App-V 5.1 infrastructure. Use the

    Upgrade your environment to the latest version of App-V 4.6.

    -

    [Application Virtualization Deployment and Upgrade Considerations](../appv-v4/application-virtualization-deployment-and-upgrade-considerations-copy.md).

    +

    Application Virtualization Deployment and Upgrade Considerations.

    Deploy App-V 5.1 version of the client.

    -

    [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-51gb18030.md).

    +

    How to Deploy the App-V Client.

    Install App-V 5.1 server.

    -

    [How to Deploy the App-V 5.1 Server](how-to-deploy-the-app-v-51-server.md).

    +

    How to Deploy the App-V 5.1 Server.

    Migrate existing packages.

    @@ -297,7 +297,7 @@ There is no direct method to upgrade to a full App-V 5.1 infrastructure. Use the -  + ## Additional Migration tasks @@ -325,9 +325,9 @@ You can also perform additional migration tasks such as reconfiguring end points [A simplified Microsoft App-V 5.1 Management Server upgrade procedure](https://go.microsoft.com/fwlink/p/?LinkId=786330) -  + -  + diff --git a/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md b/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md index 25a6a2a7fc..1850499cde 100644 --- a/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md +++ b/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md @@ -29,10 +29,10 @@ You should read and understand the following information before reading this doc - [Microsoft Application Virtualization 5.0 Sequencing Guide](https://go.microsoft.com/fwlink/?LinkId=269953) -**Note**   -Some terms used in this document may have different meanings depending on external source and context. For more information about terms used in this document followed by an asterisk **\*** review the [Application Virtualization Performance Guidance Terminology](#bkmk-terms1) section of this document. +**Note** +Some terms used in this document may have different meanings depending on external source and context. For more information about terms used in this document followed by an asterisk **\\*** review the [Application Virtualization Performance Guidance Terminology](#bkmk-terms1) section of this document. + -  Finally, this document will provide you with the information to configure the computer running App-V 5.0 client and the environment for optimal performance. Optimize your virtual application packages for performance using the sequencer, and to understand how to use User Experience Virtualization (UE-V) or other user environment management technologies to provide the optimal user experience with App-V 5.0 in both Remote Desktop Services (RDS) and non-persistent virtual desktop infrastructure (VDI). @@ -55,7 +55,7 @@ Use the information in the following section for more information: - Steps to Prepare the Base Image – Whether in a non-persistent VDI or RDSH environment, only a few steps must be completed in the base image to enable this approach. -- Use UE-V 2.0 as the User Profile Management (UPM) solution for the App-V approach – the cornerstone of this approach is the ability of a UEM solution to persist the contents of just a few registry and file locations. These locations constitute the user integrations\*. Be sure to review the specific requirements for the UPM solution. +- Use UE-V 2.0 as the User Profile Management (UPM) solution for the App-V approach – the cornerstone of this approach is the ability of a UEM solution to persist the contents of just a few registry and file locations. These locations constitute the user integrations\*. Be sure to review the specific requirements for the UPM solution. [User Experience Walk-through](#bkmk-uewt) @@ -88,7 +88,7 @@ Deployment Environment -  + Expected Configuration @@ -109,7 +109,7 @@ Expected Configuration -  + IT Administration @@ -126,7 +126,7 @@ IT Administration -  + ### Usage Scenario @@ -153,7 +153,7 @@ As you review the two scenarios, keep in mind that these approach the extremes. -  + ### Preparing your Environment @@ -178,7 +178,7 @@ The following table displays the required steps to prepare the base image and th
    • Install the Hotfix Package 4 for Application Virtualization 5.0 SP2 client version of the client.

    • Install UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

    • -
    • Configure for Shared Content Store (SCS) mode. For more information see [How to Install the App-V 5.0 Client for Shared Content Store Mode](how-to-install-the-app-v-50-client-for-shared-content-store-mode.md).

    • +
    • Configure for Shared Content Store (SCS) mode. For more information see How to Install the App-V 5.0 Client for Shared Content Store Mode.

    • Configure Preserve User Integrations on Login Registry DWORD.

    • Pre-configure all user- and global-targeted packages for example, Add-AppvClientPackage.

    • Pre-configure all user- and global-targeted connection groups for example, Add-AppvClientConnectionGroup.

    • @@ -198,7 +198,7 @@ The following table displays the required steps to prepare the base image and th
      • Install the Hotfix Package 4 for Application Virtualization 5.0 SP2 client version of the client.

      • Install UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

      • -
      • Configure for Shared Content Store (SCS) mode. For more information see [How to Install the App-V 5.0 Client for Shared Content Store Mode](how-to-install-the-app-v-50-client-for-shared-content-store-mode.md).

      • +
      • Configure for Shared Content Store (SCS) mode. For more information see How to Install the App-V 5.0 Client for Shared Content Store Mode.

      • Configure Preserve User Integrations on Login Registry DWORD.

      • Pre-configure all global-targeted packages for example, Add-AppvClientPackage.

      • Pre-configure all global-targeted connection groups for example, Add-AppvClientConnectionGroup.

      • @@ -209,7 +209,7 @@ The following table displays the required steps to prepare the base image and th -  + **Configurations** - For critical App-V Client configurations and for a little more context and how-to, review the following information: @@ -251,7 +251,7 @@ The following table displays the required steps to prepare the base image and th

        MaxConcurrentPublishingRefresh

          -
        • Configure in the Registry under HKEY_LOCAL_MACHINE \Software \ Microsoft \ AppV \Client \ Publishing.

        • +
        • Configure in the Registry under HKEY_LOCAL_MACHINE <strong>Software \ Microsoft \ AppV <strong>Client \ Publishing.

        • Create the DWORD value MaxConcurrentPublishingrefresh with the desired maximum number of concurrent publishing refreshes.

        • The App-V client service and computer do not need to be restarted.

        @@ -262,7 +262,7 @@ The following table displays the required steps to prepare the base image and th -  + ### Configure UE-V solution for App-V Approach @@ -272,7 +272,7 @@ For more information see [Getting Started With User Experience Virtualization 2. In essence all that is required is to install the UE-V client and download the following Microsoft authored App-V settings template from the [Microsoft User Experience Virtualization (UE-V) template gallery](https://gallery.technet.microsoft.com/Authored-UE-V-Settings-bb442a33). Register the template. For more information around UE-V templates see [The UE-V specific resource for acquiring and registering the template](https://technet.microsoft.com/library/dn458936.aspx). -**Note**   +**Note** Without performing an additional configuration step, the Microsoft User Environment Virtualization (UE-V) will not be able to synchronize the Start menu shortcuts (.lnk files) on the target computer. The .lnk file type is excluded by default. UE-V will only support removing the .lnk file type from the exclusion list in the RDS and VDI scenarios, where every user’s device will have the same set of applications installed to the same location and every .lnk file is valid for all the users’ devices. For example, UE-V would not currently support the following 2 scenarios, because the net result will be that the shortcut will be valid on one but not all devices. @@ -281,12 +281,12 @@ UE-V will only support removing the .lnk file type from the exclusion list in th - If a user has an application installed on one device but not another with .lnk files enabled. -  -**Important**   + +**Important** This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + Using the Microsoft Registry Editor (regedit.exe), navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **UEV** \\ **Agent** \\ **Configuration** \\ **ExcludedFileTypes** and remove **.lnk** from the excluded file types. @@ -401,7 +401,7 @@ This following is a step-by-step walk-through of the App-V and UPM operations an -  + @@ -426,13 +426,13 @@ This following is a step-by-step walk-through of the App-V and UPM operations an
        -  + ### Impact to Package Life Cycle Upgrading a package is a crucial aspect of the package lifecycle. To help guarantee users have access to the appropriate upgraded (published) or downgraded (un-published) virtual application packages, it is recommended you update the base image to reflect these changes. To understand why review the following section: -App-V 5.0 SP2 introduced the concept of pending states. In the past, +App-V 5.0 SP2 introduced the concept of pending states. In the past, - If an administrator changed entitlements or created a new version of a package (upgraded) and during a publishing/refresh that package was in-use, the un-publish or publish operation, respectively, would fail. @@ -456,11 +456,11 @@ About NGEN technology Server Performance Tuning Guidelines for -- [Microsoft Windows Server 2012 R2](https://msdn.microsoft.com/library/windows/hardware/dn529133.aspx) +- [Microsoft Windows Server 2012 R2](https://msdn.microsoft.com/library/windows/hardware/dn529133.aspx) -- [Microsoft Windows Server 2012](https://download.microsoft.com/download/0/0/B/00BE76AF-D340-4759-8ECD-C80BC53B6231/performance-tuning-guidelines-windows-server-2012.docx) +- [Microsoft Windows Server 2012](https://download.microsoft.com/download/0/0/B/00BE76AF-D340-4759-8ECD-C80BC53B6231/performance-tuning-guidelines-windows-server-2012.docx) -- [Microsoft Windows Server 2008 R2](https://download.microsoft.com/download/6/B/2/6B2EBD3A-302E-4553-AC00-9885BBF31E21/Perf-tun-srv-R2.docx) +- [Microsoft Windows Server 2008 R2](https://download.microsoft.com/download/6/B/2/6B2EBD3A-302E-4553-AC00-9885BBF31E21/Perf-tun-srv-R2.docx) **Server Roles** @@ -474,18 +474,18 @@ Server Performance Tuning Guidelines for **Windows Client (Guest OS) Performance Tuning Guidance** -- [Microsoft Windows 7](https://download.microsoft.com/download/E/5/7/E5783D68-160B-4366-8387-114FC3E45EB4/Performance Tuning Guidelines for Windows 7 Desktop Virtualization v1.9.docx) +- [Microsoft Windows 7](https://download.microsoft.com/download/E/5/7/E5783D68-160B-4366-8387-114FC3E45EB4/Performance Tuning Guidelines for Windows 7 Desktop Virtualization v1.9.docx) - [Optimization Script: (Provided by Microsoft Support)](http://blogs.technet.com/b/jeff_stokes/archive/2012/10/15/the-microsoft-premier-field-engineer-pfe-view-on-virtual-desktop-vdi-density.aspx) -- [Microsoft Windows 8](https://download.microsoft.com/download/6/0/1/601D7797-A063-4FA7-A2E5-74519B57C2B4/Windows_8_VDI_Image_Client_Tuning_Guide.pdf) +- [Microsoft Windows 8](https://download.microsoft.com/download/6/0/1/601D7797-A063-4FA7-A2E5-74519B57C2B4/Windows_8_VDI_Image_Client_Tuning_Guide.pdf) - [Optimization Script: (Provided by Microsoft Support)](http://blogs.technet.com/b/jeff_stokes/archive/2013/04/09/hot-off-the-presses-get-it-now-the-windows-8-vdi-optimization-script-courtesy-of-pfe.aspx) ## Sequencing Steps to Optimize Packages for Publishing Performance -App-V 5.0 and App-V 5.0 SP2 provide significant value in their respective releases. Several features facilitate new scenarios or enabled new customer deployment scenarios. These following features can impact the performance of the publishing and launch operations. +App-V 5.0 and App-V 5.0 SP2 provide significant value in their respective releases. Several features facilitate new scenarios or enabled new customer deployment scenarios. These following features can impact the performance of the publishing and launch operations. @@ -516,7 +516,7 @@ App-V 5.0 and App-V 5.0 SP2 provide significant value in their respective relea
        -  + ### Removing FB1 @@ -552,10 +552,10 @@ Removing FB1 does not require the original application installer. After completi "C:\\UpgradedPackages" - **Note**   + **Note** This cmdlet requires an executable (.exe) or batch file (.bat). You must provide an empty (does nothing) executable or batch file. -   + @@ -582,7 +582,7 @@ Removing FB1 does not require the original application installer. After completi
        -  + ### Creating a new virtual application package on the sequencer @@ -590,7 +590,7 @@ If, during sequencer monitoring, an SxS Assembly (such as a VC++ Runtime) is ins **Client Side**: -When publishing a virtual application package, the App-V 5.0 SP2 Client will detect if a required SxS dependency is already installed. If the dependency is unavailable on the computer and it is included in the package, a traditional Windows Insataller (.**msi**) installation of the SxS assembly will be initiated. As previously documented, simply install the dependency on the computer running the client to ensure that the Windows Installer (.msi) installation will not occur. +When publishing a virtual application package, the App-V 5.0 SP2 Client will detect if a required SxS dependency is already installed. If the dependency is unavailable on the computer and it is included in the package, a traditional Windows Insataller (.**msi**) installation of the SxS assembly will be initiated. As previously documented, simply install the dependency on the computer running the client to ensure that the Windows Installer (.msi) installation will not occur. @@ -619,7 +619,7 @@ When publishing a virtual application package, the App-V 5.0 SP2 Client will de
        -  + ### Disabling a Dynamic Configuration using Powershell @@ -669,7 +669,7 @@ For documentation on How to Apply a Dynamic Configuration, see: -  + ### Determining what virtual fonts exist in the package @@ -685,12 +685,14 @@ For documentation on How to Apply a Dynamic Configuration, see: <appv:Font Path="\[{Fonts}\]\\private\\CalibriL.ttf" DelayLoad="true"></appv:Font> - **Note**   + **Note** If there are fonts marked as **DelayLoad**, those will not impact first launch. -   - </appv:Fonts> + +~~~ +</appv:Fonts> +~~~ ### Excluding virtual fonts from the package @@ -749,9 +751,9 @@ The following terms are used when describing concepts and actions related to App [Microsoft Application Virtualization 5.0 Administrator's Guide](microsoft-application-virtualization-50-administrators-guide.md) -  - -  + + + diff --git a/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md b/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md index 8d7cad0c33..2833f23817 100644 --- a/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md +++ b/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md @@ -29,10 +29,10 @@ You should read and understand the following information before reading this doc - [Microsoft Application Virtualization Sequencing Guide](https://go.microsoft.com/fwlink/?LinkId=269953) -**Note**   -Some terms used in this document may have different meanings depending on external source and context. For more information about terms used in this document followed by an asterisk **\*** review the [Application Virtualization Performance Guidance Terminology](#bkmk-terms1) section of this document. +**Note** +Some terms used in this document may have different meanings depending on external source and context. For more information about terms used in this document followed by an asterisk **\\*** review the [Application Virtualization Performance Guidance Terminology](#bkmk-terms1) section of this document. + -  Finally, this document will provide you with the information to configure the computer running App-V 5.1 client and the environment for optimal performance. Optimize your virtual application packages for performance using the sequencer, and to understand how to use User Experience Virtualization (UE-V) or other user environment management technologies to provide the optimal user experience with App-V 5.1 in both Remote Desktop Services (RDS) and non-persistent virtual desktop infrastructure (VDI). @@ -55,7 +55,7 @@ Use the information in the following section for more information: - Steps to Prepare the Base Image – Whether in a non-persistent VDI or RDSH environment, only a few steps must be completed in the base image to enable this approach. -- Use UE-V 2.1 as the User Profile Management (UPM) solution for the App-V approach – the cornerstone of this approach is the ability of a UEM solution to persist the contents of just a few registry and file locations. These locations constitute the user integrations\*. Be sure to review the specific requirements for the UPM solution. +- Use UE-V 2.1 as the User Profile Management (UPM) solution for the App-V approach – the cornerstone of this approach is the ability of a UEM solution to persist the contents of just a few registry and file locations. These locations constitute the user integrations\*. Be sure to review the specific requirements for the UPM solution. [User Experience Walk-through](#bkmk-uewt) @@ -88,7 +88,7 @@ Deployment Environment -  + Expected Configuration @@ -109,7 +109,7 @@ Expected Configuration -  + IT Administration @@ -126,7 +126,7 @@ IT Administration -  + ### Usage Scenario @@ -153,7 +153,7 @@ As you review the two scenarios, keep in mind that these approach the extremes. -  + ### Preparing your Environment @@ -178,7 +178,7 @@ The following table displays the required steps to prepare the base image and th
        • Install the App-V 5.1 client version of the client.

        • Install UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

        • -
        • Configure for Shared Content Store (SCS) mode. For more information see [How to Install the App-V 5.1 Client for Shared Content Store Mode](how-to-install-the-app-v-51-client-for-shared-content-store-mode.md).

        • +
        • Configure for Shared Content Store (SCS) mode. For more information see How to Install the App-V 5.1 Client for Shared Content Store Mode.

        • Configure Preserve User Integrations on Login Registry DWORD.

        • Pre-configure all user- and global-targeted packages for example, Add-AppvClientPackage.

        • Pre-configure all user- and global-targeted connection groups for example, Add-AppvClientConnectionGroup.

        • @@ -198,7 +198,7 @@ The following table displays the required steps to prepare the base image and th
          • Install the App-V 5.1 client version of the client.

          • Install UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

          • -
          • Configure for Shared Content Store (SCS) mode. For more information see [How to Install the App-V 5.1 Client for Shared Content Store Mode](how-to-install-the-app-v-51-client-for-shared-content-store-mode.md).

          • +
          • Configure for Shared Content Store (SCS) mode. For more information see How to Install the App-V 5.1 Client for Shared Content Store Mode.

          • Configure Preserve User Integrations on Login Registry DWORD.

          • Pre-configure all global-targeted packages for example, Add-AppvClientPackage.

          • Pre-configure all global-targeted connection groups for example, Add-AppvClientConnectionGroup.

          • @@ -209,7 +209,7 @@ The following table displays the required steps to prepare the base image and th -  + **Configurations** - For critical App-V Client configurations and for a little more context and how-to, review the following information: @@ -251,7 +251,7 @@ The following table displays the required steps to prepare the base image and th

            MaxConcurrentPublishingRefresh

              -
            • Configure in the Registry under HKEY_LOCAL_MACHINE \Software \ Microsoft \ AppV \Client \ Publishing.

            • +
            • Configure in the Registry under HKEY_LOCAL_MACHINE <strong>Software \ Microsoft \ AppV <strong>Client \ Publishing.

            • Create the DWORD value MaxConcurrentPublishingrefresh with the desired maximum number of concurrent publishing refreshes.

            • The App-V client service and computer do not need to be restarted.

            @@ -262,7 +262,7 @@ The following table displays the required steps to prepare the base image and th -  + ### Configure UE-V solution for App-V Approach @@ -272,7 +272,7 @@ For more information see [Getting Started With User Experience Virtualization 2. In essence all that is required is to install the UE-V client and download the following Microsoft authored App-V settings template from the [Microsoft User Experience Virtualization (UE-V) template gallery](https://gallery.technet.microsoft.com/Authored-UE-V-Settings-bb442a33). Register the template. For more information around UE-V templates see [The UE-V specific resource for acquiring and registering the template](https://technet.microsoft.com/library/dn458926.aspx). -**Note**   +**Note** Without performing an additional configuration step, the Microsoft User Environment Virtualization (UE-V) will not be able to synchronize the Start menu shortcuts (.lnk files) on the target computer. The .lnk file type is excluded by default. UE-V will only support removing the .lnk file type from the exclusion list in the RDS and VDI scenarios, where every user’s device will have the same set of applications installed to the same location and every .lnk file is valid for all the users’ devices. For example, UE-V would not currently support the following 2 scenarios, because the net result will be that the shortcut will be valid on one but not all devices. @@ -281,12 +281,12 @@ UE-V will only support removing the .lnk file type from the exclusion list in th - If a user has an application installed on one device but not another with .lnk files enabled. -  -**Important**   + +**Important** This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + Using the Microsoft Registry Editor (regedit.exe), navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **UEV** \\ **Agent** \\ **Configuration** \\ **ExcludedFileTypes** and remove **.lnk** from the excluded file types. @@ -304,12 +304,12 @@ To enable an optimized login experience, for example the App-V 5.1 approach for - Attaching and detaching a user profile disk (UPD) or similar technology that contains the user integrations. - **Note**   + **Note** App-V is supported when using UPD only when the entire profile is stored on the user profile disk. App-V packages are not supported when using UPD with selected folders stored in the user profile disk. The Copy on Write driver does not handle UPD selected folders. -   + - Capturing changes to the locations, which constitute the user integrations, prior to session logoff. @@ -408,7 +408,7 @@ This following is a step-by-step walk-through of the App-V and UPM operations an -  + @@ -433,13 +433,13 @@ This following is a step-by-step walk-through of the App-V and UPM operations an
            -  + ### Impact to Package Life Cycle Upgrading a package is a crucial aspect of the package lifecycle. To help guarantee users have access to the appropriate upgraded (published) or downgraded (un-published) virtual application packages, it is recommended you update the base image to reflect these changes. To understand why review the following section: -App-V 5.0 SP2 introduced the concept of pending states. In the past, +App-V 5.0 SP2 introduced the concept of pending states. In the past, - If an administrator changed entitlements or created a new version of a package (upgraded) and during a publishing/refresh that package was in-use, the un-publish or publish operation, respectively, would fail. @@ -463,11 +463,11 @@ About NGEN technology Server Performance Tuning Guidelines for -- [Microsoft Windows Server 2012 R2](https://msdn.microsoft.com/library/windows/hardware/dn529133.aspx) +- [Microsoft Windows Server 2012 R2](https://msdn.microsoft.com/library/windows/hardware/dn529133.aspx) -- [Microsoft Windows Server 2012](https://download.microsoft.com/download/0/0/B/00BE76AF-D340-4759-8ECD-C80BC53B6231/performance-tuning-guidelines-windows-server-2012.docx) +- [Microsoft Windows Server 2012](https://download.microsoft.com/download/0/0/B/00BE76AF-D340-4759-8ECD-C80BC53B6231/performance-tuning-guidelines-windows-server-2012.docx) -- [Microsoft Windows Server 2008 R2](https://download.microsoft.com/download/6/B/2/6B2EBD3A-302E-4553-AC00-9885BBF31E21/Perf-tun-srv-R2.docx) +- [Microsoft Windows Server 2008 R2](https://download.microsoft.com/download/6/B/2/6B2EBD3A-302E-4553-AC00-9885BBF31E21/Perf-tun-srv-R2.docx) **Server Roles** @@ -481,11 +481,11 @@ Server Performance Tuning Guidelines for **Windows Client (Guest OS) Performance Tuning Guidance** -- [Microsoft Windows 7](https://download.microsoft.com/download/E/5/7/E5783D68-160B-4366-8387-114FC3E45EB4/Performance Tuning Guidelines for Windows 7 Desktop Virtualization v1.9.docx) +- [Microsoft Windows 7](https://download.microsoft.com/download/E/5/7/E5783D68-160B-4366-8387-114FC3E45EB4/Performance Tuning Guidelines for Windows 7 Desktop Virtualization v1.9.docx) - [Optimization Script: (Provided by Microsoft Support)](http://blogs.technet.com/b/jeff_stokes/archive/2012/10/15/the-microsoft-premier-field-engineer-pfe-view-on-virtual-desktop-vdi-density.aspx) -- [Microsoft Windows 8](https://download.microsoft.com/download/6/0/1/601D7797-A063-4FA7-A2E5-74519B57C2B4/Windows_8_VDI_Image_Client_Tuning_Guide.pdf) +- [Microsoft Windows 8](https://download.microsoft.com/download/6/0/1/601D7797-A063-4FA7-A2E5-74519B57C2B4/Windows_8_VDI_Image_Client_Tuning_Guide.pdf) - [Optimization Script: (Provided by Microsoft Support)](http://blogs.technet.com/b/jeff_stokes/archive/2013/04/09/hot-off-the-presses-get-it-now-the-windows-8-vdi-optimization-script-courtesy-of-pfe.aspx) @@ -523,7 +523,7 @@ Several App-V features facilitate new scenarios or enable new customer deploymen -  + ### Removing FB1 @@ -559,10 +559,10 @@ Removing FB1 does not require the original application installer. After completi "C:\\UpgradedPackages" - **Note**   + **Note** This cmdlet requires an executable (.exe) or batch file (.bat). You must provide an empty (does nothing) executable or batch file. -   + @@ -589,7 +589,7 @@ Removing FB1 does not require the original application installer. After completi
            -  + ### Creating a new virtual application package on the sequencer @@ -626,7 +626,7 @@ When publishing a virtual application package, the App-V Client will detect if a -  + ### Disabling a Dynamic Configuration using Powershell @@ -676,7 +676,7 @@ For documentation on How to Apply a Dynamic Configuration, see: -  + ### Determining what virtual fonts exist in the package @@ -692,12 +692,14 @@ For documentation on How to Apply a Dynamic Configuration, see: <appv:Font Path="\[{Fonts}\]\\private\\CalibriL.ttf" DelayLoad="true"></appv:Font> - **Note**   + **Note** If there are fonts marked as **DelayLoad**, those will not impact first launch. -   - </appv:Fonts> + +~~~ +</appv:Fonts> +~~~ ### Excluding virtual fonts from the package @@ -756,9 +758,9 @@ The following terms are used when describing concepts and actions related to App [Microsoft Application Virtualization 5.1 Administrator's Guide](microsoft-application-virtualization-51-administrators-guide.md) -  - -  + + + diff --git a/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md b/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md index 1f974dd93f..b861440d22 100644 --- a/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md +++ b/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md @@ -58,7 +58,7 @@ Review the following for more information about configuring IIS and Network Load **Note**   The IIS Network Load Balancing functionality in Windows Server 2012 is generally the same as in Windows Server 2008 R2. However, some task details are changed in Windows Server 2012. For information on new ways to do tasks, see [Common Management Tasks and Navigation in Windows Server 2012 R2 Preview and Windows Server 2012](https://go.microsoft.com/fwlink/?LinkId=316371) (https://go.microsoft.com/fwlink/?LinkId=316371). -   + ## Support for clustered file servers when running (SCS) mode @@ -111,7 +111,7 @@ Use the following steps to modify the connection string to include **failover pa **Important**   This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + 1. Login to the management server and open **regedit**. @@ -124,7 +124,7 @@ This topic describes how to change the Windows registry by using Registry Editor **Note**   Database Mirroring is on the list of Deprecated Database Engine Features for Microsoft SQL Server 2012 due to the **AlwaysOn** feature available with Microsoft SQL Server 2012. -   + Click any of the following links for more information: @@ -146,9 +146,9 @@ The App-V 5.0 management server database supports deployments to computers runni [Planning to Deploy App-V](planning-to-deploy-app-v.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md b/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md index 9849aeac9f..c3e0e18888 100644 --- a/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md +++ b/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md @@ -58,7 +58,7 @@ Review the following for more information about configuring IIS and Network Load **Note**   The IIS Network Load Balancing functionality in Windows Server 2012 is generally the same as in Windows Server 2008 R2. However, some task details are changed in Windows Server 2012. For information on new ways to do tasks, see [Common Management Tasks and Navigation in Windows Server 2012 R2 Preview and Windows Server 2012](https://go.microsoft.com/fwlink/?LinkId=316371) (https://go.microsoft.com/fwlink/?LinkId=316371). -   + ## Support for clustered file servers when running (SCS) mode @@ -111,7 +111,7 @@ Use the following steps to modify the connection string to include **failover pa **Important**   This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + 1. Login to the management server and open **regedit**. @@ -124,7 +124,7 @@ This topic describes how to change the Windows registry by using Registry Editor **Note**   Database Mirroring is on the list of Deprecated Database Engine Features for Microsoft SQL Server 2012 due to the **AlwaysOn** feature available with Microsoft SQL Server 2012. -   + Click any of the following links for more information: @@ -151,9 +151,9 @@ The App-V 5.1 management server database supports deployments to computers runni [Planning to Deploy App-V](planning-to-deploy-app-v51.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md index 8dc2bc2d73..0413cff809 100644 --- a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md +++ b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md @@ -69,7 +69,7 @@ The following table shows the supported App-V coexistence scenarios. We recommen -  + ### Requirements for running coexisting clients @@ -97,16 +97,16 @@ The following table provides link to the TechNet documentation about the release

            App-V 4.6 SP3

            -

            [About Microsoft Application Virtualization 4.6 SP3](https://technet.microsoft.com/library/dn511019.aspx)

            +

            About Microsoft Application Virtualization 4.6 SP3

            App-V 5.0 SP3

            -

            [About Microsoft Application Virtualization 5.0 SP3](about-app-v-50-sp3.md)

            +

            About Microsoft Application Virtualization 5.0 SP3

            -  + For more information about how to configure App-V 5.0 client coexistence, see: @@ -135,9 +135,9 @@ For more information about using the package converter to convert a package, see [Planning to Deploy App-V](planning-to-deploy-app-v.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md index 79caeaacb9..a895f50b35 100644 --- a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md +++ b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md @@ -69,7 +69,7 @@ The following table shows the supported App-V coexistence scenarios. We recommen -  + ### Requirements for running coexisting clients @@ -82,7 +82,7 @@ To run coexisting clients, you must: **Note**   App-V 5.1 packages can run side by side with App-V 4.6 packages if you have coexisting installations of App-V 5.1 and 4.6. However, App-V 5.1 packages cannot interact with App-V 4.6 packages in the same virtual environment. -  + ### Client downloads and documentation @@ -102,16 +102,16 @@ The following table provides links to the App-V 4.6 client downloads and to the

            App-V 4.6 SP3

            -

            [About Microsoft Application Virtualization 4.6 SP3](https://technet.microsoft.com/library/dn511019.aspx)

            +

            About Microsoft Application Virtualization 4.6 SP3

            App-V 4.6 SP3

            -

            [About Microsoft Application Virtualization 5.1](about-app-v-51.md)

            +

            About Microsoft Application Virtualization 5.1

            -  + For more information about how to configure App-V 5.1 client coexistence, see: @@ -140,9 +140,9 @@ For more information about using the package converter to convert a package, see [Planning to Deploy App-V](planning-to-deploy-app-v51.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md b/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md index 25a538f860..d27170ec67 100644 --- a/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md +++ b/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md @@ -27,7 +27,7 @@ App-V 5.0 uses a process called sequencing to create virtualized applications an **Note**   For information about the new functionality of App-V 5.0 sequencer, see the **Changes to the sequencer** section of [What's New in App-V 5.0](whats-new-in-app-v-50.md). -  + The computer that runs the App-V 5.0 sequencer must meet the minimum system requirements. For a list of these requirements, see [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md). @@ -42,7 +42,7 @@ Ideally, you should install the sequencer on a computer running as a virtual mac **Important**   You should have your corporate security team review and approve the sequencing process plan. For security reasons, you should keep the sequencer operations in a lab that is separate from the production environment. The separation arrangement can be as simple or as comprehensive as necessary, based on your business requirements. The sequencing computers must be able to connect to the corporate network to copy finished packages to the production servers. However, because the sequencing computers are typically operated without antivirus protection, they must not be on the corporate network unprotected. For example, you might be able to operate behind a firewall or on an isolated network segment. You might also be able to use virtual machines that are configured to share an isolated virtual network. Follow your corporate security policies to safely address these concerns. -  + [How to Install the Sequencer](how-to-install-the-sequencer-beta-gb18030.md) @@ -97,9 +97,9 @@ The following list displays some of the benefits of using the App-V 5.0 shared c [Planning to Deploy App-V](planning-to-deploy-app-v.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md b/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md index e1c6a12f3c..a86ccf90cc 100644 --- a/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md +++ b/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md @@ -54,7 +54,7 @@ The App-V 5.0 Management Server contains the repository of packages and their as **Note**   The Management Server does not perform any load balancing. The associated metadata is simply passed to the publishing server for use when processing client requests. -  + ## Server-Related Protocols and External Features @@ -97,7 +97,7 @@ The following displays information about server-related protocols used by the Ap -  + @@ -111,9 +111,9 @@ The following displays information about server-related protocols used by the Ap [Deploying the App-V 5.0 Server](deploying-the-app-v-50-server.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md b/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md index 1ce8a1bc54..03e04d5ec3 100644 --- a/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md +++ b/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md @@ -27,7 +27,7 @@ App-V 5.1 uses a process called sequencing to create virtualized applications an **Note**   For information about the new functionality of App-V 5.1 sequencer, see the **Sequencer Improvements** section of [About App-V 5.1](about-app-v-51.md). -  + The computer that runs the App-V 5.1 sequencer must meet the minimum system requirements. For a list of these requirements, see [App-V 5.1 Supported Configurations](app-v-51-supported-configurations.md). @@ -42,7 +42,7 @@ Ideally, you should install the sequencer on a computer running as a virtual mac **Important**   You should have your corporate security team review and approve the sequencing process plan. For security reasons, you should keep the sequencer operations in a lab that is separate from the production environment. The separation arrangement can be as simple or as comprehensive as necessary, based on your business requirements. The sequencing computers must be able to connect to the corporate network to copy finished packages to the production servers. However, because the sequencing computers are typically operated without antivirus protection, they must not be on the corporate network unprotected. For example, you might be able to operate behind a firewall or on an isolated network segment. You might also be able to use virtual machines that are configured to share an isolated virtual network. Follow your corporate security policies to safely address these concerns. -  + ## Planning for App-V 5.1 client deployment @@ -100,9 +100,9 @@ The following list displays some of the benefits of using the App-V 5.1 shared c [How to Install the App-V 5.1 Client for Shared Content Store Mode](how-to-install-the-app-v-51-client-for-shared-content-store-mode.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md b/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md index c699fc9186..7d2ec754d2 100644 --- a/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md +++ b/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md @@ -54,7 +54,7 @@ The App-V 5.1 Management Server contains the repository of packages and their as **Note**   The Management Server does not perform any load balancing. The associated metadata is simply passed to the publishing server for use when processing client requests. -  + ## Server-Related Protocols and External Features @@ -97,7 +97,7 @@ The following displays information about server-related protocols used by the Ap -  + @@ -111,9 +111,9 @@ The following displays information about server-related protocols used by the Ap [Deploying the App-V 5.1 Server](deploying-the-app-v-51-server.md) -  + -  + diff --git a/mdop/appv-v5/planning-for-using-app-v-with-office.md b/mdop/appv-v5/planning-for-using-app-v-with-office.md index 87c81d9939..76440328d4 100644 --- a/mdop/appv-v5/planning-for-using-app-v-with-office.md +++ b/mdop/appv-v5/planning-for-using-app-v-with-office.md @@ -35,7 +35,7 @@ You can use the App-V 5.0 Sequencer to create plug-in packages for Language Pack **Note**   Microsoft Visio and Microsoft Project do not provide support for the Thai Language Pack. -  + ## Supported versions of Microsoft Office @@ -105,7 +105,7 @@ The following table lists the versions of Microsoft Office that App-V supports, -  + ## Planning for using App-V with coexisting versions of Office @@ -132,16 +132,16 @@ Before implementing Office coexistence, review the following Office documentatio

            Office 2013

            -

            [Information about how to use Office 2013 suites and programs (MSI deployment) on a computer that is running another version of Office](https://support.microsoft.com/kb/2784668)

            +

            Information about how to use Office 2013 suites and programs (MSI deployment) on a computer that is running another version of Office

            Office 2010

            -

            [Information about how to use Office 2010 suites and programs on a computer that is running another version of Office](https://support.microsoft.com/kb/2121447)

            +

            Information about how to use Office 2010 suites and programs on a computer that is running another version of Office

            -  + The Office documentation provides extensive guidance on coexistence for Windows Installer-based (MSi) and Click-to-Run installations of Office. This App-V topic on coexistence supplements the Office guidance with information that is more specific to App-V deployments. @@ -152,7 +152,7 @@ The following tables summarize the supported coexistence scenarios. They are org **Note**   Microsoft does not support the use of multiple versions of Office in Windows Server environments that have the Remote Desktop Session Host role service enabled. To run Office coexistence scenarios, you must disable this role service. -  + ### Windows integrations & Office coexistence @@ -185,7 +185,7 @@ The Windows Installer-based and Click-to-Run Office installation methods integra -  + Microsoft recommends that you deploy Office coexistence with only one integrated Office instance. For example, if you’re using App-V to deploy Office 2010 and Office 2013, you should sequence Office 2010 in non-integrated mode. For more information about sequencing Office in non-integration (isolated) mode, see [How to sequence Microsoft Office 2010 in Microsoft Application Virtualization 5.0](https://support.microsoft.com/kb/2830069). @@ -296,7 +296,7 @@ The Office 2013 App-V package supports the following integration points with the

            Active X Controls:

            -

            For more information on ActiveX controls, refer to [ActiveX Control API Reference](https://go.microsoft.com/fwlink/p/?LinkId=331361).

            +

            For more information on ActiveX controls, refer to ActiveX Control API Reference.

               Groove.SiteClient

            @@ -381,16 +381,16 @@ The Office 2013 App-V package supports the following integration points with the -  + -  + -  + diff --git a/mdop/appv-v5/planning-for-using-app-v-with-office51.md b/mdop/appv-v5/planning-for-using-app-v-with-office51.md index dd4361df78..cb8f378a54 100644 --- a/mdop/appv-v5/planning-for-using-app-v-with-office51.md +++ b/mdop/appv-v5/planning-for-using-app-v-with-office51.md @@ -35,14 +35,14 @@ You can use the App-V 5.1 Sequencer to create plug-in packages for Language Pack >**Note**   Microsoft Visio and Microsoft Project do not provide support for the Thai Language Pack. -  + ## Supported versions of Microsoft Office See [Microsoft Office Product IDs that App-V supports](https://support.microsoft.com/help/2842297/product-ids-that-are-supported-by-the-office-deployment-tool-for-click) for a list of supported Office products. >**Note**  You must use the Office Deployment Tool to create App-V packages for Office 365 ProPlus. Creating packages for the volume-licensed versions of Office Professional Plus or Office Standard is not supported. You cannot use the App-V Sequencer. -  + ## Planning for using App-V with coexisting versions of Office @@ -69,16 +69,16 @@ Before implementing Office coexistence, review the following Office documentatio

            Office 2013

            -

            [Information about how to use Office 2013 suites and programs (MSI deployment) on a computer that is running another version of Office](https://support.microsoft.com/kb/2784668)

            +

            Information about how to use Office 2013 suites and programs (MSI deployment) on a computer that is running another version of Office

            Office 2010

            -

            [Information about how to use Office 2010 suites and programs on a computer that is running another version of Office](https://support.microsoft.com/kb/2121447)

            +

            Information about how to use Office 2010 suites and programs on a computer that is running another version of Office

            -  + The Office documentation provides extensive guidance on coexistence for Windows Installer-based (MSi) and Click-to-Run installations of Office. This App-V topic on coexistence supplements the Office guidance with information that is more specific to App-V deployments. @@ -89,7 +89,7 @@ The following tables summarize the supported coexistence scenarios. They are org >**Note**   Microsoft does not support the use of multiple versions of Office in Windows Server environments that have the Remote Desktop Session Host role service enabled. To run Office coexistence scenarios, you must disable this role service. -  + ### Windows integrations & Office coexistence @@ -122,7 +122,7 @@ The Windows Installer-based and Click-to-Run Office installation methods integra -  + Microsoft recommends that you deploy Office coexistence with only one integrated Office instance. For example, if you’re using App-V to deploy Office 2010 and Office 2013, you should sequence Office 2010 in non-integrated mode. For more information about sequencing Office in non-integration (isolated) mode, see [How to sequence Microsoft Office 2010 in Microsoft Application Virtualization 5.0](https://support.microsoft.com/kb/2830069). @@ -233,7 +233,7 @@ The Office 2013 App-V package supports the following integration points with the

            Active X Controls:

            -

            For more information on ActiveX controls, refer to [ActiveX Control API Reference](https://go.microsoft.com/fwlink/p/?LinkId=331361).

            +

            For more information on ActiveX controls, refer to ActiveX Control API Reference.

               Groove.SiteClient

            @@ -318,16 +318,16 @@ The Office 2013 App-V package supports the following integration points with the -  + -  + -  + diff --git a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md index e6b9ed32ea..e5be2f3b21 100644 --- a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md +++ b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md @@ -48,11 +48,11 @@ This topic contains the following sections:
            • Files under %appdata%\Microsoft\AppV\Client\Catalog

            • Registry settings under HKEY_CURRENT_USER\Software\Microsoft\AppV\Client\Packages

              -

              For more detail, see [Application Publishing and Client Interaction](application-publishing-and-client-interaction.md#bkmk-clt-inter-roam-reqs).

            • +

              For more detail, see Application Publishing and Client Interaction.

          • Ensure that the following folders are available to each user who logs into the computer that is running the App-V 5.0 SP2 or later client:

              -
            • %AppData% is configured to the desired network location (with or without [Offline Files](https://technet.microsoft.com/library/cc780552.aspx) support).

            • +
            • %AppData% is configured to the desired network location (with or without Offline Files support).

            • %LocalAppData% is configured to the desired local folder.

          @@ -85,13 +85,13 @@ This topic contains the following sections: -

           

          +

        -  + ## How to configure folder redirection for use with App-V @@ -126,23 +126,22 @@ The following table describes how folder redirection works when %AppData% is red
      • Entries to the AppData folder are made using the user context, not the system context.

      -Note   -

      The App-V client folder redirection sometimes fails to move files from %AppData% to %LocalAppData%. See [Release Notes for App-V 5.0 SP2](release-notes-for-app-v-50-sp2.md#bkmk-folderredirection).

      +Note

      The App-V client folder redirection sometimes fails to move files from %AppData% to %LocalAppData%. See Release Notes for App-V 5.0 SP2.

      -  +

      When the virtual environment shuts down

      The local cached data in AppData (roaming) is zipped up and copied to the “real” roaming AppData folder in %AppData%. A time stamp, which indicates the last known upload, is simultaneously saved as a registry key under:

      -

      HKCU\Software\Microsoft\AppV\Client\Packages\<PACKAGE_GUID>\AppDataTime

      +

      HKCU\Software\Microsoft\AppV\Client\Packages&lt;PACKAGE_GUID>\AppDataTime

      To provide redundancy, App-V 5.0 keeps the three most recent copies of the compressed data under %AppData%.

      -  + ## Overview of folder redirection @@ -168,25 +167,25 @@ The following table describes how folder redirection works when %AppData% is red

      Usage example

      -

      You can redirect the Documents folder, which is usually stored on the computer's local hard disk, to a network location. The user can access the documents in the folder from any computer on the network.

      +

      You can redirect the Documents folder, which is usually stored on the computer's local hard disk, to a network location. The user can access the documents in the folder from any computer on the network.

      More resources

      -

      [Folder redirection overview](https://technet.microsoft.com/library/cc778976.aspx)

      +

      Folder redirection overview

      -  -  - -  + + + + diff --git a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md index 5b13c714d6..b64d421000 100644 --- a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md +++ b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md @@ -48,11 +48,11 @@ This topic contains the following sections:
      • Files under %appdata%\Microsoft\AppV\Client\Catalog

      • Registry settings under HKEY_CURRENT_USER\Software\Microsoft\AppV\Client\Packages

        -

        For more detail, see [Application Publishing and Client Interaction](application-publishing-and-client-interaction.md#bkmk-clt-inter-roam-reqs).

      • +

        For more detail, see Application Publishing and Client Interaction.

    • Ensure that the following folders are available to each user who logs into the computer that is running the App-V 5.0 SP2 or later client:

        -
      • %AppData% is configured to the desired network location (with or without [Offline Files](https://technet.microsoft.com/library/cc780552.aspx) support).

      • +
      • %AppData% is configured to the desired network location (with or without Offline Files support).

      • %LocalAppData% is configured to the desired local folder.

    @@ -85,13 +85,13 @@ This topic contains the following sections: -

     

    +

    -  + ## How to configure folder redirection for use with App-V @@ -126,23 +126,22 @@ The following table describes how folder redirection works when %AppData% is red
  • Entries to the AppData folder are made using the user context, not the system context.

  • -Note   -

    The App-V client folder redirection sometimes fails to move files from %AppData% to %LocalAppData%. See [Release Notes for App-V 5.0 SP2](release-notes-for-app-v-50-sp2.md#bkmk-folderredirection).

    +Note

    The App-V client folder redirection sometimes fails to move files from %AppData% to %LocalAppData%. See Release Notes for App-V 5.0 SP2.

    -  +

    When the virtual environment shuts down

    The local cached data in AppData (roaming) is zipped up and copied to the “real” roaming AppData folder in %AppData%. A time stamp, which indicates the last known upload, is simultaneously saved as a registry key under:

    -

    HKCU\Software\Microsoft\AppV\Client\Packages\<PACKAGE_GUID>\AppDataTime

    +

    HKCU\Software\Microsoft\AppV\Client\Packages&lt;PACKAGE_GUID>\AppDataTime

    To provide redundancy, App-V keeps the three most recent copies of the compressed data under %AppData%.

    -  + ## Overview of folder redirection @@ -168,25 +167,25 @@ The following table describes how folder redirection works when %AppData% is red

    Usage example

    -

    You can redirect the Documents folder, which is usually stored on the computer's local hard disk, to a network location. The user can access the documents in the folder from any computer on the network.

    +

    You can redirect the Documents folder, which is usually stored on the computer's local hard disk, to a network location. The user can access the documents in the folder from any computer on the network.

    More resources

    -

    [Folder redirection overview](https://technet.microsoft.com/library/cc778976.aspx)

    +

    Folder redirection overview

    -  -  - -  + + + + diff --git a/mdop/appv-v5/release-notes-for-app-v-50-sp1.md b/mdop/appv-v5/release-notes-for-app-v-50-sp1.md index c19447b6b2..2437a3abaa 100644 --- a/mdop/appv-v5/release-notes-for-app-v-50-sp1.md +++ b/mdop/appv-v5/release-notes-for-app-v-50-sp1.md @@ -36,7 +36,7 @@ We are interested in your feedback on App-V 5.0. You can send your feedback to < **Note**   This email address is not a support channel, but your feedback will help us to plan for future changes in our documentation and product releases. -  + For the latest information about MDOP and additional learning resources, see the [MDOP Information Experience](https://go.microsoft.com/fwlink/p/?LinkId=236032) page. @@ -64,9 +64,9 @@ Microsoft, Active Directory, ActiveX, Bing, Excel, Silverlight, SQL Server, Win [About App-V 5.0](about-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/release-notes-for-app-v-50-sp2.md b/mdop/appv-v5/release-notes-for-app-v-50-sp2.md index 147b264d62..5f24db040f 100644 --- a/mdop/appv-v5/release-notes-for-app-v-50-sp2.md +++ b/mdop/appv-v5/release-notes-for-app-v-50-sp2.md @@ -36,7 +36,7 @@ We are interested in your feedback on App-V 5.0. You can send your feedback to < **Note**   This email address is not a support channel, but your feedback will help us to plan for future changes in our documentation and product releases. -  + For the latest information about MDOP and additional learning resources, see the [MDOP Information Experience](https://go.microsoft.com/fwlink/p/?LinkId=236032) page. @@ -58,7 +58,7 @@ If the following folder exists, then you must delete it: **Note**   You must have elevated privileges to delete this folder. -  + To use a script, for each user account on the computer and for each package id that was published after installing Hotfix Package 4 for Application Virtualization 5.0 SP2: @@ -160,9 +160,9 @@ Microsoft, Active Directory, ActiveX, Bing, Excel, Silverlight, SQL Server, Win [About App-V 5.0 SP2](about-app-v-50-sp2.md) -  + -  + diff --git a/mdop/appv-v5/release-notes-for-app-v-50.md b/mdop/appv-v5/release-notes-for-app-v-50.md index 8d2f1559c6..4e86811e9d 100644 --- a/mdop/appv-v5/release-notes-for-app-v-50.md +++ b/mdop/appv-v5/release-notes-for-app-v-50.md @@ -36,7 +36,7 @@ We are interested in your feedback on App-V 5.0. You can send your feedback to < **Note**   This email address is not a support channel, but your feedback will help us to plan for future changes in our documentation and product releases. -  + For the latest information about MDOP and additional learning resources, see the [MDOP Information Experience](https://go.microsoft.com/fwlink/p/?LinkId=236032) page. @@ -76,9 +76,9 @@ Microsoft, Active Directory, ActiveX, Bing, Excel, Silverlight, SQL Server, Win [About App-V 5.0](about-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/release-notes-for-app-v-51.md b/mdop/appv-v5/release-notes-for-app-v-51.md index d0a0cddc95..f6c42f34ad 100644 --- a/mdop/appv-v5/release-notes-for-app-v-51.md +++ b/mdop/appv-v5/release-notes-for-app-v-51.md @@ -131,7 +131,7 @@ The Permissions.sql script should be updated according to **Step 2** in [KB arti **Important**   **Step 1** is not required for versions of App-V later than App-V 5.0 SP3. -  + ## Microsoft Visual Studio 2012 not supported @@ -179,7 +179,7 @@ Occassionally when mounting a package, a "File Not Found" (0x80070002) error is Default 5
    -**Note**: this value is the default if the registry key is not defined or a value <=5 is specified. +Note: this value is the default if the registry key is not defined or a value <=5 is specified. @@ -195,9 +195,9 @@ Occassionally when mounting a package, a "File Not Found" (0x80070002) error is [About App-V 5.1](about-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md index ec086782d8..8fb9c2b17a 100644 --- a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md +++ b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md @@ -67,7 +67,7 @@ There is no Group Policy setting available to manage this registry key, so you h -  + ### Steps to create the subkey @@ -112,7 +112,7 @@ There is no Group Policy setting available to manage this registry key, so you h -   + 2. Set the new registry subkey’s value to the PackageId and VersionId of the package, separating the values with an underscore. @@ -141,7 +141,7 @@ Use the following example syntax, and substitute the name of your package for ** `Start-AppvVirtualProcess -AppvClientObject $AppVName cmd.exe` -If you don’t know the exact name of your package, you can use the command line **Get-AppvClientPackage \*executable\***, where **executable** is the name of the application, for example: Get-AppvClientPackage \*Word\*. +If you don’t know the exact name of your package, you can use the command line **Get-AppvClientPackage \*executable\\**, where **executable* is the name of the application, for example: Get-AppvClientPackage \*Word\*. ## Command line switch /appvpid:<PID> @@ -171,7 +171,7 @@ To get the package GUID and version GUID of your application, run the **Get-Appv - Version ID of the desired package -If you don’t know the exact name of your package, use the command line **Get-AppvClientPackage \*executable\***, where **executable** is the name of the application, for example: Get-AppvClientPackage \*Word\*. +If you don’t know the exact name of your package, use the command line **Get-AppvClientPackage \*executable\\**, where **executable* is the name of the application, for example: Get-AppvClientPackage \*Word\*. This method lets you launch any command within the context of an App-V package, regardless of whether the package is currently running. @@ -185,9 +185,9 @@ This method lets you launch any command within the context of an App-V package, [Technical Reference for App-V 5.0](technical-reference-for-app-v-50.md) -  + -  + diff --git a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md index c875250171..147684b66e 100644 --- a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md +++ b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md @@ -67,7 +67,7 @@ There is no Group Policy setting available to manage this registry key, so you h -  + ### Steps to create the subkey @@ -112,7 +112,7 @@ There is no Group Policy setting available to manage this registry key, so you h -   + 2. Set the new registry subkey’s value to the PackageId and VersionId of the package, separating the values with an underscore. @@ -141,7 +141,7 @@ Use the following example syntax, and substitute the name of your package for ** `Start-AppvVirtualProcess -AppvClientObject $AppVName cmd.exe` -If you don’t know the exact name of your package, you can use the command line **Get-AppvClientPackage \*executable\***, where **executable** is the name of the application, for example: Get-AppvClientPackage \*Word\*. +If you don’t know the exact name of your package, you can use the command line **Get-AppvClientPackage \*executable\\**, where **executable* is the name of the application, for example: Get-AppvClientPackage \*Word\*. ## Command line switch /appvpid:<PID> @@ -171,7 +171,7 @@ To get the package GUID and version GUID of your application, run the **Get-Appv - Version ID of the desired package -If you don’t know the exact name of your package, use the command line **Get-AppvClientPackage \*executable\***, where **executable** is the name of the application, for example: Get-AppvClientPackage \*Word\*. +If you don’t know the exact name of your package, use the command line **Get-AppvClientPackage \*executable\\**, where **executable* is the name of the application, for example: Get-AppvClientPackage \*Word\*. This method lets you launch any command within the context of an App-V package, regardless of whether the package is currently running. @@ -185,9 +185,9 @@ This method lets you launch any command within the context of an App-V package, [Technical Reference for App-V 5.1](technical-reference-for-app-v-51.md) -  + -  + diff --git a/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md b/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md index 7797a01f6d..ab6061698c 100644 --- a/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md +++ b/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md @@ -58,7 +58,7 @@ In App-V 5.0 SP3, you must provide the following values in the address when you -  + ## Query syntax for viewing publishing metadata @@ -114,9 +114,9 @@ The following table provides the syntax and query examples. -

     

    +

    To get the name of the Publishing server and the port number (http://<PubServer>:<Publishing Port#>) from the App-V Client, look at the URL configuration of the Get-AppvPublishingServer PowerShell cmdlet.

    -

    http://pubsvr01:2718/?clientversion=5.0.10066.0&clientos=WindowsClient_6.2_x64

    +

    http://pubsvr01:2718/?clientversion=5.0.10066.0&clientos=WindowsClient_6.2_x64

    In the example:

    • A Windows Server 2012 R2 named “pubsvr01” hosts the Publishing service.

    • @@ -127,20 +127,19 @@ The following table provides the syntax and query examples.

      App-V 5.0 through App-V 5.0 SP2

      http://<PubServer>:<Publishing Port#>/

      -Note   -

      ClientVersion and ClientOS are supported only in App-V 5.0 SP3.

      +Note

      ClientVersion and ClientOS are supported only in App-V 5.0 SP3.

      -  +

      See the information for App-V 5.0 SP3.

      -

      http://pubsvr01:2718

      +

      http://pubsvr01:2718

      In the example, A Windows Server 2012 R2 named “pubsvr01” hosts the Management and Publishing services.

      -  + ## Query values for client operating system and version @@ -224,7 +223,7 @@ In your publishing metadata query, enter the string values that correspond to th -  + ## Definition of publishing metadata @@ -249,9 +248,9 @@ You can view the metadata for each request in an Internet browser by using a que [Technical Reference for App-V 5.0](technical-reference-for-app-v-50.md) -  - -  + + + diff --git a/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md b/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md index 84cb9bd16e..9d1b578f94 100644 --- a/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md +++ b/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md @@ -58,7 +58,7 @@ In App-V 5.1, you must provide the following values in the address when you quer -  + ## Query syntax for viewing publishing metadata @@ -114,9 +114,9 @@ The following table provides the syntax and query examples. -

       

      +

      To get the name of the Publishing server and the port number (http://<PubServer>:<Publishing Port#>) from the App-V Client, look at the URL configuration of the Get-AppvPublishingServer PowerShell cmdlet.

      -

      http://pubsvr01:2718/?clientversion=5.0.10066.0&clientos=WindowsClient_6.2_x64

      +

      http://pubsvr01:2718/?clientversion=5.0.10066.0&clientos=WindowsClient_6.2_x64

      In the example:

      • A Windows Server 2012 R2 named “pubsvr01” hosts the Publishing service.

      • @@ -127,20 +127,19 @@ The following table provides the syntax and query examples.

        App-V 5.0 through App-V 5.0 SP2

        http://<PubServer>:<Publishing Port#>/

        -Note   -

        ClientVersion and ClientOS are supported only in App-V 5.0 SP3 and App-V 5.1.

        +Note

        ClientVersion and ClientOS are supported only in App-V 5.0 SP3 and App-V 5.1.

        -  +

        See the information for App-V 5.0 SP3 and App-V 5.1.

        -

        http://pubsvr01:2718

        +

        http://pubsvr01:2718

        In the example, A Windows Server 2012 R2 named “pubsvr01” hosts the Management and Publishing services.

        -  + ## Query values for client operating system and version @@ -234,7 +233,7 @@ In your publishing metadata query, enter the string values that correspond to th -  + ## Definition of publishing metadata @@ -259,9 +258,9 @@ You can view the metadata for each request in an Internet browser by using a que [Technical Reference for App-V 5.1](technical-reference-for-app-v-51.md) -  - -  + + + diff --git a/mdop/appv-v5/whats-new-in-app-v-50.md b/mdop/appv-v5/whats-new-in-app-v-50.md index af2d250201..6f816996a0 100644 --- a/mdop/appv-v5/whats-new-in-app-v-50.md +++ b/mdop/appv-v5/whats-new-in-app-v-50.md @@ -110,13 +110,13 @@ The following table displays information about what has changed with the App-V 5

        If no stream optimization is performed, packages are stream faulted when they are requested by computers running the App-V 5.0 client until they can launch.

        -

        Q:\

        -

        App-V 5.0 uses the native file system and no longer requires a Q:\.

        +

        Q:</p> +

        App-V 5.0 uses the native file system and no longer requires a Q:.

        -  + ## Sequencing error detection @@ -164,9 +164,9 @@ There is no file or application cache available with App-V 5.0. [About App-V 5.0](about-app-v-50.md) -  + -  + diff --git a/mdop/dart-v10/about-dart-10.md b/mdop/dart-v10/about-dart-10.md index 9a3cc07ba4..ad6c4560a0 100644 --- a/mdop/dart-v10/about-dart-10.md +++ b/mdop/dart-v10/about-dart-10.md @@ -29,7 +29,7 @@ DaRT 10 includes the following enhancements and changes as described in this top **Note**   For earlier versions of the Windows operating systems, continue to use the earlier versions of DaRT. -   + - **Windows Defender** @@ -45,7 +45,7 @@ DaRT 10 includes the following enhancements and changes as described in this top **Note**   Windows ADK 10.0 is not required if you are installing only Remote Connection Viewer or Crash Analyzer. -   + - **Windows 10 Debugging Tools** @@ -88,9 +88,9 @@ DaRT 10 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is par [Release Notes for DaRT 10](release-notes-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/accessibility-for-dart-10.md b/mdop/dart-v10/accessibility-for-dart-10.md index 48f6a42b66..7414466c4f 100644 --- a/mdop/dart-v10/accessibility-for-dart-10.md +++ b/mdop/dart-v10/accessibility-for-dart-10.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in alternative formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

        (609) 987-8116

        -

        [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

        +

        http://www.learningally.org/

        Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

        -  + ## Customer service for people with hearing impairments @@ -96,9 +96,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with DaRT 10](getting-started-with-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/creating-the-dart-10-recovery-image.md b/mdop/dart-v10/creating-the-dart-10-recovery-image.md index cb6c574a75..3f47366774 100644 --- a/mdop/dart-v10/creating-the-dart-10-recovery-image.md +++ b/mdop/dart-v10/creating-the-dart-10-recovery-image.md @@ -92,7 +92,7 @@ On the Drivers tab of the Advanced Options page, you can add additional device d **Important**   When you select drivers to include, be aware that wireless connectivity (such as Bluetooth or 802.11a/b/g/n) is not supported in DaRT. -  + **To add drivers to the recovery image** @@ -105,7 +105,7 @@ When you select drivers to include, be aware that wireless connectivity (such as **Note**   The driver file is provided by the manufacturer of the storage or network controller. -   + 4. Repeat Steps 2 and 3 for every driver that you want to include. @@ -144,7 +144,7 @@ The DaRT wizard checks for the tools in the `HKLM\Software\Microsoft\Windows Kit `%ProgramFilesX86%\Windows Kits\10.0\Debuggers\x86` -  + **To add the debugging tools for Crash Analyzer** @@ -182,7 +182,7 @@ If you select the Edit Image check box on this page, you can customize the recov **Note**   The size of the image will vary, depending on the tools that you select and the files that you add in the wizard. -   + 2. In the **Image name** box, enter a name for the DaRT recovery image, or accept the default name, which is DaRT10. @@ -232,7 +232,7 @@ On the Create Bootable Media page, you can optionally copy the image file to a C **Note**   The Preboot execution environment (PXE) and local image deployment are not supported natively by this tool since they require additional enterprise tools, such as System Center Configuration Manager server and Microsoft Development Toolkit. -  + **To copy the recovery image to a CD, DVD, or USB** @@ -243,7 +243,7 @@ The Preboot execution environment (PXE) and local image deployment are not suppo **Note**   If a drive is not recognized and you install a new drive, you can click **Refresh** to force the wizard to update the list of available drives. -   + 3. Click the **Create Bootable Media** button. @@ -256,9 +256,9 @@ The Preboot execution environment (PXE) and local image deployment are not suppo [Deploying DaRT 10](deploying-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/dart-10-deployment-checklist.md b/mdop/dart-v10/dart-10-deployment-checklist.md index f912cdc8a7..3dfa45cfc5 100644 --- a/mdop/dart-v10/dart-10-deployment-checklist.md +++ b/mdop/dart-v10/dart-10-deployment-checklist.md @@ -22,7 +22,7 @@ This checklist can be used to help you during Microsoft Diagnostics and Recovery **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Decide on the best DaRT 10 deployment option for your requirements and deploy it.

        [Deploying DaRT 10 to Administrator Computers](deploying-dart-10-to-administrator-computers.md)

        Deploying DaRT 10 to Administrator Computers

        Checklist box

        Use the DaRT Recovery Image wizard to create the DaRT recovery image ISO.

        [Creating the DaRT 10 Recovery Image](creating-the-dart-10-recovery-image.md)

        Creating the DaRT 10 Recovery Image

        Checklist box

        Decide on the best DaRT 10 recovery image deployment option for your requirements and deploy it.

        [Deploying the DaRT Recovery Image](deploying-the-dart-recovery-image-dart-10.md)

        Deploying the DaRT Recovery Image

        -  + ## Related topics [Deploying DaRT 10](deploying-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/dart-10-planning-checklist.md b/mdop/dart-v10/dart-10-planning-checklist.md index d369e0236a..f7fc8ef40c 100644 --- a/mdop/dart-v10/dart-10-planning-checklist.md +++ b/mdop/dart-v10/dart-10-planning-checklist.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Review the DaRT 10 Supported Configurations information to confirm that the computers you have selected for client or feature installation meet the minimum hardware and operating system requirements.

        [DaRT 10 Supported Configurations](dart-10-supported-configurations.md)

        DaRT 10 Supported Configurations

        Checklist box

        Understand the deployment prerequisites and decide which tools to include on the DaRT recovery image.

        [Planning to Create the DaRT 10 Recovery Image](planning-to-create-the-dart-10-recovery-image.md)

        Planning to Create the DaRT 10 Recovery Image

        Checklist box

        Determine which method, or methods, you will use to deploy the DaRT recovery image.

        [Planning How to Save and Deploy the DaRT 10 Recovery Image](planning-how-to-save-and-deploy-the-dart-10-recovery-image.md)

        Planning How to Save and Deploy the DaRT 10 Recovery Image

        -  + ## Related topics [Planning for DaRT 10](planning-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/dart-10-supported-configurations.md b/mdop/dart-v10/dart-10-supported-configurations.md index 10008cd844..e700bfa7fa 100644 --- a/mdop/dart-v10/dart-10-supported-configurations.md +++ b/mdop/dart-v10/dart-10-supported-configurations.md @@ -59,7 +59,7 @@ The following table lists the installation prerequisites for the administrator c -  + ### Help desk computer prerequisites @@ -88,7 +88,7 @@ The following table lists the installation prerequisites for the help desk compu -  + ### End-user computer prerequisites @@ -104,12 +104,12 @@ The following table lists the operating systems that are supported for the DaRT **Note**   Make sure that you allocate enough space for any additional tools that you want to install on the administrator computer. -  + **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -150,7 +150,7 @@ Microsoft provides support for the current service pack and, in some cases, the
        -  + ### DaRT help desk computer system requirements @@ -239,7 +239,7 @@ The following table lists the operating systems that are supported for the DaRT -  + DaRT also has the following minimum hardware requirements for the end-user computer: @@ -290,16 +290,16 @@ The Diagnostics and Recovery Toolset window in DaRT 10 requires that the end-use -  + ## Related topics [Planning to Deploy DaRT 10](planning-to-deploy-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md index 3029ebafc0..6367ad326e 100644 --- a/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md +++ b/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md @@ -30,7 +30,7 @@ Extract the boot.wim file from the ISO image and deploy in the recovery partitio **Important**   The **DaRT Recovery Image Wizard** provides the option to burn the image to a CD, DVD or UFD, but the other methods of saving and deploying the recovery image require additional steps that involve tools that are not included in DaRT. Some guidance and links for these other methods are provided in this section. -  + ## Deploy the DaRT recovery image as part of a recovery partition @@ -51,9 +51,9 @@ You can host the recovery image on a central network boot server, such as Window [Deploying DaRT 10](deploying-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/getting-started-with-dart-10.md b/mdop/dart-v10/getting-started-with-dart-10.md index b92651f3b5..0fc0d27b12 100644 --- a/mdop/dart-v10/getting-started-with-dart-10.md +++ b/mdop/dart-v10/getting-started-with-dart-10.md @@ -23,7 +23,7 @@ Microsoft Diagnostics and Recovery Toolset (DaRT) 10 requires thorough planning >A downloadable version of this administrator’s guide is not available. However, you can click **Download PDF** at the bottom of the Table of Contents pane to get a PDF version of this guide. > >Additional information about this product can also be found on the [Diagnostics and Recovery Toolset documentation download page.](https://www.microsoft.com/download/details.aspx?id=27754) -  + ## Getting started with DaRT 10 @@ -58,9 +58,9 @@ DaRT 10 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is par [Troubleshooting DaRT 10](troubleshooting-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/how-to-deploy-dart-10.md b/mdop/dart-v10/how-to-deploy-dart-10.md index 9446ca8dc0..805de4c46d 100644 --- a/mdop/dart-v10/how-to-deploy-dart-10.md +++ b/mdop/dart-v10/how-to-deploy-dart-10.md @@ -22,7 +22,7 @@ The following instructions explain how to deploy Microsoft Diagnostics and Recov **Important**   Before you install DaRT, see [DaRT 10 Supported Configurations](dart-10-supported-configurations.md) to ensure that you have installed all of the prerequisite software and that the computer meets the minimum system requirements. The computer onto which you install DaRT must be running Windows 10. -  + You can install DaRT using one of two different configurations: @@ -86,7 +86,7 @@ msiexec.exe /i MSDaRT.msi /l*v log.txt **Note**   You can add /qn or /qb to perform a silent installation. -  + **To validate the DaRT installation** @@ -101,9 +101,9 @@ You can add /qn or /qb to perform a silent installation. [Deploying DaRT 10 to Administrator Computers](deploying-dart-10-to-administrator-computers.md) -  + -  + diff --git a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md index bb7e4a368d..16d8853966 100644 --- a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md +++ b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md @@ -30,7 +30,7 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( **Note**   If you burned a CD or DVD of the recovery image, you can open the files on the CD or DVD and copy the boot.wim file from the \\sources folder. This lets you skip the need to mount the image. -   + 2. Deploy the boot.wim file to a WDS server that can be accessed from end-user computers in your enterprise. @@ -47,9 +47,9 @@ For more information about how to deploy DaRT as a remote partition, see [Walkth [Planning for DaRT 10](planning-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md index 4acad5c3eb..4fa7467fc0 100644 --- a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md +++ b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md @@ -34,7 +34,7 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( **Note**   If you burned a CD, DVD, or USB of the recovery image, you can open the files on the removable media and copy the boot.wim file from the \\sources folder. If you copy boot.wim file, you don’t need to mount the image. -   + 3. Use the boot.wim file to create a bootable recovery partition by using your company’s standard method for creating a custom Windows RE image. @@ -53,9 +53,9 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( [Planning for DaRT 10](planning-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md index f3371f7130..688b37b172 100644 --- a/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md +++ b/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md @@ -39,18 +39,20 @@ Use these instructions to recover a computer when you are physically present at 6. Select the installation that you want to repair or diagnose, and then click **Next**. - **Note**   + **Note** If the Windows Recovery Environment (WinRE) detects or suspects that Windows 10 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. -   - If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. -7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ - The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. +7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. + + The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. You can click **Help** on the **Diagnostics and Recovery Toolset** window to open the client Help file that provides detailed instruction and information needed to run the individual DaRT tools. You can also click the **Solution Wizard** on the **Diagnostics and Recovery Toolset** window to choose the best tool for the situation, based on a brief interview that the wizard provides. @@ -58,41 +60,40 @@ For general information about any of the DaRT tools, see [Overview of the Tools **How to run DaRT at the command prompt** -- To run DaRT at the command prompt, specify the **netstart.exe** command then use any of the following parameters: +- To run DaRT at the command prompt, specify the **netstart.exe** command then use any of the following parameters: + + + + + + + + + + + + + + + + + + + + + + + + +

        Parameter

        Description

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages that ask the end user to specify whether to initialize the network and remap the drives.

        +
        + Warning

        The end user’s response to the prompt overrides the –network and –remount switches.

        +
        +
        + +
        - - - - - - - - - - - - - - - - - - - - - - - -

        Parameter

        Description

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages that ask the end user to specify whether to initialize the network and remap the drives.

        -
        - Warning   -

        The end user’s response to the prompt overrides the –network and –remount switches.

        -
        -
        -   -
        -   ## Related topics @@ -101,9 +102,9 @@ For general information about any of the DaRT tools, see [Overview of the Tools [Recovering Computers Using DaRT 10](recovering-computers-using-dart-10.md) -  - -  + + + diff --git a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md index 189504fa13..1b7f39a897 100644 --- a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md +++ b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md @@ -35,113 +35,116 @@ If you disabled the DaRT tools when you created the recovery image, you still ha Whichever method that you use to boot into DaRT, you must enable the boot device in the BIOS for the boot option or options that you want to make available to the end user. - **Note**   + **Note** Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -   - As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. -2. When you are asked whether you want to initialize network services, select one of the following: +~~~ +As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. +~~~ - **Yes** - it is assumed that a DHCP server is present on the network, and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. +2. When you are asked whether you want to initialize network services, select one of the following: - **No** - skip the network initialization process. + **Yes** - it is assumed that a DHCP server is present on the network, and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. -3. Indicate whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. + **No** - skip the network initialization process. -4. On the **System Recovery Options** dialog box, select a keyboard layout. +3. Indicate whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. -5. Check the displayed system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers, and then insert the installation media for the device and select the driver. +4. On the **System Recovery Options** dialog box, select a keyboard layout. -6. Select the installation that you want to repair or diagnose, and then click **Next**. +5. Check the displayed system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers, and then insert the installation media for the device and select the driver. - **Note**   - If the Windows Recovery Environment (WinRE) detects or suspects that Windows 10 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. For information about how to resolve this issue, see [Troubleshooting DaRT 10](troubleshooting-dart-10.md). +6. Select the installation that you want to repair or diagnose, and then click **Next**. -   + **Note** + If the Windows Recovery Environment (WinRE) detects or suspects that Windows 10 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. For information about how to resolve this issue, see [Troubleshooting DaRT 10](troubleshooting-dart-10.md). - If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. -7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset**. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. -8. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ - The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. +7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset**. -9. On the help desk computer, open the **DaRT Remote Connection Viewer**. +8. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. + + The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. + +9. On the help desk computer, open the **DaRT Remote Connection Viewer**. 10. Click **Start**, click **All Programs**, click **Microsoft DaRT 10**, and then click **DaRT Remote Connection Viewer**. 11. In the **DaRT Remote Connection** window, enter the required ticket, IP address, and port information. - **Note**   - This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. + **Note** + This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. + -   12. Click **Connect**. The IT administrator now assumes control of the end-user computer and can run the DaRT tools remotely. -**Note**   +**Note** A file is provided that is named inv32.xml and contains remote connection information, such as the port number and IP address. By default, the file is typically located at %windir%\\system32. -  + **To customize the Remote Connection process** -1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). +1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). - Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: + Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: - - - - - - - - - - - - - - - - - - - - - - - - - -
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        -
        - Important   -

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        -
        -
        -   -
        + + + + + + + + + + + + + + + + + + + + + + + + + +
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        +
        + Important

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        +
        +
        -   +
        -2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax - [LaunchApps] - "%windir%\system32\netstart.exe -network -remount" - "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" - "%windir%\system32\WaitForConnection.exe" - "%SYSTEMDRIVE%\sources\recovery\recenv.exe" - ``` + +2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: + + ``` syntax + [LaunchApps] + "%windir%\system32\netstart.exe -network -remount" + "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" + "%windir%\system32\WaitForConnection.exe" + "%SYSTEMDRIVE%\sources\recovery\recenv.exe" + ``` When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the RAM disk. This file contains connection information: IP address, port, and ticket number. You can copy this file to a network share to trigger a Help desk workflow. For example, a custom program can check the network share for connection files, and then create a support ticket or send email notifications. @@ -176,14 +179,16 @@ When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the -   - **Note**   - The variables for these parameters are created on the end-user computer and must be provided by the end user. -   +~~~ +**Note** +The variables for these parameters are created on the end-user computer and must be provided by the end user. +~~~ -2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. + + +2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. ## Related topics @@ -192,9 +197,9 @@ When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the [Recovering Computers Using DaRT 10](recovering-computers-using-dart-10.md) -  - -  + + + diff --git a/mdop/dart-v10/overview-of-the-tools-in-dart-10.md b/mdop/dart-v10/overview-of-the-tools-in-dart-10.md index c18b6cc820..61ca954cfa 100644 --- a/mdop/dart-v10/overview-of-the-tools-in-dart-10.md +++ b/mdop/dart-v10/overview-of-the-tools-in-dart-10.md @@ -33,7 +33,7 @@ A description of the DaRT 10 tools follows. **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### Crash Analyzer @@ -60,12 +60,12 @@ For more information about **Crash Analyzer**, see [Diagnosing System Failures w **Warning**   We recommend that you back up a disk before you use **Disk Commander** to repair it. By using **Disk Commander**, you can potentially damage volumes and make them inaccessible. Additionally, changes to one volume can affect other volumes because volumes on a disk share a partition table. -  + **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### Disk Wipe @@ -74,7 +74,7 @@ You can use **Disk Wipe** to delete all data from a disk or volume, even the dat **Warning**   After wiping a disk or volume, you cannot recover the data. Verify the size and label of a volume before erasing it. -  + ### Explorer @@ -87,7 +87,7 @@ The **Explorer** tool lets you browse the computer’s file system and network s **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### File Search @@ -104,7 +104,7 @@ We recommend that you uninstall only one hotfix at a time, even though the tool **Important**   Programs that were installed or updated after a hotfix was installed might not work correctly after you uninstall a hotfix. -  + ### Locksmith @@ -119,7 +119,7 @@ You can use **Registry Editor** to access and change the registry of the Windows **Warning**   Serious problems can occur if you change the registry incorrectly by using **Registry Editor**. These problems might require you to reinstall the operating system. Before you make changes to the registry, you should back up any valued data on the computer. Change the registry at your own risk. -  + ### SFC Scan @@ -138,9 +138,9 @@ When you boot a problem computer into DaRT, it is set to automatically obtain it [Getting Started with DaRT 10](getting-started-with-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md b/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md index b098731bec..0b4856b406 100644 --- a/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md +++ b/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md @@ -24,7 +24,7 @@ If your organization uses Active Directory Domain Services (AD DS), you may want **Note**   You may want to use more than one method in your organization. For example, you can boot into DaRT from a remote partition for most situations and have a USB flash drive available in case the end-user computer cannot connect to the network. -  + The following table shows some advantages and disadvantages of each method of using DaRT in your organization. @@ -80,16 +80,16 @@ The following table shows some advantages and disadvantages of each method of us -  + ## Related topics [Planning to Deploy DaRT 10](planning-to-deploy-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md b/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md index f265d99f72..25cd1696fb 100644 --- a/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md +++ b/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md @@ -49,25 +49,25 @@ The following items are required or recommended for creating the DaRT recovery i

        Windows Debugging Tools for your platform

        -

        Required when you run the Crash Analyzer to determine the cause of a computer failure. We recommend that you specify the path of the Windows Debugging Tools at the time that you create the DaRT recovery image. You can download the Windows Debugging Tools here: [Download and Install Debugging Tools for Windows](https://go.microsoft.com/fwlink/?LinkId=99934).

        +

        Required when you run the Crash Analyzer to determine the cause of a computer failure. We recommend that you specify the path of the Windows Debugging Tools at the time that you create the DaRT recovery image. You can download the Windows Debugging Tools here: Download and Install Debugging Tools for Windows.

        Optional: Windows symbols files for use with Crash Analyzer

        -

        Typically, debugging information is stored in a symbol file that is separate from the program. You must have access to the symbol information when you debug an application that has stopped responding, for example, if it stopped working. For more information, see [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer-dart-10.md).

        +

        Typically, debugging information is stored in a symbol file that is separate from the program. You must have access to the symbol information when you debug an application that has stopped responding, for example, if it stopped working. For more information, see Diagnosing System Failures with Crash Analyzer.

        -  + ## Related topics [Planning to Deploy DaRT 10](planning-to-deploy-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/recovering-computers-using-dart-10.md b/mdop/dart-v10/recovering-computers-using-dart-10.md index 7b5575997d..1d901afe01 100644 --- a/mdop/dart-v10/recovering-computers-using-dart-10.md +++ b/mdop/dart-v10/recovering-computers-using-dart-10.md @@ -34,7 +34,7 @@ Whichever method that you use to boot into DaRT, you must enable the boot device **Note**   Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -  + ## Recover a local computer by using the DaRT recovery image @@ -51,7 +51,7 @@ The Remote Connection feature in DaRT lets an IT administrator run the DaRT tool **Important**   The two computers establishing a remote connection must be part of the same network. -  + The **Diagnostics and Recovery Toolset** window includes the option to run DaRT on an end-user computer remotely from an administrator computer. The end user opens the DaRT tools on the problem computer and starts the remote session by clicking **Remote Connection**. @@ -66,9 +66,9 @@ The IT administrator or help desk worker enters this information into the **DaRT [Operations for DaRT 10](operations-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v10/security-considerations-for-dart-10.md b/mdop/dart-v10/security-considerations-for-dart-10.md index 2ec7d8182c..fc0621ba83 100644 --- a/mdop/dart-v10/security-considerations-for-dart-10.md +++ b/mdop/dart-v10/security-considerations-for-dart-10.md @@ -38,7 +38,7 @@ You can even configure the DaRT image so that the option to start a remote conne **Important**   After the remote connection is established, all the tools that you included in the recovery image, including those unavailable to the end user, will become available to any help desk worker who is working on the end–user computer. -  + For more information about including tools in the DaRT recovery image, see [Overview of the Tools in DaRT 10](overview-of-the-tools-in-dart-10.md). @@ -50,7 +50,7 @@ If you deploy the DaRT recovery image by saving it to a USB flash drive or by cr **Note**   DaRT 10 supports BitLocker natively. -  + To include drive encryption, add the encryption solution files when you create the recovery image. Your encryption solution must be able to run on WinPE. End users who boot from the ISO are then able to access that encryption solution and unblock the drive. @@ -64,9 +64,9 @@ By default, the communication between two computers that have established a **Re [Security and Privacy for DaRT 10](security-and-privacy-for-dart-10.md) -  + -  + diff --git a/mdop/dart-v7/accessibility-for-dart-70.md b/mdop/dart-v7/accessibility-for-dart-70.md index 6f6fcecb10..5335e76631 100644 --- a/mdop/dart-v7/accessibility-for-dart-70.md +++ b/mdop/dart-v7/accessibility-for-dart-70.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in Alternative Formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

        (609) 987-8116

        -

        [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

        +

        http://www.learningally.org/

        Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

        -  + ## Customer Service for People with Hearing Impairments @@ -96,9 +96,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with DaRT 7.0](getting-started-with-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md b/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md index 2c10bd289c..0bb0012fb5 100644 --- a/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md +++ b/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md @@ -29,7 +29,7 @@ You can write the ISO to a recordable CD or DVD, save it to a USB flash drive, o **Note**   If your computer includes a CD-RW drive, the wizard offers to burn the ISO image to a blank CD or DVD. If your computer does not include a drive that is supported by the wizard, you can burn the ISO image onto a CD or DVD by using most programs that can burn a CD or DVD. -  + To create a bootable CD or DVD from the ISO image, you must have: @@ -42,7 +42,7 @@ To create a bootable CD or DVD from the ISO image, you must have: **Important**   Test the CD or DVD that you create on all the different kinds of computers that you intend to support because some computers cannot start from all kinds of recordable media. -   + To save the ISO image to a USB flash drive (UFD), you must have: @@ -64,9 +64,9 @@ You can create a DaRT recovery image that can only be used for a certain number - [Deploying DaRT 7.0](deploying-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md b/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md index 47cc4769b7..2a1c1e2596 100644 --- a/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md +++ b/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md @@ -22,7 +22,7 @@ This checklist can be used to help you during Microsoft Diagnostics and Recovery **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Decide on the best DaRT 7 deployment option for your requirements and deploy it.

        [Deploying DaRT 7.0 to Administrator Computers](deploying-dart-70-to-administrator-computers-dart-7.md)

        Deploying DaRT 7.0 to Administrator Computers

        Checklist box

        Use the DaRT Recovery Image Wizard to create the DaRT recovery image ISO.

        [Creating the DaRT 7.0 Recovery Image](creating-the-dart-70-recovery-image-dart-7.md)

        Creating the DaRT 7.0 Recovery Image

        Checklist box

        Decide on the best DaRT 7 recovery image deployment option for your requirements and deploy it.

        [Deploying the DaRT 7.0 Recovery Image](deploying-the-dart-70-recovery-image-dart-7.md)

        Deploying the DaRT 7.0 Recovery Image

        -  + ## Related topics [Deploying DaRT 7.0](deploying-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/dart-70-planning-checklist-dart-7.md b/mdop/dart-v7/dart-70-planning-checklist-dart-7.md index 099a1f0336..7612462738 100644 --- a/mdop/dart-v7/dart-70-planning-checklist-dart-7.md +++ b/mdop/dart-v7/dart-70-planning-checklist-dart-7.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Review the DaRT 7 Supported Configurations information to confirm that the computers you have selected for client or feature installation meet the minimum hardware and operating system requirements.

        [DaRT 7.0 Supported Configurations](dart-70-supported-configurations-dart-7.md)

        DaRT 7.0 Supported Configurations

        Checklist box

        Understand the deployment prerequisites and decide which tools to include on the DaRT recovery image.

        [Planning to Create the DaRT 7.0 Recovery Image](planning-to-create-the-dart-70-recovery-image.md)

        Planning to Create the DaRT 7.0 Recovery Image

        Checklist box

        Determine which method, or methods, you will use to deploy the DaRT recovery image.

        [Planning How to Save and Deploy the DaRT 7.0 Recovery Image](planning-how-to-save-and-deploy-the-dart-70-recovery-image.md)

        Planning How to Save and Deploy the DaRT 7.0 Recovery Image

        -  + ## Related topics [Planning for DaRT 7.0](planning-for-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md b/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md index f29f24ee5c..fe84a514e2 100644 --- a/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md +++ b/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md @@ -30,7 +30,7 @@ After you have created the International Organization for Standardization (ISO) **Important**   The **DaRT Recovery Image Wizard** only provides the option to burn a CD or DVD. All other methods of saving and deploying the recovery image require additional steps that involve tools that are not included in DaRT. Some guidance and links for these other methods are provided in this section. -  + ## Deploy the DaRT Recovery Image Using a USB Flash Drive @@ -58,9 +58,9 @@ After you have finished running the DaRT Recovery Image Wizard and created the r - [Deploying DaRT 7.0](deploying-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/getting-started-with-dart-70-new-ia.md b/mdop/dart-v7/getting-started-with-dart-70-new-ia.md index d85f7a6580..ac081ea5fb 100644 --- a/mdop/dart-v7/getting-started-with-dart-70-new-ia.md +++ b/mdop/dart-v7/getting-started-with-dart-70-new-ia.md @@ -24,7 +24,7 @@ This section provides general information for administrators who are evaluating **Note**   A downloadable version of this document and the DaRT 7 Evaluation Guide can be downloaded from . -  + ## Getting Started With DaRT 7 @@ -54,9 +54,9 @@ A downloadable version of this document and the DaRT 7 Evaluation Guide can be d - [Troubleshooting DaRT 7.0](troubleshooting-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/how-to-deploy-dart-70.md b/mdop/dart-v7/how-to-deploy-dart-70.md index f5dd006044..32254f2c60 100644 --- a/mdop/dart-v7/how-to-deploy-dart-70.md +++ b/mdop/dart-v7/how-to-deploy-dart-70.md @@ -22,7 +22,7 @@ This topic provides instructions to deploy Microsoft Diagnostics and Recovery To **Important**   Before you install DaRT, ensure that the computer meets the minimum system requirements listed in [DaRT 7.0 Supported Configurations](dart-70-supported-configurations-dart-7.md). -  + **To install DaRT on an administrator computer** @@ -77,16 +77,16 @@ Before you install DaRT, ensure that the computer meets the minimum system requi **Note**   You can add /qn or /qb to any of the DaRT installation command prompt options to perform a silent installation. -  + ## Related topics [Deploying DaRT 7.0 to Administrator Computers](deploying-dart-70-to-administrator-computers-dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md index 901b1c1274..ec9f029614 100644 --- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md +++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md @@ -30,7 +30,7 @@ After you have finished running the DaRT Recovery Image Wizard and created the r **Note**   If you burned a CD or DVD of the recovery image, you can open the files on the CD or DVD and copy the boot.wim file from the \\sources folder. This lets you skip the need to mount the image. -   + 2. Deploy the boot.wim file to a WDS server that can be accessed from end-user computers in your enterprise. @@ -47,9 +47,9 @@ For more information about how to deploy DaRT as a remote partition, see the fol [Deploying the DaRT 7.0 Recovery Image](deploying-the-dart-70-recovery-image-dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md index d3093de574..bb9b4e45b5 100644 --- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md +++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md @@ -34,7 +34,7 @@ After you have finished running the DaRT Recovery Image Wizard and created the r **Note**   If you burned a CD or DVD of the recovery image, you can open the files on the CD or DVD and copy the boot.wim file from the \\sources folder. This lets you skip the need to mount the image. -   + 3. Use the boot.wim file to create a bootable recovery partition by using your company’s standard method for creating a custom Windows RE image. @@ -51,9 +51,9 @@ For more information about how to deploy a recovery solution to reinstall the fa [Deploying the DaRT 7.0 Recovery Image](deploying-the-dart-70-recovery-image-dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md index cb1a99962b..8c9ec4eebf 100644 --- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md +++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md @@ -47,7 +47,7 @@ You can also manually copy the ISO image file to a UFD by following the steps pr **Note**   The previous code example assumes Disk 1 is the UFD. If it is necessary, replace DISK 1 with your disk number. -   + 2. By using your company’s preferred method of mounting an image, mount the ISO image file that you created in the **Create Startup Image** dialog box of the **DaRT Recovery Image Wizard**. This requires that you have a method available to mount an image file. @@ -56,16 +56,16 @@ You can also manually copy the ISO image file to a UFD by following the steps pr **Note**   If you burned a CD or DVD of the recovery image, you can open the files on the CD or DVD and copy the contents to the UFD. This lets you skip the need to mount the image. -   + ## Related topics [Deploying the DaRT 7.0 Recovery Image](deploying-the-dart-70-recovery-image-dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md b/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md index 35965f5549..f24b5b6941 100644 --- a/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md +++ b/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md @@ -17,30 +17,32 @@ ms.date: 06/16/2016 # How to Recover Local Computers Using the DaRT Recovery Image -To recover a local computer by using Microsoft Diagnostics and Recovery Toolset (DaRT) 7, you must be physically present at the end-user computer that is experiencing problems that require DaRT. You can also run DaRT remotely by following the instructions at [How to Recover Remote Computers Using the DaRT Recovery Image](how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md). +To recover a local computer by using Microsoft Diagnostics and Recovery Toolset (DaRT) 7, you must be physically present at the end-user computer that is experiencing problems that require DaRT. You can also run DaRT remotely by following the instructions at [How to Recover Remote Computers Using the DaRT Recovery Image](how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md). **To recover a local computer by using DaRT** 1. As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. You are asked whether you want to initialize network services. If you click **Yes**, it is assumed that a DHCP server is present on the network and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. - To skip the network initialization process, click **No**. + To skip the network initialization process, click **No**. 2. Following the network initialization dialog box, you are asked whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. 3. Following the remapping dialog box, a **System Recovery Options** dialog box appears and asks you to select a keyboard layout. Then it displays the system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers. This prompts you to insert the installation media for the device and to select the driver. Select the installation that you want to repair or diagnose, and then click **Next**. - **Note**   + **Note** If the Windows Recovery Environment (WinRE) detects or suspects that Windows 7 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. -   - If any of the registry hives are corrupted or missing, Registry Editor, and several other DaRT utilities, will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor, and several other DaRT utilities, will have limited functionality. If no operating system is selected, some tools will not be available. -4. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ - The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. +4. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. + + The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. You can click **Help** on the **Diagnostics and Recovery Toolset** window to open the client Help file that provides detailed instruction and information needed to run the individual DaRT tools. You can also click the **Solution Wizard** on the **Diagnostics and Recovery Toolset** window to choose the best tool for the situation, based on a brief interview that the wizard provides. @@ -48,54 +50,53 @@ For general information about any of the DaRT tools, see [Overview of the Tools **To run DaRT at the command prompt** -1. You can run DaRT at the command prompt by specifying the **netstart.exe** command and by using any of the following parameters: +1. You can run DaRT at the command prompt by specifying the **netstart.exe** command and by using any of the following parameters: - - - - - - - - - - - - - - - - - - - - - - - - - -
        ParameterDescription

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages asking the end user to specify whether to initialize the network and remap the drives.

        -
        - Important   -

        The end user’s response to the prompts overrides the -network and -remount switches.

        -
        -
        -   -
        + + + + + + + + + + + + + + + + + + + + + + + + + +
        ParameterDescription

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages asking the end user to specify whether to initialize the network and remap the drives.

        +
        + Important

        The end user’s response to the prompts overrides the -network and -remount switches.

        +
        +
        -   +
        -2. You can customize DaRT so that a computer that boots into DaRT automatically opens the **Remote Connection** tool that is used to establish a remote connection with the help desk. + + +2. You can customize DaRT so that a computer that boots into DaRT automatically opens the **Remote Connection** tool that is used to establish a remote connection with the help desk. ## Related topics [Recovering Computers Using DaRT 7.0](recovering-computers-using-dart-70-dart-7.md) -  - -  + + + diff --git a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md index 635e47c68a..2fac900255 100644 --- a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md +++ b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md @@ -17,12 +17,12 @@ ms.date: 08/30/2016 # How to Recover Remote Computers Using the DaRT Recovery Image -The Remote Connection feature in Microsoft Diagnostics and Recovery Toolset (DaRT) 7 lets an IT administrator run the DaRT tools remotely on an end-user computer. After certain information is provided by the end user (or by a helpdesk professional working on the end-user computer), the IT administrator or helpdesk agent can take control of the end user's computer and run the necessary DaRT tools remotely. +The Remote Connection feature in Microsoft Diagnostics and Recovery Toolset (DaRT) 7 lets an IT administrator run the DaRT tools remotely on an end-user computer. After certain information is provided by the end user (or by a helpdesk professional working on the end-user computer), the IT administrator or helpdesk agent can take control of the end user's computer and run the necessary DaRT tools remotely. -**Important**   +**Important** The two computers establishing a remote connection must be part of the same network. -  + **To recover a remote computer by using DaRT** @@ -38,105 +38,106 @@ The two computers establishing a remote connection must be part of the same netw Whichever method that you use to boot into DaRT, you must enable the boot device in the BIOS for the boot option or options that you want to make available to the end user. - **Note**   + **Note** Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -   + 2. As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. You are asked whether you want to initialize network services. If you click **Yes**, it is assumed that a DHCP server is present on the network and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. - To skip the network initialization process, click **No**. + To skip the network initialization process, click **No**. 3. Following the network initialization dialog box, you are asked whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. 4. Following the remapping dialog box, a **System Recovery Options** dialog box appears and asks you to select a keyboard layout. Then it displays the system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers. This prompts you to insert the installation media for the device and to select the driver. Select the installation that you want to repair or diagnose, and then click **Next**. - **Note**   + **Note** If the Windows Recovery Environment (WinRE) detects or suspects that Windows 7 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. For information about this situation including how to resolve it, see [Troubleshooting DaRT 7.0](troubleshooting-dart-70-new-ia.md). -   - If any of the registry hives are corrupted or missing, Registry Editor, and several other DaRT utilities, will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor, and several other DaRT utilities, will have limited functionality. If no operating system is selected, some tools will not be available. -5. On the **System Recovery Options** window, select **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset** window. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ -6. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. +5. On the **System Recovery Options** window, select **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset** window. - The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. +6. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. -7. On the helpdesk agent computer, open the **DaRT Remote Connection Viewer**. + The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. - Click **Start**, click **All Programs**, click **Microsoft DaRT 7**, and then click **DaRT Remote Connection Viewer**. +7. On the helpdesk agent computer, open the **DaRT Remote Connection Viewer**. -8. In the **DaRT Remote Connection** window, enter the required ticket, IP address, and port information. + Click **Start**, click **All Programs**, click **Microsoft DaRT 7**, and then click **DaRT Remote Connection Viewer**. - **Note**   - This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. +8. In the **DaRT Remote Connection** window, enter the required ticket, IP address, and port information. -   + **Note** + This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. -9. Click **Connect**. + + +9. Click **Connect**. The IT administrator now assumes control of the end-user computer and can run the DaRT tools remotely. -**Note**   +**Note** A file is provided that is named inv32.xml and contains remote connection information, such as the port number and IP address. By default, the file is typically located at %windir%\\system32. -  + **To customize the Remote Connection process** -1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). +1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). - Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: + Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: - - - - - - - - - - - - - - - - - - - - - - - - - -
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        -
        - Important   -

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        -
        -
        -   -
        + + + + + + + + + + + + + + + + + + + + + + + + + +
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        +
        + Important

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        +
        +
        -   +
        -2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax - [LaunchApps] - "%windir%\system32\netstart.exe -network -remount" - "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" - "%windir%\system32\WaitForConnection.exe" - "%SYSTEMDRIVE%\sources\recovery\recenv.exe" - ``` + +2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: + + ``` syntax + [LaunchApps] + "%windir%\system32\netstart.exe -network -remount" + "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" + "%windir%\system32\WaitForConnection.exe" + "%SYSTEMDRIVE%\sources\recovery\recenv.exe" + ``` **To run the Remote Connection Viewer at the command prompt** @@ -169,23 +170,25 @@ A file is provided that is named inv32.xml and contains remote connection inform -   - **Note**   - The variables for these parameters are created on the end-user computer and must be provided by the end user. -   +~~~ +**Note** +The variables for these parameters are created on the end-user computer and must be provided by the end user. +~~~ -2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. + + +2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. ## Related topics [Recovering Computers Using DaRT 7.0](recovering-computers-using-dart-70-dart-7.md) -  - -  + + + diff --git a/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md b/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md index 069dabb05c..2000d0e0f8 100644 --- a/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md +++ b/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md @@ -36,7 +36,7 @@ If you cannot access the Microsoft Debugging Tools for Windows or the symbol fil **Note**   Use the Search tool in DaRT 7 to locate the copied crash dump file. -   + 3. The **Crash Analyzer** scans the crash dump file and reports a probable cause of the crash. You can view more information about the crash, such as the specific crash message and description, the drivers loaded at the time of the crash, and the full output of the analysis. @@ -47,9 +47,9 @@ If you cannot access the Microsoft Debugging Tools for Windows or the symbol fil [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer--dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md b/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md index 18c527463b..4a03441b10 100644 --- a/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md +++ b/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md @@ -46,7 +46,7 @@ Typically, you run Microsoft Diagnostics and Recovery Toolset (DaRT) 7 Crash An **Note**   If you do not have access to the **System Properties** window, you can search for dump files on the end-user computer by using the **Search** tool in DaRT. -   + 3. The **Crash Analyzer** scans the crash dump file and reports a probable cause of the crash. You can view more information about the crash, such as the specific crash message and description, the drivers loaded at the time of the crash, and the full output of the analysis. @@ -57,9 +57,9 @@ Typically, you run Microsoft Diagnostics and Recovery Toolset (DaRT) 7 Crash An [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer--dart-7.md) -  + -  + diff --git a/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md b/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md index b24667de14..64a13002bc 100644 --- a/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md +++ b/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md @@ -42,7 +42,7 @@ The **DaRT Recovery Image Wizard** requires the following information: **Note**   The ISO image size can vary, depending on the tools that were selected in the **DaRT Recovery Image Wizard**. -  + ## To create the recovery image using the DaRT Recovery Image Wizard @@ -74,7 +74,7 @@ You can either specify the location of the debugging tools on the computer where **Note**   If you include the **Crash Analyzer** in the ISO image, we recommend that you also include the Debugging Tools for Windows. -  + Follow these steps to add the Debugging Tools for Windows: @@ -101,7 +101,7 @@ If you decide not to include the latest definitions on the recovery image, or if **Important**   You cannot scan if there are no definitions. -  + After you have finished, click **Next**. @@ -110,14 +110,14 @@ After you have finished, click **Next**. **Caution**   By default, when you add a driver to the DaRT recovery image, all additional files and subfolders that are located in that folder are added into the recovery image. For more information, see [Troubleshooting DaRT 7.0](troubleshooting-dart-70-new-ia.md). -  + You should include additional drivers on the recovery image for DaRT 7 that you may need when repairing a computer. These may typically include storage or network controllers that are not included on the Windows DVD. **Important**   When you select drivers to include, be aware that wireless connectivity (such as Bluetooth or 802.11a/b/g/n) is not supported in DaRT. -  + **To add a storage or network controller driver to the recovery image** @@ -128,7 +128,7 @@ When you select drivers to include, be aware that wireless connectivity (such as **Note**   The **driver** file is provided by the manufacturer of the storage or network controller. -   + 3. Repeat Steps 1 and 2 for every driver that you want to include. @@ -171,7 +171,7 @@ If the **DaRT Recovery Image Wizard** detects a compatible CD-RW drive on your c **Note**   If a drive is not recognized and you install a new drive, you can click **Refresh Drive List** to force the wizard to update the list of available drives. -   + 3. Click **Next**. @@ -180,9 +180,9 @@ If the **DaRT Recovery Image Wizard** detects a compatible CD-RW drive on your c [Creating the DaRT 7.0 Recovery Image](creating-the-dart-70-recovery-image-dart-7.md) -  + -  + diff --git a/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md b/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md index c499a06afe..ccd74f662c 100644 --- a/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md +++ b/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md @@ -33,7 +33,7 @@ You can use **Registry Editor** to access and change the registry of the Windows **Caution**   This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + ### Locksmith @@ -70,7 +70,7 @@ For more information about **Crash Analyzer**, see [Diagnosing System Failures w **Warning**   We recommend that you back up a disk before you use **Disk Commander** to repair it. By using **Disk Commander**, you can potentially damage volumes and make them inaccessible. Additionally, changes to one volume can affect other volumes because volumes on a disk share a partition table. -  + ### Disk Wipe @@ -79,7 +79,7 @@ You can use **Disk Wipe** to delete all data from a disk or volume, even the dat **Warning**   After wiping a disk or volume, you cannot recover the data. Verify the size and label of a volume before erasing it. -  + ### Computer Management @@ -106,7 +106,7 @@ We recommend that you uninstall only one hotfix at a time, even though the tool **Important**   Programs that were installed or updated after a hotfix was installed might not work correctly after you uninstall a hotfix. -  + ### SFC Scan @@ -123,7 +123,7 @@ The **Search** tool opens a **File Search** window that you can use to find docu **Important**   Environments with the Standalone System Sweeper deployed should instead use the Windows Defender Offline (WDO) protection image for malware detection. Because of how the Standalone System Sweeper tool integrates into DaRT, all supported DaRT version deployments cannot apply these anti-malware updates to their DaRT images. -  + The **Standalone System Sweeper** can help detect malware and unwanted software and warn you of security risks. You can use this tool to scan a computer for and remove malware even when the installed Windows operating system is not running. When the **Standalone System Sweeper** detects malicious or unwanted software, it prompts you to remove, quarantine, or allow for each item. @@ -136,16 +136,16 @@ The **Remote Connection** tool in DaRT lets you remotely run the DaRT tools on a **Important**   The two computers establishing a remote connection must be part of the same network. -  + ## Related topics [Getting Started with DaRT 7.0](getting-started-with-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md b/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md index e8efcbcf86..f99585b92a 100644 --- a/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md +++ b/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md @@ -27,7 +27,7 @@ You can save and deploy the DaRT recovery image by using the following methods. **Note**   You might want to use more than one method in your organization. For example, you can boot into DaRT from a remote partition for most situations and have a USB flash drive available in case the end-user computer cannot connect to the network. -  + The following table shows some advantages and disadvantages of each method of using DaRT in your organization. @@ -71,16 +71,16 @@ The following table shows some advantages and disadvantages of each method of us -  + ## Related topics [Planning to Deploy DaRT 7.0](planning-to-deploy-dart-70.md) -  + -  + diff --git a/mdop/dart-v7/planning-to-deploy-dart-70.md b/mdop/dart-v7/planning-to-deploy-dart-70.md index d09259dc38..f1f21b158b 100644 --- a/mdop/dart-v7/planning-to-deploy-dart-70.md +++ b/mdop/dart-v7/planning-to-deploy-dart-70.md @@ -51,7 +51,7 @@ Several methods can be used to save and deploy the DaRT recovery image. When you **Note**   You might want to use more than one method in your organization. For example, you can boot into DaRT from a remote partition for most situations and have a USB flash drive available in case the end-user computer cannot connect to the network. -  + [Planning How to Save and Deploy the DaRT 7.0 Recovery Image](planning-how-to-save-and-deploy-the-dart-70-recovery-image.md) @@ -60,9 +60,9 @@ You might want to use more than one method in your organization. For example, yo [Planning for DaRT 7.0](planning-for-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md b/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md index 459d98884e..35e35b8a3e 100644 --- a/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md +++ b/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md @@ -39,7 +39,7 @@ Whichever method that you use to boot into DaRT, you must enable the boot device **Note**   Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -  + [How to Recover Local Computers Using the DaRT Recovery Image](how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md) @@ -51,7 +51,7 @@ The Remote Connection feature in DaRT lets an IT administrator run the DaRT tool **Important**   The two computers establishing a remote connection must be part of the same network. -  + The **Diagnostics and Recovery Toolset** window includes the option to run DaRT on an end-user computer remotely from an administrator computer. The end user opens the DaRT tools on the problem computer and starts the remote session by clicking **Remote Connection**. @@ -66,9 +66,9 @@ The IT administrator or helpdesk agent enters this information into the **DaRT R [Operations for DaRT 7.0](operations-for-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/release-notes-for-dart-70-new-ia.md b/mdop/dart-v7/release-notes-for-dart-70-new-ia.md index 718f97ba50..87506ac590 100644 --- a/mdop/dart-v7/release-notes-for-dart-70-new-ia.md +++ b/mdop/dart-v7/release-notes-for-dart-70-new-ia.md @@ -108,9 +108,9 @@ All other trademarks are property of their respective owners. [About DaRT 7.0](about-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md b/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md index 1d089d9495..7d51161f65 100644 --- a/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md +++ b/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md @@ -35,7 +35,7 @@ You can even configure the DaRT image so that the option to start a remote conne **Important**   After the remote connection is established, all the tools that you included in the recovery image, including those unavailable to the end user, will become available to the helpdesk agent working on the end–user computer. -  + For more information about including tools in the DaRT recovery image, see [How to Use the DaRT Recovery Image Wizard to Create the Recovery Image](how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md). @@ -49,7 +49,7 @@ Your encryption method should be deployed and enabled in all computers. **Note**   DaRT 7 supports BitLocker natively. -  + ## To help maintain security between two computers during Remote Connection @@ -61,9 +61,9 @@ By default, the communication between two computers that have established a **Re [Operations for DaRT 7.0](operations-for-dart-70-new-ia.md) -  + -  + diff --git a/mdop/dart-v8/about-dart-80-dart-8.md b/mdop/dart-v8/about-dart-80-dart-8.md index a4ad194f81..7de3d83f67 100644 --- a/mdop/dart-v8/about-dart-80-dart-8.md +++ b/mdop/dart-v8/about-dart-80-dart-8.md @@ -22,7 +22,7 @@ Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0 helps you troubleshoot and **Note**   DaRT does not support the recovery of dynamic disks. -  + DaRT also provides tools to help you fix a problem as soon as you determine the cause. For example, you can use the tools in DaRT to disable a faulty device driver, remove hotfixes, restore deleted files, and scan the computer for malware even when you cannot or should not start the installed Windows operating system. @@ -73,9 +73,9 @@ This technology is a part of the Microsoft Desktop Optimization Pack (MDOP). MDO [Release Notes for DaRT 8.0](release-notes-for-dart-80--dart-8.md) -  + -  + diff --git a/mdop/dart-v8/about-dart-81.md b/mdop/dart-v8/about-dart-81.md index f173ef7d0d..a2d81ba1e5 100644 --- a/mdop/dart-v8/about-dart-81.md +++ b/mdop/dart-v8/about-dart-81.md @@ -36,10 +36,10 @@ Microsoft Diagnostics and Recovery Toolset (DaRT) 8.1 provides the following enh You can create DaRT images by using Windows Server 2012 R2 or Windows 8.1. - **Note**   + **Note** For earlier versions of the Windows Server and Windows operating systems, continue to use the earlier versions of DaRT. -   + - **Customer feedback** @@ -52,16 +52,18 @@ Microsoft Diagnostics and Recovery Toolset (DaRT) 8.1 provides the following enh ## Requirements -- **Windows Assessment and Development Kit 8.1** +- **Windows Assessment and Development Kit 8.1** - Windows Assessment and Development Kit (ADK) 8.1 is a required prerequisite for the DaRT Recovery Image Wizard. Windows ADK 8.1 contains deployment tools that are used to customize, deploy, and service Windows images. It also contains the Windows Preinstallation Environment (Windows PE). + Windows Assessment and Development Kit (ADK) 8.1 is a required prerequisite for the DaRT Recovery Image Wizard. Windows ADK 8.1 contains deployment tools that are used to customize, deploy, and service Windows images. It also contains the Windows Preinstallation Environment (Windows PE). - **Note**   - Windows ADK 8.1 is not required if you are installing only Remote Connection Viewer or Crash Analyzer. + **Note** + Windows ADK 8.1 is not required if you are installing only Remote Connection Viewer or Crash Analyzer. -   - To download Windows ADK 8.1, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 8.1](https://www.microsoft.com/download/details.aspx?id=39982) in the Microsoft Download Center. + +~~~ +To download Windows ADK 8.1, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 8.1](https://www.microsoft.com/download/details.aspx?id=39982) in the Microsoft Download Center. +~~~ - **Microsoft .NET Framework 4.5.1** @@ -110,9 +112,9 @@ DaRT 8.1 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is pa [Release Notes for DaRT 8.1](release-notes-for-dart-81.md) -  - -  + + + diff --git a/mdop/dart-v8/accessibility-for-dart-80-dart-8.md b/mdop/dart-v8/accessibility-for-dart-80-dart-8.md index 57d6d22878..936d93ea7d 100644 --- a/mdop/dart-v8/accessibility-for-dart-80-dart-8.md +++ b/mdop/dart-v8/accessibility-for-dart-80-dart-8.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in alternative formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

        (609) 987-8116

        -

        [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

        +

        http://www.learningally.org/

        Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

        -  + ## Customer service for people with hearing impairments @@ -96,9 +96,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with DaRT 8.0](getting-started-with-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md index 808bdd1d96..0dfd0b39f2 100644 --- a/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md +++ b/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md @@ -92,7 +92,7 @@ On the Drivers tab of the Advanced Options page, you can add additional device d **Important**   When you select drivers to include, be aware that wireless connectivity (such as Bluetooth or 802.11a/b/g/n) is not supported in DaRT. -  + **To add drivers to the recovery image** @@ -105,7 +105,7 @@ When you select drivers to include, be aware that wireless connectivity (such as **Note**   The driver file is provided by the manufacturer of the storage or network controller. -   + 4. Repeat Steps 2 and 3 for every driver that you want to include. @@ -144,7 +144,7 @@ The DaRT wizard checks for the tools in the `HKLM\Software\Microsoft\Windows Kit `%ProgramFilesX86%\Windows Kits\8.0\Debuggers\x86` -  + **To add the debugging tools for Crash Analyzer** @@ -180,7 +180,7 @@ On the Defender tab of the Advanced Options page, you add definitions, which are **Important**   You cannot scan if there are no definitions. -   + 3. Click **Next**. @@ -206,7 +206,7 @@ If you select the Edit Image check box on this page, you can customize the recov **Note**   The size of the image will vary, depending on the tools that you select and the files that you add in the wizard. -   + 2. In the **Image name** box, enter a name for the DaRT recovery image, or accept the default name, which is DaRT8. @@ -256,7 +256,7 @@ On the Create Bootable Media page, you can optionally copy the image file to a C **Note**   The Preboot execution environment (PXE) and local image deployment are not supported natively by this tool since they require additional enterprise tools, such as System Center Configuration Manager server and Microsoft Development Toolkit. -  + **To copy the recovery image to a CD, DVD, or USB** @@ -267,7 +267,7 @@ The Preboot execution environment (PXE) and local image deployment are not suppo **Note**   If a drive is not recognized and you install a new drive, you can click **Refresh** to force the wizard to update the list of available drives. -   + 3. Click the **Create Bootable Media** button. @@ -280,9 +280,9 @@ The Preboot execution environment (PXE) and local image deployment are not suppo [Deploying DaRT 8.0](deploying-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md b/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md index 4473090f37..eca291304a 100644 --- a/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md +++ b/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md @@ -22,7 +22,7 @@ This checklist can be used to help you during Microsoft Diagnostics and Recovery **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Decide on the best DaRT 8.0 deployment option for your requirements and deploy it.

        [Deploying DaRT 8.0 to Administrator Computers](deploying-dart-80-to-administrator-computers-dart-8.md)

        Deploying DaRT 8.0 to Administrator Computers

        Checklist box

        Use the DaRT Recovery Image wizard to create the DaRT recovery image ISO.

        [Creating the DaRT 8.0 Recovery Image](creating-the-dart-80-recovery-image-dart-8.md)

        Creating the DaRT 8.0 Recovery Image

        Checklist box

        Decide on the best DaRT 8.0 recovery image deployment option for your requirements and deploy it.

        [Deploying the DaRT Recovery Image](deploying-the-dart-recovery-image-dart-8.md)

        Deploying the DaRT Recovery Image

        -  + ## Related topics [Deploying DaRT 8.0](deploying-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/dart-80-planning-checklist-dart-8.md b/mdop/dart-v8/dart-80-planning-checklist-dart-8.md index e7ce89a340..7e29d01395 100644 --- a/mdop/dart-v8/dart-80-planning-checklist-dart-8.md +++ b/mdop/dart-v8/dart-80-planning-checklist-dart-8.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for product deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -41,31 +41,31 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - +
        Checklist box

        Review the DaRT 8.0 Supported Configurations information to confirm that the computers you have selected for client or feature installation meet the minimum hardware and operating system requirements.

        [DaRT 8.0 Supported Configurations](dart-80-supported-configurations-dart-8.md)

        DaRT 8.0 Supported Configurations

        Checklist box

        Understand the deployment prerequisites and decide which tools to include on the DaRT recovery image.

        [Planning to Create the DaRT 8.0 Recovery Image](planning-to-create-the-dart-80-recovery-image-dart-8.md)

        Planning to Create the DaRT 8.0 Recovery Image

        Checklist box

        Determine which method, or methods, you will use to deploy the DaRT recovery image.

        [Planning How to Save and Deploy the DaRT 8.0 Recovery Image](planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md)

        Planning How to Save and Deploy the DaRT 8.0 Recovery Image

        -  + ## Related topics [Planning for DaRT 8.0](planning-for-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/dart-80-supported-configurations-dart-8.md b/mdop/dart-v8/dart-80-supported-configurations-dart-8.md index f4406de71d..1498448738 100644 --- a/mdop/dart-v8/dart-80-supported-configurations-dart-8.md +++ b/mdop/dart-v8/dart-80-supported-configurations-dart-8.md @@ -63,7 +63,7 @@ The following table lists the installation prerequisites for the administrator c -  + ### Help desk computer prerequisites @@ -96,7 +96,7 @@ The following table lists the installation prerequisites for the help desk compu -  + ### End-user computer prerequisites @@ -112,12 +112,12 @@ The following table lists the operating systems that are supported for the DaRT **Note**   Make sure that you allocate enough space for any additional tools that you want to install on the administrator computer. -  + **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -166,7 +166,7 @@ Microsoft provides support for the current service pack and, in some cases, the
        -  + ### DaRT help desk computer system requirements @@ -231,7 +231,7 @@ The following table lists the operating systems that are supported for the DaRT -  + DaRT also has the following minimum hardware requirements for the end-user computer: @@ -290,16 +290,16 @@ The Diagnostics and Recovery Toolset window in DaRT requires that the end-user c -  + ## Related topics [Planning to Deploy DaRT 8.0](planning-to-deploy-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md index d2f744b909..99ebca995c 100644 --- a/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md +++ b/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md @@ -30,7 +30,7 @@ Extract the boot.wim file from the ISO image and deploy in the recovery partitio **Important**   The **DaRT Recovery Image Wizard** provides the option to burn the image to a CD, DVD or UFD, but the other methods of saving and deploying the recovery image require additional steps that involve tools that are not included in DaRT. Some guidance and links for these other methods are provided in this section. -  + ## Deploy the DaRT recovery image as part of a recovery partition @@ -51,9 +51,9 @@ You can host the recovery image on a central network boot server, such as Window [Deploying DaRT 8.0](deploying-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/getting-started-with-dart-80-dart-8.md b/mdop/dart-v8/getting-started-with-dart-80-dart-8.md index 4ce003894a..faa25ee39e 100644 --- a/mdop/dart-v8/getting-started-with-dart-80-dart-8.md +++ b/mdop/dart-v8/getting-started-with-dart-80-dart-8.md @@ -24,7 +24,7 @@ A downloadable version of this administrator’s guide is not available. However Additional downloadable information about this product can also be found at . -  + ## Getting started with DaRT 8.0 @@ -59,9 +59,9 @@ DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is pa [Troubleshooting DaRT 8.0](troubleshooting-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md b/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md index f26137b348..e31d87e179 100644 --- a/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md +++ b/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md @@ -22,7 +22,7 @@ The following instructions explain how to deploy Microsoft Diagnostics and Recov **Important**   Before you install DaRT, see [DaRT 8.0 Supported Configurations](dart-80-supported-configurations-dart-8.md) to ensure that you have installed all of the prerequisite software and that the computer meets the minimum system requirements. The computer onto which you install DaRT must be running Windows 8 or Windows Server 2012. -  + You can install DaRT using one of two different configurations: @@ -86,7 +86,7 @@ msiexec.exe /i MSDaRT80.msi /l*v log.txt **Note**   You can add /qn or /qb to perform a silent installation. -  + **To validate the DaRT installation** @@ -101,9 +101,9 @@ You can add /qn or /qb to perform a silent installation. [Deploying DaRT 8.0 to Administrator Computers](deploying-dart-80-to-administrator-computers-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md index c01d043f5c..a717b3888e 100644 --- a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md +++ b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md @@ -30,7 +30,7 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( **Note**   If you burned a CD or DVD of the recovery image, you can open the files on the CD or DVD and copy the boot.wim file from the \\sources folder. This lets you skip the need to mount the image. -   + 2. Deploy the boot.wim file to a WDS server that can be accessed from end-user computers in your enterprise. @@ -47,9 +47,9 @@ For more information about how to deploy DaRT as a remote partition, see [Walkth [Planning for DaRT 8.0](planning-for-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md index 5cf5f6749e..c5d594b59c 100644 --- a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md +++ b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md @@ -34,7 +34,7 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( **Note**   If you burned a CD, DVD, or USB of the recovery image, you can open the files on the removable media and copy the boot.wim file from the \\sources folder. If you copy boot.wim file, you don’t need to mount the image. -   + 3. Use the boot.wim file to create a bootable recovery partition by using your company’s standard method for creating a custom Windows RE image. @@ -53,9 +53,9 @@ After you have finished running the Microsoft Diagnostics and Recovery Toolset ( [Planning for DaRT 8.0](planning-for-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md index 348178406b..dca11766bc 100644 --- a/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md +++ b/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md @@ -39,18 +39,20 @@ Use these instructions to recover a computer when you are physically present at 6. Select the installation that you want to repair or diagnose, and then click **Next**. - **Note**   + **Note** If the Windows Recovery Environment (WinRE) detects or suspects that Windows 8 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. -   - If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. -7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ - The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. +7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset**. + + The **Diagnostics and Recovery Toolset** window opens. You can now run any of the individual tools or wizards that were included when the DaRT recovery image was created. You can click **Help** on the **Diagnostics and Recovery Toolset** window to open the client Help file that provides detailed instruction and information needed to run the individual DaRT tools. You can also click the **Solution Wizard** on the **Diagnostics and Recovery Toolset** window to choose the best tool for the situation, based on a brief interview that the wizard provides. @@ -58,41 +60,40 @@ For general information about any of the DaRT tools, see [Overview of the Tools **How to run DaRT at the command prompt** -- To run DaRT at the command prompt, specify the **netstart.exe** command then use any of the following parameters: +- To run DaRT at the command prompt, specify the **netstart.exe** command then use any of the following parameters: + + + + + + + + + + + + + + + + + + + + + + + + +

        Parameter

        Description

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages that ask the end user to specify whether to initialize the network and remap the drives.

        +
        + Warning

        The end user’s response to the prompt overrides the –network and –remount switches.

        +
        +
        + +
        - - - - - - - - - - - - - - - - - - - - - - - -

        Parameter

        Description

        -network

        Initializes the network services.

        -remount

        Remaps the drive letters.

        -prompt

        Displays messages that ask the end user to specify whether to initialize the network and remap the drives.

        -
        - Warning   -

        The end user’s response to the prompt overrides the –network and –remount switches.

        -
        -
        -   -
        -   ## Related topics @@ -101,9 +102,9 @@ For general information about any of the DaRT tools, see [Overview of the Tools [Recovering Computers Using DaRT 8.0](recovering-computers-using-dart-80-dart-8.md) -  - -  + + + diff --git a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md index 7cd1a013a2..ea9f968420 100644 --- a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md +++ b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md @@ -35,113 +35,116 @@ If you disabled the DaRT tools when you created the recovery image, you still ha Whichever method that you use to boot into DaRT, you must enable the boot device in the BIOS for the boot option or options that you want to make available to the end user. - **Note**   + **Note** Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -   - As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. -2. When you are asked whether you want to initialize network services, select one of the following: +~~~ +As the computer is booting into the DaRT recovery image, the **NetStart** dialog box appears. +~~~ - **Yes** - it is assumed that a DHCP server is present on the network, and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. +2. When you are asked whether you want to initialize network services, select one of the following: - **No** - skip the network initialization process. + **Yes** - it is assumed that a DHCP server is present on the network, and an attempt is made to obtain an IP address from the server. If the network uses static IP addresses instead of DHCP, you can later use the **TCP/IP Configuration** tool in DaRT to specify a static IP address. -3. Indicate whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. + **No** - skip the network initialization process. -4. On the **System Recovery Options** dialog box, select a keyboard layout. +3. Indicate whether you want to remap the drive letters. When you run Windows online, the system volume is typically mapped to drive C. However, when you run Windows offline under WinRE, the original system volume might be mapped to another drive, and this can cause confusion. If you decide to remap, DaRT tries to map the offline drive letters to match the online drive letters. Remapping is performed only if an offline operating system is selected later in the startup process. -5. Check the displayed system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers, and then insert the installation media for the device and select the driver. +4. On the **System Recovery Options** dialog box, select a keyboard layout. -6. Select the installation that you want to repair or diagnose, and then click **Next**. +5. Check the displayed system root directory, the kind of operating system installed, and the partition size. If you do not see your operating system listed, and suspect that the lack of drivers is a possible cause of the failure, click **Load Drivers** to load the suspect drivers, and then insert the installation media for the device and select the driver. - **Note**   - If the Windows Recovery Environment (WinRE) detects or suspects that Windows 8 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. For information about how to resolve this issue, see [Troubleshooting DaRT 8.0](troubleshooting-dart-80-dart-8.md). +6. Select the installation that you want to repair or diagnose, and then click **Next**. -   + **Note** + If the Windows Recovery Environment (WinRE) detects or suspects that Windows 8 did not start correctly the last time that it was tried, **Startup Repair** might start to run automatically. For information about how to resolve this issue, see [Troubleshooting DaRT 8.0](troubleshooting-dart-80-dart-8.md). - If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. - The **System Recovery Options** window appears and lists various recovery tools. -7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset**. +~~~ +If any of the registry hives are corrupted or missing, Registry Editor and several other DaRT utilities will have limited functionality. If no operating system is selected, some tools will not be available. -8. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. +The **System Recovery Options** window appears and lists various recovery tools. +~~~ - The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. +7. On the **System Recovery Options** window, click **Microsoft Diagnostics and Recovery Toolset** to open the **Diagnostics and Recovery Toolset**. -9. On the help desk computer, open the **DaRT Remote Connection Viewer**. +8. On the **Diagnostics and Recovery Toolset** window, click **Remote Connection** to open the **DaRT Remote Connection** window. If you are prompted to give the help desk remote access, click **OK**. + + The DaRT Remote Connection window opens and displays a ticket number, IP address, and port information. + +9. On the help desk computer, open the **DaRT Remote Connection Viewer**. 10. Click **Start**, click **All Programs**, click **Microsoft DaRT 8.0**, and then click **DaRT Remote Connection Viewer**. 11. In the **DaRT Remote Connection** window, enter the required ticket, IP address, and port information. - **Note**   - This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. + **Note** + This information is created on the end-user computer and must be provided by the end user. There might be multiple IP addresses to choose from, depending on how many are available on the end-user computer. + -   12. Click **Connect**. The IT administrator now assumes control of the end-user computer and can run the DaRT tools remotely. -**Note**   +**Note** A file is provided that is named inv32.xml and contains remote connection information, such as the port number and IP address. By default, the file is typically located at %windir%\\system32. -  + **To customize the Remote Connection process** -1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). +1. You can customize the Remote Connection process by editing the winpeshl.ini file. For more information about how to edit the winpeshl.ini file, see [Winpeshl.ini Files](https://go.microsoft.com/fwlink/?LinkId=219413). - Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: + Specify the following commands and parameters to customize how a remote connection is established with an end-user computer: - - - - - - - - - - - - - - - - - - - - - - - - - -
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        -
        - Important   -

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        -
        -
        -   -
        + + + + + + + + + + + + + + + + + + + + + + + + + +
        CommandParameterDescription

        RemoteRecovery.exe

        -nomessage

        Specifies that the confirmation prompt is not displayed. Remote Connection continues just as if the end user had responded "Yes" to the confirmation prompt.

        WaitForConnection.exe

        none

        Prevents a custom script from continuing until either Remote Connection is not running or a valid connection is established with the end-user computer.

        +
        + Important

        This command serves no function if it is specified independently. It must be specified in a script to function correctly.

        +
        +
        -   +
        -2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax - [LaunchApps] - "%windir%\system32\netstart.exe -network -remount" - "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" - "%windir%\system32\WaitForConnection.exe" - "%SYSTEMDRIVE%\sources\recovery\recenv.exe" - ``` + +2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: + + ``` syntax + [LaunchApps] + "%windir%\system32\netstart.exe -network -remount" + "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" + "%windir%\system32\WaitForConnection.exe" + "%SYSTEMDRIVE%\sources\recovery\recenv.exe" + ``` When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the RAM disk. This file contains connection information: IP address, port, and ticket number. You can copy this file to a network share to trigger a Help desk workflow. For example, a custom program can check the network share for connection files, and then create a support ticket or send email notifications. @@ -176,14 +179,16 @@ When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the -   - **Note**   - The variables for these parameters are created on the end-user computer and must be provided by the end user. -   +~~~ +**Note** +The variables for these parameters are created on the end-user computer and must be provided by the end user. +~~~ -2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. + + +2. If all three parameters are specified and the data is valid, a connection is immediately tried when the program starts. If any parameter is not valid, the program starts as if there were no parameters specified. ## Related topics @@ -192,9 +197,9 @@ When DaRT starts, it creates the file inv32.xml in \\Windows\\System32\\ on the [Recovering Computers Using DaRT 8.0](recovering-computers-using-dart-80-dart-8.md) -  - -  + + + diff --git a/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md b/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md index e0df0176f6..7cffb8401b 100644 --- a/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md +++ b/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md @@ -33,7 +33,7 @@ A description of the DaRT 8.0 tools follows. **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### Crash Analyzer @@ -50,7 +50,7 @@ For more information about **Crash Analyzer**, see [Diagnosing System Failures w **Important**   Environments with the DaRT Defender deployed should instead use the Windows Defender Offline (WDO) protection image for malware detection. Because of how the Defender tool integrates into DaRT, all supported DaRT version deployments cannot apply these anti-malware updates to their DaRT images. For more information, see [Microsoft Diagnostics and Recovery Toolset (DaRT) users should use Windows Defender Offline (WDO) for malware detection](microsoft-diagnostics-and-recovery-toolset--dart--users-should-use-windows-defender-offline--wdo--for-malware-detection.md). -  + **Defender** can help detect malware and unwanted software and warn you of security risks. You can use this tool to scan a computer for and remove malware even when the installed Windows operating system is not running. When **Defender** detects malicious or unwanted software, it prompts you to remove, quarantine, or allow for each item. @@ -71,12 +71,12 @@ Malware that uses rootkits can mask itself from the running operating system. If **Warning**   We recommend that you back up a disk before you use **Disk Commander** to repair it. By using **Disk Commander**, you can potentially damage volumes and make them inaccessible. Additionally, changes to one volume can affect other volumes because volumes on a disk share a partition table. -  + **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### Disk Wipe @@ -85,7 +85,7 @@ You can use **Disk Wipe** to delete all data from a disk or volume, even the dat **Warning**   After wiping a disk or volume, you cannot recover the data. Verify the size and label of a volume before erasing it. -  + ### Explorer @@ -98,7 +98,7 @@ The **Explorer** tool lets you browse the computer’s file system and network s **Note**   The recovery of dynamic disks with DaRT is not supported. -  + ### File Search @@ -115,7 +115,7 @@ We recommend that you uninstall only one hotfix at a time, even though the tool **Important**   Programs that were installed or updated after a hotfix was installed might not work correctly after you uninstall a hotfix. -  + ### Locksmith @@ -130,7 +130,7 @@ You can use **Registry Editor** to access and change the registry of the Windows **Warning**   Serious problems can occur if you change the registry incorrectly by using **Registry Editor**. These problems might require you to reinstall the operating system. Before you make changes to the registry, you should back up any valued data on the computer. Change the registry at your own risk. -  + ### SFC Scan @@ -149,9 +149,9 @@ When you boot a problem computer into DaRT, it is set to automatically obtain it [Getting Started with DaRT 8.0](getting-started-with-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md index 3e33763b18..4f95c0b2fa 100644 --- a/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md +++ b/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md @@ -24,7 +24,7 @@ If your organization uses Active Directory Domain Services (AD DS), you may want **Note**   You may want to use more than one method in your organization. For example, you can boot into DaRT from a remote partition for most situations and have a USB flash drive available in case the end-user computer cannot connect to the network. -  + The following table shows some advantages and disadvantages of each method of using DaRT in your organization. @@ -80,16 +80,16 @@ The following table shows some advantages and disadvantages of each method of us -  + ## Related topics [Planning to Deploy DaRT 8.0](planning-to-deploy-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md index a3adfc482b..4acce8e180 100644 --- a/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md +++ b/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md @@ -49,7 +49,7 @@ The following items are required or recommended for creating the DaRT recovery i

        Windows Debugging Tools for your platform

        -

        Required when you run the Crash Analyzer to determine the cause of a computer failure. We recommend that you specify the path of the Windows Debugging Tools at the time that you create the DaRT recovery image. You can download the Windows Debugging Tools here: [Download and Install Debugging Tools for Windows](https://go.microsoft.com/fwlink/?LinkId=99934).

        +

        Required when you run the Crash Analyzer to determine the cause of a computer failure. We recommend that you specify the path of the Windows Debugging Tools at the time that you create the DaRT recovery image. You can download the Windows Debugging Tools here: Download and Install Debugging Tools for Windows.

        Optional: Defender definitions

        @@ -57,21 +57,21 @@ The following items are required or recommended for creating the DaRT recovery i

        Optional: Windows symbols files for use with Crash Analyzer

        -

        Typically, debugging information is stored in a symbol file that is separate from the program. You must have access to the symbol information when you debug an application that has stopped responding, for example, if it stopped working. For more information, see [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer--dart-8.md).

        +

        Typically, debugging information is stored in a symbol file that is separate from the program. You must have access to the symbol information when you debug an application that has stopped responding, for example, if it stopped working. For more information, see Diagnosing System Failures with Crash Analyzer.

        -  + ## Related topics [Planning to Deploy DaRT 8.0](planning-to-deploy-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md b/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md index a75d6d79e6..10b50735d0 100644 --- a/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md +++ b/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md @@ -34,7 +34,7 @@ Whichever method that you use to boot into DaRT, you must enable the boot device **Note**   Configuring the BIOS is unique, depending on the kind of hard disk drive, network adapters, and other hardware that is used in your organization. -  + ## Recover a local computer by using the DaRT recovery image @@ -51,7 +51,7 @@ The Remote Connection feature in DaRT lets an IT administrator run the DaRT tool **Important**   The two computers establishing a remote connection must be part of the same network. -  + The **Diagnostics and Recovery Toolset** window includes the option to run DaRT on an end-user computer remotely from an administrator computer. The end user opens the DaRT tools on the problem computer and starts the remote session by clicking **Remote Connection**. @@ -66,9 +66,9 @@ The IT administrator or help desk worker enters this information into the **DaRT [Operations for DaRT 8.0](operations-for-dart-80-dart-8.md) -  + -  + diff --git a/mdop/dart-v8/release-notes-for-dart-80--dart-8.md b/mdop/dart-v8/release-notes-for-dart-80--dart-8.md index 3a65704d88..7ec6427eb0 100644 --- a/mdop/dart-v8/release-notes-for-dart-80--dart-8.md +++ b/mdop/dart-v8/release-notes-for-dart-80--dart-8.md @@ -40,7 +40,7 @@ We are interested in your feedback on DaRT 8.0. You can send your feedback to AGPM 4.0 - Windows Vista SP1, Windows 7, Windows Server 2008, Windows Server 2008 R2

        AGPM 3.0- Windows Vista SP1, Windows Server 2008

        AGPM 2.5 - Windows Vista, Windows Server 2003

        -

        [Overview of Microsoft Advanced Group Policy Management](agpm/index.md)

        -

        [AGPM 4.0 SP3](agpm/whats-new-in-agpm-40-sp3.md)

        -

        [AGPM 4.0 SP2](agpm/whats-new-in-agpm-40-sp2.md)

        -

        [AGPM 4.0 SP1](https://go.microsoft.com/fwlink/p/?LinkId=286715) (https://go.microsoft.com/fwlink/p/?LinkId=286715)

        -

        [AGPM 4.0](agpm/whats-new-in-agpm-40-sp1.md)

        -

        [AGPM 3.0](agpm/whats-new-in-agpm-30.md)

        -

        [AGPM 2.5](agpm/agpm-25-navengl.md)

        -

        [AGPM Whitepapers on the Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=232275)

        +

        Overview of Microsoft Advanced Group Policy Management

        +

        AGPM 4.0 SP3

        +

        AGPM 4.0 SP2

        +

        AGPM 4.0 SP1 (https://go.microsoft.com/fwlink/p/?LinkId=286715)

        +

        AGPM 4.0

        +

        AGPM 3.0

        +

        AGPM 2.5

        +

        AGPM Whitepapers on the Microsoft Download Center

        Microsoft Application Virtualization (App-V) lets you make applications available to end user computers without installing the applications directly on those computers.

        -

        [Microsoft Application Virtualization 5.1 Administrator's Guide](appv-v5/microsoft-application-virtualization-51-administrators-guide.md)

        -

        [About App-V 5.0 SP3](appv-v5/about-app-v-50-sp3.md)

        -

        [About App-V 5.0 SP2](appv-v5/about-app-v-50-sp2.md)

        -

        [About App-V 5.0 SP1](appv-v5/about-app-v-50-sp1.md)

        -

        [Microsoft Application Virtualization 5.0 Administrator's Guide](appv-v5/microsoft-application-virtualization-50-administrators-guide.md)

        -

        [About Microsoft Application Virtualization 4.6 SP3](appv-v4/about-microsoft-application-virtualization-46-sp3.md)

        -

        [About Microsoft Application Virtualization 4.6 SP2](appv-v4/about-microsoft-application-virtualization-46-sp2.md)

        -

        [About Microsoft Application Virtualization 4.6 SP1](appv-v4/about-microsoft-application-virtualization-46-sp1.md)

        -

        [About Microsoft Application Virtualization 4.6](appv-v4/about-microsoft-application-virtualization-46.md)

        -

        [About Microsoft Application Virtualization 4.5](appv-v4/about-microsoft-application-virtualization-45.md)

        -

        [App-V Whitepapers on the Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=231902)

        -

        [App-V 5.0 eBooks](https://go.microsoft.com/fwlink/p/?LinkId=309570) (https://go.microsoft.com/fwlink/p/?LinkId=309570)

        +

        Microsoft Application Virtualization 5.1 Administrator's Guide

        +

        About App-V 5.0 SP3

        +

        About App-V 5.0 SP2

        +

        About App-V 5.0 SP1

        +

        Microsoft Application Virtualization 5.0 Administrator's Guide

        +

        About Microsoft Application Virtualization 4.6 SP3

        +

        About Microsoft Application Virtualization 4.6 SP2

        +

        About Microsoft Application Virtualization 4.6 SP1

        +

        About Microsoft Application Virtualization 4.6

        +

        About Microsoft Application Virtualization 4.5

        +

        App-V Whitepapers on the Microsoft Download Center

        +

        App-V 5.0 eBooks (https://go.microsoft.com/fwlink/p/?LinkId=309570)

        Microsoft BitLocker Administration and Monitoring (MBAM) provides an administrative interface to enterprise-wide BitLocker drive encryption.

        -

        [Microsoft BitLocker Administration and Monitoring 2.5](mbam-v25/index.md)

        -

        [MBAM 2.5 Video Demonstration: Deploying MBAM 2.5](https://go.microsoft.com/fwlink/?LinkId=518206)

        -

        [About MBAM 2.5 SP1](mbam-v25/about-mbam-25-sp1.md)

        -

        [About MBAM 2.0 SP1](mbam-v2/about-mbam-20-sp1.md)

        -

        [Microsoft BitLocker Administration and Monitoring 2 Administrator's Guide](mbam-v2/index.md)

        -

        [Microsoft BitLocker Administration and Monitoring 1 Administrator's Guide](mbam-v1/index.md)

        -

        [MBAM Whitepapers on the Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=231905) (https://go.microsoft.com/fwlink/p/?LinkId=231905)

        -

        [MBAM 1.0 eBooks](https://go.microsoft.com/fwlink/p/?LinkId=309571) (https://go.microsoft.com/fwlink/p/?LinkId=309571)

        +

        Microsoft BitLocker Administration and Monitoring 2.5

        +

        MBAM 2.5 Video Demonstration: Deploying MBAM 2.5

        +

        About MBAM 2.5 SP1

        +

        About MBAM 2.0 SP1

        +

        Microsoft BitLocker Administration and Monitoring 2 Administrator's Guide

        +

        Microsoft BitLocker Administration and Monitoring 1 Administrator's Guide

        +

        MBAM Whitepapers on the Microsoft Download Center (https://go.microsoft.com/fwlink/p/?LinkId=231905)

        +

        MBAM 1.0 eBooks (https://go.microsoft.com/fwlink/p/?LinkId=309571)

        Microsoft Diagnostics and Recovery Toolset (DaRT) helps troubleshoot and repair Windows-based computers.

        @@ -81,53 +81,53 @@ The following table provides links to the product documentation for the MDOP pro

        DaRT 6.5 - Windows 7, Windows Server 2008 R2

        DaRT 6.0 - Windows Vista, Windows Server 2008

        DaRT 5.0 - Windows 2000, Windows XP, Windows Server 2003

        -

        [Diagnostics and Recovery Toolset 10](dart-v10/index.md)

        -

        [About DaRT 8.1](dart-v8/about-dart-81.md)

        -

        [About DaRT 8.0 SP1](dart-v8/about-dart-80-sp1.md)

        -

        [Diagnostics and Recovery Toolset 8 Administrator's Guide](dart-v8/index.md)

        -

        [Diagnostics and Recovery Toolset 7 Administrator's Guide](dart-v7/index.md)

        -

        [DaRT 6.5](https://go.microsoft.com/fwlink/p/?LinkId=232983) (https://go.microsoft.com/fwlink/p/?LinkId=232983)

        -

        [DaRT Whitepapers on the Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=232274) (https://go.microsoft.com/fwlink/p/?LinkId=232274)

        -

        [DaRT 8.0 eBook](https://go.microsoft.com/fwlink/p/?LinkId=309573) (https://go.microsoft.com/fwlink/p/?LinkId=309573)

        -

        [DaRT 7.0 eBook](https://go.microsoft.com/fwlink/p/?LinkId=309572) (https://go.microsoft.com/fwlink/p/?LinkId=309572)

        +

        Diagnostics and Recovery Toolset 10

        +

        About DaRT 8.1

        +

        About DaRT 8.0 SP1

        +

        Diagnostics and Recovery Toolset 8 Administrator's Guide

        +

        Diagnostics and Recovery Toolset 7 Administrator's Guide

        +

        DaRT 6.5 (https://go.microsoft.com/fwlink/p/?LinkId=232983)

        +

        DaRT Whitepapers on the Microsoft Download Center (https://go.microsoft.com/fwlink/p/?LinkId=232274)

        +

        DaRT 8.0 eBook (https://go.microsoft.com/fwlink/p/?LinkId=309573)

        +

        DaRT 7.0 eBook (https://go.microsoft.com/fwlink/p/?LinkId=309572)

        Microsoft Desktop Enterprise Monitoring (DEM) monitors and reports enterprise-wide desktop application and system failures.

        -

        [DEM 3.5](https://go.microsoft.com/fwlink/p/?LinkId=232985) (https://go.microsoft.com/fwlink/p/?LinkId=232985)

        -

        [DEM Whitepapers on the Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=232276) (https://go.microsoft.com/fwlink/p/?LinkId=232276)

        +

        DEM 3.5 (https://go.microsoft.com/fwlink/p/?LinkId=232985)

        +

        DEM Whitepapers on the Microsoft Download Center (https://go.microsoft.com/fwlink/p/?LinkId=232276)

        Microsoft Enterprise Desktop Virtualization (MED-V) uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization.

        MED-V 2.0 - Windows 7

        MED-V 1.0 SP1 - Windows 7, Windows Vista, Windows XP

        MED-V 1.0 - Windows Vista, Windows XP

        -

        [Microsoft Enterprise Desktop Virtualization 2.0](medv-v2/index.md)

        -

        [About MED-V 1.0 SP1](medv-v1/about-med-v-10-sp1.md)

        -

        [Microsoft Enterprise Desktop Virtualization 1.0](medv-v1/index.md)

        +

        Microsoft Enterprise Desktop Virtualization 2.0

        +

        About MED-V 1.0 SP1

        +

        Microsoft Enterprise Desktop Virtualization 1.0

        Microsoft User Experience Virtualization (UE-V) captures settings to apply to computers accessed by the user including desktop computers, laptop computers, and VDI sessions.

        -

        [Microsoft User Experience Virtualization (UE-V) 2.x](uev-v2/index.md)

        -

        [What's New in UE-V 2.1 SP1](uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md)

        -

        [What's New in UE-V 2.1](uev-v2/whats-new-in-ue-v-21-new-uevv2.md)

        -

        [What's New in UE-V 2.0](uev-v2/whats-new-in-ue-v-20-new-uevv2.md)

        -

        [About User Experience Virtualization 1.0 SP1](uev-v1/about-user-experience-virtualization-10-sp1.md)

        -

        [Microsoft User Experience Virtualization (UE-V) 1.0](uev-v1/index.md)

        -

        [UE-V 1.0 eBooks](https://go.microsoft.com/fwlink/p/?LinkId=309574) (https://go.microsoft.com/fwlink/p/?LinkId=309574)

        +

        Microsoft User Experience Virtualization (UE-V) 2.x

        +

        What's New in UE-V 2.1 SP1

        +

        What's New in UE-V 2.1

        +

        What's New in UE-V 2.0

        +

        About User Experience Virtualization 1.0 SP1

        +

        Microsoft User Experience Virtualization (UE-V) 1.0

        +

        UE-V 1.0 eBooks (https://go.microsoft.com/fwlink/p/?LinkId=309574)

        -

        [MDOP Solutions and Scenarios](solutions/index.md)

        -

        [Virtualizing Microsoft Office 2013 for Application Virtualization (App-V) 5.0](solutions/virtualizing-microsoft-office-2013-for-application-virtualization--app-v--50-solutions.md)

        -

        [Virtualizing Microsoft Office 2010 for Application Virtualization (App-V) 5.0](solutions/virtualizing-microsoft-office-2010-for-application-virtualization--app-v--50-solutions.md)

        -

        [Creating App-V 4.5 Databases Using SQL Scripting](solutions/creating-app-v-45-databases-using-sql-scripting.md)

        -

        [Application Publishing and Client Interaction for App-V 5](solutions/application-publishing-and-client-interaction-for-app-v-5-solutions.md)

        -

        [How to Download and Deploy MDOP Group Policy (.admx) Templates](solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md)

        +

        MDOP Solutions and Scenarios

        +

        Virtualizing Microsoft Office 2013 for Application Virtualization (App-V) 5.0

        +

        Virtualizing Microsoft Office 2010 for Application Virtualization (App-V) 5.0

        +

        Creating App-V 4.5 Databases Using SQL Scripting

        +

        Application Publishing and Client Interaction for App-V 5

        +

        How to Download and Deploy MDOP Group Policy (.admx) Templates

        -  + ## Supplemental MDOP Product Guidance @@ -142,21 +142,21 @@ In addition to the product documentation available online, supplemental product

        MDOP Virtual Labs

        -

        For a list of available MDOP virtual labs, go to [Microsoft Desktop Optimization Pack (MDOP) Virtual Labs](https://go.microsoft.com/fwlink/p/?LinkId=234276) (https://go.microsoft.com/fwlink/p/?LinkId=234276).

        +

        For a list of available MDOP virtual labs, go to Microsoft Desktop Optimization Pack (MDOP) Virtual Labs (https://go.microsoft.com/fwlink/p/?LinkId=234276).

        MDOP TechCenter

        -

        For technical whitepapers, evaluation materials, blogs, and additional MDOP resources, go to [MDOP TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=225286) (https://go.microsoft.com/fwlink/p/?LinkId=225286)

        +

        For technical whitepapers, evaluation materials, blogs, and additional MDOP resources, go to MDOP TechCenter (https://go.microsoft.com/fwlink/p/?LinkId=225286)

        MDOP Forums

        -

        Join in the MDOP community where you can ask and answer questions at the [MDOP TechNet Forum](https://go.microsoft.com/fwlink/p/?LinkId=286973) (https://go.microsoft.com/fwlink/p/?LinkId=286973).

        +

        Join in the MDOP community where you can ask and answer questions at the MDOP TechNet Forum (https://go.microsoft.com/fwlink/p/?LinkId=286973).

        -  + ## How to Get MDOP @@ -169,9 +169,9 @@ MDOP subscribers can download the software at the [Microsoft Volume Licensing we **Purchase MDOP** Visit the enterprise [Purchase Windows Enterprise Licensing](https://www.microsoft.com/licensing/how-to-buy/how-to-buy) website to find out how to purchase MDOP for your business. -  + -  + diff --git a/mdop/mbam-v1/about-mbam-10.md b/mdop/mbam-v1/about-mbam-10.md index 8868acfdc9..6649ff16d7 100644 --- a/mdop/mbam-v1/about-mbam-10.md +++ b/mdop/mbam-v1/about-mbam-10.md @@ -24,7 +24,7 @@ With Microsoft BitLocker Administration and Monitoring, you can select the BitLo **Note**   BitLocker is not covered in detail in this guide. For an overview of BitLocker, see [BitLocker Drive Encryption Overview](https://go.microsoft.com/fwlink/p/?LinkId=225013). -  + The following groups might be interested in using MBAM to manage BitLocker: @@ -46,9 +46,9 @@ For more information and for latest updates, see [Release Notes for MBAM 1.0](re [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/accessibility-for-mbam-10.md b/mdop/mbam-v1/accessibility-for-mbam-10.md index 4dc58460d9..6e772a734a 100644 --- a/mdop/mbam-v1/accessibility-for-mbam-10.md +++ b/mdop/mbam-v1/accessibility-for-mbam-10.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in Alternative Formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

        (609) 987-8116

        -

        [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

        +

        http://www.learningally.org/

        Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

        -  + ## Customer Service for People with Hearing Impairments @@ -96,9 +96,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/administering-mbam-10-features.md b/mdop/mbam-v1/administering-mbam-10-features.md index 42e7a01e28..86fabb6cde 100644 --- a/mdop/mbam-v1/administering-mbam-10-features.md +++ b/mdop/mbam-v1/administering-mbam-10-features.md @@ -34,7 +34,7 @@ The MBAM Hardware Compatibility feature can help you to ensure that only the com **Important**   When this feature is turned off, all computers where the MBAM policy is deployed will be encrypted. -  + MBAM can collect information on both the make and model of client computers if you deploy the “Allow Hardware Compatibility Checking” Group Policy. If you configure this policy, the MBAM agent reports the computer make and model information to the MBAM Server when the MBAM Client is deployed on a client computer. @@ -61,9 +61,9 @@ If enabled through a Group Policy Objects (GPO), a custom MBAM control panel tha [Operations for MBAM 1.0](operations-for-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md b/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md index 7830935da3..55c227b364 100644 --- a/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md +++ b/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md @@ -27,7 +27,7 @@ In this configuration, all MBAM features are installed on a single server. This **Important**   This configuration is supported, but we recommend it for testing only. -  + The procedures in this section describe the full installation of the MBAM features on a single server. @@ -93,9 +93,9 @@ In this configuration, MBAM features are installed in the following configuratio [Deploying MBAM 1.0](deploying-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/evaluating-mbam-10.md b/mdop/mbam-v1/evaluating-mbam-10.md index 64bf6488dd..a610d18cea 100644 --- a/mdop/mbam-v1/evaluating-mbam-10.md +++ b/mdop/mbam-v1/evaluating-mbam-10.md @@ -47,63 +47,62 @@ Even when you set up a non-production instance of MBAM to evaluate in a lab envi Checklist box

        Review the Getting Started information about MBAM to gain a basic understanding of the product before you begin your deployment planning.

        -

        [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md)

        +

        Getting Started with MBAM 1.0

        Checklist box

        -

        Prepare your computing environment for the MBAM installation. To do so, you must enable the Transparent Data Encryption (TDE) on the SQL Server instances that will host MBAM databases. To enable TDE in your lab environment, you can create a .sql file to run against the master database that is hosted on the instance of the SQL Server that MBAM will use.

        +

        Prepare your computing environment for the MBAM installation. To do so, you must enable the Transparent Data Encryption (TDE) on the SQL Server instances that will host MBAM databases. To enable TDE in your lab environment, you can create a .sql file to run against the master database that is hosted on the instance of the SQL Server that MBAM will use.

        -Note   -

        You can use the following example to create a .sql file for your lab environment to quickly enable TDE on the SQL Server instance that will host the MBAM databases. These SQL Server commands will enable TDE by using a locally signed SQL Server certificate. Make sure to back up the TDE certificate and its associated encryption key to the example local backup path of C:\Backup\. The TDE certificate and key are required when recover the database or move the certificate and key to another server that has TDE encryption in place.

        +Note

        You can use the following example to create a .sql file for your lab environment to quickly enable TDE on the SQL Server instance that will host the MBAM databases. These SQL Server commands will enable TDE by using a locally signed SQL Server certificate. Make sure to back up the TDE certificate and its associated encryption key to the example local backup path of C:\Backup</em>. The TDE certificate and key are required when recover the database or move the certificate and key to another server that has TDE encryption in place.

        -  +
        USE master;
         GO
        -CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'P@55w0rd';
        +CREATE MASTER KEY ENCRYPTION BY PASSWORD = &amp;#39;P@55w0rd';
         GO
         CREATE CERTIFICATE tdeCert WITH SUBJECT = 'TDE Certificate';
         GO
         BACKUP CERTIFICATE tdeCert TO FILE = 'C:\Backup\TDECertificate.cer'
            WITH PRIVATE KEY (
                  FILE = 'C:\Backup\TDECertificateKey.pvk',
        -         ENCRYPTION BY PASSWORD = 'P@55w0rd');
        +         ENCRYPTION BY PASSWORD = &amp;#39;P@55w0rd');
         GO
        -

        [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md)

        -

        [Database Encryption in SQL Server 2008 Enterprise Edition](https://go.microsoft.com/fwlink/?LinkId=269703)

        +

        MBAM 1.0 Deployment Prerequisites

        +

        Database Encryption in SQL Server 2008 Enterprise Edition

        Checklist box

        Plan for and configure MBAM Group Policy requirements.

        -

        [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md)

        +

        Planning for MBAM 1.0 Group Policy Requirements

        Checklist box -

        Plan for and create the necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

        -

        [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md)

        +

        Plan for and create the necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

        +

        Planning for MBAM 1.0 Administrator Roles

        Checklist box

        Plan for MBAM Server feature deployment.

        -

        [Planning for MBAM 1.0 Server Deployment](planning-for-mbam-10-server-deployment.md)

        +

        Planning for MBAM 1.0 Server Deployment

        Checklist box

        Plan for MBAM Client deployment.

        -

        [Planning for MBAM 1.0 Client Deployment](planning-for-mbam-10-client-deployment.md)

        +

        Planning for MBAM 1.0 Client Deployment

        -  + ### Perform an MBAM Evaluation Deployment @@ -120,47 +119,47 @@ After you complete the necessary planning and software prerequisite installation Checklist box

        Review the MBAM supported configurations information to make sure that the selected client and server computers are supported for the MBAM feature installation.

        -

        [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md)

        +

        MBAM 1.0 Supported Configurations

        Checklist box

        Run MBAM Setup to deploy MBAM Server features on a single server for evaluation purposes.

        -

        [How to Install and Configure MBAM on a Single Server](how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md)

        +

        How to Install and Configure MBAM on a Single Server

        Checklist box -

        Add the Active Directory Domain Services security groups that you created during the planning phase to the appropriate local MBAM Server feature local groups on the new MBAM server.

        -

        [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md) and [How to Manage MBAM Administrator Roles](how-to-manage-mbam-administrator-roles-mbam-1.md)

        +

        Add the Active Directory Domain Services security groups that you created during the planning phase to the appropriate local MBAM Server feature local groups on the new MBAM server.

        +

        Planning for MBAM 1.0 Administrator Roles and How to Manage MBAM Administrator Roles

        Checklist box

        Create and deploy the required MBAM Group Policy Objects.

        -

        [Deploying MBAM 1.0 Group Policy Objects](deploying-mbam-10-group-policy-objects.md)

        +

        Deploying MBAM 1.0 Group Policy Objects

        Checklist box

        Deploy the MBAM Client software.

        -

        [Deploying the MBAM 1.0 Client](deploying-the-mbam-10-client.md)

        +

        Deploying the MBAM 1.0 Client

        -  + ## Configure Lab Computers for MBAM Evaluation You can change the frequency settings on the MBAM Client status reporting by using Registry Editor. However, these modifications should be used for testing purposes only. -**Warning**   +**Warning** This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + ### Modify the Frequency Settings on MBAM Client Status Reporting @@ -175,9 +174,9 @@ In addition to the MBAM Client wakeup and status reporting frequencies, there is [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md) -  - -  + + + diff --git a/mdop/mbam-v1/getting-started-with-mbam-10.md b/mdop/mbam-v1/getting-started-with-mbam-10.md index a1e8b7128c..b54f281bf6 100644 --- a/mdop/mbam-v1/getting-started-with-mbam-10.md +++ b/mdop/mbam-v1/getting-started-with-mbam-10.md @@ -24,7 +24,7 @@ If you are new to this product, we recommend that you read the documentation tho **Note**   You can find a downloadable version of this documentation and the MBAM Evaluation Guide at . -  + This section of the MBAM Administrator’s Guide includes high-level information about MBAM to provide you with a basic understanding of the product before you begin the deployment planning. Additional MBAM documentation can be found on the MBAM Documentation Resources Download page at . @@ -60,9 +60,9 @@ This section of the MBAM Administrator’s Guide includes high-level information - [Troubleshooting MBAM 1.0](troubleshooting-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/high-level-architecture-for-mbam-10.md b/mdop/mbam-v1/high-level-architecture-for-mbam-10.md index c732bb2e7d..73dfbdd35b 100644 --- a/mdop/mbam-v1/high-level-architecture-for-mbam-10.md +++ b/mdop/mbam-v1/high-level-architecture-for-mbam-10.md @@ -29,7 +29,7 @@ The following diagram displays the MBAM architecture. The single-server MBAM dep **Note**   At least a three-computer MBAM deployment topology is recommended for a production deployment. For more information about MBAM deployment topologies, see [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md). -  + ![mbam single server deployment topology](images/mbam-1-server.jpg) @@ -58,9 +58,9 @@ At least a three-computer MBAM deployment topology is recommended for a producti [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md b/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md index 932d92dac4..a8ca4fbd5c 100644 --- a/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md +++ b/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md @@ -24,7 +24,7 @@ To obtain the setup log files, you must install Microsoft BitLocker Administrati Additional setup log files are created in the %temp% folder of the user who installs MBAM. -  + The Network Load Balancing (NLB) clusters for the Administration and Monitoring Server feature provides scalability in MBAM and it should support more than 55,000 MBAM client computers. @@ -41,7 +41,7 @@ All computers that will be part of a NLB cluster have the following requirements - The NLB cluster requires a static IP address, and a host record must be manually created in the domain name system (DNS). -  + ## Configuring Network Load Balancing for MBAM Administration and Monitoring Servers @@ -53,7 +53,7 @@ Before you begin the procedures described in this topic, you must have the MBAM **Note**   This topic describes the basic process of using Network Load Balancing Manager to create an NLB Cluster. The exact steps to configure a Windows Server as part of an NLB cluster depend on the Windows Server version in use.. For more information about how to create NLBs on Windows Server 2008, see [Creating Network Load Balancing Clusters](https://go.microsoft.com/fwlink/?LinkId=197176) in the Windows Server 2008 TechNet library. -  + **To configure an NLB Cluster Virtual Name and IP address for two MBAM Administration and Monitoring Servers** @@ -62,7 +62,7 @@ This topic describes the basic process of using Network Load Balancing Manager t **Note**   If the NLB Manager is not present, you can install it as a Windows Server feature. You must install this feature on both MBAM Administration and Monitoring servers if you want to configure it into the NLB cluster. -   + 2. On the menu bar, click **Cluster**, and then click **New** to open the **Cluster Parameters** dialog box. @@ -83,7 +83,7 @@ This topic describes the basic process of using Network Load Balancing Manager t **Note**   Ensure that **Affinity** is set to **Single**. -   + 7. On the **Connect** page, enter an MBAM Administration and Monitoring server instance host name that will be part of the NLB cluster in **Host**, and then click **Connect**. @@ -94,7 +94,7 @@ This topic describes the basic process of using Network Load Balancing Manager t **Note**   The **Host Parameters** page also displays the NLB cluster host priority, which is 1 through 32. As new hosts are added to the NLB cluster, the host priority must differ from the previously added hosts. The priority is automatically incremented when you use the Network Load Balancing Manager. -   + 10. Click **<NLB cluster name>** and ensure that the NLB host interface **Status** displays **Converged** before you continue. This step might require that you refresh the NLB cluster display as the host TCP/IP configuration that is being modified by the NLB Manager. @@ -109,9 +109,9 @@ This topic describes the basic process of using Network Load Balancing Manager t [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md b/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md index a878fd4c67..d76d6481b6 100644 --- a/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md +++ b/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md @@ -19,17 +19,17 @@ ms.date: 06/16/2016 The Microsoft BitLocker Administration and Monitoring (MBAM) Client enables administrators to enforce and monitor BitLocker drive encryption on computers in the enterprise. The BitLocker Client can be integrated into an organization by enabling BitLocker management and encryption on client computers during the computer imaging and Windows deployment process. -**Note**   +**Note** To review the MBAM Client system requirements, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + Encryption of client computers with BitLocker during the initial imaging stage of a Windows deployment can lower the administrative overhead for MBAM implementation. This approach also ensures that every computer that is deployed already has BitLocker running and is configured correctly. -**Warning**   +**Warning** This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + **To encrypt a computer as part of Windows deployment** @@ -83,24 +83,26 @@ This topic describes how to change the Windows registry by using Registry Editor Example: http://<computer name>/MBAMRecoveryAndHardwareService/CoreService.svc. -   - **Note**   - MBAM policy or registry values can be set here to override the previously set values. -   +~~~ +**Note** +MBAM policy or registry values can be set here to override the previously set values. +~~~ -7. The MBAM agent restarts the system during MBAM client deployment. When you are ready for this reboot, run the following command at a command prompt as an administrator: - **net start mbamagent** -8. When the computers restarts and the BIOS prompts you to accept a TPM change, accept the change. +7. The MBAM agent restarts the system during MBAM client deployment. When you are ready for this reboot, run the following command at a command prompt as an administrator: -9. During the Windows client operating system imaging process, when you are ready to start encryption, restart the MBAM agent service. Then, to set start to **automatic**, open a command prompt as an administrator and run the following commands: + **net start mbamagent** - **sc config mbamagent start= auto** +8. When the computers restarts and the BIOS prompts you to accept a TPM change, accept the change. - **net start mbamagent** +9. During the Windows client operating system imaging process, when you are ready to start encryption, restart the MBAM agent service. Then, to set start to **automatic**, open a command prompt as an administrator and run the following commands: + + **sc config mbamagent start= auto** + + **net start mbamagent** 10. Remove the bypass registry values. To do this, run regedit, browse to the HKLM\\SOFTWARE\\Microsoft registry entry, right-click the **MBAM** node, and then click **Delete**. @@ -109,9 +111,9 @@ This topic describes how to change the Windows registry by using Registry Editor [Deploying the MBAM 1.0 Client](deploying-the-mbam-10-client.md) -  - -  + + + diff --git a/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md b/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md index 1e8169a07f..ec94256a72 100644 --- a/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md +++ b/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md @@ -22,7 +22,7 @@ The Microsoft BitLocker Administration and Monitoring (MBAM) Client enables admi **Note**   To review the MBAM Client system requirements, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + **To deploy the MBAM Client to desktop or laptop computers** @@ -33,23 +33,23 @@ To review the MBAM Client system requirements, see [MBAM 1.0 Supported Configura **Note**   You should not use Group Policy to deploy the Windows Installer package. -   + 3. Configure the distribution settings or Group Policy to run the MBAM Client installation file. After successful installation, the MBAM Client applies the Group Policy settings that are received from a domain controller to begin BitLocker encryption and management functions. For more information about MBAM Group Policy settings, see [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md). **Important**   The MBAM Client will not start BitLocker encryption actions if a remote desktop protocol connection is active. All remote console connections must be closed before BitLocker encryption will begin. -   + ## Related topics [Deploying the MBAM 1.0 Client](deploying-the-mbam-10-client.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md b/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md index f10adf6909..1951352a23 100644 --- a/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md +++ b/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md @@ -26,7 +26,7 @@ Microsoft BitLocker Administration and Monitoring (MBAM) enables you to determin **Note**   The default address for the MBAM website is http://*<computername>*. Use the fully qualified server name for faster browsing results. -   + 2. Select the **Report** node from the navigation pane, and then select the **Computer Compliance Report**. @@ -37,16 +37,16 @@ Microsoft BitLocker Administration and Monitoring (MBAM) enables you to determin **Note**   Device compliance is determined by the deployed BitLocker policies. You should verify these deployed policies when you are trying to determine the BitLocker encryption state of a device. -   + ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md b/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md index fafe158678..f7b3f615a5 100644 --- a/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md +++ b/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md @@ -67,21 +67,23 @@ The following steps describe how to configure the basic, recommended Group Polic Set **Choose how BitLocker-protected drives can be recovered** and **Allow data recovery agent**. -   - **Important**   - Depending on the policies that your organization decides to deploy, you may have to configure additional policies. See [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md) for Group Policy configuration details for all of the available MBAM GPO policy options. -   +~~~ +**Important** +Depending on the policies that your organization decides to deploy, you may have to configure additional policies. See [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md) for Group Policy configuration details for all of the available MBAM GPO policy options. +~~~ + + ## Related topics [Deploying MBAM 1.0 Group Policy Objects](deploying-mbam-10-group-policy-objects.md) -  - -  + + + diff --git a/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md b/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md index c948d1afbb..62464e8014 100644 --- a/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md +++ b/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md @@ -22,7 +22,7 @@ Microsoft BitLocker Administration and Monitoring (MBAM) generates various repor **Note**   To run the reports, you must be a member of the **Report Users** role on the computers where you have installed the Administration and Monitoring Server features, Compliance and Audit Database, and Compliance and Audit Reports. -  + **To open the MBAM Administration website** @@ -31,14 +31,14 @@ To run the reports, you must be a member of the **Report Users** role on the com **Note**   If the MBAM administration website was installed on a port other than port 80, you must specify that port number in the URL. For example, *http://<computername>:<port>*. If you specified a Host Name for the MBAM administration website during the installation, the URL would be *http://<hostname>*. -   + 2. In the navigation pane, click **Reports**. In the main pane, click the tab for your report type: **Enterprise Compliance Report**, **Computer Compliance Report**, **Hardware Audit Report**, or **Recovery Audit Report**. **Note**   Historical MBAM Client data is retained in the compliance database. This retained data may be needed in case a computer is lost or stolen. When running enterprise reports, you should use appropriate start and end dates to scope the time frames for the reports from one to two weeks to increase the reporting data accuracy. -   + **To generate an enterprise Compliance Report** @@ -55,7 +55,7 @@ To run the reports, you must be a member of the **Report Users** role on the com **Note**   The Enterprise Compliance report is generated by a SQL job that runs every six hours. Therefore, the first time you try to view the report you may find that some data is missing. -   + 3. To view information about a computer in the Computer Compliance Report, select the computer name. @@ -76,7 +76,7 @@ To run the reports, you must be a member of the **Report Users** role on the com **Note**   An MBAM Client computer is considered compliant if the computer matches the requirements of the MBAM policy settings or the computer’s hardware model is set to incompatible. Therefore, when you are viewing detailed information about the disk volumes associated with the computer, computers that are exempt from BitLocker encryption due to hardware compatibility can be displayed as compliant even though their drive volume encryption status is displayed as noncompliant. -   + **To generate the Hardware Compatibility Audit Report** @@ -119,9 +119,9 @@ To run the reports, you must be a member of the **Report Users** role on the com [Monitoring and Reporting BitLocker Compliance with MBAM 1.0](monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md index b2143d0187..7761a0065c 100644 --- a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md +++ b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md @@ -26,7 +26,7 @@ To obtain the setup log files, you must install MBAM by using the **msiexec** pa Additional setup log files are created in the %temp% folder of the user who is installing MBAM. -  + ## To install MBAM Server features on a single server @@ -36,7 +36,7 @@ The following steps describe how to install general MBAM features. **Note**   Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup on 64-bit servers. -  + **To start MBAM Server features installation** @@ -59,7 +59,7 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o **Note**   The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all the prerequisites are met, the installation continues. If a missing prerequisite is detected, you must resolve the missing prerequisites, and then click **Check prerequisites again**. After all prerequisites are met, the installation resumes. -   + 4. You are prompted to configure the network communication security. MBAM can encrypt the communication between the Recovery and Hardware Database, the Administration and Monitoring Server, and the clients. If you decide to encrypt the communication, you are asked to select the authority-provisioned certificate that will be used for encryption. @@ -86,7 +86,7 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o **Warning**   The port number that you specify must be an unused port number on the Administration and Monitoring server, unless a unique host header name is specified. -   + 8. Click **Next** to continue. @@ -117,7 +117,7 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o To maintain identical memberships on all computers, you should create a domain security group and add that domain group to each local MBAM Report Users group. When you do this, you can manage the group memberships by using the domain group. -   + ## Validating the MBAM Server feature installation @@ -126,57 +126,57 @@ When the MBAM installation is complete, validate that the installation has succe **To validate MBAM Server feature installation** -1. On each server where an MBAM feature is deployed, open **Control Panel**. Click **Programs**, and then click **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. +1. On each server where an MBAM feature is deployed, open **Control Panel**. Click **Programs**, and then click **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. - **Note**   - To validate the installation, you must use a Domain Account that has local computer administrative credentials on each server. + **Note** + To validate the installation, you must use a Domain Account that has local computer administrative credentials on each server. -   + -2. On the server where the Recovery and Hardware Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. +2. On the server where the Recovery and Hardware Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. -3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance and Audit Database** is installed. +3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance and Audit Database** is installed. -4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative privileges and browse to the “Home” of the SQL Server Reporting Services site. +4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative privileges and browse to the “Home” of the SQL Server Reporting Services site. - The default Home location of a SQL Server Reporting Services site instance is at http://*<NameofMBAMReportsServer>*/Reports. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances specified during setup. + The default Home location of a SQL Server Reporting Services site instance is at http://<NameofMBAMReportsServer>/Reports. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances specified during setup. - Confirm that a folder named **Malta Compliance Reports** is listed and that it contains five reports and one data source. + Confirm that a folder named **Malta Compliance Reports** is listed and that it contains five reports and one data source. - **Note**   - If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* + **Note** + If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* -   + -5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**, select **Web Server (IIS)**, and click **Internet Information Services (IIS) Manager** +5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**, select **Web Server (IIS)**, and click **Internet Information Services (IIS) Manager** -6. In **Connections**, browse to *<computername>*, select **Sites**, and select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. +6. In **Connections**, browse to *<computername>*, select **Sites**, and select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. -7. On the server where the Administration and Monitoring feature is installed, open a web browser with administrative privileges, and then browse to the following locations in the MBAM website to verify that they load successfully: +7. On the server where the Administration and Monitoring feature is installed, open a web browser with administrative privileges, and then browse to the following locations in the MBAM website to verify that they load successfully: - - *http://<computername>/default.aspx* and confirm each of the links for navigation and reports + - *http://<computername>/default.aspx* and confirm each of the links for navigation and reports - - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* + - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* - - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* + - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* - - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* + - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* - **Note**   - Typically, the services are installed on the default port 80 without network encryption. If the services are installed on a different port, change the URLs to include the appropriate port. For example, http://*<computername>:<port>*/default.aspx or http://*<hostheadername>/*default.aspx. + **Note** + Typically, the services are installed on the default port 80 without network encryption. If the services are installed on a different port, change the URLs to include the appropriate port. For example, http://*<computername>:<port>*/default.aspx or http://<hostheadername>/default.aspx. - If the services are installed with network encryption, change http:// to https://. + If the services are installed with network encryption, change http:// to https://. -   + ## Related topics [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md index d59a2f9928..668966c147 100644 --- a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md +++ b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md @@ -21,22 +21,22 @@ The procedures in this topic describe the full installation of the Microsoft Bit Each server feature has certain prerequisites. To verify that you have met the prerequisites and hardware and software requirements, see [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) and [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). In addition, some features require that you provide certain information during the installation process to successfully deploy the feature. -**Note**   +**Note** To obtain the setup log files, you have to install MBAM by using the **msiexec** package and the **/l <location>** option. Log files are created in the location that you specify. Additional setup log files are created in the %temp% folder of the user that runs the MBAM installation. -  + ## Deploy the MBAM Server features The following steps describe how to install the general MBAM features. -**Note**   +**Note** Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup on 64-bit servers. -  + **To Deploy MBAM Server features** @@ -56,107 +56,109 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o - MBAM Group Policy Template - **Note**   + **Note** The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. If all prerequisites are met this time, the installation will resume. -   + 4. The MBAM Setup wizard will display the installation pages for the selected features. The following sections describe the installation procedures for each feature. - **Note**   + **Note** Typically, each feature is installed on a separate server. If you want to install multiple features on a single server, you may change or eliminate some of the following steps. -   - **To install the Recovery and Hardware Database** - 1. Choose an option for MBAM communication encryption. MBAM can encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that is used for encryption. +~~~ +**To install the Recovery and Hardware Database** - 2. Click **Next** to continue. +1. Choose an option for MBAM communication encryption. MBAM can encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that is used for encryption. - 3. Specify the names of the computers that will be running the Administration and Monitoring Server feature, to configure access to the Recovery and Hardware Database.. Once the Administration and Monitoring Server feature is deployed, it connects to the database by using its domain account. +2. Click **Next** to continue. - 4. Click **Next** to continue. +3. Specify the names of the computers that will be running the Administration and Monitoring Server feature, to configure access to the Recovery and Hardware Database.. Once the Administration and Monitoring Server feature is deployed, it connects to the database by using its domain account. - 5. Specify the **Database Configuration** for the SQL Server instance that stores the recovery and hardware data. You must also specify where the database will be located and where the log information will be located. +4. Click **Next** to continue. - 6. Click **Next** to continue with the MBAM Setup wizard. +5. Specify the **Database Configuration** for the SQL Server instance that stores the recovery and hardware data. You must also specify where the database will be located and where the log information will be located. - **To install the Compliance and Audit Database** +6. Click **Next** to continue with the MBAM Setup wizard. - 1. Choose an option for the MBAM communication encryption. MBAM can encrypt the communication between the Compliance and Audit Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that will be used for encryption. +**To install the Compliance and Audit Database** - 2. Click **Next** to continue. +1. Choose an option for the MBAM communication encryption. MBAM can encrypt the communication between the Compliance and Audit Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that will be used for encryption. - 3. Specify the user account that will be used to access the database for reports. +2. Click **Next** to continue. - 4. Click **Next** to continue. +3. Specify the user account that will be used to access the database for reports. - 5. Specify the computer names of the computers that you want to run the Administration and Monitoring Server and the Compliance and Audit Reports, to configure the access to the Compliance and Audit Database.. After the Administration and Monitoring and the Compliance and Audit Reports Server are deployed, they will connect to the databases by using their domain accounts. +4. Click **Next** to continue. - 6. Specify the **Database Configuration** for the SQL Server instance that will store the compliance and audit data. You must also specify where the database will be located and where the log information will be located. +5. Specify the computer names of the computers that you want to run the Administration and Monitoring Server and the Compliance and Audit Reports, to configure the access to the Compliance and Audit Database.. After the Administration and Monitoring and the Compliance and Audit Reports Server are deployed, they will connect to the databases by using their domain accounts. - 7. Click **Next** to continue with the MBAM Setup wizard. +6. Specify the **Database Configuration** for the SQL Server instance that will store the compliance and audit data. You must also specify where the database will be located and where the log information will be located. - **To install the Compliance and Audit Reports** +7. Click **Next** to continue with the MBAM Setup wizard. - 1. Specify the remote SQL Server instance. For example, *<ServerName>*,where the Compliance and Audit Database are installed. +**To install the Compliance and Audit Reports** - 2. Specify the name of the Compliance and Audit Database. By default, the database name is “MBAM Compliance Status”, but you can change the name when you install the Compliance and Audit Database. +1. Specify the remote SQL Server instance. For example, *<ServerName>*,where the Compliance and Audit Database are installed. - 3. Click **Next** to continue. +2. Specify the name of the Compliance and Audit Database. By default, the database name is “MBAM Compliance Status”, but you can change the name when you install the Compliance and Audit Database. - 4. Select the SQL Server Reporting Services instance where the Compliance and Audit Reports will be installed. Provide the username and password used to access the compliance database. +3. Click **Next** to continue. - 5. Click **Next** to continue with the MBAM Setup wizard. +4. Select the SQL Server Reporting Services instance where the Compliance and Audit Reports will be installed. Provide the username and password used to access the compliance database. - **To install the Administration and Monitoring Server feature** +5. Click **Next** to continue with the MBAM Setup wizard. - 1. Choose an option for the MBAM communication encryption. MBAM can encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that is used for encryption. +**To install the Administration and Monitoring Server feature** - 2. Click **Next** to continue. +1. Choose an option for the MBAM communication encryption. MBAM can encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose the option to encrypt communication, you are asked to select the authority-provisioned certificate that is used for encryption. - 3. Specify the remote SQL Server instance, For example, *<ServerName>*, where the Compliance and Audit Database are installed. +2. Click **Next** to continue. - 4. Specify the name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status, but, you can change the name when you install the Compliance and Audit Database. +3. Specify the remote SQL Server instance, For example, *<ServerName>*, where the Compliance and Audit Database are installed. - 5. Click **Next** to continue. +4. Specify the name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status, but, you can change the name when you install the Compliance and Audit Database. - 6. Specify the remote SQL Server instance. For example, *<ServerName>*,where the Recovery and Hardware Database are installed. +5. Click **Next** to continue. - 7. Specify the name of the Recovery and Hardware Database. By default, the database name is **MBAM Recovery and Hardware**, but you can change the name when you install the Recovery and Hardware Database feature. +6. Specify the remote SQL Server instance. For example, *<ServerName>*,where the Recovery and Hardware Database are installed. - 8. Click **Next** to continue. +7. Specify the name of the Recovery and Hardware Database. By default, the database name is **MBAM Recovery and Hardware**, but you can change the name when you install the Recovery and Hardware Database feature. - 9. Specify the URL for the “Home” of the SQL Server Reporting Services (SRS) site. The default Home location of a SQL Server Reporting Services site instance is at: +8. Click **Next** to continue. - http://*<NameofMBAMReportsServer>/*ReportServer +9. Specify the URL for the “Home” of the SQL Server Reporting Services (SRS) site. The default Home location of a SQL Server Reporting Services site instance is at: - **Note**   - If you configured the SQL Server Reporting Services as a named instance, the URL resembles the following:http://*<NameofMBAMReportsServer>*/ReportServer\_*<SRSInstanceName>* + http://*<NameofMBAMReportsServer>/*ReportServer -   + **Note** + If you configured the SQL Server Reporting Services as a named instance, the URL resembles the following:http://*<NameofMBAMReportsServer>*/ReportServer\_*<SRSInstanceName>* - 10. Click **Next** to continue. - 11. Enter the **Port Number**, the **Host Name** (optional), and the **Installation Path** for the MBAM Administration and Monitoring server - **Warning**   - The port number that you specify must be an unused port number on the Administration and Monitoring server, unless you specify a unique host header name. +10. Click **Next** to continue. -   +11. Enter the **Port Number**, the **Host Name** (optional), and the **Installation Path** for the MBAM Administration and Monitoring server - 12. Click **Next** to continue with the MBAM Setup wizard. + **Warning** + The port number that you specify must be an unused port number on the Administration and Monitoring server, unless you specify a unique host header name. -5. - Specify whether to use Microsoft Updates to help keep your computer secure, and then click **Next**. -6. When the selected MBAM feature information is complete, you are ready to start the MBAM installation by using the Setup wizard. Click **Back** to move through the wizard if you have to review or change your installation settings. Click **Install** to begin the installation. Click **Cancel** to exit the Wizard. Setup installs the MBAM features that you selected and notifies you that the installation is finished. +12. Click **Next** to continue with the MBAM Setup wizard. +~~~ -7. Click **Finish** to exit the wizard. +5. -8. Add users to appropriate MBAM roles, after the MBAM server features are installed.. For more information, see [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md). + Specify whether to use Microsoft Updates to help keep your computer secure, and then click **Next**. + +6. When the selected MBAM feature information is complete, you are ready to start the MBAM installation by using the Setup wizard. Click **Back** to move through the wizard if you have to review or change your installation settings. Click **Install** to begin the installation. Click **Cancel** to exit the Wizard. Setup installs the MBAM features that you selected and notifies you that the installation is finished. + +7. Click **Finish** to exit the wizard. + +8. Add users to appropriate MBAM roles, after the MBAM server features are installed.. For more information, see [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md). **Post-installation configuration** @@ -172,10 +174,10 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o - **MBAM Report Users**: Members of this local group can access the Reports in the MBAM administration website. - **Note**   + **Note** Identical user or group membership of the **MBAM Report Users** local group must be maintained on all computers where the MBAM Administration and Monitoring Server features, Compliance and Audit Database, and the Compliance and Audit Reports are installed. -   + ## Validate the MBAM Server feature installation @@ -184,57 +186,59 @@ When the MBAM Server feature installation is complete, you should validate that **To validate an MBAM installation** -1. On each server, where an MBAM feature is deployed, open **Control Panel**, click **Programs**, and then click **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. +1. On each server, where an MBAM feature is deployed, open **Control Panel**, click **Programs**, and then click **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. - **Note**   - To validate the MBAM installation, you must use a Domain Account that has local computer administrative credentials on each server. + **Note** + To validate the MBAM installation, you must use a Domain Account that has local computer administrative credentials on each server. -   -2. On the server where the Recovery and Hardware Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. -3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance Status** database is installed. +2. On the server where the Recovery and Hardware Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. -4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative privileges and browse to the “Home” of the SQL Server Reporting Services site. +3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance Status** database is installed. - The default Home location of a SQL Server Reporting Services site instance can be found at http://*<NameofMBAMReportsServer>*/Reports.aspx. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances specified during setup. +4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative privileges and browse to the “Home” of the SQL Server Reporting Services site. - Confirm that a folder named **Malta Compliance Reports** is listed and that it contains five reports and one data source. + The default Home location of a SQL Server Reporting Services site instance can be found at http://<NameofMBAMReportsServer>/Reports.aspx. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances specified during setup. - **Note**   - If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* + Confirm that a folder named **Malta Compliance Reports** is listed and that it contains five reports and one data source. -   + **Note** + If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* -5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**, select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager**. In **Connections** browse to *<computername>*, click **Sites**, and click **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. -6. On the server where the Administration and Monitoring feature is installed, open a web browser with administrative privileges and browse to the following locations in the MBAM web site, to verify that they load successfully: - - *http://<computername>/default.aspx* and confirm each of the links for navigation and reports +5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**, select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager**. In **Connections** browse to *<computername>*, click **Sites**, and click **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. - - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* +6. On the server where the Administration and Monitoring feature is installed, open a web browser with administrative privileges and browse to the following locations in the MBAM web site, to verify that they load successfully: - - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* + - *http://<computername>/default.aspx* and confirm each of the links for navigation and reports - - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* + - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* - **Note**   - Typically, services are installed on the default port 80 without network encryption. If the services are installed on a different port, change the URLs to include the appropriate port. For example, http://*<computername>:<port>*/default.aspx or http://*<hostheadername>/*default.aspx + - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* - If the services were installed with network encryption, change http:// to https://. + - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* -   + **Note** + Typically, services are installed on the default port 80 without network encryption. If the services are installed on a different port, change the URLs to include the appropriate port. For example, http://*<computername>:<port>*/default.aspx or http://<hostheadername>/default.aspx - Verify that each web page loads successfully. + If the services were installed with network encryption, change http:// to https://. + + + +~~~ +Verify that each web page loads successfully. +~~~ ## Related topics [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md) -  - -  + + + diff --git a/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md b/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md index a6f01a39c6..ca6defb7b6 100644 --- a/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md +++ b/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md @@ -24,7 +24,7 @@ The following steps describe how to install the MBAM Group Policy template. **Note**   Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup on 64-bit servers. -  + **To install the MBAM Group Policy template** @@ -37,7 +37,7 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o **Note**   The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all the prerequisites are met, the installation continues. If a missing prerequisite is detected, you must resolve the missing prerequisite and then click **Check prerequisites again**. Once all prerequisites are met, the installation will resume. -   + 4. After the MBAM Setup wizard displays installation pages for the selected features, click **Finish** to close MBAM Setup. @@ -46,9 +46,9 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o [Deploying MBAM 1.0 Group Policy Objects](deploying-mbam-10-group-policy-objects.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md index f55b9943b4..978349f4d2 100644 --- a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md +++ b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md @@ -36,7 +36,7 @@ Microsoft BitLocker Administration and Monitoring (MBAM) includes four server ro **Important**   The MBAM server features must be updated in the following order: Compliance and Audit Reports first, then Administration and Monitoring Server. The Group Policy templates can be updated at any time without concern for sequence. -   + 4. After you upgrade the server database, open the IIS Management Console and review the bindings of the Microsoft BitLocker Administration and Monitoring website. @@ -53,16 +53,16 @@ Microsoft BitLocker Administration and Monitoring (MBAM) includes four server ro **Note**   The MBAM client opens only if it can communicate with the Recovery and Hardware database. -   + ## Related topics [Deploying the MBAM 1.0 Language Release Update](deploying-the-mbam-10-language-release-update.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md index 4824d200ff..ec68e9b91a 100644 --- a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md +++ b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md @@ -26,7 +26,7 @@ Microsoft BitLocker Administration and Monitoring (MBAM) includes four server ro **Important**   The MBAM server features must be updated in this order: Compliance and Audit Reports first, and then the Administration and Monitoring Server. The MBAM Group Policy templates can be updated at any time without concern for sequence. -  + **To install the MBAM Language Update on the MBAM Compliance and Audit Report Server feature** @@ -57,16 +57,16 @@ The MBAM server features must be updated in this order: Compliance and Audit Rep **Note**   The MBAM client opens only if it can communicate with the Recovery and Hardware database. -   + ## Related topics [Deploying the MBAM 1.0 Language Release Update](deploying-the-mbam-10-language-release-update.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md b/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md index bf49bb7bb8..8dcdf2d88f 100644 --- a/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md +++ b/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md @@ -24,7 +24,7 @@ To exempt a computer from BitLocker encryption, you must add the computer to a s **Note**   If the computer is already BitLocker-protected, the computer exemption policy has no effect. -  + **To exempt a computer from BitLocker encryption** @@ -39,9 +39,9 @@ If the computer is already BitLocker-protected, the computer exemption policy ha [Administering MBAM 1.0 Features](administering-mbam-10-features.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md b/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md index a8b155d8c9..f8a0500186 100644 --- a/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md +++ b/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md @@ -24,7 +24,7 @@ The Hardware Compatibility feature is helpful when your organization has older c **Note**   By default, MBAM Hardware Compatibility feature is not enabled. To enable it, select the **Hardware Compatibility** feature under the **Administration and Monitoring Server** feature during setup. For more information about how to set up and configure Hardware Compatibility, see [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md). -  + The Hardware Compatibility feature works in the following way. @@ -47,7 +47,7 @@ The Hardware Compatibility feature works in the following way. **Warning**   If the MBAM client agent tries to encrypt a computer that does not support BitLocker drive encryption, there is a possibility that the computer will become corrupted. Ensure that the hardware compatibility feature is correctly configured when your organization has older hardware that does not support BitLocker. -  + **To manage hardware compatibility** @@ -62,7 +62,7 @@ If the MBAM client agent tries to encrypt a computer that does not support BitLo **Note**   After you set a computer model as compatible, it can take more than twenty-four hours for the MBAM Client to begin BitLocker encryption on the computers matching that hardware model. -   + 5. Administrators should regularly monitor the hardware compatibility list to review new models that are discovered by the MBAM agent, and then update their compatibility setting to **Compatible** or **Incompatible** as appropriate. @@ -71,9 +71,9 @@ If the MBAM client agent tries to encrypt a computer that does not support BitLo [Administering MBAM 1.0 Features](administering-mbam-10-features.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md b/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md index 4467137c5d..02e890969a 100644 --- a/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md +++ b/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md @@ -22,7 +22,7 @@ A Microsoft BitLocker Administration and Monitoring (MBAM) control panel applica **Note**   For the BitLocker client, the Admin and Operational log files are located in Event Viewer, under **Application and Services Logs** / **Microsoft** / **Windows** / **BitLockerManagement**. -  + **To use the MBAM Client Control Panel** @@ -41,9 +41,9 @@ For the BitLocker client, the Admin and Operational log files are located in Eve [Administering MBAM 1.0 Features](administering-mbam-10-features.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md b/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md index f72bf099e5..3116ec7a92 100644 --- a/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md +++ b/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md @@ -24,7 +24,7 @@ To exempt users from BitLocker protection, an organization must first create an **Note**   If the computer is already BitLocker-protected, the user exemption policy has no effect. -  + The following table shows how BitLocker protection is applied based on how exemptions are set. @@ -55,7 +55,7 @@ The following table shows how BitLocker protection is applied based on how exemp -  + **To exempt a user from BitLocker Encryption** @@ -68,7 +68,7 @@ The following table shows how BitLocker protection is applied based on how exemp **Note**   Shared computer scenarios require special consideration regarding user exemption. If a non-exempt user logs on to a computer shared with an exempt user, the computer may be encrypted. -   + **To enable users to request exemption from BitLocker Encryption** @@ -79,7 +79,7 @@ The following table shows how BitLocker protection is applied based on how exemp **Note**   Selecting **Request Exemption** will postpone the BitLocker protection until the maximum time set in the User Exemption Policy. -   + 3. When a user selects **Request Exemption**, the user is notified to contact the organization's BitLocker administration group. Depending on how the Configure User Exemption Policy is configured, users are provided with one or more of the following contact methods: @@ -94,16 +94,16 @@ The following table shows how BitLocker protection is applied based on how exemp **Note**   Once the postpone time limit from the User Exemption Policy has expired, users will not see the option to request exemption to the encryption policy. At this point, users must contact the MBAM administrator directly in order to receive exemption from BitLocker Protection. -   + ## Related topics [Administering MBAM 1.0 Features](administering-mbam-10-features.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md b/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md index 3a0dddc50b..b300c0341b 100644 --- a/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md +++ b/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md @@ -58,10 +58,10 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab `PS C:\> Stop-Website “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To run this PowerShell command prompt, you must add the IIS Module for PowerShell to the current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable the execution of scripts. -   + **To run MBAM setup on Server B** @@ -71,14 +71,14 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=KeyDatabase ADMINANDMON_MACHINENAMES=$DOMAIN$\$SERVERNAME$$ RECOVERYANDHWDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and instance to which the Recovery and Hardware database will be moved. - $DOMAIN$\\$SERVERNAME$ - Enter the domain and server names of each MBAM Application and Monitoring Server that will contact the Recovery and Hardware database. If there are multiple domain and server names, use a semicolon to separate each one of them in the list. For example, $DOMAIN\\SERVERNAME$;$DOMAIN\\$SERVERNAME$$. Additionally, each server name must be followed by a **$**. For example, MyDomain\\MyServerName1$, MyDomain\\MyServerName2$. -   + **To back up the Database on Server A** @@ -132,23 +132,23 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab `GO` - **Note**   + **Note** Replace the values from the preceding example with those that match your environment: - $PASSWORD$ - Enter a password that you will use to encrypt the Private Key file. -   + 3. Execute the SQL file by using SQL Server PowerShell and a command that is similar to the following: `PS C:\> Invoke-Sqlcmd -InputFile 'Z:\BackupMBAMRecoveryandHardwarDatabaseScript.sql' -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the value in the previous example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and the instance from which you back up the Recovery and Hardware database. -   + **To move the Database and Certificate from Server A to B** @@ -162,14 +162,14 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab `PS C:\> Copy-Item “Z:\SQLServerInstanceCertificateFilePrivateKey” \\$SERVERNAME$\$DESTINATIONSHARE$` - **Note**   + **Note** Replace the value from the preceding example with those that match your environment: - $SERVERNAME$ - Enter the name of the server to which the files will be copied. - $DESTINATIONSHARE$ - Enter the name of the share and path to which the files will be copied. -   + **To restore the Database on Server B** @@ -219,23 +219,23 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab ` WITH REPLACE` - **Note**   + **Note** Replace the values from the preceding example with those that match your environment: - $PASSWORD$ - Enter the password that you used to encrypt the Private Key file. -   + 5. Use Windows PowerShell to enter a command line that is similar to the following: `PS C:\> Invoke-Sqlcmd -InputFile 'Z:\RestoreMBAMRecoveryandHardwarDatabaseScript.sql' -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the value from the receding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and the instance to which the Recovery and Hardware Database will be restored. -   + **Configure the access to the Database on Server B** @@ -245,45 +245,47 @@ You can use the following procedure to move the MBAM Recovery and Hardware Datab `PS C:\> net localgroup "MBAM Recovery and Hardware DB Access" $DOMAIN$\$SERVERNAME$$ /add` - **Note**   + **Note** Replace the values from the preceding example with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain name and machine name of the MBAM Administration and Monitoring Server. The server name must be followed by a **$**, for example, MyDomain\\MyServerName1$. -   - You must run the command for each Administration and Monitoring Server that will be accessing the database in your environment. + +~~~ +You must run the command for each Administration and Monitoring Server that will be accessing the database in your environment. +~~~ **To update the Database Connection data on MBAM Administration and Monitoring Servers** -1. On each of the servers that run the MBAM Administration and Monitoring feature, use the Internet Information Services (IIS) Manager console to update the Connection String information for the following applications, which are hosted in the Microsoft BitLocker Administration and Monitoring website: +1. On each of the servers that run the MBAM Administration and Monitoring feature, use the Internet Information Services (IIS) Manager console to update the Connection String information for the following applications, which are hosted in the Microsoft BitLocker Administration and Monitoring website: - - MBAM Administration Service + - MBAM Administration Service - - MBAM Recovery And Hardware Service + - MBAM Recovery And Hardware Service -2. Select each application and use the **Configuration Editor** feature, which is located under the **Management** section of the **Feature View**. +2. Select each application and use the **Configuration Editor** feature, which is located under the **Management** section of the **Feature View**. -3. Select the **configurationStrings** option from the Section list control. +3. Select the **configurationStrings** option from the Section list control. -4. Choose the row named **(Collection)**, and open the **Collection Editor** by selecting the button on the right side of the row. +4. Choose the row named **(Collection)**, and open the **Collection Editor** by selecting the button on the right side of the row. -5. In the **Collection Editor**, choose the row named **KeyRecoveryConnectionString** when you updated the configuration for the ‘MBAMAdministrationService’ application, or choose the row named **Microsoft.Mbam.RecoveryAndHardwareDataStore.**ConnectionString, when updating the configuration for the ‘MBAMRecoveryAndHardwareService’. +5. In the **Collection Editor**, choose the row named **KeyRecoveryConnectionString** when you updated the configuration for the ‘MBAMAdministrationService’ application, or choose the row named Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString, when updating the configuration for the ‘MBAMRecoveryAndHardwareService’. -6. Update the **Data Source=** value for the **configurationStrings** property to list the server name and the instance where the Recovery and Hardware Database was moved to. For example, $SERVERNAME$\\$SQLINSTANCENAME$. +6. Update the **Data Source=** value for the **configurationStrings** property to list the server name and the instance where the Recovery and Hardware Database was moved to. For example, $SERVERNAME$\\$SQLINSTANCENAME$. -7. To automate this procedure, you can use a command that is similar to the following one, by using Windows PowerShell on each Administration and Monitoring Server: +7. To automate this procedure, you can use a command that is similar to the following one, by using Windows PowerShell on each Administration and Monitoring Server: - `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring\MBAMAdministrationService" -Name "connectionString" -Value “Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;”` + `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring\MBAMAdministrationService" -Name "connectionString" -Value “Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;”` - `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;"` + `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;"` - **Note**   - Replace the value from the preceding example with those that match your environment: + **Note** + Replace the value from the preceding example with those that match your environment: + + - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Recovery and Hardware database is. - - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Recovery and Hardware database is. -   **To resume all instances of the MBAM Administration and Monitoring website** @@ -322,10 +324,10 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> Stop-Website “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To execute this command, you must add the IIS Module for PowerShell to current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable the execution of scripts. -   + **To run MBAM Setup on Server B** @@ -335,7 +337,7 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal= ReportsDatabase ADMINANDMON_MACHINENAMES=$DOMAIN$\$SERVERNAME$ COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ REPORTS_USERACCOUNT=$DOMAIN$\$USERNAME$` - **Note**   + **Note** Replace the values from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance Status Database will be moved to. @@ -344,7 +346,7 @@ If you choose to move the MBAM Compliance Status Database feature from one compu - $DOMAIN$\\$USERNAME$ - Enter the domain and user name that will be used by the Compliance and Audit reports feature to connect to the Compliance Status Database. -   + **To back up the Compliance Database on Server A** @@ -386,12 +388,12 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> Invoke-Sqlcmd -InputFile "Z:\BackupMBAMComplianceStatusDatabaseScript.sql" –ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the value from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and the instance from where the Compliance Status database will be backed up. -   + **To move the Database from Server A to B** @@ -403,14 +405,14 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> Copy-Item “Z:\MBAM Compliance Status Database Data.bak” \\$SERVERNAME$\$DESTINATIONSHARE$` - **Note**   + **Note** Replace the value from the preceding example with those that match your environment: - $SERVERNAME$ - Enter the server name where the files will be copied to. - $DESTINATIONSHARE$ - Enter the name of share and path where the files will be copied to. -   + **To restore the Database on Server B** @@ -438,12 +440,12 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> Invoke-Sqlcmd -InputFile "Z:\RestoreMBAMComplianceStatusDatabaseScript.sql" -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the value from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance Status Database will be restored to. -   + **To configure the Access to the Database on Server B** @@ -455,16 +457,18 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> net localgroup "MBAM Compliance Auditing DB Access" $DOMAIN$\$REPORTSUSERNAME$ /add` - **Note**   + **Note** Replace the value from the preceding example with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain and machine name of the MBAM Administration and Monitoring Server. The server name must be followed by a **$**.For example, MyDomain\\MyServerName1$. - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit reports -   - For each Administration and Monitoring Server that will access the database of your environment, you must run the command that will add the servers to the MBAM Compliance Auditing DB Access local group. + +~~~ +For each Administration and Monitoring Server that will access the database of your environment, you must run the command that will add the servers to the MBAM Compliance Auditing DB Access local group. +~~~ **To update the database connection data on MBAM Administration and Monitoring servers** @@ -490,12 +494,12 @@ If you choose to move the MBAM Compliance Status Database feature from one compu `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Windows.Mdop.BitLockerManagement.StatusReportDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring\MBAMComplianceStatusService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME;Initial Catalog=MBAM Compliance Status;Integrated Security=SSPI;"` - **Note**   + **Note** Replace the value from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance name where the Recovery and Hardware Database is located. -   + **To resume all instances of the MBAM Administration and Monitoring website** @@ -528,7 +532,7 @@ If you choose to move the MBAM Compliance and Audit Reports from one computer to `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=Reports COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ REPORTS_USERACCOUNTPW=$PASSWORD$` - **Note**   + **Note** Replace the values from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance Status Database is located. @@ -537,7 +541,7 @@ If you choose to move the MBAM Compliance and Audit Reports from one computer to - $PASSWORD$ - Enter the password of the user account that will be used to connect to the Compliance Status Database. -   + **To configure the access to the Compliance and Audit Reports on Server B** @@ -547,14 +551,16 @@ If you choose to move the MBAM Compliance and Audit Reports from one computer to `PS C:\> net localgroup "MBAM Report Users" $DOMAIN$\$REPORTSUSERNAME$ /add` - **Note**   + **Note** Replace the following value from the preceding example with the applicable values for your environment: - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit reports -   - The command to add the users to the MBAM Report Users local group must be run for each user that will be accessing the reports in your environment. + +~~~ +The command to add the users to the MBAM Report Users local group must be run for each user that will be accessing the reports in your environment. +~~~ **To stop all instances of the MBAM Administration and Monitoring website** @@ -566,30 +572,30 @@ If you choose to move the MBAM Compliance and Audit Reports from one computer to **To update the Database Connection Data on MBAM Administration and Monitoring Servers** -1. On each of the servers that run the MBAM Administration and Monitoring Feature, use the Internet Information Services (IIS) Manager console to update the Compliance Reports URL. +1. On each of the servers that run the MBAM Administration and Monitoring Feature, use the Internet Information Services (IIS) Manager console to update the Compliance Reports URL. -2. Select the **Microsoft BitLocker Administration and Monitoring** website and use the **Configuration Editor** feature which can be found under the **Management** section of the **Feature View**. +2. Select the **Microsoft BitLocker Administration and Monitoring** website and use the **Configuration Editor** feature which can be found under the **Management** section of the **Feature View**. -3. Select the **appSettings** option from the Section list control. +3. Select the **appSettings** option from the Section list control. -4. From here, select the row named **(Collection)**, and open the **Collection Editor** by selecting the button on the right side of the row. +4. From here, select the row named **(Collection)**, and open the **Collection Editor** by selecting the button on the right side of the row. -5. In the **Collection Editor**, select the row named “Microsoft.Mbam.Reports.Url”. +5. In the **Collection Editor**, select the row named “Microsoft.Mbam.Reports.Url”. -6. Update the value for Microsoft.Mbam.Reports.Url to reflect the server name for Server B. If the Compliance and Audit reports feature was installed on a named SQL Reporting Services instance, make sure that you add or update the name of the instance to the URL. For example, http://$SERVERNAME$/ReportServer\_$SQLSRSINSTANCENAME$/Pages.... +6. Update the value for Microsoft.Mbam.Reports.Url to reflect the server name for Server B. If the Compliance and Audit reports feature was installed on a named SQL Reporting Services instance, make sure that you add or update the name of the instance to the URL. For example, http://$SERVERNAME$/ReportServer\_$SQLSRSINSTANCENAME$/Pages.... -7. To automate this procedure, you can use Windows PowerShell to enter a command that is similar to the following one on each Administration and Monitoring Server: +7. To automate this procedure, you can use Windows PowerShell to enter a command that is similar to the following one on each Administration and Monitoring Server: - `PS C:\> Set-WebConfigurationProperty '/appSettings/add[@key="Microsoft.Mbam.Reports.Url"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring" -Name "Value" -Value “http://$SERVERNAME$/ReportServer_$SRSINSTANCENAME$/Pages/ReportViewer.aspx?/Malta+Compliance+Reports/”` + `PS C:\> Set-WebConfigurationProperty '/appSettings/add[@key="Microsoft.Mbam.Reports.Url"]' -PSPath "IIS:\sites\Microsoft BitLocker Administration and Monitoring" -Name "Value" -Value “http://$SERVERNAME$/ReportServer_$SRSINSTANCENAME$/Pages/ReportViewer.aspx?/Malta+Compliance+Reports/”` - **Note**   - Replace the value from the preceding example with those that match your environment: + **Note** + Replace the value from the preceding example with those that match your environment: - - $SERVERNAME$ - Enter the name of the server to which the Compliance and Audit Reports were installed. + - $SERVERNAME$ - Enter the name of the server to which the Compliance and Audit Reports were installed. + + - $SRSINSTANCENAME$ - Enter the name of the SQL Reporting Services instance to which the Compliance and Audit Reports were installed. - - $SRSINSTANCENAME$ - Enter the name of the SQL Reporting Services instance to which the Compliance and Audit Reports were installed. -   **To resume all instances of the MBAM Administration and Monitoring website** @@ -599,10 +605,10 @@ If you choose to move the MBAM Compliance and Audit Reports from one computer to `PS C:\> Start-Website “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To execute this command, the IIS Module for PowerShell must be added to the current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable execution of scripts. -   + ## To move the Administration and Monitoring feature @@ -621,7 +627,7 @@ If you choose to move the MBAM Administration and Monitoring Reports feature fro `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=AdministrationMonitoringServer,HardwareCompatibility COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ RECOVERYANDHWDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ SRS_REPORTSITEURL=$REPORTSSERVERURL$` - **Note**   + **Note** Replace the values from the preceding example with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - For the COMPLIDB\_SQLINSTANCE parameter, input the server name and instance where the Compliance Status Database is located. For the RECOVERYANDHWDB\_SQLINSTANCE parameter, input the server name and instance where the Recovery and Hardware Database is located. @@ -630,7 +636,7 @@ If you choose to move the MBAM Administration and Monitoring Reports feature fro - $ REPORTSSERVERURL$ - Enter the URL for the Home location of the SQL Reporting Service website. If the reports were installed to a default SRS instance the URL format will formatted “http:// $SERVERNAME$/ReportServer”. If the reports were installed to a default SRS instance, the URL format will be formatted to “http://$SERVERNAME$/ReportServer\_$SQLINSTANCENAME$”. -   + **To configure the Access to the Databases** @@ -646,25 +652,27 @@ If you choose to move the MBAM Administration and Monitoring Reports feature fro `PS C:\> net localgroup "MBAM Recovery and Hardware DB Access" $DOMAIN$\$SERVERNAME$$ /add` - **Note**   + **Note** Replace the value from the preceding example with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain and machine name of the MBAM Administration and Monitoring Server. The server name must be followed by a **$**. For example, MyDomain\\MyServerName1$) - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit reports. -   - The commands listed for adding the server computer accounts to the MBAM local groups must be run for each Administration and Monitoring Server that will be accessing the databases in your environment. + +~~~ +The commands listed for adding the server computer accounts to the MBAM local groups must be run for each Administration and Monitoring Server that will be accessing the databases in your environment. +~~~ ## Related topics [Administering MBAM 1.0 Features](administering-mbam-10-features.md) -  - -  + + + diff --git a/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md index c69a287ce2..4cface3663 100644 --- a/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md +++ b/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md @@ -28,7 +28,7 @@ To recover a corrupted drive that has been protected by BitLocker, a Microsoft B **Note**   If you are a member of the Help Desk Administrators role, you do not have to enter the user’s domain name or user name. -   + 3. Click **Submit**. The recovery key will be displayed. @@ -45,16 +45,16 @@ To recover a corrupted drive that has been protected by BitLocker, a Microsoft B **Note**   For the <fixed drive> in the command, specify an available storage device that has free space equal to or larger than the data on the corrupted drive. Data on the corrupted drive is recovered and moved to the specified fixed drive. -   + ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md index 980a509614..b1d3a350ea 100644 --- a/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md +++ b/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md @@ -24,7 +24,7 @@ Use this procedure to access the centralized Key Recovery data system that can p **Important**   MBAM generates single-use recovery keys. Under this limitation, a recovery key can be used only once and then it is no longer valid. The single use of a recovery password is automatically applied to operating system drives and fixed drives. On removable drives, the single use is applied when the drive is removed and then re-inserted and unlocked on a computer that has the group policy settings activated to manage removable drives. -  + **To recover a drive in Recovery Mode** @@ -37,7 +37,7 @@ MBAM generates single-use recovery keys. Under this limitation, a recovery key c **Note**   If you are an MBAM Advanced Helpdesk User, the user domain and user ID entries are not required. -   + 4. MBAM returns the following: @@ -50,7 +50,7 @@ MBAM generates single-use recovery keys. Under this limitation, a recovery key c **Note**   If you are recovering a damaged drive, the recovery package option provides BitLocker with the critical information necessary to attempt the recovery. -   + 5. After the recovery password and recovery package are retrieved, the recovery password is displayed. To copy the password, click **Copy Key**, and then paste the recovery password into an email or other text file for temporary storage. Or, to save the recovery password to a file, click **Save**. @@ -61,9 +61,9 @@ MBAM generates single-use recovery keys. Under this limitation, a recovery key c [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md index 41119e8869..094d762b26 100644 --- a/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md +++ b/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md @@ -28,7 +28,7 @@ When you move an operating system drive that has been previously encrypted by us **Note**   In some cases, you might be able to click **I forget the PIN** during the startup process to enter the recovery mode. This also displays the recovery key ID. -   + 3. On the MBAM administration website, use the recovery key ID to retrieve the recovery password and unlock the drive. @@ -41,9 +41,9 @@ When you move an operating system drive that has been previously encrypted by us [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam.md) -  + -  + diff --git a/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md b/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md index 4196fe0fc4..bb5ddfe3f6 100644 --- a/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md +++ b/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md @@ -38,7 +38,7 @@ A TPM lockout can occur if a user enters an incorrect PIN too many times. The nu **Note**   If you are an Advanced Helpdesk User, the user domain and user ID fields are not required. -   + 5. Upon retrieval, the owner password is displayed. To save this password to a .tpm file, click the **Save** button. @@ -49,9 +49,9 @@ A TPM lockout can occur if a user enters an incorrect PIN too many times. The nu [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam.md) -  + -  + diff --git a/mdop/mbam-v1/mbam-10-deployment-checklist.md b/mdop/mbam-v1/mbam-10-deployment-checklist.md index a50fdd733a..24865d56ec 100644 --- a/mdop/mbam-v1/mbam-10-deployment-checklist.md +++ b/mdop/mbam-v1/mbam-10-deployment-checklist.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 This checklist is designed to facilitate your deployment of Microsoft BitLocker Administration and Monitoring (MBAM). -**Note**   +**Note** This checklist outlines the recommended steps and provides a high-level list of items to consider when you deploy the MBAM features. We recommend that you copy this checklist into a spreadsheet program and customize it for your specific needs. -  + @@ -43,13 +43,13 @@ This checklist outlines the recommended steps and provides a high-level list of - + - + @@ -63,46 +63,45 @@ This checklist outlines the recommended steps and provides a high-level list of
      • MBAM Group Policy Template

      • -Note   -

        Keep track of the names of the servers each feature is installed on. You will use this information throughout the installation process.

        +Note

        Keep track of the names of the servers each feature is installed on. You will use this information throughout the installation process.

        -  +
        - + - - + + - + - +
        Checklist box

        Complete the planning phase to prepare the computing environment for MBAM deployment.

        [MBAM 1.0 Planning Checklist](mbam-10-planning-checklist.md)

        MBAM 1.0 Planning Checklist

        Checklist box

        Review the information on MBAM supported configurations to make sure that your selected client and server computers are supported for MBAM feature installation.

        [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md)

        MBAM 1.0 Supported Configurations

        [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md)

        Deploying the MBAM 1.0 Server Infrastructure

        Checklist box

        Add Active Directory Domain Services security groups created during the planning phase to the appropriate local MBAM Server feature administrators groups on the appropriate servers.

        [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md) and [How to Manage MBAM Administrator Roles](how-to-manage-mbam-administrator-roles-mbam-1.md)

        Add Active Directory Domain Services security groups created during the planning phase to the appropriate local MBAM Server feature administrators groups on the appropriate servers.

        Planning for MBAM 1.0 Administrator Roles and How to Manage MBAM Administrator Roles

        Checklist box

        Create and deploy the required MBAM Group Policy Objects.

        [Deploying MBAM 1.0 Group Policy Objects](deploying-mbam-10-group-policy-objects.md)

        Deploying MBAM 1.0 Group Policy Objects

        Checklist box

        Deploy the MBAM Client software.

        [Deploying the MBAM 1.0 Client](deploying-the-mbam-10-client.md)

        Deploying the MBAM 1.0 Client

        -  + ## Related topics [Deploying MBAM 1.0](deploying-mbam-10.md) -  - -  + + + diff --git a/mdop/mbam-v1/mbam-10-deployment-prerequisites.md b/mdop/mbam-v1/mbam-10-deployment-prerequisites.md index e1ab53ad55..700410a63d 100644 --- a/mdop/mbam-v1/mbam-10-deployment-prerequisites.md +++ b/mdop/mbam-v1/mbam-10-deployment-prerequisites.md @@ -89,12 +89,12 @@ The following table contains the installation prerequisites for the MBAM Adminis -  + **Note**   For a list of supported operating systems, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + ### Installation prerequisites for the Compliance and Audit Reports @@ -105,7 +105,7 @@ SSRS must be installed and running during MBAM server installation. SSRS should **Note**   For a list of supported operating systems and SQL Server versions, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + ### Installation prerequisites for the Recovery and Hardware Database @@ -116,14 +116,14 @@ SQL Server must have Database Engine Services installed and running during the M **Note**   For a list of supported operating systems and SQL Server versions, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + The TDE SQL Server feature performs real-time input/output (I/O) encryption and decryption of the data and log files. TDE protects data that is "at rest,” which include the data and the log files. It provides the ability to comply with many laws, regulations, and guidelines that are established in various industries. **Note**   Because TDE performs real-time decryption of database information, the recovery key information will be visible if the account under which you are logged in has permissions to the database when you view the recovery key information SQL tables. -  + ### Installation prerequisites for the Compliance and Audit Database @@ -134,7 +134,7 @@ SQL Server must have Database Engine Services installed and running during MBAM **Note**   For a list of supported operating systems and SQL Server versions, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + ## Installation prerequisites for MBAM Clients @@ -148,7 +148,7 @@ The necessary prerequisites that you must meet before you begin the MBAM Client **Warning**   Ensure that the keyboard, mouse, and video are directly connected to the computer, instead of to a keyboard, video, mouse (KVM) switch. A KVM switch can interfere with the ability of the computer to detect the physical presence of hardware. -  + ## Related topics @@ -157,9 +157,9 @@ Ensure that the keyboard, mouse, and video are directly connected to the compute [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md) -  + -  + diff --git a/mdop/mbam-v1/mbam-10-planning-checklist.md b/mdop/mbam-v1/mbam-10-planning-checklist.md index ebf09e2c21..97e5d82a85 100644 --- a/mdop/mbam-v1/mbam-10-planning-checklist.md +++ b/mdop/mbam-v1/mbam-10-planning-checklist.md @@ -22,7 +22,7 @@ You can use this checklist to plan and prepare your computing environment for Mi **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when you plan for an MBAM deployment. We recommend that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,64 +43,64 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - + - + - + - + - + - +
        Checklist box

        Review the “getting started” information about MBAM to gain a basic understanding of the product before you begin the deployment planning.

        [Getting Started with MBAM 1.0](getting-started-with-mbam-10.md)

        Getting Started with MBAM 1.0

        Checklist box

        Plan for MBAM 1.0 Deployment Prerequisites and prepare your computing environment.

        [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md)

        MBAM 1.0 Deployment Prerequisites

        Checklist box

        Plan for and configure MBAM Group Policy requirements.

        [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md)

        Planning for MBAM 1.0 Group Policy Requirements

        Checklist box

        Plan for and create necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

        [Planning for MBAM 1.0 Administrator Roles](planning-for-mbam-10-administrator-roles.md)

        Planning for MBAM 1.0 Administrator Roles

        Checklist box

        Review the MBAM 1.0 Supported Configurations documentation to ensure hardware that meets MBAM installation system requirements is available.

        [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md)

        MBAM 1.0 Supported Configurations

        Checklist box

        Plan for MBAM Server feature deployment.

        [Planning for MBAM 1.0 Server Deployment](planning-for-mbam-10-server-deployment.md)

        Planning for MBAM 1.0 Server Deployment

        Checklist box

        Plan for MBAM Client deployment.

        [Planning for MBAM 1.0 Client Deployment](planning-for-mbam-10-client-deployment.md)

        Planning for MBAM 1.0 Client Deployment

        Checklist box

        Validate your deployment plan in a lab environment.

        [Evaluating MBAM 1.0](evaluating-mbam-10.md)

        Evaluating MBAM 1.0

        -  + ## Related topics [Planning for MBAM 1.0](planning-for-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/mbam-10-supported-configurations.md b/mdop/mbam-v1/mbam-10-supported-configurations.md index c04296f7db..b15e8336ad 100644 --- a/mdop/mbam-v1/mbam-10-supported-configurations.md +++ b/mdop/mbam-v1/mbam-10-supported-configurations.md @@ -26,10 +26,10 @@ This topic specifies the necessary requirements to install and run Microsoft Bit The following table lists the operating systems that are supported for the Microsoft BitLocker Administration and Monitoring Server installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -48,13 +48,13 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + @@ -62,20 +62,20 @@ Microsoft provides support for the current service pack and, in some cases, the

        Windows Server 2008

        Windows Server 2008

        Standard, Enterprise, Datacenter, or Web Server

        SP2 only

        32-bit or 64-bit

        Windows Server 2008 R2

        Windows Server 2008 R2

        Standard, Enterprise, Datacenter, or Web Server

        64-bit

        -  -**Warning**   + +**Warning** There is no support for installing MBAM services, reports, or databases on a domain controller computer. -  + ### Server random access memory (RAM) requirements There are no RAM requirements that are specific to MBAM Server installation. -### SQL Server Database requirements +### SQL Server Database requirements -The following table lists the SQL Server versions that are supported for the MBAM Server feature installation. +The following table lists the SQL Server versions that are supported for the MBAM Server feature installation. @@ -97,28 +97,27 @@ The following table lists the SQL Server versions that are supported for the MB - + - + - + @@ -126,7 +125,7 @@ The following table lists the SQL Server versions that are supported for the MB

        Compliance and Audit Reports

        Microsoft SQL Server 2008 

        Microsoft SQL Server 2008

        R2, Standard, Enterprise, Datacenter, or Developer Edition

        SP2

        32-bit or 64-bit

        Recovery and Hardware Database

        Microsoft SQL Server 2008 

        Microsoft SQL Server 2008

        R2, Enterprise, Datacenter, or Developer Edition

        -Important   -

        SQL Server Standard Editions are not supported for MBAM Recovery and Hardware Database Server feature installation.

        +Important

        SQL Server Standard Editions are not supported for MBAM Recovery and Hardware Database Server feature installation.

        -  +

        SP2

        32-bit or 64-bit

        Compliance and Audit Database

        Microsoft SQL Server 2008 

        Microsoft SQL Server 2008

        R2, Standard, Enterprise, Datacenter, or Developer Edition

        SP2

        32-bit or 64-bit

        -  + ## MBAM Client system requirements @@ -135,10 +134,10 @@ The following table lists the SQL Server versions that are supported for the MB The following table lists the operating systems that are supported for MBAM Client installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + @@ -157,13 +156,13 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + @@ -171,7 +170,7 @@ Microsoft provides support for the current service pack and, in some cases, the

        Windows 7

        Windows 7

        Enterprise Edition

        None, SP1

        32-bit or 64-bit

        Windows 7

        Windows 7

        Ultimate Edition

        None, SP1

        32-bit or 64-bit

        -  + ### Client RAM requirements @@ -184,9 +183,9 @@ There are no RAM requirements that are specific to the MBAM Client installation. [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) -  - -  + + + diff --git a/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md b/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md index 8926326e63..cd65628a24 100644 --- a/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md +++ b/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md @@ -40,16 +40,16 @@ Administrators in this role have increased access to the Helpdesk features from **Important**   To view the reports, an administrative user must be a member of the **MBAM Report Users** security group on the Administration and Monitoring Server, Compliance and Audit Database, and on the server that hosts the Compliance and Reports feature. As a best practice, create a security group in Active Directory with rights on the local **MBAM Report Users** security group on both the Administration and Monitoring Server and on the server that hosts the Compliance and Reports. -  + ## Related topics [Preparing your Environment for MBAM 1.0](preparing-your-environment-for-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md b/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md index cf32db4175..c493b0b251 100644 --- a/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md +++ b/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md @@ -24,7 +24,7 @@ You can use one or both methods in your organization. If you use both methods, y **Note**   To review the MBAM Client system requirements, see [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). -  + ## Deploying the MBAM Client to enable BitLocker encryption after computer distribution to end users @@ -36,7 +36,7 @@ When you deploy the MBAM Client, after you distribute the computers to end users **Note**   In this approach, users are prompted to activate and initialize the Trusted Platform Module (TPM) chip, if it has not been previously activated. -  + ## Using the MBAM Client to enable BitLocker encryption before computer distribution to end users @@ -48,7 +48,7 @@ If your organization wants to use (TPM) to encrypt computers, the administrator **Note**   The TPM protector option requires for the administrator to accept the BIOS prompt to activate and initialize the TPM before delivering the computer to the user. -  + ## Related topics @@ -57,9 +57,9 @@ The TPM protector option requires for the administrator to accept the BIOS promp [Deploying the MBAM 1.0 Client](deploying-the-mbam-10-client.md) -  + -  + diff --git a/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md b/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md index c2d8718452..eb5ac48c44 100644 --- a/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md +++ b/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md @@ -19,19 +19,19 @@ ms.date: 06/16/2016 Microsoft BitLocker Administration and Monitoring (MBAM) Client management requires custom Group Policy settings to be applied. This topic describes the available policy options for Group Policy Object (GPO) when you use MBAM to manage BitLocker Drive Encryption in the enterprise. -**Important**   +**Important** MBAM does not use the default GPO settings for Windows BitLocker drive encryption. If the default settings are enabled, they can cause conflicting behavior. To enable MBAM to manage BitLocker, you must define the GPO policy settings after you install the MBAM Group Policy Template. -  + After you install the MBAM Group Policy template, you can view and modify the available custom MBAM GPO policy settings that enable MBAM to manage the enterprise BitLocker encryption. The MBAM Group Policy template must be installed on a computer that is capable of running the Group Policy Management Console (GPMC) or the Advanced Group Policy Management (AGPM) MDOP technology. Next, to edit the applicable GPO, open the GPMC or AGPM, and then navigate to the following GPO node: **Computer Configuration**\\**Administrative Templates**\\**Windows Components**\\**MDOP MBAM (BitLocker Management)**. The MDOP MBAM (BitLocker Management) GPO node contains four global policy settings and four child GPO setting nodes, respectively. The four GPO global policy settings are: Client Management, Fixed Drive, Operating System Drive, and Removable Drive. The following sections provide policy definitions and suggested policy settings to help you plan for the MBAM GPO policy setting requirements. -**Note**   +**Note** For more information about configuring the minimum suggested GPO settings to enable MBAM to manage BitLocker encryption, see [How to Edit MBAM 1.0 GPO Settings](how-to-edit-mbam-10-gpo-settings.md). -  + ## Global policy definitions @@ -78,7 +78,7 @@ This section describes the MBAM Global policy definitions, which can be found at -  + ## Client Management policy definitions @@ -116,11 +116,10 @@ This section describes the Client Management policy definitions for MBAM, found

        You should enable this policy option if your enterprise has older computer hardware or computers that do not support Trusted Platform Module (TPM). If either of these criteria is true, enable the hardware compatibility verification to make sure that MBAM is applied only to computer models that support BitLocker. If all computers in your organization support BitLocker, you do not have to deploy the Hardware Compatibility, and you can set this policy to Not Configured.

        If you enable this policy setting, the model of the computer is validated against the hardware compatibility list once every 24 hours, before the policy enables BitLocker protection on a computer drive.

        -Note   -

        Before enabling this policy setting, make sure that you have configured the MBAM Recovery and Hardware service endpoint setting in the Configure MBAM Services policy options.

        +Note

        Before enabling this policy setting, make sure that you have configured the MBAM Recovery and Hardware service endpoint setting in the Configure MBAM Services policy options.

        -  +

        If you either disable or do not configure this policy setting, the computer model is not validated against the hardware compatibility list.

        @@ -128,20 +127,19 @@ This section describes the Client Management policy definitions for MBAM, found

        Configure user exemption policy

        Suggested Configuration: Not Configured

        This policy setting lets you configure a web site address, email address, or phone number that will instruct a user to request an exemption from BitLocker encryption.

        -

        If you enable this policy setting and provide a web site address, email address, or phone number, users will see a dialog with instructions on how to apply for an exemption from BitLocker protection. For more information about how to enable BitLocker encryption exemptions for users, see [How to Manage User BitLocker Encryption Exemptions](how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md).

        +

        If you enable this policy setting and provide a web site address, email address, or phone number, users will see a dialog with instructions on how to apply for an exemption from BitLocker protection. For more information about how to enable BitLocker encryption exemptions for users, see How to Manage User BitLocker Encryption Exemptions.

        If you either disable or do not configure this policy setting, the instructions about how to apply for an exemption request will not be presented to users.

        -Note   -

        User exemption is managed per user, not per computer. If multiple users log on to the same computer and one user is not exempt, the computer will be encrypted.

        +Note

        User exemption is managed per user, not per computer. If multiple users log on to the same computer and one user is not exempt, the computer will be encrypted.

        -  +
        -  + ## Fixed Drive policy definitions @@ -200,7 +198,7 @@ This section describes the Fixed Drive policy definitions for MBAM, which can be -  + ## Operating System Drive policy definitions @@ -256,7 +254,7 @@ This section describes the Operating System Drive policy definitions for MBAM, f -  + ## Removable Drive policy definitions @@ -313,16 +311,16 @@ This section describes the Removable Drive Policy definitions for MBAM, found at -  + ## Related topics [Preparing your Environment for MBAM 1.0](preparing-your-environment-for-mbam-10.md) -  - -  + + + diff --git a/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md b/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md index 6af40cd77b..f8a81e0385 100644 --- a/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md +++ b/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md @@ -37,7 +37,7 @@ MBAM server databases and features can be installed in different configurations, **Note**   For more information about performance scalability of MBAM and recommended deployment topologies, see the MBAM Scalability and High-Availability Guide white paper at . -  + Each MBAM feature has specific prerequisites. For a full list of server feature prerequisites and hardware and software requirements, see [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) and [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). @@ -61,7 +61,7 @@ When you deploy the MBAM Server features, install the features in the following **Note**   Keep track of the names of the computers on which you install each feature. You will use this information throughout the installation process. You can print and use a deployment checklist to assist you in the installation process. For more information about the MBAM deployment checklist, see [MBAM 1.0 Deployment Checklist](mbam-10-deployment-checklist.md). -  + ## Related topics @@ -70,9 +70,9 @@ Keep track of the names of the computers on which you install each feature. You [Deploying the MBAM 1.0 Server Infrastructure](deploying-the-mbam-10-server-infrastructure.md) -  + -  + diff --git a/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md b/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md index c14a29f009..c1751b7247 100644 --- a/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md +++ b/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md @@ -29,7 +29,7 @@ To ensure successful installation of MBAM Clients and MBAM Server features, you **Note**   MBAM Setup verifies if all prerequisites are met before installation starts. If they are not met, Setup will fail. -  + [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) @@ -41,7 +41,7 @@ Before MBAM can manage clients in the enterprise, you must define the Group Poli **Important**   MBAM will not work with policies for stand-alone BitLocker drive encryption. Group Policy must be defined for MBAM; otherwise, the BitLocker encryption and enforcement will fail. -  + [Planning for MBAM 1.0 Group Policy Requirements](planning-for-mbam-10-group-policy-requirements.md) @@ -59,9 +59,9 @@ The membership of MBAM roles can be managed more effectively if you create secur [Planning for MBAM 1.0](planning-for-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/release-notes-for-mbam-10.md b/mdop/mbam-v1/release-notes-for-mbam-10.md index b6de4a5e6a..aec1c1dab8 100644 --- a/mdop/mbam-v1/release-notes-for-mbam-10.md +++ b/mdop/mbam-v1/release-notes-for-mbam-10.md @@ -38,7 +38,7 @@ We are interested in your feedback on MBAM. You can send your feedback to ' to group 'MBAM Report Users' Locating group 'MBAM Recovery and Hardware DB Access' Adding 'S-1-5-20' to group 'MBAM Recovery and Hardware DB Access' Exception: A new member could not be added to a local group because the member has the wrong account type. -  -  StackTrace:    at System.DirectoryServices.AccountManagement.SAMStoreCtx.UpdateGroupMembership(Principal group, DirectoryEntry de, NetCred credentials, AuthenticationTypes authTypes) -   at System.DirectoryServices.AccountManagement.SDSUtils.ApplyChangesToDirectory(Principal p, StoreCtx storeCtx, GroupMembershipUpdater updateGroupMembership, NetCred credentials, AuthenticationTypes authTypes) -   at System.DirectoryServices.AccountManagement.SAMStoreCtx.Update(Principal p) -   at Microsoft.Windows.Mdop.BitlockerManagement.Setup.Groups.CreateGroupsDeferred(Session session) -  InnerException:Exception: A new member could not be added to a local group because the member has the wrong account type. -  -    InnerException:StackTrace:    at System.DirectoryServices.AccountManagement.UnsafeNativeMethods.IADsGroup.Add(String bstrNewItem) -   at System.DirectoryServices.AccountManagement.SAMStoreCtx.UpdateGroupMembership(Principal group, DirectoryEntry de, NetCred credentials, AuthenticationTypes authTypes) + + StackTrace:    at System.DirectoryServices.AccountManagement.SAMStoreCtx.UpdateGroupMembership(Principal group, DirectoryEntry de, NetCred credentials, AuthenticationTypes authTypes) + at System.DirectoryServices.AccountManagement.SDSUtils.ApplyChangesToDirectory(Principal p, StoreCtx storeCtx, GroupMembershipUpdater updateGroupMembership, NetCred credentials, AuthenticationTypes authTypes) + at System.DirectoryServices.AccountManagement.SAMStoreCtx.Update(Principal p) + at Microsoft.Windows.Mdop.BitlockerManagement.Setup.Groups.CreateGroupsDeferred(Session session) + InnerException:Exception: A new member could not be added to a local group because the member has the wrong account type. + + InnerException:StackTrace:    at System.DirectoryServices.AccountManagement.UnsafeNativeMethods.IADsGroup.Add(String bstrNewItem) + at System.DirectoryServices.AccountManagement.SAMStoreCtx.UpdateGroupMembership(Principal group, DirectoryEntry de, NetCred credentials, AuthenticationTypes authTypes) CustomAction MbamCreateGroupsDeferred returned actual error code 1603 (note this may not be 100% accurate if translation happened inside sandbox) Action ended 11:41:29: InstallExecute. Return value 3. ``` @@ -150,9 +150,9 @@ Microsoft, Active Directory, ActiveX, Bing, Excel, Silverlight, SQL Server, Win [About MBAM 1.0](about-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/security-considerations-for-mbam-10.md b/mdop/mbam-v1/security-considerations-for-mbam-10.md index a76bf92569..60d75c4b33 100644 --- a/mdop/mbam-v1/security-considerations-for-mbam-10.md +++ b/mdop/mbam-v1/security-considerations-for-mbam-10.md @@ -86,7 +86,7 @@ No groups are created automatically during MBAM Setup. However, you should creat -  + ### MBAM Server Local Groups @@ -135,7 +135,7 @@ MBAM Setup creates local groups to support MBAM operations. You should add the A -  + ### SSRS Reports Access Account @@ -148,7 +148,7 @@ During MBAM Setup, the following MBAM Setup log files are created in the %temp% **MBAM Server Setup log files** -MSI*<five random characters>*.log +MSI<five random characters>.log Logs the actions taken during MBAM Setup and MBAM Server Feature installation. InstallComplianceDatabase.log @@ -172,11 +172,11 @@ Logs the actions taken to authorize web services to MBAM Recovery and Hardware d **Note**   In order to obtain additional MBAM Setup log files, you must install Microsoft BitLocker Administration and Monitoring by using the **msiexec** package and the **/l** <location> option. Log files are created in the location specified. -  + **MBAM Client Setup log files** -MSI*<five random characters>*.log +MSI<five random characters>.log Logs the actions taken during MBAM Client installation. ## MBAM Database TDE considerations @@ -197,9 +197,9 @@ For more information about TDE in SQL Server 2008, see [Database Encryption in [Security and Privacy for MBAM 1.0](security-and-privacy-for-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md b/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md index a86d60a380..069c0097c2 100644 --- a/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md +++ b/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md @@ -73,7 +73,7 @@ An Enterprise Compliance Report provides information on overall BitLocker compli -  + **Enterprise Compliance Report Compliance states** @@ -120,7 +120,7 @@ An Enterprise Compliance Report provides information on overall BitLocker compli -  + ### Computer Compliance Report @@ -131,7 +131,7 @@ The Computer Compliance Report provides detailed encryption information and appl **Note**   This report does not provide encryption status for Removable Data Volumes. -  + **Computer Compliance Report fields** @@ -210,7 +210,7 @@ This report does not provide encryption status for Removable Data Volumes. -  + **Computer Compliance Report Drive fields** @@ -261,7 +261,7 @@ This report does not provide encryption status for Removable Data Volumes. -  + ### Hardware Audit Report @@ -304,7 +304,7 @@ This report can help you audit changes to the Hardware Compatibility status of s -  + ### Recovery Audit Report @@ -367,21 +367,21 @@ The Recovery Audit Report can help you audit users who have requested access to -  + **Note**   To save report results to a file, click the **Export** button on the reports menu bar. -  + ## Related topics [Monitoring and Reporting BitLocker Compliance with MBAM 1.0](monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md) -  + -  + diff --git a/mdop/mbam-v2/about-mbam-20-mbam-2.md b/mdop/mbam-v2/about-mbam-20-mbam-2.md index fcfa066515..403d43870d 100644 --- a/mdop/mbam-v2/about-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/about-mbam-20-mbam-2.md @@ -27,7 +27,7 @@ BitLocker Administration and Monitoring 2.0 enforces the BitLocker encryption **Note**   BitLocker is not covered in detail in this guide. For an overview of BitLocker, see [BitLocker Drive Encryption Overview](https://go.microsoft.com/fwlink/p/?LinkId=225013). -  + The following groups might be interested in using MBAM to manage BitLocker: @@ -105,9 +105,9 @@ This technology is a part of the Microsoft Desktop Optimization Pack (MDOP). Ent [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/about-mbam-20-sp1.md b/mdop/mbam-v2/about-mbam-20-sp1.md index 23208c2917..8b27fe1388 100644 --- a/mdop/mbam-v2/about-mbam-20-sp1.md +++ b/mdop/mbam-v2/about-mbam-20-sp1.md @@ -28,13 +28,13 @@ This version of MBAM provides the following new features and functionality. Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 Service Pack 1 (SP1) adds support for Windows 8.1, Windows Server 2012 R2, and System Center 2012 R2 Configuration Manager. -### Support for Microsoft SQL Server 2008 R2 SP2 +### Support for Microsoft SQL Server 2008 R2 SP2 -Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 Service Pack 1 (SP1) adds support for Microsoft SQL Server 2008 R2 SP2. You must use Microsoft SQL Server 2008 R2 or higher if you are running Microsoft System Center Configuration Manager 2007 R2. +Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 Service Pack 1 (SP1) adds support for Microsoft SQL Server 2008 R2 SP2. You must use Microsoft SQL Server 2008 R2 or higher if you are running Microsoft System Center Configuration Manager 2007 R2. ### Customer feedback rollup -MBAM 2.0 SP1 includes a rollup of fixes to address issues that were found since the Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 release. As part of these changes, the Computer Name field now appears in the BitLocker Computer Compliance and BitLocker Enterprise Compliance Details reports when you run MBAM with Microsoft System Center Configuration Manager 2007. +MBAM 2.0 SP1 includes a rollup of fixes to address issues that were found since the Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 release. As part of these changes, the Computer Name field now appears in the BitLocker Computer Compliance and BitLocker Enterprise Compliance Details reports when you run MBAM with Microsoft System Center Configuration Manager 2007. ### Firewall exception must be set on ports for the Self-Service Portal and the Administration and Monitoring website @@ -48,16 +48,16 @@ MBAM reports for the Configuration Manager integrated topology are now available You can install MBAM on a primary site server or a central administration site server when you install MBAM with the Configuration Manager integrated topology. Previously, you were required to install MBAM on a central administration site server. -**Important**   +**Important** The server on which you install MBAM must be the top-tier server in your hierarchy. -  -The MBAM installation works differently for Microsoft System Center Configuration Manager 2007 and Microsoft System Center 2012 Configuration Manager as follows: + +The MBAM installation works differently for Microsoft System Center Configuration Manager 2007 and Microsoft System Center 2012 Configuration Manager as follows: - **Configuration Manager 2007** : If you install MBAM on a primary site server that is part of a larger Configuration Manager hierarchy and has a central site parent server, MBAM resolves the central site parent server and performs all of the installation actions on that parent server. The installation actions include checking prerequisites and installing the Configuration Manager objects and reports. For example, if you install MBAM on a primary site server that is a child of a central site parent server, MBAM installs all of the Configuration Manager objects and reports on the parent server. If you install MBAM on the parent server, MBAM performs all of the installation actions on that parent server. -- **System Center 2012 Configuration Manager** : If you install MBAM on a primary site server or on a central administration server, MBAM performs all of the installation actions on that site server. +- **System Center 2012 Configuration Manager** : If you install MBAM on a primary site server or on a central administration server, MBAM performs all of the installation actions on that site server. ### Configuration Manager Console must be installed on the computer on which you install the MBAM Server @@ -88,11 +88,10 @@ When you install MBAM with the Configuration Manager integrated topology, you mu

        CM_REPORTS_ONLY

        Enables you to install only the Configuration Manager reports, without other Configuration Manager objects, such as the baseline, collection, and configuration items.

        -Note   -

        You must combine this parameter with the CM_REPORTS_COLLECTION_ID parameter.

        +Note

        You must combine this parameter with the CM_REPORTS_COLLECTION_ID parameter.

        -  +

        Valid parameter values:

          @@ -113,7 +112,7 @@ When you install MBAM with the Configuration Manager integrated topology, you mu -  + ### Ability to turn Self-Service Portal notice text on or off @@ -171,12 +170,12 @@ MBAM displays the notice text, based on the following rules: - If MBAM does not find a default notice.txt file, it displays the default text in the Self-Service Portal. -**Note**   +**Note** If an end user’s browser is set to a language that does not have a corresponding language subfolder or notice.txt, the text that is in the notice.txt file in the following root directory is displayed: <*MBAM Self-Service Install Directory*>\\Self Service Website\\ -  + **To create a localized notice.txt file** @@ -184,10 +183,10 @@ If an end user’s browser is set to a language that does not have a correspondi <*MBAM Self-Service Install Directory*>\\Self Service Website\\ - **Note**   + **Note** Some language folders already exist, so you may not have to create one. If you do need to create a language folder, see [National Language Support (NLS) API Reference](https://go.microsoft.com/fwlink/?LinkId=317947) for a list of the valid names that you can use for the <*language*> folder. -   + 2. Create a notice.txt file that contains the localized notice text. @@ -258,8 +257,8 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M // Microsoft BitLocker Administration and Monitoring //=================================================== -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) +# pragma namespace ("\\\\.\\root\\cimv2") +# pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) [Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")] class Win32_BitLockerEncryptionDetails { @@ -291,19 +290,19 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M Boolean IsAutoUnlockEnabled; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) +# pragma namespace ("\\\\.\\root\\cimv2") +# pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) [DYNPROPS] Class Win32Reg_MBAMPolicy { [key] string KeyName; - + //General encryption requirements UInt32 OsDriveEncryption; UInt32 FixedDataDriveEncryption; UInt32 EncryptionMethod; - + //Required protectors properties UInt32 OsDriveProtector; UInt32 FixedDataDriveAutoUnlock; @@ -323,7 +322,7 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M Instance of Win32Reg_MBAMPolicy { KeyName="BitLocker policy"; - + //General encryption requirements [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\FVE\\MDOPBitLockerManagement|ShouldEncryptOsDrive"),Dynamic,Provider("RegPropProv")] OsDriveEncryption; @@ -331,7 +330,7 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M FixedDataDriveEncryption; [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\FVE|EncryptionMethod"),Dynamic,Provider("RegPropProv")] EncryptionMethod; - + //Required protectors properties [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\MBAM|OSVolumeProtectorPolicy"),Dynamic,Provider("RegPropProv")] OsDriveProtector; @@ -353,19 +352,19 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M EncodedComputerName; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL) +# pragma namespace ("\\\\.\\root\\cimv2") +# pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL) [DYNPROPS] Class Win32Reg_MBAMPolicy_64 { [key] string KeyName; - + //General encryption requirements UInt32 OsDriveEncryption; UInt32 FixedDataDriveEncryption; UInt32 EncryptionMethod; - + //Required protectors properties UInt32 OsDriveProtector; UInt32 FixedDataDriveAutoUnlock; @@ -385,7 +384,7 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M Instance of Win32Reg_MBAMPolicy_64 { KeyName="BitLocker policy 64"; - + //General encryption requirements [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\FVE\\MDOPBitLockerManagement|ShouldEncryptOsDrive"),Dynamic,Provider("RegPropProv")] OsDriveEncryption; @@ -393,7 +392,7 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M FixedDataDriveEncryption; [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\FVE|EncryptionMethod"),Dynamic,Provider("RegPropProv")] EncryptionMethod; - + //Required protectors properties [PropertyContext("Local|HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\MBAM|OSVolumeProtectorPolicy"),Dynamic,Provider("RegPropProv")] OsDriveProtector; @@ -415,8 +414,8 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M EncodedComputerName; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) +# pragma namespace ("\\\\.\\root\\cimv2") +# pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) [Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_OperatingSystemExtended @@ -427,8 +426,8 @@ If you are upgrading to MBAM 2.0 SP1 and you are using MBAM with Configuration M uint32 SKU; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) +# pragma namespace ("\\\\.\\root\\cimv2") +# pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) [Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_ComputerSystemExtended @@ -481,9 +480,9 @@ MBAM 2.0 SP1 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP i [Release Notes for MBAM 2.0 SP1](release-notes-for-mbam-20-sp1.md) -  - -  + + + diff --git a/mdop/mbam-v2/about-the-computer-tpm-chip.md b/mdop/mbam-v2/about-the-computer-tpm-chip.md index 81cfa2c860..8fc5a07b1c 100644 --- a/mdop/mbam-v2/about-the-computer-tpm-chip.md +++ b/mdop/mbam-v2/about-the-computer-tpm-chip.md @@ -29,7 +29,7 @@ After BitLocker is configured, you can access additional information about the T **Note**   You must have administrative credentials on your computer to access this tool. -  + In a TPM failure, a change in the BIOS, or certain Windows Updates, BitLocker will lock your computer and require you to contact your Help Desk to unlock it. You have to provide the name of your computer as well as your computer’s domain. Help Desk can give you a password file that can be used to unlock your computer. @@ -45,9 +45,9 @@ If a TPM failure, change in the BIOS, or certain Windows Updates occur, BitLocke [Using Your PIN or Password](using-your-pin-or-password.md) -  + -  + diff --git a/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md b/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md index 0ca6ac6e61..62803ce9fd 100644 --- a/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in Alternative Formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

          (609) 987-8116

          -

          [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

          +

          http://www.learningally.org/

          Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

          -  + ## Customer Service for People with Hearing Impairments @@ -96,9 +96,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md b/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md index fbaf87c838..87e053a66b 100644 --- a/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md +++ b/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md @@ -41,7 +41,7 @@ MBAM provides a custom control panel, called BitLocker Encryption Options, that **Note**   This customized control panel does not replace the default Windows BitLocker control panel. -  + [How to Manage MBAM Client BitLocker Encryption Options by Using the Control Panel](how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-2.md) @@ -50,9 +50,9 @@ This customized control panel does not replace the default Windows BitLocker con [Operations for MBAM 2.0](operations-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/edit-the-configurationmof-file.md b/mdop/mbam-v2/edit-the-configurationmof-file.md index c6e10fe82a..e06a21728b 100644 --- a/mdop/mbam-v2/edit-the-configurationmof-file.md +++ b/mdop/mbam-v2/edit-the-configurationmof-file.md @@ -26,7 +26,7 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 - For an upgrade to MBAM 2.0 SP1, see **Update the configuration.mof file if you upgrade to MBAM 2.0 SP1 and you are using MBAM with Configuration Manager 2007**. -  + **To create the configuration.mof file if you are using MBAM 2.0 SP1 with Configuration Manager** @@ -379,9 +379,9 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 [Deploying MBAM with Configuration Manager](deploying-mbam-with-configuration-manager-mbam2.md) -  + -  + diff --git a/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md b/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md index 93fe769b89..4c52ea62b8 100644 --- a/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md @@ -47,43 +47,43 @@ Even though you are setting up a non-production instance of MBAM to evaluate in Checklist box

          Review the Getting Started information about MBAM to gain a basic understanding of the product before beginning deployment planning.

          -

          [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md)

          +

          Getting Started with MBAM 2.0

          Checklist box

          Plan for MBAM 2.0 Deployment Prerequisites and prepare your computing environment.

          -

          [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md)

          +

          MBAM 2.0 Deployment Prerequisites

          Checklist box

          Plan for and configure MBAM Group Policy requirements.

          -

          [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md)

          +

          Planning for MBAM 2.0 Group Policy Requirements

          Checklist box

          Plan for and create necessary Active Directory Domain Services security groups, and plan for MBAM local security group membership requirements.

          -

          [Planning for MBAM 2.0 Administrator Roles](planning-for-mbam-20-administrator-roles-mbam-2.md)

          +

          Planning for MBAM 2.0 Administrator Roles

          Checklist box

          Plan for deploying MBAM Server feature deployment.

          -

          [Planning for MBAM 2.0 Server Deployment](planning-for-mbam-20-server-deployment-mbam-2.md)

          +

          Planning for MBAM 2.0 Server Deployment

          Checklist box

          Plan for deploying MBAM Client deployment.

          -

          [Planning for MBAM 2.0 Client Deployment](planning-for-mbam-20-client-deployment-mbam-2.md)

          +

          Planning for MBAM 2.0 Client Deployment

          -  + ### Perform an MBAM Evaluation Deployment @@ -100,37 +100,37 @@ After completing the necessary planning and software prerequisite installations Checklist box

          Review the MBAM supported configurations information to make sure that selected client and server computers are supported for MBAM feature installation.

          -

          [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md)

          +

          MBAM 2.0 Supported Configurations

          Checklist box

          Run MBAM Setup to deploy MBAM Server features on a single server for evaluation purposes.

          -

          [How to Install and Configure MBAM on a Single Server](how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md)

          +

          How to Install and Configure MBAM on a Single Server

          Checklist box

          Add Active Directory Domain Services security groups, that you created during the planning phase, to the appropriate local MBAM Server feature local groups on the new MBAM Server.

          -

          [Planning for MBAM 2.0 Administrator Roles](planning-for-mbam-20-administrator-roles-mbam-2.md) and [How to Manage MBAM Administrator Roles](how-to-manage-mbam-administrator-roles-mbam-2.md)

          +

          Planning for MBAM 2.0 Administrator Roles and How to Manage MBAM Administrator Roles

          Checklist box

          Create and deploy required MBAM Group Policy Objects.

          -

          [Deploying MBAM 2.0 Group Policy Objects](deploying-mbam-20-group-policy-objects-mbam-2.md)

          +

          Deploying MBAM 2.0 Group Policy Objects

          Checklist box

          Deploy the MBAM Client software.

          -

          [Deploying the MBAM 2.0 Client](deploying-the-mbam-20-client-mbam-2.md)

          +

          Deploying the MBAM 2.0 Client

          -  + ## Configure Lab Computers for MBAM Evaluation @@ -140,7 +140,7 @@ This section contains information that can be used to speed up the MBAM Client s **Note**   The information in following section describes how to modify the Windows registry. Using Registry Editor incorrectly can cause serious problems that may require you to reinstall Windows. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. -  + ### Modify MBAM Client Status Reporting Frequency Settings @@ -157,7 +157,7 @@ To modify the MBAM Client status reporting frequency settings: **Note**   To set values that are this low, you must set them in the registry manually. -  + ### Modify MBAM Client Service Startup Delay @@ -168,9 +168,9 @@ In addition to the MBAM Client wakeup and status reporting frequencies, there is [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md b/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md index 0c1d7770a0..c05335448c 100644 --- a/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md +++ b/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md @@ -22,7 +22,7 @@ When you install Microsoft BitLocker Administration and Monitoring (MBAM), you c **Important**   Windows To Go is not supported when you install the integrated topology of MBAM with Configuration Manager 2007. -  + ## Using MBAM with Configuration Manager @@ -97,9 +97,9 @@ A description of the servers, databases, and features of this architecture follo [Using MBAM with Configuration Manager](using-mbam-with-configuration-manager.md) -  + -  + diff --git a/mdop/mbam-v2/helping-end-users-manage-bitlocker.md b/mdop/mbam-v2/helping-end-users-manage-bitlocker.md index 224e9c56c2..351f43c2ea 100644 --- a/mdop/mbam-v2/helping-end-users-manage-bitlocker.md +++ b/mdop/mbam-v2/helping-end-users-manage-bitlocker.md @@ -39,7 +39,7 @@ You can turn off BitLocker, either temporarily, by suspending it, or permanently **Note**   Because BitLocker encrypts the whole drive and not just the individual files themselves, be careful when you move sensitive data between drives. If you move a file from a BitLocker-protected drive to a nonencrypted drive, the file will no longer be encrypted. -  + ## About the BitLocker Encryption Options Application @@ -81,9 +81,9 @@ In this section, you can view information about external drives (such as a USB t - **Disk Management** -open the Disk Management tool. From here you can view the information for all hard drives connected to the computer and configure partitions and drive options. You must have administrative rights on your computer to access this tool. -  + -  + diff --git a/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md b/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md index 809f586de3..8e213175cb 100644 --- a/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md @@ -26,7 +26,7 @@ The following diagram shows the MBAM recommended architecture for a production e **Note**   A single-server architecture should be used only in test environments. -  + ![mbam 2 two-server deployment topology](images/mbam2-3-servers.gif) @@ -73,9 +73,9 @@ The MBAM Client is installed on a Windows computer and has the following charact [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-brand-the-self-service-portal.md b/mdop/mbam-v2/how-to-brand-the-self-service-portal.md index 36056e912b..d50446e82d 100644 --- a/mdop/mbam-v2/how-to-brand-the-self-service-portal.md +++ b/mdop/mbam-v2/how-to-brand-the-self-service-portal.md @@ -31,71 +31,73 @@ After you install the Microsoft BitLocker Administration and Monitoring (MBAM) S 5. From the **Name** column, select the item that you want to change, and change the default value to reflect the name that you want to use. The following table lists the values that you can set. - **Caution**   + **Caution** Do not change the value in the Name column (CompanyName\*), as it will cause the Self-Service Portal to stop working. -   - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          NameDefault Value

          CompanyName*

          Contoso IT

          HelpdeskText*

          Contact Help Desk or IT Department

          HelpdeskUrl*

          Http://www.microsoft.com

          jQueryPath

          //ajax.aspnetcdn.com/ajax/jQuery/jquery-1.7.2.min.js

          MicrosoftAjaxPath

          //ajax.aspnetcdn.com/ajax/3.5/MicrosoftAjax.js

          MicrosoftMvcAjaxPath

          //ajax.aspnetcdn.com/ajax/mvc/2.0/MicrosoftMvcValidation.js

          NoticeTextPath

          Notice.txt

          -
          - Note   -

          You can edit the Notice text either by using the IIS Manager or by opening and changing the Notice.txt file in the installation directory.

          -
          -
          -   -
          -   +~~~ + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          NameDefault Value

          CompanyName*

          Contoso IT

          HelpdeskText*

          Contact Help Desk or IT Department

          HelpdeskUrl*

          Http://www.microsoft.com

          jQueryPath

          //ajax.aspnetcdn.com/ajax/jQuery/jquery-1.7.2.min.js

          MicrosoftAjaxPath

          //ajax.aspnetcdn.com/ajax/3.5/MicrosoftAjax.js

          MicrosoftMvcAjaxPath

          //ajax.aspnetcdn.com/ajax/mvc/2.0/MicrosoftMvcValidation.js

          NoticeTextPath

          Notice.txt

          +
          +Note +

          You can edit the Notice text either by using the IIS Manager or by opening and changing the Notice.txt file in the installation directory.

          +
          +
          + +
          +~~~ + + ## Related topics [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md b/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md index daaac08c25..26ec642679 100644 --- a/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md +++ b/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md @@ -19,26 +19,26 @@ ms.date: 06/16/2016 The Microsoft BitLocker Administration and Monitoring (MBAM) Client enables administrators to enforce and monitor BitLocker drive encryption on computers in the enterprise. If computers that have a Trusted Platform Module (TPM) chip, the BitLocker client can be integrated into an organization by enabling BitLocker management and encryption on client computers as part of the imaging and Windows deployment process. -**Note**   +**Note** To review the Microsoft BitLocker Administration and Monitoring Client system requirements, see [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md). -  + Encrypting client computers with BitLocker during the initial imaging stage of a Windows deployment can lower the administrative overhead necessary for implementing MBAM in an organization. It also ensures that every computer that is deployed already has BitLocker running and is configured correctly. -**Note**   +**Note** The procedure in this topic describes modifying the Windows registry. Using Registry Editor incorrectly can cause serious problems that may require you to reinstall Windows. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. -  + **To encrypt a computer as part of Windows deployment** 1. If your organization is planning to use the Trusted Platform Module (TPM) protector or the TPM + PIN protector options in BitLocker, you must activate the TPM chip before the initial deployment of MBAM. When you activate the TPM chip, you avoid a reboot later in the process, and you ensure that the TPM chips are correctly configured according to the requirements of your organization. You must activate the TPM chip manually in the BIOS of the computer. - **Note**   + **Note** Some vendors provide tools to turn on and activate the TPM chip in the BIOS from within the operating system. Refer to the manufacturer documentation for more details about how to configure the TPM chip. -   + 2. Install the Microsoft BitLocker Administration and Monitoring client agent. @@ -86,24 +86,26 @@ The procedure in this topic describes modifying the Windows registry. Using Regi Set this value to the URL for the Key Recovery web server, for example, http://<computer name>/MBAMRecoveryAndHardwareService/CoreService.svc. -   - **Note**   - MBAM policy or registry values can be set here to override previously set values. -   +~~~ +**Note** +MBAM policy or registry values can be set here to override previously set values. +~~~ -7. The MBAM agent restarts the system during MBAM client deployment. When you are ready for this reboot, run the following command at a command prompt as an administrator: - **net start mbamagent** -8. When the computers restarts, and the BIOS prompts you to accept a TPM change, accept the change. +7. The MBAM agent restarts the system during MBAM client deployment. When you are ready for this reboot, run the following command at a command prompt as an administrator: -9. During the Windows client operating system imaging process, when you are ready to start encryption, restart the MBAM agent service, and set start to **automatic** by running a command prompt as an administrator and typing the following commands: + **net start mbamagent** - **sc config mbamagent start= auto** +8. When the computers restarts, and the BIOS prompts you to accept a TPM change, accept the change. - **net start mbamagent** +9. During the Windows client operating system imaging process, when you are ready to start encryption, restart the MBAM agent service, and set start to **automatic** by running a command prompt as an administrator and typing the following commands: + + **sc config mbamagent start= auto** + + **net start mbamagent** 10. Remove the bypass registry values by running Regedit and going to the HKLM\\SOFTWARE\\Microsoft registry entry. To delete the **MBAM** node, right-click the node and click **Delete**. @@ -112,9 +114,9 @@ The procedure in this topic describes modifying the Windows registry. Using Regi [Deploying the MBAM 2.0 Client](deploying-the-mbam-20-client-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md b/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md index e3c8b6fefc..cd58d1213c 100644 --- a/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md +++ b/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md @@ -22,7 +22,7 @@ The Microsoft BitLocker Administration and Monitoring (MBAM) client enables admi **Note**   To review the Microsoft BitLocker Administration and Monitoring Client system requirements, see [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md). -  + **To deploy the MBAM Client to desktop or laptop computers** @@ -35,16 +35,16 @@ To review the Microsoft BitLocker Administration and Monitoring Client system re **Important**   The MBAM Client will not start BitLocker encryption actions if a remote desktop protocol connection is active. All remote console connections must be closed before BitLocker encryption will begin. -   + ## Related topics [Deploying the MBAM 2.0 Client](deploying-the-mbam-20-client-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md b/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md index 40fe98a3bb..be34c7735b 100644 --- a/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md +++ b/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md @@ -26,7 +26,7 @@ You can use Microsoft BitLocker Administration and Monitoring (MBAM) to determin **Note**   Note: The default address for the Administration and Monitoring website is http://*<computername>*. Using the fully qualified server name will yield faster browsing results. -   + 2. Selects the **Report** node from the navigation pane, and select the **Computer Compliance Report**. @@ -37,16 +37,16 @@ You can use Microsoft BitLocker Administration and Monitoring (MBAM) to determin **Note**   Device compliance is determined by the BitLocker policies that your enterprise has deployed. You may want to verify your deployed policies before you try to determine the BitLocker encryption state of a device. -   + ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md b/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md index 44e50e75a6..1c4aec51cd 100644 --- a/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md +++ b/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md @@ -67,21 +67,23 @@ You can use the following steps to configure the basic, recommended GPO settings -   - **Important**   - Depending on the policies that your organization decides to deploy, you may have to configure additional policies. See [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md) for Group Policy configuration details for all of the available MBAM GPO policy options. -   +~~~ +**Important** +Depending on the policies that your organization decides to deploy, you may have to configure additional policies. See [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md) for Group Policy configuration details for all of the available MBAM GPO policy options. +~~~ + + ## Related topics [Deploying MBAM 2.0 Group Policy Objects](deploying-mbam-20-group-policy-objects-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md b/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md index eb631ef64b..7e100cc0b6 100644 --- a/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md +++ b/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md @@ -22,7 +22,7 @@ When you install Microsoft BitLocker Administration and Monitoring (MBAM) with t **Note**   To run the reports, you must be a member of the **Report Users Role** on the computers where the Administration and Monitoring Server features, Compliance and Audit Database, and Compliance and Audit Reports are installed. -  + **To open the Administration and Monitoring website** @@ -31,7 +31,7 @@ To run the reports, you must be a member of the **Report Users Role** on the com **Note**   If the Administration and Monitoring website was installed on a port other than 80, you have to specify the port in the URL (for example, *http://<computername>:<port>*. If you specified a host name for the Administration and Monitoring website during the installation, the URL is *http://<hostname>*. -   + 2. In the left pane, click **Reports** and then select the report you want to run from the top menu bar. @@ -40,7 +40,7 @@ To run the reports, you must be a member of the **Report Users Role** on the com **Note**   If SSRS was not configured to use Secure Socket Layer, the URL for the reports will be set to HTTP instead of to HTTPS when you install the MBAM Server. If you then go to the Help Desk portal and select a report, the following message displays: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. -   + **To generate an Enterprise Compliance Report** @@ -57,7 +57,7 @@ To run the reports, you must be a member of the **Report Users Role** on the com **Note**   The Enterprise Compliance report is generated by a SQL job that runs every six hours. Therefore, the first time you view the report, you may find that some data is missing. You can generate updated report data manually by using SQL Management Studio. From the **Object Explorer** window, expand **SQL Server Agent**, expand **Jobs**, right-click the **CreateCache** job, and select **Start Job at Step….** -   + 3. Select a computer name to view information about the computer in the Computer Compliance Report. @@ -78,7 +78,7 @@ To run the reports, you must be a member of the **Report Users Role** on the com **Note**   An MBAM client computer is considered compliant if the computer matches the requirements of the MBAM policy settings. -   + **To generate the Recovery Key Audit Report** @@ -105,9 +105,9 @@ To run the reports, you must be a member of the **Report Users Role** on the com [Monitoring and Reporting BitLocker Compliance with MBAM 2.0](monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md index 961892e3aa..db6508b8b3 100644 --- a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md +++ b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md @@ -25,12 +25,12 @@ The following diagram shows an example of a single-server architecture. For a de Each server feature has certain prerequisites. To verify that you have met the prerequisites and hardware and software requirements, see [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md) and [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md). In addition, some features also have information that must be provided during the installation process to successfully deploy the feature. You should also review [Preparing your Environment for MBAM 2.0](preparing-your-environment-for-mbam-20-mbam-2.md) before you start MBAM deployment. -**Note**   +**Note** To obtain the setup log files, you have use the Msiexec package and the **/L** <location> option to install MBAM. Log files are created in the location that you specify. Additional setup log files are created in the %temp% folder on the server of the user who is installing MBAM. -  + ## To install MBAM Server features on a single server @@ -61,17 +61,17 @@ The following steps describe how to install general MBAM features. - MBAM Group Policy template - **Note**   + **Note** The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all of the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. If all prerequisites are met this time, the installation resumes. -   + 6. On the **Configure network communication security** page, choose whether to encrypt the communication between the Web Services on the Administration and Monitoring Server and the clients. If you decide to encrypt the communication, select the certification authority-provisioned certificate to use for encryption. The certificate must be created prior to this step to enable you to select it on this page. - **Note**   + **Note** This page appears only if you selected the Self-Service Portal or the Administration and Monitoring Server feature on the **Select features to install** page. -   + 7. Click **Next**, and then continue to the next set of steps to configure the MBAM Server features. @@ -91,10 +91,10 @@ The following steps describe how to install general MBAM features. 7. On the **Configure the Self-Service Portal** page, enter the port number, host name, virtual directory name, and installation path for the Self-Service Portal. - **Note**   + **Note** The port number that you specify must be an unused port number on the Administration and Monitoring Server unless you specify a unique host header name. If you are using Windows Firewall, the port will be opened automatically. -   + 8. Click **Next** to continue. @@ -102,10 +102,10 @@ The following steps describe how to install general MBAM features. 10. On the **Configure the Administration and Monitoring Server** page, enter the port number, host name, virtual directory name, and installation path for the Help Desk website. - **Note**   + **Note** The port number that you specify must be an unused port number on the Administration and Monitoring Server unless you specify a unique host header name. If you are using Windows Firewall, the port will be opened automatically. -   + 11. On the **Installation Summary** page, review the list of features that will be installed, and click **Install** to start installing the MBAM features. Click **Back** to move back through the wizard if you have to review or change your installation settings, or click **Cancel** to exit Setup. Setup installs the MBAM features and notifies you that the installation is complete. @@ -125,10 +125,10 @@ The following steps describe how to install general MBAM features. - Brand the Self-Service Portal with your company name, notice text, and other company-specific information. For instructions, see [How to Brand the Self-Service Portal](how-to-brand-the-self-service-portal.md). - **Note**   + **Note** Identical user or group membership of the **MBAM Report Users** local group must be maintained on all computers where the MBAM Administration and Monitoring Server features, Compliance and Audit Database, and Compliance and Audit Reports are installed. The recommended way to do this is to create a domain security group and add that domain group to each local MBAM Report Users group. When you use this process, manage the group memberships by way of the domain group. -   + ## Validating the MBAM Server feature installation @@ -137,66 +137,68 @@ When the Microsoft BitLocker Administration and Monitoring installation is compl **To validate the MBAM Server feature installation** -1. On each server where a MBAM feature is deployed, open **Control Panel**. Select **Programs**, and then select **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. +1. On each server where a MBAM feature is deployed, open **Control Panel**. Select **Programs**, and then select **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. - **Note**   - To validate the installation, you must use a domain account that has local computer administrative credentials on each server. + **Note** + To validate the installation, you must use a domain account that has local computer administrative credentials on each server. -   -2. On the server where the Recovery Database is installed, open SQL Server Management Studio, and verify that the **MBAM Recovery and Hardware** database is installed. -3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio, and verify that the **MBAM Compliance Status Database** is installed. +2. On the server where the Recovery Database is installed, open SQL Server Management Studio, and verify that the **MBAM Recovery and Hardware** database is installed. -4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative credentials and browse to the “Home” of the SQL Server Reporting Services site. +3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio, and verify that the **MBAM Compliance Status Database** is installed. - The default Home location of a SQL Server Reporting Services site instance is at http://*<NameofMBAMReportsServer>*/Reports. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances that are specified during setup. +4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative credentials and browse to the “Home” of the SQL Server Reporting Services site. - Confirm that a Reports folder named Microsoft BitLocker Administration and Monitoring contains a data source called **MaltaDataSource** and that an **en-us** folder contains four reports. + The default Home location of a SQL Server Reporting Services site instance is at http://<NameofMBAMReportsServer>/Reports. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances that are specified during setup. - **Note**   - If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following: http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* + Confirm that a Reports folder named Microsoft BitLocker Administration and Monitoring contains a data source called **MaltaDataSource** and that an **en-us** folder contains four reports. -   + **Note** + If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following: http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* - **Note**   - If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring website and select a report, the following message appears: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. -   -5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**. Select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager.** +~~~ +**Note** +If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring website and select a report, the following message appears: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. +~~~ -6. In **Connections,** browse to *<computername>*, select **Sites**, and then select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMUserSupportService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. -7. On the server where the Administration and Monitoring features and Self-Service Portal are installed, open a web browser with administrative credentials and browse to the following locations to verify that they load successfully: - - *http://<hostname>/HelpDesk/default.aspx* and confirm each of the links for navigation and reports +5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**. Select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager.** - - *http://<hostname>/SelfService>/* +6. In **Connections,** browse to *<computername>*, select **Sites**, and then select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMUserSupportService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. - - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* +7. On the server where the Administration and Monitoring features and Self-Service Portal are installed, open a web browser with administrative credentials and browse to the following locations to verify that they load successfully: - - *http://<hostname>/MBAMUserSupportService/UserSupportService.svc* + - *http://<hostname>/HelpDesk/default.aspx* and confirm each of the links for navigation and reports - - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* + - *http://<hostname>/SelfService>/* - - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* + - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* - **Note**   - It is assumed that the server features were installed on the default port without network encryption. If you installed the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example, *http://<hostname>:<port>/HelpDesk/default.asp*x or*http://<hostname>:<port>/<virtualdirectory>/default.aspx* + - *http://<hostname>/MBAMUserSupportService/UserSupportService.svc* + + - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* + + - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* + + **Note** + It is assumed that the server features were installed on the default port without network encryption. If you installed the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example, *http://<hostname>:<port>/HelpDesk/default.asp*x or*http://<hostname>:<port>/<virtualdirectory>/default.aspx* + + If the server features were installed with network encryption, change http:// to https://. - If the server features were installed with network encryption, change http:// to https://. -   ## Related topics [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md index 02dd4e43c1..f7c562da25 100644 --- a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md +++ b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md @@ -21,12 +21,12 @@ The procedures in this topic describe how to install Microsoft BitLocker Adminis Each server feature has certain prerequisites. To verify that you have met the prerequisites and hardware and software requirements, see [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md) and [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md). In addition, some features require that you provide certain information during the installation process to successfully deploy the feature. You should also review [Planning for MBAM 2.0 Server Deployment](planning-for-mbam-20-server-deployment-mbam-2.md) before you start the MBAM deployment. -**Note**   +**Note** To obtain the setup log files, you have to use the Msiexec package and the **/L** <location> option to install MBAM. Log files are created in the location that you specify. Additional setup log files are created in the %temp% folder on the server of the user who is installing MBAM. -  + ## Deploying MBAM Server Features @@ -43,10 +43,10 @@ The following steps describe how to install general MBAM features. 4. On the **Topology Selection** page, select the **Stand-alone** topology, and then click **Next**. - **Note**   + **Note** If you want to install MBAM with the Configuration Manager integrated topology, see [Deploying MBAM with Configuration Manager](deploying-mbam-with-configuration-manager-mbam2.md). -   + 5. Select the features that you want to install. By default, all MBAM features are selected for installation. Clear the features that you want to install elsewhere. Features that will be installed on the same computer must be installed together at the same time. You must install MBAM features in the following order: @@ -62,17 +62,19 @@ The following steps describe how to install general MBAM features. - MBAM Group Policy template - **Note**   + **Note** The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all of the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. If all prerequisites are met this time, the installation resumes. -   - The MBAM Setup wizard displays installation pages for the features that you select. The following sections describe the installation procedures for each feature. - **Note**   - For the following instructions, it is assumed that each feature is to be installed on a separate server. If you install multiple features on a single server, you can change or eliminate some steps. +~~~ +The MBAM Setup wizard displays installation pages for the features that you select. The following sections describe the installation procedures for each feature. + +**Note** +For the following instructions, it is assumed that each feature is to be installed on a separate server. If you install multiple features on a single server, you can change or eliminate some steps. +~~~ + -   **To install the Recovery Database** @@ -90,10 +92,10 @@ The following steps describe how to install general MBAM features. 2. Specify the computer names of the computers that will be running the Administration and Monitoring Server and the Compliance and Audit Reports. After the Administration and Monitoring and the Compliance and Audit Reports Server are deployed, they use their domain accounts to connect to the databases. - **Note**   + **Note** If you are installing the Compliance and Audit Database without the Compliance and Audit Reports feature, you must add an exception on the Compliance and Audit Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433. -   + 3. Specify the SQL Server instance name and the name of the database that will store the compliance and audit data. You must also specify where the database and log information will be located. @@ -103,10 +105,10 @@ The following steps describe how to install general MBAM features. 1. On the **Configure the Compliance and Audit Reports** page, specify the remote SQL Server instance name (for example, <ServerName>) where the Compliance and Audit Database was installed. - **Note**   + **Note** If you are installing the Compliance and Audit Reports without the Administration and Monitoring Server, you must add an exception on the Compliance and Audit Report computer to enable inbound traffic on the Reporting Server port (the default port is 80). -   + 2. Specify the name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status, although you can change the name when you install the Compliance and Audit Database. @@ -136,10 +138,10 @@ The following steps describe how to install general MBAM features. 9. Enter the **Port Number**, the **Host Name** (optional), and the **Installation Path** for the MBAM Administration and Monitoring Server. - **Note**   + **Note** The port number that you specify must be an unused port number on the Administration and Monitoring server unless you specify a unique host header name. If you are using Windows Firewall, the port will be opened automatically. -   + 10. To optionally register a Service Principal Name (SPN) for the Self-Service Portal, select **Register this machine’s Service Principal Names (SPN) with Active Directory (Required for Windows Authentication)**. If you select this check box, MBAM Setup will not try to register the existing SPNs, and you can manually register the SPN before or after the MBAM installation. For instructions on registering the SPN manually, see [Manual SPN Registration](https://go.microsoft.com/fwlink/?LinkId=286758). @@ -151,85 +153,85 @@ The following steps describe how to install general MBAM features. 14. Click **Finish** to exit the wizard. - **Note**   + **Note** To configure the Self-Service Portal after you installed it, brand the Self-Service Portal with your company name and other company-specific information, see [How to Brand the Self-Service Portal](how-to-brand-the-self-service-portal.md) for instructions. -   + 15. If the client computers have access to the Microsoft Content Delivery Network (CDN), which gives the Self-Service Portal the required access to certain JavaScript files, you are finished with the Self-Service Portal installation. If the client computers does not have access to the Microsoft CDN, complete the steps in the next section to configure the Self-Service Portal to reference the JavaScript files from an accessible source. **To configure the Self-Service Portal when end users cannot access the Microsoft Content Delivery Network** -1. If the client computers have access to the Microsoft Content Delivery Network (CDN), which gives the Self-Service Portal the required access to certain JavaScript files, the Self-Service Portal installation is completed. If the client computers do not have access to the Microsoft CDN, complete the remaining steps in this section to configure the Self-Service Portal to reference the JavaScript files from an accessible source. +1. If the client computers have access to the Microsoft Content Delivery Network (CDN), which gives the Self-Service Portal the required access to certain JavaScript files, the Self-Service Portal installation is completed. If the client computers do not have access to the Microsoft CDN, complete the remaining steps in this section to configure the Self-Service Portal to reference the JavaScript files from an accessible source. -2. Download the four JavaScript files from the Microsoft CDN: +2. Download the four JavaScript files from the Microsoft CDN: - - jQuery-1.7.2.min.js - [https://go.microsoft.com/p/fwlink/?LinkID=271736](https://go.microsoft.com/fwlink/p/?LinkID=271736) + - jQuery-1.7.2.min.js - [https://go.microsoft.com/p/fwlink/?LinkID=271736](https://go.microsoft.com/fwlink/p/?LinkID=271736) - - MicrosoftAjax.js –[https://go.microsoft.com/p/fwlink/?LinkId=272283](https://go.microsoft.com/fwlink/p/?LinkId=272283) + - MicrosoftAjax.js –[https://go.microsoft.com/p/fwlink/?LinkId=272283](https://go.microsoft.com/fwlink/p/?LinkId=272283) - - MicrosoftMvcAjax.js - [https://go.microsoft.com/p/fwlink/?LinkId=272284](https://go.microsoft.com/fwlink/p/?LinkId=272284) + - MicrosoftMvcAjax.js - [https://go.microsoft.com/p/fwlink/?LinkId=272284](https://go.microsoft.com/fwlink/p/?LinkId=272284) - - MicrosoftMvcValidation.js - + - MicrosoftMvcValidation.js - -3. Copy the JavaScript files to the **Scripts** directory of the Self-Service Portal. This directory is located in *<MBAM Self-Service Install Directory>\\*Self Service Website\\Scripts. +3. Copy the JavaScript files to the **Scripts** directory of the Self-Service Portal. This directory is located in <MBAM Self-Service Install Directory>\\Self Service Website\\Scripts. -4. Open **Internet Information Services (IIS) Manager**. +4. Open **Internet Information Services (IIS) Manager**. -5. Expand **Sites** > **Microsoft BitLocker Administration and Monitoring**, and highlight **SelfService**. +5. Expand **Sites** > **Microsoft BitLocker Administration and Monitoring**, and highlight **SelfService**. - **Note**   - *SelfService* is the default virtual directory name. If you chose a different name for this directory during installation, remember to replace *SelfService* in the rest of these instructions with the name you chose. + **Note** + *SelfService* is the default virtual directory name. If you chose a different name for this directory during installation, remember to replace *SelfService* in the rest of these instructions with the name you chose. -   -6. In the middle pane, double-click **Application Settings**. -7. For each item in the following list, edit the application settings to reference the new location by replacing <virtual directory> with /SelfService/ (or the name you chose during installation). For example, the virtual directory path will be similar to /selfservice/scripts/jquery-1.7.2.min.js. +6. In the middle pane, double-click **Application Settings**. - - jQueryPath: /<virtual directory>/Scripts/ jQuery-1.7.2.min.js +7. For each item in the following list, edit the application settings to reference the new location by replacing <virtual directory> with /SelfService/ (or the name you chose during installation). For example, the virtual directory path will be similar to /selfservice/scripts/jquery-1.7.2.min.js. - - MicrosoftAjaxPath: /<virtual directory>/Scripts/ MicrosoftAjax.js + - jQueryPath: /<virtual directory>/Scripts/ jQuery-1.7.2.min.js - - MicrosoftMvcAjaxPath: /<virtual directory>/Scripts/ MicrosoftMvcAjax.js + - MicrosoftAjaxPath: /<virtual directory>/Scripts/ MicrosoftAjax.js - - MicrosoftMvcValidationPath: /<virtual directory>/Scripts/ MicrosoftMvcValidation.js + - MicrosoftMvcAjaxPath: /<virtual directory>/Scripts/ MicrosoftMvcAjax.js + + - MicrosoftMvcValidationPath: /<virtual directory>/Scripts/ MicrosoftMvcValidation.js **To install the Administration and Monitoring Server feature** -1. MBAM can encrypt the communication between the Web Services and the Administration and Monitoring servers. If you choose the option to encrypt the communication, you are prompted to select the certification authority-provisioned certificate to use for encryption. +1. MBAM can encrypt the communication between the Web Services and the Administration and Monitoring servers. If you choose the option to encrypt the communication, you are prompted to select the certification authority-provisioned certificate to use for encryption. -2. Click **Next** to continue. +2. Click **Next** to continue. -3. Specify the remote instance of SQL Server (for example: *<ServerName>*) where the Compliance and Audit Database was installed. +3. Specify the remote instance of SQL Server (for example: *<ServerName>*) where the Compliance and Audit Database was installed. -4. Specify the name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status. However, you can change the name when you install the Compliance and Audit Database. +4. Specify the name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status. However, you can change the name when you install the Compliance and Audit Database. -5. Click **Next** to continue. +5. Click **Next** to continue. -6. Specify the remote instance of SQL Server (for example: *<ServerName>*) where the Recovery Database was installed. +6. Specify the remote instance of SQL Server (for example: *<ServerName>*) where the Recovery Database was installed. -7. Specify the name of the Recovery Database. By default, the database name is **MBAM Recovery and Hardware**. However, you can change the name when you install the Recovery Database feature. +7. Specify the name of the Recovery Database. By default, the database name is **MBAM Recovery and Hardware**. However, you can change the name when you install the Recovery Database feature. -8. Click **Next** to continue. +8. Click **Next** to continue. -9. Specify the URL for the “Home” of the SQL Server Reporting Services (SRS) site. The default Home location of a SQL Server Reporting Services site instance is at: +9. Specify the URL for the “Home” of the SQL Server Reporting Services (SRS) site. The default Home location of a SQL Server Reporting Services site instance is at: - http://*<NameofMBAMReportsServer>/*ReportServer + http://<NameofMBAMReportsServer>/ReportServer + + **Note** + If SQL Server Reporting Services was configured as a named instance, the URL resembles the following: http://*<NameofMBAMReportsServer>*/ReportServer\_*<SRSInstanceName>*. - **Note**   - If SQL Server Reporting Services was configured as a named instance, the URL resembles the following: http://*<NameofMBAMReportsServer>*/ReportServer\_*<SRSInstanceName>*. -   10. Click **Next** to continue. 11. Enter the **Port Number**, the **Host Name** (optional), and the **Installation Path** for the MBAM Administration and Monitoring Server. - **Note**   + **Note** The port number that you specify must be an unused port number on the Administration and Monitoring server unless you specify a unique host header name. If you are using Windows Firewall, the port will be opened automatically. -   + 12. To optionally register a Service Principal Name (SPN) for the Self-Service Portal, select **Register this machine’s Service Principal Names (SPN) with Active Directory (Required for Windows Authentication)**. If you select this check box, MBAM Setup will not try to register the existing SPNs, and you can manually register the SPN before or after the MBAM installation. For instructions on registering the SPN manually, see [Manual SPN Registration](https://go.microsoft.com/fwlink/?LinkId=286758). @@ -253,10 +255,10 @@ The following steps describe how to install general MBAM features. - **MBAM Report Users**: Members of this local group can access the reports on the MBAM Administration and Monitoring website. - **Note**   + **Note** Identical user or group membership of the **MBAM Report Users** local group must be maintained on all computers where the MBAM Administration and Monitoring Server features, Compliance and Audit Database, and the Compliance and Audit Reports are installed. -   + ## Validating the MBAM Server Feature Installation @@ -265,73 +267,77 @@ When Microsoft BitLocker Administration and Monitoring Server feature installati **To validate an MBAM Server installation** -1. On each server where an MBAM feature is deployed, open **Control Panel**, select **Programs**, and then select **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. +1. On each server where an MBAM feature is deployed, open **Control Panel**, select **Programs**, and then select **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. - **Note**   - To validate the MBAM installation, you must use a domain account that has local computer administrative credentials on each server. + **Note** + To validate the MBAM installation, you must use a domain account that has local computer administrative credentials on each server. -   -2. On the server where the Recovery Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. -3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance Status Database** is installed. +2. On the server where the Recovery Database is installed, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is installed. -4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative credentials and browse to the “Home” of the SQL Server Reporting Services site. +3. On the server where the Compliance and Audit Database is installed, open SQL Server Management Studio and verify that the **MBAM Compliance Status Database** is installed. - The default Home location of a SQL Server Reporting Services site instance can be found is at http://*<NameofMBAMReportsServer>*/Reports.aspx. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances that were specified during setup. +4. On the server where the Compliance and Audit Reports are installed, open a web browser with administrative credentials and browse to the “Home” of the SQL Server Reporting Services site. - Confirm that a reports folder named **Microsoft BitLocker Administration and Monitoring** contains a data source called **MaltaDataSource** and that an **en-us** folder contains four reports. + The default Home location of a SQL Server Reporting Services site instance can be found is at http://<NameofMBAMReportsServer>/Reports.aspx. To find the actual URL, use the Reporting Services Configuration Manager tool and select the instances that were specified during setup. - **Note**   - If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* + Confirm that a reports folder named **Microsoft BitLocker Administration and Monitoring** contains a data source called **MaltaDataSource** and that an **en-us** folder contains four reports. -   + **Note** + If SQL Server Reporting Services was configured as a named instance, the URL should resemble the following:http://*<NameofMBAMReportsServer>*/Reports\_*<SRSInstanceName>* - **Note**   - If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring website and select a report, the following message appears: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. -   -5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**. Select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager**. +~~~ +**Note** +If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring website and select a report, the following message appears: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. +~~~ -6. In **Connections**, browse to *<computername>*, select **Sites**, and select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. -7. On the server where the Administration and Monitoring features and Self-Service Portal are installed, open a web browser with administrative credentials and browse to the following locations to verify that they load successfully. - **Note**   - The URLs ending in “.svc” do not display a website. Success is indicated by the message “Metadata publishing for this service is currently disabled” or by information resembling code. If you see some other error message or if the page cannot be found, the page has not loaded successfully. +5. On the server where the Administration and Monitoring feature is installed, run **Server Manager** and browse to **Roles**. Select **Web Server (IIS)**, and then click **Internet Information Services (IIS) Manager**. -   +6. In **Connections**, browse to *<computername>*, select **Sites**, and select **Microsoft BitLocker Administration and Monitoring**. Verify that **MBAMAdministrationService**, **MBAMComplianceStatusService**, and **MBAMRecoveryAndHardwareService** are listed. - - *http://<hostname>/HelpDesk/default.aspx* and confirm each of the links for navigation and reports +7. On the server where the Administration and Monitoring features and Self-Service Portal are installed, open a web browser with administrative credentials and browse to the following locations to verify that they load successfully. - - *http://<hostname>/SelfService>/* + **Note** + The URLs ending in “.svc” do not display a website. Success is indicated by the message “Metadata publishing for this service is currently disabled” or by information resembling code. If you see some other error message or if the page cannot be found, the page has not loaded successfully. - - *http://<computername>/MBAMAdministrationService/AdministrationService.svc* - - *http://<hostname>/MBAMUserSupportService/UserSupportService.svc* - - *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* +~~~ +- *http://<hostname>/HelpDesk/default.aspx* and confirm each of the links for navigation and reports - - *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* +- *http://<hostname>/SelfService>/* - **Note**   - It is assumed that the server features were installed on the default port without network encryption. If you installed the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example, *http://<hostname>:<port>/HelpDesk/default.aspx* or*http://<hostname>:<port>/<virtualdirectory>/default.aspx* +- *http://<computername>/MBAMAdministrationService/AdministrationService.svc* - If the server features were installed with network encryption, change http:// to https://. +- *http://<hostname>/MBAMUserSupportService/UserSupportService.svc* -   +- *http://<computername>/MBAMComplianceStatusService/StatusReportingService.svc* -8. Verify that each webpage loads successfully. +- *http://<computername>/MBAMRecoveryAndHardwareService/CoreService.svc* + +**Note** +It is assumed that the server features were installed on the default port without network encryption. If you installed the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example, *http://<hostname>:<port>/HelpDesk/default.aspx* or*http://<hostname>:<port>/<virtualdirectory>/default.aspx* + +If the server features were installed with network encryption, change http:// to https://. +~~~ + + + +8. Verify that each webpage loads successfully. ## Related topics [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md b/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md index 2d0709c2eb..a01c49e93e 100644 --- a/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md +++ b/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md @@ -32,7 +32,7 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo `MbamSetup.exe CM_SSRS_INSTANCE_NAME=` -  + **To install MBAM on the Configuration Manager Server** @@ -43,7 +43,7 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo Additional setup log files are created in the %temp% folder on the computer of the user who is installing Configuration Manager. -   + 2. On the **Welcome** page, optionally select the **Customer Experience Improvement Program**, and then click **Start**. @@ -56,7 +56,7 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo **Note**   On the **Checking Prerequisites** page, click **Next** after the installation wizard checks the prerequisites for your installation and confirms that none are missing. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again.** -   + 6. Specify whether to use Microsoft Updates to help keep your computer secure, and then click **Next**. Using Microsoft Updates does not turn on Automatic Updates in Windows. @@ -81,7 +81,7 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo **Note**   The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all of the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. If all prerequisites are met this time, the installation resumes. -   + 6. On the **Configure the Recovery Database** page, specify the names of the computers that will be running the Administration and Monitoring Server feature. After the Administration and Monitoring Server feature is deployed, it uses its domain account to connect to the database. @@ -98,7 +98,7 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo **Note**   If you are installing the Audit Database without the Audit Reports feature, you must add an exception on the Audit Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433. -   + 12. Specify the SQL Server instance name and the name of the database that will store the audit data. You must also specify where the database and log information will be located. @@ -119,14 +119,14 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo **Note**   The installation wizard checks the prerequisites for your installation and displays the prerequisites that are missing. If all of the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. If all prerequisites are met this time, the installation resumes. -   + 6. Install the Self-Service Portal by following the steps in the **To install the Self-Service Portal** section in [How to Install and Configure MBAM on Distributed Servers](how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md). **Note**   If the client computers will not have access to the Microsoft Content Delivery Network (CDN), which gives the Self-Service Portal the required access to certain JavaScript files, complete the steps in the **To configure the Self-Service Portal when end users cannot access the Microsoft Content Delivery Network** section [How to Install and Configure MBAM on Distributed Servers](how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md) to configure the Self-Service Portal to reference the JavaScript files from an accessible source. -   + 7. Install the Administration and Monitoring Server features by following the steps in the **To install the Administration and Monitoring Server feature** section in [How to Install and Configure MBAM on Distributed Servers](how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md). @@ -139,9 +139,9 @@ If you are using a non-default SQL Server Reporting Services (SSRS) instance, yo [Deploying MBAM with Configuration Manager](deploying-mbam-with-configuration-manager-mbam2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md b/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md index 9203d81460..44d57820c6 100644 --- a/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md +++ b/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md @@ -24,7 +24,7 @@ The following steps describe how to install the MBAM Group Policy template. **Note**   Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup on 64-bit servers. -  + **To install the MBAM Group Policy template** @@ -39,7 +39,7 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o **Note**   The installation wizard checks the prerequisites for your installation and displays prerequisites that are missing. If all the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click **Check prerequisites again**. Once all prerequisites are met, the installation will resume. -   + 5. For specific steps about how and where to install the templates, see [How to Download and Deploy MDOP Group Policy (.admx) Templates](https://technet.microsoft.com/library/dn659707.aspx). @@ -50,9 +50,9 @@ Make sure that you use the 32-bit setup on 32-bit servers and the 64-bit setup o [Deploying MBAM 2.0 Group Policy Objects](deploying-mbam-20-group-policy-objects-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md b/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md index a38d2c459c..f338e9a016 100644 --- a/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md +++ b/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md @@ -24,7 +24,7 @@ To exempt users from BitLocker protection, an organization will have to create a **Note**   If the computer is already BitLocker-protected, the user exemption policy has no effect. -  + The following table shows how BitLocker protection is applied based on how exemptions are set. @@ -55,7 +55,7 @@ The following table shows how BitLocker protection is applied based on how exemp -  + **To exempt a user from BitLocker encryption** @@ -68,7 +68,7 @@ The following table shows how BitLocker protection is applied based on how exemp **Important**   Shared computer scenarios require special consideration when using user exemptions. If a non-exempt user logs on to a computer shared with an exempt user, the computer may be encrypted. -   + **To enable users to request an exemption from BitLocker encryption** @@ -79,7 +79,7 @@ The following table shows how BitLocker protection is applied based on how exemp **Note**   Selecting **Request Exemption** postpones the BitLocker protection until the maximum time that is set in the User Exemption Policy. -   + 3. If users select **Request Exemption**, they receive a notification telling them to contact your organization’s BitLocker administration group. Depending on how the Configure User Exemption Policy is configured, users are provided with one or more of the following contact methods: @@ -94,16 +94,16 @@ The following table shows how BitLocker protection is applied based on how exemp **Note**   Once a user submits an exemption request, the MBAM agent reports the user as “temporarily exempt” and then waits a configurable number of days before it checks the computer’s compliance again. If the MBAM administrator rejects the exemption request, the exemption request option is deactivated, which prevents the user from being able to request the exemption again. -   + ## Related topics [Administering MBAM 2.0 Features](administering-mbam-20-features-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md b/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md index fd175b7f06..46aeb38af7 100644 --- a/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md +++ b/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md @@ -56,10 +56,10 @@ To move the Recovery Database from one computer to another (for example, from Se `PS C:\> Stop-Website “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To run this PowerShell command line, the IIS Module for PowerShell must be added to current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable execution of scripts. -   + **Run MBAM Setup on Server B** @@ -69,7 +69,7 @@ To move the Recovery Database from one computer to another (for example, from Se `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=KeyDatabase ADMINANDMON_MACHINENAMES=$DOMAIN$\$SERVERNAME$$ RECOVERYANDHWDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ TOPOLOGY=$X$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and instance to which the Recovery Database will be moved. @@ -78,7 +78,7 @@ To move the Recovery Database from one computer to another (for example, from Se - $X$ - Enter **0** if you are installing the MBAM Stand-alone topology, or **1** if you are installing the MBAM Configuration Manager topology. -   + **Back Up the Recovery Database on Server A** @@ -132,23 +132,23 @@ To move the Recovery Database from one computer to another (for example, from Se `GO` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $PASSWORD$ - Enter a password that you will use to encrypt the Private Key file. -   + 3. Run the SQL File by using SQL Server PowerShell and a command line that is similar to the following: `PS C:\> Invoke-Sqlcmd -InputFile 'Z:\BackupMBAMRecoveryandHardwarDatabaseScript.sql' -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and instance from which the Recovery Database will be backed up. -   + **Move the Recovery Database and Certificate from Server A to Server B** @@ -164,14 +164,14 @@ To move the Recovery Database from one computer to another (for example, from Se `PS C:\> Copy-Item “Z:\SQLServerInstanceCertificateFilePrivateKey” \\$SERVERNAME$\$DESTINATIONSHARE$` - **Note**   + **Note** Replace the following value in the example above with those that match your environment: - $SERVERNAME$ - Enter the name of the server to which the files will be copied. - $DESTINATIONSHARE$ - Enter the name of the share and path to which the files will be copied. -   + **Restore the Recovery Database on Server B** @@ -221,23 +221,23 @@ To move the Recovery Database from one computer to another (for example, from Se ` WITH REPLACE` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $PASSWORD$ - Enter a password that you used to encrypt the Private Key file. -   + 5. You can use Windows PowerShell to enter a command line that is similar to the following: `PS C:\> Invoke-Sqlcmd -InputFile 'Z:\RestoreMBAMRecoveryandHardwarDatabaseScript.sql' -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the following value in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the name of the server and instance to which the Recovery Database will be restored. -   + **Configure Access to the Recovery Database on Server B** @@ -249,45 +249,47 @@ To move the Recovery Database from one computer to another (for example, from Se `PS C:\> net localgroup "MBAM Recovery and Hardware DB Access" $DOMAIN$\$SERVERNAME$$ /add` - **Note**   + **Note** Replace the following values in the example above with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain and machine name of the MBAM Administration and Monitoring Server. The server name must be followed by a $, as shown in the example (for example, MyDomain\\MyServerName1$). -   - This command line must be run for each Administration and Monitoring Server that will be accessing the database in your environment. + +~~~ +This command line must be run for each Administration and Monitoring Server that will be accessing the database in your environment. +~~~ **Update the Recovery Database Connection Data on the MBAM Administration and Monitoring Servers** -1. On each of the servers running the MBAM Administration and Monitoring feature, use the Internet Information Services (IIS) Manager console to update the Connection String information for the following applications, which are hosted in the Administration and Monitoring website: +1. On each of the servers running the MBAM Administration and Monitoring feature, use the Internet Information Services (IIS) Manager console to update the Connection String information for the following applications, which are hosted in the Administration and Monitoring website: - - MBAMAdministrationService + - MBAMAdministrationService - - MBAMRecoveryAndHardwareService + - MBAMRecoveryAndHardwareService -2. Select each application and use the **Configuration Editor** feature, which is located under the **Management** section of the **Feature View**. +2. Select each application and use the **Configuration Editor** feature, which is located under the **Management** section of the **Feature View**. -3. Select the **configurationStrings** option from the **Section list** control. +3. Select the **configurationStrings** option from the **Section list** control. -4. Select the row named **(Collection)** and open the **Collection Editor** by selecting the button on the right side of the row. +4. Select the row named **(Collection)** and open the **Collection Editor** by selecting the button on the right side of the row. -5. In the **Collection Editor**, select the row named **KeyRecoveryConnectionString** when updating the configuration for the MBAMAdministrationService application or the row named **Microsoft.Mbam.RecoveryAndHardwareDataStore.**ConnectionString when updating the configuration for the MBAMRecoveryAndHardwareService. +5. In the **Collection Editor**, select the row named **KeyRecoveryConnectionString** when updating the configuration for the MBAMAdministrationService application or the row named Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString when updating the configuration for the MBAMRecoveryAndHardwareService. -6. Update the **Data Source=** value for the **configurationStrings** property to list the server name and instance (for example, $SERVERNAME$\\$SQLINSTANCENAME$) where the Recovery Database was moved to. +6. Update the **Data Source=** value for the **configurationStrings** property to list the server name and instance (for example, $SERVERNAME$\\$SQLINSTANCENAME$) where the Recovery Database was moved to. -7. To automate this procedure, you can use Windows to enter a command line, that is similar to the following, on each Administration and Monitoring Server: +7. To automate this procedure, you can use Windows to enter a command line, that is similar to the following, on each Administration and Monitoring Server: - `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath "IIS:\sites\Microsoft Bitlocker Administration and Monitoring\MBAMAdministrationService" -Name "connectionString" -Value “Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;”` + `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath "IIS:\sites\Microsoft Bitlocker Administration and Monitoring\MBAMAdministrationService" -Name "connectionString" -Value “Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;”` - `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft Bitlocker Administration and Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;"` + `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft Bitlocker Administration and Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and Hardware;Integrated Security=SSPI;"` - **Note**   - Replace the following value in the example above with those that match your environment: + **Note** + Replace the following value in the example above with those that match your environment: + + - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Recovery Database is. - - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Recovery Database is. -   **Resume all Instances of the MBAM Administration and Monitoring Website** @@ -328,10 +330,10 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> Stop-s “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To run this command line, you must add the IIS Module for PowerShell to the current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable scripts to be run. -   + **Run MBAM Setup on Server B** @@ -341,7 +343,7 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal= ReportsDatabase ADMINANDMON_MACHINENAMES=$DOMAIN$\$SERVERNAME$ COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ REPORTS_USERACCOUNT=$DOMAIN$\$USERNAME$ TOPOLOGY=$X$` - **Note**   + **Note** Note: Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance and Audit Database will be moved to. @@ -352,7 +354,7 @@ If you want to move the MBAM Compliance and Audit Database from one computer to - $X$ - Enter **0** if you are installing the MBAM Stand-alone topology, or **1** if you are installing the MBAM Configuration Manager topology. -   + **Back Up the Compliance and Audit Database on Server A** @@ -394,12 +396,12 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> Invoke-Sqlcmd -InputFile "Z:\BackupMBAMComplianceStatusDatabaseScript.sql" –ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the following value in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance and Audit database will be backed up from. -   + **Move the Compliance and Audit Database from Server A to B** @@ -411,14 +413,14 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> Copy-Item “Z:\MBAM Compliance Status Database Data.bak” \\$SERVERNAME$\$DESTINATIONSHARE$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$ - Enter the server name where the files will be copied to. - $DESTINATIONSHARE$ - Enter the name of share and path where the files will be copied to. -   + **Restore the Compliance and Audit Database on Server B** @@ -446,12 +448,12 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> Invoke-Sqlcmd -InputFile "Z:\RestoreMBAMComplianceStatusDatabaseScript.sql" -ServerInstance $SERVERNAME$\$SQLINSTANCENAME$` - **Note**   + **Note** Replace the following value in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance and Audit Database will be restored to. -   + **Configure Access to the Compliance and Audit Database on Server B** @@ -465,16 +467,18 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> net localgroup "MBAM Compliance Auditing DB Access" $DOMAIN$\$REPORTSUSERNAME$ /add` - **Note**   + **Note** Replace the following values in the example above with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain and machine name of the MBAM Administration and Monitoring Server. The server name must be followed by a “$” as shown in the example. (for example, MyDomain\\MyServerName1$) - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit Reports. -   - The command line for adding the servers to the MBAM Compliance and Audit Database access local group must be run for each Administration and Monitoring Server that will be accessing the database in your environment. + +~~~ +The command line for adding the servers to the MBAM Compliance and Audit Database access local group must be run for each Administration and Monitoring Server that will be accessing the database in your environment. +~~~ **Update the Database Connection Data on MBAM Administration and Monitoring Servers** @@ -500,12 +504,12 @@ If you want to move the MBAM Compliance and Audit Database from one computer to `PS C:\> Set-WebConfigurationProperty '/connectionStrings/add[@name="Microsoft.Windows.Mdop.BitLockerManagement.StatusReportDataStore.ConnectionString"]' -PSPath "IIS:\sites\Microsoft Bitlocker Administration and Monitoring\MBAMComplianceStatusService" -Name "connectionString" -Value "Data Source=$SERVERNAME$\$SQLINSTANCENAME;Initial Catalog=MBAM Compliance Status;Integrated Security=SSPI;"` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Recovery Database is located. -   + **Resume All Instances of the MBAM Administration and Monitoring Website** @@ -538,7 +542,7 @@ If you want to move the MBAM Compliance and Audit Reports from one computer to a `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=Reports COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ REPORTS_USERACCOUNTPW=$PASSWORD$ TOPOLOGY=$X$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - Enter the server name and instance where the Compliance and Audit Database is located. @@ -549,7 +553,7 @@ If you want to move the MBAM Compliance and Audit Reports from one computer to a - $X$ - Enter **0** if you are installing the MBAM Stand-alone topology, or **1** if you are installing the MBAM Configuration Manager topology. -   + **Configure Access to the Compliance and Audit Reports on Server B** @@ -559,14 +563,16 @@ If you want to move the MBAM Compliance and Audit Reports from one computer to a `PS C:\> net localgroup "MBAM Report Users" $DOMAIN$\$REPORTSUSERNAME$ /add` - **Note**   + **Note** Replace the following values in the example above with the applicable values for your environment: - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit reports. -   - The command line for adding the users to the MBAM Report Users local group must be run for each user that will be accessing the reports in your environment. + +~~~ +The command line for adding the users to the MBAM Report Users local group must be run for each user that will be accessing the reports in your environment. +~~~ **Stop All Instances of the MBAM Administration and Monitoring Website** @@ -578,30 +584,30 @@ If you want to move the MBAM Compliance and Audit Reports from one computer to a **Update the Database Connection Data on the MBAM Administration and Monitoring Servers** -1. On each server that is running the MBAM Administration and Monitoring Server feature, use the Internet Information Services (IIS) Manager console to update the Compliance and Audit Reports URL. +1. On each server that is running the MBAM Administration and Monitoring Server feature, use the Internet Information Services (IIS) Manager console to update the Compliance and Audit Reports URL. -2. Select the **Microsoft BitLocker Administration and Monitoring** website, and use the **Configuration Editor** feature that is location under the **Management** section of the **Feature View**. +2. Select the **Microsoft BitLocker Administration and Monitoring** website, and use the **Configuration Editor** feature that is location under the **Management** section of the **Feature View**. -3. Select the **appSettings** option from the **Section list** control. +3. Select the **appSettings** option from the **Section list** control. -4. Select the row named **(Collection)** and open the **Collection Editor** by selecting the button on the right side of the row. +4. Select the row named **(Collection)** and open the **Collection Editor** by selecting the button on the right side of the row. -5. In the **Collection Editor**, select the row named **Microsoft.Mbam.Reports.Url**. +5. In the **Collection Editor**, select the row named **Microsoft.Mbam.Reports.Url**. -6. Update the value for **Microsoft.Mbam.Reports.Url** to reflect the server name for Server B. If the Compliance and Audit Reports feature was installed on a named SQL Reporting Services instance, be sure to add or update the name of the instance to the URL (for example, http://$SERVERNAME$/ReportServer\_$SQLSRSINSTANCENAME$/Pages....) +6. Update the value for **Microsoft.Mbam.Reports.Url** to reflect the server name for Server B. If the Compliance and Audit Reports feature was installed on a named SQL Reporting Services instance, be sure to add or update the name of the instance to the URL (for example, http://$SERVERNAME$/ReportServer\_$SQLSRSINSTANCENAME$/Pages....) -7. To automate this procedure, you can use Windows PowerShell to enter a command line on each Administration and Monitoring Server that is similar to the following: +7. To automate this procedure, you can use Windows PowerShell to enter a command line on each Administration and Monitoring Server that is similar to the following: - `PS C:\> Set-WebConfigurationProperty '/appSettings/add[@key="Microsoft.Mbam.Reports.Url"]' -PSPath "IIS:\ \sites\Microsoft Bitlocker Administration and Monitoring\HelpDesk" -Name "Value" -Value “http://$SERVERNAME$/ReportServer_$SRSINSTANCENAME$/Pages/ReportViewer.aspx?/ Microsoft+BitLocker+Administration+and+Monitoring/”` + `PS C:\> Set-WebConfigurationProperty '/appSettings/add[@key="Microsoft.Mbam.Reports.Url"]' -PSPath "IIS:\ \sites\Microsoft Bitlocker Administration and Monitoring\HelpDesk" -Name "Value" -Value “http://$SERVERNAME$/ReportServer_$SRSINSTANCENAME$/Pages/ReportViewer.aspx?/ Microsoft+BitLocker+Administration+and+Monitoring/”` - **Note**   - Replace the following values in the example above with those that match your environment: + **Note** + Replace the following values in the example above with those that match your environment: - - $SERVERNAME$ - Enter the name of the server name to which the Compliance and Audit Reports were installed. + - $SERVERNAME$ - Enter the name of the server name to which the Compliance and Audit Reports were installed. + + - $SRSINSTANCENAME$ - Enter the name of the SQL Reporting Services instance to which the Compliance and Audit Reports were installed. - - $SRSINSTANCENAME$ - Enter the name of the SQL Reporting Services instance to which the Compliance and Audit Reports were installed. -   **Resume All Instances of the MBAM Administration and Monitoring Website** @@ -611,10 +617,10 @@ If you want to move the MBAM Compliance and Audit Reports from one computer to a `PS C:\> Start-Website “Microsoft BitLocker Administration and Monitoring”` - **Note**   + **Note** To run this command line, you must add the IIS Module for PowerShell to current instance of PowerShell. In addition, you must update the PowerShell execution policy to enable scripts to be run. -   + ## Moving the Administration and Monitoring Feature @@ -633,7 +639,7 @@ If you want to move the MBAM Administration and Monitoring Reports feature from `PS C:\> MbamSetup.exe /qn I_ACCEPT_ENDUSER_LICENSE_AGREEMENT=1 AddLocal=AdministrationMonitoringServer, COMPLIDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ RECOVERYANDHWDB_SQLINSTANCE=$SERVERNAME$\$SQLINSTANCENAME$ SRS_REPORTSITEURL=$REPORTSSERVERURL$ TOPOLOGY=$X$` - **Note**   + **Note** Replace the following values in the example above with those that match your environment: - $SERVERNAME$\\$SQLINSTANCENAME$ - For the COMPLIDB\_SQLINSTANCE parameter, enter the server name and instance where the Compliance and Audit Database is located. For the RECOVERYANDHWDB\_SQLINSTANCE parameter, enter the server name and instance where the Recovery Database is located. @@ -644,7 +650,7 @@ If you want to move the MBAM Administration and Monitoring Reports feature from - $X$ - Enter **0** if you are installing the MBAM Stand-alone topology, or **1** if you are installing the MBAM Configuration Manager topology. -   + **Configure Access to the Databases** @@ -658,25 +664,27 @@ If you want to move the MBAM Administration and Monitoring Reports feature from `PS C:\> net localgroup "MBAM Recovery and Hardware DB Access" $DOMAIN$\$SERVERNAME$$ /add` - **Note**   + **Note** Replace the following value in the example above with the applicable values for your environment: - $DOMAIN$\\$SERVERNAME$$ - Enter the domain and machine name of the Administration and Monitoring Server. The server name must be followed by a “$” symbol, as shown in the example (for example, MyDomain\\MyServerName1$). - $DOMAIN$\\$REPORTSUSERNAME$ - Enter the user account name that was used to configure the data source for the Compliance and Audit Reports. -   - The command lines that are listed for adding server computer accounts to the MBAM local groups must be run for each Administration and Monitoring Server that will be accessing the databases in your environment. + +~~~ +The command lines that are listed for adding server computer accounts to the MBAM local groups must be run for each Administration and Monitoring Server that will be accessing the databases in your environment. +~~~ ## Related topics [Maintaining MBAM 2.0](maintaining-mbam-20-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md index 370270774b..dd4da603f5 100644 --- a/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md +++ b/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md @@ -22,7 +22,7 @@ To recover a corrupted drive protected by BitLocker, a Microsoft BitLocker Admin **Important**   To avoid a potential loss of data, it is strongly recommended that you read the “repair-bde” help and clearly understand how to use the command before completing the following instructions. -  + **To recover a corrupted drive** @@ -33,7 +33,7 @@ To avoid a potential loss of data, it is strongly recommended that you read the **Note**   If you are a member of the Help Desk Administrators role, you do not have to enter the user’s domain name or user name. -   + 3. Click **Submit**. The recovery key will be displayed. @@ -50,16 +50,16 @@ To avoid a potential loss of data, it is strongly recommended that you read the **Note**   Replace <fixed drive> with an available hard disk drive that has free space equal to or larger than the data on the corrupted drive. Data on the corrupted drive is recovered and moved to the specified hard disk drive. -   + ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md index c9a8cc7739..433c97297f 100644 --- a/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md +++ b/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md @@ -21,10 +21,10 @@ The encrypted drive recovery features of Microsoft BitLocker Administration and Use this procedure to access the centralized key recovery data system, which can provide a recovery password if a recovery password ID and associated user identifier are supplied. -**Important**   +**Important** Microsoft BitLocker Administration and Monitoring uses single-use recovery keys that expire upon use. The single use of a recovery password is automatically applied to operating system drives and fixed drives. On removable drives, it is applied when the drive is removed and then re-inserted and unlocked on a computer that has Group Policy settings activated to manage removable drives. -  + **To recover a drive in recovery mode** @@ -36,38 +36,40 @@ Microsoft BitLocker Administration and Monitoring uses single-use recovery keys 4. Select one of the predefined options from the **Reason for Drive Unlock** list, and then click **Submit**. - **Note**   + **Note** If you are an MBAM Advanced Helpdesk user, the user domain and user ID entries are not required. -   - MBAM returns the following: - - An error message if no matching recovery password is found +~~~ +MBAM returns the following: - - Multiple possible matches if the user has multiple matching recovery passwords +- An error message if no matching recovery password is found - - The recovery password and recovery package for the submitted user +- Multiple possible matches if the user has multiple matching recovery passwords - **Note**   - If you are recovering a damaged drive, the recovery package option provides BitLocker with critical information that it needs to recover the drive. +- The recovery password and recovery package for the submitted user -   + **Note** + If you are recovering a damaged drive, the recovery package option provides BitLocker with critical information that it needs to recover the drive. - After the recovery password and recovery package are retrieved, the recovery password is displayed. -5. To copy the password, click **Copy Key**, and then paste the recovery password into an email message. Alternatively, click **Save** to save the recovery password to a file. - When the user types the recovery password into the system or uses the recovery package, the drive is unlocked. +After the recovery password and recovery package are retrieved, the recovery password is displayed. +~~~ + +5. To copy the password, click **Copy Key**, and then paste the recovery password into an email message. Alternatively, click **Save** to save the recovery password to a file. + + When the user types the recovery password into the system or uses the recovery package, the drive is unlocked. ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md index 951c908edb..c562f3e90c 100644 --- a/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md +++ b/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md @@ -28,7 +28,7 @@ When you move an operating system drive that is encrypted by using Microsoft Bit **Note**   In some cases, you may be able to click **I forgot the PIN** during the startup process, and then enter the recovery mode to display the recovery key ID. -   + 3. Use the recovery key ID to retrieve the recovery password and unlock the drive from the Administration and Monitoring website. @@ -41,9 +41,9 @@ When you move an operating system drive that is encrypted by using Microsoft Bit [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md b/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md index 1595ce6c1d..9736d6ac88 100644 --- a/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md +++ b/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md @@ -39,30 +39,32 @@ You can reset a TPM lockout only if MBAM owns the TPM. - The TPM owner password file for the submitted computer - **Note**   + **Note** If you are an Advanced Helpdesk user, the user domain and user ID fields are not required. -   - After the TPM owner password is retrieved, the owner password is displayed. -5. To save the password to a .tpm file, click the **Save** button. +~~~ +After the TPM owner password is retrieved, the owner password is displayed. +~~~ - The user will run the TPM management console, select the **Reset TPM lockout** option, and provide the TPM owner password file to reset the TPM lockout. +5. To save the password to a .tpm file, click the **Save** button. + + The user will run the TPM management console, select the **Reset TPM lockout** option, and provide the TPM owner password file to reset the TPM lockout. + + **Important** + Help Desk administrators should not give the TPM hash value or TPM owner password file to end users. The TPM information does not change, so it could pose a security risk if the file is given to end users. - **Important**   - Help Desk administrators should not give the TPM hash value or TPM owner password file to end users. The TPM information does not change, so it could pose a security risk if the file is given to end users. -   ## Related topics [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md index 337692a455..e9c34d8cd9 100644 --- a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md +++ b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md @@ -91,7 +91,7 @@ The following table describes the command line parameters for deploying the MBAM

          REPORTS_USERACCOUNT

          -

          [UserDomain]\[UserName1]

          +

          [UserDomain][UserName1]

          Domain and user account of the Reporting Services service account that will access the Compliance and Audit database

          @@ -127,7 +127,7 @@ The following table describes the command line parameters for deploying the MBAM -  + ## Command Line for Deploying the MBAM 2.0 Server with the Configuration Manager Topology @@ -181,7 +181,7 @@ The following table describes the command line parameters for installing the MBA

          REPORTS_USERACCOUNT

          -

          [UserDomain]\[UserName1]

          +

          [UserDomain][UserName1]

          Domain and user account of the Reporting Services service account that will access the Compliance and Audit database

          @@ -202,16 +202,16 @@ The following table describes the command line parameters for installing the MBA -  + ## Related topics [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-use-the-help-desk-portal.md b/mdop/mbam-v2/how-to-use-the-help-desk-portal.md index 694173f657..285a8e790c 100644 --- a/mdop/mbam-v2/how-to-use-the-help-desk-portal.md +++ b/mdop/mbam-v2/how-to-use-the-help-desk-portal.md @@ -60,7 +60,7 @@ You can use the Administration and Monitoring website for many administrative ta **Note**   To access the various features offered by the Administration and Monitoring website, you must have the appropriate roles associated with your user account. For more information about understanding user roles, see [How to Manage MBAM Administrator Roles](how-to-manage-mbam-administrator-roles-mbam-2.md). -  + Use the following links to find information about the tasks that you can perform by using the Administration and Monitoring website: @@ -74,9 +74,9 @@ Use the following links to find information about the tasks that you can perform - [How to Determine BitLocker Encryption State of Lost Computers](how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md b/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md index 6d68b544c4..298322fa61 100644 --- a/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md +++ b/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md @@ -22,12 +22,12 @@ If end users get locked out of Windows by BitLocker because they forgot their pa **Note**   If the IT administrator configured an IIS Session State time-out, a message is displayed 60 seconds prior to the time-out. -  + **Note**   These instructions are written for and from the perspective of end users. -  + **To use the Self-Service Portal to regain access to a computer** @@ -36,7 +36,7 @@ These instructions are written for and from the perspective of end users. **Note**   If the first eight digits match multiple keys, a message displays that requires you to enter all 32 digits of the recovery key ID. -   + 2. In the **Reason** field, select a reason for your request for the recovery key. @@ -49,9 +49,9 @@ These instructions are written for and from the perspective of end users. [Performing BitLocker Management with MBAM](performing-bitlocker-management-with-mbam-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md b/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md index 8f7656f687..06bda1be6f 100644 --- a/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md +++ b/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md @@ -26,7 +26,7 @@ After installing Microsoft BitLocker Administration and Monitoring (MBAM) with C **Note**   To validate the installation, you must use a domain account that has local computer administrative credentials on each server. -   + 2. Use the Configuration Manager console to confirm that a new collection, called “MBAM Supported Computers,” is displayed. @@ -69,9 +69,9 @@ After installing Microsoft BitLocker Administration and Monitoring (MBAM) with C [Deploying MBAM with Configuration Manager](deploying-mbam-with-configuration-manager-mbam2.md) -  + -  + diff --git a/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md b/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md index eb078a1757..a4c029a574 100644 --- a/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md +++ b/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 This checklist can be used to help you during Microsoft BitLocker Administration and Monitoring (MBAM) deployment with a Stand-alone topology. -**Note**   +**Note** This checklist outlines the recommended steps and a high-level list of items to consider when deploying Microsoft BitLocker Administration and Monitoring features. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,13 +43,13 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + @@ -64,46 +64,45 @@ This checklist outlines the recommended steps and a high-level list of items to
        • MBAM Group Policy template

        • -Note   -

          Keep track of the names of the servers each feature is installed on. This information will be used throughout the installation process.

          +Note

          Keep track of the names of the servers each feature is installed on. This information will be used throughout the installation process.

          -  +
          - + - - + + - + - +
          Checklist box

          Complete the planning phase to prepare the computing environment for MBAM deployment.

          [MBAM 2.0 Planning Checklist](mbam-20-planning-checklist-mbam-2.md)

          MBAM 2.0 Planning Checklist

          Checklist box

          Review the MBAM supported configurations information to make sure selected client and server computers are supported for MBAM feature installation.

          [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md)

          MBAM 2.0 Supported Configurations

          [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md)

          Deploying the MBAM 2.0 Server Infrastructure

          Checklist box

          Add Active Directory Domain Services security groups created during the planning phase to the appropriate local MBAM Server feature administrators groups on appropriate servers.

          [Planning for MBAM 2.0 Administrator Roles](planning-for-mbam-20-administrator-roles-mbam-2.md) and [How to Manage MBAM Administrator Roles](how-to-manage-mbam-administrator-roles-mbam-2.md)

          Add Active Directory Domain Services security groups created during the planning phase to the appropriate local MBAM Server feature administrators groups on appropriate servers.

          Planning for MBAM 2.0 Administrator Roles and How to Manage MBAM Administrator Roles

          Checklist box

          Create and deploy required MBAM Group Policy Objects.

          [Deploying MBAM 2.0 Group Policy Objects](deploying-mbam-20-group-policy-objects-mbam-2.md)

          Deploying MBAM 2.0 Group Policy Objects

          Checklist box

          Deploy the MBAM Client software.

          [Deploying the MBAM 2.0 Client](deploying-the-mbam-20-client-mbam-2.md)

          Deploying the MBAM 2.0 Client

          -  + ## Related topics [Deploying MBAM 2.0](deploying-mbam-20-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md b/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md index 0e457777cb..2dab81a1ef 100644 --- a/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md +++ b/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md @@ -91,12 +91,12 @@ Each of the MBAM Server features has specific prerequisites that must be met bef -  -**Note**   + +**Note** For a list of supported operating systems, see [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md). -  + ### Prerequisites for the Compliance and Audit Reports @@ -114,7 +114,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

          Supported version of SQL Server

          -

          See [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) for supported versions.

          +

          See MBAM 2.0 Supported Configurations for supported versions.

          Install SQL Server with:

          • SQL_Latin1_General_CP1_CI_AS collation

          • @@ -136,7 +136,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration -  + ### Prerequisites for the Recovery Database @@ -154,7 +154,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

            Supported version of SQL Server

            -

            See [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) for supported versions.

            +

            See MBAM 2.0 Supported Configurations for supported versions.

            Install SQL Server with:

            • SQL_Latin1_General_CP1_CI_AS collation

            • @@ -179,20 +179,19 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

              Optional - Install Transparent Data Encryption (TDE) feature available in SQL Server

              -

              The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with many laws, regulations, and guidelines established in various industries.

              +

              The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with many laws, regulations, and guidelines established in various industries.

              -Note   -

              TDE performs real-time decryption of database information, which means that, if the account under which you are logged on has permissions to the database while you are viewing the recovery key information in the SQL Server tables, the recovery key information is visible.

              +Note

              TDE performs real-time decryption of database information, which means that, if the account under which you are logged on has permissions to the database while you are viewing the recovery key information in the SQL Server tables, the recovery key information is visible.

              -  +
              -

              More about TDE: [MBAM 2.0 Security Considerations](mbam-20-security-considerations-mbam-2.md).

              +

              More about TDE: MBAM 2.0 Security Considerations.

              -  + ### Prerequisites for the Compliance and Audit Database @@ -210,7 +209,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

              Supported version of SQL Server

              -

              See [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) for supported versions.

              +

              See MBAM 2.0 Supported Configurations for supported versions.

              Install SQL Server with:

              • SQL_Latin1_General_CP1_CI_AS collation

              • @@ -235,15 +234,14 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

                Optional - Install Transparent Data Encryption (TDE) feature in SQL Server.

                -

                The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with many laws, regulations, and guidelines established in various industries.

                +

                The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with many laws, regulations, and guidelines established in various industries.

                -Note   -

                TDE performs real-time decryption of database information, which means that, if the account under which you are logged on has permissions to the database while you are viewing the recovery key information in the SQL Server tables, the recovery key information is visible.

                +Note

                TDE performs real-time decryption of database information, which means that, if the account under which you are logged on has permissions to the database while you are viewing the recovery key information in the SQL Server tables, the recovery key information is visible.

                -  +
                -

                More about TDE: [MBAM 2.0 Security Considerations](mbam-20-security-considerations-mbam-2.md)

                +

                More about TDE: MBAM 2.0 Security Considerations

                SQL Server must have Database Engine Services installed and running during MBAM Server installation.

                @@ -256,7 +254,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration -  + ### Prerequisites for the Self-Service Portal @@ -274,12 +272,12 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

                Supported version of Windows Server

                -

                See [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) for supported versions.

                +

                See MBAM 2.0 Supported Configurations for supported versions.

                ASP.NET MVC 2.0

                -

                [ASP.NET MVC 2 download](https://go.microsoft.com/fwlink/?LinkId=392270)

                +

                ASP.NET MVC 2 download

                Web Service IIS Management Tools

                @@ -288,7 +286,7 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration -  + ## Prerequisites for MBAM Clients @@ -314,24 +312,23 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration

                For more information, see the BIOS documentation.

                -

                Windows 8 clients only: To have MBAM store and manage the TPM recovery keys: TPM auto-provisioning must be turned off, and MBAM must be set as the owner of the TPM before you deploy MBAM. To turn off TPM auto-provisioning, see [Disable-TpmAutoProvisioning](https://go.microsoft.com/fwlink/?LinkId=286468).

                +

                Windows 8 clients only: To have MBAM store and manage the TPM recovery keys: TPM auto-provisioning must be turned off, and MBAM must be set as the owner of the TPM before you deploy MBAM. To turn off TPM auto-provisioning, see Disable-TpmAutoProvisioning.

                • TPM auto-provisioning must be turned off.

                • MBAM must be set as the owner of the TPM before you deploy MBAM.

                -

                To turn off TPM auto-provisioning, see [Disable-TpmAutoProvisioning](https://go.microsoft.com/fwlink/?LinkId=286468).

                +

                To turn off TPM auto-provisioning, see Disable-TpmAutoProvisioning.

                -Note   -

                Ensure that the keyboard, video, or mouse are directly connected and not managed through a keyboard, video, or mouse (KVM) switch. A KVM switch can interfere with the ability of the computer to detect the physical presence of hardware.

                +Note

                Ensure that the keyboard, video, or mouse are directly connected and not managed through a keyboard, video, or mouse (KVM) switch. A KVM switch can interfere with the ability of the computer to detect the physical presence of hardware.

                -  +
                -  + ## Related topics @@ -340,9 +337,9 @@ For a list of supported operating systems, see [MBAM 2.0 Supported Configuration [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md b/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md index 1a670e44b9..00ef5df75b 100644 --- a/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md +++ b/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md @@ -22,7 +22,7 @@ This checklist can be used to help you plan for preparing your computing environ **Note**   This checklist outlines the recommended steps and a high-level list of items to consider when planning for an Microsoft BitLocker Administration and Monitoring deployment. It is recommended that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,64 +43,64 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - + - + - + - + - + - +
                Checklist box

                Review the getting started information about MBAM to gain a basic understanding of the product before beginning deployment planning.

                [Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md)

                Getting Started with MBAM 2.0

                Checklist box

                Plan for MBAM 2.0 Deployment Prerequisites and prepare your computing environment.

                [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md)

                MBAM 2.0 Deployment Prerequisites

                Checklist box

                Plan for and configure MBAM Group Policy requirements.

                [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md)

                Planning for MBAM 2.0 Group Policy Requirements

                Checklist box

                Plan for and create necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

                [Planning for MBAM 2.0 Administrator Roles](planning-for-mbam-20-administrator-roles-mbam-2.md)

                Planning for MBAM 2.0 Administrator Roles

                Checklist box

                Review the MBAM 2.0 Supported Configurations documentation to ensure that hardware that meets MBAM installation system requirements is available.

                [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md)

                MBAM 2.0 Supported Configurations

                Checklist box

                Plan for deploying MBAM Server feature deployment.

                [Planning for MBAM 2.0 Server Deployment](planning-for-mbam-20-server-deployment-mbam-2.md)

                Planning for MBAM 2.0 Server Deployment

                Checklist box

                Plan for deploying MBAM Client deployment.

                [Planning for MBAM 2.0 Client Deployment](planning-for-mbam-20-client-deployment-mbam-2.md)

                Planning for MBAM 2.0 Client Deployment

                Checklist box

                Validate your deployment plan in a test environment.

                [Evaluating MBAM 2.0](evaluating-mbam-20-mbam-2.md)

                Evaluating MBAM 2.0

                -  + ## Related topics [Planning for MBAM 2.0](planning-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md b/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md index f9bdf7fc33..72c655763d 100644 --- a/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md +++ b/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md @@ -82,7 +82,7 @@ No Active Directory groups are created automatically during the MBAM setup proce -  + ### MBAM Server Local Groups @@ -127,7 +127,7 @@ MBAM Setup creates local groups to support MBAM operations. You should add the A -  + ### SSRS Reports Service Account @@ -138,7 +138,7 @@ When you configure the SSRS Reports service account, specify a domain user accou **Note**   If you change the name of the service account after you deploy MBAM, you must reconfigure the reporting data source to use the new service account credentials. Otherwise, you will not be able to access the Help Desk Portal. -  + ## MBAM Log Files @@ -147,7 +147,7 @@ The following MBAM Setup log files are created in the installing user’s %temp% **MBAM Server Setup log files** -MSI*<five random characters>*.log +MSI<five random characters>.log Logs the actions taken during MBAM Setup and MBAM Server Feature installation. InstallComplianceDatabase.log @@ -171,11 +171,11 @@ Logs actions taken to authorize web services to the MBAM Recovery database for k **Note**   In order to obtain additional MBAM Setup log files, you have to install MBAM by using the msiexec package and the /L <location> option. Log files are created in the location specified. -  + **MBAM Client Setup log files** -MSI*<five random characters>*.log +MSI<five random characters>.log Logs the actions taken during MBAM Client installation. ## MBAM Database TDE Considerations @@ -196,9 +196,9 @@ For more information about TDE in SQL Server 2008, see [SQL Server Encryption]( [Security and Privacy for MBAM 2.0](security-and-privacy-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md b/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md index b484bc23e5..403a3d2d2a 100644 --- a/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md +++ b/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md @@ -26,7 +26,7 @@ The recommended configuration for running MBAM in a production environment is wi **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + ## MBAM Server System Requirements @@ -66,12 +66,12 @@ The following table lists the operating systems that are supported for the Micro -  + **Note**   There is no support for installing MBAM services, reports, or databases on a domain controller computer. -  + ### Server Processor, RAM, and Disk Space Requirements @@ -107,7 +107,7 @@ There is no support for installing MBAM services, reports, or databases on a dom -  + ### SQL Server Database Requirements @@ -116,7 +116,7 @@ The following table lists the SQL Server versions that are supported for the Ad **Note**   MBAM does not natively support SQL clustering, mirroring, or Availability Groups. To install the databases, you must run the MBAM Server installation on a stand-alone SQL server. -  + @@ -149,7 +149,7 @@ MBAM does not natively support SQL clustering, mirroring, or Availability Groups
                -  + @@ -183,7 +183,7 @@ MBAM does not natively support SQL clustering, mirroring, or Availability Groups
                -  + ## MBAM Client System Requirements @@ -229,7 +229,7 @@ The following table lists the operating systems that are supported for Microsoft -  + ### Client RAM Requirements @@ -283,7 +283,7 @@ The following table lists the operating systems that are supported for Microsoft -  + ## Related topics @@ -292,9 +292,9 @@ The following table lists the operating systems that are supported for Microsoft [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md index 54b3558d20..129b9e694f 100644 --- a/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md +++ b/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md @@ -37,16 +37,16 @@ Administrators in this role have increased access to the Help Desk features from **Important**   To view reports, an administrative user must be a member of the **MBAM Report Users** security group on the Administration and Monitoring Server, Compliance and Audit Database, and on the server that hosts the Compliance and Audit Reports feature. As a best practice, create a security group in Active Directory Domain Services with rights on the local **MBAM Report Users** security group on both the Administration and Monitoring Server and the server that hosts the Compliance and Audit Reports. -  + ## Related topics [Preparing your Environment for MBAM 2.0](preparing-your-environment-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md index eb40181301..b2f00742d9 100644 --- a/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md +++ b/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md @@ -26,7 +26,7 @@ If you deploy MBAM with the Configuration Manager topology, you can use Configur **Note**   Windows To Go is not supported for integrated Configuration Manager installations of MBAM if you are using Configuration Manager 2007. -  + ## Deploying the MBAM Client to Enable BitLocker Encryption After Computer Distribution to End Users @@ -38,7 +38,7 @@ When you deploy the MBAM Client after you distribute computers to client compute **Note**   In this approach, users who have computers with a TPM chip are prompted to activate and initialize the TPM chip if the chip has not been previously activated. -  + ## Using the MBAM Client to Enable BitLocker Encryption Before Computer Distribution to End Users @@ -50,7 +50,7 @@ If your organization wants to use the TPM chip to encrypt computers, the adminis **Note**   The TPM protector option requires the administrator to accept the BIOS prompt to activate and initialize the TPM before the computer is delivered to the user. -  + ## Related topics @@ -59,9 +59,9 @@ The TPM protector option requires the administrator to accept the BIOS prompt to [Deploying the MBAM 2.0 Client](deploying-the-mbam-20-client-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md index 4538b445d7..cb5cb89526 100644 --- a/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md +++ b/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md @@ -25,10 +25,10 @@ MBAM supports the following types of BitLocker protectors for fixed data drives: The numeric password protector is applied automatically as part of volume encryption and does not need to be configured. -**Important**   +**Important** The default Windows BitLocker drive encryption Group Policy Object (GPO) settings are not used by MBAM and can cause conflicting behavior if they are enabled. To enable MBAM to manage BitLocker, you must define the MBAM Group Policy settings only after installing the MBAM Group Policy template. -  + Enhanced startup PINs can contain characters, such as uppercase and lowercase letters, and numbers. Unlike BitLocker, MBAM does not support the use of symbols and spaces for enhanced PINs. @@ -36,10 +36,10 @@ Install the MBAM Group Policy template on a computer that is capable of running The MDOP MBAM (BitLocker Management) GPO node contains four global policy settings and four child GPO settings nodes: Client Management, Fixed Drive, Operating System Drive, and Removable Drive. The following sections provide policy definitions and suggested policy settings to assist you in planning for MBAM GPO policy setting requirements. -**Note**   +**Note** For more information about configuring the minimum, recommended GPO settings to enable MBAM to manage BitLocker encryption, see [How to Edit MBAM 2.0 GPO Settings](how-to-edit-mbam-20-gpo-settings-mbam-2.md). -  + ## Global Policy Definitions @@ -86,7 +86,7 @@ This section describes MBAM Global policy definitions found at the following GPO -  + ## Client Management Policy Definitions @@ -121,14 +121,13 @@ This section describes Client Management policy definitions for Microsoft BitLoc

                Configure user exemption policy

                Suggested Configuration: Not Configured

                This policy setting lets you configure a web site address, email address, or phone number that will instruct a user to request an exemption from BitLocker encryption.

                -

                If you enable this policy setting and provide a web site address, email address, or phone number, users will see a dialog that gives them instructions on how to apply for an exemption from BitLocker protection. For more information about enabling BitLocker encryption exemptions for users, see [How to Manage User BitLocker Encryption Exemptions](how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md).

                +

                If you enable this policy setting and provide a web site address, email address, or phone number, users will see a dialog that gives them instructions on how to apply for an exemption from BitLocker protection. For more information about enabling BitLocker encryption exemptions for users, see How to Manage User BitLocker Encryption Exemptions.

                If you either disable or do not configure this policy setting, the exemption request instructions will not be presented to users.

                -Note   -

                User exemption is managed per user, not per computer. If multiple users log on to the same computer and any one user is not exempt, the computer will be encrypted.

                +Note

                User exemption is managed per user, not per computer. If multiple users log on to the same computer and any one user is not exempt, the computer will be encrypted.

                -  +
                @@ -141,7 +140,7 @@ This section describes Client Management policy definitions for Microsoft BitLoc -  + ## Fixed Drive Policy Definitions @@ -205,7 +204,7 @@ This section describes Fixed Drive policy definitions for Microsoft BitLocker Ad -  + ## Operating System Drive Policy Definitions @@ -233,7 +232,7 @@ This section describes Operating System Drive policy definitions for Microsoft B
              • Allow Standby States (S1-S3) When Sleeping (Plugged In)

              • Allow Standby States (S1-S3) When Sleeping (On Battery)

              -

              If you are running Microsoft Windows 8 or later, and you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode, a password is required for startup. If you forget the password, you have to use one of the BitLocker recovery options to access the drive.

              +

              If you are running Microsoft Windows 8 or later, and you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode, a password is required for startup. If you forget the password, you have to use one of the BitLocker recovery options to access the drive.

              On a computer with a compatible TPM, two types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require the entry of a personal identification number (PIN).

              If you enable this policy setting, users have to put the operating system drive under BitLocker protection, and the drive will be encrypted.

              If you disable this policy, users will not be able to put the operating system drive under BitLocker protection. If you apply this policy after the operating system drive is encrypted, the drive will be decrypted.

              @@ -255,7 +254,7 @@ This section describes Operating System Drive policy definitions for Microsoft B -  + ## Removable Drive Policy Definitions @@ -312,16 +311,16 @@ This section describes Removable Drive Policy definitions for Microsoft BitLocke -  + ## Related topics [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md) -  - -  + + + diff --git a/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md index e45a843ab5..65b9bccf65 100644 --- a/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md +++ b/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md @@ -22,7 +22,7 @@ The Microsoft BitLocker Administration and Monitoring (MBAM) server infrastructu **Note**   Installations of Microsoft BitLocker Administration and Monitoring on a single server are recommended only for test environments. -  + ## Planning for MBAM Server Deployment @@ -69,7 +69,7 @@ To deploy MBAM features on multiple servers, you have to install the features in **Note**   Keep track of the names of the computers on which you install each feature. You have to use this information throughout the installation process. You can print and use a deployment checklist to assist in this effort. For more information about the MBAM Deployment Checklist, see [MBAM 2.0 Deployment Checklist](mbam-20-deployment-checklist-mbam-2.md). -  + ## Related topics @@ -78,9 +78,9 @@ Keep track of the names of the computers on which you install each feature. You [Deploying the MBAM 2.0 Server Infrastructure](deploying-the-mbam-20-server-infrastructure-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md b/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md index cfd68be2e8..e825d97948 100644 --- a/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md @@ -34,7 +34,7 @@ The MBAM Server infrastructure depends on a set of server features that can be i **Note**   An MBAM installation on a single server is recommended only for lab environments. -  + The MBAM Client enables administrators to enforce and monitor BitLocker drive encryption on computers in the enterprise. The BitLocker client can be integrated into an organization by deploying the client through an enterprise software delivery system or by installing the client agent on client computers as part of the initial imaging process. @@ -49,9 +49,9 @@ With MBAM, you can encrypt a computer in your organization either before the end [Planning for MBAM 2.0](planning-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md b/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md index 095a5884d7..a125cec907 100644 --- a/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md +++ b/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md @@ -19,10 +19,10 @@ ms.date: 08/30/2016 To deploy MBAM with the Configuration Manager topology, a three-server architecture, which supports 200,000 clients, is recommended. Use a separate server to run Configuration Manager, and install the basic Administration and Monitoring features on two servers, as shown in the architecture image in [Getting Started - Using MBAM with Configuration Manager](getting-started---using-mbam-with-configuration-manager.md). -**Important**   +**Important** Windows To Go is not supported when you install the integrated topology of MBAM with Configuration Manager 2007. -  + ## Deployment Prerequisites for Installing MBAM with Configuration Manager @@ -47,23 +47,23 @@ Ensure that you have met the following prerequisites before you install MBAM wit

              Enable the Hardware Inventory Client Agent on the Configuration Manager Server.

              -

              For Configuration Manager 2007, see [How to Configure Hardware Inventory for a Site](https://go.microsoft.com/fwlink/?LinkId=301656).

              -

              For System Center 2012 Configuration Manager, see [How to Configure Hardware Inventory in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301685).

              +

              For Configuration Manager 2007, see How to Configure Hardware Inventory for a Site.

              +

              For System Center 2012 Configuration Manager, see How to Configure Hardware Inventory in Configuration Manager.

              Enable the Desired Configuration Management (DCM) agent or the compliance settings, depending on the version of Configuration Manager that you are using.

              -

              For Configuration Manager 2007, enable the see [Desired Configuration Management Client Agent Properties](https://go.microsoft.com/fwlink/?LinkId=301686).

              -

              For System Center 2012 Configuration Manager, see [Configuring Compliance Settings in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301687).

              +

              For Configuration Manager 2007, enable the see Desired Configuration Management Client Agent Properties.

              +

              For System Center 2012 Configuration Manager, see Configuring Compliance Settings in Configuration Manager.

              Define a reporting services point in Configuration Manager. Required for SQL Reporting Services.

              -

              For Configuration Manager 2007, see [How to Create a Reporting Services Point for SQL Reporting Services](https://go.microsoft.com/fwlink/?LinkId=301688).

              -

              For System Center 2012 Configuration Manager, see [Prerequisites for Reporting in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301689).

              +

              For Configuration Manager 2007, see How to Create a Reporting Services Point for SQL Reporting Services.

              +

              For System Center 2012 Configuration Manager, see Prerequisites for Reporting in Configuration Manager.

              -  + ## Configuration Manager Supported Versions @@ -89,22 +89,21 @@ MBAM supports the following versions of Configuration Manager:

              SP1 or later

              64-bit

              -Note   -

              Although Configuration Manager 2007 is 32 bit, you must install it and SQL Server on a 64-bit operating system in order to match the 64-bit MBAM software.

              +Note

              Although Configuration Manager 2007 is 32 bit, you must install it and SQL Server on a 64-bit operating system in order to match the 64-bit MBAM software.

              -  +
              -

              Microsoft System Center 2012 Configuration Manager

              +

              Microsoft System Center 2012 Configuration Manager

              SP1

              64-bit

              -  + For a list of supported configurations for the Configuration Manager Server, see the appropriate webpage for the version of Configuration Manager that you are using. MBAM has no additional system requirements for the Configuration Manager Server. @@ -150,9 +149,9 @@ The following table lists the server processor, RAM, and disk space requirements -  -## SQL Server Processor, RAM, and Disk Space Requirements + +## SQL Server Processor, RAM, and Disk Space Requirements The following table lists the server processor, RAM, and disk space requirements for the SQL Server computer when you are using the Configuration Manager Integration topology. @@ -189,7 +188,7 @@ The following table lists the server processor, RAM, and disk space requirements -  + ## Required permissions to install the MBAM Server @@ -219,9 +218,9 @@ To install MBAM with Configuration Manager, you must have an administrative user -  -**System Center 2012 Configuration Manager** + +**System Center 2012 Configuration Manager** @@ -250,7 +249,7 @@ To install MBAM with Configuration Manager, you must have an administrative user
              -  + **Configuration Manager 2007** @@ -281,7 +280,7 @@ To install MBAM with Configuration Manager, you must have an administrative user -  + ## Order of Deployment of MBAM Features for the Configuration Manager Topology @@ -322,7 +321,7 @@ This checklist outlines the recommended steps and a high-level list of items to Checklist box

              Review the getting started information, which describes how Configuration Manager works with MBAM and shows the recommended high-level architecture.

              -

              [Getting Started - Using MBAM with Configuration Manager](getting-started---using-mbam-with-configuration-manager.md)

              +

              Getting Started - Using MBAM with Configuration Manager

              @@ -334,34 +333,34 @@ This checklist outlines the recommended steps and a high-level list of items to Checklist box

              Plan for and configure MBAM Group Policy requirements.

              -

              [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md)

              +

              Planning for MBAM 2.0 Group Policy Requirements

              Checklist box -

              Plan for and create necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

              -

              [Planning for MBAM 2.0 Administrator Roles](planning-for-mbam-20-administrator-roles-mbam-2.md)

              +

              Plan for and create necessary Active Directory Domain Services security groups and plan for MBAM local security group membership requirements.

              +

              Planning for MBAM 2.0 Administrator Roles

              Checklist box

              Plan for deploying MBAM Client deployment.

              -

              [Planning for MBAM 2.0 Client Deployment](planning-for-mbam-20-client-deployment-mbam-2.md)

              +

              Planning for MBAM 2.0 Client Deployment

              -  + ## Related topics [Using MBAM with Configuration Manager](using-mbam-with-configuration-manager.md) -  - -  + + + diff --git a/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md b/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md index 5d1fc5b989..ac91e39c60 100644 --- a/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md @@ -31,7 +31,7 @@ To ensure successful installation of MBAM Clients and MBAM Server features, ensu **Note**   MBAM Setup checks that all prerequisites are met before installation starts. If all prerequisites are not met, Setup will fail. -  + [MBAM 2.0 Deployment Prerequisites](mbam-20-deployment-prerequisites-mbam-2.md) @@ -43,7 +43,7 @@ Before MBAM can manage clients in the enterprise, you must define Group Policy f **Important**   MBAM will not work with policies for stand-alone BitLocker drive encryption. Group Policy settings must be defined for MBAM, or BitLocker encryption and enforcement will fail. -  + [Planning for MBAM 2.0 Group Policy Requirements](planning-for-mbam-20-group-policy-requirements-mbam-2.md) @@ -61,9 +61,9 @@ The membership of Microsoft BitLocker Administration and Monitoring roles can be [MBAM 2.0 Supported Configurations](mbam-20-supported-configurations-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md b/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md index 25d06daa80..c67aa2acee 100644 --- a/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md @@ -199,96 +199,96 @@ This section contains hotfixes and KB articles for MBAM 2.0.

              2831166

              Installing Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 fails with "System Center CM Objects Already Installed"

              -

              [support.microsoft.com/kb/2831166/EN-US](https://support.microsoft.com/kb/2831166/EN-US)

              +

              support.microsoft.com/kb/2831166/EN-US

              2870849

              Users cannot retrieve BitLocker Recovery key using MBAM 2.0 Self Service Portal

              -

              [support.microsoft.com/kb/2870849/EN-US](https://support.microsoft.com/kb/2870849/EN-US)

              +

              support.microsoft.com/kb/2870849/EN-US

              2756402

              MBAM client would fail with Event ID 4 and error code 0x8004100E in the Event description

              -

              [support.microsoft.com/kb/2756402/EN-US](https://support.microsoft.com/kb/2756402/EN-US)

              +

              support.microsoft.com/kb/2756402/EN-US

              2620287

              Error Message “Server Error in ‘/Reports’ Application” When You Click Reports Tab in MBAM

              -

              [support.microsoft.com/kb/2620287/EN-US](https://support.microsoft.com/kb/2620287/EN-US)

              +

              support.microsoft.com/kb/2620287/EN-US

              2639518

              Error opening Enterprise or Computer Compliance Reports in MBAM

              -

              [support.microsoft.com/kb/2639518/EN-US](https://support.microsoft.com/kb/2639518/EN-US)

              +

              support.microsoft.com/kb/2639518/EN-US

              2620269

              MBAM Enterprise Reporting Not Getting Updated

              -

              [support.microsoft.com/kb/2620269/EN-US](https://support.microsoft.com/kb/2620269/EN-US)

              +

              support.microsoft.com/kb/2620269/EN-US

              2712461

              Installing MBAM on a Domain Controller is not supported

              -

              [support.microsoft.com/kb/2712461/EN-US](https://support.microsoft.com/kb/2712461/EN-US)

              +

              support.microsoft.com/kb/2712461/EN-US

              2876732

              You receive error code 0x80071a90 during Standalone or Configuration Manager Integration setup of MBAM 2.0

              -

              [support.microsoft.com/kb/2876732/EN-US](https://support.microsoft.com/kb/2876732/EN-US)

              +

              support.microsoft.com/kb/2876732/EN-US

              2754259

              MBAM and Secure Network Communication

              -

              [support.microsoft.com/kb/2754259/EN-US](https://support.microsoft.com/kb/2754259/EN-US)

              +

              support.microsoft.com/kb/2754259/EN-US

              2870842

              MBAM 2.0 Setup fails during Configuration Manager Integration Scenario with SQL Server 2008

              -

              [support.microsoft.com/kb/2870842/EN-US](https://support.microsoft.com/kb/2870842/EN-US)

              +

              support.microsoft.com/kb/2870842/EN-US

              2668533

              MBAM Setup fails if SQL SSRS is not configured properly

              -

              [support.microsoft.com/kb/2668533/EN-US](https://support.microsoft.com/kb/2668533/EN-US)

              +

              support.microsoft.com/kb/2668533/EN-US

              2870847

              -

              MBAM 2.0 Setup fails with "Error retrieving Configuration Manager Server role settings for 'Reporting Services Point' role"

              -

              [support.microsoft.com/kb/2870847/EN-US](https://support.microsoft.com/kb/2870847/EN-US)

              +

              MBAM 2.0 Setup fails with "Error retrieving Configuration Manager Server role settings for 'Reporting Services Point' role"

              +

              support.microsoft.com/kb/2870847/EN-US

              2870839

              MBAM 2.0 Enterprise Reports are not refreshed in MBAM 2.0 Standalone topology due to SQL job CreateCache failure

              -

              [support.microsoft.com/kb/2870839/EN-US](https://support.microsoft.com/kb/2870839/EN-US)

              +

              support.microsoft.com/kb/2870839/EN-US

              2620269

              MBAM Enterprise Reporting Not Getting Updated

              -

              [support.microsoft.com/kb/2620269/EN-US](https://support.microsoft.com/kb/2620269/EN-US)

              +

              support.microsoft.com/kb/2620269/EN-US

              2935997

              MBAM Supported Computers compliance reporting incorrectly includes unsupported products

              -

              [support.microsoft.com/kb/2935997/EN-US](https://support.microsoft.com/kb/2935997/EN-US)

              +

              support.microsoft.com/kb/2935997/EN-US

              2612822

              Computer Record is Rejected in MBAM

              -

              [support.microsoft.com/kb/2612822/EN-US](https://support.microsoft.com/kb/2612822/EN-US)

              +

              support.microsoft.com/kb/2612822/EN-US

              -  + ## Related topics [About MBAM 2.0](about-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/release-notes-for-mbam-20-sp1.md b/mdop/mbam-v2/release-notes-for-mbam-20-sp1.md index 10e0560c95..003c3164cc 100644 --- a/mdop/mbam-v2/release-notes-for-mbam-20-sp1.md +++ b/mdop/mbam-v2/release-notes-for-mbam-20-sp1.md @@ -37,7 +37,7 @@ If you are using MBAM with Configuration Manager, and you want to upgrade to MBA **Note**   All existing BitLocker compliance data will be deleted when you delete the existing baseline in Configuration Manager. The data will be regenerated over time, but it is recommended that you save a copy of the data in case you need the compliance data for a particular computer before the compliance data has been regenerated. -   + 1. To save historical BitLocker compliance data, open the **BitLocker Enterprise Compliance Details** Report. @@ -147,96 +147,96 @@ This section contains hotfixes and KB articles for MBAM 2.0 SP1.

              2831166

              Installing Microsoft BitLocker Administration and Monitoring (MBAM) 2.0 fails with "System Center CM Objects Already Installed"

              -

              [support.microsoft.com/kb/2831166/EN-US](https://support.microsoft.com/kb/2831166/EN-US)

              +

              support.microsoft.com/kb/2831166/EN-US

              2870849

              Users cannot retrieve BitLocker Recovery key using MBAM 2.0 Self Service Portal

              -

              [support.microsoft.com/kb/2870849/EN-US](https://support.microsoft.com/kb/2870849/EN-US)

              +

              support.microsoft.com/kb/2870849/EN-US

              2756402

              MBAM client would fail with Event ID 4 and error code 0x8004100E in the Event description

              -

              [support.microsoft.com/kb/2756402/EN-US](https://support.microsoft.com/kb/2756402/EN-US)

              +

              support.microsoft.com/kb/2756402/EN-US

              2620287

              Error Message “Server Error in ‘/Reports’ Application” When You Click Reports Tab in MBAM

              -

              [support.microsoft.com/kb/2620287/EN-US](https://support.microsoft.com/kb/2620287/EN-US)

              +

              support.microsoft.com/kb/2620287/EN-US

              2639518

              Error opening Enterprise or Computer Compliance Reports in MBAM

              -

              [support.microsoft.com/kb/2639518/EN-US](https://support.microsoft.com/kb/2639518/EN-US)

              +

              support.microsoft.com/kb/2639518/EN-US

              2620269

              MBAM Enterprise Reporting Not Getting Updated

              -

              [support.microsoft.com/kb/2620269/EN-US](https://support.microsoft.com/kb/2620269/EN-US)

              +

              support.microsoft.com/kb/2620269/EN-US

              2712461

              Installing MBAM on a Domain Controller is not supported

              -

              [support.microsoft.com/kb/2712461/EN-US](https://support.microsoft.com/kb/2712461/EN-US)

              +

              support.microsoft.com/kb/2712461/EN-US

              2876732

              You receive error code 0x80071a90 during Standalone or Configuration Manager Integration setup of MBAM 2.0

              -

              [support.microsoft.com/kb/2876732/EN-US](https://support.microsoft.com/kb/2876732/EN-US)

              +

              support.microsoft.com/kb/2876732/EN-US

              2754259

              MBAM and Secure Network Communication

              -

              [support.microsoft.com/kb/2754259/EN-US](https://support.microsoft.com/kb/2754259/EN-US)

              +

              support.microsoft.com/kb/2754259/EN-US

              2870842

              MBAM 2.0 Setup fails during Configuration Manager Integration Scenario with SQL Server 2008

              -

              [support.microsoft.com/kb/2870842/EN-US](https://support.microsoft.com/kb/2870842/EN-US)

              +

              support.microsoft.com/kb/2870842/EN-US

              2668533

              MBAM Setup fails if SQL SSRS is not configured properly

              -

              [support.microsoft.com/kb/2668533/EN-US](https://support.microsoft.com/kb/2668533/EN-US)

              +

              support.microsoft.com/kb/2668533/EN-US

              2870847

              -

              MBAM 2.0 Setup fails with "Error retrieving Configuration Manager Server role settings for 'Reporting Services Point' role"

              -

              [support.microsoft.com/kb/2870847/EN-US](https://support.microsoft.com/kb/2870847/EN-US)

              +

              MBAM 2.0 Setup fails with "Error retrieving Configuration Manager Server role settings for 'Reporting Services Point' role"

              +

              support.microsoft.com/kb/2870847/EN-US

              2870839

              MBAM 2.0 Enterprise Reports are not refreshed in MBAM 2.0 Standalone topology due to SQL job CreateCache failure

              -

              [support.microsoft.com/kb/2870839/EN-US](https://support.microsoft.com/kb/2870839/EN-US)

              +

              support.microsoft.com/kb/2870839/EN-US

              2620269

              MBAM Enterprise Reporting Not Getting Updated

              -

              [support.microsoft.com/kb/2620269/EN-US](https://support.microsoft.com/kb/2620269/EN-US)

              +

              support.microsoft.com/kb/2620269/EN-US

              2935997

              MBAM Supported Computers compliance reporting incorrectly includes unsupported products

              -

              [support.microsoft.com/kb/2935997/EN-US](https://support.microsoft.com/kb/2935997/EN-US)

              +

              support.microsoft.com/kb/2935997/EN-US

              2612822

              Computer Record is Rejected in MBAM

              -

              [support.microsoft.com/kb/2612822/EN-US](https://support.microsoft.com/kb/2612822/EN-US)

              +

              support.microsoft.com/kb/2612822/EN-US

              -  + ## Related topics [About MBAM 2.0 SP1](about-mbam-20-sp1.md) -  + -  + diff --git a/mdop/mbam-v2/understanding-mbam-reports-in-configuration-manager.md b/mdop/mbam-v2/understanding-mbam-reports-in-configuration-manager.md index 60b2e680b5..a5bd540199 100644 --- a/mdop/mbam-v2/understanding-mbam-reports-in-configuration-manager.md +++ b/mdop/mbam-v2/understanding-mbam-reports-in-configuration-manager.md @@ -145,7 +145,7 @@ This report shows information about the overall BitLocker compliance across your -  + **BitLocker Enterprise Compliance Details Report - Compliance States** @@ -176,7 +176,7 @@ This report shows information about the overall BitLocker compliance across your -  + ### BitLocker Enterprise Compliance Summary Report @@ -243,7 +243,7 @@ Use this report type to show information about the overall BitLocker compliance -  + **BitLocker Enterprise Compliance Summary Report - Computer Details** @@ -290,7 +290,7 @@ Use this report type to show information about the overall BitLocker compliance -  + ### BitLocker Computer Compliance Report @@ -299,7 +299,7 @@ Use this report type to collect information that is specific to a computer. The **Note**   Removable Data Volume encryption status is not shown in the report. -  + **BitLocker Computer Compliance Report – Computer Details Fields** @@ -390,7 +390,7 @@ Removable Data Volume encryption status is not shown in the report. -  + **BitLocker Computer Compliance Report – Computer Volume Fields** @@ -433,16 +433,16 @@ Removable Data Volume encryption status is not shown in the report. -  + ## Related topics [Using MBAM with Configuration Manager](using-mbam-with-configuration-manager.md) -  + -  + diff --git a/mdop/mbam-v2/understanding-mbam-reports-mbam-2.md b/mdop/mbam-v2/understanding-mbam-reports-mbam-2.md index ed5bf90a4b..731bc11158 100644 --- a/mdop/mbam-v2/understanding-mbam-reports-mbam-2.md +++ b/mdop/mbam-v2/understanding-mbam-reports-mbam-2.md @@ -22,7 +22,7 @@ If you chose the Stand-alone topology when you installed Microsoft BitLocker Adm **Note**   If you chose the Configuration Manager topology when you installed Microsoft BitLocker Administration and Monitoring (MBAM), reports are generated from Configuration Manager rather than from MBAM. For more information about reports that are run from Configuration Manager, see [Understanding MBAM Reports in Configuration Manager](understanding-mbam-reports-in-configuration-manager.md). -  + ## Understanding Reports @@ -70,7 +70,7 @@ Use this report type to collect information on overall BitLocker compliance in y -  + **Enterprise Compliance Report Compliance States** @@ -105,7 +105,7 @@ Use this report type to collect information on overall BitLocker compliance in y -  + ### Computer Compliance Report @@ -116,7 +116,7 @@ This report can be viewed by clicking the computer name in the Enterprise Compli **Note**   Removable Data Volume encryption status will not be shown in the report. -  + **Computer Compliance Report Fields** @@ -191,7 +191,7 @@ Removable Data Volume encryption status will not be shown in the report. -  + **Computer Compliance Report Drive Fields** @@ -242,7 +242,7 @@ Removable Data Volume encryption status will not be shown in the report. -  + ### Recovery Audit Report @@ -304,21 +304,21 @@ Use this report type to audit users who have requested access to recovery keys. -  + **Note**   Report results can be saved to a file by clicking the **Export** button on the reports menu bar. For more information about how to run MBAM reports, see [How to Generate MBAM Reports](how-to-generate-mbam-reports-mbam-2.md). -  + ## Related topics [Monitoring and Reporting BitLocker Compliance with MBAM 2.0](monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/upgrading-from-previous-versions-of-mbam.md b/mdop/mbam-v2/upgrading-from-previous-versions-of-mbam.md index 93450b86e8..7b3884f5c8 100644 --- a/mdop/mbam-v2/upgrading-from-previous-versions-of-mbam.md +++ b/mdop/mbam-v2/upgrading-from-previous-versions-of-mbam.md @@ -83,7 +83,7 @@ Use the following instructions to upgrade from a previous version of MBAM when y **Note**   The certificate must be created before this step to enable you to select it on this page. -   + 8. On the **Configure the location of the Compliance Status database** page, specify the SQL Server instance name and the name of the database that stores the compliance and audit data. You must also specify where the database files and log information will be located. @@ -102,7 +102,7 @@ Use the following instructions to upgrade from a previous version of MBAM when y **Note**   The port number that you specify must be an unused port number on the Administration and Monitoring Server unless you specify a unique host header name. -   + 15. On the **Configure the Administration and Monitoring Server** page, specify the desired virtual directory for the Help Desk website. @@ -130,9 +130,9 @@ To validate the Client upgrade, do the following: [Deploying MBAM 2.0](deploying-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/using-mbam-with-configuration-manager.md b/mdop/mbam-v2/using-mbam-with-configuration-manager.md index e13aa6308e..065e2ffd49 100644 --- a/mdop/mbam-v2/using-mbam-with-configuration-manager.md +++ b/mdop/mbam-v2/using-mbam-with-configuration-manager.md @@ -24,7 +24,7 @@ This integration moves the Microsoft BitLocker Administration and Monitoring com **Important**   Windows To Go is not supported when you install the integrated topology of MBAM with Configuration Manager 2007. -  + ## Getting Started – Using MBAM with Configuration Manager @@ -59,9 +59,9 @@ This section describes the MBAM reports that you can run from Configuration Mana [Operations for MBAM 2.0](operations-for-mbam-20-mbam-2.md) -  + -  + diff --git a/mdop/mbam-v2/using-your-pin-or-password.md b/mdop/mbam-v2/using-your-pin-or-password.md index 470f62e39b..cdf27ed7a0 100644 --- a/mdop/mbam-v2/using-your-pin-or-password.md +++ b/mdop/mbam-v2/using-your-pin-or-password.md @@ -29,7 +29,7 @@ The password is used to unlock drives on your computer that do not contain the o **Note**   Your Help Desk may set drives to unlock automatically. This eliminates the need to provide a PIN or password to view the information on the drives. -  + ## Unlocking Your Computer if You Forget Your PIN or Password @@ -71,9 +71,9 @@ Before you can change the password on a BitLocker protected drive, you must unlo - To change your password, select **Manage Your Password**. Enter your new password into both fields and select **Reset Password**. -  + -  + diff --git a/mdop/mbam-v25/about-mbam-25-sp1.md b/mdop/mbam-v25/about-mbam-25-sp1.md index a17ede4bf3..e9fefc297b 100644 --- a/mdop/mbam-v25/about-mbam-25-sp1.md +++ b/mdop/mbam-v25/about-mbam-25-sp1.md @@ -51,7 +51,7 @@ The following groups might be interested in using MBAM to manage BitLocker: **Note**   BitLocker is not explained in detail in this MBAM documentation. For more information, see [BitLocker Drive Encryption Overview](https://go.microsoft.com/fwlink/p/?LinkId=225013). -  + ## What’s new in MBAM 2.5 SP1 @@ -129,7 +129,7 @@ The Windows team has backported FIPS-compliant recovery keys with a hotfix, and **Note**   Client computers that are running the Windows 8 operating system still require a DRA protector since the hotfix was not backported to that OS. See [Hotfix Package 2 for BitLocker Administration and Monitoring 2.5](https://support.microsoft.com/kb/3015477) to download and install the BitLocker hotfix for Windows 7 and Windows 8 computers. For information about DRA, see [Using Data Recovery Agents with BitLocker](https://go.microsoft.com/fwlink/?LinkId=393557). -  + To enable FIPS compliance in your organization, you must configure the Federal Information Processing Standard (FIPS) Group Policy settings. For configuration instructions, see [BitLocker Group Policy Settings](https://go.microsoft.com/fwlink/?LinkId=393560). @@ -243,9 +243,9 @@ For more information and late-breaking news that is not included in this documen [Getting Started with MBAM 2.5](getting-started-with-mbam-25.md) -  + -  + diff --git a/mdop/mbam-v25/about-mbam-25.md b/mdop/mbam-v25/about-mbam-25.md index 1357167f7d..e379ef1ec5 100644 --- a/mdop/mbam-v25/about-mbam-25.md +++ b/mdop/mbam-v25/about-mbam-25.md @@ -51,7 +51,7 @@ The following groups might be interested in using MBAM to manage BitLocker: **Note**   BitLocker is not explained in detail in this MBAM documentation. For more information, see [BitLocker Drive Encryption Overview](https://go.microsoft.com/fwlink/p/?LinkId=225013). -  + ## What’s new in MBAM 2.5 @@ -69,7 +69,7 @@ The MBAM Group Policy Templates must be downloaded separately from the MBAM inst **Important**   Do not change the Group Policy settings in the **BitLocker Drive Encryption** node, or MBAM will not work correctly. When you configure the Group Policy settings in the **MDOP MBAM (BitLocker Management)** node, MBAM automatically configures the BitLocker Drive Encryption settings for you. -  + The template files that you need to copy to a server or workstation are: @@ -83,59 +83,59 @@ The template files that you need to copy to a server or workstation are: Copy the template files to the location that best meets your needs. For the language-specific files, which must be copied to a language-specific folder, the Group Policy Management Console is required to view the files. -- To install the template files locally on a server or workstation, copy the files to one of the following locations. +- To install the template files locally on a server or workstation, copy the files to one of the following locations. - - - - - - - - - - - - - - - - - - - - - -
              File typeFile location

              language neutral (.admx)

              %systemroot%\policyDefinitions

              language specific (.adml)

              %systemroot%\policyDefinitions\[MUIculture] (for example, the U.S. English language specific file will be stored in %systemroot%\policyDefinitions\en-us)

              + + + + + + + + + + + + + + + + + + + + + +
              File typeFile location

              language neutral (.admx)

              %systemroot%\policyDefinitions

              language specific (.adml)

              %systemroot%\policyDefinitions[MUIculture] (for example, the U.S. English language specific file will be stored in %systemroot%</em>policyDefinitions\en-us)

              -   + -- To make the templates available to all Group Policy administrators in a domain, copy the files to one of the following locations on a domain controller. +- To make the templates available to all Group Policy administrators in a domain, copy the files to one of the following locations on a domain controller. - - - - - - - - - - - - - - - - - - - - - -
              File typeDomain controller file location

              Language neutral (.admx)

              %systemroot%sysvol\domain\policies\PolicyDefinitions

              Language specific (.adml)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions\[MUIculture] (for example, the U.S. English language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us)

              + + + + + + + + + + + + + + + + + + + + + +
              File typeDomain controller file location

              Language neutral (.admx)

              %systemroot%sysvol\domain\policies\PolicyDefinitions

              Language specific (.adml)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions[MUIculture] (for example, the U.S. English language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us)

              -   + For more information about template files, see [Managing Group Policy ADMX Files Step-by-Step Guide](https://go.microsoft.com/fwlink/?LinkId=392818). @@ -179,7 +179,7 @@ To enable you to configure encryption policy enforcement, a new Group Policy set -  + ### Ability to provide a URL in the BitLocker Drive Encryption wizard to point to your security policy @@ -250,7 +250,7 @@ The following table lists the security groups that you must create in AD DS. You -  + After you create the security groups in AD DS, assign users and/or groups to the appropriate security group to enable the corresponding level of access to the Administration and Monitoring Website. To enable individuals with each role to access the Administration and Monitoring Website, you must also specify each security group when you are configuring the Administration and Monitoring Website. @@ -286,20 +286,20 @@ Windows PowerShell Help for MBAM is available in the following formats:

              On TechNet as webpages

              -

              https://go.microsoft.com/fwlink/?LinkId=393498

              +

              https://go.microsoft.com/fwlink/?LinkId=393498

              On the Download Center as a Word .docx file

              -

              https://go.microsoft.com/fwlink/?LinkId=393497

              +

              https://go.microsoft.com/fwlink/?LinkId=393497

              On the Download Center as a .pdf file

              -

              https://go.microsoft.com/fwlink/?LinkId=393499

              +

              https://go.microsoft.com/fwlink/?LinkId=393499

              -  + ### Support for ASCII-only and enhanced PINs and ability to prevent sequential and repeating characters @@ -368,9 +368,9 @@ For more information and late-breaking news that is not included in this documen [Getting Started with MBAM 2.5](getting-started-with-mbam-25.md) -  + -  + diff --git a/mdop/mbam-v25/accessibility-for-mbam-25.md b/mdop/mbam-v25/accessibility-for-mbam-25.md index 854ef72eaa..5618291576 100644 --- a/mdop/mbam-v25/accessibility-for-mbam-25.md +++ b/mdop/mbam-v25/accessibility-for-mbam-25.md @@ -33,7 +33,7 @@ Access keys let you quickly use a command by pressing a few keys. You can get to **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ## Documentation in alternative formats @@ -67,13 +67,13 @@ For information about the availability of Microsoft product documentation and bo

              (609) 987-8116

              -

              [http://www.learningally.org/](https://go.microsoft.com/fwlink/?linkid=239)

              +

              http://www.learningally.org/

              Web addresses can change, so you might be unable to connect to the website or sites mentioned here.

              -  + ## Customer service for people with hearing impairments @@ -100,9 +100,9 @@ For more information about how accessible technology for computers helps to impr [Getting Started with MBAM 2.5](getting-started-with-mbam-25.md) -  + -  + diff --git a/mdop/mbam-v25/administering-mbam-25-features.md b/mdop/mbam-v25/administering-mbam-25-features.md index af59ef6842..ba93616f8c 100644 --- a/mdop/mbam-v25/administering-mbam-25-features.md +++ b/mdop/mbam-v25/administering-mbam-25-features.md @@ -34,7 +34,7 @@ MBAM provides a custom control panel, called BitLocker Encryption Options, that **Note**   This customized control panel does not replace the default Windows BitLocker control panel. -  + [Understanding the BitLocker Encryption Options and BitLocker Drive Encryption Items in Control Panel](understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md) @@ -47,9 +47,9 @@ This customized control panel does not replace the default Windows BitLocker con - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + -  + diff --git a/mdop/mbam-v25/configuring-mbam-25-server-features-by-using-windows-powershell.md b/mdop/mbam-v25/configuring-mbam-25-server-features-by-using-windows-powershell.md index 81a2609660..3e68d38e01 100644 --- a/mdop/mbam-v25/configuring-mbam-25-server-features-by-using-windows-powershell.md +++ b/mdop/mbam-v25/configuring-mbam-25-server-features-by-using-windows-powershell.md @@ -72,20 +72,20 @@ Windows PowerShell Help for MBAM is available in the following formats:

              On TechNet as webpages

              -

              https://go.microsoft.com/fwlink/?LinkId=393498

              +

              https://go.microsoft.com/fwlink/?LinkId=393498

              On the Download Center as a Word .docx file

              -

              https://go.microsoft.com/fwlink/?LinkId=393497

              +

              https://go.microsoft.com/fwlink/?LinkId=393497

              On the Download Center as a .pdf file

              -

              https://go.microsoft.com/fwlink/?LinkId=393499

              +

              https://go.microsoft.com/fwlink/?LinkId=393499

              -  + ## Configurations that you can do only with Windows PowerShell but not with the MBAM Server Configuration wizard @@ -125,12 +125,12 @@ Windows PowerShell Help for MBAM is available in the following formats: -  + **Note**   You cannot disable the MBAM databases with a Windows PowerShell cmdlet or the MBAM Server Configuration wizard. To prevent the accidental removal of your compliance and audit data, database administrators must remove databases manually. -  + ## Prerequisites and requirements for using Windows PowerShell to configure MBAM Server features @@ -167,7 +167,7 @@ Before starting the configuration, complete the following prerequisites. -  + **Permission-related prerequisites** @@ -197,7 +197,7 @@ Before starting the configuration, complete the following prerequisites.

              This user account must be a part of the local administrators group or the Backup Operators group to register the MBAM Volume Shadow Copy Service (VSS) Writer.

              By default, the database administrator or system administrator has the required "create any database" permissions.

              -

              For more information about VSS Writer, see [Volume Shadow Copy Service](https://go.microsoft.com/fwlink/?LinkId=392814).

              +

              For more information about VSS Writer, see Volume Shadow Copy Service.

              For the System Center Configuration Manager Integration feature only:

              @@ -234,7 +234,7 @@ Before starting the configuration, complete the following prerequisites. -  + ## Using Windows PowerShell to configure MBAM on a remote computer @@ -255,7 +255,7 @@ Before starting the configuration, complete the following prerequisites.
              • Ensure that the MBAM 2.5 Server software has been installed on the remote computer.

              • Use the Credential Security Support Provider (CredSSP) Protocol to open the Windows PowerShell session.

              • -
              • Enable Windows Remote Management (WinRM). If you fail to enable WinRM and to configure it correctly, the New-PSSession cmdlet that is described in this table displays an error and describes how to fix the issue. For more information about WinRM, see [Using Windows Remote Management](https://go.microsoft.com/fwlink/?LinkId=393064).

              • +
              • Enable Windows Remote Management (WinRM). If you fail to enable WinRM and to configure it correctly, the New-PSSession cmdlet that is described in this table displays an error and describes how to fix the issue. For more information about WinRM, see Using Windows Remote Management.

              @@ -273,7 +273,7 @@ Before starting the configuration, complete the following prerequisites. -  + ## Required accounts and corresponding Windows PowerShell cmdlet parameters @@ -309,7 +309,7 @@ Specifies the administrative credential that the local SSRS instance uses to con **Important**   The account specified in the administrative credentials should have limited user rights for improved security. Also, the password of the account should be set to not expire. -  + ReportsReadOnlyAccessGroup @@ -348,9 +348,9 @@ For improved security, set the account that is specified in the administrative c To view the local security setting, open the **Local Security Policy editor**, expand the **Local Policies** node, select the **User Rights Assignment** node, and then double-click the **Impersonate a client after authentication** and **Log on as a batch job** Group Policy settings in the details pane. -  + -  + @@ -364,11 +364,11 @@ To view the local security setting, open the **Local Security Policy editor**, e [Using Windows PowerShell to Administer MBAM 2.5](using-windows-powershell-to-administer-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/configuring-the-mbam-25-server-features.md b/mdop/mbam-v25/configuring-the-mbam-25-server-features.md index 5afb8c6a37..d5431e95f6 100644 --- a/mdop/mbam-v25/configuring-the-mbam-25-server-features.md +++ b/mdop/mbam-v25/configuring-the-mbam-25-server-features.md @@ -42,31 +42,31 @@ Review and complete the following steps before you start configuring the MBAM Se

              Review the recommended architecture for MBAM.

              -

              [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

              +

              High-Level Architecture for MBAM 2.5

              Review the supported configurations for MBAM.

              -

              [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

              +

              MBAM 2.5 Supported Configurations

              Complete the required prerequisites on each server.

              Install the MBAM Server software on each server where you will configure an MBAM Server feature.

              -

              [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

              +

              Installing the MBAM 2.5 Server Software

              Review the prerequisites for using Windows PowerShell to configure MBAM Server features (if you are using this method to configure MBAM Server features).

              -

              [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

              +

              Configuring MBAM 2.5 Server Features by Using Windows PowerShell

              -  + ## Steps for configuring MBAM Server features @@ -87,24 +87,24 @@ Each row in the following table describes the features that you will configure o

              Configure the databases.

              -

              [How to Configure the MBAM 2.5 Databases](how-to-configure-the-mbam-25-databases.md)

              +

              How to Configure the MBAM 2.5 Databases

              Configure the reports.

              -

              [How to Configure the MBAM 2.5 Reports](how-to-configure-the-mbam-25-reports.md)

              +

              How to Configure the MBAM 2.5 Reports

              Configure the web applications.

              -

              [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md)

              +

              How to Configure the MBAM 2.5 Web Applications

              Configure the System Center Configuration Manager Integration (if applicable).

              -

              [How to Configure the MBAM 2.5 System Center Configuration Manager Integration](how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md)

              +

              How to Configure the MBAM 2.5 System Center Configuration Manager Integration

              -  + For a list of events about MBAM Server feature configuration, see [Server Event Logs](server-event-logs.md). @@ -114,9 +114,9 @@ For a list of events about MBAM Server feature configuration, see [Server Event Configuring the MBAM 2.5 Server Features -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md b/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md index b962c0d5bc..3c22c4bb2d 100644 --- a/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md +++ b/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md @@ -26,80 +26,82 @@ MDOP Group Policy templates are available for download in a self-extracting, com **How to download and deploy the MDOP Group Policy templates** -1. Download the MDOP Group Policy templates from [Microsoft Desktop Optimization Pack Group Policy Administrative Templates -](https://www.microsoft.com/en-us/download/details.aspx?id=55531). +1. Download the MDOP Group Policy templates from [Microsoft Desktop Optimization Pack Group Policy Administrative Templates + ](https://www.microsoft.com/en-us/download/details.aspx?id=55531). -2. Run the downloaded file to extract the template folders. +2. Run the downloaded file to extract the template folders. - **Warning**   - Do not extract the templates directly to the Group Policy deployment directory. Multiple technologies and versions are bundled in this file. + **Warning** + Do not extract the templates directly to the Group Policy deployment directory. Multiple technologies and versions are bundled in this file. -   -3. In the extracted folder, locate the technology-version .admx file. Certain MDOP technologies have multiple sets of Group Policy Objects (GPOs). For example, MBAM includes MBAM Management settings and MBAM User settings. -4. Locate the appropriate .adml file by language-culture (that is, *en* for English-United States). +3. In the extracted folder, locate the technology-version .admx file. Certain MDOP technologies have multiple sets of Group Policy Objects (GPOs). For example, MBAM includes MBAM Management settings and MBAM User settings. -5. Copy the .admx and .adml files to a policy definition folder. Depending on where you store the templates, you can configure Group Policy settings from the local device or from any computer on the domain. +4. Locate the appropriate .adml file by language-culture (that is, *en* for English-United States). - **Local files.** To configure Group Policy settings from the local device, copy template files to the following locations: +5. Copy the .admx and .adml files to a policy definition folder. Depending on where you store the templates, you can configure Group Policy settings from the local device or from any computer on the domain. - - - - - - - - - - - - - - - - - - - - - -
              File typeFile location

              Group Policy template (.admx)

              %systemroot%\policyDefinitions

              Group Policy language file (.adml)

              %systemroot%\policyDefinitions\[MUIculture]

              + **Local files.** To configure Group Policy settings from the local device, copy template files to the following locations: -   + + + + + + + + + + + + + + + + + + + + + +
              File typeFile location

              Group Policy template (.admx)

              %systemroot%<strong>policyDefinitions

              Group Policy language file (.adml)

              %systemroot%<strong>policyDefinitions[MUIculture]

              - **Domain central store.** To enable Group Policy settings configuration by a Group Policy administrator from any computer on the domain, copy files to the following locations on the domain controller: - - - - - - - - - - - - - - - - - - - - - -
              File typeFile location

              Group Policy template (.admx)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions

              Group Policy language file (.adml)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions\[MUIculture]\[MUIculture]

              -

              For example, the U.S. English ADML language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us.

              -   +~~~ +**Domain central store.** To enable Group Policy settings configuration by a Group Policy administrator from any computer on the domain, copy files to the following locations on the domain controller: -6. Edit the Group Policy settings using Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM) to configure Group Policy settings for the MDOP technology. See [Editing the MBAM 2.5 Group Policy Settings](editing-the-mbam-25-group-policy-settings.md) for more information. + ++++ + + + + + + + + + + + + + + + + +
              File typeFile location

              Group Policy template (.admx)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions

              Group Policy language file (.adml)

              %systemroot%\sysvol\domain\policies\PolicyDefinitions\[MUIculture]\[MUIculture]

              +

              For example, the U.S. English ADML language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us.

              +~~~ - For descriptions of the Group Policy settings, see [Planning for MBAM 2.5 Group Policy Requirements](planning-for-mbam-25-group-policy-requirements.md). + + +6. Edit the Group Policy settings using Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM) to configure Group Policy settings for the MDOP technology. See [Editing the MBAM 2.5 Group Policy Settings](editing-the-mbam-25-group-policy-settings.md) for more information. + + For descriptions of the Group Policy settings, see [Planning for MBAM 2.5 Group Policy Requirements](planning-for-mbam-25-group-policy-requirements.md). ## Related topics @@ -107,11 +109,11 @@ MDOP Group Policy templates are available for download in a self-extracting, com [Deploying MBAM 2.5 Group Policy Objects](deploying-mbam-25-group-policy-objects.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/customizing-the-self-service-portal-for-your-organization.md b/mdop/mbam-v25/customizing-the-self-service-portal-for-your-organization.md index d2d19ae89c..b5343853e6 100644 --- a/mdop/mbam-v25/customizing-the-self-service-portal-for-your-organization.md +++ b/mdop/mbam-v25/customizing-the-self-service-portal-for-your-organization.md @@ -38,28 +38,28 @@ You can customize the Self-Service Portal in the following ways:

              You can brand the Self-Service Portal with your company name, Help Desk URL, and can change the Session Time-out setting to make the end user’s session expire after a specified period of inactivity.

              -

              [How to Set the Self-Service Portal Branding and Session Time-out](how-to-set-the-self-service-portal-branding-and-session-time-out.md)

              +

              How to Set the Self-Service Portal Branding and Session Time-out

              You can turn the Self-Service Portal notice text on or off.

              -

              [How to Turn the Self-Service Portal Notice Text On or Off](how-to-turn-the-self-service-portal-notice-text-on-or-off.md)

              +

              How to Turn the Self-Service Portal Notice Text On or Off

              You can configure a localized version of the Self-Service Portal "HelpdeskText" statement, which tells end users how to get additional help when they are using the Self-Service Portal.

              -

              [How to Localize the “HelpdeskText” Statement that Points Users to More Self-Service Portal Information](how-to-localize-the-helpdesktext-statement-that-points-users-to-more-self-service-portal-information.md)

              +

              How to Localize the “HelpdeskText” Statement that Points Users to More Self-Service Portal Information

              You can configure a localized version of the Self-Service Portal "HelpdeskURL" to display to end users by default.

              -

              [How to Localize the Self-Service Portal “HelpdeskURL”](how-to-localize-the-self-service-portal-helpdeskurl.md)

              +

              How to Localize the Self-Service Portal “HelpdeskURL”

              You can configure localized notice text to display to end users by default in the Self-Service Portal.

              -

              [How to Localize the Self-Service Portal Notice Text](how-to-localize-the-self-service-portal-notice-text.md)

              +

              How to Localize the Self-Service Portal Notice Text

              -  + @@ -68,7 +68,7 @@ You can customize the Self-Service Portal in the following ways: [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/deploying-mbam-25-group-policy-objects.md b/mdop/mbam-v25/deploying-mbam-25-group-policy-objects.md index 85e73537ad..ea0c9dff8f 100644 --- a/mdop/mbam-v25/deploying-mbam-25-group-policy-objects.md +++ b/mdop/mbam-v25/deploying-mbam-25-group-policy-objects.md @@ -22,7 +22,7 @@ To deploy MBAM, you have to set Group Policy settings that define MBAM implement **Important**   Do not change the Group Policy settings in the **BitLocker Drive Encryption** node, or MBAM will not work correctly. When you configure the Group Policy settings in the **MDOP MBAM (BitLocker Management)** node, MBAM automatically configures the **BitLocker Drive Encryption** settings for you. -  + ## Copying the MBAM 2.5 Group Policy Templates @@ -54,9 +54,9 @@ Since MBAM offers a customized MBAM control panel that can replace the default W - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + -  + diff --git a/mdop/mbam-v25/deploying-mbam-25.md b/mdop/mbam-v25/deploying-mbam-25.md index f9918a643e..48ab4bb17d 100644 --- a/mdop/mbam-v25/deploying-mbam-25.md +++ b/mdop/mbam-v25/deploying-mbam-25.md @@ -40,32 +40,32 @@ Use this information to identify the procedures you can follow to deploy and con
            • How to install the MBAM Server software.

            • How to configure the MBAM Server features.

            -

            [Deploying the MBAM 2.5 Server Infrastructure](deploying-the-mbam-25-server-infrastructure.md)

            +

            Deploying the MBAM 2.5 Server Infrastructure

            How to download and deploy the MBAM Group Policy Templates, which are required to manage MBAM Clients and BitLocker encryption policies in the enterprise.

            -

            [Deploying MBAM 2.5 Group Policy Objects](deploying-mbam-25-group-policy-objects.md)

            +

            Deploying MBAM 2.5 Group Policy Objects

            How to use the MBAM Client Windows Installer files to deploy the MBAM Client software.

            -

            [Deploying the MBAM 2.5 Client](deploying-the-mbam-25-client.md)

            +

            Deploying the MBAM 2.5 Client

            Checklist that can assist you in deploying the MBAM Server features and MBAM Client.

            -

            [MBAM 2.5 Deployment Checklist](mbam-25-deployment-checklist.md)

            +

            MBAM 2.5 Deployment Checklist

            How to upgrade MBAM from previous versions.

            -

            [Upgrading to MBAM 2.5 or MBAM 2.5 SP1 from Previous Versions](upgrading-to-mbam-25-or-mbam-25-sp1-from-previous-versions.md)

            +

            Upgrading to MBAM 2.5 or MBAM 2.5 SP1 from Previous Versions

            How to remove MBAM Server features or software.

            -

            [Removing MBAM Server Features or Software](removing-mbam-server-features-or-software.md)

            +

            Removing MBAM Server Features or Software

            -  + ## Other resources for deploying MBAM @@ -88,9 +88,9 @@ Use this information to identify the procedures you can follow to deploy and con - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + -  + diff --git a/mdop/mbam-v25/deploying-the-mbam-25-client.md b/mdop/mbam-v25/deploying-the-mbam-25-client.md index 802e36cddf..0a20208aa0 100644 --- a/mdop/mbam-v25/deploying-the-mbam-25-client.md +++ b/mdop/mbam-v25/deploying-the-mbam-25-client.md @@ -29,7 +29,7 @@ After configuring Group Policy settings, you can use an enterprise software depl **Note**   Beginning in MBAM 2.5 SP1, a separate MSI is no longer included with the MBAM product. However, you can extract the MSI from the executable file (.exe) that is included with the product. -  + [How to Deploy the MBAM Client to Desktop or Laptop Computers](how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-25.md) @@ -61,11 +61,11 @@ This section explains how to install the MBAM Client by using a command line. [Planning for MBAM 2.5](planning-for-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/deploying-the-mbam-25-server-infrastructure.md b/mdop/mbam-v25/deploying-the-mbam-25-server-infrastructure.md index aa8f2c56a5..d60e1044e5 100644 --- a/mdop/mbam-v25/deploying-the-mbam-25-server-infrastructure.md +++ b/mdop/mbam-v25/deploying-the-mbam-25-server-infrastructure.md @@ -33,32 +33,32 @@ To deploy the Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 Serve

            Install the MBAM 2.5 Server software on each server where you want to configure an MBAM Server feature.

            -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            +

            Installing the MBAM 2.5 Server Software

            Configure the databases, reports, web applications, and the optional System Center Configuration Manager Integration topology.

            You can use the MBAM Server Configuration wizard or Windows PowerShell cmdlets to do the configuration.

            -

            [Configuring the MBAM 2.5 Server Features](configuring-the-mbam-25-server-features.md)

            +

            Configuring the MBAM 2.5 Server Features

            Validate the MBAM Server configuration.

            -

            [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md)

            +

            Validating the MBAM 2.5 Server Feature Configuration

            -  + ## Related topics [Deploying MBAM 2.5](deploying-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/editing-the-mbam-25-group-policy-settings.md b/mdop/mbam-v25/editing-the-mbam-25-group-policy-settings.md index c9dc1731d9..8e285009f6 100644 --- a/mdop/mbam-v25/editing-the-mbam-25-group-policy-settings.md +++ b/mdop/mbam-v25/editing-the-mbam-25-group-policy-settings.md @@ -33,11 +33,11 @@ To successfully deploy Microsoft BitLocker Administration and Monitoring (MBAM),

            Copy the MBAM 2.5 Group Policy Templates.

            -

            [Copying the MBAM 2.5 Group Policy Templates](copying-the-mbam-25-group-policy-templates.md)

            +

            Copying the MBAM 2.5 Group Policy Templates

            Determine which Group Policy Objects (GPOs) you want to use in your MBAM implementation. Based on the needs of your organization, you might have to configure additional Group Policy settings.

            -

            [Planning for MBAM 2.5 Group Policy Requirements](planning-for-mbam-25-group-policy-requirements.md) – contains descriptions of the GPOs

            +

            Planning for MBAM 2.5 Group Policy Requirements – contains descriptions of the GPOs

            Set the Group Policy settings for your organization.

            @@ -46,12 +46,12 @@ To successfully deploy Microsoft BitLocker Administration and Monitoring (MBAM), -  + **Important**   Do not change the Group Policy settings in the **BitLocker Drive Encryption** node, or MBAM will not work correctly. When you configure the Group Policy settings in the **MDOP MBAM (BitLocker Management)** node, MBAM automatically configures the **BitLocker Drive Encryption** settings for you. -  + **To edit MBAM Client Group Policy settings** @@ -92,7 +92,7 @@ Do not change the Group Policy settings in the **BitLocker Drive Encryption** no -   + ## Related topics @@ -101,11 +101,11 @@ Do not change the Group Policy settings in the **BitLocker Drive Encryption** no [Copying the MBAM 2.5 Group Policy Templates](copying-the-mbam-25-group-policy-templates.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/evaluating-mbam-25-in-a-test-environment.md b/mdop/mbam-v25/evaluating-mbam-25-in-a-test-environment.md index ef05b1cfea..67c54060da 100644 --- a/mdop/mbam-v25/evaluating-mbam-25-in-a-test-environment.md +++ b/mdop/mbam-v25/evaluating-mbam-25-in-a-test-environment.md @@ -26,241 +26,240 @@ To evaluate MBAM by using the Stand-alone topology, use the information in the f **To evaluate MBAM 2.5 by using the Stand-alone topology** -1. Before installing MBAM, do the following: +1. Before installing MBAM, do the following: - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            [MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies](mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md)

            Check the required hardware, RAM, and other specifications.

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            Review the prerequisites for using Windows PowerShell if you plan to use the cmdlets to configure MBAM.

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies

            Check the required hardware, RAM, and other specifications.

            MBAM 2.5 Supported Configurations

            Review the prerequisites for using Windows PowerShell if you plan to use the cmdlets to configure MBAM.

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            -   -2. Install the MBAM Server software, and then configure the features you want. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            Configure the Compliance and Audit Database and the Recovery Database.

            [How to Configure the MBAM 2.5 Databases](how-to-configure-the-mbam-25-databases.md)

            Configure the Reports feature.

            [How to Configure the MBAM 2.5 Reports](how-to-configure-the-mbam-25-reports.md)

            Configure the web applications.

            [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md)

            +2. Install the MBAM Server software, and then configure the features you want. -   + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            Installing the MBAM 2.5 Server Software

            Configure the Compliance and Audit Database and the Recovery Database.

            How to Configure the MBAM 2.5 Databases

            Configure the Reports feature.

            How to Configure the MBAM 2.5 Reports

            Configure the web applications.

            How to Configure the MBAM 2.5 Web Applications

            -3. On a client computer, do the following: - 1. Install the MBAM Client on a client computer. - 2. Apply the MBAM Group Policy Objects (GPOs) to the computer. +3. On a client computer, do the following: - 3. Set the following registry keys to force the MBAM Client to wake up faster and at regular intervals: + 1. Install the MBAM Client on a client computer. - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement - "ClientWakeupFrequency"=dword:00000001 - "StatusReportingFrequency"=dword:00000001 - ``` + 2. Apply the MBAM Group Policy Objects (GPOs) to the computer. - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] - "NoStartupDelay"=dword:00000001 - ``` + 3. Set the following registry keys to force the MBAM Client to wake up faster and at regular intervals: - **Note**   - Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in a test environment. + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement + "ClientWakeupFrequency"=dword:00000001 + "StatusReportingFrequency"=dword:00000001 + ``` -   + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] + "NoStartupDelay"=dword:00000001 + ``` - 4. Restart the **BitLocker Management Client Service**. + **Note** + Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in a test environment. -## Evaluating MBAM 2.5 by using the System Center 2012 Configuration Manager Integration topology + + + 4. Restart the **BitLocker Management Client Service**. + +## Evaluating MBAM 2.5 by using the System Center 2012 Configuration Manager Integration topology To evaluate MBAM by using the Configuration Manager Integration topology, use the information in the following tables to install the MBAM Server software, and then configure the MBAM Server features in your test environment. After installing the MBAM Client on a client computer, you will complete additional steps to force the MBAM Client to report the computer’s status to MBAM more quickly. -**To evaluate MBAM 2.5 by using the System Center 2012 Configuration Manager Integration topology** +**To evaluate MBAM 2.5 by using the System Center 2012 Configuration Manager Integration topology** -1. Before installing MBAM, review the prerequisite software and supported configuration. +1. Before installing MBAM, review the prerequisite software and supported configuration. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            [MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies](mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md)

            -

            [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md)

            Check the required hardware, RAM, and other specifications.

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            Review the prerequisites for using Windows PowerShell if you plan to use the cmdlets to configure MBAM.

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            Create or edit the .mof files.

            [Edit the Configuration.mof File](edit-the-configurationmof-file-mbam-25.md)

            -

            [Create or Edit the Sms_def.mof File](create-or-edit-the-sms-defmof-file-mbam-25.md)

            - -   - -2. Install the MBAM Server software, and then configure the features you want. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            -
            - Note   -

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see [Data-tier Applications](https://technet.microsoft.com/library/ee210546.aspx).

            -
            -
            -   -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            Configure the Compliance and Audit Database and the Recovery Database.

            [How to Configure the MBAM 2.5 Databases](how-to-configure-the-mbam-25-databases.md)

            Configure the Reports feature.

            [How to Configure the MBAM 2.5 Reports](how-to-configure-the-mbam-25-reports.md)

            Configure the web applications.

            [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md)

            Configure the System Center Configuration Manager to install the Configuration Manager objects.

            [How to Configure the MBAM 2.5 System Center Configuration Manager Integration](how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md)

            - -   - -3. On a client computer, do the following: - - 1. Install the MBAM Client and the Configuration Manager Client on a client computer. - - 2. Apply the MBAM Group Policy Objects to the computer. - - 3. Set the following registry keys to force the MBAM Client to wake up faster and at regular intervals: - - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement - "ClientWakeupFrequency"=dword:00000001 - "StatusReportingFrequency"=dword:00000001 - ``` - - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] - "NoStartupDelay"=dword:00000001 - ``` - - **Note**   - Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in a test environment. - -   - - 4. Restart the **BitLocker Management Client Service**. - - 5. In Control Panel, open **Configuration Manager**, and then click the **Actions** tab. - - 6. Select **Hardware Inventory Cycle**, and then click **Run Now**. This step runs the hardware inventory by using the new classes that you imported to your .mof files, and then sends the data to the Configuration Manager server. - - 7. Select **Machine Policy Retrieval & Evaluation Cycle**, and then click **Run Now** to apply the Group Policy Objects that are relevant to that client computer. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies

            +

            MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology

            Check the required hardware, RAM, and other specifications.

            MBAM 2.5 Supported Configurations

            Review the prerequisites for using Windows PowerShell if you plan to use the cmdlets to configure MBAM.

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            Create or edit the .mof files.

            Edit the Configuration.mof File

            +

            Create or Edit the Sms_def.mof File

            -4. In the Configuration Manager console, do the following: +2. Install the MBAM Server software, and then configure the features you want. - 1. In the navigation pane, right-click **MBAM Supported Computers**, click **Update Membership**, and then click **Yes** to force the client computer to report its membership immediately. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            +
            + Note

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see Data-tier Applications.

            +
            +
            - 2. In the navigation pane, click **MBAM Supported Computers** to verify that the client computer appears in the collection. +

            Installing the MBAM 2.5 Server Software

            Configure the Compliance and Audit Database and the Recovery Database.

            How to Configure the MBAM 2.5 Databases

            Configure the Reports feature.

            How to Configure the MBAM 2.5 Reports

            Configure the web applications.

            How to Configure the MBAM 2.5 Web Applications

            Configure the System Center Configuration Manager to install the Configuration Manager objects.

            How to Configure the MBAM 2.5 System Center Configuration Manager Integration

            -5. On the client computer, in Control Panel, reopen **Configuration Manager** again, and do the following: - 1. Click the **Actions** tab, and then rerun **Machine Policy Retrieval & Evaluation Cycle**. - 2. Click the **Configurations** tab, select the BitLocker baseline, and then click **Evaluate**. +3. On a client computer, do the following: -6. In the Configuration Manager console, verify that the client computer appears on the Enterprise Compliance Report: as follows: + 1. Install the MBAM Client and the Configuration Manager Client on a client computer. - 1. In the navigation pane, select the **Monitoring** workspace. + 2. Apply the MBAM Group Policy Objects to the computer. - 2. In the console tree, expand **Overview** > **Reporting** > **Reports** > **MBAM**. + 3. Set the following registry keys to force the MBAM Client to wake up faster and at regular intervals: - 3. Select the folder that represents the language in which you want to view reports, and then select the report in the results pane. + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement + "ClientWakeupFrequency"=dword:00000001 + "StatusReportingFrequency"=dword:00000001 + ``` + + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] + "NoStartupDelay"=dword:00000001 + ``` + + **Note** + Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in a test environment. + + + + 4. Restart the **BitLocker Management Client Service**. + + 5. In Control Panel, open **Configuration Manager**, and then click the **Actions** tab. + + 6. Select **Hardware Inventory Cycle**, and then click **Run Now**. This step runs the hardware inventory by using the new classes that you imported to your .mof files, and then sends the data to the Configuration Manager server. + + 7. Select **Machine Policy Retrieval & Evaluation Cycle**, and then click **Run Now** to apply the Group Policy Objects that are relevant to that client computer. + + + +4. In the Configuration Manager console, do the following: + + 1. In the navigation pane, right-click **MBAM Supported Computers**, click **Update Membership**, and then click **Yes** to force the client computer to report its membership immediately. + + 2. In the navigation pane, click **MBAM Supported Computers** to verify that the client computer appears in the collection. + +5. On the client computer, in Control Panel, reopen **Configuration Manager** again, and do the following: + + 1. Click the **Actions** tab, and then rerun **Machine Policy Retrieval & Evaluation Cycle**. + + 2. Click the **Configurations** tab, select the BitLocker baseline, and then click **Evaluate**. + +6. In the Configuration Manager console, verify that the client computer appears on the Enterprise Compliance Report: as follows: + + 1. In the navigation pane, select the **Monitoring** workspace. + + 2. In the console tree, expand **Overview** > **Reporting** > **Reports** > **MBAM**. + + 3. Select the folder that represents the language in which you want to view reports, and then select the report in the results pane. ## Evaluating MBAM 2.5 by using the System Center Configuration Manager 2007 Integration topology @@ -269,134 +268,133 @@ To evaluate MBAM by using the Configuration Manager Integration topology, follow **To evaluate MBAM by using the Configuration Manager 2007 Integration topology** -1. Before you install MBAM, do the following: +1. Before you install MBAM, do the following: - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            [MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies](mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md)

            -

            [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md)

            Check the required hardware, RAM, and other specifications.

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            Create or edit the .mof files.

            [Edit the Configuration.mof File](edit-the-configurationmof-file-mbam-25.md)

            -

            [Create or Edit the Sms_def.mof File](create-or-edit-the-sms-defmof-file-mbam-25.md)

            + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Ensure that you have installed all of the prerequisite software.

            MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies

            +

            MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology

            Check the required hardware, RAM, and other specifications.

            MBAM 2.5 Supported Configurations

            Create or edit the .mof files.

            Edit the Configuration.mof File

            +

            Create or Edit the Sms_def.mof File

            -   -2. Install the MBAM Server software, and then configure the features you want. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            -
            - Note   -

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see [Data-tier Applications](https://technet.microsoft.com/library/ee210546.aspx).

            -
            -
            -   -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            Configure the Compliance and Audit Database and the Recovery Database.

            [How to Configure the MBAM 2.5 Databases](how-to-configure-the-mbam-25-databases.md)

            Configure the Reports feature.

            [How to Configure the MBAM 2.5 Reports](how-to-configure-the-mbam-25-reports.md)

            Configure the web applications.

            [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md)

            Configure the System Center Configuration Manager to install the Configuration Manager objects.

            [How to Configure the MBAM 2.5 System Center Configuration Manager Integration](how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md)

            +2. Install the MBAM Server software, and then configure the features you want. -   + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            TaskWhere to get instructions

            Install the MBAM Server software on each server where you want to configure an MBAM Server feature.

            +
            + Note

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see Data-tier Applications.

            +
            +
            -3. On a client computer, do the following: +

            Installing the MBAM 2.5 Server Software

            Configure the Compliance and Audit Database and the Recovery Database.

            How to Configure the MBAM 2.5 Databases

            Configure the Reports feature.

            How to Configure the MBAM 2.5 Reports

            Configure the web applications.

            How to Configure the MBAM 2.5 Web Applications

            Configure the System Center Configuration Manager to install the Configuration Manager objects.

            How to Configure the MBAM 2.5 System Center Configuration Manager Integration

            - 1. Install the MBAM Client on a client computer. - 2. Apply the MBAM Group Policy Objects to the computer. - 3. Set the following registry keys to force the MBAM Client to wake up more quickly and at faster intervals: +3. On a client computer, do the following: - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement - "ClientWakeupFrequency"=dword:00000001 - "StatusReportingFrequency"=dword:00000001 - ``` + 1. Install the MBAM Client on a client computer. - ``` syntax - [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] - "NoStartupDelay"=dword:00000001 - ``` + 2. Apply the MBAM Group Policy Objects to the computer. - **Note**   - Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in an evaluation environment. + 3. Set the following registry keys to force the MBAM Client to wake up more quickly and at faster intervals: -   + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement + "ClientWakeupFrequency"=dword:00000001 + "StatusReportingFrequency"=dword:00000001 + ``` - 4. Restart the **BitLocker Management Client Service**. + ``` syntax + [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM] + "NoStartupDelay"=dword:00000001 + ``` - 5. In Control Panel, open **Configuration Manager**, and then click the **Actions** tab. + **Note** + Because these keys wake up the MBAM Client every minute, we recommend that you use these registry key settings only in an evaluation environment. - 6. Select **Machine Policy Retrieval & Evaluation Cycle**, and then click **Run Now** to apply the Group Policy Objects that are relevant to that client computer. - 7. Select **Hardware Inventory Cycle**, and then click **Run Now**. This step runs the hardware inventory by using the new classes that you imported to your .mof files and then sends the data to the Configuration Manager server. -4. In the Configuration Manager console, do the following: + 4. Restart the **BitLocker Management Client Service**. - 1. In the navigation pane, right-click **MBAM Supported Computers**, click **Update Membership**, and then click **Yes** to force the client computer to report its membership immediately. + 5. In Control Panel, open **Configuration Manager**, and then click the **Actions** tab. - 2. In the navigation pane, click **MBAM Supported Computers** to verify that the client computer appears in the collection. + 6. Select **Machine Policy Retrieval & Evaluation Cycle**, and then click **Run Now** to apply the Group Policy Objects that are relevant to that client computer. -5. On the client computer, in Control Panel, reopen **Configuration Manager** again, and do the following: + 7. Select **Hardware Inventory Cycle**, and then click **Run Now**. This step runs the hardware inventory by using the new classes that you imported to your .mof files and then sends the data to the Configuration Manager server. - 1. Click the **Actions** tab, and then rerun **Machine Policy Retrieval & Evaluation Cycle**. +4. In the Configuration Manager console, do the following: - 2. Click the **Configurations** tab, select the BitLocker baseline, and click **Evaluate**. + 1. In the navigation pane, right-click **MBAM Supported Computers**, click **Update Membership**, and then click **Yes** to force the client computer to report its membership immediately. -6. In the Configuration Manager console, verify that the client computer appears on the Enterprise Compliance Report, as follows + 2. In the navigation pane, click **MBAM Supported Computers** to verify that the client computer appears in the collection. - 1. In the navigation pane, expand **Computer Management** > **Reporting** > **Reporting Services** > **<server name>MBAM**. +5. On the client computer, in Control Panel, reopen **Configuration Manager** again, and do the following: - 2. Within the **MBAM** node, select the folder that represents the language in which you want to view reports, and then select the report from the results pane. + 1. Click the **Actions** tab, and then rerun **Machine Policy Retrieval & Evaluation Cycle**. + + 2. Click the **Configurations** tab, select the BitLocker baseline, and click **Evaluate**. + +6. In the Configuration Manager console, verify that the client computer appears on the Enterprise Compliance Report, as follows + + 1. In the navigation pane, expand **Computer Management** > **Reporting** > **Reporting Services** > **<server name>MBAM**. + + 2. Within the **MBAM** node, select the folder that represents the language in which you want to view reports, and then select the report from the results pane. ## Related topics @@ -404,7 +402,7 @@ To evaluate MBAM by using the Configuration Manager Integration topology, follow [Getting Started with MBAM 2.5](getting-started-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/generating-mbam-25-stand-alone-reports.md b/mdop/mbam-v25/generating-mbam-25-stand-alone-reports.md index d14a28b305..9fe1680548 100644 --- a/mdop/mbam-v25/generating-mbam-25-stand-alone-reports.md +++ b/mdop/mbam-v25/generating-mbam-25-stand-alone-reports.md @@ -32,7 +32,7 @@ For descriptions of the Stand-alone reports, see [Understanding MBAM 2.5 Stand-a **Note**   To run the reports, you must be a member of the **MBAM Report Users** group, which you configure in Active Directory Domain Services. For more information, see [Planning for MBAM 2.5 Groups and Accounts](planning-for-mbam-25-groups-and-accounts.md). -  + **To open the Administration and Monitoring Website** @@ -49,7 +49,7 @@ To run the reports, you must be a member of the **MBAM Report Users** group, whi **Note**   Configure SQL Server Reporting Services (SSRS) to use Secure Sockets Layer (SSL) before configuring the Administration and Monitoring Website. If, for any reason, SSRS is not configured to use SSL, the URL for the Reports will be set to HTTP instead of to HTTPS when you configure the Administration and Monitoring Website. If you then go to the Administration and Monitoring Website and select a report, the following message displays: “Only Secure Content is Displayed.” To show the report, click **Show All Content**. -   + **To generate an Enterprise Compliance Report** @@ -105,7 +105,7 @@ To run the reports, you must be a member of the **MBAM Report Users** group, whi [Understanding MBAM 2.5 Stand-alone Reports](understanding-mbam-25-stand-alone-reports.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/getting-started-with-mbam-25.md b/mdop/mbam-v25/getting-started-with-mbam-25.md index 8573805e6d..27038fd66a 100644 --- a/mdop/mbam-v25/getting-started-with-mbam-25.md +++ b/mdop/mbam-v25/getting-started-with-mbam-25.md @@ -44,32 +44,32 @@ Before you start planning your MBAM deployment, review the following topics.

            High-level overview of MBAM 2.5 that describes how you can use it in your organization.

            -

            [About MBAM 2.5](about-mbam-25.md)

            +

            About MBAM 2.5

            Release notes, which lists known issues in the product.

            -

            [Release Notes for MBAM 2.5](release-notes-for-mbam-25.md)

            +

            Release Notes for MBAM 2.5

            Information about how you can evaluate MBAM 2.5 in a test environment.

            -

            [Evaluating MBAM 2.5 in a Test Environment](evaluating-mbam-25-in-a-test-environment.md)

            +

            Evaluating MBAM 2.5 in a Test Environment

            Description of the MBAM 2.5 features and the recommended architecture of the Stand-alone and Configuration Manager Integration topologies in a production environment.

            -

            [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

            +

            High-Level Architecture for MBAM 2.5

            Description and illustration of each MBAM Server feature, without the recommended architecture.

            -

            [Illustrated Features of an MBAM 2.5 Deployment](illustrated-features-of-an-mbam-25-deployment.md)

            +

            Illustrated Features of an MBAM 2.5 Deployment

            Describes the keyboard shortcuts that are available for MBAM 2.5.

            -

            [Accessibility for MBAM 2.5](accessibility-for-mbam-25.md)

            +

            Accessibility for MBAM 2.5

            -  + ## How to get MDOP technologies @@ -95,9 +95,9 @@ MBAM 2.5 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is pa - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + -  + diff --git a/mdop/mbam-v25/hiding-the-default-bitlocker-drive-encryption-item-in-control-panel-mbam-25.md b/mdop/mbam-v25/hiding-the-default-bitlocker-drive-encryption-item-in-control-panel-mbam-25.md index c64a5d7e90..5ef9f09421 100644 --- a/mdop/mbam-v25/hiding-the-default-bitlocker-drive-encryption-item-in-control-panel-mbam-25.md +++ b/mdop/mbam-v25/hiding-the-default-bitlocker-drive-encryption-item-in-control-panel-mbam-25.md @@ -22,7 +22,7 @@ This topic describes how to hide the **BitLocker Drive Encryption** Control Pane **Note**   Microsoft BitLocker Administration and Monitoring (MBAM) creates an additional, custom Control Panel item, called **BitLocker Encryption Options**, which enables end users to manage their PIN and password, turn on BitLocker for a drive, and check encryption. -  + See [Understanding the BitLocker Encryption Options and BitLocker Drive Encryption Items in Control Panel](understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md) to read about: @@ -33,7 +33,7 @@ See [Understanding the BitLocker Encryption Options and BitLocker Drive Encrypti **Important**   Do not change the Group Policy settings in the **BitLocker Drive Encryption** node. If you do, MBAM will not work correctly. When you configure the Group Policy settings in the **MDOP MBAM (BitLocker Management)** node, MBAM automatically configures the **BitLocker Drive Encryption** settings for you. -  + **To hide the default BitLocker Drive Encryption item in Control Panel** @@ -52,7 +52,7 @@ Do not change the Group Policy settings in the **BitLocker Drive Encryption** no [Deploying MBAM 2.5 Group Policy Objects](deploying-mbam-25-group-policy-objects.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md b/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md index 175d4ccc4c..3f47fccbd0 100644 --- a/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md +++ b/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md @@ -23,7 +23,7 @@ For a list of the supported versions of the software mentioned in this topic, se **Important**   Windows To Go is not supported for the Configuration Manager Integration topology installation when you are using Configuration Manager 2007. -  + ## Recommended number of servers and supported number of clients @@ -54,7 +54,7 @@ The recommended number of servers and supported number of clients in a productio -  + ## Differences between Configuration Manager Integration and stand-alone topologies @@ -130,7 +130,7 @@ The **monitoring web services** are used by the MBAM Client and the websites to **Important**
            The Monitoring Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1 since the MBAM websites communicate directly with the Recovery Database. -  + ### Management workstation @@ -142,7 +142,7 @@ The **monitoring web services** are used by the MBAM Client and the websites to **NOTE**
            The workstation does not have to be a dedicated computer. -   + ### MBAM Client and Configuration Manager Client computer @@ -160,7 +160,7 @@ The **MBAM Client**: The **Configuration Manager Client** enables Configuration Manager to collect hardware compatibility data about the client computers and report compliance information. -  + ## Differences in MBAM deployment for supported Configuration Manager versions @@ -193,7 +193,7 @@ When you deploy MBAM with the Configuration Manager Integration topology, you ca -  + ## How MBAM works with Configuration Manager @@ -273,7 +273,7 @@ The integration of MBAM with Configuration Manager is based on a configuration p -  + ## Related topics @@ -285,9 +285,9 @@ The integration of MBAM with Configuration Manager is based on a configuration p [Illustrated Features of an MBAM 2.5 Deployment](illustrated-features-of-an-mbam-25-deployment.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-stand-alone-topology.md b/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-stand-alone-topology.md index f60664557b..48a70ddaaa 100644 --- a/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-stand-alone-topology.md +++ b/mdop/mbam-v25/high-level-architecture-of-mbam-25-with-stand-alone-topology.md @@ -24,7 +24,7 @@ For a list of the supported versions of the software mentioned in this topic, se **Note**   We recommend you use a single-server architecture in test environments only. -  + ## Recommended number of servers and supported number of clients @@ -55,7 +55,7 @@ The recommended number of servers and supported number of clients in a productio -  + ## Recommended MBAM high-level architecture with the Stand-alone topology @@ -114,7 +114,7 @@ The **monitoring web services** are used by the MBAM Client and the websites to **Important**   The Monitoring Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1 since the MBAM websites communicate directly with the Recovery Database. -  + Management workstation @@ -149,7 +149,7 @@ The MBAM Client: [Illustrated Features of an MBAM 2.5 Deployment](illustrated-features-of-an-mbam-25-deployment.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-configure-the-mbam-25-databases.md b/mdop/mbam-v25/how-to-configure-the-mbam-25-databases.md index a6201dae45..1c818b89dc 100644 --- a/mdop/mbam-v25/how-to-configure-the-mbam-25-databases.md +++ b/mdop/mbam-v25/how-to-configure-the-mbam-25-databases.md @@ -41,38 +41,37 @@ The instructions are based on the recommended architecture in [High-Level Archit

            Review the recommended architecture for MBAM.

            -

            [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

            +

            High-Level Architecture for MBAM 2.5

            Review the supported configurations for MBAM.

            -

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            +

            MBAM 2.5 Supported Configurations

            Complete the required prerequisites on each server.

            Install the MBAM Server software on each server where you plan to configure an MBAM Server feature.

            -Note   -

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see [Data-tier Applications](https://technet.microsoft.com/library/ee210546.aspx).

            +Note

            You can install the databases to a remote SQL Server computer by using Windows PowerShell or an exported data-tier application (DAC) package. For more information about DAC packages, see Data-tier Applications.

            -  +
            -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            +

            Installing the MBAM 2.5 Server Software

            Review the prerequisites for using Windows PowerShell if you plan to use Windows PowerShell cmdlets to configure MBAM Server features.

            -

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            +

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            -  + **To configure the databases by using Windows PowerShell** @@ -82,138 +81,134 @@ The instructions are based on the recommended architecture in [High-Level Archit **To configure the Compliance and Audit Database by using the wizard** -1. On the server where you want to configure the databases, start the **MBAM Server Configuration** wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. +1. On the server where you want to configure the databases, start the **MBAM Server Configuration** wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. -2. Click **Add New Features**, select **Compliance and Audit Database** and **Recovery Database**, and then click **Next**. The wizard checks that all prerequisites for the databases have been met. +2. Click **Add New Features**, select **Compliance and Audit Database** and **Recovery Database**, and then click **Next**. The wizard checks that all prerequisites for the databases have been met. -3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Check prerequisites again**. +3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Check prerequisites again**. -4. Using the following descriptions, enter the field values in the wizard: +4. Using the following descriptions, enter the field values in the wizard: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            SQL Server name

            Name of the server where you are configuring the Compliance and Audit Database.

            -
            - Note   -

            You must add an exception on the Compliance and Audit Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433.

            -
            -
            -   -

            SQL Server database instance

            Name of the database instance where the compliance and audit data will be stored. You must also specify where the database information will be located.

            Database name

            Name of the database that will store the compliance data.

            -
            - Note   -

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name that was used in your previous deployment.

            -
            -
            -   -

            Read/write access domain user or group

            Domain user or group that has read/write permission to this database to enable the web applications to access the data and reports in this database.

            -

            If you enter a user in this field, it must be the same value as the value in the Web service application pool domain account field on the Configure Web Applications page.

            -

            If you enter a group in this field, the value in the Web service application pool domain account field on the Configure Web Applications page must be a member of the group you enter in this field.

            Read-only access domain user or group

            Name of the user or group that will have read-only permission to this database to enable the reports to access the compliance data in this database.

            -

            If you enter a user in this field, it must be the same user as the one you specify in the Compliance and Audit Database domain account field on the Configure Reports page.

            -

            If you enter a group in this field, the value that you specify in the Compliance and Audit Database domain account field on the Configure Reports page must be a member of the group that you specify in this field.

            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            SQL Server name

            Name of the server where you are configuring the Compliance and Audit Database.

            +
            + Note

            You must add an exception on the Compliance and Audit Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433.

            +
            +
            -   +

            SQL Server database instance

            Name of the database instance where the compliance and audit data will be stored. You must also specify where the database information will be located.

            Database name

            Name of the database that will store the compliance data.

            +
            + Note

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name that was used in your previous deployment.

            +
            +
            -5. Continue to the next section to configure the Recovery Database. +

            Read/write access domain user or group

            Domain user or group that has read/write permission to this database to enable the web applications to access the data and reports in this database.

            +

            If you enter a user in this field, it must be the same value as the value in the Web service application pool domain account field on the Configure Web Applications page.

            +

            If you enter a group in this field, the value in the Web service application pool domain account field on the Configure Web Applications page must be a member of the group you enter in this field.

            Read-only access domain user or group

            Name of the user or group that will have read-only permission to this database to enable the reports to access the compliance data in this database.

            +

            If you enter a user in this field, it must be the same user as the one you specify in the Compliance and Audit Database domain account field on the Configure Reports page.

            +

            If you enter a group in this field, the value that you specify in the Compliance and Audit Database domain account field on the Configure Reports page must be a member of the group that you specify in this field.

            + + + +5. Continue to the next section to configure the Recovery Database. **To configure the Recovery Database by using the wizard** -1. Using the following descriptions, enter the field values in the wizard: +1. Using the following descriptions, enter the field values in the wizard: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            SQL Server name

            Name of the server where you are configuring the Recovery Database.

            -
            - Note   -

            You must add an exception on the Recovery Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433.

            -
            -
            -   -

            SQL Server database instance

            Name of the database instance where the recovery data will be stored. You must also specify where the database information will be located.

            Database name

            Name of the database that will store the recovery data.

            -
            - Note   -

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name that was used in your previous deployment.

            -
            -
            -   -

            Read/write access domain user or group

            Domain user or group that has read/write permission to this database to enable the web applications to access the data and reports in this database.

            -

            If you enter a user in this field, it must be the same value as the value in the Web service application pool domain account field on the Configure Web Applications page.

            -

            If you enter a group in this field, the value in the Web service application pool domain account field on the Configure Web Applications page must be a member of the group you enter in this field.

            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            SQL Server name

            Name of the server where you are configuring the Recovery Database.

            +
            + Note

            You must add an exception on the Recovery Database computer to enable inbound traffic on the Microsoft SQL Server port. The default port number is 1433.

            +
            +
            -   +

            SQL Server database instance

            Name of the database instance where the recovery data will be stored. You must also specify where the database information will be located.

            Database name

            Name of the database that will store the recovery data.

            +
            + Note

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name that was used in your previous deployment.

            +
            +
            -2. When you finish your entries, click **Next**. +

            Read/write access domain user or group

            Domain user or group that has read/write permission to this database to enable the web applications to access the data and reports in this database.

            +

            If you enter a user in this field, it must be the same value as the value in the Web service application pool domain account field on the Configure Web Applications page.

            +

            If you enter a group in this field, the value in the Web service application pool domain account field on the Configure Web Applications page must be a member of the group you enter in this field.

            - The wizard checks that all prerequisites for the databases have been met. -3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Next** again. -4. On the **Summary** page, review the features that will be added. +2. When you finish your entries, click **Next**. - **Note**   - To create a Windows PowerShell script of the entries that you just made, click **Export PowerShell Script**, and then save the script. + The wizard checks that all prerequisites for the databases have been met. -   +3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Next** again. -5. Click **Add** to add the MBAM databases on the server, and then click **Close**. +4. On the **Summary** page, review the features that will be added. + + **Note** + To create a Windows PowerShell script of the entries that you just made, click **Export PowerShell Script**, and then save the script. + + + +5. Click **Add** to add the MBAM databases on the server, and then click **Close**. @@ -230,11 +225,11 @@ The instructions are based on the recommended architecture in [High-Level Archit [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-configure-the-mbam-25-reports.md b/mdop/mbam-v25/how-to-configure-the-mbam-25-reports.md index fb5bff9f6b..b76b25843c 100644 --- a/mdop/mbam-v25/how-to-configure-the-mbam-25-reports.md +++ b/mdop/mbam-v25/how-to-configure-the-mbam-25-reports.md @@ -41,31 +41,31 @@ The instructions are based on the recommended architecture in [High-Level Archit

            Review the recommended architecture for MBAM.

            -

            [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

            +

            High-Level Architecture for MBAM 2.5

            Review the supported configurations for MBAM.

            -

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            +

            MBAM 2.5 Supported Configurations

            Complete the required prerequisites on each server.

            Install the MBAM Server software on each server where you plan to configure an MBAM Server feature.

            -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            +

            Installing the MBAM 2.5 Server Software

            Review the prerequisites for using Windows PowerShell if you plan to use Windows PowerShell cmdlets to configure MBAM Server features.

            -

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            +

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            -  + **To configure the Reports by using Windows PowerShell** @@ -75,86 +75,84 @@ The instructions are based on the recommended architecture in [High-Level Archit **To configure the Reports by using the wizard** -1. On the server where you want to configure the Reports, start the **MBAM Server Configuration** wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. +1. On the server where you want to configure the Reports, start the **MBAM Server Configuration** wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. -2. Click **Add New Features**, select **Reports**, and then click **Next**. The wizard checks that all prerequisites for the Reports have been met. +2. Click **Add New Features**, select **Reports**, and then click **Next**. The wizard checks that all prerequisites for the Reports have been met. -3. Click **Next** to continue. +3. Click **Next** to continue. -4. Using the following descriptions, enter the field values in the wizard: +4. Using the following descriptions, enter the field values in the wizard: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            SQL Server Reporting Services instance

            Instance of SQL Server Reporting Services where the Reports will be configured.

            Reporting role domain group

            Name of the domain Users group whose members have rights to access the reports on the Administration and Monitoring Server.

            SQL Server name

            Name of the server where the Compliance and Audit Database is configured.

            SQL Server database instance

            Name of the instance of SQL Server (for example, MSSQLSERVER) where the Compliance and Audit Database is configured.

            -
            - Note   -

            You must add an exception on the Reports computer to enable inbound traffic on the port of the Reporting Server (the default port is 80).

            -
            -
            -   -

            Database name

            Name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status, although you can change the name when you configure the Compliance and Audit Database.

            -
            - Note   -

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name used in your previous deployment.

            -
            -
            -   -

            Compliance and Audit Database domain account

            Domain user account and password to access the Compliance and Audit Database.

            -

            If the value you enter in the Read-only access domain user or group field on the Configure Databases page is a user, you must enter that same value in this field.

            -

            If the value that you enter in the Read-only access domain user or group field on the Configure Databases page is a group, the value that you enter in this field must be a member of that group.

            -

            Configure the password for this account to never expire. The user account should be able to access all data that is available to the MBAM Reports Users group.

            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            SQL Server Reporting Services instance

            Instance of SQL Server Reporting Services where the Reports will be configured.

            Reporting role domain group

            Name of the domain Users group whose members have rights to access the reports on the Administration and Monitoring Server.

            SQL Server name

            Name of the server where the Compliance and Audit Database is configured.

            SQL Server database instance

            Name of the instance of SQL Server (for example, MSSQLSERVER) where the Compliance and Audit Database is configured.

            +
            + Note

            You must add an exception on the Reports computer to enable inbound traffic on the port of the Reporting Server (the default port is 80).

            +
            +
            -   +

            Database name

            Name of the Compliance and Audit Database. By default, the database name is MBAM Compliance Status, although you can change the name when you configure the Compliance and Audit Database.

            +
            + Note

            If you are upgrading from a previous version of MBAM, you must use the same database name as the name used in your previous deployment.

            +
            +
            -5. When you finish your entries, click **Next**. +

            Compliance and Audit Database domain account

            Domain user account and password to access the Compliance and Audit Database.

            +

            If the value you enter in the Read-only access domain user or group field on the Configure Databases page is a user, you must enter that same value in this field.

            +

            If the value that you enter in the Read-only access domain user or group field on the Configure Databases page is a group, the value that you enter in this field must be a member of that group.

            +

            Configure the password for this account to never expire. The user account should be able to access all data that is available to the MBAM Reports Users group.

            - The wizard checks that all prerequisites for the Reports feature have been met. -6. Click **Next** to continue. -7. On the **Summary** page, review the features that will be added. +5. When you finish your entries, click **Next**. - **Note**   - To create a Windows PowerShell script of the entries that you just made, click **Export PowerShell Script**, and then save the script. + The wizard checks that all prerequisites for the Reports feature have been met. -   +6. Click **Next** to continue. -8. Click **Add** to add the Reports on the server, and then click **Close**. +7. On the **Summary** page, review the features that will be added. + + **Note** + To create a Windows PowerShell script of the entries that you just made, click **Export PowerShell Script**, and then save the script. + + + +8. Click **Add** to add the Reports on the server, and then click **Close**. @@ -169,11 +167,11 @@ The instructions are based on the recommended architecture in [High-Level Archit [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md b/mdop/mbam-v25/how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md index b6785d8f0d..38766dc323 100644 --- a/mdop/mbam-v25/how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md +++ b/mdop/mbam-v25/how-to-configure-the-mbam-25-system-center-configuration-manager-integration.md @@ -43,38 +43,37 @@ The instructions are based on the recommended architecture in [High-Level Archit

            Review the recommended architecture for MBAM.

            -

            [High-Level Architecture of MBAM 2.5 with Configuration Manager Integration Topology](high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md)

            +

            High-Level Architecture of MBAM 2.5 with Configuration Manager Integration Topology

            Review the supported configurations for MBAM.

            -

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            +

            MBAM 2.5 Supported Configurations

            Complete the required prerequisites on each server.

            Install the MBAM Server software on each server where you will configure an MBAM Server feature.

            -Note   -

            For this topology, you must install the Configuration Manager console on the computer where you are installing the MBAM Server software.

            +Note

            For this topology, you must install the Configuration Manager console on the computer where you are installing the MBAM Server software.

            -  +
            -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            +

            Installing the MBAM 2.5 Server Software

            Review Windows PowerShell prerequisites (applicable only if you are going to use Windows PowerShell cmdlets to configure MBAM).

            -

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            +

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            -  + **To configure Configuration Manager Integration by using Windows PowerShell** @@ -119,14 +118,14 @@ The instructions are based on the recommended architecture in [High-Level Archit -   + 5. On the **Summary** page, review the features that will be added. - **Note**   + **Note** To create a Windows PowerShell script of the entries you just made, click **Export PowerShell Script** and save the script. -   + 6. Click **Add** to add the Configuration Manager Integration feature to the server, and then click **Close**. @@ -139,11 +138,11 @@ The instructions are based on the recommended architecture in [High-Level Archit [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/how-to-configure-the-mbam-25-web-applications.md b/mdop/mbam-v25/how-to-configure-the-mbam-25-web-applications.md index b9681dcec1..dba8888b3b 100644 --- a/mdop/mbam-v25/how-to-configure-the-mbam-25-web-applications.md +++ b/mdop/mbam-v25/how-to-configure-the-mbam-25-web-applications.md @@ -48,7 +48,7 @@ The web applications comprise the following websites and their corresponding web -  + **Before you start the configuration:** @@ -66,49 +66,47 @@ The web applications comprise the following websites and their corresponding web

            Review the recommended architecture for MBAM.

            -

            [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

            +

            High-Level Architecture for MBAM 2.5

            Review the supported configurations for MBAM.

            -

            [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

            +

            MBAM 2.5 Supported Configurations

            Complete the required prerequisites on each server.

            -Note   -

            Ensure that you configure SQL ServerReporting Services (SSRS) to use the Secure Sockets Layer (SSL) before you configure the Administration and Monitoring Website. Otherwise, the Reports feature will use HTTP instead of HTTPS.

            +Note

            Ensure that you configure SQL ServerReporting Services (SSRS) to use the Secure Sockets Layer (SSL) before you configure the Administration and Monitoring Website. Otherwise, the Reports feature will use HTTP instead of HTTPS.

            -  +

            Register service principal names (SPNs) for the application pool account for the websites. You need to do this step only if you do not have administrative domain rights in Active Directory Domain Services (AD DS). If you do have these rights in AD DS, MBAM will create the SPNs for you.

            -

            [Planning How to Secure the MBAM Websites](planning-how-to-secure-the-mbam-websites.md#bkmk-regvirtualspn)

            +

            Planning How to Secure the MBAM Websites

            Install the MBAM Server software on each server where you will configure an MBAM Server feature.

            -Note   -

            If you plan to install the websites on one server and the web services on another, you will be able to configure them only by using the Enable-MbamWebApplication Windows PowerShell cmdlet. The MBAM Server Configuration wizard does not support configuring these items on separate servers.

            +Note

            If you plan to install the websites on one server and the web services on another, you will be able to configure them only by using the Enable-MbamWebApplication Windows PowerShell cmdlet. The MBAM Server Configuration wizard does not support configuring these items on separate servers.

            -  +
            -

            [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

            +

            Installing the MBAM 2.5 Server Software

            Review the prerequisites for using Windows PowerShell if you plan to use cmdlets to configure MBAM Server features.

            -

            [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

            +

            Configuring MBAM 2.5 Server Features by Using Windows PowerShell

            -  + **To configure the web applications by using Windows PowerShell** @@ -118,71 +116,69 @@ The web applications comprise the following websites and their corresponding web **To configure the settings for all web applications using the wizard** -1. On the server where you want to configure the web applications, start the MBAM Server Configuration wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. +1. On the server where you want to configure the web applications, start the MBAM Server Configuration wizard. You can select **MBAM Server Configuration** from the **Start** menu to open the wizard. -2. Click **Add New Features**, select **Administration and Monitoring Website** and **Self-Service Portal**, and then click **Next**. The wizard checks that all prerequisites for the web applications have been met. +2. Click **Add New Features**, select **Administration and Monitoring Website** and **Self-Service Portal**, and then click **Next**. The wizard checks that all prerequisites for the web applications have been met. -3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Check prerequisites again**. +3. If the prerequisite check is successful, click **Next** to continue. Otherwise, resolve any missing prerequisites, and then click **Check prerequisites again**. -4. Use the following descriptions to enter the field values in the wizard. +4. Use the following descriptions to enter the field values in the wizard. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            Security certificate

            Select a previously created certificate to optionally encrypt the communication between the web services and the server on which you are configuring the websites. If you choose Do not use a certificate, your web communication may not be secure.

            Host name

            Name of the host computer where you are configuring the websites.

            Installation path

            Path where you are installing the websites.

            Port

            Port number to use for website and service communication.

            -
            - Note   -

            You must set a firewall exception to enable communication through the specified port.

            -
            -
            -   -

            Web service application pool domain account and password

            Domain user account and password for the web service application pool.

            -

            If you enter a user name in the Read/write access domain user or group field on the Configure Databases page, you must enter that same value in this field.

            -

            If you enter a group name in the Read/write access domain user or group field on the Configure Databases page, the value you enter in this field must be a member of that group.

            -

            If you do not specify credentials, the credentials that were specified for any previously enabled web application will be used. All web applications must use the same application pool credentials. If you specify different credentials for different web applications, the most recently specified value will be used.

            -
            - Important   -

            For improved security, set the account that is specified in the credentials to have limited user rights. Also, set the password of the account to never expire.

            -
            -
            -   -
            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            Security certificate

            Select a previously created certificate to optionally encrypt the communication between the web services and the server on which you are configuring the websites. If you choose Do not use a certificate, your web communication may not be secure.

            Host name

            Name of the host computer where you are configuring the websites.

            Installation path

            Path where you are installing the websites.

            Port

            Port number to use for website and service communication.

            +
            + Note

            You must set a firewall exception to enable communication through the specified port.

            +
            +
            -   +

            Web service application pool domain account and password

            Domain user account and password for the web service application pool.

            +

            If you enter a user name in the Read/write access domain user or group field on the Configure Databases page, you must enter that same value in this field.

            +

            If you enter a group name in the Read/write access domain user or group field on the Configure Databases page, the value you enter in this field must be a member of that group.

            +

            If you do not specify credentials, the credentials that were specified for any previously enabled web application will be used. All web applications must use the same application pool credentials. If you specify different credentials for different web applications, the most recently specified value will be used.

            +
            + Important

            For improved security, set the account that is specified in the credentials to have limited user rights. Also, set the password of the account to never expire.

            +
            +
            -5. Verify that the built-in IIS\_IUSRS account or the application pool account has been added to the **Impersonate a client after authentication** and the **Log on as a batch job** local security settings. +
            - To check whether it has been added to the local security settings, open the **Local Security Policy editor**, expand the **Local Policies** node, click the **User Rights Assignment** node, and double-click **Impersonate a client after authentication** and **Log on as a batch job** policies in the right pane. + + +5. Verify that the built-in IIS\_IUSRS account or the application pool account has been added to the **Impersonate a client after authentication** and the **Log on as a batch job** local security settings. + + To check whether it has been added to the local security settings, open the **Local Security Policy editor**, expand the **Local Policies** node, click the **User Rights Assignment** node, and double-click **Impersonate a client after authentication** and **Log on as a batch job** policies in the right pane. **To configure connection information for the databases by using the wizard** @@ -215,7 +211,7 @@ The web applications comprise the following websites and their corresponding web -   + 2. Use the following field descriptions to configure the connection information in the wizard for the Recovery Database. @@ -246,157 +242,157 @@ The web applications comprise the following websites and their corresponding web -   + **To configure the web applications by using the wizard** -1. Use the following descriptions to enter the field values in the wizard to configure the Administration and Monitoring Website. +1. Use the following descriptions to enter the field values in the wizard to configure the Administration and Monitoring Website. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            Advanced Helpdesk role domain group

            Domain user group whose members have access to all areas of the Administration and Monitoring Website except the Reports area.

            Helpdesk role domain group

            Domain user group whose members have access to the Manage TPM and Drive Recovery areas of the Administration and Monitoring Website.

            Use System Center Configuration Manager Integration

            Select this check box if you are configuring MBAM with the Configuration Manager Integration topology. Selecting this check box makes all reports, except the Recovery Audit report, appear in Configuration Manager instead of in the Administration and Monitoring Website.

            Reporting role domain group

            Domain user group whose members have read-only access to the Reports area of the Administration and Monitoring Website.

            SQL Server Reporting Services URL

            URL for the SSRS server where the MBAM Reports are configured.

            -

            Examples of report URLs:

            - - - - - - - - - - - - - - - - - - - - - -
            Type of host nameExample

            Example with a fully qualified domain name

            https://MyReportServer.Contoso.com/ReportServer

            Example with a custom host name

            https://MyReportServer/ReportServer

            -

             

            Virtual directory

            Virtual directory of the Administration and Monitoring Website. This name corresponds to the website’s physical directory on the server and is appended to the website’s host name, for example:

            -

            http(s)://<hostname>:<port>/HelpDesk/

            -

            If you do not specify a virtual directory, the value HelpDesk will be used.

            Data Migration role domain group (optional)

            Domain user group whose members have access to use the Write-Mbam*Information Cmdlets to write recovery information via this endpoint.

            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            Advanced Helpdesk role domain group

            Domain user group whose members have access to all areas of the Administration and Monitoring Website except the Reports area.

            Helpdesk role domain group

            Domain user group whose members have access to the Manage TPM and Drive Recovery areas of the Administration and Monitoring Website.

            Use System Center Configuration Manager Integration

            Select this check box if you are configuring MBAM with the Configuration Manager Integration topology. Selecting this check box makes all reports, except the Recovery Audit report, appear in Configuration Manager instead of in the Administration and Monitoring Website.

            Reporting role domain group

            Domain user group whose members have read-only access to the Reports area of the Administration and Monitoring Website.

            SQL Server Reporting Services URL

            URL for the SSRS server where the MBAM Reports are configured.

            +

            Examples of report URLs:

            + + + + + + + + + + + + + + + + + + + + + +
            Type of host nameExample

            Example with a fully qualified domain name

            https://MyReportServer.Contoso.com/ReportServer

            Example with a custom host name

            https://MyReportServer/ReportServer

            +

            Virtual directory

            Virtual directory of the Administration and Monitoring Website. This name corresponds to the website’s physical directory on the server and is appended to the website’s host name, for example:

            +

            http(s)://<hostname>:<port>/HelpDesk/

            +

            If you do not specify a virtual directory, the value HelpDesk will be used.

            Data Migration role domain group (optional)

            Domain user group whose members have access to use the Write-Mbam*Information Cmdlets to write recovery information via this endpoint.

            -   -2. Use the following description to enter the field values in the wizard to configure the Self-Service Portal. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            FieldDescription

            Virtual directory

            Virtual directory of the web application. This name corresponds to the website’s physical directory on the server, and is appended to the website’s host name, for example:

            -

            http(s)://<hostname>:<port>/SelfService/

            -

            If you do not specify a virtual directory, the value SelfService will be used.

            Company name

            Specify a company name for the Self-Service Portal, for example:

            -

            Contoso IT

            -

            This company name is viewed by all Self-Service Portal users.

            Helpdesk URL text

            Specify a text statement that directs users to your organization's Helpdesk website, for example:

            -

            Contact Helpdesk or IT department

            Helpdesk URL

            Specify the URL for your organization's Helpdesk website, for example:

            -

            http(s)://<companyHelpdeskURL>/

            Notice text file

            Select a file that contains the notice you want displayed to users on the Self-Service Portal landing page.

            Do not display notice text to users

            Select this check box to specify that the notice text is not displayed to users.

            +2. Use the following description to enter the field values in the wizard to configure the Self-Service Portal. -   + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            FieldDescription

            Virtual directory

            Virtual directory of the web application. This name corresponds to the website’s physical directory on the server, and is appended to the website’s host name, for example:

            +

            http(s)://<hostname>:<port>/SelfService/

            +

            If you do not specify a virtual directory, the value SelfService will be used.

            Company name

            Specify a company name for the Self-Service Portal, for example:

            +

            Contoso IT

            +

            This company name is viewed by all Self-Service Portal users.

            Helpdesk URL text

            Specify a text statement that directs users to your organization's Helpdesk website, for example:

            +

            Contact Helpdesk or IT department

            Helpdesk URL

            Specify the URL for your organization's Helpdesk website, for example:

            +

            http(s)://<companyHelpdeskURL>/

            Notice text file

            Select a file that contains the notice you want displayed to users on the Self-Service Portal landing page.

            Do not display notice text to users

            Select this check box to specify that the notice text is not displayed to users.

            -3. When you finish your entries, click **Next**. - The wizard checks that all prerequisites for the web applications have been met. -4. Click **Next** to continue. +3. When you finish your entries, click **Next**. -5. On the **Summary** page, review the features that will be added. + The wizard checks that all prerequisites for the web applications have been met. - **Note**   - To create a Windows PowerShell script for the entries you made, click **Export PowerShell Script** and save the script. +4. Click **Next** to continue. -   +5. On the **Summary** page, review the features that will be added. -6. Click **Add** to add the web applications to the server, and then click **Close**. + **Note** + To create a Windows PowerShell script for the entries you made, click **Export PowerShell Script** and save the script. - To customize the Self-Service Portal by adding custom notice text, your company name, pointers to more information, and so on, see [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md). + + +6. Click **Add** to add the web applications to the server, and then click **Close**. + + To customize the Self-Service Portal by adding custom notice text, your company name, pointers to more information, and so on, see [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md). **To configure the Self-Service Portal if client computers cannot access the CDN** 1. Determine whether you are running Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1. If so, do nothing. Your Self-Service Portal configuration is complete. - **Note**   + **Note** Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1 installs the JavaScript files in setup, and so does not need to be connected to the Microsoft Ajax Content Delivery Network in order to configure the Self-Service Portal. The following steps are necessary only if you are using a version of Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 previous to SP1. -   + 2. Determine if your client computers have access to the Microsoft Ajax Content Delivery Network (CDN). @@ -422,11 +418,11 @@ The web applications comprise the following websites and their corresponding web [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-configure-the-self-service-portal-when-client-computers-cannot-access-the-microsoft-content-delivery-network.md b/mdop/mbam-v25/how-to-configure-the-self-service-portal-when-client-computers-cannot-access-the-microsoft-content-delivery-network.md index e12f8ba900..c187bc1e3c 100644 --- a/mdop/mbam-v25/how-to-configure-the-self-service-portal-when-client-computers-cannot-access-the-microsoft-content-delivery-network.md +++ b/mdop/mbam-v25/how-to-configure-the-self-service-portal-when-client-computers-cannot-access-the-microsoft-content-delivery-network.md @@ -26,38 +26,38 @@ Your client computers need access to the CDN, which gives the Self-Service Porta **Note**   In MBAM 2.5 SP1, the JavaScript files are included in the product, and you do not need to follow the instructions in this section to configure the SSP to support clients that cannot access the internet. -  + **How to configure the Self-Service Portal when client computers cannot access the CDN** -1. Download the following JavaScript files from the CDN: +1. Download the following JavaScript files from the CDN: - - [jQuery-1.10.2.min.js](https://go.microsoft.com/fwlink/?LinkID=390515) + - [jQuery-1.10.2.min.js](https://go.microsoft.com/fwlink/?LinkID=390515) - - [jQuery.validate.min.js](https://go.microsoft.com/fwlink/?LinkID=390516) + - [jQuery.validate.min.js](https://go.microsoft.com/fwlink/?LinkID=390516) - - [jQuery.validate.unobtrusive.min.js](https://go.microsoft.com/fwlink/?LinkID=390517) + - [jQuery.validate.unobtrusive.min.js](https://go.microsoft.com/fwlink/?LinkID=390517) -2. Copy the JavaScript files to the **Scripts** directory of the Self-Service Portal. This directory is located in *<MBAM Self-Service Install Directory>\\*Self Service Website\\Scripts. +2. Copy the JavaScript files to the **Scripts** directory of the Self-Service Portal. This directory is located in <MBAM Self-Service Install Directory>\\Self Service Website\\Scripts. -3. Open Internet Information Services (IIS) Manager. +3. Open Internet Information Services (IIS) Manager. -4. Expand **Sites** > **Microsoft BitLocker Administration and Monitoring**, and highlight **SelfService**. +4. Expand **Sites** > **Microsoft BitLocker Administration and Monitoring**, and highlight **SelfService**. - **Note**   - *SelfService* is the default virtual directory name. If you chose a different name for this directory during the configuration, remember to replace *SelfService* in these instructions with the name you chose. + **Note** + *SelfService* is the default virtual directory name. If you chose a different name for this directory during the configuration, remember to replace *SelfService* in these instructions with the name you chose. -   + -5. In the middle pane, double-click **Application Settings**. +5. In the middle pane, double-click **Application Settings**. -6. For each item in the following list, edit the application settings to reference the new location by replacing /<*virtual directory*>/ with /SelfService/ (or whatever name you chose during configuration). For example, the virtual directory path will be similar to /selfservice/Scripts/ jQuery-1.10.2.min.js. +6. For each item in the following list, edit the application settings to reference the new location by replacing /<*virtual directory*>/ with /SelfService/ (or whatever name you chose during configuration). For example, the virtual directory path will be similar to /selfservice/Scripts/ jQuery-1.10.2.min.js. - - jQueryPath: /<*virtual directory*>/Scripts/jQuery-1.10.2.min.js + - jQueryPath: /<*virtual directory*>/Scripts/jQuery-1.10.2.min.js - - jQueryValidatePath: /<*virtual directory*>/Scripts/jQuery.validate.min.js + - jQueryValidatePath: /<*virtual directory*>/Scripts/jQuery.validate.min.js - - jQueryValidateUnobtrusivePath: /<*virtual directory*>/Scripts/jQuery.validate.unobtrusive.min.js + - jQueryValidateUnobtrusivePath: /<*virtual directory*>/Scripts/jQuery.validate.unobtrusive.min.js @@ -66,7 +66,7 @@ In MBAM 2.5 SP1, the JavaScript files are included in the product, and you do no [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-deploy-the-mbam-client-by-using-a-command-line.md b/mdop/mbam-v25/how-to-deploy-the-mbam-client-by-using-a-command-line.md index e475c8d4a8..27bfffcf2d 100644 --- a/mdop/mbam-v25/how-to-deploy-the-mbam-client-by-using-a-command-line.md +++ b/mdop/mbam-v25/how-to-deploy-the-mbam-client-by-using-a-command-line.md @@ -29,7 +29,7 @@ Type the following command at the command prompt to automatically accept the end **Note**   The **/ju** and **/jm** command-line options are not supported and cannot be used to install the MBAM Client software. -  + Type the following command at the command prompt to extract and install the MSP: @@ -42,7 +42,7 @@ Then, install the MSI silently by running the following command: **Note**   Beginning in MBAM 2.5 SP1, a separate MSI is no longer included with the MBAM product. However, you can extract the MSI from the executable file (.exe) that is included with the product, after accepting the EULA. -  + ## OPTIN\_FOR\_MICROSOFT\_UPDATES=1 command-line option @@ -74,7 +74,7 @@ You can use this command-line option with either of the following installation m -  + ## Related topics @@ -82,9 +82,9 @@ You can use this command-line option with either of the following installation m [Deploying the MBAM 2.5 Client](deploying-the-mbam-25-client.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-25.md b/mdop/mbam-v25/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-25.md index 006771ac78..04cb113b89 100644 --- a/mdop/mbam-v25/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-25.md +++ b/mdop/mbam-v25/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-25.md @@ -36,7 +36,7 @@ Before you start the MBAM Client deployment, review the [MBAM 2.5 Supported Conf **Important**   The MBAM Client does not start BitLocker Drive Encryption actions if a remote desktop protocol connection is active. All remote console connections must be closed and a user must be logged on to a physical console session before BitLocker Drive Encryption begins. -   + ## Related topics @@ -44,7 +44,7 @@ Before you start the MBAM Client deployment, review the [MBAM 2.5 Supported Conf [Planning for MBAM 2.5 Client Deployment](planning-for-mbam-25-client-deployment.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-25.md b/mdop/mbam-v25/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-25.md index 48fd677e6f..58fc45a61e 100644 --- a/mdop/mbam-v25/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-25.md +++ b/mdop/mbam-v25/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-25.md @@ -28,7 +28,7 @@ To complete this task, you need access to the **Reports** area of the Administra **Note**   Device compliance is determined by the BitLocker policies that your enterprise has deployed. You may want to verify your deployed policies before you try to determine the BitLocker encryption state of a device. -  + **To determine the last known BitLocker encryption state of lost computers** @@ -49,11 +49,11 @@ Device compliance is determined by the BitLocker policies that your enterprise h [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md b/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md index cc63ce3d45..9ad697322f 100644 --- a/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md +++ b/mdop/mbam-v25/how-to-enable-bitlocker-by-using-mbam-as-part-of-a-windows-deploymentmbam-25.md @@ -33,34 +33,34 @@ This topic explains how to enable BitLocker on an end user's computer by using M **To enable BitLocker using MBAM 2.5 SP1 as part of a Windows deployment** -1. In MBAM 2.5 SP1, the recommended approach to enable BitLocker during a Windows Deployment is by using the `Invoke-MbamClientDeployment.ps1` PowerShell script. +1. In MBAM 2.5 SP1, the recommended approach to enable BitLocker during a Windows Deployment is by using the `Invoke-MbamClientDeployment.ps1` PowerShell script. - - The `Invoke-MbamClientDeployment.ps1` script enacts BitLocker during the imaging process. When required by BitLocker policy, the MBAM agent immediately prompts the domain user to create a PIN or password when the domain user first logs on after imaging. + - The `Invoke-MbamClientDeployment.ps1` script enacts BitLocker during the imaging process. When required by BitLocker policy, the MBAM agent immediately prompts the domain user to create a PIN or password when the domain user first logs on after imaging. - - Easy to use with MDT, System Center Configuration Manager, or standalone imaging processes + - Easy to use with MDT, System Center Configuration Manager, or standalone imaging processes - - Compatible with PowerShell 2.0 or higher + - Compatible with PowerShell 2.0 or higher - - Encrypt OS volume with TPM key protector + - Encrypt OS volume with TPM key protector - - Fully support BitLocker pre-provisioning + - Fully support BitLocker pre-provisioning - - Optionally encrypt FDDs + - Optionally encrypt FDDs - - Escrow TPM OwnerAuth - For Windows 7, MBAM must own the TPM for escrow to occur. - For Windows 8.1, Windows 10 RTM and Windows 10 version 1511, escrow of TPM OwnerAuth is supported. - For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](https://docs.microsoft.com/en-us/windows/security/hardware-protection/tpm/change-the-tpm-owner-password) for further details. + - Escrow TPM OwnerAuth + For Windows 7, MBAM must own the TPM for escrow to occur. + For Windows 8.1, Windows 10 RTM and Windows 10 version 1511, escrow of TPM OwnerAuth is supported. + For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](https://docs.microsoft.com/en-us/windows/security/hardware-protection/tpm/change-the-tpm-owner-password) for further details. - - Escrow recovery keys and recovery key packages + - Escrow recovery keys and recovery key packages - - Report encryption status immediately + - Report encryption status immediately - - New WMI providers + - New WMI providers - - Detailed logging + - Detailed logging - - Robust error handling + - Robust error handling You can download the `Invoke-MbamClientDeployment.ps1` script from [Microsoft.com Download Center](https://www.microsoft.com/download/details.aspx?id=54439). This is the main script that your deployment system will call to configure BitLocker drive encryption and record recovery keys with the MBAM Server. @@ -131,127 +131,127 @@ Here are a list of common error messages: | **WS_E_ENDPOINT_UNREACHABLE**
            2151481360 (0x803D0010) | The remote endpoint was not reachable. | | **WS_E_ENDPOINT_FAULT_RECEIVED**
            2151481363 (0x803D0013) | A message containing a fault was received from the remote endpoint. Make sure you are connecting to the correct service endpoint. | | **WS_E_INVALID_ENDPOINT_URL**
            2151481376 (0x803D0020) | The endpoint address URL is not valid. The URL must start with “http” or “https”. | -   + -2. **Deploy MBAM by using Microsoft Deployment Toolkit (MDT) and PowerShell** +2. **Deploy MBAM by using Microsoft Deployment Toolkit (MDT) and PowerShell** - 1. In MDT, create a new deployment share or open an existing deployment share. + 1. In MDT, create a new deployment share or open an existing deployment share. - **Note**   - The `Invoke-MbamClientDeployment.ps1` PowerShell script can be used with any imaging process or tool. This section shows how to integrate it by using MDT, but the steps are similar to integrating it with any other process or tool. + **Note** + The `Invoke-MbamClientDeployment.ps1` PowerShell script can be used with any imaging process or tool. This section shows how to integrate it by using MDT, but the steps are similar to integrating it with any other process or tool. - **Caution**   - If you are using BitLocker pre-provisioning (WinPE) and want to maintain the TPM owner authorization value, you must add the `SaveWinPETpmOwnerAuth.wsf` script in WinPE immediately before the installation reboots into the full operating system. **If you do not use this script, you will lose the TPM owner authorization value on reboot.** + **Caution** + If you are using BitLocker pre-provisioning (WinPE) and want to maintain the TPM owner authorization value, you must add the `SaveWinPETpmOwnerAuth.wsf` script in WinPE immediately before the installation reboots into the full operating system. **If you do not use this script, you will lose the TPM owner authorization value on reboot.** - 2. Copy `Invoke-MbamClientDeployment.ps1` to **<DeploymentShare>\\Scripts**. If you are using pre-provisioning, copy the `SaveWinPETpmOwnerAuth.wsf` file into **<DeploymentShare>\\Scripts**. + 2. Copy `Invoke-MbamClientDeployment.ps1` to **<DeploymentShare>\\Scripts**. If you are using pre-provisioning, copy the `SaveWinPETpmOwnerAuth.wsf` file into **<DeploymentShare>\\Scripts**. - 3. Add the MBAM 2.5 SP1 client application to the Applications node in the deployment share. + 3. Add the MBAM 2.5 SP1 client application to the Applications node in the deployment share. - 1. Under the **Applications** node, click **New Application**. + 1. Under the **Applications** node, click **New Application**. - 2. Select **Application with Source Files**. Click **Next**. + 2. Select **Application with Source Files**. Click **Next**. - 3. In **Application Name**, type “MBAM 2.5 SP1 Client”. Click **Next**. + 3. In **Application Name**, type “MBAM 2.5 SP1 Client”. Click **Next**. - 4. Browse to the directory containing `MBAMClientSetup-.msi`. Click **Next**. + 4. Browse to the directory containing `MBAMClientSetup-.msi`. Click **Next**. - 5. Type “MBAM 2.5 SP1 Client” as the directory to create. Click **Next**. + 5. Type “MBAM 2.5 SP1 Client” as the directory to create. Click **Next**. - 6. Enter `msiexec /i MBAMClientSetup-.msi /quiet` at the command line. Click **Next**. + 6. Enter `msiexec /i MBAMClientSetup-.msi /quiet` at the command line. Click **Next**. - 7. Accept the remaining defaults to complete the New Application wizard. + 7. Accept the remaining defaults to complete the New Application wizard. - 4. In MDT, right-click the name of the deployment share and click **Properties**. Click the **Rules** tab. Add the following lines: + 4. In MDT, right-click the name of the deployment share and click **Properties**. Click the **Rules** tab. Add the following lines: - `SkipBitLocker=YES``BDEInstall=TPM``BDEInstallSuppress=NO``BDEWaitForEncryption=YES` + `SkipBitLocker=YES``BDEInstall=TPM``BDEInstallSuppress=NO``BDEWaitForEncryption=YES` - Click OK to close the window. + Click OK to close the window. - 5. Under the Task Sequences node, edit an existing task sequence used for Windows Deployment. If you want, you can create a new task sequence by right-clicking the **Task Sequences** node, selecting **New Task Sequence**, and completing the wizard. + 5. Under the Task Sequences node, edit an existing task sequence used for Windows Deployment. If you want, you can create a new task sequence by right-clicking the **Task Sequences** node, selecting **New Task Sequence**, and completing the wizard. - On the **Task Sequence** tab of the selected task sequence, perform these steps: + On the **Task Sequence** tab of the selected task sequence, perform these steps: - 1. Under the **Preinstall** folder, enable the optional task **Enable BitLocker (Offline)** if you want BitLocker enabled in WinPE, which encrypts used space only. + 1. Under the **Preinstall** folder, enable the optional task **Enable BitLocker (Offline)** if you want BitLocker enabled in WinPE, which encrypts used space only. - 2. To persist TPM OwnerAuth when using pre-provisioning, allowing MBAM to escrow it later, do the following: + 2. To persist TPM OwnerAuth when using pre-provisioning, allowing MBAM to escrow it later, do the following: - 1. Find the **Install Operating System** step + 1. Find the **Install Operating System** step - 2. Add a new **Run Command Line** step after it + 2. Add a new **Run Command Line** step after it - 3. Name the step **Persist TPM OwnerAuth** + 3. Name the step **Persist TPM OwnerAuth** - 4. Set the command line to `cscript.exe "%SCRIPTROOT%/SaveWinPETpmOwnerAuth.wsf"` - **Note:** For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](https://docs.microsoft.com/en-us/windows/security/hardware-protection/tpm/change-the-tpm-owner-password) for further details. + 4. Set the command line to `cscript.exe "%SCRIPTROOT%/SaveWinPETpmOwnerAuth.wsf"` + **Note:** For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](https://docs.microsoft.com/en-us/windows/security/hardware-protection/tpm/change-the-tpm-owner-password) for further details. - 3. In the **State Restore** folder, delete the **Enable BitLocker** task. + 3. In the **State Restore** folder, delete the **Enable BitLocker** task. - 4. In the **State Restore** folder under **Custom Tasks**, create a new **Install Application** task and name it **Install MBAM Agent**. Click the **Install Single Application** radio button and browse to the MBAM 2.5 SP1 client application created earlier. + 4. In the **State Restore** folder under **Custom Tasks**, create a new **Install Application** task and name it **Install MBAM Agent**. Click the **Install Single Application** radio button and browse to the MBAM 2.5 SP1 client application created earlier. - 5. In the **State Restore** folder under **Custom Tasks**, create a new **Run PowerShell Script** task (after the MBAM 2.5 SP1 Client application step) with the following settings (update the parameters as appropriate for your environment): + 5. In the **State Restore** folder under **Custom Tasks**, create a new **Run PowerShell Script** task (after the MBAM 2.5 SP1 Client application step) with the following settings (update the parameters as appropriate for your environment): - - Name: Configure BitLocker for MBAM + - Name: Configure BitLocker for MBAM - - PowerShell script: `Invoke-MbamClientDeployment.ps1` + - PowerShell script: `Invoke-MbamClientDeployment.ps1` - - Parameters: + - Parameters: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

            -RecoveryServiceEndpoint

            Required

            MBAM recovery service endpoint

            -StatusReportingServiceEndpoint

            Optional

            MBAM status reporting service endpoint

            -EncryptionMethod

            Optional

            Encryption method (default: AES 128)

            -EncryptAndEscrowDataVolume

            Switch

            Specify to encrypt data volume(s) and escrow data volume recovery key(s)

            -WaitForEncryptionToComplete

            Switch

            Specify to wait for the encryption to complete

            -DoNotResumeSuspendedEncryption

            Switch

            Specify that the deployment script will not resume suspended encryption

            -IgnoreEscrowOwnerAuthFailure

            Switch

            Specify to ignore TPM owner-auth escrow failure. It should be used in the scenarios where MBAM is not able to read the TPM owner-auth, e.g. if TPM auto provisioning is enabled

            -IgnoreEscrowRecoveryKeyFailure

            Switch

            Specify to ignore volume recovery key escrow failure

            -IgnoreReportStatusFailure

            Switch

            Specify to ignore status reporting failure

            + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

            -RecoveryServiceEndpoint

            Required

            MBAM recovery service endpoint

            -StatusReportingServiceEndpoint

            Optional

            MBAM status reporting service endpoint

            -EncryptionMethod

            Optional

            Encryption method (default: AES 128)

            -EncryptAndEscrowDataVolume

            Switch

            Specify to encrypt data volume(s) and escrow data volume recovery key(s)

            -WaitForEncryptionToComplete

            Switch

            Specify to wait for the encryption to complete

            -DoNotResumeSuspendedEncryption

            Switch

            Specify that the deployment script will not resume suspended encryption

            -IgnoreEscrowOwnerAuthFailure

            Switch

            Specify to ignore TPM owner-auth escrow failure. It should be used in the scenarios where MBAM is not able to read the TPM owner-auth, e.g. if TPM auto provisioning is enabled

            -IgnoreEscrowRecoveryKeyFailure

            Switch

            Specify to ignore volume recovery key escrow failure

            -IgnoreReportStatusFailure

            Switch

            Specify to ignore status reporting failure

            -   + **To enable BitLocker using MBAM 2.5 or earlier as part of a Windows deployment** diff --git a/mdop/mbam-v25/how-to-localize-the-helpdesktext-statement-that-points-users-to-more-self-service-portal-information.md b/mdop/mbam-v25/how-to-localize-the-helpdesktext-statement-that-points-users-to-more-self-service-portal-information.md index 96ffe5ab95..ff06699bd3 100644 --- a/mdop/mbam-v25/how-to-localize-the-helpdesktext-statement-that-points-users-to-more-self-service-portal-information.md +++ b/mdop/mbam-v25/how-to-localize-the-helpdesktext-statement-that-points-users-to-more-self-service-portal-information.md @@ -22,7 +22,7 @@ You can configure a localized version of the Self-Service Portal "HelpdeskText" **Note**   In the following instructions, *SelfService* is the default virtual directory name for the Self-Service Portal. You might have used a different name when you configured the Self-Service Portal. -  + **To display a localized version of the HelpdeskText statement** @@ -47,9 +47,9 @@ In the following instructions, *SelfService* is the default virtual directory na [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-localize-the-self-service-portal-helpdeskurl.md b/mdop/mbam-v25/how-to-localize-the-self-service-portal-helpdeskurl.md index 0132d75505..39f6b21718 100644 --- a/mdop/mbam-v25/how-to-localize-the-self-service-portal-helpdeskurl.md +++ b/mdop/mbam-v25/how-to-localize-the-self-service-portal-helpdeskurl.md @@ -24,7 +24,7 @@ If you create a localized version, as described in the following instructions, M **Note**   In the following instructions, *SelfService* is the default virtual directory name for the Self-Service Portal. You might have used a different name when you configured the Self-Service Portal. -  + **To localize the Self-Service Portal URL** @@ -49,9 +49,9 @@ In the following instructions, *SelfService* is the default virtual directory na [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-localize-the-self-service-portal-notice-text.md b/mdop/mbam-v25/how-to-localize-the-self-service-portal-notice-text.md index 86e5bd0ada..65d97745b3 100644 --- a/mdop/mbam-v25/how-to-localize-the-self-service-portal-notice-text.md +++ b/mdop/mbam-v25/how-to-localize-the-self-service-portal-notice-text.md @@ -28,7 +28,7 @@ To display localized notice text, you create a localized Notice.txt file, and th **Note**   You can configure the path by using the **NoticeTextPath** item in **Application Settings**. -  + MBAM displays the notice text, based on the following rules: @@ -43,7 +43,7 @@ If an end user’s browser is set to a language that does not have a correspondi <*MBAM Self-Service Install Directory*>\\Self Service Website\\ -  + **To create a localized Notice.txt file** @@ -54,7 +54,7 @@ If an end user’s browser is set to a language that does not have a correspondi **Note**   Some language folders already exist, so you might not have to create a folder. If you do have to create a language folder, see [National Language Support (NLS) API Reference](https://go.microsoft.com/fwlink/?LinkId=317947) for a list of the valid names that you can use for the <*Language*> folder. -   + 2. Create a Notice.txt file that contains the localized notice text. @@ -71,7 +71,7 @@ If an end user’s browser is set to a language that does not have a correspondi [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-manage-user-bitlocker-encryption-exemptions-mbam-25.md b/mdop/mbam-v25/how-to-manage-user-bitlocker-encryption-exemptions-mbam-25.md index a8b191f42a..5cb63887d0 100644 --- a/mdop/mbam-v25/how-to-manage-user-bitlocker-encryption-exemptions-mbam-25.md +++ b/mdop/mbam-v25/how-to-manage-user-bitlocker-encryption-exemptions-mbam-25.md @@ -41,26 +41,25 @@ To exempt users from BitLocker protection, you have to:

            Add the exempted user to a security group for a Group Policy Object that is configured specifically for exempted users.

            When members of this security group sign in to a computer, the user’s Group Policy setting exempts the user from BitLocker protection. The user’s Group Policy setting overwrites the computer policy, and the computer will remain exempt from BitLocker encryption.

            -Note   -

            MBAM does not enact the encryption policy if the computer is already BitLocker-protected and the user is exempted. However, if another user who is not exempt from the encryption policy signs in to the computer, encryption will take place.

            +Note

            MBAM does not enact the encryption policy if the computer is already BitLocker-protected and the user is exempted. However, if another user who is not exempt from the encryption policy signs in to the computer, encryption will take place.

            -  +
            -  + The following steps describe what occurs when end users request an exemption from the BitLocker Drive Encryption exemption process through the MBAM Client or through whatever process your organization uses. You must configure MBAM Group Policy settings to allow end users to request an exemption from BitLocker Drive Encryption. 1. When end users sign in to a computer that is required to be encrypted, they receive a notification that their computer is going to be encrypted. They can select **Request Exemption** and postpone the encryption by selecting **Postpone**, or they can select **Start Encryption** to accept the BitLocker encryption. - **Note**   + **Note** Selecting **Request Exemption** postpones the BitLocker protection until the maximum time that is set in the User Exemption Policy. -   + 2. If end users select **Request Exemption**, they receive a notification telling them to contact the organization’s BitLocker administration group. Depending on how the **Configure User Exemption Policy** is configured, users are provided with one or more of the following contact methods: @@ -98,26 +97,25 @@ To exempt users from BitLocker protection, you have to:

            Add the exempted user to a security group for a Group Policy Object that is configured specifically for exempted users.

            When members of this security group sign in to a computer, the user’s Group Policy setting exempts the user from BitLocker protection. The user’s Group Policy setting overwrites the computer policy, and the computer will remain exempt from BitLocker encryption.

            -Note   -

            If the computer is already BitLocker-protected, the User Exemption Policy has no effect. In addition, if another user signs in to a computer that is not exempt from the encryption policy, encryption will take place.

            +Note

            If the computer is already BitLocker-protected, the User Exemption Policy has no effect. In addition, if another user signs in to a computer that is not exempt from the encryption policy, encryption will take place.

            -  +
            -  + The following steps describe what occurs when end users request an exemption from the BitLocker Drive Encryption exemption process through the MBAM Client or through whatever process your organization uses. You must configure MBAM Group Policy settings to allow end users to request an exemption from BitLocker Drive Encryption. 1. When end users sign in to a computer that is required to be encrypted, they receive a notification that their computer is going to be encrypted. They can select **Request Exemption** and postpone the encryption by selecting **Postpone**, or they can select **Start Encryption** to accept the BitLocker encryption. - **Note**   + **Note** Selecting **Request Exemption** postpones the BitLocker protection until the maximum time that is set in the User Exemption Policy. -   + 2. If end users select **Request Exemption**, they receive a notification telling them to contact the organization’s BitLocker administration group. Depending on how the **Configure User Exemption Policy** is configured, users are provided with one or more of the following contact methods: @@ -143,10 +141,10 @@ The following steps describe what occurs when end users request an exemption fro When a user signs in to a computer controlled by BitLocker, the MBAM Client checks the User Exemption Policy setting. If the computer is already encrypted, BitLocker protection is not suspended. If the computer is not encrypted, MBAM does not prompt the user to encrypt. - **Important**   + **Important** Shared computer scenarios require special consideration when you are using BitLocker user exemptions. If a non-exempt user signs in to a computer that is shared with an exempt user, the computer may be encrypted. -   + ## Related topics @@ -156,9 +154,9 @@ The following steps describe what occurs when end users request an exemption fro [Planning for MBAM 2.5 Group Policy Requirements](planning-for-mbam-25-group-policy-requirements.md) -  -  + + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-move-the-mbam-25-databases.md b/mdop/mbam-v25/how-to-move-the-mbam-25-databases.md index f37d3856b7..590fce21ac 100644 --- a/mdop/mbam-v25/how-to-move-the-mbam-25-databases.md +++ b/mdop/mbam-v25/how-to-move-the-mbam-25-databases.md @@ -69,7 +69,6 @@ To automate this procedure, you can use Windows PowerShell to enter a command th ```powershell Stop-Website "Microsoft BitLocker Administration and Monitoring" - ``` >[!NOTE] @@ -156,7 +155,6 @@ Copy-Item "Z:\SQLServerInstanceCertificateFile" Copy-Item "Z:\SQLServerInstanceCertificateFilePrivateKey" \\$SERVERNAME$\$DESTINATIONSHARE$ - ``` Use the information in the following table to replace the values in the code example with values that match your environment. @@ -231,48 +229,48 @@ Use the information in the following table to replace the values in the code exa ### Configure access to the Database on Server B and update connection data -1. Verify that the Microsoft SQL Server user login that enables Recovery Database access on the restored database is mapped to the access account that you provided during the configuration process. +1. Verify that the Microsoft SQL Server user login that enables Recovery Database access on the restored database is mapped to the access account that you provided during the configuration process. - >[!NOTE] - >If the login is not the same, create a login by using SQL Server Management Studio, and map it to the existing database user. + >[!NOTE] + >If the login is not the same, create a login by using SQL Server Management Studio, and map it to the existing database user. -2. On the server that is running the Administration and Monitoring Website, use the Internet Information Services (IIS) Manager console to update the connection string information for the MBAM websites. +2. On the server that is running the Administration and Monitoring Website, use the Internet Information Services (IIS) Manager console to update the connection string information for the MBAM websites. -3. Edit the following registry key: +3. Edit the following registry key: - **HKLM\\Software\\Microsoft\\MBAM Server\\Web\\RecoveryDBConnectionString** + **HKLM\\Software\\Microsoft\\MBAM Server\\Web\\RecoveryDBConnectionString** -4. Update the **Data Source** value with the name of the server and instance (for example, \$SERVERNAME\$\\\$SQLINSTANCENAME) to which the Recovery Database was moved. +4. Update the **Data Source** value with the name of the server and instance (for example, \$SERVERNAME\$\\\$SQLINSTANCENAME) to which the Recovery Database was moved. -5. Update the **Initial Catalog** value with the recovered database name. +5. Update the **Initial Catalog** value with the recovered database name. -6. To automate this process, you can use the Windows PowerShell command prompt to enter a command line on the Administration and Monitoring Server that is similar to the following: +6. To automate this process, you can use the Windows PowerShell command prompt to enter a command line on the Administration and Monitoring Server that is similar to the following: - ```powershell - reg add "HKEY_LOCAL_MACHINE\SOFTWARE\\Microsoft\MBAM Server\\Web" /v - RecoveryDBConnectionString /t REG_SZ /d "Integrated Security=SSPI;Initial - Catalog=$DATABASE$;Data Source=$SERVERNAME$\$SQLINSTANCENAME$" /f + ```powershell + reg add "HKEY_LOCAL_MACHINE\SOFTWARE\\Microsoft\MBAM Server\\Web" /v + RecoveryDBConnectionString /t REG_SZ /d "Integrated Security=SSPI;Initial + Catalog=$DATABASE$;Data Source=$SERVERNAME$\$SQLINSTANCENAME$" /f - Set-WebConfigurationProperty - 'connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath - "IIS:\sites\Microsoft Bitlocker Administration and - Monitoring\MBAMAdministrationService" -Name "connectionString" -Value "Data - Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and - Hardware;Integrated Security=SSPI;" + Set-WebConfigurationProperty + 'connectionStrings/add[@name="KeyRecoveryConnectionString"]' -PSPath + "IIS:\sites\Microsoft Bitlocker Administration and + Monitoring\MBAMAdministrationService" -Name "connectionString" -Value "Data + Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery and + Hardware;Integrated Security=SSPI;" - Set-WebConfigurationProperty - 'connectionStrings/add[\@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' - -PSPath "IIS:\sites\Microsoft Bitlocker Administration and - Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value - "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery - and Hardware;Integrated Security=SSPI;" - ``` + Set-WebConfigurationProperty + 'connectionStrings/add[\@name="Microsoft.Mbam.RecoveryAndHardwareDataStore.ConnectionString"]' + -PSPath "IIS:\sites\Microsoft Bitlocker Administration and + Monitoring\MBAMRecoveryAndHardwareService" -Name "connectionString" -Value + "Data Source=$SERVERNAME$\$SQLINSTANCENAME$;Initial Catalog=MBAM Recovery + and Hardware;Integrated Security=SSPI;" + ``` - >[!Note] - >This connection string is shared by all local MBAM web applications. Therefore, it needs to be updated only once per server. + >[!Note] + >This connection string is shared by all local MBAM web applications. Therefore, it needs to be updated only once per server. -7. Use the following table to replace the values in the code example with values that match your environment. +7. Use the following table to replace the values in the code example with values that match your environment. |Parameter|Description| |---------|-----------| @@ -330,7 +328,6 @@ To automate this procedure, you can use Windows PowerShell to enter a command th ```powershell Stop-Website "Microsoft BitLocker Administration and Monitoring" - ``` >[!NOTE] @@ -443,34 +440,33 @@ Stop-Website "Microsoft BitLocker Administration and Monitoring" ### Configure access to the Database on Server B and update connection data -1. Verify that the Microsoft SQL Server user login that enables Compliance and Audit Database access on the restored database is mapped to the access account that you provided during the configuration process. +1. Verify that the Microsoft SQL Server user login that enables Compliance and Audit Database access on the restored database is mapped to the access account that you provided during the configuration process. - >[!NOTE] - >If the login is not the same, create a login by using SQL Server Management Studio, and map it to the existing database user. + >[!NOTE] + >If the login is not the same, create a login by using SQL Server Management Studio, and map it to the existing database user. -2. On the server that is running the Administration and Monitoring Website, use the Internet Information Services (IIS) Manager console to update the connection string information for the Website. +2. On the server that is running the Administration and Monitoring Website, use the Internet Information Services (IIS) Manager console to update the connection string information for the Website. -3. Edit the following registry key: +3. Edit the following registry key: - **HKLM\\Software\\Microsoft\\MBAM Server\\Web\\ComplianceDBConnectionString** + **HKLM\\Software\\Microsoft\\MBAM Server\\Web\\ComplianceDBConnectionString** -4. Update the **Data Source** value with the name of the server and instance (for example, \$SERVERNAME\$\\\$SQLINSTANCENAME) to which the Recovery Database was moved. +4. Update the **Data Source** value with the name of the server and instance (for example, \$SERVERNAME\$\\\$SQLINSTANCENAME) to which the Recovery Database was moved. -5. Update the **Initial Catalog** value with the recovered database name. +5. Update the **Initial Catalog** value with the recovered database name. -6. To automate this process, you can use the Windows PowerShell command prompt to enter a command line on the Administration and Monitoring Server that is similar to the following: +6. To automate this process, you can use the Windows PowerShell command prompt to enter a command line on the Administration and Monitoring Server that is similar to the following: - ```powershell - reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM Server\Web" /v - ComplianceDBConnectionString /t REG_SZ /d "Integrated Security=SSPI;Initial - Catalog=$DATABASE$;Data Source=$SERVERNAME$\$SQLINSTANCENAME$" /f - - ``` - >[!NOTE] - >This connection string is shared by all local MBAM web applications. Therefore, it needs to be updated only once per server. + ```powershell + reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MBAM Server\Web" /v + ComplianceDBConnectionString /t REG_SZ /d "Integrated Security=SSPI;Initial + Catalog=$DATABASE$;Data Source=$SERVERNAME$\$SQLINSTANCENAME$" /f + ``` + >[!NOTE] + >This connection string is shared by all local MBAM web applications. Therefore, it needs to be updated only once per server. -7. Using the following table, replace the values in the code example with values that match your environment. +7. Using the following table, replace the values in the code example with values that match your environment. |Parameter | Description | |---------|------------| @@ -495,7 +491,6 @@ To automate this procedure, you can use Windows PowerShell to run a command that ```powershell Start-Website "Microsoft BitLocker Administration and Monitoring" - ``` >[!NOTE] diff --git a/mdop/mbam-v25/how-to-move-the-mbam-25-reports.md b/mdop/mbam-v25/how-to-move-the-mbam-25-reports.md index b3e9f30678..c77b29982c 100644 --- a/mdop/mbam-v25/how-to-move-the-mbam-25-reports.md +++ b/mdop/mbam-v25/how-to-move-the-mbam-25-reports.md @@ -32,7 +32,7 @@ The high-level steps for moving the Reports feature are: **Note**   To run the example Windows PowerShell scripts in this topic, you must update the Windows PowerShell execution policy to enable scripts to be run. See [Running Windows PowerShell Scripts](https://technet.microsoft.com/library/ee176949.aspx) for instructions. -  + **Stop the MBAM Administration and Monitoring Website** @@ -103,7 +103,7 @@ To run the example Windows PowerShell scripts in this topic, you must update the -   + **Resume the instance of the Administration and Monitoring Website** @@ -118,7 +118,7 @@ To run the example Windows PowerShell scripts in this topic, you must update the **Note**   To run this command, you must add the IIS module for Windows PowerShell to the current instance of Windows PowerShell. -   + @@ -131,11 +131,11 @@ To run the example Windows PowerShell scripts in this topic, you must update the [Moving MBAM 2.5 Features to Another Server](moving-mbam-25-features-to-another-server.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/how-to-move-the-mbam-25-websites.md b/mdop/mbam-v25/how-to-move-the-mbam-25-websites.md index 8646e2da3c..6b57070737 100644 --- a/mdop/mbam-v25/how-to-move-the-mbam-25-websites.md +++ b/mdop/mbam-v25/how-to-move-the-mbam-25-websites.md @@ -26,7 +26,7 @@ Use these procedures to move the following MBAM websites from one computer to an **Important**   During the configuration of both websites, you must provide the same connection string, Reports URL, group accounts, and web service application pool domain account as the ones that you are currently using. If you don’t use the same values, you cannot access some of the servers. To get the current values, use the **Get-MbamWebApplication** Windows PowerShell cmdlet. -  + **To move the Administration and Monitoring Website to another server** @@ -63,7 +63,7 @@ During the configuration of both websites, you must provide the same connection [Moving MBAM 2.5 Features to Another Server](moving-mbam-25-features-to-another-server.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-recover-a-corrupted-drive-mbam-25.md b/mdop/mbam-v25/how-to-recover-a-corrupted-drive-mbam-25.md index c3fce52876..5ee41f6f49 100644 --- a/mdop/mbam-v25/how-to-recover-a-corrupted-drive-mbam-25.md +++ b/mdop/mbam-v25/how-to-recover-a-corrupted-drive-mbam-25.md @@ -33,7 +33,7 @@ You can use this procedure with the Administration and Monitoring Website (also

            Create a recovery key package file by accessing the Drive Recovery area of the Administration and Monitoring Website.

            -

            To access the Drive Recovery area, you must be assigned the MBAM Helpdesk Users role or the MBAM Advanced Helpdesk Users role. You may have given these roles different names when you created them. For more information, see [Planning for MBAM 2.5 Groups and Accounts](planning-for-mbam-25-groups-and-accounts.md#bkmk-helpdesk-roles).

            +

            To access the Drive Recovery area, you must be assigned the MBAM Helpdesk Users role or the MBAM Advanced Helpdesk Users role. You may have given these roles different names when you created them. For more information, see Planning for MBAM 2.5 Groups and Accounts.

            Copy the package file to the computer that contains the corrupted drive.

            @@ -41,12 +41,12 @@ You can use this procedure with the Administration and Monitoring Website (also

            Use the repair-bde command to complete the recovery process.

            -

            To avoid a potential loss of data, it is strongly recommended that you review the [Manage-bde](https://go.microsoft.com/fwlink/?LinkId=393567) command before using it.

            +

            To avoid a potential loss of data, it is strongly recommended that you review the Manage-bde command before using it.

            -  + **To recover a corrupted drive** @@ -59,7 +59,7 @@ You can use this procedure with the Administration and Monitoring Website (also **Note**   If you are a member of the Advanced Helpdesk Users access group, you do not have to enter the user’s domain name or user name. -   + 4. Click **Submit**. The recovery key will be displayed. @@ -76,7 +76,7 @@ You can use this procedure with the Administration and Monitoring Website (also **Note**   Replace <*fixed drive*> with an available hard disk drive that has free space equal to or larger than the data on the corrupted drive. Data on the corrupted drive is recovered and moved to the specified hard disk drive. -   + ## Related topics @@ -84,11 +84,11 @@ You can use this procedure with the Administration and Monitoring Website (also [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/how-to-recover-a-drive-in-recovery-mode-mbam-25.md b/mdop/mbam-v25/how-to-recover-a-drive-in-recovery-mode-mbam-25.md index f4554d2b9d..9dec2442fb 100644 --- a/mdop/mbam-v25/how-to-recover-a-drive-in-recovery-mode-mbam-25.md +++ b/mdop/mbam-v25/how-to-recover-a-drive-in-recovery-mode-mbam-25.md @@ -21,15 +21,15 @@ This topic explains how to use the Administration and Monitoring Website (also r To get a recovery password, use the **Drive Recovery** area of the Administration and Monitoring Website. You must be assigned the MBAM Helpdesk Users role or the MBAM Advanced Helpdesk Users role to access this area of the website. -**Note**   +**Note** You may have given these roles different names when you created them. For more information, see [Planning for MBAM 2.5 Groups and Accounts](planning-for-mbam-25-groups-and-accounts.md#bkmk-helpdesk-roles). -  -**Important**   + +**Important** Recovery passwords expire after a single use. On operating system drives and fixed data drives, the single-use rule is applied automatically. On removable drives, it is applied when the drive is removed and then reinserted and unlocked on a computer that has Group Policy settings activated to manage removable drives. -  + **To recover a drive in recovery mode** @@ -39,10 +39,10 @@ Recovery passwords expire after a single use. On operating system drives and fix 3. Enter the end user’s Windows log-on domain and user name to view recovery information. - **Note**   + **Note** If you are in the MBAM Advanced Helpdesk Users group, the user domain and user ID fields are not required. -   + 4. Enter the first eight digits of the recovery key ID to see a list of possible matching recovery keys, or enter the entire recovery key ID to get the exact recovery key. @@ -56,16 +56,18 @@ Recovery passwords expire after a single use. On operating system drives and fix - The recovery password and recovery package for the submitted user - **Note**   + **Note** If you are recovering a damaged drive, the recovery package option provides BitLocker with critical information that it needs to recover the drive. -   - After the recovery password and recovery package are retrieved, the recovery password is displayed. -6. To copy the password, click **Copy Key**, and then paste the recovery password into an email message. Alternatively, click **Save** to save the recovery password to a file. +~~~ +After the recovery password and recovery package are retrieved, the recovery password is displayed. +~~~ - When the user types the recovery password into the system or uses the recovery package, the drive is unlocked. +6. To copy the password, click **Copy Key**, and then paste the recovery password into an email message. Alternatively, click **Save** to save the recovery password to a file. + + When the user types the recovery password into the system or uses the recovery package, the drive is unlocked. @@ -74,11 +76,11 @@ Recovery passwords expire after a single use. On operating system drives and fix [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-recover-a-moved-drive-mbam-25.md b/mdop/mbam-v25/how-to-recover-a-moved-drive-mbam-25.md index 1521bbef0a..59ee1c423d 100644 --- a/mdop/mbam-v25/how-to-recover-a-moved-drive-mbam-25.md +++ b/mdop/mbam-v25/how-to-recover-a-moved-drive-mbam-25.md @@ -27,7 +27,7 @@ To recover a moved drive, you must use the **Drive Recovery** area of the Admini **Note**   In some cases, you may be able to click **I forgot the PIN** during the startup process, and then enter the recovery mode to display the recovery key ID. -   + 3. Use the recovery key ID to retrieve the recovery password and unlock the drive from the Administration and Monitoring Website. For instructions, see [How to Recover a Drive in Recovery Mode](how-to-recover-a-drive-in-recovery-mode-mbam-25.md). @@ -44,7 +44,7 @@ To recover a moved drive, you must use the **Drive Recovery** area of the Admini [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-reset-a-tpm-lockout-mbam-25.md b/mdop/mbam-v25/how-to-reset-a-tpm-lockout-mbam-25.md index 3854e00a86..fc80c4324c 100644 --- a/mdop/mbam-v25/how-to-reset-a-tpm-lockout-mbam-25.md +++ b/mdop/mbam-v25/how-to-reset-a-tpm-lockout-mbam-25.md @@ -38,7 +38,7 @@ For information about MBAM and TPM ownership, see [MBAM 2.5 Security Considerati **Note**   If you are in the MBAM Advanced Helpdesk Users group, the user domain and user ID fields are not required. -   + 5. From the **Reason for requesting TPM owner password file** list, select a reason for the request, and click **Submit**. @@ -59,7 +59,7 @@ For information about MBAM and TPM ownership, see [MBAM 2.5 Security Considerati **Important**   Do not give the TPM hash value or TPM owner password file to end users. Because the TPM information does not change, giving the file to end users creates a security risk. -   + @@ -68,7 +68,7 @@ For information about MBAM and TPM ownership, see [MBAM 2.5 Security Considerati [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-set-the-self-service-portal-branding-and-session-time-out.md b/mdop/mbam-v25/how-to-set-the-self-service-portal-branding-and-session-time-out.md index 0fa092b0e6..67f433c862 100644 --- a/mdop/mbam-v25/how-to-set-the-self-service-portal-branding-and-session-time-out.md +++ b/mdop/mbam-v25/how-to-set-the-self-service-portal-branding-and-session-time-out.md @@ -19,15 +19,15 @@ ms.date: 06/16/2016 After you configure the Self-Service Portal, you can brand it with your company name, Help Desk URL, and "notice" text. You can also change the Session Time-out setting to make the end user’s session expire after a specified period of inactivity. -**Note**   +**Note** You can also brand the Self-Service Portal by using the **Enable-MbamWebApplication** Windows PowerShell cmdlet or the MBAM Server Configuration wizard. For instructions on using the wizard, see [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md). -  -**Note**   + +**Note** In the following instructions, *SelfService* is the default virtual directory name for the Self-Service Portal. You might have used a different name when you configured the Self-Service Portal. -  + **To set the session time-out and branding for the Self-Service Portal** @@ -41,102 +41,104 @@ In the following instructions, *SelfService* is the default virtual directory na 5. In the **Name** column, select the item that you want to change, and change the default value to reflect the name that you want to use. The following table lists the values that you can set. - **Caution**   + **Caution** Do not change the value in the Name column (CompanyName\*), as it will cause Self-Service Portal to stop working. -   - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            NameDefault value

            ClientValidationEnabled

            true

            CompanyName

            Contoso IT

            DisplayNotice

            true

            HelpdeskText

            Contact Helpdesk or IT Department

            HelpdeskUrl

            #

            -
            - Note   -

            In MBAM 2.5 SP1, the HelpdeskUrl default value is empty.

            -
            -
            -   -

            jQueryPath

            [//go.microsoft.com/fwlink/?LinkID=390515](//go.microsoft.com/fwlink/?LinkID=390515)

            -
            - Note   -

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery-1.10.2.min.js

            -
            -
            -   -

            jQueryValidatePath

            [//go.microsoft.com/fwlink/?LinkID=390516](//go.microsoft.com/fwlink/?LinkID=390516)

            -
            - Note   -

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery.validate.min.js

            -
            -
            -   -

            jQueryValidateUnobtrusivePath

            [//go.microsoft.com/fwlink/?LinkID=390517](//go.microsoft.com/fwlink/?LinkID=390517)

            -
            - Note   -

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery.validate.unobtrusive.min.js

            -
            -
            -   -

            NoticeTextPath

            Notice.txt

            -
            - Note   -

            You can edit the notice text either by using the Internet Information Services (IIS) Manager or by opening and changing the Notice.txt file in the installation directory.

            -
            -
            -   -

            UnobtrusiveJavaScriptEnabled

            true

            -   +~~~ + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
            NameDefault value

            ClientValidationEnabled

            true

            CompanyName

            Contoso IT

            DisplayNotice

            true

            HelpdeskText

            Contact Helpdesk or IT Department

            HelpdeskUrl

            #

            +
            +Note +

            In MBAM 2.5 SP1, the HelpdeskUrl default value is empty.

            +
            +
            + +

            jQueryPath

            [//go.microsoft.com/fwlink/?LinkID=390515](//go.microsoft.com/fwlink/?LinkID=390515)

            +
            +Note +

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery-1.10.2.min.js

            +
            +
            + +

            jQueryValidatePath

            [//go.microsoft.com/fwlink/?LinkID=390516](//go.microsoft.com/fwlink/?LinkID=390516)

            +
            +Note +

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery.validate.min.js

            +
            +
            + +

            jQueryValidateUnobtrusivePath

            [//go.microsoft.com/fwlink/?LinkID=390517](//go.microsoft.com/fwlink/?LinkID=390517)

            +
            +Note +

            In MBAM 2.5 SP1, this has been changed to a local JavaScript file shipped with the product, located at ~/Scripts/jquery.validate.unobtrusive.min.js

            +
            +
            + +

            NoticeTextPath

            Notice.txt

            +
            +Note +

            You can edit the notice text either by using the Internet Information Services (IIS) Manager or by opening and changing the Notice.txt file in the installation directory.

            +
            +
            + +

            UnobtrusiveJavaScriptEnabled

            true

            +~~~ + + @@ -145,11 +147,11 @@ In the following instructions, *SelfService* is the default virtual directory na [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/how-to-turn-the-self-service-portal-notice-text-on-or-off.md b/mdop/mbam-v25/how-to-turn-the-self-service-portal-notice-text-on-or-off.md index 0dbad3834d..015d00c47f 100644 --- a/mdop/mbam-v25/how-to-turn-the-self-service-portal-notice-text-on-or-off.md +++ b/mdop/mbam-v25/how-to-turn-the-self-service-portal-notice-text-on-or-off.md @@ -22,7 +22,7 @@ You can turn the Self-Service Portal notice text on or off. By default, the noti **Note**   In the following instructions, *SelfService* is the default virtual directory name for the Self-Service Portal. You might have used a different name when you configured the Self-Service Portal. -  + **To turn off the notice text** @@ -37,9 +37,9 @@ In the following instructions, *SelfService* is the default virtual directory na [Customizing the Self-Service Portal for Your Organization](customizing-the-self-service-portal-for-your-organization.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-use-the-administration-and-monitoring-website.md b/mdop/mbam-v25/how-to-use-the-administration-and-monitoring-website.md index 20c757f3dd..6999def5bb 100644 --- a/mdop/mbam-v25/how-to-use-the-administration-and-monitoring-website.md +++ b/mdop/mbam-v25/how-to-use-the-administration-and-monitoring-website.md @@ -22,7 +22,7 @@ The Administration and Monitoring Website, also referred to as the Help Desk, is **Note**   If you are using MBAM in the Stand-alone topology, you view all reports from the Administration and Monitoring Website. If you are using the Configuration Manager Integration topology, you view all reports in Configuration Manager, except the Recovery Audit report, which you continue to view from the Administration and Monitoring Website. For more information about reports, see [Monitoring and Reporting BitLocker Compliance with MBAM 2.5](monitoring-and-reporting-bitlocker-compliance-with-mbam-25.md). -  + ## Required roles for using the Administration and Monitoring Website @@ -58,7 +58,7 @@ To access specific areas of the Administration and Monitoring Website, you must -  + ## Tasks you can perform on the Administration and Monitoring Website @@ -85,13 +85,13 @@ The following table summarizes the tasks you can perform on the Administration a

            View reports

            Reports

            Enables you to run reports to monitor BitLocker usage, compliance, and key recovery activity. Reports provide data about enterprise compliance, individual computers, and who requested recovery keys or the TPM OwnerAuth package for a specific computer.

            -

            [Viewing MBAM 2.5 Reports for the Stand-alone Topology](viewing-mbam-25-reports-for-the-stand-alone-topology.md)

            +

            Viewing MBAM 2.5 Reports for the Stand-alone Topology

            Determine the BitLocker encryption status of lost or stolen computers

            Reports

            Determine if a volume was encrypted if the computer is lost or stolen.

            -

            [How to Determine BitLocker Encryption State of Lost Computers](how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-25.md)

            +

            How to Determine BitLocker Encryption State of Lost Computers

            Recover lost drives

            @@ -103,21 +103,21 @@ The following table summarizes the tasks you can perform on the Administration a
          • Are corrupted

          Reset a TPM lockout

          Manage TPM

          Provides access to TPM data that has been collected by the MBAM Client. In a TPM lockout, use the Administration and Monitoring Website to retrieve the necessary password file to unlock the TPM.

          -

          [How to Reset a TPM Lockout](how-to-reset-a-tpm-lockout-mbam-25.md)

          +

          How to Reset a TPM Lockout

          -  + ## Related topics @@ -125,7 +125,7 @@ The following table summarizes the tasks you can perform on the Administration a [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/how-to-use-the-self-service-portal-to-regain-access-to-a-computer-mbam-25.md b/mdop/mbam-v25/how-to-use-the-self-service-portal-to-regain-access-to-a-computer-mbam-25.md index 30f55c3323..3be2d5cf4a 100644 --- a/mdop/mbam-v25/how-to-use-the-self-service-portal-to-regain-access-to-a-computer-mbam-25.md +++ b/mdop/mbam-v25/how-to-use-the-self-service-portal-to-regain-access-to-a-computer-mbam-25.md @@ -24,7 +24,7 @@ The following instructions are written from the perspective of end users, but th **Important**   An end user must have physically logged on to the computer (not remotely) at least one time successfully to be able to recover their key using the Self-Service Portal. Otherwise, they must use the Helpdesk Portal for key recovery. -  + End users may experience lockouts if they: @@ -35,7 +35,7 @@ End users may experience lockouts if they: **Note**   If the IT administrator configured an IIS Session State time-out, a message is displayed in the Self-Service Portal 60 seconds prior to the time-out. -  + **To use the Self-Service Portal to regain access to a computer** @@ -54,11 +54,11 @@ If the IT administrator configured an IIS Session State time-out, a message is d [Performing BitLocker Management with MBAM 2.5](performing-bitlocker-management-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/illustrated-features-of-an-mbam-25-deployment.md b/mdop/mbam-v25/illustrated-features-of-an-mbam-25-deployment.md index 769e90d047..7d2a8d5f0e 100644 --- a/mdop/mbam-v25/illustrated-features-of-an-mbam-25-deployment.md +++ b/mdop/mbam-v25/illustrated-features-of-an-mbam-25-deployment.md @@ -23,10 +23,10 @@ This topic describes the individual features that make up a Microsoft BitLocker - System Center Configuration Manager Integration -**Important**   +**Important** These features do not represent the recommended architecture for deploying MBAM. Use this information only as a guide to understand the individual features that make up an MBAM deployment. See [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md) for the recommended architecture for MBAM. -  + For a list of the supported versions of the software mentioned in this topic, see [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md). @@ -51,12 +51,12 @@ The following image and table explain the features in an MBAM Stand-alone topolo |Administration and Monitoring Server||| |Administration and Monitoring Web Service|The Monitoring Web Service is used by the MBAM Client and the websites to communicate to the databases.|This feature is installed on a computer running Windows Server.| -**Important**   +**Important** The Self-Service Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1, in which the MBAM Client, the Administration and Monitoring Website, and the Self-Service Portal communicate directly with the Recovery Database. -**Important**   +**Important** The Monitoring Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1 since the MBAM Client and the websites communicate directly with the Recovery Database. -  + ## System Center Configuration Manager Integration topology @@ -64,27 +64,28 @@ The following image and table explain the features in the System Center Configur ![mbam2\-5](images/mbam2-5-cmcomponents.png) -**Important**   +**Important** The Self-Service Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1, in which the MBAM Client, the Administration and Monitoring Website, and the Self-Service Portal communicate directly with the Recovery Database. -**Warning**   +**Warning** The Monitoring Web Service is no longer available in Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 SP1 since the MBAM Client and the websites communicate directly with the Recovery Database. -|Feature type|Description| -|-|-| -|Self-Service Server||| -|Self-Service Web Service|This web service is used by the MBAM Client and the Self-Service Portal to communicate to the Recovery Database.|This feature is installed on a computer running Windows Server.| -|Self-Service Website|This website enables end users on client computers to independently sign in to a website to get a recovery key if they lose or forget their BitLocker password.|This feature is configured on a computer running Windows Server.| -|Administration and Monitoring Server/Recovery Audit Report||| -|Administration and Monitoring Web Service|This web service enables communication between the Administration and Monitoring Website and the SQL Server databases where reporting data is stored.|This feature is installed on a server running Windows Server.| -|Administration and Monitoring Website|The Recovery Audit report is viewed from the Administration and Monitoring Website. Use the Configuration Manager console to view all other reports, or view reports directly from SQL Server Reporting Services.|This feature is configured on a server running Windows Server.| -|Databases||| -|Recovery Database|This database stores recovery data that is collected from MBAM client computers.|This feature is configured on a server running Windows Server and a supported SQL Server instance.| -|Audit Database|This database stores audit information about recovery attempts and activity.|This feature is configured on a server running Windows Server and a supported SQL Server instance.| -|Configuration Manager Features||| -|Configuration Manager Management console|This console is built into Configuration Manager and is used to view reports.|For viewing reports only, this feature can be installed on any server or client computer.| -|Configuration Manager Reports|Reports show compliance and recovery audit data for client computers in your enterprise.|The Reports feature is installed on a server running Windows Server and SSRS, and Reports run on a supported SQL Server instance. A reporting services point must be defined in Configuration Manager on the server that is running SSRS.| -|SQL Server Reporting Services|SSRS enables the MBAM Reports. Reports can be viewed directly from SSRS or from the Configuration Manager console.|SSRS is installed on a server running Windows Server. A reporting services point must be defined in Configuration Manager on the server that is running SSRS.| + +| Feature type | Description | +|------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Self-Service Server | | +| Self-Service Web Service | This web service is used by the MBAM Client and the Self-Service Portal to communicate to the Recovery Database. | +| Self-Service Website | This website enables end users on client computers to independently sign in to a website to get a recovery key if they lose or forget their BitLocker password. | +| Administration and Monitoring Server/Recovery Audit Report | | +| Administration and Monitoring Web Service | This web service enables communication between the Administration and Monitoring Website and the SQL Server databases where reporting data is stored. | +| Administration and Monitoring Website | The Recovery Audit report is viewed from the Administration and Monitoring Website. Use the Configuration Manager console to view all other reports, or view reports directly from SQL Server Reporting Services. | +| Databases | | +| Recovery Database | This database stores recovery data that is collected from MBAM client computers. | +| Audit Database | This database stores audit information about recovery attempts and activity. | +| Configuration Manager Features | | +| Configuration Manager Management console | This console is built into Configuration Manager and is used to view reports. | +| Configuration Manager Reports | Reports show compliance and recovery audit data for client computers in your enterprise. | +| SQL Server Reporting Services | SSRS enables the MBAM Reports. Reports can be viewed directly from SSRS or from the Configuration Manager console. | ## Related topics diff --git a/mdop/mbam-v25/installing-the-mbam-25-server-software.md b/mdop/mbam-v25/installing-the-mbam-25-server-software.md index 742bb3517f..d238b982fe 100644 --- a/mdop/mbam-v25/installing-the-mbam-25-server-software.md +++ b/mdop/mbam-v25/installing-the-mbam-25-server-software.md @@ -34,9 +34,9 @@ This topic describes how to install the Microsoft BitLocker Administration and M

          Review the MBAM 2.5 planning information

          @@ -47,7 +47,7 @@ This topic describes how to install the Microsoft BitLocker Administration and M -  + ## Installing the MBAM 2.5 Server software by using the Microsoft BitLocker Administration and Monitoring Setup wizard @@ -127,7 +127,7 @@ The following table describes the command-line parameters for installing the MBA -  + @@ -138,7 +138,7 @@ The following table describes the command-line parameters for installing the MBA [Configuring the MBAM 2.5 Server Features](configuring-the-mbam-25-server-features.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/mbam-25-deployment-checklist.md b/mdop/mbam-v25/mbam-25-deployment-checklist.md index 2bf0ac83dd..660b1ebf79 100644 --- a/mdop/mbam-v25/mbam-25-deployment-checklist.md +++ b/mdop/mbam-v25/mbam-25-deployment-checklist.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 You can use this checklist to help you during Microsoft BitLocker Administration and Monitoring (MBAM) deployment with a Stand-alone topology. -**Note**   +**Note** This checklist outlines the recommended steps and a high-level list of items to consider when you deploy Microsoft BitLocker Administration and Monitoring features. We recommend that you copy this checklist into a spreadsheet program and customize it for your use. -  + @@ -43,19 +43,19 @@ This checklist outlines the recommended steps and a high-level list of items to - + - + - + @@ -68,37 +68,36 @@ This checklist outlines the recommended steps and a high-level list of items to
        • Configuration Manager Integration topology (needed only if you are running MBAM with this topology)

        • -Note   -

          Note the names of the servers on which you configure each feature. You will use this information throughout the configuration process.

          +Note

          Note the names of the servers on which you configure each feature. You will use this information throughout the configuration process.

          -  +
          - + - + - + - +
          Checklist box

          Review and complete all planning steps to prepare your environment for MBAM deployment.

          [MBAM 2.5 Planning Checklist](mbam-25-planning-checklist.md)

          MBAM 2.5 Planning Checklist

          Checklist box

          Review the supported configurations information to ensure that MBAM supports the selected client and server computers.

          [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

          MBAM 2.5 Supported Configurations

          Checklist box

          Install the MBAM Server software.

          [Installing the MBAM 2.5 Server Software](installing-the-mbam-25-server-software.md)

          Installing the MBAM 2.5 Server Software

          [Configuring the MBAM 2.5 Server Features](configuring-the-mbam-25-server-features.md)

          Configuring the MBAM 2.5 Server Features

          Checklist box

          Validate the MBAM configuration.

          [Validating the MBAM 2.5 Server Feature Configuration](validating-the-mbam-25-server-feature-configuration.md)

          Validating the MBAM 2.5 Server Feature Configuration

          Checklist box

          Copy the MBAM Group Policy Template and edit the Group Policy settings.

          [Copying the MBAM 2.5 Group Policy Templates](copying-the-mbam-25-group-policy-templates.md) and [Editing the MBAM 2.5 Group Policy Settings](editing-the-mbam-25-group-policy-settings.md)

          Copying the MBAM 2.5 Group Policy Templates and Editing the MBAM 2.5 Group Policy Settings

          Checklist box

          Deploy the MBAM Client software.

          [Deploying the MBAM 2.5 Client](deploying-the-mbam-25-client.md)

          Deploying the MBAM 2.5 Client

          -  + ## Related topics @@ -106,9 +105,9 @@ This checklist outlines the recommended steps and a high-level list of items to [Deploying MBAM 2.5](deploying-mbam-25.md) -  -  + + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/mbam-25-planning-checklist.md b/mdop/mbam-v25/mbam-25-planning-checklist.md index ff91d81f2b..015403224b 100644 --- a/mdop/mbam-v25/mbam-25-planning-checklist.md +++ b/mdop/mbam-v25/mbam-25-planning-checklist.md @@ -40,92 +40,92 @@ You can use the following checklists to help you prepare your computing environm Checklist box

          Review the "Getting started" information to understand the product before you start deployment planning.

          -

          [Getting Started with MBAM 2.5](getting-started-with-mbam-25.md)

          +

          Getting Started with MBAM 2.5

          Checklist box

          Review the recommended high-level architecture for an MBAM deployment. You might also want to review an illustration and description of the individual parts (databases, websites, Reports) of an MBAM deployment.

          -

          [High-Level Architecture for MBAM 2.5](high-level-architecture-for-mbam-25.md)

          -

          [Illustrated Features of an MBAM 2.5 Deployment](illustrated-features-of-an-mbam-25-deployment.md)

          +

          High-Level Architecture for MBAM 2.5

          +

          Illustrated Features of an MBAM 2.5 Deployment

          Checklist box

          Review and complete the prerequisites for the MBAM Stand-alone and Configuration Manager Integration topologies.

          -

          [MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies](mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md)

          +

          MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies

          Checklist box

          If you plan to use the Configuration Manager Integration topology, complete the additional prerequisites that apply only to this topology.

          -

          [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md)

          +

          MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology

          Checklist box

          Review and meet the MBAM 2.5 prerequisites for the MBAM Client.

          -

          [Prerequisites for MBAM 2.5 Clients](prerequisites-for-mbam-25-clients.md)

          +

          Prerequisites for MBAM 2.5 Clients

          Checklist box

          Plan for and configure MBAM Group Policy requirements.

          -

          [Planning for MBAM 2.5 Group Policy Requirements](planning-for-mbam-25-group-policy-requirements.md)

          +

          Planning for MBAM 2.5 Group Policy Requirements

          Checklist box

          Plan for and create the necessary Active Directory Domain Services security groups.

          -

          [Planning for MBAM 2.5 Groups and Accounts](planning-for-mbam-25-groups-and-accounts.md)

          +

          Planning for MBAM 2.5 Groups and Accounts

          Checklist box

          Plan how you will secure the MBAM websites.

          -

          [Planning How to Secure the MBAM Websites](planning-how-to-secure-the-mbam-websites.md)

          +

          Planning How to Secure the MBAM Websites

          Checklist box

          Review the MBAM Supported Configurations to ensure that your hardware meets the installation system requirements.

          -

          [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md)

          +

          MBAM 2.5 Supported Configurations

          Checklist box

          Review the considerations for deploying the MBAM Server features.

          -

          [Planning for MBAM 2.5 Server Deployment](planning-for-mbam-25-server-deployment.md)

          +

          Planning for MBAM 2.5 Server Deployment

          Checklist box

          Review the considerations for deploying the MBAM Client.

          -

          [Planning for MBAM 2.5 Client Deployment](planning-for-mbam-25-client-deployment.md)

          +

          Planning for MBAM 2.5 Client Deployment

          Checklist box

          Review the requirements and steps to deploy MBAM in a highly available configuration.

          -

          [Planning for MBAM 2.5 High Availability](planning-for-mbam-25-high-availability.md)

          +

          Planning for MBAM 2.5 High Availability

          Checklist box

          Review the MBAM security considerations that pertain to the Trusted Platform Module, log files, and transparent data encryption.

          -

          [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md)

          +

          MBAM 2.5 Security Considerations

          Checklist box

          Optionally, review the steps to evaluate MBAM in a test environment.

          -

          [Evaluating MBAM 2.5 in a Test Environment](evaluating-mbam-25-in-a-test-environment.md)

          +

          Evaluating MBAM 2.5 in a Test Environment

          -  + ## Related topics @@ -133,9 +133,9 @@ You can use the following checklists to help you prepare your computing environm [Planning for MBAM 2.5](planning-for-mbam-25.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/mbam-25-security-considerations.md b/mdop/mbam-v25/mbam-25-security-considerations.md index bab666d38b..f87672362a 100644 --- a/mdop/mbam-v25/mbam-25-security-considerations.md +++ b/mdop/mbam-v25/mbam-25-security-considerations.md @@ -72,14 +72,14 @@ To enable MBAM to escrow and then store TPM OwnerAuth passwords, you must config -  + The location of these Group Policy settings is **Computer Configuration** > **Administrative Templates** > **System** > **Trusted Platform Module Services**. **Note**   Windows removes the OwnerAuth locally after MBAM successfully escrows it with these settings. -  + ### Escrowing TPM OwnerAuth in Windows 7 @@ -120,7 +120,7 @@ To create user-to-computer associations after you have installed the MBAM server **Note**   The MBAM agent will override user-to-computer associations when that computer begins reporting up to the server. -  + **Prerequisites:** The Read-AD\* cmdlets can retrieve information from AD only if they are either run as a highly privileged user account, such as a Domain Administrator, or run as an account in a custom security group granted read access to the information (recommended). @@ -171,7 +171,7 @@ The Read-AD\* cmdlets do not have the ability to discover the user accounts that - Users who are not in the MBAM Advanced Helpdesk Users security group as defined during installation, recovering on behalf of other users -  + ## Configure MBAM to automatically unlock the TPM after a lockout @@ -181,7 +181,7 @@ You can configure MBAM 2.5 SP1 to automatically unlock the TPM in case of a lock **Important**   To enable TPM lockout auto reset, you must configure this feature on both the server side and in Group Policy on the client side. -  + - To enable TPM lockout auto reset on the client side, configure the Group Policy setting "Configure TPM lockout auto reset" located at **Computer Configuration** > **Administrative Templates** > **Windows Components** > **MDOP MBAM** > **Client Management**. @@ -196,7 +196,7 @@ TPM lockout auto reset is disabled by default. **Note**   TPM lockout auto reset is only supported on computers running TPM version 1.2. TPM 2.0 provides built-in lockout auto reset functionality. -  + **The Recovery Audit Report** includes events related to TPM lockout auto reset. If a request is made from the MBAM client to retrieve a TPM OwnerAuth password, an event is logged to indicate recovery. Audit entries will include the following events: @@ -227,7 +227,7 @@ TPM lockout auto reset is only supported on computers running TPM version 1.2. T -  + ## Secure connections to SQL Server @@ -305,11 +305,11 @@ For an example of how to enable TDE for MBAM database instances, see [Understand [Planning to Deploy MBAM 2.5](planning-to-deploy-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md index 58250c385a..e6b0faca0c 100644 --- a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md +++ b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md @@ -23,10 +23,10 @@ If you are deploying MBAM with System Center Configuration Manager, you must com For a list of the supported hardware and operating systems for MBAM, see [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md). -**Important**   +**Important** If BitLocker was used without MBAM, you must decrypt the drive and then clear TPM using tpm.msc. MBAM cannot take ownership of TPM if the client PC is already encrypted and the TPM owner password created. -  + ## Required MBAM roles and accounts @@ -45,12 +45,12 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Groups created in Active Directory Domain Services (AD DS)

          -

          See [Planning for MBAM 2.5 Groups and Accounts](planning-for-mbam-25-groups-and-accounts.md) for a description of these groups and accounts.

          +

          See Planning for MBAM 2.5 Groups and Accounts for a description of these groups and accounts.

          -  + ## Prerequisites for the Recovery Database @@ -70,7 +70,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Supported version of SQL Server

          Install Microsoft SQL Server with SQL_Latin1_General_CP1_CI_AS collation.

          -

          See [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md) for supported versions.

          +

          See MBAM 2.5 Supported Configurations for supported versions.

          Required SQL Server permissions

          @@ -90,13 +90,12 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Optional - Install the Transparent Data Encryption (TDE) feature available in SQL Server

          -

          The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with laws, regulations, and guidelines that apply to various industries.

          +

          The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with laws, regulations, and guidelines that apply to various industries.

          -Note   -

          TDE performs real-time decryption of database information. This means that, if you are viewing recovery key information in the SQL Server database and you are logged on under an account that has permissions to the database, the recovery key information is visible. To read more about TDE, see [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md).

          +Note

          TDE performs real-time decryption of database information. This means that, if you are viewing recovery key information in the SQL Server database and you are logged on under an account that has permissions to the database, the recovery key information is visible. To read more about TDE, see MBAM 2.5 Security Considerations.

          -  +
          @@ -110,7 +109,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP -  + ## Prerequisites for the Compliance and Audit Database @@ -130,7 +129,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Supported version of SQL Server

          Install SQL Server with SQL_Latin1_General_CP1_CI_AS collation.

          -

          See [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md) for supported versions.

          +

          See MBAM 2.5 Supported Configurations for supported versions.

          Required SQL Server permissions

          @@ -150,8 +149,8 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Optional - Install the Transparent Data Encryption (TDE) feature in SQL Server

          -

          The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with laws, regulations, and guidelines that apply to various industries.

          -

          TDE performs real-time decryption of database information. This means that, if you are viewing recovery key information in the SQL Server database and you are logged on under an account that has permissions to the database, the recovery key information is visible. To read more about TDE, see [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md).

          +

          The TDE SQL Server feature performs real-time I/O encryption and decryption of the data and log files, which can help you to comply with laws, regulations, and guidelines that apply to various industries.

          +

          TDE performs real-time decryption of database information. This means that, if you are viewing recovery key information in the SQL Server database and you are logged on under an account that has permissions to the database, the recovery key information is visible. To read more about TDE, see MBAM 2.5 Security Considerations.

          SQL Server Database Engine Services

          @@ -164,7 +163,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP -  + ## Prerequisites for the Reports @@ -184,7 +183,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP

          Supported version of SQL Server

          Install SQL Server with SQL_Latin1_General_CP1_CI_AS collation.

          -

          See [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md) for supported versions.

          +

          See MBAM 2.5 Supported Configurations for supported versions.

          SQL Server Reporting Services (SSRS)

          @@ -206,7 +205,7 @@ If BitLocker was used without MBAM, you must decrypt the drive and then clear TP -  + ## Prerequisites for the Administration and Monitoring Server @@ -264,13 +263,12 @@ The following table lists the installation prerequisites for the MBAM Administra
        • .NET Framework 4.5

          • Windows Server 2012 or Windows Server 2012 R2 - .NET Framework 4.5 is already installed for these versions of Windows Server, but you must enable it.

          • -
          • Windows Server 2008 R2 - .NET Framework 4.5 is not included with Windows Server 2008 R2, so you must [download Microsoft .NET Framework 4.5](https://go.microsoft.com/fwlink/?LinkId=392318) and install it separately.

            +
          • Windows Server 2008 R2 - .NET Framework 4.5 is not included with Windows Server 2008 R2, so you must download Microsoft .NET Framework 4.5 and install it separately.

            -Note   -

            If you are upgrading from MBAM 2.0 or MBAM 2.0 SP1 and need to install .NET Framework 4.5, see [Release Notes for MBAM 2.5](release-notes-for-mbam-25.md) for an additional required step to make the websites work.

            +Note

            If you are upgrading from MBAM 2.0 or MBAM 2.0 SP1 and need to install .NET Framework 4.5, see Release Notes for MBAM 2.5 for an additional required step to make the websites work.

            -  +
        • WCF Activation

          @@ -289,30 +287,29 @@ The following table lists the installation prerequisites for the MBAM Administra
        -

        ASP.NET MVC 4.0

        -

        [ASP.NET MVC 4 download](https://go.microsoft.com/fwlink/?LinkId=392271)

        +

        ASP.NET MVC 4.0

        +

        ASP.NET MVC 4 download

        Service Principal Name (SPN)

        The web applications require an SPN for the virtual host name under the domain account that you use for the web application pools.

        -

        If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See [Setspn](https://technet.microsoft.com/library/cc731241.aspx) for information about the rights required to create SPNs.

        +

        If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See Setspn for information about the rights required to create SPNs.

        If you do not have administrative rights to create SPNs, you must ask the Active Directory administrators in your organization to create the SPN for you by using the following command.

        Setspn -s http/mbamvirtual contoso\mbamapppooluser
         Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser

        In the code example, the virtual host name is mbamvirtual.contoso.com, and the domain account used for the web application pools is contoso\mbamapppooluser.

        -Note   -

        If you are setting up Load Balancing, use the same application pool account on all servers.

        +Note

        If you are setting up Load Balancing, use the same application pool account on all servers.

        -  +
        -

        For more information about registering SPNs for fully qualified, NetBIOS, and custom host names, see [Planning How to Secure the MBAM Websites](planning-how-to-secure-the-mbam-websites.md).

        +

        For more information about registering SPNs for fully qualified, NetBIOS, and custom host names, see Planning How to Secure the MBAM Websites.

        -  + ## Prerequisites for the Self-Service Portal @@ -331,11 +328,11 @@ Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser

    Supported version of Windows Server

    -

    See [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md) for supported versions.

    +

    See MBAM 2.5 Supported Configurations for supported versions.

    -

    ASP.NET MVC 4.0

    -

    [ASP.NET MVC 4 download](https://go.microsoft.com/fwlink/?LinkId=392271)

    +

    ASP.NET MVC 4.0

    +

    ASP.NET MVC 4 download

    Web Service IIS Management Tools

    @@ -344,24 +341,23 @@ Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser

    Service Principal Name (SPN)

    The web applications require an SPN for the virtual host name under the domain account that you use for the web application pools.

    -

    If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See [Setspn](https://technet.microsoft.com/library/cc731241.aspx) for information about the rights required to create SPNs.

    +

    If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See Setspn for information about the rights required to create SPNs.

    If you do not have administrative rights to create SPNs, you must ask the Active Directory administrators in your organization administrators in your organization to create the SPN for you by using the following command.

    Setspn -s http/mbamvirtual contoso\mbamapppooluser
     Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser

    In the code example, the virtual host name is mbamvirtual.contoso.com, and the domain account used for the web application pools is contoso\mbamapppooluser.

    -Note   -

    If you are setting up Load Balancing, use the same application pool account on all servers.

    +Note

    If you are setting up Load Balancing, use the same application pool account on all servers.

    -  +
    -

    For more information about registering SPNs for fully qualified, NetBIOS, and custom host names, see [Planning How to Secure the MBAM Websites](planning-how-to-secure-the-mbam-websites.md).

    +

    For more information about registering SPNs for fully qualified, NetBIOS, and custom host names, see Planning How to Secure the MBAM Websites.

    -  + ## Prerequisites for the Management Workstation @@ -379,7 +375,7 @@ Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser
    -

    Before installing the MBAM Client, download the MBAM Group Policy Templates from [How to Get MDOP Group Policy (.admx) Templates](https://go.microsoft.com/fwlink/p/?LinkId=393941) and configure them with the settings that you want to implement in your enterprise for BitLocker Drive Encryption.

    +

    Before installing the MBAM Client, download the MBAM Group Policy Templates from How to Get MDOP Group Policy (.admx) Templates and configure them with the settings that you want to implement in your enterprise for BitLocker Drive Encryption.

    Before installing the MBAM Client, do the following:

    @@ -395,20 +391,20 @@ Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser - + - +

    Copy the MBAM Group Policy Templates

    [Copying the MBAM 2.5 Group Policy Templates](copying-the-mbam-25-group-policy-templates.md)

    Copying the MBAM 2.5 Group Policy Templates

    Edit the Group Policy settings

    [Editing the MBAM 2.5 Group Policy Settings](editing-the-mbam-25-group-policy-settings.md)

    Editing the MBAM 2.5 Group Policy Settings

    -

     

    +

    -  + @@ -421,9 +417,9 @@ Setspn -s http/mbamvirtual.contoso.com contoso\mbamapppooluser
    [MBAM 2.5 Supported Configurations](mbam-25-supported-configurations.md) -  -  + + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/mbam-25-supported-configurations.md b/mdop/mbam-v25/mbam-25-supported-configurations.md index 107559edc8..970711d8a8 100644 --- a/mdop/mbam-v25/mbam-25-supported-configurations.md +++ b/mdop/mbam-v25/mbam-25-supported-configurations.md @@ -21,10 +21,10 @@ You can run Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 in a St For additional configurations that are specific to the Configuration Manager Integration topology, see [Versions of Configuration Manager that MBAM supports](#bkmk-cm-ramreqs). -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + ## MBAM Supported Languages @@ -87,7 +87,7 @@ The following tables show the languages that are supported for the MBAM Client ( -  + **Supported Languages in MBAM 2.5:** @@ -134,14 +134,14 @@ The following tables show the languages that are supported for the MBAM Client ( -  + ## MBAM Server system requirements ### MBAM Server operating system requirements -We strongly recommend that you run the MBAM Client and MBAM Server on the same line of operating systems. For example, Windows 10 with Windows Server 2016, Windows 8.1 with Windows Server 2012 R2, and so on. +We strongly recommend that you run the MBAM Client and MBAM Server on the same line of operating systems. For example, Windows 10 with Windows Server 2016, Windows 8.1 with Windows Server 2012 R2, and so on. The following table lists the operating systems that are supported for the MBAM Server installation. @@ -162,7 +162,7 @@ The following table lists the operating systems that are supported for the MBAM -

    Windows Server 2016

    +

    Windows Server 2016

    Standard or Datacenter

    64-bit

    @@ -180,7 +180,7 @@ The following table lists the operating systems that are supported for the MBAM

    64-bit

    -

    Windows Server 2008 R2

    +

    Windows Server 2008 R2

    Standard, Enterprise, or Datacenter

    SP1

    64-bit

    @@ -188,7 +188,7 @@ The following table lists the operating systems that are supported for the MBAM -  + The enterprise domain must contain at least one Windows Server 2008 (or later) domain controller. @@ -228,7 +228,7 @@ These requirements are for the MBAM Stand-alone topology. For the requirements f -  + ### MBAM Server processor, RAM, and disk space requirements - Configuration Manager Integration topology @@ -266,7 +266,7 @@ The following table lists the server processor, RAM, and disk space requirements -  + ### Versions of Configuration Manager that MBAM supports @@ -303,7 +303,7 @@ MBAM supports the following versions of Configuration Manager.

    64-bit

    -

    Microsoft System Center 2012 Configuration Manager

    +

    Microsoft System Center 2012 Configuration Manager

    SP1

    64-bit

    @@ -312,21 +312,21 @@ MBAM supports the following versions of Configuration Manager.

    64-bit

    ->**Note** Although Configuration Manager 2007 R2 is 32 bit, you must install it and SQL Server on a 64-bit operating system in order to match the 64-bit MBAM software. +>Note Although Configuration Manager 2007 R2 is 32 bit, you must install it and SQL Server on a 64-bit operating system in order to match the 64-bit MBAM software. -  + For a list of supported configurations for the Configuration Manager Server, see the appropriate TechNet documentation for the version of Configuration Manager that you are using. MBAM has no additional system requirements for the Configuration Manager Server. -### SQL Server database requirements +### SQL Server database requirements The following table lists the Microsoft SQL Server versions that are supported for the MBAM Server features, which include the Recovery Database, Compliance and Audit Database, and the Reports feature. The required versions apply to the Stand-alone or the Configuration Manager Integration topologies. -You must install SQL Server with the **SQL\_Latin1\_General\_CP1\_CI\_AS** collation. +You must install SQL Server with the **SQL\_Latin1\_General\_CP1\_CI\_AS** collation. @@ -348,24 +348,23 @@ You must install SQL Server with the **SQL\_Latin1\_General\_CP1\_CI\_AS** coll - - +
    -https://www.microsoft.com/en-us/download/details.aspx?id=54967 +https://www.microsoft.com/en-us/download/details.aspx?id=54967 - + - + @@ -375,7 +374,7 @@ https://www.microsoft.com/en-us/download/details.aspx?id=54967

    Microsoft SQL Server 2017

    Standard, Enterprise, or Datacenter

    64-bit

    64-bit

    Microsoft SQL Server 2016

    Standard, Enterprise, or Datacenter

    SP1

    64-bit

    64-bit

    Microsoft SQL Server 2014

    Standard, Enterprise, or Datacenter

    SP1, SP2

    64-bit

    Microsoft SQL Server 2012

    Microsoft SQL Server 2012

    Standard, Enterprise, or Datacenter

    SP3

    64-bit

    Microsoft SQL Server 2008 R2

    Microsoft SQL Server 2008 R2

    Standard or Enterprise

    SP3

    64-bit

    < **Note** In order to support SQL 2016 you must install the March 2017 Servicing Release for MDOP https://www.microsoft.com/en-us/download/details.aspx?id=54967 and to support SQL 2017 you must install the July 2018 Servicing Release for MDOP https://www.microsoft.com/en-us/download/details.aspx?id=57157. In general stay current by always using the most recent servicing update as it also includes all bugfixes and new features. -  + ### SQL Server processor, RAM, and disk space requirements – Stand-alone topology @@ -413,7 +412,7 @@ The following table lists the recommended server processor, RAM, and disk space
    -  + ### SQL Server processor, RAM, and disk space requirements - Configuration Manager Integration topology @@ -451,14 +450,14 @@ The following table lists the server processor, RAM, and disk space requirements -  + ## MBAM Client system requirements ### Client operating system requirements -We strongly recommend that you run the MBAM Client and MBAM Server on the same line of operating systems. For example, Windows 10 with Windows Server 2016, Windows 8.1 with Windows Server 2012 R2, and so on. +We strongly recommend that you run the MBAM Client and MBAM Server on the same line of operating systems. For example, Windows 10 with Windows Server 2016, Windows 8.1 with Windows Server 2012 R2, and so on. The following table lists the operating systems that are supported for MBAM Client installation. The same requirements apply to the Stand-alone and the Configuration Manager Integration topologies. @@ -483,8 +482,7 @@ The following table lists the operating systems that are supported for MBAM Clie

    Enterprise

    32-bit or 64-bit

    - - +

    Windows 10

    Enterprise

    @@ -497,7 +495,7 @@ The following table lists the operating systems that are supported for MBAM Clie

    32-bit or 64-bit

    -

    Windows 7

    +

    Windows 7

    Enterprise or Ultimate

    SP1

    32-bit or 64-bit

    @@ -511,7 +509,7 @@ The following table lists the operating systems that are supported for MBAM Clie -  + ### Client RAM requirements @@ -557,7 +555,7 @@ The following table lists the operating systems that are supported for MBAM Grou

    32-bit or 64-bit

    -

    Windows 7

    +

    Windows 7

    Enterprise, or Ultimate

    SP1

    32-bit or 64-bit

    @@ -575,7 +573,7 @@ The following table lists the operating systems that are supported for MBAM Grou

    64-bit

    -

    Windows Server 2008 R2

    +

    Windows Server 2008 R2

    Standard, Enterprise, or Datacenter

    SP1

    64-bit

    @@ -608,9 +606,9 @@ The MBAM client is not supported on virtual machines and is also not supported o [Preparing your Environment for MBAM 2.5](preparing-your-environment-for-mbam-25.md) -  -  + + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/planning-for-mbam-25-client-deployment.md b/mdop/mbam-v25/planning-for-mbam-25-client-deployment.md index 663b146718..6fce394daa 100644 --- a/mdop/mbam-v25/planning-for-mbam-25-client-deployment.md +++ b/mdop/mbam-v25/planning-for-mbam-25-client-deployment.md @@ -26,7 +26,7 @@ If you deploy MBAM with the Configuration Manager Integration topology, you can **Note**   Windows To Go is not supported for the Configuration Manager Integration topology installation when you are using Configuration Manager 2007. -  + ## Deploying the MBAM Client to enable BitLocker Drive Encryption after computer distribution to end users @@ -36,14 +36,14 @@ After you configure Group Policy, you can use an enterprise software deployment **Note**   Beginning in MBAM 2.5 SP1, a separate MSI is no longer included with the MBAM product. However, you can extract the MSI from the executable file (.exe) that is included with the product. -  + When you deploy the MBAM Client after you distribute computers to client computers, end users are prompted to encrypt their computer. This action enables MBAM to collect the data, which includes the PIN and password (if required by policy), and then to begin the encryption process. **Note**   In this approach, end users who have computers with a TPM chip are prompted to activate and initialize the TPM chip if the chip has not been previously activated. -  + ## Using the MBAM Client to enable BitLocker Drive Encryption before computer distribution to end users @@ -55,7 +55,7 @@ If your organization wants to use the TPM chip to encrypt computers, the adminis **Note**   The TPM protector option requires the administrator to accept the BIOS prompt to activate and initialize the TPM before the computer is delivered to the end user. -  + ## MBAM Client support for Encrypted Hard Drives @@ -70,9 +70,9 @@ MBAM supports BitLocker on Encrypted Hard Drives that meet TCG specification req [Deploying the MBAM 2.5 Client](deploying-the-mbam-25-client.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/planning-for-mbam-25-group-policy-requirements.md b/mdop/mbam-v25/planning-for-mbam-25-group-policy-requirements.md index 82a51d17cb..9003490cee 100644 --- a/mdop/mbam-v25/planning-for-mbam-25-group-policy-requirements.md +++ b/mdop/mbam-v25/planning-for-mbam-25-group-policy-requirements.md @@ -44,7 +44,7 @@ MBAM supports the following types of BitLocker protectors.
  • TPM + USB key – supported only when the operating system volume is encrypted before MBAM is installed

  • TPM + PIN + USB key - supported only when the operating system volume is encrypted before MBAM is installed

  • Password - supported only for Windows To Go devices, fixed data drives, and Windows 8, Windows 8.1, and Windows 10 devices that do not have a TPM

  • -
  • Numerical password - applied automatically as part of volume encryption and does not need to be configured except in FIPS mode on Windows 7

  • +
  • Numerical password - applied automatically as part of volume encryption and does not need to be configured except in FIPS mode on Windows 7

  • Data recovery agent (DRA)

  • @@ -53,7 +53,7 @@ MBAM supports the following types of BitLocker protectors.
    • Password

    • Auto-unlock

    • -
    • Numerical password - applied automatically as part of volume encryption and does not need to be configured except in FIPS mode on Windows 7

    • +
    • Numerical password - applied automatically as part of volume encryption and does not need to be configured except in FIPS mode on Windows 7

    • Data recovery agent (DRA)

    @@ -69,7 +69,7 @@ MBAM supports the following types of BitLocker protectors. -  + ### Support for the Used Space Encryption BitLocker policy @@ -95,27 +95,27 @@ When you are ready to configure the MBAM Group Policy settings you want, do the -

    Copy the MBAM Group Policy Templates from [How to Get MDOP Group Policy (.admx) Templates](https://go.microsoft.com/fwlink/p/?LinkId=393941) and install them on a computer that is capable of running the Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM).

    -

    [Copying the MBAM 2.5 Group Policy Templates](copying-the-mbam-25-group-policy-templates.md)

    +

    Copy the MBAM Group Policy Templates from How to Get MDOP Group Policy (.admx) Templates and install them on a computer that is capable of running the Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM).

    +

    Copying the MBAM 2.5 Group Policy Templates

    Configure the Group Policy settings that you want to use in your enterprise.

    -

    [Editing the MBAM 2.5 Group Policy Settings](editing-the-mbam-25-group-policy-settings.md)

    +

    Editing the MBAM 2.5 Group Policy Settings

    -  + ## Descriptions of the MBAM Group Policy settings The **MDOP MBAM (BitLocker Management)** GPO node contains four global policy settings and four child GPO nodes: **Client Management**, **Fixed Drive**, **Operating System Drive**, and **Removable Drive**. The following sections describe and suggest settings for the MBAM Group Policy settings. -**Important**   +**Important** Do not change the Group Policy settings in the **BitLocker Drive Encryption** node, or MBAM will not work correctly. MBAM automatically configures the settings in this node for you when you configure the settings in the **MDOP MBAM (BitLocker Management)** node. -  + ### Global Group Policy definitions @@ -139,14 +139,13 @@ This section describes MBAM Global Group Policy definitions at the following GPO

    Configure this policy to use a specific encryption method and cipher strength.

    When this policy is not configured, BitLocker uses the default encryption method: AES 128-bit with Diffuser.

    -Note   -

    An issue with the BitLocker Computer Compliance report causes it to display "unknown" for the cipher strength, even if you are using the default value. To work around this issue, make sure you enable this setting and set a value for cipher strength.

    +Note

    An issue with the BitLocker Computer Compliance report causes it to display "unknown" for the cipher strength, even if you are using the default value. To work around this issue, make sure you enable this setting and set a value for cipher strength.

    -  +
      -
    • AES 128-bit with Diffuser – for Windows 7 only

    • +
    • AES 128-bit with Diffuser – for Windows 7 only

    • AES 128 for Windows 8, Windows 8.1, and Windows 10

    @@ -172,7 +171,7 @@ This section describes MBAM Global Group Policy definitions at the following GPO -  + ### Client Management Group Policy definitions @@ -212,14 +211,13 @@ You can set the same Group Policy settings for the Stand-alone and System Center

    Configure user exemption policy

    Suggested configuration: Not Configured

    This policy setting lets you configure a website address, email address, or phone number that instructs a user to request an exemption from BitLocker encryption.

    -

    If you enable this policy setting and provide a website address, email address, or phone number, users see a dialog box with instructions on how to apply for an exemption from BitLocker protection. For more information about enabling BitLocker encryption exemptions for users, see [How to Manage User BitLocker Encryption Exemptions](how-to-manage-user-bitlocker-encryption-exemptions-mbam-25.md).

    +

    If you enable this policy setting and provide a website address, email address, or phone number, users see a dialog box with instructions on how to apply for an exemption from BitLocker protection. For more information about enabling BitLocker encryption exemptions for users, see How to Manage User BitLocker Encryption Exemptions.

    If you either disable or do not configure this policy setting, the exemption request instructions are not displayed to users.

    -Note   -

    User exemption is managed per user, not per computer. If multiple users log on to the same computer and any one user is not exempt, the computer is encrypted.

    +Note

    User exemption is managed per user, not per computer. If multiple users log on to the same computer and any one user is not exempt, the computer is encrypted.

    -  +
    @@ -240,7 +238,7 @@ You can set the same Group Policy settings for the Stand-alone and System Center -  + ### Fixed Drive Group Policy definitions @@ -278,9 +276,9 @@ This section describes Fixed Drive policy definitions for Microsoft BitLocker Ad

    Allow access to BitLocker-protected fixed drives from earlier versions of Windows

    Suggested configuration: Not Configured

    -

    Enable this policy so that fixed drives with the FAT file system can be unlocked and viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    -

    When the policy is enabled or not configured, fixed drives that are formatted with the FAT file system can be unlocked and their content can be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2. These operating systems have read-only permission to BitLocker-protected drives.

    -

    When the policy is disabled, fixed drives that are formatted with the FAT file system cannot be unlocked and their content cannot be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    +

    Enable this policy so that fixed drives with the FAT file system can be unlocked and viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    +

    When the policy is enabled or not configured, fixed drives that are formatted with the FAT file system can be unlocked and their content can be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2. These operating systems have read-only permission to BitLocker-protected drives.

    +

    When the policy is disabled, fixed drives that are formatted with the FAT file system cannot be unlocked and their content cannot be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    Configure use of password for fixed drives

    @@ -312,7 +310,7 @@ This section describes Fixed Drive policy definitions for Microsoft BitLocker Ad -  + ### Operating System Drive Group Policy definitions @@ -339,7 +337,7 @@ This section describes Operating System Drive policy definitions for Microsoft B
  • Allow Standby States (S1-S3) When Sleeping (Plugged In)

  • Allow Standby States (S1-S3) When Sleeping (On Battery)

  • -

    If you are running Microsoft Windows 8 or later, and you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode, a password is required for startup. If you forget the password, you have to use one of the BitLocker recovery options to access the drive.

    +

    If you are running Microsoft Windows 8 or later, and you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode, a password is required for startup. If you forget the password, you have to use one of the BitLocker recovery options to access the drive.

    On a computer with a compatible TPM, two types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require the entry of a personal identification number (PIN).

    If you enable this policy setting, users have to put the operating system drive under BitLocker protection, and the drive is then encrypted.

    If you disable this policy, users cannot put the operating system drive under BitLocker protection. If you apply this policy after the operating system drive is encrypted, the drive is then decrypted.

    @@ -365,24 +363,22 @@ This section describes Operating System Drive policy definitions for Microsoft B

    Suggested configuration: Not Configured

    Use this policy setting to set the constraints for passwords that are used to unlock BitLocker-protected operating system drives. If non-TPM protectors are allowed on operating system drives, you can provision a password, enforce complexity requirements on the password, and configure a minimum length for the password. For the complexity requirement setting to be effective, you must also enable the Group Policy setting "Password must meet complexity requirements" located in Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy.

    -Note   -

    These settings are enforced when you turn on BitLocker, not when you unlock a volume. BitLocker lets you unlock a drive with any of the protectors that are available on the drive.

    +Note

    These settings are enforced when you turn on BitLocker, not when you unlock a volume. BitLocker lets you unlock a drive with any of the protectors that are available on the drive.

    -  +

    If you enable this policy setting, users can configure a password that meets the requirements that you define. To enforce complexity requirements on the password, click Require password complexity.

    Configure TPM platform validation profile for BIOS-based firmware configurations

    Suggested configuration: Not Configured

    -

    This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    +

    This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    -Important   -

    This Group Policy setting applies only to computers with BIOS configurations or to computers with UEFI firmware with a Compatibility Service Module (CSM) enabled. Computers that use a native UEFI firmware configuration store different values into the Platform Configuration Registers (PCRs). Use the "Configure TPM platform validation profile for native UEFI firmware configurations" Group Policy setting to configure the TPM PCR profile for computers that use native UEFI firmware.

    +Important

    This Group Policy setting applies only to computers with BIOS configurations or to computers with UEFI firmware with a Compatibility Service Module (CSM) enabled. Computers that use a native UEFI firmware configuration store different values into the Platform Configuration Registers (PCRs). Use the "Configure TPM platform validation profile for native UEFI firmware configurations" Group Policy setting to configure the TPM PCR profile for computers that use native UEFI firmware.

    -  +

    If you enable this policy setting before you turn on BitLocker, you can configure the boot components that the TPM validates before you unlock access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive and the computer instead displays the BitLocker Recovery console and requires that you provide either the recovery password or recovery key to unlock the drive.

    If you disable or do not configure this policy setting, BitLocker uses the default platform validation profile or the platform validation profile that is specified by the Setup script.

    @@ -390,20 +386,19 @@ This section describes Operating System Drive policy definitions for Microsoft B

    Configure TPM platform validation profile

    Suggested configuration: Not Configured

    -

    This policy setting enables you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    +

    This policy setting enables you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    If you enable this policy setting before you turn on BitLocker, you can configure the boot components that the TPM validates before you unlock access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive and the computer instead displays the BitLocker Recovery console and requires that you provide either the recovery password or recovery key to unlock the drive.

    If you disable or do not configure this policy setting, BitLocker uses the default platform validation profile or the platform validation profile that is specified by the setup script.

    Configure TPM platform validation profile for native UEFI firmware configurations

    Suggested configuration: Not Configured

    -

    This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    +

    This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.

    -Important   -

    This Group Policy setting applies only to computers with a native UEFI firmware configuration.

    +Important

    This Group Policy setting applies only to computers with a native UEFI firmware configuration.

    -  +

    If you enable this policy setting before you turn on BitLocker, you can configure the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive and the computer instead displays the BitLocker Recovery console and requires that you provide either the recovery password or recovery key to unlock the drive.

    If you disable or do not configure this policy setting, BitLocker uses the default platform validation profile or the platform validation profile that is specified by the setup script.

    @@ -418,13 +413,12 @@ This section describes Operating System Drive policy definitions for Microsoft B

    Use enhanced Boot Configuration Data validation profile

    Suggested configuration: Not Configured

    This policy setting allows you to choose specific Boot Configuration Data (BCD) settings to verify during platform validation.

    -

    If you enable this policy setting, you can add additional settings, remove the default settings, or both. If you disable this policy setting, the computer reverts to a BCD profile similar to the default BCD profile that is used by Windows 7. If you do not configure this policy setting, the computer verifies the default Windows BCD settings.

    +

    If you enable this policy setting, you can add additional settings, remove the default settings, or both. If you disable this policy setting, the computer reverts to a BCD profile similar to the default BCD profile that is used by Windows 7. If you do not configure this policy setting, the computer verifies the default Windows BCD settings.

    -Note   -

    When BitLocker uses Secure Boot for platform and Boot Configuration Data (BCD) integrity validation, as defined by the "Allow Secure Boot for integrity validation" policy, the "Use enhanced Boot Configuration Data validation profile" policy is ignored.

    +Note

    When BitLocker uses Secure Boot for platform and Boot Configuration Data (BCD) integrity validation, as defined by the "Allow Secure Boot for integrity validation" policy, the "Use enhanced Boot Configuration Data validation profile" policy is ignored.

    -  +

    The setting that controls boot debugging (0x16000010) is always validated and has no effect if it is included in the provided fields.

    @@ -447,17 +441,16 @@ This section describes Operating System Drive policy definitions for Microsoft B
  • Use default recovery message and URL: Select this option to display the default BitLocker recovery message and URL in the pre-boot BitLocker recovery screen. If you previously configured a custom recovery message or URL and want to revert to the default message, you must enable this policy and select the Use default recovery message and URL option.

  • -Note   -

    Not all characters and languages are supported in pre-boot. We recommend that you test that the characters you use for the custom message or URL appear correctly on the pre-boot BitLocker recovery screen.

    +Note

    Not all characters and languages are supported in pre-boot. We recommend that you test that the characters you use for the custom message or URL appear correctly on the pre-boot BitLocker recovery screen.

    -  +
    -  + ### Removable Drive Group Policy definitions @@ -492,9 +485,9 @@ This section describes Removable Drive Group Policy definitions for Microsoft Bi

    Allow access to BitLocker-protected removable drives from earlier versions of Windows

    Suggested configuration: Not Configured

    -

    Enable this policy to allow fixed drives with the FAT file system to be unlocked and viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    -

    When this policy is not configured, removable drives that are formatted with the FAT file system can be unlocked on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have read-only permission to BitLocker-protected drives.

    -

    When the policy is disabled, removable drives formatted with the FAT file system cannot be unlocked and their content cannot be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    +

    Enable this policy to allow fixed drives with the FAT file system to be unlocked and viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    +

    When this policy is not configured, removable drives that are formatted with the FAT file system can be unlocked on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have read-only permission to BitLocker-protected drives.

    +

    When the policy is disabled, removable drives formatted with the FAT file system cannot be unlocked and their content cannot be viewed on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2.

    Configure use of password for removable data drives

    @@ -513,7 +506,7 @@ This section describes Removable Drive Group Policy definitions for Microsoft Bi -  + ## Related topics @@ -523,11 +516,11 @@ This section describes Removable Drive Group Policy definitions for Microsoft Bi [MBAM 2.5 Deployment Prerequisites](mbam-25-deployment-prerequisites.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md b/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md index 0f01cc6965..7f91892a01 100644 --- a/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md +++ b/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md @@ -17,12 +17,12 @@ ms.date: 11/02/2016 # Planning for MBAM 2.5 Groups and Accounts -This topic lists the roles and accounts that you must create in Active Directory Domain Services (AD DS) to provide security and access rights for the Microsoft BitLocker Administration and Monitoring (MBAM) databases, reports, and web applications. For each role and account, the corresponding field in the MBAM Server Configuration wizard is provided. For a list of Windows PowerShell cmdlets and parameters that correspond to these accounts, see [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md#bkmk-reqd-posh-accts). +This topic lists the roles and accounts that you must create in Active Directory Domain Services (AD DS) to provide security and access rights for the Microsoft BitLocker Administration and Monitoring (MBAM) databases, reports, and web applications. For each role and account, the corresponding field in the MBAM Server Configuration wizard is provided. For a list of Windows PowerShell cmdlets and parameters that correspond to these accounts, see [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md#bkmk-reqd-posh-accts). -**Note**   +**Note** MBAM does not support the use of managed service accounts. -  + ## Database accounts @@ -64,7 +64,7 @@ Create the following accounts for the Compliance and Audit Database and the Reco -  + ## Reporting accounts @@ -105,7 +105,7 @@ Create the following accounts for the Reports feature. -  + ## Administration and Monitoring Website (Help Desk) accounts @@ -137,11 +137,10 @@ Create the following accounts for the Administration and Monitoring Website.

    If you enter a group name in the Read/write access domain user or group field on the Configure Databases page, the value you enter in this field must be a member of that group.

    If you do not specify credentials, the credentials that were specified for any previously enabled web application will be used. All web applications must use the same application pool credentials. If you specify different credentials for different web applications, the most recently specified value will be used.

    -Important   -

    For improved security, set the account that is specified in the credentials to have limited user rights.

    +Important

    For improved security, set the account that is specified in the credentials to have limited user rights.

    -  +
    @@ -168,12 +167,12 @@ Create the following accounts for the Administration and Monitoring Website.

    Group

    MBAM Data Migration Users

    Optional domain user group whose members have permissions to write data to MBAM by using the MBAM Recovery and Hardware Service running on the MBAM server. This account is generally used with the Write-Mbam* cmdlets to write recovery and TPM data from Active Directory into the MBAM database.

    -

    For more information, see [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md).

    +

    For more information, see MBAM 2.5 Security Considerations.

    -  + ## Related topics @@ -183,11 +182,11 @@ Create the following accounts for the Administration and Monitoring Website. [MBAM 2.5 Deployment Prerequisites](mbam-25-deployment-prerequisites.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/planning-for-mbam-25-server-deployment.md b/mdop/mbam-v25/planning-for-mbam-25-server-deployment.md index 0d0bdeae03..41ccde26df 100644 --- a/mdop/mbam-v25/planning-for-mbam-25-server-deployment.md +++ b/mdop/mbam-v25/planning-for-mbam-25-server-deployment.md @@ -37,8 +37,8 @@ This topic lists the features that you deploy for the MBAM Stand-alone and Confi

    Review the following before you start the deployment:

    Each MBAM feature has specific prerequisites that must be met before you start the MBAM installation.

    @@ -48,7 +48,7 @@ This topic lists the features that you deploy for the MBAM Stand-alone and Confi

    Keep track of the names of the computers on which you configure each feature. You will use this information throughout the configuration process.

    -

    You may want to use the [MBAM 2.5 Deployment Checklist](mbam-25-deployment-checklist.md) for this purpose.

    +

    You may want to use the MBAM 2.5 Deployment Checklist for this purpose.

    Configure only the Group Policy settings in the MDOP MBAM (BitLocker Management) node. Do not change the Group Policy settings in the BitLocker Drive Encryption node.

    @@ -57,7 +57,7 @@ This topic lists the features that you deploy for the MBAM Stand-alone and Confi -  + ## Planning for MBAM Server deployment – Stand-alone topology @@ -108,7 +108,7 @@ For a description of these features, see [High-Level Architecture of MBAM 2.5 wi [Deploying the MBAM 2.5 Server Infrastructure](deploying-the-mbam-25-server-infrastructure.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/planning-how-to-secure-the-mbam-websites.md b/mdop/mbam-v25/planning-how-to-secure-the-mbam-websites.md index 72487aa0e1..56e258088e 100644 --- a/mdop/mbam-v25/planning-how-to-secure-the-mbam-websites.md +++ b/mdop/mbam-v25/planning-how-to-secure-the-mbam-websites.md @@ -42,7 +42,7 @@ This topic describes the following methods for securing the Microsoft BitLocker -  + For more information about how to secure your MBAM deployment, see [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md). @@ -57,10 +57,10 @@ We recommend that you use a certificate to secure the communication between the: For information about requesting and installing a certificate, see [Configuring Internet Server Certificates](https://technet.microsoft.com/library/cc731977.aspx). -**Note**   +**Note** You can configure the websites and web services on different servers only if you are using Windows PowerShell. If you use the MBAM Server Configuration wizard to configure the websites, you must configure the websites and the web services on the same server. -  + To secure the communication between the web services and the databases, we also recommend that you force encryption in SQL Server. For information about securing all connections to SQL Server, including communication between the web services and SQL Server, see [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md#bkmk-secure-databases). @@ -94,14 +94,13 @@ Review the information in the following table before you start creating SPNs. -

    Create a service account in Active Directory Domain Services (AD DS).

    +

    Create a service account in Active Directory Domain Services (AD DS).

    The service account is a user account that you create in AD DS to provide security for the MBAM websites. The MBAM websites run under an application pool, whose identity is the name of the service account. The SPNs are then registered in the application pool account.

    -Note   -

    You must use the same application pool account for all web servers.

    +Note

    You must use the same application pool account for all web servers.

    -  +
    @@ -119,7 +118,7 @@ Review the information in the following table before you start creating SPNs. -  + ### Registering SPNs when you use a fully qualified domain host name @@ -144,13 +143,13 @@ If you use a fully qualified domain host name when you configure MBAM, you have

    Configure constrained delegation for the SPN that you are registering for the application pool account.

    -

    [Configuring Constrained Delegation](https://go.microsoft.com/fwlink/?LinkId=394335)

    +

    Configuring Constrained Delegation

    This requirement only applies to MBAM 2.5; it is not necessary in MBAM 2.5 SP1.

    -  + ### Registering SPNs when you use a NetBIOS host name @@ -180,13 +179,13 @@ If you use a NetBIOS host name when you configure MBAM, register one SPN for the

    Configure constrained delegation for the SPNs that you are registering for the application pool account.

    -

    [Configuring Constrained Delegation](https://go.microsoft.com/fwlink/?LinkId=394335)

    +

    Configuring Constrained Delegation

    This requirement only applies to MBAM 2.5; it is not necessary in MBAM 2.5 SP1.

    -  + ### Registering SPNs when you use a virtual host name @@ -221,18 +220,18 @@ If you configure MBAM with a virtual host name that is a fully qualified domain

    On the Domain Name Server (DNS) server, create an “A record” for the custom host name and point it to a web server or a load balancer.

    -

    See the “To configure DNS Host A Records” section in [Configure DNS Host Records](https://go.microsoft.com/fwlink/?LinkId=394337).

    +

    See the “To configure DNS Host A Records” section in Configure DNS Host Records.

    We recommend that you use A records instead of CNAMES. If you use CNAMES to point to the domain address, you must also register SPNs for the web server name in the application pool account.

    Configure constrained delegation for the SPNs that you are registering for the application pool account.

    -

    [Configuring Constrained Delegation](https://go.microsoft.com/fwlink/?LinkId=394335)

    +

    Configuring Constrained Delegation

    This requirement only applies to MBAM 2.5; it is not necessary in MBAM 2.5 SP1.

    -  + ### Registering an SPN when you upgrade from previous versions of MBAM @@ -240,7 +239,7 @@ Complete the steps in this section only if you want to: - Upgrade from a previous version of MBAM. -- Run the websites in MBAM 2.5 in a load-balanced or distributed configuration, and you are currently running in a configuration that is not load balanced. +- Run the websites in MBAM 2.5 in a load-balanced or distributed configuration, and you are currently running in a configuration that is not load balanced. If you already registered SPNs on the machine account rather than in an application pool account, MBAM uses the existing SPNs, and you cannot configure the websites in a load-balanced or distributed configuration. @@ -257,12 +256,12 @@ If you already registered SPNs on the machine account rather than in an applicat -

    Create an application pool account in Active Directory Domain Services (AD DS).

    +

    Create an application pool account in Active Directory Domain Services (AD DS).

    Remove the currently installed websites and web services.

    -

    [Removing MBAM Server Features or Software](removing-mbam-server-features-or-software.md)

    +

    Removing MBAM Server Features or Software

    Remove SPNs from the machine account.

    @@ -271,11 +270,11 @@ If you already registered SPNs on the machine account rather than in an applicat

    Register SPNs in the application pool account.

    -

    Follow the steps for [Registering SPNs when you use a virtual host name](#bkmk-regvirtualspn).

    +

    Follow the steps for Registering SPNs when you use a virtual host name.

    Reconfigure the web applications and web services.

    -

    [How to Configure the MBAM 2.5 Web Applications](how-to-configure-the-mbam-25-web-applications.md)

    +

    How to Configure the MBAM 2.5 Web Applications

    Do one of the following, depending on the method you use for the configuration:

    @@ -301,13 +300,12 @@ If you already registered SPNs on the machine account rather than in an applicat -

     

    +

    -Important   -

    The host name that you enter must be the same name as the virtual host name for which you are creating the SPNs. Also, in your web farm, the host names and the application pool credentials must be the same on every server that you are configuring.

    +Important

    The host name that you enter must be the same name as the virtual host name for which you are creating the SPNs. Also, in your web farm, the host names and the application pool credentials must be the same on every server that you are configuring.

    -  +

    When MBAM configures the web applications, it will try to register the SPNs for you, but it can do so only if you have Domain Admin rights on the server on which you are installing MBAM. If you do not have these rights, you can complete the configuration, but you will have to set the SPNs before or after you configure MBAM.

    @@ -315,7 +313,7 @@ If you already registered SPNs on the machine account rather than in an applicat ## Required Request Filtering Settings - + 'Allow unlisted file name extensions' is required for the application to operate as expected. This can be found by navigating to the 'Microsoft BitLocker Administration and Monitoring' -> Request Filtering -> Edit Feature Settings. @@ -326,9 +324,9 @@ If you already registered SPNs on the machine account rather than in an applicat [MBAM 2.5 Deployment Prerequisites](mbam-25-deployment-prerequisites.md) -  -  + + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/planning-to-deploy-mbam-25.md b/mdop/mbam-v25/planning-to-deploy-mbam-25.md index 6a58576de0..e0e73d9033 100644 --- a/mdop/mbam-v25/planning-to-deploy-mbam-25.md +++ b/mdop/mbam-v25/planning-to-deploy-mbam-25.md @@ -34,7 +34,7 @@ The MBAM Server infrastructure depends on a set of server features that can be c **Note**   An MBAM installation on a single server is recommended only for lab environments. -  + The MBAM Client enables administrators to enforce and monitor BitLocker drive encryption on computers in the enterprise. The BitLocker client can be integrated into an organization by deploying the client through an enterprise software delivery system or by installing the Client on client computers as part of the initial imaging process. @@ -53,9 +53,9 @@ With MBAM, you can encrypt a computer in your organization either before the end - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + -  + diff --git a/mdop/mbam-v25/prerequisites-for-mbam-25-clients.md b/mdop/mbam-v25/prerequisites-for-mbam-25-clients.md index 73cc4413af..2329a20a37 100644 --- a/mdop/mbam-v25/prerequisites-for-mbam-25-clients.md +++ b/mdop/mbam-v25/prerequisites-for-mbam-25-clients.md @@ -40,19 +40,19 @@ Before you install the MBAM Client software on end users' computers, ensure that

    -

    For Windows 7 client computers only: Each client must have Trusted Platform Module (TPM) capability (TPM 1.2 or later).

    +

    For Windows 7 client computers only: Each client must have Trusted Platform Module (TPM) capability (TPM 1.2 or later).

    For Windows 8.1, Windows 10 RTM or Windows 10 version 1511 client computers only: If you want MBAM to be able to store and manage the TPM recovery keys, TPM auto-provisioning must be turned off, and MBAM must be set as the owner of the TPM before you deploy MBAM.

    In MBAM 2.5 SP1 only, you no longer need to turn off TPM auto-provisioning, but you must make sure that the TPM Group Policy Objects are set to not escrow TPM OwnerAuth to Active Directory.

    -

    [MBAM 2.5 Security Considerations](mbam-25-security-considerations.md#bkmk-tpm)

    +

    MBAM 2.5 Security Considerations

    For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM.

    In MBAM 2.5 SP1, you must turn on auto-provisioning.

    -

    See [TPM owner password](https://technet.microsoft.com/itpro/windows/keep-secure/change-the-tpm-owner-password) for further details. +

    See TPM owner password for further details.

    @@ -66,11 +66,10 @@ Before you install the MBAM Client software on end users' computers, ensure that

    The computer’s hard disk must have a BIOS that is compatible with TPM and that supports USB devices during computer startup.

    -Note   -

    Ensure that the keyboard, video, or mouse are directly connected and not managed through a keyboard, video, or mouse (KVM) switch. A KVM switch can interfere with the ability of the computer to detect the physical presence of hardware.

    +Note

    Ensure that the keyboard, video, or mouse are directly connected and not managed through a keyboard, video, or mouse (KVM) switch. A KVM switch can interfere with the ability of the computer to detect the physical presence of hardware.

    -  +
    @@ -80,11 +79,11 @@ Before you install the MBAM Client software on end users' computers, ensure that -  -**Important**   + +**Important** If BitLocker was used without MBAM, MBAM can be installed and utilize the existing TPM information. -  + @@ -95,11 +94,11 @@ If BitLocker was used without MBAM, MBAM can be installed and utilize the existi [Planning to Deploy MBAM 2.5](planning-to-deploy-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/prerequisites-for-the-configuration-manager-integration-feature.md b/mdop/mbam-v25/prerequisites-for-the-configuration-manager-integration-feature.md index f51b855674..f7ff13527a 100644 --- a/mdop/mbam-v25/prerequisites-for-the-configuration-manager-integration-feature.md +++ b/mdop/mbam-v25/prerequisites-for-the-configuration-manager-integration-feature.md @@ -19,10 +19,10 @@ ms.date: 08/30/2016 If you deploy MBAM with the System Center Configuration Manager Integration topology, we recommend a three-server architecture, as described in [High-Level Architecture of MBAM 2.5 with Configuration Manager Integration Topology](high-level-architecture-of-mbam-25-with-configuration-manager-integration-topology.md). This architecture can support 500,000 client computers. -**Important**   +**Important** Windows To Go is not supported for the Configuration Manager Integration topology installation when you are using Configuration Manager 2007. -  + ## General prerequisites for the Configuration Manager Integration feature @@ -47,38 +47,37 @@ When you install MBAM with Configuration Manager, the following additional prere

    The Hardware Inventory Client Agent is on the Configuration Manager Server.

    -

    For System Center 2012 Configuration Manager, see [How to Configure Hardware Inventory in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301685).

    -

    For Configuration Manager 2007, see [How to Configure Hardware Inventory for a Site](https://go.microsoft.com/fwlink/?LinkId=301656).

    +

    For System Center 2012 Configuration Manager, see How to Configure Hardware Inventory in Configuration Manager.

    +

    For Configuration Manager 2007, see How to Configure Hardware Inventory for a Site.

    One of the following is enabled, depending on the version of Configuration Manager that you are using:

      -
    • Compliance Settings - (System Center 2012 Configuration Manager)

    • +
    • Compliance Settings - (System Center 2012 Configuration Manager)

    • Desired Configuration Management (DCM) Client Agent – (Configuration Manager 2007)

    -

    For System Center 2012 Configuration Manager, see [Configuring Compliance Settings in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301687).

    -

    For Configuration Manager 2007, see [Desired Configuration Management Client Agent Properties](https://go.microsoft.com/fwlink/?LinkId=301686).

    +

    For System Center 2012 Configuration Manager, see Configuring Compliance Settings in Configuration Manager.

    +

    For Configuration Manager 2007, see Desired Configuration Management Client Agent Properties.

    A reporting services point is defined in Configuration Manager. Required for SQL Server Reporting Services (SSRS).

    -

    For System Center 2012 Configuration Manager, see [Prerequisites for Reporting in Configuration Manager](https://go.microsoft.com/fwlink/?LinkId=301689).

    -

    For Configuration Manager 2007, see [How to Create a Reporting Services Point for SQL Reporting Services](https://go.microsoft.com/fwlink/?LinkId=301688).

    +

    For System Center 2012 Configuration Manager, see Prerequisites for Reporting in Configuration Manager.

    +

    For Configuration Manager 2007, see How to Create a Reporting Services Point for SQL Reporting Services.

    Configuration Manager 2007 requires Microsoft .NET Framework 2.0

    The Desired Configuration Management (DCM) Client Agent in Configuration Manager 2007 requires .NET Framework 2.0 to report compliance.

    -Note   -

    Installing .NET Framework 3.5 automatically installs .NET Framework 2.0.

    +Note

    Installing .NET Framework 3.5 automatically installs .NET Framework 2.0.

    -  +
    -  + ## Required permissions to install MBAM with Configuration Manager @@ -110,9 +109,9 @@ To install MBAM with Configuration Manager, you must have an administrative user -  -**System Center 2012 Configuration Manager** + +**System Center 2012 Configuration Manager** @@ -141,7 +140,7 @@ To install MBAM with Configuration Manager, you must have an administrative user
    -  + **Configuration Manager 2007** @@ -172,12 +171,12 @@ To install MBAM with Configuration Manager, you must have an administrative user -  + ## Required changes for the .mof files -To enable the client computers to report BitLocker compliance details through the MBAM Configuration Manager reports, you have to edit the Configuration.mof file and Sms\_def.mof file for System Center 2012 Configuration Manager and Microsoft System Center Configuration Manager 2007. For instructions, see [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md). +To enable the client computers to report BitLocker compliance details through the MBAM Configuration Manager reports, you have to edit the Configuration.mof file and Sms\_def.mof file for System Center 2012 Configuration Manager and Microsoft System Center Configuration Manager 2007. For instructions, see [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md). @@ -188,11 +187,11 @@ To enable the client computers to report BitLocker compliance details through th [MBAM 2.5 Server Prerequisites that Apply Only to the Configuration Manager Integration Topology](mbam-25-server-prerequisites-that-apply-only-to-the-configuration-manager-integration-topology.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/release-notes-for-mbam-25.md b/mdop/mbam-v25/release-notes-for-mbam-25.md index d15c01a5e2..ca65e45a7a 100644 --- a/mdop/mbam-v25/release-notes-for-mbam-25.md +++ b/mdop/mbam-v25/release-notes-for-mbam-25.md @@ -35,7 +35,7 @@ Help links in the MBAM Server Configuration tool can cause browser windows to op **Note**   This is fixed in MBAM 2.5 SP1. -  + ### MBAM reports as noncompliant a client encrypted with AES 256-bit encryption keys and Diffuser @@ -131,42 +131,42 @@ This table lists the hotfixes and KB articles for MBAM 2.5.

    2975636

    Hotfix Package 1 for Microsoft BitLocker Administration and Monitoring 2.5

    -

    [support.microsoft.com/kb/2975636/EN-US](https://support.microsoft.com/kb/2975636/EN-US)

    +

    support.microsoft.com/kb/2975636/EN-US

    3015477

    Hotfix Package 2 for BitLocker Administration and Monitoring 2.5

    -

    [support.microsoft.com/kb/3015477](https://support.microsoft.com/kb/3015477)

    +

    support.microsoft.com/kb/3015477

    3011022

    MBAM 2.5 installation or Configuration Manager reporting fails if the name of SSRS instance contains an underscore

    -

    [support.microsoft.com/kb/3011022/EN-US](https://support.microsoft.com/kb/3011022/EN-US)

    +

    support.microsoft.com/kb/3011022/EN-US

    2756402

    MBAM client would fail with Event ID 4 and error code 0x8004100E in the Event description

    -

    [support.microsoft.com/kb/2756402/EN-US](https://support.microsoft.com/kb/2756402/EN-US)

    +

    support.microsoft.com/kb/2756402/EN-US

    2639518

    Error opening Enterprise or Computer Compliance Reports in MBAM

    -

    [support.microsoft.com/kb/2639518/EN-US](https://support.microsoft.com/kb/2639518/EN-US)

    +

    support.microsoft.com/kb/2639518/EN-US

    2870842

    MBAM 2.0 Setup fails during Configuration Manager Integration Scenario with SQL Server 2008

    -

    [support.microsoft.com/kb/2870842/EN-US](https://support.microsoft.com/kb/2870842/EN-US)

    +

    support.microsoft.com/kb/2870842/EN-US

    2975472

    SQL deadlocks when many MBAM clients connect to the MBAM recovery database

    -

    [support.microsoft.com/kb/2975472/EN-US](https://support.microsoft.com/kb/2975472/EN-US)

    +

    support.microsoft.com/kb/2975472/EN-US

    -  + ## Related topics @@ -174,7 +174,7 @@ This table lists the hotfixes and KB articles for MBAM 2.5. [About MBAM 2.5](about-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/removing-mbam-server-features-or-software.md b/mdop/mbam-v25/removing-mbam-server-features-or-software.md index 18aca40519..640588cc30 100644 --- a/mdop/mbam-v25/removing-mbam-server-features-or-software.md +++ b/mdop/mbam-v25/removing-mbam-server-features-or-software.md @@ -22,7 +22,7 @@ These instructions explain how to remove software and features from Microsoft Bi **Note**   To prevent the accidental removal of data, MBAM provides no mechanism for removing the databases; you must do that manually. -  + ## Removing MBAM Server features @@ -81,9 +81,9 @@ Use the following steps to remove the MBAM Server software and any MBAM Server f [Deploying MBAM 2.5](deploying-mbam-25.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/server-event-logs.md b/mdop/mbam-v25/server-event-logs.md index e3d3595c22..b02ad84d6d 100644 --- a/mdop/mbam-v25/server-event-logs.md +++ b/mdop/mbam-v25/server-event-logs.md @@ -304,10 +304,10 @@ The following table contains messages and troubleshooting information for event

    ReportProviderUnexpectedError

    Report provider unexpected error.

    Report provider unexpected error. {Description} {exceptionDetails} These are some of the possible exception details:

    -

    An error occurred while getting the name of directory '{directoryName}'

    -

    An exception occurred while getting files for directory '{directoryName}'

    -

    An exception occurred while enumerating directories in directory '{directoryName}'

    -

    An exception occurred while reading all bytes for file '{fileName}'

    +

    An error occurred while getting the name of directory '{directoryName}'

    +

    An exception occurred while getting files for directory '{directoryName}'

    +

    An exception occurred while enumerating directories in directory '{directoryName}'

    +

    An exception occurred while reading all bytes for file '{fileName}'

    During MBAM installation, MBAM setup unzips all the report files to the specified installation path. As a part of report installation, install module tries to access the unzipped report files at installation path and communicates with SQL Reporting services to publish the report files. The above errors occur when MBAM cannot access the files/folders at unzipped Installation path. These are some tips to troubleshoot this issue:

    • Verify that MBAM is installed.

    • @@ -323,7 +323,7 @@ The following table contains messages and troubleshooting information for event
    • Using SSRS console verify that SSRS is enabled and running.

    • Verify that user running the setup is authorized to access SSRS.

    -

    Failed to remove the MBAM Reports using Reporting Services instance URL '{SSRSInstanceUrl}'.Make sure the SSRS instance required for MBAM Reports is running and configured correctly.

    +

    Failed to remove the MBAM Reports using Reporting Services instance URL '{SSRSInstanceUrl}'.Make sure the SSRS instance required for MBAM Reports is running and configured correctly.

    When MBAM installation fails or When user disables MBAM Reporting features, setup module removes SSRS reports. The above message indicates that MBAM failed to remove SSRS reports. These are some tips to troubleshoot this issue:

    • Verify that SSRS is installed on the specified machine.

    • @@ -336,8 +336,8 @@ The following table contains messages and troubleshooting information for event
    • Using SSRS console verify that SSRS is enabled and running.

    • Verify that the user running the setup is authorized to access/publish reports to SSRS.

    -

    A policy for group user name '{userName}' already exists. In case this is not correct, manually revise the Reporting Service for duplicate or invalid policies.

    -

    After Publishing MBAM reports, MBAM setup tries to create a MBAM Report Users roles (if it does not exist already) and sets corresponding user policy. The above error indicates that SSRS web service threw an exception while setting up report user role policy. Follow the instructions in the event message and refer to "https://www.microsoft.com/technet/support/ee/transform.aspx?ProdName=SQL+Server+Reporting+Services&ProdVer=8.00&EvtID=rsInvalidPolicyDefinition&EvtSrc=Microsoft.ReportingServices.Diagnostics.ErrorStrings.resources.Strings&LCID=1033" for more help.

    +

    A policy for group user name '{userName}' already exists. In case this is not correct, manually revise the Reporting Service for duplicate or invalid policies.

    +

    After Publishing MBAM reports, MBAM setup tries to create a MBAM Report Users roles (if it does not exist already) and sets corresponding user policy. The above error indicates that SSRS web service threw an exception while setting up report user role policy. Follow the instructions in the event message and refer to "https://www.microsoft.com/technet/support/ee/transform.aspx?ProdName=SQL+Server+Reporting+Services&ProdVer=8.00&EvtID=rsInvalidPolicyDefinition&EvtSrc=Microsoft.ReportingServices.Diagnostics.ErrorStrings.resources.Strings&LCID=1033"; for more help.

    An error occurred while validating access to SSRS {exceptionDetails}.

    As part of prerequisite check, MBAM setup verifies if the user has necessary permissions to access/create folder under SSRS. The error message indicates that an exception has occurred while verifying access to SSRS. Refer to the exception details for debugging tips.

    A SOAP error occurred while checking the SSRS URL.{exceptionDetails}

    @@ -357,12 +357,12 @@ The following table contains messages and troubleshooting information for event
  • Using SSRS console verify that SSRS is enabled and running.

  • Verify that the user executing the setup is authorized to query SSRS class under WMI namespace.

  • -

    The current user is not authorized to access the WMI namespace '{ssrsWMINamespace}'.

    -

    An error occurred while enumerating the namespace '{ssrsWMINamespace}'. RPC server for SSRS WMI provider on the local host is not found.

    -

    An error occurred while enumerating the namespace '{ssrsNamespace}'. Unable to find an instance of SSRS on the local host.

    -

    An error occurred while accessing WMI. RPC server for instance '{ssrsInstance}' was not found.

    -

    An error occurred while accessing WMI. Instance name '{ssrsInstanceName}' is not correct.

    -

    An error occurred while accessing WMI. Unable to find instance '{ssrsInstanceName}' on the local host.

    +

    The current user is not authorized to access the WMI namespace '{ssrsWMINamespace}'.

    +

    An error occurred while enumerating the namespace '{ssrsWMINamespace}'. RPC server for SSRS WMI provider on the local host is not found.

    +

    An error occurred while enumerating the namespace '{ssrsNamespace}'. Unable to find an instance of SSRS on the local host.

    +

    An error occurred while accessing WMI. RPC server for instance '{ssrsInstance}' was not found.

    +

    An error occurred while accessing WMI. Instance name '{ssrsInstanceName}' is not correct.

    +

    An error occurred while accessing WMI. Unable to find instance '{ssrsInstanceName}' on the local host.

    As part of prerequisite check, MBAM setup queries WMI to retrieve WMI namespace associated to given instance. The above error message indicates that and exception was occurred while querying WMI. Refer to exceptionDetails for more information. These are some checks you can perform:

    • Verify that SSRS with given instance name is installed on the specified machine.

    • @@ -446,7 +446,7 @@ The following table contains messages and troubleshooting information for event -  + ## Operation @@ -475,9 +475,9 @@ The following table contains messages and troubleshooting information for event

      1

      Microsoft-Windows-MBAM-Web/Admin

      WebAppSpnError

      -

      Application: {SiteName}\{VirtualDirectory} is missing the following Service Principal Names (SPNs):{ListOfSpns} Register the required SPNs on the account: {ExecutionAccount}.

      +

      Application: {SiteName}{VirtualDirectory} is missing the following Service Principal Names (SPNs):{ListOfSpns} Register the required SPNs on the account: {ExecutionAccount}.

      For Integrated Windows Authentication to succeed, necessary SPNs needs to be in place. This message indicates that the SPN required for MBAM application has not been correctly configured. Details contained in this event should provide more information.

      -

      See “Service Principal Name (SPN)” in [MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies](mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md#bkmk-prereqsams) for more information.

      +

      See “Service Principal Name (SPN)” in MBAM 2.5 Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies for more information.

      4

      @@ -513,7 +513,7 @@ The following table contains messages and troubleshooting information for event

      QueryRecoveryKeyIdsForUser: An error occurred while getting recovery key Ids from the database. Message:{message} -or-

      QueryVolumeUsers: An error occurred while getting user information from the database.

      This message is logged whenever there is an exception while communicating with the MBAM recovery database. Read through the information contained in the trace to get specific details about the exception.

      -

      For detailed troubleshooting steps, see the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx).

      +

      For detailed troubleshooting steps, see the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine.

      101

      @@ -525,7 +525,7 @@ The following table contains messages and troubleshooting information for event

      QueryRecoveryKeyIdsForUser: An error occurred while logging an audit event to the compliance database. Message:{message} -or-

      QueryDriveRecoveryData: An error occurred while logging an audit event to the compliance database. Message:{message}

      This message is logged whenever there is an exception while communicating the MBAM compliance database. Read through the information contained in the trace to get specific details about the exception.

      -

      For detailed troubleshooting steps, see the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx).

      +

      For detailed troubleshooting steps, see the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine.

      102

      @@ -533,7 +533,7 @@ The following table contains messages and troubleshooting information for event

      AgentServiceRecoveryDbError

      This message indicates an exception when MBAM Agent service tries to communicate with the recovery database. Read through the message contained in the event to get specific information about the exception.

      -

      See the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx) to verify whether the MBAM app pool account has required permissions in place to connect or execute on MBAM recovery database.

      +

      See the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine to verify whether the MBAM app pool account has required permissions in place to connect or execute on MBAM recovery database.

      103

      @@ -558,7 +558,7 @@ The following table contains messages and troubleshooting information for event

      StatusServiceComplianceDbError

      This error indicates that MBAM websites/web services were unable to connect to the MBAMCompliance database.

      -

      See the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx) to verify that the IIS app pool account could connect to the MBAM compliance database.

      +

      See the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine to verify that the IIS app pool account could connect to the MBAM compliance database.

      106

      @@ -601,7 +601,7 @@ The following table contains messages and troubleshooting information for event

      QueryRecoveryKeyIdsForUser: an error occurred while getting recovery key Ids for a user. Message:{message} -or-

      An error occurred while getting TPM password hash from the Recovery database. EventDetails:{ExceptionMessage}

      This message indicates that recovery database connection string information at "HKLM\Software\Microsoft\MBAM Server\Web\RecoveryDBConnectionString" is invalid. Verify the given registry key value. –or-

      -

      If any of the remaining messages are logged, refer to the troubleshooting steps listed at the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx) to verify whether a connection could be made to the MBAM Recovery database from IIS server using app pool credentials.

      +

      If any of the remaining messages are logged, refer to the troubleshooting steps listed at the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine to verify whether a connection could be made to the MBAM Recovery database from IIS server using app pool credentials.

      110

      @@ -612,7 +612,7 @@ The following table contains messages and troubleshooting information for event

      QueryRecoveryKeyIdsForUser: an error occurred while logging an audit event to the Compliance database. Message:{message} -or-

      QueryRecoveryKeyIdsForUser: an error occurred while logging an audit event to the compliance database. Message:{message}

      This message indicates that compliance db connection string information at "HKLM\Software\Microsoft\MBAM Server\Web\ComplianceDBConnectionString" is invalid. Verify the value corresponding to above registry key. –or-

      -

      If any of the remaining messages are logged, refer to the troubleshooting steps listed at the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx) to verify whether a connection could be made to the MBAM Compliance database from IIS server using app pool credentials.

      +

      If any of the remaining messages are logged, refer to the troubleshooting steps listed at the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine to verify whether a connection could be made to the MBAM Compliance database from IIS server using app pool credentials.

      111

      @@ -625,7 +625,7 @@ The following table contains messages and troubleshooting information for event
    • MBAM websites/webservices execution account(app pool account) could not run the GetVersion stored procedure on MBAMCompliance OR MBAMRecovery database

    The message contained in the event will provide more details about the exception.

    -

    Refer to the troubleshooting steps listed at the TechNet article [How to Troubleshoot Connecting to the SQL Server Database Engine](https://social.technet.microsoft.com/wiki/contents/articles/2102.how-to-troubleshoot-connecting-to-the-sql-server-database-engine.aspx) to verify that the MBAM execution account (app pool account) could connect to MBAM compliance/recovery database and it has permissions in place to execute GetVersion stored procedure.

    +

    Refer to the troubleshooting steps listed at the TechNet article How to Troubleshoot Connecting to the SQL Server Database Engine to verify that the MBAM execution account (app pool account) could connect to MBAM compliance/recovery database and it has permissions in place to execute GetVersion stored procedure.

    112

    @@ -661,7 +661,7 @@ The following table contains messages and troubleshooting information for event -  + ## Related topics @@ -671,11 +671,11 @@ The following table contains messages and troubleshooting information for event [Client Event Logs](client-event-logs.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md b/mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md index 0e3f042e39..5f546b0f97 100644 --- a/mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md +++ b/mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 This topic describes the reports that are available when you are running Microsoft BitLocker Administration and Monitoring (MBAM) in the Stand-alone topology. -**Note**   +**Note** If you are running MBAM with the Configuration Manager Integration topology, you generate reports from Configuration Manager rather than from MBAM. See [Viewing MBAM 2.5 Reports for the Configuration Manager Integration Topology](viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md) for more information about these reports. -  + ## Understanding the MBAM Stand-alone topology reports @@ -94,7 +94,7 @@ Use this report type to collect information about overall BitLocker compliance i -  + **Enterprise Compliance Computer Details** @@ -137,7 +137,7 @@ Use this report type to collect information about overall BitLocker compliance i -  + ### Computer Compliance Report @@ -145,10 +145,10 @@ Use this report type to collect information that is specific to a computer or us View this report by clicking the computer name in the Enterprise Compliance Report, or by typing the computer name in the Computer Compliance Report. This report shows detailed encryption information about each drive (operating system and fixed data drives) on a computer. It also indicates the policy that is applied to each drive type on the computer. To view the details of each drive, expand the Computer Name entry. -**Note**   +**Note** Removable Data Volume encryption status is not shown in this report. -  + **Computer Compliance Report Fields** @@ -228,7 +228,7 @@ Removable Data Volume encryption status is not shown in this report. -  + **Computer Compliance Report Drive Fields** @@ -279,7 +279,7 @@ Removable Data Volume encryption status is not shown in this report. -  + ### Recovery Audit Report @@ -315,12 +315,11 @@ Use this report type to audit users who have requested access to BitLocker recov

    Helpdesk User

    Help Desk user who initiated the request for key retrieval.

    -Note   -

    If an Advanced Helpdesk User recovers the key without specifying the end user, the End User field will be blank. A standard Helpdesk User must specify the end user, and that user will appear in this field.

    +Note

    If an Advanced Helpdesk User recovers the key without specifying the end user, the End User field will be blank. A standard Helpdesk User must specify the end user, and that user will appear in this field.

    A recovery via the Self-Service Portal will list the requesting end user both in this field and in the End User field.

    -  +
    @@ -362,12 +361,12 @@ Use this report type to audit users who have requested access to BitLocker recov -  -**Note**   + +**Note** Report results can be saved to a file by clicking the **Export** button on the **Reports** menu bar. -  + ## Related topics @@ -377,11 +376,11 @@ Report results can be saved to a file by clicking the **Export** button on the * [Generating MBAM 2.5 Stand-alone Reports](generating-mbam-25-stand-alone-reports.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md b/mdop/mbam-v25/understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md index 7eed6c4298..39cd813d57 100644 --- a/mdop/mbam-v25/understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md +++ b/mdop/mbam-v25/understanding-the-bitlocker-encryption-options-and-bitlocker-drive-encryption-items-in-control-panel.md @@ -66,19 +66,18 @@ The following table lists the tasks you can perform from each Control Panel item

    How the Control Panel item is created

    Created in Control Panel when you install the MBAM Client. This item cannot be hidden.

    -Note   -

    This item appears in addition to, but does not replace, the default BitLocker Drive Encryption Control Panel item.

    +Note

    This item appears in addition to, but does not replace, the default BitLocker Drive Encryption Control Panel item.

    -  +

    Appears by default in Control Panel as part of the Windows operating system, but you can hide it.

    -

    To hide it, see [Hiding the Default BitLocker Drive Encryption Item in Control Panel](hiding-the-default-bitlocker-drive-encryption-item-in-control-panel-mbam-25.md).

    +

    To hide it, see Hiding the Default BitLocker Drive Encryption Item in Control Panel.

    -  + ## “Manage BitLocker” shortcut menu @@ -114,7 +113,7 @@ The following table describes how the **Manage BitLocker** shortcut menu differs -  + ## Related topics @@ -122,11 +121,11 @@ The following table describes how the **Manage BitLocker** shortcut menu differs [Administering MBAM 2.5 Features](administering-mbam-25-features.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). -- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).  +- For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). diff --git a/mdop/mbam-v25/upgrading-to-mbam-25-or-mbam-25-sp1-from-previous-versions.md b/mdop/mbam-v25/upgrading-to-mbam-25-or-mbam-25-sp1-from-previous-versions.md index d754c329b9..eb867b9ba1 100644 --- a/mdop/mbam-v25/upgrading-to-mbam-25-or-mbam-25-sp1-from-previous-versions.md +++ b/mdop/mbam-v25/upgrading-to-mbam-25-or-mbam-25-sp1-from-previous-versions.md @@ -22,7 +22,7 @@ This topic describes the process for upgrading the Microsoft BitLocker Administr **Note**   You can upgrade directly to MBAM 2.5 or MBAM 2.5 SP1 from any previous version of MBAM. -  + ## Before you start the upgrade @@ -52,7 +52,7 @@ Review the following information before you start the upgrade.

    To resolve this issue:

    Run aspnet_regiis –i from the following location:

    C:\windows\microsoft.net\Framework\v4.0.30319

    -

    For more information, see: [ASP.NET IIS Registration Tool](https://go.microsoft.com/fwlink/?LinkId=393272).

    +

    For more information, see: ASP.NET IIS Registration Tool.

    Register an SPN on the application pool account if all of the following are true:

    @@ -60,7 +60,7 @@ Review the following information before you start the upgrade.
  • You are upgrading from a previous version of MBAM.

  • Currently, you are not running the MBAM websites in a load-balanced or distributed configuration, but you would like to do so when you upgrade to MBAM 2.5 or 2.5 SP1.

  • -

    For instructions, see [Planning How to Secure the MBAM Websites](planning-how-to-secure-the-mbam-websites.md#bkmk-registerspn).

    +

    For instructions, see Planning How to Secure the MBAM Websites.

    @@ -86,7 +86,7 @@ Review the following information before you start the upgrade.
    -  + ## Steps to upgrade the MBAM Server infrastructure @@ -104,7 +104,7 @@ Use the steps in the following sections to upgrade MBAM for the Stand-alone topo **Note**   The databases will not be removed, and all compliance and recovery data is maintained in the database. -   + 4. Install and configure the MBAM 2.5 or 2.5 SP1 databases, reports, and web applications, in that order. The databases are upgraded in place. @@ -127,7 +127,7 @@ Use the steps in the following sections to upgrade MBAM for the Stand-alone topo **Note**   The databases and the Configuration Manager objects (baseline, MBAM supported computers collection, and Reports) will not be removed, and all compliance and recovery data is maintained in the database. -   + 5. Update the .mof files. @@ -161,7 +161,7 @@ MBAM supports upgrades to the MBAM 2.5 Client from any earlier version of the M [Configuring the MBAM 2.5 Server Features](configuring-the-mbam-25-server-features.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md b/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md index f4159c1f1f..d71c2b2b2a 100644 --- a/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md +++ b/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md @@ -26,15 +26,15 @@ Verify you have a current documentation of your MBAM environment, including all ### Upgrade steps #### Steps to upgrade the MBAM Database (SQL Server) 1. Using the MBAM Configurator; remove the Reports role from the SQL server, or wherever the SSRS database is hosted. Depending on your environment, this can be the same server or a separate one. -Note: You will not see an option to remove the Databases; this is expected.   + Note: You will not see an option to remove the Databases; this is expected. 2. Install 2.5 SP1 (Located with MDOP - Microsoft Desktop Optimization Pack 2015 from the Volume Licensing Service Center site: 3. Do not configure it at this time  4. Install the July 2018 Rollup: https://www.microsoft.com/download/details.aspx?id=57157 5. Using the MBAM Configurator; re-add the Reports role 6. This will configure the SSRS connection using the latest MBAM code from the rollup  7. Using the MBAM Configurator; re-add the SQL Database role on the SQL Server. -- At the end, you will be warned that the DBs already exist and weren’t created, but this is expected. -- This process updates the existing databases to the current version being installed       +8. At the end, you will be warned that the DBs already exist and weren’t created, but this is expected. +9. This process updates the existing databases to the current version being installed #### Steps to upgrade the MBAM Server (Running MBAM and IIS) 1. Using the MBAM Configurator; remove the Admin and Self Service Portals from the IIS server @@ -43,7 +43,7 @@ Note: You will not see an option to remove the Databases; this is expected.   4. Install the July 2018 Rollup on the IIS server(https://www.microsoft.com/download/details.aspx?id=57157) 5. Using the MBAM Configurator; re-add the Admin and Self Service Portals to the IIS server  6. This will configure the sites using the latest MBAM code from the July 2018 Rollup -- Open an elevated command prompt, Type: **IISRESET** and Hit Enter. +7. Open an elevated command prompt, Type: **IISRESET** and Hit Enter. #### Steps to upgrade the MBAM Clients/Endpoints 1. Uninstall the 2.5 Agent from client endpoints diff --git a/mdop/mbam-v25/using-windows-powershell-to-administer-mbam-25.md b/mdop/mbam-v25/using-windows-powershell-to-administer-mbam-25.md index 5db48f8690..33509cf80e 100644 --- a/mdop/mbam-v25/using-windows-powershell-to-administer-mbam-25.md +++ b/mdop/mbam-v25/using-windows-powershell-to-administer-mbam-25.md @@ -49,7 +49,7 @@ Use the following Windows PowerShell cmdlets to recover computers or drives that -  + ## MBAM cmdlet Help @@ -70,24 +70,24 @@ Windows PowerShell Help for MBAM cmdlets is available in the following formats:

    At a Windows PowerShell command prompt, type Get-Help <cmdlet>

    -

    To upload the latest Windows PowerShell cmdlets, follow the instructions in [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md)

    +

    To upload the latest Windows PowerShell cmdlets, follow the instructions in Configuring MBAM 2.5 Server Features by Using Windows PowerShell

    On TechNet as webpages

    -

    https://go.microsoft.com/fwlink/?LinkId=393498

    +

    https://go.microsoft.com/fwlink/?LinkId=393498

    On the Download Center as a Word .docx file

    -

    https://go.microsoft.com/fwlink/?LinkId=393497

    +

    https://go.microsoft.com/fwlink/?LinkId=393497

    On the Download Center as a .pdf file

    -

    https://go.microsoft.com/fwlink/?LinkId=393499

    +

    https://go.microsoft.com/fwlink/?LinkId=393499

    -  + @@ -98,7 +98,7 @@ Windows PowerShell Help for MBAM cmdlets is available in the following formats: [Configuring MBAM 2.5 Server Features by Using Windows PowerShell](configuring-mbam-25-server-features-by-using-windows-powershell.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/validating-the-mbam-25-server-feature-configuration.md b/mdop/mbam-v25/validating-the-mbam-25-server-feature-configuration.md index 3e6a07d7c5..4c7082ea57 100644 --- a/mdop/mbam-v25/validating-the-mbam-25-server-feature-configuration.md +++ b/mdop/mbam-v25/validating-the-mbam-25-server-feature-configuration.md @@ -28,10 +28,10 @@ Use the following steps to validate your MBAM Server deployment with the Stand-a 1. On each server where an MBAM feature is deployed, click **Control Panel** > **Programs** > **Programs and Features**. Verify that **Microsoft BitLocker Administration and Monitoring** appears in the **Programs and Features** list. - **Note**   + **Note** To do the validation, you must use a domain account that has local computer administrative credentials on each server. -   + 2. On the server where the Recovery Database is configured, open SQL Server Management Studio and verify that the **MBAM Recovery and Hardware** database is configured. @@ -47,72 +47,74 @@ Use the following steps to validate your MBAM Server deployment with the Stand-a 5. Confirm that a reports folder named **Microsoft BitLocker Administration and Monitoring** contains a data source called **MaltaDataSource** as well as the language folders. The data source contains folders with names that represent languages (for example, en-us). The reports are in the language folders. - **Note**   + **Note** If SQL Server Reporting Services (SSRS) was configured as a named instance, the URL should resemble the following: http(s)://< *MBAMReportsServerName*>:<*port*>/Reports\_<*SSRSInstanceName*> -   - **Note**   - If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring Website (also known as Help Desk) and select a report, the following message appears: "Only Secure Content is Displayed." To show the report, click **Show All Content**. -   +~~~ +**Note** +If SSRS was not configured to use Secure Socket Layer (SSL), the URL for the reports will be set to HTTP instead of HTTPS when you install the MBAM Server. If you then go to the Administration and Monitoring Website (also known as Help Desk) and select a report, the following message appears: "Only Secure Content is Displayed." To show the report, click **Show All Content**. +~~~ -6. On the server where the Administration and Monitoring Website feature is configured, run **Server Manager**, browse to **Roles**, and then select **Web Server (IIS)** > **Internet Information Services (IIS) Manager**. -7. In **Connections**, browse to *<computer name>* and select **Sites** > **Microsoft BitLocker Administration and Monitoring**. Verify that the following are listed: - - **MBAMAdministrationService** +6. On the server where the Administration and Monitoring Website feature is configured, run **Server Manager**, browse to **Roles**, and then select **Web Server (IIS)** > **Internet Information Services (IIS) Manager**. - - **MBAMComplianceStatusService** +7. In **Connections**, browse to *<computer name>* and select **Sites** > **Microsoft BitLocker Administration and Monitoring**. Verify that the following are listed: - - **MBAMRecoveryAndHardwareService** + - **MBAMAdministrationService** -8. On the server where the Administration and Monitoring Website and Self-Service Portal are configured, open a web browser with administrative credentials. + - **MBAMComplianceStatusService** -9. Browse to the following websites to verify that they load successfully: + - **MBAMRecoveryAndHardwareService** - - https(s)://<*MBAMAdministrationServerName*>:<*port*>/HelpDesk/ - confirm each of the links for navigation and reports +8. On the server where the Administration and Monitoring Website and Self-Service Portal are configured, open a web browser with administrative credentials. - - http(s)://< *MBAMAdministrationServerName*>:<*port*>/SelfService/ +9. Browse to the following websites to verify that they load successfully: - **Note**   - It is assumed that you configured the server features on the default port without network encryption. If you configured the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example: + - https(s)://<*MBAMAdministrationServerName*>:<*port*>/HelpDesk/ - confirm each of the links for navigation and reports - http(s)://< *host name*>:<*port*>/HelpDesk/ + - http(s)://< *MBAMAdministrationServerName*>:<*port*>/SelfService/ - http(s)://< *host name*>:<*port*>/<*virtualdirectory*>/ + **Note** + It is assumed that you configured the server features on the default port without network encryption. If you configured the server features on a different port or virtual directory, change the URLs to include the appropriate port, for example: + + http(s)://< *host name*>:<*port*>/HelpDesk/ + + http(s)://< *host name*>:<*port*>/<*virtualdirectory*>/ + + If the server features were configured with network encryption, change http:// to https://. - If the server features were configured with network encryption, change http:// to https://. -   10. Browse to the following web services to verify that they load successfully. A page opens to indicate that the service is running, but the page does not display any metadata. - - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMAdministrationService/AdministrationService.svc + - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMAdministrationService/AdministrationService.svc - - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMUserSupportService/UserSupportService.svc + - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMUserSupportService/UserSupportService.svc - - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMComplianceStatusService/StatusReportingService.svc + - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMComplianceStatusService/StatusReportingService.svc - - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMRecoveryAndHardwareService/CoreService.svc + - http(s)://< *MBAMAdministrationServerName*>:<*port*>/MBAMRecoveryAndHardwareService/CoreService.svc ## Validating the MBAM Server deployment with the Configuration Manager Integration topology Use the following steps to validate your MBAM deployment with the Configuration Manager Integration topology. Complete the validation steps that match the version of Configuration Manager that you are using. -### Validating the MBAM Server deployment with System Center 2012 Configuration Manager +### Validating the MBAM Server deployment with System Center 2012 Configuration Manager -Use these steps to validate your MBAM Server deployment when you are using MBAM with System Center 2012 Configuration Manager. +Use these steps to validate your MBAM Server deployment when you are using MBAM with System Center 2012 Configuration Manager. -**To validate a Configuration Manager Integration MBAM Server deployment – System Center 2012 Configuration Manager** +**To validate a Configuration Manager Integration MBAM Server deployment – System Center 2012 Configuration Manager** -1. On the server where System Center 2012 Configuration Manager is deployed, open **Programs and Features** in **Control Panel**, and verify that **Microsoft BitLocker Administration and Monitoring** appears. +1. On the server where System Center 2012 Configuration Manager is deployed, open **Programs and Features** in **Control Panel**, and verify that **Microsoft BitLocker Administration and Monitoring** appears. - **Note**   + **Note** To validate the configuration, you must use a domain account that has local computer administrative credentials on each server. -   + 2. In the Configuration Manager console, click the **Assets and Compliance** workspace > **Device Collections**, and confirm that a new collection called **MBAM Supported Computers** is displayed. @@ -144,10 +146,10 @@ Use these steps to validate your MBAM Server deployment when you are using MBAM 1. On the server where Configuration Manager 2007 is deployed, open **Programs and Features** on **Control Panel** , and verify that **Microsoft BitLocker Administration and Monitoring** appears. - **Note**   + **Note** To validate the configuration, you must use a domain account that has local computer administrative credentials on each server. -   + 2. In the Configuration Manager console, click **Site Database <SiteCode> - <ServerName>, <SiteName>), Computer Management**, and confirm that a new collection called **MBAM Supported Computers** is displayed. @@ -178,11 +180,11 @@ Use these steps to validate your MBAM Server deployment when you are using MBAM [Configuring the MBAM 2.5 Server Features](configuring-the-mbam-25-server-features.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - For MBAM issues, use the [MBAM TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam). -  + diff --git a/mdop/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md b/mdop/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md index 4b1fa3c79f..66de3b12f9 100644 --- a/mdop/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md +++ b/mdop/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md @@ -58,7 +58,7 @@ To access the Reports feature in Configuration Manager: -  + ## Description of reports in Configuration Manager @@ -186,7 +186,7 @@ This report shows information about the overall BitLocker compliance across your -  + **BitLocker Enterprise Compliance Details States** @@ -217,7 +217,7 @@ This report shows information about the overall BitLocker compliance across your -  + ### BitLocker Enterprise Compliance Summary @@ -284,7 +284,7 @@ Use this report type to show information about the overall BitLocker compliance -  + **BitLocker Enterprise Compliance Summary Computer Details** @@ -331,7 +331,7 @@ Use this report type to show information about the overall BitLocker compliance -  + ### BitLocker Computer Compliance Report @@ -340,7 +340,7 @@ Use this report type to collect information that is specific to a computer. The **Note**   The Removable Data Volume encryption status is not shown in this report. -  + **BitLocker Computer Compliance Report: Computer Details Fields** @@ -431,7 +431,7 @@ The Removable Data Volume encryption status is not shown in this report. -  + **BitLocker Computer Compliance Report: Computer Volume Fields** @@ -474,14 +474,14 @@ The Removable Data Volume encryption status is not shown in this report. -  + ## Related topics [Monitoring and Reporting BitLocker Compliance with MBAM 2.5](monitoring-and-reporting-bitlocker-compliance-with-mbam-25.md) -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/mbam-v25/viewing-mbam-25-reports-for-the-stand-alone-topology.md b/mdop/mbam-v25/viewing-mbam-25-reports-for-the-stand-alone-topology.md index cf92142b88..9de3997194 100644 --- a/mdop/mbam-v25/viewing-mbam-25-reports-for-the-stand-alone-topology.md +++ b/mdop/mbam-v25/viewing-mbam-25-reports-for-the-stand-alone-topology.md @@ -35,21 +35,21 @@ See the following topics for information about Stand-alone reports:

    Report descriptions - MBAM Stand-alone topology

    -

    [Understanding MBAM 2.5 Stand-alone Reports](understanding-mbam-25-stand-alone-reports.md)

    +

    Understanding MBAM 2.5 Stand-alone Reports

    Instructions for generating reports - MBAM Stand-alone topology

    -

    [Generating MBAM 2.5 Stand-alone Reports](generating-mbam-25-stand-alone-reports.md)

    +

    Generating MBAM 2.5 Stand-alone Reports

    -  + **Note**   If you are using the Configuration Manager Integration topology, most reports are generated from Configuration Manager rather than from MBAM. See [Viewing MBAM 2.5 Reports for the Configuration Manager Integration Topology](viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md). -  + ## Related topics @@ -57,9 +57,9 @@ If you are using the Configuration Manager Integration topology, most reports ar [Monitoring and Reporting BitLocker Compliance with MBAM 2.5](monitoring-and-reporting-bitlocker-compliance-with-mbam-25.md) -  + -  + ## Got a suggestion for MBAM? - Add or vote on suggestions [here](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). diff --git a/mdop/medv-v1/client-installation-command-line-reference.md b/mdop/medv-v1/client-installation-command-line-reference.md index ef0c80aec9..2556d5ec09 100644 --- a/mdop/medv-v1/client-installation-command-line-reference.md +++ b/mdop/medv-v1/client-installation-command-line-reference.md @@ -93,11 +93,10 @@ ms.date: 06/16/2016

    Default: 1

    Starts MED-V at the completion of the MED-V installation.

    -Note   -

    It is recommended to set START_MEDV=0 in case MED-V is installed by the system.

    +Note

    It is recommended to set START_MEDV=0 in case MED-V is installed by the system.

    -  +
    @@ -119,11 +118,11 @@ ms.date: 06/16/2016 -  - -  - -  + + + + + diff --git a/mdop/medv-v1/configuring-med-v-for-remote-networks.md b/mdop/medv-v1/configuring-med-v-for-remote-networks.md index 175aa86669..a7a19283f2 100644 --- a/mdop/medv-v1/configuring-med-v-for-remote-networks.md +++ b/mdop/medv-v1/configuring-med-v-for-remote-networks.md @@ -49,7 +49,7 @@ You can configure MED-V to work from inside a network, remotely, or both from in **Note**   When applying new settings, the service must be restarted. -  + - You can change the IIS authentication scheme to one of the following: BASIC, DIGEST, NTLM, or NEGOTIATE. The default is NEGOTIATE and uses the following entry: @@ -72,9 +72,9 @@ When applying new settings, the service must be restarted. [MED-V Infrastructure Planning and Design](med-v-infrastructure-planning-and-design.md) -  + -  + diff --git a/mdop/medv-v1/configuring-med-v-server-for-cluster-mode.md b/mdop/medv-v1/configuring-med-v-server-for-cluster-mode.md index c89487daee..711eae625b 100644 --- a/mdop/medv-v1/configuring-med-v-server-for-cluster-mode.md +++ b/mdop/medv-v1/configuring-med-v-server-for-cluster-mode.md @@ -45,16 +45,16 @@ You can configure the MED-V server in cluster mode. In cluster mode, two servers **Note**   If all servers have the same local settings (such as listening ports, IIS server, management permissions, report database, and so on), the *<InstallDir>/Servers/ServerSettings.xml* can be shared by all servers as well. -  + ## Related topics [MED-V Infrastructure Planning and Design](med-v-infrastructure-planning-and-design.md) -  + -  + diff --git a/mdop/medv-v1/configuring-med-v-workspace-policies.md b/mdop/medv-v1/configuring-med-v-workspace-policies.md index e15f07c802..d870b70e1c 100644 --- a/mdop/medv-v1/configuring-med-v-workspace-policies.md +++ b/mdop/medv-v1/configuring-med-v-workspace-policies.md @@ -30,7 +30,7 @@ It is important to decide on the type of MED-V workspace you are creating before **Note**   When configuring a policy, a warning symbol appears next to mandatory fields that are not filled in. If a mandatory field is not filled in, the symbol appears on the tab as well. -  + ## In This Section @@ -62,9 +62,9 @@ Describes the performance settings of a MED-V workspace, and how to apply them t [How to Import and Export a Policy](how-to-import-and-export-a-policy.md) Describes how to import and export a policy. -  + -  + diff --git a/mdop/medv-v1/creating-a-med-v-image.md b/mdop/medv-v1/creating-a-med-v-image.md index fe9a642941..c784d59836 100644 --- a/mdop/medv-v1/creating-a-med-v-image.md +++ b/mdop/medv-v1/creating-a-med-v-image.md @@ -43,11 +43,11 @@ Describes how to delete a MED-V image. **Note**   After the MED-V image is configured, the computer should not be part of a domain because the join domain procedure should be performed on the client after the deployment, as part of the MED-V workspace setup. -  + -  + -  + diff --git a/mdop/medv-v1/creating-a-virtual-pc-image-for-med-v.md b/mdop/medv-v1/creating-a-virtual-pc-image-for-med-v.md index ea099b5c0c..d04425394e 100644 --- a/mdop/medv-v1/creating-a-virtual-pc-image-for-med-v.md +++ b/mdop/medv-v1/creating-a-virtual-pc-image-for-med-v.md @@ -57,98 +57,102 @@ After the Virtual PC image is created, install the MED-V workspace .msi package 2. Double-click the MED-V workspace .msi package, and follow the installation wizard instructions. - **Note**   + **Note** When a new MED-V version is released, and an existing Virtual PC image is updated, uninstall the existing MED-V workspace .msi package, reboot the computer, and install the new MED-V workspace .msi package. -   - **Note**   - After the MED-V workspace .msi package is installed, other products that replace GINA cannot be installed. -   +~~~ +**Note** +After the MED-V workspace .msi package is installed, other products that replace GINA cannot be installed. +~~~ + + ## How to Run the Virtual Machine Prerequisites Tool The virtual machine (VM) prerequisites tool is a wizard that automates several of the prerequisites. -**Note**   +**Note** Although many parameters are configurable in the wizard, the properties required for the proper functioning of MED-V are not configurable. -  + **To run the virtual machine prerequisites tool** 1. After the MED-V workspace .msi package is installed, on the Windows **Start** menu, select **All Programs > MED-V > VM Prerequisites Tool**. - **Note**   + **Note** The user running the virtual machine prerequisites tool must have local administrator rights and must be the only user logged in. -   - The **MED-V VM Prerequisite Wizard Welcome** page appears. -2. Click **Next**. +~~~ +The **MED-V VM Prerequisite Wizard Welcome** page appears. +~~~ -3. On the **Windows Settings** page, from the following configurable properties, select the ones to be configured: +2. Click **Next**. - - **Clear users’ personal history information** +3. On the **Windows Settings** page, from the following configurable properties, select the ones to be configured: - - **Clear local profiles temp directory** + - **Clear users’ personal history information** - - **Disable sounds on following Windows events: start, logon, logoff** + - **Clear local profiles temp directory** - **Note**   - Do not enable Windows page saver in a group policy. + - **Disable sounds on following Windows events: start, logon, logoff** -   + **Note** + Do not enable Windows page saver in a group policy. -4. Click **Next**. -5. On the **Internet Explorer Settings** page, from the following configurable properties, select the ones to be configured: - - **Don't use auto complete features** +4. Click **Next**. - - **Disable reuse of windows for launching shortcuts** +5. On the **Internet Explorer Settings** page, from the following configurable properties, select the ones to be configured: - - **Clear browsing history** + - **Don't use auto complete features** - - **Enable tabbed browsing in Internet Explorer 7** + - **Disable reuse of windows for launching shortcuts** -6. Click **Next**. + - **Clear browsing history** -7. On the **Windows Services** page, from the following configurable properties, select the ones to be configured: + - **Enable tabbed browsing in Internet Explorer 7** - - **Security center service** +6. Click **Next**. - - **Task scheduler service** +7. On the **Windows Services** page, from the following configurable properties, select the ones to be configured: - - **Automatic updates service** + - **Security center service** - - **System restore service** + - **Task scheduler service** - - **Indexing service** + - **Automatic updates service** - - **Wireless Zero Configuration** + - **System restore service** - - **Fast User Switching Compatibility** + - **Indexing service** -8. Click **Next**. + - **Wireless Zero Configuration** -9. On the **Windows Auto Logon** page, do the following: + - **Fast User Switching Compatibility** - 1. Select the **Enable Windows Auto Logon** check box. +8. Click **Next**. - 2. Assign a **User name** and **Password**. +9. On the **Windows Auto Logon** page, do the following: + + 1. Select the **Enable Windows Auto Logon** check box. + + 2. Assign a **User name** and **Password**. 10. Click **Apply**, and in the confirmation box that appears, click **Yes**. 11. On the **Summary** page, click **Finish** to quit the wizard -**Note**   +**Note** Verify that group policies do not overwrite the mandatory settings set in the prerequisites tool. -  + ## How to Configure MED-V Virtual Machine Manual Installation Prerequisites @@ -196,10 +200,10 @@ Several of the configurations cannot be configured through the virtual machine p In a MED-V workspace, Sysprep can be configured in order to assign unique security ID (SID), particularly when multiple MED-V workspaces are run on a single computer. It is not recommended to use Sysprep to join a domain; instead, use the MED-V join domain script action as described in [How to Set Up Script Actions](how-to-set-up-script-actions.md). -**Note**   +**Note** Sysprep is Microsoft's system preparation utility for the Windows operating system. -  + **To configure Sysprep in a MED-V workspace** @@ -207,9 +211,9 @@ Sysprep is Microsoft's system preparation utility for the Windows operating syst 2. From the Windows installation CD, extract *deploy.cab* to the root of the system drive, or download the latest Deployment Tools update from the Microsoft Web site. - - For Windows 2000, see [Deployment Tools update for Windows 2000](https://go.microsoft.com/fwlink/?LinkId=143001). + - For Windows 2000, see [Deployment Tools update for Windows 2000](https://go.microsoft.com/fwlink/?LinkId=143001). - - For Windows XP, see [Deployment Tools update for Windows XP](https://go.microsoft.com/fwlink/?LinkId=143000). + - For Windows XP, see [Deployment Tools update for Windows XP](https://go.microsoft.com/fwlink/?LinkId=143000). 3. Run **Setup Manager** (setupmgr.exe). @@ -242,9 +246,9 @@ After all the components are installed and configured, close Microsoft Virtual P Creating a MED-V Image [How to Set Up Script Actions](how-to-set-up-script-actions.md) -  - -  + + + diff --git a/mdop/medv-v1/deploying-a-med-v-workspace-using-a-deployment-package.md b/mdop/medv-v1/deploying-a-med-v-workspace-using-a-deployment-package.md index ddf064612e..2002a545dc 100644 --- a/mdop/medv-v1/deploying-a-med-v-workspace-using-a-deployment-package.md +++ b/mdop/medv-v1/deploying-a-med-v-workspace-using-a-deployment-package.md @@ -40,15 +40,15 @@ If the image will be included in the package, no other configurations are necess **Note**   If you are using image pre-staging, it is important to configure the image pre-stage folder prior to creating the deployment package. The folder path needs to be included in the deployment package. -  + Finally, create the deployment package. For more information on creating a deployment package, see [How to Configure a Deployment Package](how-to-configure-a-deployment-package.md). After the package is complete, distribute it for deployment. After the deployment package is distributed, MED-V client can be installed and the image deployed. For more information on installing MED-V client, see [How to Install MED-V Client](how-to-install-med-v-clientdeployment-package.md). For more information on deploying the image, see [How to Deploy a Workspace Image](how-to-deploy-a-workspace-imagedeployment-package.md). -  + -  + diff --git a/mdop/medv-v1/deploying-a-med-v-workspace-using-an-enterprise-software-distribution-system.md b/mdop/medv-v1/deploying-a-med-v-workspace-using-an-enterprise-software-distribution-system.md index 9c53f57a14..e30f9def62 100644 --- a/mdop/medv-v1/deploying-a-med-v-workspace-using-an-enterprise-software-distribution-system.md +++ b/mdop/medv-v1/deploying-a-med-v-workspace-using-an-enterprise-software-distribution-system.md @@ -22,7 +22,7 @@ MED-V client can be distributed using an enterprise software distribution system **Note**   If MED-V is installed by using Microsoft System Center Configuration Manager, when creating a package for MED-V, set the run mode to administrative rights. -  + Before deploying MED-V using an enterprise software distribution system, ensure that you have created a MED-V image ready for deployment. For more information on creating a MED-V image, see [Creating a MED-V Image](creating-a-med-v-image.md). @@ -45,13 +45,13 @@ If you are deploying the image via image pre-staging, configure the pre-stage fo **Note**   If you are using image pre-staging, it is important to configure the image pre-stage folder prior to pushing the client .msi package. The folder path needs to be included in the client .msi package. -  + Finally, push the client .msi package using your enterprise software distribution center. MED-V can then be installed and the image deployed. For more information on installing MED-V client, see [How to Install MED-V Client](how-to-install-med-v-clientesds.md). For more information on deploying the image, see [How to Deploy a Workspace Image](how-to-deploy-a-workspace-imageesds.md). -  + -  + diff --git a/mdop/medv-v1/examples-of-virtual-machine-configurationsv2.md b/mdop/medv-v1/examples-of-virtual-machine-configurationsv2.md index 845f5f500d..07a5fcee07 100644 --- a/mdop/medv-v1/examples-of-virtual-machine-configurationsv2.md +++ b/mdop/medv-v1/examples-of-virtual-machine-configurationsv2.md @@ -22,7 +22,7 @@ The following are examples of typical virtual machine configurations: one in a p **Note**   These examples are not intended for use in all environments. Adjust the configuration according to your environment. -  + **To configure a typical domain setup in a persistent MED-V workspace** @@ -65,9 +65,9 @@ These examples are not intended for use in all environments. Adjust the configur [How to Set Up Script Actions](how-to-set-up-script-actions.md) -  + -  + diff --git a/mdop/medv-v1/how-to-apply-general-settings-to-a-med-v-workspace.md b/mdop/medv-v1/how-to-apply-general-settings-to-a-med-v-workspace.md index 1cac2cf350..5940eccaee 100644 --- a/mdop/medv-v1/how-to-apply-general-settings-to-a-med-v-workspace.md +++ b/mdop/medv-v1/how-to-apply-general-settings-to-a-med-v-workspace.md @@ -42,7 +42,7 @@ The name of the MED-V workspace. **Warning**   Do not rename an existing MED-V workspace while it is running on a client computer. -  + Description @@ -51,7 +51,7 @@ Description of the MED-V workspace, which can include the content or status of t **Note**   The description is for administrator use and has no impact on the policy. -  + Support contact info @@ -81,7 +81,7 @@ Do not start the Workspace if the verification fails (exit code is not '0') Select this check box if you are using a command line and want to start the MED-V workspace only if the script is completed successfully. -  + A command line can be run on the host prior to starting the MED-V workspace. @@ -98,9 +98,9 @@ A command line can be run on the host prior to starting the MED-V workspace. [Creating a MED-V Workspace](creating-a-med-v-workspacemedv-10-sp1.md) -  + -  + diff --git a/mdop/medv-v1/how-to-apply-virtual-machine-settings-to-a-med-v-workspace.md b/mdop/medv-v1/how-to-apply-virtual-machine-settings-to-a-med-v-workspace.md index d9db530718..966dd20f1e 100644 --- a/mdop/medv-v1/how-to-apply-virtual-machine-settings-to-a-med-v-workspace.md +++ b/mdop/medv-v1/how-to-apply-virtual-machine-settings-to-a-med-v-workspace.md @@ -50,7 +50,7 @@ The actual Microsoft Virtual PC image assigned to the MED-V workspace. The menu **Note**   Each MED-V workspace image can only be used by one Windows user. -   + Workspace is persistent @@ -61,7 +61,7 @@ For a Domain MED-V workspace, this option must be selected. **Note**   This setting should not be changed after a MED-V workspace is deployed to users. -  + Shut down the VM when stopping the Workspace @@ -70,7 +70,7 @@ Select this check box to shut down the virtual machine when stopping the MED-V w **Note**   This property is enabled only if **Workspace is persistent** is selected. -  + Logon to Windows in VM using MED-V credentials (SSO) @@ -79,7 +79,7 @@ Select this check box to log in to Windows on the virtual machine by using the M **Note**   This property is enabled only when **Workspace is persistent** is selected. -  + Workspace is revertible @@ -88,7 +88,7 @@ Select this check box to configure the MED-V workspace as revertible. In a rever **Note**   This setting should not be changed after a MED-V workspace is deployed to users. -  + Synchronize Workspace time zone with host @@ -113,7 +113,7 @@ Select this check box to lock the MED-V workspace when the MED-V workspace is id **Note**   The idle time refers to the MED-V workspace applications (not the host applications). -  + *Image Update Settings* @@ -134,9 +134,9 @@ Select this check box to enable Trim Transfer (for more information, see [MED-V **Note**   Trim Transfer requires indexing the hard drive, which might take a considerable amount of time. It is recommended to use Trim Transfer when indexing the hard drive is more efficient than downloading the new image version, such as when downloading an image version that is similar to the existing version. -  + -  + ## Related topics @@ -147,9 +147,9 @@ Trim Transfer requires indexing the hard drive, which might take a considerable [Creating a MED-V Workspace](creating-a-med-v-workspacemedv-10-sp1.md) -  + -  + diff --git a/mdop/medv-v1/how-to-back-up-and-restore-a-med-v-server.md b/mdop/medv-v1/how-to-back-up-and-restore-a-med-v-server.md index 184504870e..0e617603d1 100644 --- a/mdop/medv-v1/how-to-back-up-and-restore-a-med-v-server.md +++ b/mdop/medv-v1/how-to-back-up-and-restore-a-med-v-server.md @@ -26,7 +26,7 @@ XML files located on the server can be backed up and then restored in case of lo **Note**   If the configuration has been changed from the default, the files might be stored in a different location. -   + - ClientPolicy.xml @@ -41,7 +41,7 @@ XML files located on the server can be backed up and then restored in case of lo **Note**   The ServerSettings.xml file can be backed up as well. However, if a specific configuration has been changed (for example, on the original server, the MED-V VMS directory is located in "*C:\\Vms*" and such a directory does not exist on the new server), it can cause an error. -   + **To restore a MED-V server** @@ -53,9 +53,9 @@ XML files located on the server can be backed up and then restored in case of lo 3. Restart the MED-V service. -  + -  + diff --git a/mdop/medv-v1/how-to-configure-a-deployment-package.md b/mdop/medv-v1/how-to-configure-a-deployment-package.md index fcb4e7012a..191960b228 100644 --- a/mdop/medv-v1/how-to-configure-a-deployment-package.md +++ b/mdop/medv-v1/how-to-configure-a-deployment-package.md @@ -19,49 +19,49 @@ ms.date: 06/16/2016 The Packaging wizard walks you through the creation of a package by creating a folder on your local computer and transferring all the required installation files to the single folder. The contents of the folder can then be moved to multiple removable media drives for distribution. -**Note**   +**Note** A single package cannot contain installation files for both x86 and x64 systems. -  + ## How to Create a Deployment Package **To create a deployment package** -1. Verify in the **Images** module that you have created at least one local packed image. +1. Verify in the **Images** module that you have created at least one local packed image. -2. On the **Tools** menu, select **Packaging wizard**. +2. On the **Tools** menu, select **Packaging wizard**. -3. On the **Packaging wizard** welcome page, click **Next**. +3. On the **Packaging wizard** welcome page, click **Next**. -4. On the **Workspace Image** page, select the **Include image in the package** check box to include an image in the package. +4. On the **Workspace Image** page, select the **Include image in the package** check box to include an image in the package. - The **Image** field is enabled. + The **Image** field is enabled. - **Note**   - An image is not required in a MED-V package; the package can be created without an image. In such a case, the image should be uploaded to the server so that it can later be downloaded over the network to the client, or pushed to an image pre-stage folder. + **Note** + An image is not required in a MED-V package; the package can be created without an image. In such a case, the image should be uploaded to the server so that it can later be downloaded over the network to the client, or pushed to an image pre-stage folder. -   -5. Click the **Image** list to view all available images. Select the image to be copied to the package. Click **Refresh** to refresh the list of available images. -6. Click **Next**. +5. Click the **Image** list to view all available images. Select the image to be copied to the package. Click **Refresh** to refresh the list of available images. -7. On the **MED-V Installation Settings** page, select the MED-V installation file by doing one of the following: +6. Click **Next**. - - In the **MED-V installation file** field, type the full path to the directory where the installation file is located. +7. On the **MED-V Installation Settings** page, select the MED-V installation file by doing one of the following: - - Click **...** to browse to the directory where the installation file is located. + - In the **MED-V installation file** field, type the full path to the directory where the installation file is located. - **Note**   - This field is mandatory, and the wizard will not continue without a valid file name. + - Click **...** to browse to the directory where the installation file is located. -   + **Note** + This field is mandatory, and the wizard will not continue without a valid file name. -8. In the **Server address** field, type the server name or IP address. -9. In the **Server port** field, type the server port. + +8. In the **Server address** field, type the server name or IP address. + +9. In the **Server port** field, type the server port. 10. Select the **Server is accessed using https** check box to require an https connection to connect to the server. @@ -73,29 +73,31 @@ A single package cannot contain installation files for both x86 and x64 systems. 1. On the **MED-V Installation Custom Settings** page, in the **Installation folder** field, type the path of the folder where the MED-V files will be installed on the host computer. - **Note**   + **Note** It is recommended to use variables in the path rather than constants, which might vary from computer to computer. For example, use *%ProgramFiles%\\MED-V* instead of *c:\\MED-V*. -   - 2. In the **Virtual machines images folder** field, type the path of the folder where the virtual images files will be installed on the host computer. - **Note**   - If you are using image pre-staging, this is the image pre-stage folder where the image is located. + ~~~ + 2. In the **Virtual machines images folder** field, type the path of the folder where the virtual images files will be installed on the host computer. -   + **Note** + If you are using image pre-staging, this is the image pre-stage folder where the image is located. - 3. In the **Minimal required RAM** field, enter the RAM required to install a MED-V package. If the user installing the MED-V package does not have the minimal required RAM, the installation will fail. - 4. Select the **Install the MED-V management application** check box to include the MED-V management console application in the installation. - 5. Select the **Create a shortcut to MED-V on the desktop** check box to create a shortcut to MED-V on the host's desktop. + 3. In the **Minimal required RAM** field, enter the RAM required to install a MED-V package. If the user installing the MED-V package does not have the minimal required RAM, the installation will fail. - 6. Select the **Start automatically on computer startup** check box to start MED-V automatically on startup. + 4. Select the **Install the MED-V management application** check box to include the MED-V management console application in the installation. - 7. Click **Next**. + 5. Select the **Create a shortcut to MED-V on the desktop** check box to create a shortcut to MED-V on the host's desktop. + + 6. Select the **Start automatically on computer startup** check box to start MED-V automatically on startup. + + 7. Click **Next**. + ~~~ 12. On the **Additional Installations** page, select the **Include installation of virtualization software** check box to include the Virtual PC installation in the package. @@ -105,9 +107,9 @@ A single package cannot contain installation files for both x86 and x64 systems. The **Installation file** field is enabled. Type the full path of the Virtual PC update installation file, or click **...** to browse to the directory. -14. Select the **Include installation of Microsoft .NET Framework 2.0** check box to include the Microsoft .NET Framework 2.0 installation in the package. +14. Select the **Include installation of Microsoft .NET Framework 2.0** check box to include the Microsoft .NET Framework 2.0 installation in the package. - The **Installation file** field is enabled. Type the full path of the Microsoft .NET Framework 2.0 installation file, or click **...** to browse to the directory. + The **Installation file** field is enabled. Type the full path of the Microsoft .NET Framework 2.0 installation file, or click **...** to browse to the directory. 15. Click **Next**. @@ -117,10 +119,10 @@ A single package cannot contain installation files for both x86 and x64 systems. - Click **...** to browse to the directory where the installation files should be saved. - **Note**   + **Note** Building the package might consume more space than the actual package size. It is therefore recommended to build the package on the hard drive. After the package is created, it can then be copied to the USB. -   + 17. In the **Package name** field, enter a name for the package. @@ -130,29 +132,29 @@ A single package cannot contain installation files for both x86 and x64 systems. After the package is created, a message appears notifying you that it has been completed successfully. -**Note**   +**Note** If you saved all the files locally, and not directly on the removable media, ensure that you copy only the contents of the folder and not the folder itself to the removable media. -  -**Note**   + +**Note** The removable media must be large enough so that the package contents consume a maximum of only three-quarters of the removable media's memory. -  -**Note**   + +**Note** When creating the package, up to double the size of the actual package size might be required when the build is complete. -  + ## Related topics [Creating a MED-V Image](creating-a-med-v-image.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-configure-a-domain-user-or-groupmedvv2.md b/mdop/medv-v1/how-to-configure-a-domain-user-or-groupmedvv2.md index 0ac177cc39..ce0b36eae2 100644 --- a/mdop/medv-v1/how-to-configure-a-domain-user-or-groupmedvv2.md +++ b/mdop/medv-v1/how-to-configure-a-domain-user-or-groupmedvv2.md @@ -40,15 +40,17 @@ To allow users to utilize the MED-V workspace, you must first add domain users o The domain users or groups are added. - **Note**   + **Note** Users from trusted domains should be added manually. -   - **Warning**   - Do not run the management application from a computer that is part of a domain that is not trusted by the domain the server is installed on. -   +~~~ +**Warning** +Do not run the management application from a computer that is part of a domain that is not trusted by the domain the server is installed on. +~~~ + + ## How to Remove a Domain User or Group @@ -112,17 +114,17 @@ Select this check box to enable transferring files between the host and MED-V wo - **Workspace to Host**—Enable transferring files from the MED-V workspace to the host. -**Note**   +**Note** If a user without permissions attempts to transfer files, a window will appear prompting him to enter the credentials of a user with permissions to perform the file transfer. -  -**Important**   -To support file transfer in Windows XP SP3, you must disable offline file synchronization by editing the registry as follows: + +**Important** +To support file transfer in Windows XP SP3, you must disable offline file synchronization by editing the registry as follows: `REG ADD HKLM\software\microsoft\windows\currentversion\netcache /V Enabled /T REG_DWORD /F /D 0` -  + Advanced @@ -134,16 +136,16 @@ Enable printing to printers connected to the host Select this check box to enable users to print from the MED-V workspace using the host printer. -**Note**   +**Note** The printing is performed by the printers defined on the host. -  + Enable access to CD / DVD Select this check box to allow access to a CD or DVD drive from this MED-V workspace. -  + **Multiple Memberships** @@ -162,9 +164,9 @@ Select this check box to allow access to a CD or DVD drive from this MED-V works [How to Set Advanced File Transfer Options](how-to-set-advanced-file-transfer-options.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-configure-image-pre-staging.md b/mdop/medv-v1/how-to-configure-image-pre-staging.md index 05b5ddb581..5d736b92b9 100644 --- a/mdop/medv-v1/how-to-configure-image-pre-staging.md +++ b/mdop/medv-v1/how-to-configure-image-pre-staging.md @@ -20,7 +20,7 @@ ms.date: 06/16/2016 **Note**   Image pre-staging is useful only for the initial image download. It is not supported for image update. -  + ## How to Configure Image Pre-staging @@ -32,32 +32,32 @@ Image pre-staging is useful only for the initial image download. It is not suppo **Note**   This folder must be called *MED-V Images*. -   + 2. Inside the MED-V Images folder, create a subfolder and name it *PrestagedImages*. **Note**   This folder must be called *PrestagedImages*. -   + 3. To apply Access Control Lists (ACL) security to the *MED-V Images* folder, set the following ACL: **NT AUTHORITY\\Authenticated Users:(OI)(CI)(special access:)** -                                          **READ\_CONTROL** + **READ\_CONTROL** -                                 **SYNCHRONIZE** + **SYNCHRONIZE** -                                 **FILE\_GENERIC\_READ** + **FILE\_GENERIC\_READ** -                                 **FILE\_READ\_DATA** + **FILE\_READ\_DATA** **                                 FILE\_APPEND\_DATA** -                                 **FILE\_READ\_EA** + **FILE\_READ\_EA** -                                 **FILE\_READ\_ATTRIBUTES** + **FILE\_READ\_ATTRIBUTES** **NT AUTHORITY\\SYSTEM:(OI)(CI)F** @@ -66,7 +66,7 @@ Image pre-staging is useful only for the initial image download. It is not suppo **Note**   It is recommended to apply ACL security to the *MED-V Images* folder. -   + 4. To apply ACL security to the *PrestagedImages* folder, set the following ACL: @@ -91,14 +91,14 @@ Image pre-staging is useful only for the initial image download. It is not suppo **Note**   It is recommended to apply ACL security to the *PrestagedImages* folder. -   + 5. Push the image files (CKM and INDEX files) to the *PrestagedImages* folder. **Note**   After the image files have been pushed to the pre-stage folder, it is recommended to run a data integrity check and to mark the files as read-only. -   + 6. Include the following parameter in the MED-V client installation: *Client.MSI VMSFOLDER=”C:\\MED-V Images”*. @@ -115,9 +115,9 @@ Image pre-staging is useful only for the initial image download. It is not suppo 2. If the image is in a different location, change the path. -  + -  + diff --git a/mdop/medv-v1/how-to-configure-published-applicationsmedvv2.md b/mdop/medv-v1/how-to-configure-published-applicationsmedvv2.md index 110ea7ab26..91f9055689 100644 --- a/mdop/medv-v1/how-to-configure-published-applicationsmedvv2.md +++ b/mdop/medv-v1/how-to-configure-published-applicationsmedvv2.md @@ -38,10 +38,10 @@ An application can be published in one of the following ways: 4. On the **Policy** menu, select **Commit**. - **Note**   + **Note** If you are setting Internet Explorer as a published application to ensure that Web redirection works properly, make certain that any parameters are not in parentheses. -   + **Published Application Properties** @@ -63,30 +63,28 @@ An application can be published in one of the following ways:

    Display name

    -

    The name of the shortcut in the user's Windows Start menu.

    +

    The name of the shortcut in the user's Windows Start menu.

    -Note   -

    The display name is not case sensitive.

    +Note

    The display name is not case sensitive.

    -  +

    Description

    -

    A description of the published application, which appears as a tooltip when the user's mouse hovers over the shortcut.

    +

    A description of the published application, which appears as a tooltip when the user's mouse hovers over the shortcut.

    Command line

    The command used to run the application from within the MED-V workspace. The full path is required, and the parameters can be passed to the application in a similar fashion as in any other Windows command.

    -

    In a revertible MED-V workspace, you can map a network drive with MapNetworkDrive syntax: "MapNetworkDrive <drive> <path>"—for example, "MapNetworkDrive t: \\tux\date".

    -

    For example, to publish Windows Explorer, use the following syntax: "c:\" or "c:\windows."

    +

    In a revertible MED-V workspace, you can map a network drive with MapNetworkDrive syntax: "MapNetworkDrive <drive> <path>"—for example, "MapNetworkDrive t: \tux\date".

    +

    For example, to publish Windows Explorer, use the following syntax: "c:</em>" or "c:\windows."

    -Note   -

    To have a name resolution, you need to perform one of the following:

    +Note

    To have a name resolution, you need to perform one of the following:

    -  +
    • Configure the DNS in the base MED-V workspace image.

    • @@ -94,28 +92,26 @@ An application can be published in one of the following ways:
    • Use the IP for defining the network drive.

    -Note   -

    If the path includes spaces, the entire path must be inside quotation marks.

    +Note

    If the path includes spaces, the entire path must be inside quotation marks.

    -  +
    -Note   -

    The path should not end with a backslash ().

    +Note

    The path should not end with a backslash ().

    -  +

    Start menu

    -

    Select this check box to create a shortcut for the application in the user's Windows Start menu.

    +

    Select this check box to create a shortcut for the application in the user's Windows Start menu.

    -  + All published applications appear as shortcuts in the Windows **Start** menu (**Start >All Programs> MED-V Applications**). @@ -167,35 +163,34 @@ All published applications appear as shortcuts in the Windows **Start** menu (**

    Display name

    -

    The name of the shortcut in the user's Windows Start menu.

    +

    The name of the shortcut in the user's Windows Start menu.

    Description

    -

    The description, which appears as a tooltip when the user's mouse hovers over the shortcut.

    +

    The description, which appears as a tooltip when the user's mouse hovers over the shortcut.

    Folder in workspace

    Select the folder to publish as a menu containing all the applications within the folder.

    The text displayed is a relative path from the Programs folder.

    -Note   -

    If left blank, all programs on the host will be published as a menu.

    +Note

    If left blank, all programs on the host will be published as a menu.

    -  +
    -  + All published menus appear as shortcuts in the Windows **Start** menu (**Start >All Programs> MED-V Applications**). You can change the name of the shortcut in the **Start-menu shortcuts folder** field. -**Note**   +**Note** When configuring two MED-V workspaces, it is recommended to configure a different name for the Start menu shortcuts folder. -  + ## How to Remove a Published Menu from a MED-V Workspace @@ -221,10 +216,10 @@ The administrator can run published applications from any location, such as a de "\Manager\KidaroCommands.exe" /run "" "" ``` -**Note**   +**Note** The MED-V workspace in which the published application is defined must be running. -  + ## Related topics @@ -235,9 +230,9 @@ The MED-V workspace in which the published application is defined must be runnin [Creating a MED-V Workspace](creating-a-med-v-workspacemedv-10-sp1.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-configure-the-virtual-machine-setup-for-a-med-v-workspacemedvv2.md b/mdop/medv-v1/how-to-configure-the-virtual-machine-setup-for-a-med-v-workspacemedvv2.md index 3108c58d7c..938c998f17 100644 --- a/mdop/medv-v1/how-to-configure-the-virtual-machine-setup-for-a-med-v-workspacemedvv2.md +++ b/mdop/medv-v1/how-to-configure-the-virtual-machine-setup-for-a-med-v-workspacemedvv2.md @@ -28,10 +28,10 @@ All virtual machine setup configuration settings are configured in the **Policy* 2. In the **Persistent VM Setup** section, configure the properties as described in the following table. - **Note**   + **Note** The persistent VM setup properties are enabled only for a persistent MED-V workspace. -   + 3. On the **Policy** menu, select **Commit**. @@ -55,30 +55,28 @@ All virtual machine setup configuration settings are configured in the **Policy*

    Script Editor

    -

    Click to configure the setup script. For more information, see [How to Set Up Script Actions](how-to-set-up-script-actions.md).

    +

    Click to configure the setup script. For more information, see How to Set Up Script Actions.

    -Note   -

    This button is enabled only when Run VM Setup script is selected.

    +Note

    This button is enabled only when Run VM Setup script is selected.

    -  +

    Message displayed when script is running

    A message to be displayed while the script is running. If left blank, the default message is displayed.

    -Note   -

    This field is enabled only when Run VM Setup script is checked.

    +Note

    This field is enabled only when Run VM Setup script is checked.

    -  +
    -  + ## How to Configure the Virtual Machine Setup for a Revertible MED-V Workspace @@ -89,10 +87,10 @@ All virtual machine setup configuration settings are configured in the **Policy* 2. In the **Revertible VM Setup** section, configure the properties as described in the following table. - **Note**   + **Note** The revertible VM setup properties are enabled only for a revertible MED-V workspace. -   + 3. On the **Policy** menu, select **Commit**. @@ -113,12 +111,12 @@ All virtual machine setup configuration settings are configured in the **Policy*

    Rename the VM based on the computer name pattern

    Select this check box to assign a unique name to each computer using the MED-V workspace so that you can differentiate between multiple computers using the same MED-V workspace.

    -

    For more information on configuring computer image names, see [How to Configure VM Computer Name Pattern Properties](how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md).

    +

    For more information on configuring computer image names, see How to Configure VM Computer Name Pattern Properties.

    -  + ## Related topics @@ -129,9 +127,9 @@ All virtual machine setup configuration settings are configured in the **Policy* [Examples of Virtual Machine Configurations](examples-of-virtual-machine-configurationsv2.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md b/mdop/medv-v1/how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md index a946709bc0..d37e201c72 100644 --- a/mdop/medv-v1/how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md +++ b/mdop/medv-v1/how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md @@ -52,22 +52,24 @@ A virtual machine computer name pattern can be assigned both for revertible and - **Random characters**—Enter “\#” for each random character to include in the pattern. Each computer using the MED-V workspace will have a suffix of the length specified, which is generated randomly. - **Note**   + **Note** The computer name has a limit of 15 characters. If the pattern exceeds the limit, it will be truncated. -   + 4. On the **Policy** menu, select **Commit**. - **Note**   + **Note** A revertible VM computer name pattern can be assigned only when **Rename the VM based on the computer name patterns** (in the **Revertible VM Setup** section) is checked. -   - **Note**   - A unique computer name can be assigned only if it is configured prior to MED-V workspace setup. Changing the name will not affect MED-V workspaces that were already set up. -   +~~~ +**Note** +A unique computer name can be assigned only if it is configured prior to MED-V workspace setup. Changing the name will not affect MED-V workspaces that were already set up. +~~~ + + ## How to Assign a Virtual Machine Computer Name Pattern to a Persistent MED-V Workspace @@ -102,17 +104,17 @@ A virtual machine computer name pattern can be assigned both for revertible and - **Random characters**— Enter “\#” for each random character to include in the pattern. The computer will have a suffix of the length specified, which is generated randomly. - **Note**   + **Note** The computer name has a limit of 15 characters. If the pattern exceeds the limit, it will be truncated. -   + 6. On the **Policy** menu, select **Commit**. - **Note**   + **Note** The computer will be renamed only if it is set as an action in the **Script Actions** dialog box. For detailed information, see [How to Set Up Script Actions](how-to-set-up-script-actions.md). -   + ## Related topics @@ -125,9 +127,9 @@ A virtual machine computer name pattern can be assigned both for revertible and [Examples of Virtual Machine Configurations](examples-of-virtual-machine-configurationsv2.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-configure-web-settings-for-a-med-v-workspace.md b/mdop/medv-v1/how-to-configure-web-settings-for-a-med-v-workspace.md index d1dfc15034..258a58f9b0 100644 --- a/mdop/medv-v1/how-to-configure-web-settings-for-a-med-v-workspace.md +++ b/mdop/medv-v1/how-to-configure-web-settings-for-a-med-v-workspace.md @@ -21,10 +21,10 @@ Web sites that can only be displayed in older versions of Internet Explorer and The following procedures describe how you can set a list of Web browsing rules for a MED-V workspace. All sites included in the rules can be browsed either in the MED-V workspace or on the host, as defined by the administrator. All sites not defined within the rules are browsed from the environment in which they were requested. However, you can configure them as a group as well, to be browsed in the MED-V workspace or the host. -**Note**   +**Note** Web settings are applied only to Internet Explorer and to no other browsers. -  + All Web settings are configured in the **Policy** module, on the **Web** tab. @@ -87,7 +87,7 @@ All Web settings are configured in the **Policy** module, on the **Web** tab.
    • Domain suffix—Access to any host address ending with the suffix specified in the Value property and is set according to the option set in Web Browsing.

    • IP Prefix—Access to any full or partial IP address in the range of the prefix specified in the Value property and is set according to the option set in Web Browsing.

    • -
    • All Local Addresses—Access to all addresses without a '.' and is set according to the option set in Web Browsing.

    • +
    • All Local Addresses—Access to all addresses without a '.' and is set according to the option set in Web Browsing.

    @@ -95,14 +95,13 @@ All Web settings are configured in the **Policy** module, on the **Web** tab.
    • If Domain suffix is selected in the Type property, enter a domain suffix.

      -Note   -
        +Note
        • Do not enter "*" before the suffix.

        • Domain suffixes support aliases as well.

      -  +
    • If IP Prefix is selected in the Type property, enter a full or partial IP address.

    @@ -110,7 +109,7 @@ All Web settings are configured in the **Policy** module, on the **Web** tab. -  + ## How to Delete a Web Rule @@ -130,9 +129,9 @@ All Web settings are configured in the **Policy** module, on the **Web** tab. [Creating a MED-V Workspace](creating-a-med-v-workspacemedv-10-sp1.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-create-and-test-a-med-v-image.md b/mdop/medv-v1/how-to-create-and-test-a-med-v-image.md index 7f2cd80715..81edc52790 100644 --- a/mdop/medv-v1/how-to-create-and-test-a-med-v-image.md +++ b/mdop/medv-v1/how-to-create-and-test-a-med-v-image.md @@ -59,7 +59,7 @@ When creating a MED-V image, it goes through the following stages: **Note**   The following characters cannot be included in the image name: space " < > | \\ / : \* ? -   + 5. Click **OK**. @@ -96,7 +96,7 @@ When creating a MED-V image, it goes through the following stages: -  + ## How to Test a MED-V Image from the MED-V Client @@ -128,12 +128,12 @@ After a MED-V test image is created, use the following procedure to test the ima **Note**   While testing an image, do not open VPC and make changes to the image. -  + **Note**   When testing an image, no changes are saved to the image between sessions; instead, they are saved in a separate, temporary file. This is to ensure that when the image is packed and run on the production environment, it is the original, clean image. -  + ## Related topics @@ -146,9 +146,9 @@ When testing an image, no changes are saved to the image between sessions; inste [MED-V Client Operations](med-v-client-operations.md) -  + -  + diff --git a/mdop/medv-v1/how-to-edit-a-published-application-with-advanced-settings.md b/mdop/medv-v1/how-to-edit-a-published-application-with-advanced-settings.md index 237737477b..269980cf59 100644 --- a/mdop/medv-v1/how-to-edit-a-published-application-with-advanced-settings.md +++ b/mdop/medv-v1/how-to-edit-a-published-application-with-advanced-settings.md @@ -49,13 +49,12 @@ After a published application has been added and configured, the published appli

    Display name

    -

    The name of the shortcut in the user's Windows Start menu.

    +

    The name of the shortcut in the user's Windows Start menu.

    -Note   -

    The display name is not case sensitive.

    +Note

    The display name is not case sensitive.

    -  +
    @@ -66,11 +65,10 @@ After a published application has been added and configured, the published appli

    Start in

    The directory from which to start the application.

    -Note   -

    The path does not need to include quotation marks.

    +Note

    The path does not need to include quotation marks.

    -  +
    @@ -78,14 +76,13 @@ After a published application has been added and configured, the published appli

    The command with which to run the application from within the MED-V workspace.

    The full path is required, and the parameters can be passed to the application in a similar fashion as in any other Windows command.

    In a domain configuration, a shared drive usually exists on the server where all domain computers map to. The directory should be mapped here, and if it is a folder that requires user authentication, the Use MED-V credentials to run this application check box must be selected.

    -

    In a revertible MED-V workspace, you can map a network drive with MapNetworkDrive syntax: "MapNetworkDrive <drive> <path>"—for example, "MapNetworkDrive t: \\tux\data".

    -

    For example, to publish Windows Explorer, use the following syntax: "c:\" or "c:\windows".

    +

    In a revertible MED-V workspace, you can map a network drive with MapNetworkDrive syntax: "MapNetworkDrive <drive> <path>"—for example, "MapNetworkDrive t: \tux\data".

    +

    For example, to publish Windows Explorer, use the following syntax: "c:&quot; or "c:\windows".

    -Note   -

    To have a name resolution, you need to perform one of the following:

    +Note

    To have a name resolution, you need to perform one of the following:

    -  +
    • Configure the DNS in the base MED-V workspace image.

    • @@ -93,23 +90,21 @@ After a published application has been added and configured, the published appli
    • Use the IP for defining the network drive.

    -Note   -

    If the path includes spaces, the entire path must be inside quotation marks.

    +Note

    If the path includes spaces, the entire path must be inside quotation marks.

    -  +
    -Note   -

    The path should not end with a backslash ().

    +Note

    The path should not end with a backslash ().

    -  +

    Add a shortcut in the host Windows Start menu

    -

    Select this check box to create a shortcut for the application in the user's Windows Start menu.

    +

    Select this check box to create a shortcut for the application in the user's Windows Start menu.

    Launch this application when the Workspace is started

    @@ -119,26 +114,25 @@ After a published application has been added and configured, the published appli

    Use MED-V credentials to run this application

    Select this check box to authenticate applications that request a user name and password using the MED-V credentials instead of the credentials set for the application.

    -Note   -

    When using SSO, the command line should be C:\Windows\Explorer.exe "folder path". When not using SSO, the command line should be "folder path".

    +Note

    When using SSO, the command line should be C:\Windows\Explorer.exe "folder path". When not using SSO, the command line should be "folder path".

    -  +
    -  + ## Related topics [How to Configure Published Applications](how-to-configure-published-applicationsmedvv2.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-generate-reports-medvv2.md b/mdop/medv-v1/how-to-generate-reports-medvv2.md index 60eee274ea..082e4a4e13 100644 --- a/mdop/medv-v1/how-to-generate-reports-medvv2.md +++ b/mdop/medv-v1/how-to-generate-reports-medvv2.md @@ -62,22 +62,20 @@ The report results can be grouped by dragging a column header to the top of the

    Time

    The date and time the event occurred.

    -Note   -

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    +Note

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    -  +

    User Name

    The user who initiated the event.

    -Note   -

    If the event occurred before a user logged on, the user name is SYSTEM.

    +Note

    If the event occurred before a user logged on, the user name is SYSTEM.

    -  +
    @@ -116,17 +114,16 @@ The report results can be grouped by dragging a column header to the top of the

    Image Version

    The image version that the MED-V workspace is currently using.

    -Note   -

    MED-V workspace version can be Unknown if it has not yet been downloaded onto a computer.

    +Note

    MED-V workspace version can be Unknown if it has not yet been downloaded onto a computer.

    -  +
    -  + ## How to Generate an Activity Log Report @@ -185,18 +182,16 @@ The report results can be grouped by dragging a column header to the top of the

    Time Received

    The date and time the event was received on the server.

    -Note   -

    If the client is working offline, the server receives the reports when the client is online.

    +Note

    If the client is working offline, the server receives the reports when the client is online.

    -  +
    -Note   -

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    +Note

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    -  +
    @@ -222,7 +217,7 @@ The report results can be grouped by dragging a column header to the top of the -  + ## How to Generate an Error Log Report @@ -275,18 +270,16 @@ The report results can be grouped by dragging a column header to the top of the

    Time Received

    The date and time the event was received on the server.

    -Note   -

    If the client is working offline, the server receives the reports when the client is online.

    +Note

    If the client is working offline, the server receives the reports when the client is online.

    -  +
    -Note   -

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    +Note

    By default, the events are displayed in descending date order. However, it can be changed by clicking the Time Received column.

    -  +
    @@ -308,11 +301,11 @@ The report results can be grouped by dragging a column header to the top of the -  - -  - -  + + + + + diff --git a/mdop/medv-v1/how-to-install-and-configure-the-med-v-server-component.md b/mdop/medv-v1/how-to-install-and-configure-the-med-v-server-component.md index c554dd0360..e21097b997 100644 --- a/mdop/medv-v1/how-to-install-and-configure-the-med-v-server-component.md +++ b/mdop/medv-v1/how-to-install-and-configure-the-med-v-server-component.md @@ -48,10 +48,10 @@ This section explains how to [install](#bkmk-howtoinstallthemedvserver) and [con 6. When the **InstallShield Wizard Completed** screen appears, click **Finish** to complete the wizard. -**Note**   +**Note** If you are installing the MED-V server via Microsoft Remote Desktop, use the following syntax: **mstsc/admin**. Ensure that your RDP session is directed to the console. -  + ## How to Configure the MED-V Server @@ -72,32 +72,34 @@ The following server settings can be configured: 1. On the Windows Start menu, select **All Programs > MED-V > MED-V Server Configuration Manager**. - **Note**   + **Note** Note: If you selected the **Launch MED-V Server Configuration Manager** check box during the server installation, the MED-V server configuration manager starts automatically after the server installation is complete. -   - The MED-V Server Configuration Manager appears. -2. On the **Connections** tab, configure the following client connections settings: +~~~ +The MED-V Server Configuration Manager appears. +~~~ - - **Enable unencrypted connections (http), using port**—Select this check box to enable unencrypted connections using a specified port. In the port box, enter the server port on which to accept unencrypted connections (http). +2. On the **Connections** tab, configure the following client connections settings: - - **Enable encrypted connections (https), using port**—Select this check box to enable encrypted connections using a specified port. In the port box, enter the server port on which to accept encrypted connections (https). + - **Enable unencrypted connections (http), using port**—Select this check box to enable unencrypted connections using a specified port. In the port box, enter the server port on which to accept unencrypted connections (http). - Https is an optional configuration which can be set to ensure secure transactions between the MED-V server and MED-V clients. To configure https, you must perform the following procedures: + - **Enable encrypted connections (https), using port**—Select this check box to enable encrypted connections using a specified port. In the port box, enter the server port on which to accept encrypted connections (https). - - Configure a certificate on the server. + Https is an optional configuration which can be set to ensure secure transactions between the MED-V server and MED-V clients. To configure https, you must perform the following procedures: - - Associate the server certificate with the port specified using netsh. For information, see the following: + - Configure a certificate on the server. - - [Netsh Commands for Hypertext Transfer Protocol (HTTP)](https://go.microsoft.com/fwlink/?LinkId=183314) + - Associate the server certificate with the port specified using netsh. For information, see the following: - - [How to: Configure a Port with an SSL Certificate](https://go.microsoft.com/fwlink/?LinkID=183315) + - [Netsh Commands for Hypertext Transfer Protocol (HTTP)](https://go.microsoft.com/fwlink/?LinkId=183314) - - [How to: Configure a Port with an SSL Certificate](https://msdn.microsoft.com/library/ms733791.aspx) + - [How to: Configure a Port with an SSL Certificate](https://go.microsoft.com/fwlink/?LinkID=183315) -3. Click **OK**. + - [How to: Configure a Port with an SSL Certificate](https://msdn.microsoft.com/library/ms733791.aspx) + +3. Click **OK**. ### Configuring Images @@ -151,10 +153,10 @@ The following server settings can be configured: `Data Source=;Initial Catalog=;uid=sa;pwd=;` - **Note**   + **Note** Note: To connect to SQL Express, use: `Data Source=\sqlexpress.` -   + 4. To create the database, click **Create Database**. @@ -185,9 +187,9 @@ The following server settings can be configured: [Design the MED-V Server Infrastructure](design-the-med-v-server-infrastructure.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-install-med-v-client-and-med-v-management-console.md b/mdop/medv-v1/how-to-install-med-v-client-and-med-v-management-console.md index 23bdf51823..e84a2751f0 100644 --- a/mdop/medv-v1/how-to-install-med-v-client-and-med-v-management-console.md +++ b/mdop/medv-v1/how-to-install-med-v-client-and-med-v-management-console.md @@ -25,15 +25,15 @@ The following MED-V components are included in the client .msi package: The MED-V management console and the MED-V client are both installed from the MED-V client .msi package. The MED-V client, however, can be installed independently without the MED-V management console by clearing the **Install the MED-V Management application** check box during installation. -**Note**   -The MED-V client and MED-V management console can only be installed on Windows 7-, Windows Vista-, and Windows XP-based computers. They cannot be installed on server products. +**Note** +The MED-V client and MED-V management console can only be installed on Windows 7-, Windows Vista-, and Windows XP-based computers. They cannot be installed on server products. -  -**Note**   + +**Note** Do not install the MED-V client using the Windows **runas** command. -  + **To install the MED-V client** @@ -61,32 +61,34 @@ Do not install the MED-V client using the Windows **runas** command. - Select the **Install the MED-V management application** check box to include the management component in the installation. - **Note**   + **Note** Enterprise Desktop Virtualization administrators should install the MED-V management application. This application is required for configuring desktop images and MED-V workspaces. -   - - Select the **Load MED-V when Windows starts** check box to start MED-V automatically on startup. - - Select the **Add a MED-V shortcut to my desktop** check box to create a MED-V shortcut on your desktop. +~~~ +- Select the **Load MED-V when Windows starts** check box to start MED-V automatically on startup. - - In the **Server address** field, type the server address. +- Select the **Add a MED-V shortcut to my desktop** check box to create a MED-V shortcut on your desktop. - - In the **Server port** field, type the server's port. +- In the **Server address** field, type the server address. - - Select the **Server requires encrypted connections (https)** check box to work with https. +- In the **Server port** field, type the server's port. - - The default virtual machine images folder is displayed. The default installation folder is *%systemdrive%\\MED-V Images\\*. To change the folder where MED-V should be installed, click **Change**, and browse to an existing folder. +- Select the **Server requires encrypted connections (https)** check box to work with https. -7. Click **Next**. +- The default virtual machine images folder is displayed. The default installation folder is *%systemdrive%\\MED-V Images\\*. To change the folder where MED-V should be installed, click **Change**, and browse to an existing folder. +~~~ -8. On the **Ready to Install the Program** screen, click **Install**. +7. Click **Next**. - The MED-V client installation starts. This can take several minutes, and the screen might not display text. During installation, several progress screens appear. If a message appears, follow the instructions provided. +8. On the **Ready to Install the Program** screen, click **Install**. - Upon successful installation, the **InstallShield Wizard Completed** screen appears. + The MED-V client installation starts. This can take several minutes, and the screen might not display text. During installation, several progress screens appear. If a message appears, follow the instructions provided. -9. Click **Finish** to close the wizard. + Upon successful installation, the **InstallShield Wizard Completed** screen appears. + +9. Click **Finish** to close the wizard. ## Related topics @@ -95,9 +97,9 @@ Do not install the MED-V client using the Windows **runas** command. [Installation and Upgrade Checklists](installation-and-upgrade-checklists.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-install-med-v-clientdeployment-package.md b/mdop/medv-v1/how-to-install-med-v-clientdeployment-package.md index bbdb89fcdd..90bf368d23 100644 --- a/mdop/medv-v1/how-to-install-med-v-clientdeployment-package.md +++ b/mdop/medv-v1/how-to-install-med-v-clientdeployment-package.md @@ -19,10 +19,10 @@ ms.date: 06/16/2016 In a deployment package-based scenario, the MED-V client installation is included in the deployment package and installed directly from the package. -**Important**   +**Important** When using a deployment package that does not include an image, ensure that the image is uploaded to the Web or pushed to the pre-stage folder prior to installing the deployment package. -  + **To install a deployment package** @@ -36,27 +36,29 @@ When using a deployment package that does not include an image, ensure that the A dialog box appears listing the components that are already installed and those that are currently being installed. - **Note**   + **Note** If a version of the Microsoft Virtual PC that is not supported exists on the host computer, a message will appear telling you to uninstall the existing version and run the installer again. -   - **Note**   - If an older version of the MED-V client exists, it will prompt you asking whether you want to upgrade. -   +~~~ +**Note** +If an older version of the MED-V client exists, it will prompt you asking whether you want to upgrade. - Depending on the components that have been installed, you might need to reboot. If rebooting is necessary, a message appears notifying you that you must reboot. -3. If necessary, reboot the computer. - When the installation is complete, MED-V starts and a message appears notifying you that the installation is complete. +Depending on the components that have been installed, you might need to reboot. If rebooting is necessary, a message appears notifying you that you must reboot. +~~~ -4. Log in to MED-V using the following user name and password: +3. If necessary, reboot the computer. - - Type in the domain name and user name followed by the password of the domain user who is permitted to work with MED-V. + When the installation is complete, MED-V starts and a message appears notifying you that the installation is complete. - Example: "domain\_name\\user\_name", "password" +4. Log in to MED-V using the following user name and password: + + - Type in the domain name and user name followed by the password of the domain user who is permitted to work with MED-V. + + Example: "domain\_name\\user\_name", "password" ## Related topics @@ -67,9 +69,9 @@ When using a deployment package that does not include an image, ensure that the [Client Installation Command Line Reference](client-installation-command-line-reference.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-localize-a-med-v-image.md b/mdop/medv-v1/how-to-localize-a-med-v-image.md index 452c21687b..e118ce3dc9 100644 --- a/mdop/medv-v1/how-to-localize-a-med-v-image.md +++ b/mdop/medv-v1/how-to-localize-a-med-v-image.md @@ -46,7 +46,7 @@ A packed image can be unpacked to the local repository by extracting it. It then **Note**   The downloaded image will not appear in the **Local Images** pane until you refresh the page. Click Refresh to see the downloaded image in the **Local Images** pane. -   + ## Related topics @@ -57,9 +57,9 @@ A packed image can be unpacked to the local repository by extracting it. It then [How to Upload a MED-V Image to the Server](how-to-upload-a-med-v-image-to-the-server.md) -  + -  + diff --git a/mdop/medv-v1/how-to-pack-a-med-v-image.md b/mdop/medv-v1/how-to-pack-a-med-v-image.md index e446fa6ccb..613b801c36 100644 --- a/mdop/medv-v1/how-to-pack-a-med-v-image.md +++ b/mdop/medv-v1/how-to-pack-a-med-v-image.md @@ -35,25 +35,27 @@ A MED-V image must be packed before it can be added to a deployment package or u - In the **Image name** field, type the desired name. - **Note**   + **Note** The following characters cannot be included in the image name: space " < > | \\ / : \* ? -   - A new packed image will be created. - - From the drop-down list, select an existing name. +~~~ + A new packed image will be created. - A new version of the existing image will be created. +- From the drop-down list, select an existing name. -5. Click **OK**. + A new version of the existing image will be created. +~~~ - A new MED-V packed image is created on your host computer with the properties defined in the following table. +5. Click **OK**. -**Note**   + A new MED-V packed image is created on your host computer with the properties defined in the following table. + +**Note** In the **Local Packed Images** and **Packed Images on Server** panes, the most recent version of each image is displayed as the parent node. Click the parent node to view all other existing versions of the image. -  + **Local Packed Images Properties** @@ -77,11 +79,10 @@ In the **Local Packed Images** and **Packed Images on Server** panes, the most r

    Version

    The version of the displayed image.

    -Note   -

    All previous versions are kept unless deleted.

    +Note

    All previous versions are kept unless deleted.

    -  +
    @@ -95,7 +96,7 @@ In the **Local Packed Images** and **Packed Images on Server** panes, the most r -  + ## Related topics @@ -106,9 +107,9 @@ In the **Local Packed Images** and **Packed Images on Server** panes, the most r [Creating a Virtual PC Image for MED-V](creating-a-virtual-pc-image-for-med-v.md) -  - -  + + + diff --git a/mdop/medv-v1/how-to-set-up-script-actions.md b/mdop/medv-v1/how-to-set-up-script-actions.md index db8d6d9518..674cc2b942 100644 --- a/mdop/medv-v1/how-to-set-up-script-actions.md +++ b/mdop/medv-v1/how-to-set-up-script-actions.md @@ -47,26 +47,28 @@ The following is a list of actions that can be added to the domain setup script: **Note**   **Rename Computer** is configured in the **VM Settings** tab. For more information, see [How to Configure VM Computer Name Pattern Properties](how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md). -   + - **Note**   - To rename a computer, Windows must be restarted. It is recommended to add a Restart Windows action following a Rename Computer action. +~~~ +**Note** +To rename a computer, Windows must be restarted. It is recommended to add a Restart Windows action following a Rename Computer action. +~~~ -   -4. Set the order of the actions by selecting an action and clicking **Up** or **Down**. -5. Click **OK**. +4. Set the order of the actions by selecting an action and clicking **Up** or **Down**. -**Note**   +5. Click **OK**. + +**Note** When running the Join Domain script, for the script to work, the user logged into the MED-V workspace virtual machine must have local administrator rights. -  -**Note**   + +**Note** When running the Disable Auto-Logon script, it is recommended to disable the local guest account used for the auto-logon once the initial setup is complete. -  + ### @@ -92,11 +94,10 @@ When running the Disable Auto-Logon script, it is recommended to disable the loc
  • Use the following credentials—The credentials specified; enter a user name and password in the corresponding fields.

  • -Note   -

    The credentials you enter are visible to all MED-V workspace users. It is not recommended to provide domain administrator credentials.

    +Note

    The credentials you enter are visible to all MED-V workspace users. It is not recommended to provide domain administrator credentials.

    -  +
    @@ -112,17 +113,16 @@ When running the Disable Auto-Logon script, it is recommended to disable the loc

    Organization Unit

    An organization unit (OU) may be specified to join the computer to a specific OU. The format must follow an OU distinguished name: OU=<Organization Unit>,<Domain Controller> (for example, OU=QATest, DC=il, DC=MED-V, DC=com).

    -Warning   -

    Only a single level OU is supported as is shown in the example above.

    +Warning

    Only a single level OU is supported as is shown in the example above.

    -  +
    -  + ### @@ -155,7 +155,7 @@ When running the Disable Auto-Logon script, it is recommended to disable the loc -  + ### @@ -214,7 +214,7 @@ When running the Disable Auto-Logon script, it is recommended to disable the loc -  + When configuring the command-line action, several variables can be used as defined in the following table. @@ -255,7 +255,7 @@ When configuring the command-line action, several variables can be used as defin -  + ## Related topics @@ -264,9 +264,9 @@ When configuring the command-line action, several variables can be used as defin [How to Configure VM Computer Name Pattern Properties](how-to-configure-vm-computer-name-pattern-propertiesmedvv2.md) -  + -  + diff --git a/mdop/medv-v1/how-to-share-folders-between-the-host-and-the-med-v-workspace.md b/mdop/medv-v1/how-to-share-folders-between-the-host-and-the-med-v-workspace.md index 0ea8170a94..d1d0b3b653 100644 --- a/mdop/medv-v1/how-to-share-folders-between-the-host-and-the-med-v-workspace.md +++ b/mdop/medv-v1/how-to-share-folders-between-the-host-and-the-med-v-workspace.md @@ -42,7 +42,7 @@ The following procedures demonstrate how to share folders between the host and t **Note**   Ensure that the same drive letter is not in use on both computers. -   + 4. Click **Browse**. @@ -63,11 +63,11 @@ The following procedures demonstrate how to share folders between the host and t **Note**   Ensure that both the host and MED-V workspace computers are in the same domain or workgroup. -  + -  + -  + diff --git a/mdop/medv-v1/how-to-start-and-exit-the-med-v-client.md b/mdop/medv-v1/how-to-start-and-exit-the-med-v-client.md index 1b394ef39a..bd490a205c 100644 --- a/mdop/medv-v1/how-to-start-and-exit-the-med-v-client.md +++ b/mdop/medv-v1/how-to-start-and-exit-the-med-v-client.md @@ -27,7 +27,7 @@ ms.date: 06/16/2016 **Note**   MED-V cannot be started from an elevated command prompt. -  + **To exit the MED-V client** @@ -37,9 +37,9 @@ MED-V cannot be started from an elevated command prompt. The MED-V client exits. -  + -  + diff --git a/mdop/medv-v1/how-to-start-stop-and-restart-a-med-v-workspace.md b/mdop/medv-v1/how-to-start-stop-and-restart-a-med-v-workspace.md index aaa0dc074a..20febc9c9a 100644 --- a/mdop/medv-v1/how-to-start-stop-and-restart-a-med-v-workspace.md +++ b/mdop/medv-v1/how-to-start-stop-and-restart-a-med-v-workspace.md @@ -44,14 +44,14 @@ ms.date: 06/16/2016 **Note**   The first time a MED-V workspace is started, the user name should be in the following format: <domain name>\\<user name>. -   + 4. Select **Save my password** to save your password between sessions. **Note**   To enable the save password feature, the EnableSavePassword attribute must be set to True in the ClientSettings.xml file. The file can be found in the *Servers\\Configuration Server\\* folder. -   + 5. Clear the **Start last used workspace** check box to choose a different MED-V workspace. @@ -86,9 +86,9 @@ ms.date: 06/16/2016 [How to Start and Exit the MED-V Client](how-to-start-and-exit-the-med-v-client.md) -  + -  + diff --git a/mdop/medv-v1/how-to-update-a-med-v-image.md b/mdop/medv-v1/how-to-update-a-med-v-image.md index 6492dc3a41..bee3310208 100644 --- a/mdop/medv-v1/how-to-update-a-med-v-image.md +++ b/mdop/medv-v1/how-to-update-a-med-v-image.md @@ -25,7 +25,7 @@ An existing MED-V image can be updated, thereby creating a new version of the im **Note**   When a new version is deployed on the client, it overwrites the existing image. When updating an image, ensure that no data on the client needs to be saved. -  + **To update a MED-V image** @@ -42,7 +42,7 @@ When a new version is deployed on the client, it overwrites the existing image. **Note**   If you name the image a different name than the existing version, a new image will be created rather than a new version of the existing image. -   + 6. Upload the new version to the server or distribute it via a deployment package. @@ -59,9 +59,9 @@ When a new version is deployed on the client, it overwrites the existing image. [Updating a MED-V Workspace Image](updating-a-med-v-workspace-image.md) -  + -  + diff --git a/mdop/medv-v1/how-to-upload-a-med-v-image-to-the-server.md b/mdop/medv-v1/how-to-upload-a-med-v-image-to-the-server.md index 37eed69b48..b0f1a3f4b5 100644 --- a/mdop/medv-v1/how-to-upload-a-med-v-image-to-the-server.md +++ b/mdop/medv-v1/how-to-upload-a-med-v-image-to-the-server.md @@ -21,10 +21,10 @@ After a MED-V image has been tested, it can be packed and then uploaded to the s Once a MED-V image is packed and uploaded to the server, it can be distributed to users by using an enterprise software distribution center, or it can be downloaded by users using a deployment package. For information on deployment using an enterprise software distribution center, see [Deploying a MED-V Workspace Using an Enterprise Software Distribution System](deploying-a-med-v-workspace-using-an-enterprise-software-distribution-system.md). For information on deployment using a package, see [Deploying a MED-V Workspace Using a Deployment Package](deploying-a-med-v-workspace-using-a-deployment-package.md). -**Note**   +**Note** Before uploading an image, verify that a Web proxy is not defined in your browser settings and that Windows Update is not currently running. -  + **To upload a MED-V image to the server** @@ -58,11 +58,10 @@ Before uploading an image, verify that a Web proxy is not defined in your browse

    Version

    The version of the displayed image.

    -Note   -

    All previous versions are kept unless deleted.

    +Note

    All previous versions are kept unless deleted.

    -  +
    @@ -76,7 +75,7 @@ Before uploading an image, verify that a Web proxy is not defined in your browse -  + ## Related topics @@ -89,9 +88,9 @@ Before uploading an image, verify that a Web proxy is not defined in your browse [How to Pack a MED-V Image](how-to-pack-a-med-v-image.md) -  - -  + + + diff --git a/mdop/medv-v1/med-v-10-installation-checklist.md b/mdop/medv-v1/med-v-10-installation-checklist.md index 3796421602..8e68457769 100644 --- a/mdop/medv-v1/med-v-10-installation-checklist.md +++ b/mdop/medv-v1/med-v-10-installation-checklist.md @@ -33,36 +33,36 @@ The following checklist is intended to provide a high-level list of items to con

    Ensure your computing environment meets the supported configurations required for installing MED-V 1.0.

    -

    [MED-V 1.0 Supported Configurations](med-v-10-supported-configurationsmedv-10.md)

    +

    MED-V 1.0 Supported Configurations

    Plan and design the MED-V server infrastructure.

    -

    [MED-V Infrastructure Planning and Design](med-v-infrastructure-planning-and-design.md)

    +

    MED-V Infrastructure Planning and Design

    Verify the required prerequisites are configured.

    -

    [MED-V Installation Prerequisites](med-v-installation-prerequisites.md)

    +

    MED-V Installation Prerequisites

    Install and configure the MED-V server.

    -

    [How to Install and Configure the MED-V Server Component](how-to-install-and-configure-the-med-v-server-component.md)

    +

    How to Install and Configure the MED-V Server Component

    If using an image repository, configure the image Web distribution server.

    -

    [How to Configure the Image Web Distribution Server](how-to-configure-the-image-web-distribution-server.md)

    +

    How to Configure the Image Web Distribution Server

    Install the MED-V client and management console.

    -

    [How to Install MED-V Client and MED-V Management Console](how-to-install-med-v-client-and-med-v-management-console.md)

    +

    How to Install MED-V Client and MED-V Management Console

    -  + -  + -  + diff --git a/mdop/medv-v1/med-v-10-sp1-and-sp2-release-notesmedv-10-sp1.md b/mdop/medv-v1/med-v-10-sp1-and-sp2-release-notesmedv-10-sp1.md index ac47f58122..a439dfd41e 100644 --- a/mdop/medv-v1/med-v-10-sp1-and-sp2-release-notesmedv-10-sp1.md +++ b/mdop/medv-v1/med-v-10-sp1-and-sp2-release-notesmedv-10-sp1.md @@ -22,7 +22,7 @@ To search these Release Notes, press CTRL+F. **Note**   Read these Release Notes thoroughly before you install the Microsoft Enterprise Desktop Virtualization (MED-V) platform. These Release Notes contain information that you must have to successfully install the MED-V platform. This document contains information that is not available in the product documentation. If there is a discrepancy between these Release Notes and other MED-V platform documentation, the latest change should be considered authoritative. These Release Notes supersede the content included with this product. -  + ## About the Product Documentation @@ -71,9 +71,9 @@ Microsoft, Microsoft Enterprise Desktop Virtualization, MS-DOS, Windows, Windows The names of actual companies and products mentioned herein may be the trademarks of their respective owners. -  + -  + diff --git a/mdop/medv-v1/med-v-10-sp1-supported-configurationsmedv-10-sp1.md b/mdop/medv-v1/med-v-10-sp1-supported-configurationsmedv-10-sp1.md index 940e6fded9..60cd668d0c 100644 --- a/mdop/medv-v1/med-v-10-sp1-supported-configurationsmedv-10-sp1.md +++ b/mdop/medv-v1/med-v-10-sp1-supported-configurationsmedv-10-sp1.md @@ -17,19 +17,19 @@ ms.date: 08/30/2016 # MED-V 1.0 SP1 Supported Configurations -This topic specifies the requirements necessary to install and run Microsoft Enterprise Desktop Virtualization (MED-V) 1.0 Service Pack 1 (SP1) in your environment. +This topic specifies the requirements necessary to install and run Microsoft Enterprise Desktop Virtualization (MED-V) 1.0 Service Pack 1 (SP1) in your environment. -## MED-V 1.0 SP1 Client System Requirements +## MED-V 1.0 SP1 Client System Requirements ### MED-V Client Operating System Requirements -The following table lists the operating systems that are supported for MED-V 1.0 SP1 client installation. +The following table lists the operating systems that are supported for MED-V 1.0 SP1 client installation. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/?LinkId=31975) (https://go.microsoft.com/fwlink/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/?LinkId=31976) (https://go.microsoft.com/fwlink/?LinkId=31976). -  + @@ -48,19 +48,19 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + - + @@ -68,14 +68,14 @@ Microsoft provides support for the current service pack and, in some cases, the

    Windows XP

    Windows XP

    Professional Edition

    SP2 or SP3

    x86

    Windows Vista

    Windows Vista

    Business, Enterprise, or Ultimate

    SP1 or SP2

    x86

    Windows 7

    Windows 7

    Professional, Enterprise, or Ultimate

    None

    x86 or x64

    -  -**Note**   + +**Note** MED-V client does not run in native x64 mode. Instead, MED-V runs in Windows on Windows 64-bit (WOW64) mode on 64-bit computers. -  -The following table lists the minimal RAM required for each operating system supported in MED-V 1.0 SP1. + +The following table lists the minimal RAM required for each operating system supported in MED-V 1.0 SP1. @@ -90,41 +90,41 @@ The following table lists the minimal RAM required for each operating system sup - + - + - + - +

    Windows XP Professional

    Windows XP Professional

    1 GB

    Windows Vista

    Windows Vista

    2 GB

    Windows 7 x86

    Windows 7 x86

    2 GB

    Windows 7 x64

    Windows 7 x64

    3 GB

    -  -### MED-V 1.0 SP1 Client Configuration + +### MED-V 1.0 SP1 Client Configuration **.NET Framework Version** -The following versions of the Microsoft .NET Framework are supported for MED-V 1.0 SP1 client installation: +The following versions of the Microsoft .NET Framework are supported for MED-V 1.0 SP1 client installation: -- .NET Framework 2.0 or .NET Framework 2.0 SP1 +- .NET Framework 2.0 or .NET Framework 2.0 SP1 -- .NET Framework 3.0 or .NET Framework 3.0 SP1 +- .NET Framework 3.0 or .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 **Virtualization Engine** -Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Knowledge Base article 974918 is supported for MED-V 1.0 SP1 client installation in the following configurations: +Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Knowledge Base article 974918 is supported for MED-V 1.0 SP1 client installation in the following configurations: - Static Virtual Hard Disk (VHD) file @@ -134,25 +134,25 @@ Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Kn **Internet Browser** -Windows Internet Explorer 7 and Windows Internet Explorer 8 are supported for MED-V 1.0 SP1 client installation. +Windows Internet Explorer 7 and Windows Internet Explorer 8 are supported for MED-V 1.0 SP1 client installation. **Microsoft Hyper-V Server** The MED-V client is not supported in a Microsoft Hyper-V Server environment. -## MED-V 1.0 SP1 Workspace System Requirements +## MED-V 1.0 SP1 Workspace System Requirements -MED-V 1.0 SP1 introduces changes to system requirements from those for MED-V 1.0. +MED-V 1.0 SP1 introduces changes to system requirements from those for MED-V 1.0. ### MED-V Workspace Operating System Requirements -The following table lists the operating systems supported for MED-V 1.0 SP1 workspaces. +The following table lists the operating systems supported for MED-V 1.0 SP1 workspaces. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/?LinkId=31975) (https://go.microsoft.com/fwlink/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/?LinkId=31976) (https://go.microsoft.com/fwlink/?LinkId=31976). -  + @@ -171,67 +171,66 @@ Microsoft provides support for the current service pack and, in some cases, the - + - +

    Windows 2000

    Windows 2000

    Professional

    SP4

    X86

    Windows XP

    Windows XP

    Professional Edition

    SP2 or SP3

    -Note   -

    SP3 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V.

    +Note

    SP3 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V.

    -  +

    x86

    -  -### MED-V 1.0 SP1 Workspace Configuration + +### MED-V 1.0 SP1 Workspace Configuration **.NET Framework Version** -MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 SP1 workspace installation: +MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 SP1 workspace installation: -- .NET Framework 2.0 SP1 +- .NET Framework 2.0 SP1 -- .NET Framework 3.0 SP1 +- .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 + +**Note** +We recommend the .NET Framework 3.5 SP1 to ensure that the MED-V workspace is compatible with future versions of MED-V. -**Note**   -We recommend the .NET Framework 3.5 SP1 to ensure that the MED-V workspace is compatible with future versions of MED-V. -  **Internet Browser** -Windows Internet Explorer 6 SP2 and Windows Internet Explorer 7 are supported for the MED-V 1.0 SP1 workspace installation. +Windows Internet Explorer 6 SP2 and Windows Internet Explorer 7 are supported for the MED-V 1.0 SP1 workspace installation. ### MED-V Workspace Images -MED-V workspace images must be created by using Virtual PC 2007 SP1. +MED-V workspace images must be created by using Virtual PC 2007 SP1. -## MED-V 1.0 SP1 Server System Requirements +## MED-V 1.0 SP1 Server System Requirements -MED-V 1.0 SP1 introduces changes to system requirements from those for MED-V 1.0. +MED-V 1.0 SP1 introduces changes to system requirements from those for MED-V 1.0. -### MED-V 1.0 Server Operating System Requirements +### MED-V 1.0 Server Operating System Requirements -The following table lists the operating systems supported for MED-V 1.0 SP1 server installations. +The following table lists the operating systems supported for MED-V 1.0 SP1 server installations. -**Note**   +**Note** Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/?LinkId=31975) (https://go.microsoft.com/fwlink/?LinkId=31975). For additional information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/?LinkId=31976) (https://go.microsoft.com/fwlink/?LinkId=31976). -  + @@ -250,13 +249,13 @@ Microsoft provides support for the current service pack and, in some cases, the - + - + @@ -264,23 +263,23 @@ Microsoft provides support for the current service pack and, in some cases, the

    Windows Server 2008

    Windows Server 2008

    Standard or Enterprise

    SP1 or SP2

    X86 or x64

    Windows Server 2008 R2

    Windows Server 2008 R2

    Standard or Enterprise

    None

    x64

    -  -### MED-V 1.0 SP1 Server Configuration + +### MED-V 1.0 SP1 Server Configuration **.NET Framework Version** -MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 SP1 workspace installation: +MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 SP1 workspace installation: -- .NET Framework 2.0 or .NET Framework 2.0 SP1 +- .NET Framework 2.0 or .NET Framework 2.0 SP1 -- .NET Framework 3.0 or .NET Framework 3.0 SP1 +- .NET Framework 3.0 or .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 **Microsoft SQL Server Version** -The following versions of Microsoft SQL Server are supported for MED-V 1.0 SP1 when SQL Server is installed locally or remotely from the MED-V 1.0 SP1 Server: +The following versions of Microsoft SQL Server are supported for MED-V 1.0 SP1 when SQL Server is installed locally or remotely from the MED-V 1.0 SP1 Server: @@ -299,13 +298,13 @@ The following versions of Microsoft SQL Server are supported for MED-V 1.0 SP1 w - + - + @@ -313,16 +312,16 @@ The following versions of Microsoft SQL Server are supported for MED-V 1.0 SP1 w

    SQL Server 2005

    SQL Server 2005

    Express, Standard, or Enterprise Edition

    SP2

    X86 or x64

    SQL Server 2008

    SQL Server 2008

    Express, Standard, or Enterprise

    None

    X86 or x64

    -  + **Microsoft Hyper-V Server** The MED-V server is supported in a Microsoft Hyper-V server environment. -## MED-V 1.0 SP1 Globalization Information +## MED-V 1.0 SP1 Globalization Information -Although MED-V is not released in languages other than English, the following Windows operating system language versions are supported for the MED-V 1.0 SP1 client, workspace, and server installations: +Although MED-V is not released in languages other than English, the following Windows operating system language versions are supported for the MED-V 1.0 SP1 client, workspace, and server installations: - English @@ -340,9 +339,9 @@ Although MED-V is not released in languages other than English, the following Wi - Japanese -  - -  + + + diff --git a/mdop/medv-v1/med-v-10-sp1-upgrade-checklistmedv-10-sp1.md b/mdop/medv-v1/med-v-10-sp1-upgrade-checklistmedv-10-sp1.md index fb5c563f8e..631070c928 100644 --- a/mdop/medv-v1/med-v-10-sp1-upgrade-checklistmedv-10-sp1.md +++ b/mdop/medv-v1/med-v-10-sp1-upgrade-checklistmedv-10-sp1.md @@ -45,16 +45,16 @@ To upgrade Microsoft Enterprise Desktop Virtualization (MED-V) 1.0 to MED-V 1. **Note**   If the server configuration has been changed from the default, the files might be stored in a different location. -  + ## Client Upgrade To upgrade the MED-V 1.0 client to MED-V 1.0 SP1, install the .msp file on a MED-V 1.0 client. The client and MED-V are automatically upgraded. -  + -  + diff --git a/mdop/medv-v1/med-v-10-supported-configurationsmedv-10.md b/mdop/medv-v1/med-v-10-supported-configurationsmedv-10.md index bc19759fa7..3d45628fd0 100644 --- a/mdop/medv-v1/med-v-10-supported-configurationsmedv-10.md +++ b/mdop/medv-v1/med-v-10-supported-configurationsmedv-10.md @@ -17,14 +17,14 @@ ms.date: 06/16/2016 # MED-V 1.0 Supported Configurations -This topic specifies the requirements necessary to install and run Microsoft Enterprise Desktop Virtualization (MED-V) 1.0 in your environment. +This topic specifies the requirements necessary to install and run Microsoft Enterprise Desktop Virtualization (MED-V) 1.0 in your environment. -## MED-V 1.0 Client System Requirements +## MED-V 1.0 Client System Requirements ### MED-V Client Operating System Requirements -The following table lists the operating systems that are supported for MED-V 1.0 client installation. +The following table lists the operating systems that are supported for MED-V 1.0 client installation. @@ -43,13 +43,13 @@ The following table lists the operating systems that are supported for MED-V 1. - + - + @@ -57,28 +57,28 @@ The following table lists the operating systems that are supported for MED-V 1.

    Windows XP

    Windows XP

    Professional Edition

    SP2 or SP3

    x86

    Windows Vista

    Windows Vista

    Business, Enterprise, or Ultimate Edition

    SP1 or SP2

    x86

    -  -**Note**   + +**Note** MED-V client does not run in native x64 mode. Instead, MED-V runs in Windows on Windows 64-bit (WOW64) mode on 64-bit computers. -  -### MED-V 1.0 Client Configuration + +### MED-V 1.0 Client Configuration **.NET Framework Version** -The following versions of the Microsoft .NET Framework are supported for MED-V 1.0 client installation: +The following versions of the Microsoft .NET Framework are supported for MED-V 1.0 client installation: -- .NET Framework 2.0 or .NET Framework 2.0 SP1 +- .NET Framework 2.0 or .NET Framework 2.0 SP1 -- .NET Framework 3.0 or .NET Framework 3.0 SP1 +- .NET Framework 3.0 or .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 **Virtualization Engine** -Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Knowledge Base article 974918 is supported for MED-V 1.0 client installation in the following configurations: +Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Knowledge Base article 974918 is supported for MED-V 1.0 client installation in the following configurations: - Static Virtual Hard Disk (VHD) file @@ -88,18 +88,18 @@ Microsoft Virtual PC 2007 SP1 with the hotfix that is described in Microsoft Kn **Internet Browser** -Windows Internet Explorer 7 and Windows Internet Explorer 8 are supported for MED-V 1.0 client installation. +Windows Internet Explorer 7 and Windows Internet Explorer 8 are supported for MED-V 1.0 client installation. **Microsoft Hyper-V Server** The MED-V client is not supported in a Microsoft Hyper-V server environment. -## MED-V 1.0 Workspace System Requirements +## MED-V 1.0 Workspace System Requirements ### MED-V Workspace Operating System Requirements -The following table lists the operating systems supported for MED-V 1.0 workspaces. +The following table lists the operating systems supported for MED-V 1.0 workspaces. @@ -118,60 +118,59 @@ The following table lists the operating systems supported for MED-V 1.0 workspa - + - +

    Windows 2000

    Windows 2000

    Professional

    SP4

    X86

    Windows XP

    Windows XP

    Professional Edition

    SP2 or SP3

    -Note   -

    SP3 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V.

    +Note

    SP3 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V.

    -  +

    x86

    -  -### MED-V 1.0 Workspace Configuration + +### MED-V 1.0 Workspace Configuration **.NET Framework Version** -MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 workspace installation: +MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 workspace installation: -- .NET Framework 2.0 SP1 +- .NET Framework 2.0 SP1 -- .NET Framework 3.0 SP1 +- .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 + +**Note** +.NET Framework 3.5 SP1 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V. -**Note**   -.NET Framework 3.5 SP1 is recommended to ensure that the MED-V workspace will be compatible with future versions of MED-V. -  **Internet Browser** -Windows Internet Explorer 6 SP2 and Windows Internet Explorer 7 are supported for the MED-V 1.0 workspace installation. +Windows Internet Explorer 6 SP2 and Windows Internet Explorer 7 are supported for the MED-V 1.0 workspace installation. ### MED-V Workspace Images -MED-V workspace images must be created by using Virtual PC 2007 SP1. +MED-V workspace images must be created by using Virtual PC 2007 SP1. -## MED-V 1.0 Server System Requirements +## MED-V 1.0 Server System Requirements -### MED-V 1.0 Server Operating System Requirements +### MED-V 1.0 Server Operating System Requirements -The following table lists the operating systems supported for MED-V 1.0 server installations. +The following table lists the operating systems supported for MED-V 1.0 server installations. @@ -190,7 +189,7 @@ The following table lists the operating systems supported for MED-V 1.0 server - + @@ -198,23 +197,23 @@ The following table lists the operating systems supported for MED-V 1.0 server

    Windows Server 2008

    Windows Server 2008

    Standard or Enterprise

    None

    X86 or x64

    -  -### MED-V 1.0 Server Configuration + +### MED-V 1.0 Server Configuration **.NET Framework Version** -MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 workspace installation: +MED-V requires one of the following supported versions of the Microsoft .NET Framework for MED-V 1.0 workspace installation: -- .NET Framework 2.0 or .NET Framework 2.0 SP1 +- .NET Framework 2.0 or .NET Framework 2.0 SP1 -- .NET Framework 3.0 or .NET Framework 3.0 SP1 +- .NET Framework 3.0 or .NET Framework 3.0 SP1 -- .NET Framework 3.5 or .NET Framework 3.5 SP1 +- .NET Framework 3.5 or .NET Framework 3.5 SP1 **Microsoft SQL Server Version** -The following versions of Microsoft SQL Server are supported for MED-V 1.0 when SQL Server is installed locally or remotely from the MED-V 1.0 Server: +The following versions of Microsoft SQL Server are supported for MED-V 1.0 when SQL Server is installed locally or remotely from the MED-V 1.0 Server: @@ -233,13 +232,13 @@ The following versions of Microsoft SQL Server are supported for MED-V 1.0 when - + - + @@ -247,16 +246,16 @@ The following versions of Microsoft SQL Server are supported for MED-V 1.0 when

    SQL Server 2005

    SQL Server 2005

    Express, Standard, or Enterprise Edition

    SP2

    X86 or x64

    SQL Server 2008

    SQL Server 2008

    Express, Standard, or Enterprise

    None

    X86 or x64

    -  + **Microsoft Hyper-V Server** The MED-V server is supported in a Microsoft Hyper-V server environment. -## MED-V 1.0 Globalization Information +## MED-V 1.0 Globalization Information -Although MED-V is not released in languages other than English, the following Windows operating system language versions are supported for the MED-V 1.0 client, workspace, and server installations: +Although MED-V is not released in languages other than English, the following Windows operating system language versions are supported for the MED-V 1.0 client, workspace, and server installations: - English @@ -270,9 +269,9 @@ Although MED-V is not released in languages other than English, the following Wi - Portuguese (Brazil) -  - -  + + + diff --git a/mdop/medv-v1/med-v-client-toolsv2.md b/mdop/medv-v1/med-v-client-toolsv2.md index 51c162b3a6..8d763f41b6 100644 --- a/mdop/medv-v1/med-v-client-toolsv2.md +++ b/mdop/medv-v1/med-v-client-toolsv2.md @@ -33,7 +33,7 @@ The File Transfer Tool can be used to copy files or folders from the MED-V works **Note**   The File Transfer Tool is enabled only when the MED-V workspace is running. -  + **To copy files or folders from a MED-V workspace that is currently running** @@ -101,9 +101,9 @@ The following functions can be performed using the diagnostic tool: - Browse image store—View all available MED-V workspace images. -  + -  + diff --git a/mdop/medv-v1/med-v-installation-prerequisites.md b/mdop/medv-v1/med-v-installation-prerequisites.md index 45d5a37090..ef53525088 100644 --- a/mdop/medv-v1/med-v-installation-prerequisites.md +++ b/mdop/medv-v1/med-v-installation-prerequisites.md @@ -94,7 +94,7 @@ To prevent antivirus activity from affecting the performance of the virtual desk **Important**   If Virtual PC for Windows exists on the host computer, uninstall it before installing Virtual PC 2007 SP1. -  + **To install Microsoft Virtual PC 2007 SP1** @@ -109,16 +109,16 @@ If Virtual PC for Windows exists on the host computer, uninstall it before insta **Note**   The Virtual PC 2007 SP1 update is required for running Virtual PC 2007 SP1. -   + ## Related topics [Supported Configurations](supported-configurationsmedv-orientation.md) -  + -  + diff --git a/mdop/medv-v1/updating-a-med-v-workspace-image.md b/mdop/medv-v1/updating-a-med-v-workspace-image.md index 074c82d135..f5095643c7 100644 --- a/mdop/medv-v1/updating-a-med-v-workspace-image.md +++ b/mdop/medv-v1/updating-a-med-v-workspace-image.md @@ -67,7 +67,7 @@ An image can be updated in one of the following ways: **Note**   If you name the image a different name than the existing version, a new image will be created rather than a new version of the existing image. -   + 6. Upload the new version to the server, push it to the image pre-stage folder, or distribute it via a deployment package. @@ -82,9 +82,9 @@ An image can be updated in one of the following ways: [How to Configure the Image Web Distribution Server](how-to-configure-the-image-web-distribution-server.md) -  + -  + diff --git a/mdop/medv-v1/using-the-med-v-management-console-user-interface.md b/mdop/medv-v1/using-the-med-v-management-console-user-interface.md index cbb1601115..9fc4f72eb1 100644 --- a/mdop/medv-v1/using-the-med-v-management-console-user-interface.md +++ b/mdop/medv-v1/using-the-med-v-management-console-user-interface.md @@ -45,7 +45,7 @@ The console user interface is divided into the following sections: **Note**   For security reasons, the first user to log in to the MED-V management console will become the only user on that computer allowed to access the management console. -  + **To log in** @@ -56,7 +56,7 @@ For security reasons, the first user to log in to the MED-V management console w **Note**   When configuring the server, users with full access as well as users with read-only access are defined. All users must be domain users. The domain user name and password is used for MED-V management login. -   + 2. Click **OK**. @@ -67,9 +67,9 @@ For security reasons, the first user to log in to the MED-V management console w [How to Install MED-V Client and MED-V Management Console](how-to-install-med-v-client-and-med-v-management-console.md) -  + -  + diff --git a/mdop/medv-v2/authentication-of-med-v-end-users.md b/mdop/medv-v2/authentication-of-med-v-end-users.md index c2791dd704..b9265d581c 100644 --- a/mdop/medv-v2/authentication-of-med-v-end-users.md +++ b/mdop/medv-v2/authentication-of-med-v-end-users.md @@ -52,10 +52,10 @@ Following is the policy path for the Terminal Services policy named DisablePassw HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Virtual Machine\\Policies\\DisablePasswordSaving -**Note**   +**Note** The changes that you make to DisablePasswordSaving only affect the RDP prompt to a virtual machine. -  + The following table lists the different ways you can configure your settings for credential storing and the effects of the different configurations: @@ -84,35 +84,33 @@ The following table lists the different ways you can configure your settings for

    If the end user does not select the check box, the Remote Desktop Connection (RDC) Client prompt is presented instead of the MED-V prompt, and the check box to accept is cleared. If the end user selects the check box, the RDC Client credential is stored for later use.

    -Important   -

    RDC does not validate credentials when the end user enters them. If the end user caches the credentials through the RDC prompt, there is a risk that incorrect credentials might be stored. In this case, the incorrect credentials must be deleted in the Windows Credential Manager.

    +Important

    RDC does not validate credentials when the end user enters them. If the end user caches the credentials through the RDC prompt, there is a risk that incorrect credentials might be stored. In this case, the incorrect credentials must be deleted in the Windows Credential Manager.

    -  +

    DisablePasswordSaving

    Enabled

    -Note   -

    This configuration is more secure because it does not allow end user credentials to be cached.

    +Note

    This configuration is more secure because it does not allow end user credentials to be cached.

    -  +
    -  + By default, the MED-V installation sets a registry key in the guest to suppress the "password about to expire" prompt. The end user is only prompted for a password change on the host. Credentials that are updated on the host are passed to the guest. -**Caution**   +**Caution** If you use Group Policy in your environment, know that it can override the registry key causing the password prompts from the guest to reappear. -  + ### Security Concerns with Authentication @@ -127,9 +125,9 @@ This same concern exists when MED-V authentication is disabled but the Terminal [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md) -  - -  + + + diff --git a/mdop/medv-v2/compacting-the-med-v-virtual-hard-disk.md b/mdop/medv-v2/compacting-the-med-v-virtual-hard-disk.md index 1af4acc751..42d933514a 100644 --- a/mdop/medv-v2/compacting-the-med-v-virtual-hard-disk.md +++ b/mdop/medv-v2/compacting-the-med-v-virtual-hard-disk.md @@ -22,7 +22,7 @@ Although it is optional, you can compact the virtual hard disk (VHD) to reclaim **Important**   Before you proceed, create a backup copy of your Windows XP image. -  + **Preparing the Virtual Hard Disk** @@ -113,9 +113,9 @@ Create a backup copy of your compacted virtual hard disk. [Technical Reference for MED-V](technical-reference-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/configure-environment-prerequisites.md b/mdop/medv-v2/configure-environment-prerequisites.md index da1b3c6237..23fec1d335 100644 --- a/mdop/medv-v2/configure-environment-prerequisites.md +++ b/mdop/medv-v2/configure-environment-prerequisites.md @@ -34,12 +34,12 @@ The MED-V Host and Guest agents and the MED-V Workspace Packager require the Mic **Important**   You must also install the update [KB959209](https://go.microsoft.com/fwlink/?LinkId=204950) (https://go.microsoft.com/fwlink/?LinkId=204950), which addresses several known application compatibility issues. -  + **Note**   You must manually install the .NET Framework 3.5 SP1 and the update KB959209 into the Windows Virtual PC image that you prepare for use with MED-V. However, by default, the Microsoft .NET Framework 3.5 SP1 and the update are included when you install Windows 7 on the host computer. -  + **An Active Directory Infrastructure** @@ -54,9 +54,9 @@ Group Policy provides the centralized management and configuration of operating [MED-V 2.0 Supported Configurations](med-v-20-supported-configurations.md) -  + -  + diff --git a/mdop/medv-v2/configure-installation-prerequisites.md b/mdop/medv-v2/configure-installation-prerequisites.md index 454be313ea..04885dd2fb 100644 --- a/mdop/medv-v2/configure-installation-prerequisites.md +++ b/mdop/medv-v2/configure-installation-prerequisites.md @@ -31,7 +31,7 @@ The following instructions are prerequisites for installing and using Microsoft **Important**   If a version of Virtual PC for Windows already exists on the host computer, you must uninstall it before you install Windows Virtual PC. -  + **To install Windows Virtual PC** @@ -42,7 +42,7 @@ If a version of Virtual PC for Windows already exists on the host computer, you **Important**   Windows Virtual PC includes the Integration Components package, which provides features that improve the interaction between the virtual environment and the physical computer. For example, it lets your mouse move between the host and the guest computers. MED-V requires the installation of the Integration Components package. -  + ## How to Install and Configure the Windows Virtual PC Update @@ -52,12 +52,12 @@ The Microsoft update associated with article KB977206 enables Windows XP Mode fo **Important**   You do not have to install this update when you are installing MED-V on host computers that are running Windows 7 with Service Pack 1. -  + **Tip**   In addition to the update listed here, we recommend that you review all available Windows Virtual PC updates and apply those updates that are appropriate or necessary for your environment. -  + **To install the Windows Virtual PC Update** @@ -93,9 +93,9 @@ To prevent antivirus activity from affecting the performance of the virtual desk [MED-V 2.0 Supported Configurations](med-v-20-supported-configurations.md) -  + -  + diff --git a/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md b/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md index 54637e0a48..2bae530b8d 100644 --- a/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md +++ b/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md @@ -23,35 +23,35 @@ First time setup prepares the MED-V workspace for an end user. The process creat Follow these steps to configure your MED-V image for running first time setup: -1. As an option, you can compact the virtual hard disk (VHD) to reclaim empty disk space and reduce the size of the VHD before you continue with configuring the Windows Virtual PC image. For more information, see [Compacting the MED-V Virtual Hard Disk](compacting-the-med-v-virtual-hard-disk.md). +1. As an option, you can compact the virtual hard disk (VHD) to reclaim empty disk space and reduce the size of the VHD before you continue with configuring the Windows Virtual PC image. For more information, see [Compacting the MED-V Virtual Hard Disk](compacting-the-med-v-virtual-hard-disk.md). -2. Customize the virtual machine setup process. +2. Customize the virtual machine setup process. -3. Seal the MED-V image by using Sysprep. +3. Seal the MED-V image by using Sysprep. - **Customizing the Virtual Machine Setup Process** + **Customizing the Virtual Machine Setup Process** -1. As part of preparing your image for use with MED-V, you can configure various settings on the virtual machine, such as specifying the settings for running Windows Update. Specify all the necessary virtual machine settings before you create the MED-V workspace package. +4. As part of preparing your image for use with MED-V, you can configure various settings on the virtual machine, such as specifying the settings for running Windows Update. Specify all the necessary virtual machine settings before you create the MED-V workspace package. -2. Before you create the MED-V workspace package, we recommend that you disable restore points on the virtual machine to prevent the differencing disk from growing unbounded. For more information, see [How to turn off and turn on System Restore in Windows XP](https://go.microsoft.com/fwlink/?LinkId=195927) (https://go.microsoft.com/fwlink/?LinkId=195927). +5. Before you create the MED-V workspace package, we recommend that you disable restore points on the virtual machine to prevent the differencing disk from growing unbounded. For more information, see [How to turn off and turn on System Restore in Windows XP](https://go.microsoft.com/fwlink/?LinkId=195927) (https://go.microsoft.com/fwlink/?LinkId=195927). - **Note**   - You can set up your Sysprep.inf file to disable restore points when first time setup is run. For an example of setting this GuiRunOnce key, see the sample Sysprep.inf file later in this section. + **Note** + You can set up your Sysprep.inf file to disable restore points when first time setup is run. For an example of setting this GuiRunOnce key, see the sample Sysprep.inf file later in this section. -   -3. Configure the setup process to run Mini-Setup instead of the default Windows Welcome. You must either run the Sysprep tool by using the **-mini** switch, or select the **MiniSetup** check box in the graphical user interface. For more information, see [How to Seal the Image with Sysprep](#bkmk-seal). - **Calling the First time setup Completion File** +6. Configure the setup process to run Mini-Setup instead of the default Windows Welcome. You must either run the Sysprep tool by using the **-mini** switch, or select the **MiniSetup** check box in the graphical user interface. For more information, see [How to Seal the Image with Sysprep](#bkmk-seal). - 1. An executable called FtsCompletion.exe is included as part of the installation of the MED-V Guest Agent. By default, it is located in the system drive of your MED-V image under **Program Files – Microsoft Enterprise Desktop Virtualization**. + **Calling the First time setup Completion File** - **Important**   - As the final step in the first time setup process, you must run this executable program. The user for whom the executable program is being called must be a member of the guest’s local administrator group. + 1. An executable called FtsCompletion.exe is included as part of the installation of the MED-V Guest Agent. By default, it is located in the system drive of your MED-V image under **Program Files – Microsoft Enterprise Desktop Virtualization**. -   + **Important** + As the final step in the first time setup process, you must run this executable program. The user for whom the executable program is being called must be a member of the guest’s local administrator group. - 2. You can decide how you want to call this executable program, for example, through a script that is deployed with the MED-V workspace. You can call this executable as the last line of your Sysprep.inf file. For an example of how to call this executable program in your Sysprep.inf file, see the sample file later in this section. + + + 2. You can decide how you want to call this executable program, for example, through a script that is deployed with the MED-V workspace. You can call this executable as the last line of your Sysprep.inf file. For an example of how to call this executable program in your Sysprep.inf file, see the sample file later in this section. After you have completed customization of your MED-V image, you are ready to seal the image by using Sysprep. @@ -61,88 +61,90 @@ After you have completed customization of your MED-V image, you are ready to sea 2. In a MED-V environment, you can use Sysprep to assign unique security IDs (SID) and other settings to each MED-V workspace the first time that they are started. - **Note**   + **Note** For more information about how to use Sysprep, see [Sysprep Technical Reference](https://go.microsoft.com/fwlink/?LinkId=195930) (https://go.microsoft.com/fwlink/?LinkId=195930). -   - **Caution**   - When you use non-ASCII characters in the Sysprep.inf file, you must save the file by using the encoding appropriate for the characters entered. Windows XP expects the Sysprep.inf file to be encoded by using the code page for the language that you are targeting. - You must also make sure that the System Locale of the computers to which the MED-V workspace is deployed is set to handle the language specific characters that might be present in the Sysprep.inf file. To change the settings for the System Locale, follow these steps: +~~~ +**Caution** +When you use non-ASCII characters in the Sysprep.inf file, you must save the file by using the encoding appropriate for the characters entered. Windows XP expects the Sysprep.inf file to be encoded by using the code page for the language that you are targeting. - 1. To open Region and Language, click **Start**, click **Control Panel**, and then click **Region and Language**. +You must also make sure that the System Locale of the computers to which the MED-V workspace is deployed is set to handle the language specific characters that might be present in the Sysprep.inf file. To change the settings for the System Locale, follow these steps: - 2. Click the **Administrative** tab, and then click **Change System Locale** under **Language for non-Unicode programs**. +1. To open Region and Language, click **Start**, click **Control Panel**, and then click **Region and Language**. - If you are prompted for an administrator password or confirmation, type the administrator password or provide confirmation. +2. Click the **Administrative** tab, and then click **Change System Locale** under **Language for non-Unicode programs**. - 3. Select your preferred language and then click **OK**. + If you are prompted for an administrator password or confirmation, type the administrator password or provide confirmation. -   +3. Select your preferred language and then click **OK**. - **To configure Sysprep on the MED-V Guest Computer** - 1. Create a folder named *Sysprep* in the root of the MED-V image system drive. - 2. Download the deploy.cab file. For more information, see [Windows XP Service Pack 3 Deployment Tools](https://go.microsoft.com/fwlink/?LinkId=195928) From the Microsoft Download Center (https://go.microsoft.com/fwlink/?LinkId=195928). +**To configure Sysprep on the MED-V Guest Computer** - 3. From the deploy.cab file, copy or extract the Setupmgr.exe, Sysprep.exe, and Setupcl.exe files to the Sysprep folder. +1. Create a folder named *Sysprep* in the root of the MED-V image system drive. - 4. In the Sysprep folder, run **Setup Manager** (Setupmgr.exe) to create a Sysprep.inf answer file. +2. Download the deploy.cab file. For more information, see [Windows XP Service Pack 3 Deployment Tools](https://go.microsoft.com/fwlink/?LinkId=195928) From the Microsoft Download Center (https://go.microsoft.com/fwlink/?LinkId=195928). - Or, you can create this file manually or use your company’s existing file. For more information, see [How to use the Sysprep tool to automate successful deployment of Windows XP](https://go.microsoft.com/fwlink/?LinkId=195929) (https://go.microsoft.com/fwlink/?LinkId=195929). +3. From the deploy.cab file, copy or extract the Setupmgr.exe, Sysprep.exe, and Setupcl.exe files to the Sysprep folder. - 5. Follow the **Setup Manager** wizard. +4. In the Sysprep folder, run **Setup Manager** (Setupmgr.exe) to create a Sysprep.inf answer file. - **Important**   - You must configure the MED-V guest to join a domain that lets users log on by using the credentials that they use to log on to the MED-V host. + Or, you can create this file manually or use your company’s existing file. For more information, see [How to use the Sysprep tool to automate successful deployment of Windows XP](https://go.microsoft.com/fwlink/?LinkId=195929) (https://go.microsoft.com/fwlink/?LinkId=195929). -   +5. Follow the **Setup Manager** wizard. - **Caution**   - When you configure a proxy account for joining virtual machines to the domain, know that it is possible for an end user to obtain the proxy account credentials. Take all the necessary security precautions to minimize risk, such as limiting account user rights. For more information about security concerns when you configure a Windows Virtual PC image for MED-V, see [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md). + **Important** + You must configure the MED-V guest to join a domain that lets users log on by using the credentials that they use to log on to the MED-V host. -   - If end users must provide information during the first time setup process based on the parameters specified in the Sysprep.inf file, you must also specify that first time setup is run in **Attended** mode when you are creating your MED-V workspace package. If no information will be required from the end user, you can specify that first time setup is run in **Unattended** mode when you are creating your MED-V workspace package. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). - Although you can specify any settings that you prefer, a MED-V best practice is that you create the Sysprep.inf file so that first time setup can be run in **Unattended** mode. This requires that you provide all of the required settings information as you continue through the **Setup Manager** wizard. + **Caution** + When you configure a proxy account for joining virtual machines to the domain, know that it is possible for an end user to obtain the proxy account credentials. Take all the necessary security precautions to minimize risk, such as limiting account user rights. For more information about security concerns when you configure a Windows Virtual PC image for MED-V, see [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md). - **Caution**   - If you have set a local policy or registry entry to include a service level agreement (SLA) in your image (VHD), you must specify that first time setup is run in **Attended** mode or first time setup will fail. Or, a MED-V best practice is to enforce the SLA through Group Policy later so that the SLA is displayed to the end user after first time setup is finished. -   - **Note**   - You can configure the MED-V workspace to set certain Sysprep.inf settings based on the configuration of the host and the identity of the end user. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). + If end users must provide information during the first time setup process based on the parameters specified in the Sysprep.inf file, you must also specify that first time setup is run in **Attended** mode when you are creating your MED-V workspace package. If no information will be required from the end user, you can specify that first time setup is run in **Unattended** mode when you are creating your MED-V workspace package. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). -   + Although you can specify any settings that you prefer, a MED-V best practice is that you create the Sysprep.inf file so that first time setup can be run in **Unattended** mode. This requires that you provide all of the required settings information as you continue through the **Setup Manager** wizard. - 6. Seal the MED-V image. + **Caution** + If you have set a local policy or registry entry to include a service level agreement (SLA) in your image (VHD), you must specify that first time setup is run in **Attended** mode or first time setup will fail. Or, a MED-V best practice is to enforce the SLA through Group Policy later so that the SLA is displayed to the end user after first time setup is finished. - **Important**   - We recommend that you make a backup copy of the MED-V image before sealing it. -   - After you have completed all the steps in the **Setup Manager** wizard, you are ready to run Sysprep to seal the MED-V image. + **Note** + You can configure the MED-V workspace to set certain Sysprep.inf settings based on the configuration of the host and the identity of the end user. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). - **To run Sysprep** - 1. Run the System Preparation Tool (Sysprep.exe) from the *Sysprep* folder that you created when you configured Sysprep in the MED-V virtual machine. - 2. In the warning message box that appears, click **OK**. +6. Seal the MED-V image. - 3. In the **Options** dialog box, select the **Don't reset grace period for activation** and **Use Mini-Setup** check boxes. Also, make sure that the **Shutdown mode** box is set to **Shut down**. + **Important** + We recommend that you make a backup copy of the MED-V image before sealing it. - 4. Click **Reseal**. This removes identity information and clears event logs to prepare for first time setup. - 5. If you are not satisfied with the information listed in the confirmation message box that appears, click **Cancel** and then change the selections. - 6. Click **OK** to complete the system preparation process. + After you have completed all the steps in the **Setup Manager** wizard, you are ready to run Sysprep to seal the MED-V image. - After you have run Sysprep on your MED-V image, the virtual machine shuts down and is ready for use in creating a MED-V workspace. +**To run Sysprep** + +1. Run the System Preparation Tool (Sysprep.exe) from the *Sysprep* folder that you created when you configured Sysprep in the MED-V virtual machine. + +2. In the warning message box that appears, click **OK**. + +3. In the **Options** dialog box, select the **Don't reset grace period for activation** and **Use Mini-Setup** check boxes. Also, make sure that the **Shutdown mode** box is set to **Shut down**. + +4. Click **Reseal**. This removes identity information and clears event logs to prepare for first time setup. + +5. If you are not satisfied with the information listed in the confirmation message box that appears, click **Cancel** and then change the selections. + +6. Click **OK** to complete the system preparation process. + +After you have run Sysprep on your MED-V image, the virtual machine shuts down and is ready for use in creating a MED-V workspace. +~~~ ## Example @@ -193,8 +195,8 @@ Here is an example of a Sysprep.inf file. Language=00000409 [GuiRunOnce] -    Command0="wmic /namespace:\\root\default path SystemRestore call Disable %SystemDrive%\" -    Command1="c:\Program Files\Microsoft Enterprise Desktop Virtualization\FtsCompletion.exe" + Command0="wmic /namespace:\\root\default path SystemRestore call Disable %SystemDrive%\" + Command1="c:\Program Files\Microsoft Enterprise Desktop Virtualization\FtsCompletion.exe" [sysprepcleanup] ``` @@ -206,9 +208,9 @@ Here is an example of a Sysprep.inf file. [Prepare a MED-V Image](prepare-a-med-v-image.md) -  - -  + + + diff --git a/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md b/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md index 9bd4461552..2cd2f9a102 100644 --- a/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md +++ b/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md @@ -82,7 +82,7 @@ Run Windows PowerShell with administrative credentials, and ensure that the Wind This command runs the Windows PowerShell script and runs the **New-MedvWorkspace** cmdlet to generate a new MED-V workspace package. The new packager files are saved in the folder that you originally specified for storing your MED-V Workspace Packager files. For additional help about this cmdlet, see the Windows PowerShell Help. -  + ## Exporting a MED-V Configuration to a Registry File @@ -102,9 +102,9 @@ You can import the resultant registry file from the host computer to a MED-V wor [Test And Deploy the MED-V Workspace Package](test-and-deploy-the-med-v-workspace-package.md) -  + -  + diff --git a/mdop/medv-v2/create-a-med-v-workspace-package.md b/mdop/medv-v2/create-a-med-v-workspace-package.md index e43d9b4394..7dac2edf43 100644 --- a/mdop/medv-v2/create-a-med-v-workspace-package.md +++ b/mdop/medv-v2/create-a-med-v-workspace-package.md @@ -27,7 +27,7 @@ Use the **MED-V Workspace Packager** to create MED-V workspaces. The **MED-V Wor - A **Help Center** on the right-hand side of the window that provides information and guidance to help you create, test, and manage your MED-V workspaces. -**Important**   +**Important** Before you can use the **MED-V Workspace Packager**, you must first make sure that the Windows PowerShell execution policy is set to Unrestricted. `Set-ExecutionPolicy Unrestricted` @@ -48,12 +48,12 @@ If it is necessary, change the SAN policy to "Online All" by typing the followin `DISKPART> exit` -  -**Important**   + +**Important** If automatic disk encryption software is installed on the computer that you use to mount the virtual hard disk and build the MED-V workspace package, you must disable the software before you start. Otherwise, you cannot use the MED-V workspace on any other computer. -  + The information we provide here can help you create your MED-V workspace deployment package. @@ -70,32 +70,34 @@ Before you start to build your MED-V workspace deployment package, verify that y Your URL redirection text file or list contains those URLs that you want redirected from the host computer to Internet Explorer in the MED-V workspace. When you are using the packaging wizard to create your MED-V workspace, you import, type, or copy and paste this redirection information as one of the steps in the package creation process. - **Note**   + **Note** URL redirection in MED-V only supports the protocols HTTP and HTTPS. MED-V does not provide support for FTP or any other protocols. -   - Enter each web address on a single line, for example: - http://www.contoso.com/webapps/webapp1 +~~~ +Enter each web address on a single line, for example: - http://www.contoso.com/webapps/webapp2 +http://www.contoso.com/webapps/webapp1 - http://\*.contoso.com +http://www.contoso.com/webapps/webapp2 - http://www.contoso.com/webapps/\* +http://\*.contoso.com + +http://www.contoso.com/webapps/\* + +**Important** +If you import a text file that includes a URL that uses special characters (such as ~ ! @ \# and so on), make sure that you specify UTF-8 encoding when you save the text file. Special characters do not import correctly into the MED-V Workspace Packager if the text file was saved using the default ANSI encoding. +~~~ - **Important**   - If you import a text file that includes a URL that uses special characters (such as ~ ! @ \# and so on), make sure that you specify UTF-8 encoding when you save the text file. Special characters do not import correctly into the MED-V Workspace Packager if the text file was saved using the default ANSI encoding. -   ## Packaging a MED-V Workspace for a Language Other than the Language of the MED-V Workspace Packager Computer By default, the MED-V workspace supports characters in both the language of the computer and in English. To create a MED-V workspace for a language other than the one installed on the computer, specify **-loc \[locale\]** in the PowerShell script (.ps1) after the MED-V workspace name. -To create a MED-V workspace package in a language other than the default language of the MED-V Workspace Packager computer, generate a script in the default language by running the MED-V Workspace Packager and then modifying the output script as required for your locale. The script is located in the MED-V workspace output directory that was specified during packaging. The names of the locale settings are on the .WXL files in the following directory: +To create a MED-V workspace package in a language other than the default language of the MED-V Workspace Packager computer, generate a script in the default language by running the MED-V Workspace Packager and then modifying the output script as required for your locale. The script is located in the MED-V workspace output directory that was specified during packaging. The names of the locale settings are on the .WXL files in the following directory: C:\\Program Files\\Microsoft Enterprise Desktop Virtualization\\WindowsPowerShell\\Modules\\Microsoft.Medv.Administration.Commands.WorkspacePackager\\locale @@ -157,267 +159,283 @@ To create a MED-V workspace package, follow these steps: -   + 3. On the **Package Information** page, enter a name for the MED-V workspace and select a folder where the MED-V workspace package files are saved. - **Warning**   + **Warning** You must name the MED-V workspace and specify a folder to continue. -   - After you have finished, click **Next**. -4. On the **Select Windows XP Image** page, specify the location of your prepared MED-V Windows XP Virtual PC image (.vhd file). +~~~ +After you have finished, click **Next**. +~~~ - **Warning**   - You must specify a Windows XP VHD image to continue. +4. On the **Select Windows XP Image** page, specify the location of your prepared MED-V Windows XP Virtual PC image (.vhd file). -   + **Warning** + You must specify a Windows XP VHD image to continue. - After you have finished, click **Next**. -5. On the **First Time Setup** page, select whether you want first time setup to run while attended or unattended and whether you want the MED-V workspace used separately or used by all end users on a shared computer. - If you select **Unattended setup, without any notification**, the end user is not informed before first time setup is run and the virtual machine is not shown to the end user during first time setup. In addition, the **MED-V Messages** page of the wizard is hidden because no messages are required if first time setup runs in a completely unattended mode. +~~~ +After you have finished, click **Next**. +~~~ - If you select **Unattended setup, but notify end users before first time setup begins**, the end user is informed before first time setup is run. However, the virtual machine is not shown to the end user during first time setup. +5. On the **First Time Setup** page, select whether you want first time setup to run while attended or unattended and whether you want the MED-V workspace used separately or used by all end users on a shared computer. - Select **Attended setup** if the end user must enter information during first time setup. + If you select **Unattended setup, without any notification**, the end user is not informed before first time setup is run and the virtual machine is not shown to the end user during first time setup. In addition, the **MED-V Messages** page of the wizard is hidden because no messages are required if first time setup runs in a completely unattended mode. - The default behavior is **Unattended setup, but notify end users before first time setup begins**. + If you select **Unattended setup, but notify end users before first time setup begins**, the end user is informed before first time setup is run. However, the virtual machine is not shown to the end user during first time setup. - **Caution**   - If you created the Sysprep.inf file so that Mini-Setup requires user input to complete, you must select **Attended setup** or problems might occur during first time setup. + Select **Attended setup** if the end user must enter information during first time setup. -   + The default behavior is **Unattended setup, but notify end users before first time setup begins**. - You can also specify how a MED-V workspace is used on computers that are shared by multiple end users. You can decide that you want to create a unique MED-V workspace for each end user or that you want the MED-V workspace made available to all end users who share the computer. The default is that the MED-V workspace is unique for each end user. + **Caution** + If you created the Sysprep.inf file so that Mini-Setup requires user input to complete, you must select **Attended setup** or problems might occur during first time setup. - **Important**   - We recommend that you disable the fast user switching feature in Windows if you configure the MED-V workspace to be accessed by all users on a shared computer. Problems can occur if an end user logs on by using the fast user switching feature in Windows when another user is still logged on. -   - **Tip**   - When you create a name mask for the MED-V workspace on the **Naming Computers** page, make sure that each virtual machine on a shared computer has a unique computer name. +~~~ +You can also specify how a MED-V workspace is used on computers that are shared by multiple end users. You can decide that you want to create a unique MED-V workspace for each end user or that you want the MED-V workspace made available to all end users who share the computer. The default is that the MED-V workspace is unique for each end user. -   +**Important** +We recommend that you disable the fast user switching feature in Windows if you configure the MED-V workspace to be accessed by all users on a shared computer. Problems can occur if an end user logs on by using the fast user switching feature in Windows when another user is still logged on. - You can also specify whether the MED-V workspace is added to the Administrators group or administrator credentials are managed outside MED-V. By default, the MED-V workspace is not automatically added to the Administrators group. - After you have finished, click **Next**. -6. On the **MED-V Messages** page, specify the following messages that the end user sees during first time setup: +**Tip** +When you create a name mask for the MED-V workspace on the **Naming Computers** page, make sure that each virtual machine on a shared computer has a unique computer name. - - The message that the end user sees when first time setup starts. - - The message that the end user sees if first time setup fails or an error occurs. - **Note**   - The **MED-V Messages** page of the wizard is hidden if you selected **Unattended setup, without any notification** on the **First Time Setup** page. +You can also specify whether the MED-V workspace is added to the Administrators group or administrator credentials are managed outside MED-V. By default, the MED-V workspace is not automatically added to the Administrators group. -   +After you have finished, click **Next**. +~~~ - You can also specify an optional URL location for help information that is provided to the end user when first time setup is running. +6. On the **MED-V Messages** page, specify the following messages that the end user sees during first time setup: - For example, the URL can point to an internal IT webpage with answers to questions such as "How long will this take and how will I know when it has completed?" or "What do you do if you get an error message?" + - The message that the end user sees when first time setup starts. - **Note**   - If you specify a URL, a link is shown during first time setup that points the end user to this help information. If you do not specify a URL, no link is provided. + - The message that the end user sees if first time setup fails or an error occurs. -   + **Note** + The **MED-V Messages** page of the wizard is hidden if you selected **Unattended setup, without any notification** on the **First Time Setup** page. - After you have finished, click **Next**. -7. On the **Naming Computers** page, you can specify whether computer naming is managed by MED-V or by a system management tool, such as Sysprep. The default is that computer naming is managed by a system management tool. - If you specify that computer naming is managed by MED-V, select a predefined computer naming convention (mask) from the drop-down list. A preview of a sample computer name appears that is based on the computer that you are using to build the MED-V workspace package. +~~~ +You can also specify an optional URL location for help information that is provided to the end user when first time setup is running. - If you select one of the custom naming conventions, the fields you can specify are limited to the following characters: +For example, the URL can point to an internal IT webpage with answers to questions such as "How long will this take and how will I know when it has completed?" or "What do you do if you get an error message?" - - The prefix and suffix fields are limited to the characters A-Z, a-z, 0-9, and the special characters ! @ \# $ % ^ & ( ) - \_ ' { } . and ~. +**Note** +If you specify a URL, a link is shown during first time setup that points the end user to this help information. If you do not specify a URL, no link is provided. - - The hostname and username fields are limited to the digits 0 through 9. - **Important**   - Computer names must be unique and are limited to a maximum of 15 characters. When you decide on your computer naming method, consider end users who have multiple computers or that share a computer, and avoid using computer name masks that could cause a collision on the network. -   +After you have finished, click **Next**. +~~~ - **Caution**   - The computer name settings that you specify on this page override those specified in the Sysprep.inf answer file. +7. On the **Naming Computers** page, you can specify whether computer naming is managed by MED-V or by a system management tool, such as Sysprep. The default is that computer naming is managed by a system management tool. -   + If you specify that computer naming is managed by MED-V, select a predefined computer naming convention (mask) from the drop-down list. A preview of a sample computer name appears that is based on the computer that you are using to build the MED-V workspace package. - After you have finished, click **Next**. + If you select one of the custom naming conventions, the fields you can specify are limited to the following characters: -8. On the **Copy Settings from Host** page, you can select the following settings to specify how the MED-V workspace is configured: + - The prefix and suffix fields are limited to the characters A-Z, a-z, 0-9, and the special characters ! @ \# $ % ^ & ( ) - \_ ' { } . and ~. - **Caution**   - The settings that you specify on this page that are copied from the host computer to the MED-V workspace override those specified in the Sysprep.inf answer file. + - The hostname and username fields are limited to the digits 0 through 9. -   + **Important** + Computer names must be unique and are limited to a maximum of 15 characters. When you decide on your computer naming method, consider end users who have multiple computers or that share a computer, and avoid using computer name masks that could cause a collision on the network. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Copy regional settings

    Select this check box to copy the regional settings from the host computer to the MED-V workspace.

    If you select this check box, the following settings are set in the Sysprep.inf file:

    -
    [RegionalSettings]
    -    Language
    -    SystemLocale
    -    UserLocale
    -    UserLocale_DefaultUser
    -    InputLocale
    -    InputLocale_DefaultUser
    -    

    Copy user settings

    Select this check box to copy certain user settings, such as user name and company name, from the host to the MED-V workspace.

    If you select this check box, the following settings are set in the Sysprep.inf file:

    -
    [UserData]
    -    OrgName
    -    FullName
    -
    - Note   -

    Personal settings, such as Internet browsing history, are not copied over to the MED-V workspace.

    -
    -
    -   -

    Copy domain name

    Select this check box to let the guest join the same domain as the host.

    - Important   -

    The MED-V guest must be configured to join a domain that lets users log on by using the credentials that they use to log on to the MED-V host.

    -
    -
    -   -

    Copy domain organizational unit

    Select this check box to copy the domain organizational unit from the host computer to the MED-V workspace. This check box is only enabled if you select to copy the domain name from the host computer.

    -   - After you have finished, click **Next**. +~~~ +**Caution** +The computer name settings that you specify on this page override those specified in the Sysprep.inf answer file. -9. On the **Startup and Networking** page, you can change the default behavior for the following settings: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Start MED-V workspace

    Choose whether to start the MED-V workspace at user logon, at first use, or to let the end user decide when the MED-V workspace starts.

    The MED-V workspace starts in one of two ways: either when the end user logs on or when they first start an action that requires MED-V, such as opening a published application or entering a URL that requires redirection.

    -

    You can either define this setting for the end user or let the end user control how MED-V starts.

    -
    - Note   -

    If you specify that the end user decides, the default behavior they experience is that the MED-V workspace starts when they log on. They can change the default by right-clicking the MED-V icon in the notification area and selecting MED-V User Settings. If you define this setting for the end user, they cannot change how MED-V starts.

    -
    -
    -   -

    Networking

    Select Shared or Bridged for your networking setting. The default is Shared.

    Shared - The MED-V workspace uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    -

    Bridged - The MED-V workspace has its own network address, typically obtained through DHCP.

    Store credentials

    Choose whether you want to store the end user credentials.

    The default behavior is that credential storing is disabled so that the end user must be authenticated every time that they log on.

    -
    - Important   -

    Even though caching the end user’s credentials provides the best user experience, you should be aware of the risks involved.

    -

    The end user’s domain credential is stored in a reversible format in the Windows Credential Manager. As a result, an attacker could write a program that retrieves the password and could gain access to the user’s credentials. You can only lessen this risk by disabling the storing of end-user credentials.

    -
    -
    -   -
    -   +After you have finished, click **Next**. +~~~ - After you have finished, click **Next**. +8. On the **Copy Settings from Host** page, you can select the following settings to specify how the MED-V workspace is configured: + + **Caution** + The settings that you specify on this page that are copied from the host computer to the MED-V workspace override those specified in the Sysprep.inf answer file. + + + +~~~ + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    Copy regional settings

    Select this check box to copy the regional settings from the host computer to the MED-V workspace.

    If you select this check box, the following settings are set in the Sysprep.inf file:

    +
    [RegionalSettings]
    +Language
    +SystemLocale
    +UserLocale
    +UserLocale_DefaultUser
    +InputLocale
    +InputLocale_DefaultUser
    +

    Copy user settings

    Select this check box to copy certain user settings, such as user name and company name, from the host to the MED-V workspace.

    If you select this check box, the following settings are set in the Sysprep.inf file:

    +
    [UserData]
    +OrgName
    +FullName
    +
    +Note +

    Personal settings, such as Internet browsing history, are not copied over to the MED-V workspace.

    +
    +
    + +

    Copy domain name

    Select this check box to let the guest join the same domain as the host.

    +Important +

    The MED-V guest must be configured to join a domain that lets users log on by using the credentials that they use to log on to the MED-V host.

    +
    +
    + +

    Copy domain organizational unit

    Select this check box to copy the domain organizational unit from the host computer to the MED-V workspace. This check box is only enabled if you select to copy the domain name from the host computer.

    + + + +After you have finished, click **Next**. +~~~ + +9. On the **Startup and Networking** page, you can change the default behavior for the following settings: + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    Start MED-V workspace

    Choose whether to start the MED-V workspace at user logon, at first use, or to let the end user decide when the MED-V workspace starts.

    The MED-V workspace starts in one of two ways: either when the end user logs on or when they first start an action that requires MED-V, such as opening a published application or entering a URL that requires redirection.

    +

    You can either define this setting for the end user or let the end user control how MED-V starts.

    +
    + Note

    If you specify that the end user decides, the default behavior they experience is that the MED-V workspace starts when they log on. They can change the default by right-clicking the MED-V icon in the notification area and selecting MED-V User Settings. If you define this setting for the end user, they cannot change how MED-V starts.

    +
    +
    + +

    Networking

    Select Shared or Bridged for your networking setting. The default is Shared.

    Shared - The MED-V workspace uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    +

    Bridged - The MED-V workspace has its own network address, typically obtained through DHCP.

    Store credentials

    Choose whether you want to store the end user credentials.

    The default behavior is that credential storing is disabled so that the end user must be authenticated every time that they log on.

    +
    + Important

    Even though caching the end user’s credentials provides the best user experience, you should be aware of the risks involved.

    +

    The end user’s domain credential is stored in a reversible format in the Windows Credential Manager. As a result, an attacker could write a program that retrieves the password and could gain access to the user’s credentials. You can only lessen this risk by disabling the storing of end-user credentials.

    +
    +
    + +
    + + + +~~~ +After you have finished, click **Next**. +~~~ 10. On the **Web Redirection** page, you can enter, paste, or import a list of the URLs that are redirected to Internet Explorer in the MED-V workspace. For more information about how to configure your URL redirection information, see [Prerequisites](#bkmk-prereq). - You can also specify how Internet Explorer in the MED-V workspace is configured for end users. By default, the Internet zone security level is set to High. Also, certain default browsing capabilities, such as the address bar, are removed. This default configuration of Internet Explorer in the MED-V workspace provides a more secure browsing environment for end users. + You can also specify how Internet Explorer in the MED-V workspace is configured for end users. By default, the Internet zone security level is set to High. Also, certain default browsing capabilities, such as the address bar, are removed. This default configuration of Internet Explorer in the MED-V workspace provides a more secure browsing environment for end users. - **Caution**   - By changing the default settings, you can customize Internet Explorer in the MED-V workspace. However, realize that if you change the default settings so as to make them less secure, you can expose your organization to those security risks that are present in older versions of Internet Explorer. For more information, see [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md). + **Caution** + By changing the default settings, you can customize Internet Explorer in the MED-V workspace. However, realize that if you change the default settings so as to make them less secure, you can expose your organization to those security risks that are present in older versions of Internet Explorer. For more information, see [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md). -   - After you have finished, click **Next**. + +~~~ +After you have finished, click **Next**. +~~~ 11. On the **Summary** page, you can review the packaging settings for this MED-V workspace. If you want to change any settings, click the **Previous** button to return to the relevant page. After you have finished reviewing the settings, click **Create**. - The **Completion** page of the **Create MED-V Workspace Package Wizard** opens to show the progress of the package creation. + The **Completion** page of the **Create MED-V Workspace Package Wizard** opens to show the progress of the package creation. - **Note**   - The MED-V workspace package creation process might take several minutes to complete, depending on the size of the VHD specified. + **Note** + The MED-V workspace package creation process might take several minutes to complete, depending on the size of the VHD specified. -   - If the MED-V workspace package is created successfully, the **Completion** page displays a list of the files that you created and their respective locations. The following is a list of the files that are created and their descriptions: - - **setup.exe**—an installation program that you deploy and run on end-user computers to install the MED-V workspaces. +~~~ +If the MED-V workspace package is created successfully, the **Completion** page displays a list of the files that you created and their respective locations. The following is a list of the files that are created and their descriptions: - - **<*workspace\_name*>.msi**—an installer file that you deploy to the end-user computers. The setup.exe file will run this file to install the MED-V workspaces. +- **setup.exe**—an installation program that you deploy and run on end-user computers to install the MED-V workspaces. - - **<*vhd\_name*>.medv**—a compressed VHD file that you deploy to the end-user computers. The setup.exe file uses it when it installs the MED-V workspaces. +- **<*workspace\_name*>.msi**—an installer file that you deploy to the end-user computers. The setup.exe file will run this file to install the MED-V workspaces. - - **<*workspace\_name*>.reg**—the configuration settings that are installed when the setup.exe, <*workspace\_name*>.msi, and <*vhd\_name*>.medv files are deployed and setup.exe is run. +- **<*vhd\_name*>.medv**—a compressed VHD file that you deploy to the end-user computers. The setup.exe file uses it when it installs the MED-V workspaces. - - **<*workspace\_name*>.ps1**—a Windows PowerShell script that you can use to rebuild the registry file and re-build the MED-V workspace package. +- **<*workspace\_name*>.reg**—the configuration settings that are installed when the setup.exe, <*workspace\_name*>.msi, and <*vhd\_name*>.medv files are deployed and setup.exe is run. - **Important**   - Before deployment, you can edit configuration settings by updating the .ps1 file that has your preferred method of script editing, such as Windows PowerShell. After you change the .ps1 file, use that file to rebuild the MED-V workspace package that you deploy to your enterprise. For more information, see [Configuring Advanced Settings by Using Windows PowerShell](configuring-advanced-settings-by-using-windows-powershell.md). +- **<*workspace\_name*>.ps1**—a Windows PowerShell script that you can use to rebuild the registry file and re-build the MED-V workspace package. + + **Important** + Before deployment, you can edit configuration settings by updating the .ps1 file that has your preferred method of script editing, such as Windows PowerShell. After you change the .ps1 file, use that file to rebuild the MED-V workspace package that you deploy to your enterprise. For more information, see [Configuring Advanced Settings by Using Windows PowerShell](configuring-advanced-settings-by-using-windows-powershell.md). + + However, after the MED-V workspace is deployed, you must edit configuration settings through the registry. For a list and description of the configuration settings, see [Managing MED-V Workspace Configuration Settings](managing-med-v-workspace-configuration-settings.md). +~~~ - However, after the MED-V workspace is deployed, you must edit configuration settings through the registry. For a list and description of the configuration settings, see [Managing MED-V Workspace Configuration Settings](managing-med-v-workspace-configuration-settings.md). -   12. Click **Close** to close the packaging wizard and return to the **MED-V Workspace Packager**. @@ -432,9 +450,9 @@ Your MED-V workspace package is now ready for testing before deployment. [Prepare a MED-V Image](prepare-a-med-v-image.md) -  - -  + + + diff --git a/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md b/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md index faa841f442..b3ff8ab2d9 100644 --- a/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md +++ b/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md @@ -45,7 +45,7 @@ Alternately, if you already have a Windows Imaging (WIM) file that you want to u **Important**   MED-V only supports one virtual hard disk per virtual machine and only one partition on each virtual disk. -  + After you have created your virtual hard disk, install Windows XP on the image. @@ -69,12 +69,12 @@ After you have installed Windows XP on your virtual machine, install any require **Important**   MED-V requires that Windows XP SP3 be running on the guest operating system. -  + **Warning**   When you install updates to Windows XP, make sure that you remain on the version of Internet Explorer in the guest that you intend to use in the MED-V workspace. For example, if you intend to run Internet Explorer 6 in the MED-V workspace, make sure that any updates that you install now do not include Internet Explorer 7 or Internet Explorer 8. In addition, we recommend that you configure the registry to prevent automatic updates from upgrading Internet Explorer. -  + ### Installing an Optional Performance Update @@ -83,7 +83,7 @@ Although it is optional, we recommend that you install the following update for **Note**   The update is publically available. However, you might be prompted to accept an agreement for Microsoft Services. Follow the prompts on the successive webpages to retrieve this hotfix. -  + ### Configuring a Group Policy Performance Update @@ -105,7 +105,7 @@ Windows Virtual PC includes the Integration Components package. This provides fe **Important**   MED-V requires the installation of the Integration Components package. -  + When you configure the virtual image to work with MED-V, you must manually install the Integration Components package on the guest operating system to make the integration features that are available. @@ -122,7 +122,7 @@ After you install the Integration Components package, you are prompted to instal **Important**   If you are not prompted to install the RemoteApp update, you must download and install it manually. For more information and instructions about how to download this update, see [Update for Windows XP SP3 to enable RemoteApp](https://go.microsoft.com/fwlink/?LinkId=195925) (https://go.microsoft.com/fwlink/?LinkId=195925). -  + ### Enabling Remote Desktop @@ -138,7 +138,7 @@ If you want, you can use the Internet Explorer Administration Kit to customize I **Warning**   You should consider security concerns associated with customizing Internet Explorer in the MED-V workspace. For more information, see [Security Best Practices for MED-V Operations](security-best-practices-for-med-v-operations.md). -  + After your virtual hard disk is installed with an up-to-date guest operating system, you can install applications on the image. @@ -149,9 +149,9 @@ After your virtual hard disk is installed with an up-to-date guest operating sys [Configuring a Windows Virtual PC Image for MED-V](configuring-a-windows-virtual-pc-image-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/deploying-the-med-v-workspace-package.md b/mdop/medv-v2/deploying-the-med-v-workspace-package.md index 5d53fd396e..5296ed863d 100644 --- a/mdop/medv-v2/deploying-the-med-v-workspace-package.md +++ b/mdop/medv-v2/deploying-the-med-v-workspace-package.md @@ -22,12 +22,12 @@ After you have tested your Microsoft Enterprise Desktop Virtualization (MED-V) 2 **Note**   When you are ready to deploy, we recommend that you install the MED-V workspace by running the setup.exe executable program that is included in your MED-V workspace installer package. -  + **Warning**   Before you can install the MED-V workspace, you must first install the MED-V Host Agent. -  + ## In This Section @@ -41,9 +41,9 @@ Provides information about how to deploy a MED-V workspace in a Windows 7 image. [How to Deploy a MED-V Workspace Manually](how-to-deploy-a-med-v-workspace-manually.md) Provides information about how to manually deploy a MED-V workspace. -  + -  + diff --git a/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md b/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md index cae1c454a4..f8f174a569 100644 --- a/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md +++ b/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md @@ -24,7 +24,7 @@ The feature includes a component running in the guest operating system that is n **Note**   This feature is only available if the virtual machine is configured for network address translation (NAT) mode. If the virtual machine is configured for BRIDGED mode, no change indications are generated. -  + This section provides information and instruction to assist you in monitoring those network changes that can affect MED-V. @@ -33,37 +33,37 @@ This section provides information and instruction to assist you in monitoring th After you have deployed your MED-V workspaces, you can monitor changes to certain network configurations by preforming the following tasks: -1. Create a Managed Object Format (MOF) file that will look for the network configuration changes that you want to monitor. The following code shows an example of the MOF file that you can create. +1. Create a Managed Object Format (MOF) file that will look for the network configuration changes that you want to monitor. The following code shows an example of the MOF file that you can create. - ``` syntax -#pragma namespace ("\\\\.\\root\\ccm\\NetworkConfig") + ``` syntax + #pragma namespace ("\\\\.\\root\\ccm\\NetworkConfig") - class CCM_IPConfig - { - [NotNull: ToInstance ToSubClass] uint32 AddressFamily; // AF_INET, AF_INET6 - [Key, NotNull: ToInstance ToSubClass] string IPAddress; // IPv4 or IPv6 address - [NotNull: ToInstance ToSubClass] string SubnetMask; // IPv4 subnet mask - }; + class CCM_IPConfig + { + [NotNull: ToInstance ToSubClass] uint32 AddressFamily; // AF_INET, AF_INET6 + [Key, NotNull: ToInstance ToSubClass] string IPAddress; // IPv4 or IPv6 address + [NotNull: ToInstance ToSubClass] string SubnetMask; // IPv4 subnet mask + }; - class CCM_NetworkAdapter - { - [Key, NotNull: ToInstance ToSubClass] string Name; - [NotNull: ToInstance ToSubClass] uint32 DHCPEnabled = 0; - [NotNull: ToInstance ToSubClass] uint32 Quarantined = 0; // To check if it is quarantined. - CCM_IPConfig IPConfigInfo[]; - }; + class CCM_NetworkAdapter + { + [Key, NotNull: ToInstance ToSubClass] string Name; + [NotNull: ToInstance ToSubClass] uint32 DHCPEnabled = 0; + [NotNull: ToInstance ToSubClass] uint32 Quarantined = 0; // To check if it is quarantined. + CCM_IPConfig IPConfigInfo[]; + }; - [singleton] - class CCM_NetworkAdapters - { - [NotNull: ToInstance ToSubClass] String ProviderName; // MED-V or other provider - CCM_NetworkAdapter AdaptersInfo[]; - }; - ``` + [singleton] + class CCM_NetworkAdapters + { + [NotNull: ToInstance ToSubClass] String ProviderName; // MED-V or other provider + CCM_NetworkAdapter AdaptersInfo[]; + }; + ``` -2. Compile the MOF file. +2. Compile the MOF file. -3. Install the MOF file in the guest. +3. Install the MOF file in the guest. After you have installed the MOF file, you can create an event subscription that subscribes to Windows Management Instrumentation (WMI) creation, modification, or deletion events for the **CCM\_NetworkAdapters** class. This detects the following changes to the host: @@ -86,9 +86,9 @@ The event subscription you created provides notification through the WMI system [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  + -  + diff --git a/mdop/medv-v2/determining-how-med-v-will-be-deployed.md b/mdop/medv-v2/determining-how-med-v-will-be-deployed.md index b7aff89a83..84034b795d 100644 --- a/mdop/medv-v2/determining-how-med-v-will-be-deployed.md +++ b/mdop/medv-v2/determining-how-med-v-will-be-deployed.md @@ -29,7 +29,7 @@ If you are currently using an electronic software distribution solution, you can **Note**   Whichever electronic software distribution solution that you use, you must be familiar with the requirements of your particular solution. If you are using System Center Configuration Manager 2007 R2 or a later version, see the [Configuration Manager Documentation Library](https://go.microsoft.com/fwlink/?LinkId=66999) in the Microsoft Technical Library (https://go.microsoft.com/fwlink/?LinkId=66999). -  + You might prefer to install MED-V in a Windows 7 image. Then, after you deploy the Windows 7 images throughout your enterprise, MED-V is ready to be installed when an end user needs it. For more information, see [How to Deploy a MED-V Workspace in a Windows 7 Image](how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md). @@ -40,9 +40,9 @@ You might prefer to install MED-V in a Windows 7 image. Then, after you deploy t [Planning for MED-V](planning-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/example-med-v-environment-planning-checklist.md b/mdop/medv-v2/example-med-v-environment-planning-checklist.md index 2944202128..4a91991ac1 100644 --- a/mdop/medv-v2/example-med-v-environment-planning-checklist.md +++ b/mdop/medv-v2/example-med-v-environment-planning-checklist.md @@ -33,28 +33,28 @@ The following checklist provides a high-level list of items to consider and outl

    Review the components of a MED-V deployment.

    -

    [High-Level Architecture](high-level-architecturemedv2.md)

    +

    High-Level Architecture

    Ensure that your computing environment meets the supported configurations required for installing MED-V 2.0.

    -

    [MED-V 2.0 Supported Configurations](med-v-20-supported-configurations.md)

    +

    MED-V 2.0 Supported Configurations

    Determine how you want to design your MED-V deployment.

    -

    [Define and Plan your MED-V Deployment](define-and-plan-your-med-v-deployment.md)

    +

    Define and Plan your MED-V Deployment

    Review the list of best practices for ensuring that your MED-V deployment environment is more secure.

    -

    [Security and Protection for MED-V](security-and-protection-for-med-v.md)

    +

    Security and Protection for MED-V

    -  + -  + -  + diff --git a/mdop/medv-v2/example-med-v-image-preparation-checklist.md b/mdop/medv-v2/example-med-v-image-preparation-checklist.md index cd44b3abc5..d1ddce73d0 100644 --- a/mdop/medv-v2/example-med-v-image-preparation-checklist.md +++ b/mdop/medv-v2/example-med-v-image-preparation-checklist.md @@ -33,24 +33,24 @@ The following checklist provides a high-level list of items to consider and outl

    Create a virtual machine that is running Windows XP SP3 with updates and additions.

    -

    [Creating a Windows Virtual PC Image for MED-V](creating-a-windows-virtual-pc-image-for-med-v.md)

    +

    Creating a Windows Virtual PC Image for MED-V

    Install any predeployment software that you want on the MED-V image.

    -

    [Installing Applications on a Windows Virtual PC Image](installing-applications-on-a-windows-virtual-pc-image.md)

    +

    Installing Applications on a Windows Virtual PC Image

    Package the MED-V image by using Sysprep.

    -

    [Configuring a Windows Virtual PC Image for MED-V](configuring-a-windows-virtual-pc-image-for-med-v.md)

    +

    Configuring a Windows Virtual PC Image for MED-V

    -  + -  + -  + diff --git a/mdop/medv-v2/example-med-v-project-planning-checklist.md b/mdop/medv-v2/example-med-v-project-planning-checklist.md index 6d8395809e..b0a5d1d39b 100644 --- a/mdop/medv-v2/example-med-v-project-planning-checklist.md +++ b/mdop/medv-v2/example-med-v-project-planning-checklist.md @@ -33,28 +33,28 @@ The following checklist provides a high-level list of items to consider and outl

    Determine how you can use MED-V to help solve your application compatibility issues.

    -

    [Planning for Application Operating System Compatibility](planning-for-application-operating-system-compatibility.md)

    +

    Planning for Application Operating System Compatibility

    Plan an end-to-end deployment scenario for your organization.

    -

    [End-to-End Planning Scenario for MED-V 2.0](end-to-end-planning-scenario-for-med-v-20.md)

    +

    End-to-End Planning Scenario for MED-V 2.0

    Define the project scope by defining the end users and determining the MED-V images to be managed.

    -

    [Define and Plan your MED-V Deployment](define-and-plan-your-med-v-deployment.md)

    +

    Define and Plan your MED-V Deployment

    Review the list of best practices for ensuring that your MED-V deployment is more secure.

    -

    [Security and Protection for MED-V](security-and-protection-for-med-v.md)

    +

    Security and Protection for MED-V

    -  + -  + -  + diff --git a/mdop/medv-v2/example-med-v-system-installation-checklist.md b/mdop/medv-v2/example-med-v-system-installation-checklist.md index 0020984dbc..de3ca2a590 100644 --- a/mdop/medv-v2/example-med-v-system-installation-checklist.md +++ b/mdop/medv-v2/example-med-v-system-installation-checklist.md @@ -33,28 +33,28 @@ The following checklist provides a high-level list of items to consider and outl

    Ensure that your computing environment meets the supported configurations that are required for installing MED-V 2.0.

    -

    [MED-V 2.0 Supported Configurations](med-v-20-supported-configurations.md)

    +

    MED-V 2.0 Supported Configurations

    Plan and design the MED-V deployment.

    -

    [Planning for MED-V](planning-for-med-v.md)

    +

    Planning for MED-V

    Verify that the required installation prerequisites are configured.

    -

    [Configure Installation Prerequisites](configure-installation-prerequisites.md)

    +

    Configure Installation Prerequisites

    Install the MED-V Host Agent and MED-V Workspace Packager.

    -

    [Deploy the MED-V Components](deploy-the-med-v-components.md)

    +

    Deploy the MED-V Components

    -  + -  + -  + diff --git a/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md b/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md index 2a2ccb41c5..f86a94139f 100644 --- a/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md +++ b/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md @@ -33,28 +33,28 @@ The following checklist provides a high-level list of items to consider and outl

    Prepare the MED-V image for deployment.

    -

    [Prepare a MED-V Image](prepare-a-med-v-image.md)

    +

    Prepare a MED-V Image

    Create the MED-V workspace deployment package.

    -

    [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md)

    +

    Create a MED-V Workspace Package

    Test the MED-V workspace installer package.

    -

    [Testing the MED-V Workspace Package](testing-the-med-v-workspace-package.md)

    +

    Testing the MED-V Workspace Package

    Deploy the MED-V workspace installer package.

    -

    [Deploying the MED-V Workspace Package](deploying-the-med-v-workspace-package.md)

    +

    Deploying the MED-V Workspace Package

    -  + -  + -  + diff --git a/mdop/medv-v2/high-level-architecturemedv2.md b/mdop/medv-v2/high-level-architecturemedv2.md index fd5bb0cbb9..a5adeabb7e 100644 --- a/mdop/medv-v2/high-level-architecturemedv2.md +++ b/mdop/medv-v2/high-level-architecturemedv2.md @@ -33,7 +33,7 @@ The MED-V software contained in the MED-V host that provides a channel to commun **Note**   After MED-V and its required components are installed MED-V must be configured. The configuration of MED-V is referred to as first time setup. -  + **ESD System** Your existing software distribution method that lets you deploy and install the MED-V workspace package files that MED-V creates. @@ -59,7 +59,7 @@ The MED-V software contained in the MED-V guest that provides a channel to commu **Note**   The MED-V Guest Agent is installed automatically during first time setup. -  + **ESD Client** An optional part of your ESD system that installs software packages and reports status to the ESD system. @@ -71,9 +71,9 @@ An optional part of your ESD system that installs software packages and reports [Prepare the Deployment Environment for MED-V](prepare-the-deployment-environment-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md b/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md index 7cb3e45e0c..0821577e21 100644 --- a/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md +++ b/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md @@ -46,7 +46,7 @@ You can add and remove URL redirection information by performing one of the foll **Note**   This method of editing URL redirection information is a MED-V best practice. -  + **To rebuild the MED-V workspace by using an updated URL text file** @@ -55,7 +55,7 @@ This method of editing URL redirection information is a MED-V best practice. **Important**   We do not recommend this method of editing URL redirection information. In addition, any time that you redeploy the MED-V workspace back out to your enterprise, first time setup must run again, and any data saved in the virtual machine is lost. -   + ## Related topics @@ -66,9 +66,9 @@ This method of editing URL redirection information is a MED-V best practice. [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md) -  + -  + diff --git a/mdop/medv-v2/how-to-create-a-test-environment.md b/mdop/medv-v2/how-to-create-a-test-environment.md index a3ac7df325..18068b07ed 100644 --- a/mdop/medv-v2/how-to-create-a-test-environment.md +++ b/mdop/medv-v2/how-to-create-a-test-environment.md @@ -34,7 +34,7 @@ The following are some steps and instructions to help you create a test environm **Important**   The VHD and Setup executable program must be in the same folder as the MED-V workspace installer. Then, install the MED-V workspace installer by running setup.exe. -   + 2. After all of the components are installed on the test computer, run the MED-V Host Agent to start first time setup. @@ -43,7 +43,7 @@ The following are some steps and instructions to help you create a test environm **Note**   If you cannot physically run the MED-V Host Agent on the test computer, first time setup starts automatically the next time that the computer restarts. -   + First time setup starts and can take ten minutes or more to finish. @@ -58,7 +58,7 @@ For information about testing your configuration settings when first time setup **Important**   The VHD and Setup executable program must be in the same folder on your test environment as the MED-V workspace installer. -   + 3. Install the MED-V workspace by running setup.exe. @@ -73,7 +73,7 @@ You are now ready to test the different settings for configuration, application **Note**   By default, MED-V overrides the screen lock policy in the guest. However, this does not pose a security problem because the host computer still honors the screen lock policy. -  + ## Related topics @@ -84,9 +84,9 @@ By default, MED-V overrides the screen lock policy in the guest. However, this d [How to Test URL Redirection](how-to-test-url-redirection.md) -  + -  + diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md index 7067a394fc..550099841d 100644 --- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md +++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md @@ -32,14 +32,14 @@ The following section provides information and instructions to help you deploy t **Warning**   Internet Explorer must be closed before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution. -   + 4. Copy the MED-V workspace package files to the Windows 7 image. The MED-V workspace package files are the MED-V workspace installer, .medv file, and setup.exe file that you created by using the **MED-V Workspace Packager**. **Important**   The .medv and setup.exe file must be in the same folder as the MED-V workspace installer. Then, install the MED-V workspace by running setup.exe. -   + 5. Configure a shortcut on the **Start** menu to open the MED-V workspace package installation. @@ -56,9 +56,9 @@ When the end user has to access an application published in the MED-V workspace, [How to Deploy a MED-V Workspace Through an Electronic Software Distribution System](how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md) -  + -  + diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md index fe8b09b8d8..da44b5f136 100644 --- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md +++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md @@ -31,38 +31,42 @@ This section provides instruction about how to manually deploy a MED-V workspace - **MED-V Host Agent Installation File** – installs the Host Agent (MED-V\_HostAgent\_Setup installation file). - **Warning**   + **Warning** Close Internet Explorer before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution. -   - - **MED-V Workspace Installer, VHD, and Setup Executable** – created with the **MED-V Workspace Packager**. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). - **Important**   - The compressed VHD file (.medv) and the Setup executable program (setup.exe) must be in the same folder as the MED-V workspace installer. +~~~ +- **MED-V Workspace Installer, VHD, and Setup Executable** – created with the **MED-V Workspace Packager**. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). -   + **Important** + The compressed VHD file (.medv) and the Setup executable program (setup.exe) must be in the same folder as the MED-V workspace installer. +~~~ -2. Install the following in the order listed. The end user can perform this task manually or you can create a script to install the following: - - Windows Virtual PC and the Windows Virtual PC additions and updates. A computer restart is required. - - The MED-V Host Agent. +2. Install the following in the order listed. The end user can perform this task manually or you can create a script to install the following: - **Note**   - If it is running, Internet Explorer must be restarted before the installation of the MED-V Host Agent can finish. + - Windows Virtual PC and the Windows Virtual PC additions and updates. A computer restart is required. -   + - The MED-V Host Agent. - - The MED-V workspace package. + **Note** + If it is running, Internet Explorer must be restarted before the installation of the MED-V Host Agent can finish. - Install the MED-V workspace by running the setup.exe program that is included in the MED-V workspace package files. -3. Complete first time setup. - After the MED-V workspace is installed, you have the option of starting MED-V. This starts the MED-V Host Agent. You can either start MED-V at that time, or start the MED-V Host Agent later to complete first time setup. +~~~ +- The MED-V workspace package. - To start the MED-V Host Agent, click **Start**, click **All Programs**, click **Microsoft Enterprise Desktop Virtualization**, and then click **MED-V Host Agent**. + Install the MED-V workspace by running the setup.exe program that is included in the MED-V workspace package files. +~~~ + +3. Complete first time setup. + + After the MED-V workspace is installed, you have the option of starting MED-V. This starts the MED-V Host Agent. You can either start MED-V at that time, or start the MED-V Host Agent later to complete first time setup. + + To start the MED-V Host Agent, click **Start**, click **All Programs**, click **Microsoft Enterprise Desktop Virtualization**, and then click **MED-V Host Agent**. ## Related topics @@ -73,9 +77,9 @@ This section provides instruction about how to manually deploy a MED-V workspace [Deploying the MED-V Workspace Package](deploying-the-med-v-workspace-package.md) -  - -  + + + diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md index 12d765d4ac..7d9e7b0536 100644 --- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md +++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md @@ -19,19 +19,19 @@ ms.date: 08/30/2016 An electronic software distribution system is designed to efficiently move software to many different computers over slow or fast network connections. The following section provides information and instructions to help you deploy your MED-V workspace throughout your enterprise by using a software distribution system. -**Note**   +**Note** Whichever software distribution solution that you use, you must be familiar with the requirements of your particular solution. If you are using System Center Configuration Manager 2007 R2 or a later version, see the [Configuration Manager Documentation Library](https://go.microsoft.com/fwlink/?LinkId=66999) in the Microsoft Technical Library (https://go.microsoft.com/fwlink/?LinkId=66999). -  -**Important**   + +**Important** If you are using System Center Configuration Manager 2007 SP2 and your MED-V workspaces are configured to operate in **NAT** mode, the virtual machines are classified as Internet-based clients and cannot find the closest distribution points from which to download content. The [hotfix to improve the functionality for VMs that are managed by MED-V](https://go.microsoft.com/fwlink/?LinkId=201088) (https://go.microsoft.com/fwlink/?LinkId=201088) adds new functionality to virtual machines that are managed by MED-V and that are configured to operate in **NAT** mode. The new functionality lets virtual machines access the closest distribution points. Therefore, the administrator can manage the virtual machine and the host computer in the same manner. This hotfix must be installed first on the site server and then on the client. The update is publically available. However, you might be prompted to accept an agreement for Microsoft Services. Follow the prompts on the successive webpages to retrieve this hotfix. -  + You can also deploy the MED-V components together by using a batch file, but this requires a restart after the installation of Windows Virtual PC. To bypass this requirement, you can specify a single restart after all of the components are installed. The single restart also automatically starts MED-V because the MED-V workspace installation places an entry in the RUNKEY. @@ -47,48 +47,50 @@ You can also deploy the MED-V components together by using a batch file, but thi 3. **MED-V Host Agent Installation File** – installs the Host Agent (MED-V\_HostAgent\_Setup installation file). For more information, see [How to Manually Install the MED-V Host Agent](how-to-manually-install-the-med-v-host-agent.md). - **Warning**   + **Warning** Close Internet Explorer before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution. -   + 4. **MED-V Workspace Installer, VHD, and Setup Executable** – created in the **MED-V Workspace Packager**. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). - **Important**   + **Important** The compressed virtual hard disk file (.medv) and the Setup executable program (setup.exe) must be in the same folder as the MED-V workspace installer. Then, install the MED-V workspace installer by running setup.exe. -   - **Tip**   - Because problems can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe. -   +~~~ + **Tip** + Because problems can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe. +~~~ -3. Configure the packages to run in silent mode (no user interaction is required). - Running in silent mode eliminates the prompt to close Internet Explorer if it is running and the prompt to start the MED-V Host Agent. Both actions are performed when the computer is restarted. - **Note**   - Installation of Windows Virtual PC requires you to restart the computer. You can create a single installation process and install all the components at the same time if you suppress the restart and ignore the prerequisites necessary for MED-V to install. You can also do this by using command-line arguments. For an example of these arguments, see [How to Deploy the MED-V Components Through an Electronic Software Distribution System](how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md#bkmk-batch). MED-V automatically starts when the computer is restarted. +3. Configure the packages to run in silent mode (no user interaction is required). -   + Running in silent mode eliminates the prompt to close Internet Explorer if it is running and the prompt to start the MED-V Host Agent. Both actions are performed when the computer is restarted. -4. Install MED-V and its components before installing Windows Virtual PC. See the example batch file later in this topic. + **Note** + Installation of Windows Virtual PC requires you to restart the computer. You can create a single installation process and install all the components at the same time if you suppress the restart and ignore the prerequisites necessary for MED-V to install. You can also do this by using command-line arguments. For an example of these arguments, see [How to Deploy the MED-V Components Through an Electronic Software Distribution System](how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md#bkmk-batch). MED-V automatically starts when the computer is restarted. - **Important**   - Select the **IGNORE\_PREREQUISITES** option as shown in the example batch file so that the MED-V components can be installed prior to the required VPC components. Install the MED-V components in this order to allow for the single restart. -   -5. Identify any other requirements necessary for the installation and for your software distribution system, such as target platforms and the free disk space. +4. Install MED-V and its components before installing Windows Virtual PC. See the example batch file later in this topic. -6. Assign the packages to the target set of computers/users. + **Important** + Select the **IGNORE\_PREREQUISITES** option as shown in the example batch file so that the MED-V components can be installed prior to the required VPC components. Install the MED-V components in this order to allow for the single restart. - As computers are running, the software distribution system client recognizes that new packages are available and begins to install the packages per the definition and requirements. The installations should run sequentially in silent. We recommend that this is performed as a single process that does not require a restart until all the packages are installed. -7. After the installations are complete, restart the updated computers. - Depending on the software distribution system, you can schedule a restart of the computer or the end users can restart the computers manually during their regular work. After the computer is restarted, MED-V automatically starts after an end user logs on. When MED-V starts for the first time, it runs first time setup. +5. Identify any other requirements necessary for the installation and for your software distribution system, such as target platforms and the free disk space. + +6. Assign the packages to the target set of computers/users. + + As computers are running, the software distribution system client recognizes that new packages are available and begins to install the packages per the definition and requirements. The installations should run sequentially in silent. We recommend that this is performed as a single process that does not require a restart until all the packages are installed. + +7. After the installations are complete, restart the updated computers. + + Depending on the software distribution system, you can schedule a restart of the computer or the end users can restart the computers manually during their regular work. After the computer is restarted, MED-V automatically starts after an end user logs on. When MED-V starts for the first time, it runs first time setup. First time setup starts and might take several minutes to finish, depending on the size of the virtual hard disk that you specified and the number of policies applied to the MED-V workspace on startup. The end user can track the progress by watching the MED-V icon in the notification area. For more information about first time setup, see [MED-V 2.0 Deployment Overview](med-v-20-deployment-overview.md). @@ -134,11 +136,10 @@ The following example, with the specified arguments, shows how to install 64-bit

    IGNORE_PREREQUISITES

    Installs without checking for Windows Virtual PC.

    -Note   -

    Only specify this argument if you are installing Windows Virtual PC as part of this installation.

    +Note

    Only specify this argument if you are installing Windows Virtual PC as part of this installation.

    -  +
    @@ -148,7 +149,7 @@ The following example, with the specified arguments, shows how to install 64-bit -  + ## Example @@ -178,9 +179,9 @@ wusa.exe Windows6.1-KB977206-x64.msu /norestart /quiet [How to Deploy a MED-V Workspace in a Windows 7 Image](how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md) -  - -  + + + diff --git a/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md b/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md index 571c1c8cea..9271b1face 100644 --- a/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md +++ b/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md @@ -19,24 +19,24 @@ ms.date: 11/01/2016 An electronic software distribution system can help you efficiently move software to many computers over slow or fast network connections. The following section provides information and instructions to help you deploy the Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 components throughout your enterprise by using a software distribution system. -**Note**   +**Note** Whichever software distribution solution that you use, you must be familiar with the requirements of your particular solution. If you are using System Center Configuration Manager 2007 R2 or a later version, see the [Configuration Manager Documentation Library](https://go.microsoft.com/fwlink/?LinkId=66999) in the Microsoft Technical Library (https://go.microsoft.com/fwlink/?LinkId=66999). -  -**Important**   + +**Important** If you are using System Center Configuration Manager 2007 SP2 and your MED-V workspaces are configured to operate in **NAT** mode, the virtual machines are classified as Internet-based clients and cannot find the closest distribution points from which to download content. The [hotfix to improve the functionality for VMs that are managed by MED-V](https://go.microsoft.com/fwlink/?LinkId=201088) (https://go.microsoft.com/fwlink/?LinkId=201088) adds new functionality to virtual machines that are managed by MED-V and that are configured to operate in **NAT** mode. The new functionality lets virtual machines access the closest distribution points. Therefore, the administrator can manage the virtual machine and the host computer in the same manner. This hotfix must be installed first on the site server and then on the client. The update is publically available. However, you might be prompted to accept an agreement for Microsoft Services. Follow the prompts on the successive webpages to retrieve this hotfix. -  -**Note**   + +**Note** You must install the MED-V workspace packager and build your MED-V workspaces before you can deploy the MED-V components through your software distribution system. For more information about how to prepare an image and to build your MED-V workspaces, see [Operations for MED-V](operations-for-med-v.md). -  + **To deploy the MED-V components by using a software distribution system** @@ -50,27 +50,27 @@ You must install the MED-V workspace packager and build your MED-V workspaces be 3. **MED-V Host Agent Installation File** – installs the Host Agent (MED-V\_HostAgent\_Setup installation file). For more information, see [How to Manually Install the MED-V Host Agent](how-to-manually-install-the-med-v-host-agent.md). - **Warning**   - Close Internet Explorer before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution.   + **Warning** + Close Internet Explorer before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution. 4. **MED-V Workspace Installer, VHD, and Setup Executable** – created in the **MED-V Workspace Packager**. For more information, see [Create a MED-V Workspace Package](create-a-med-v-workspace-package.md). - **Important**   + **Important** The compressed virtual hard disk file (.medv) and the Setup executable program (setup.exe) must be in the same folder as the MED-V workspace installer. Then, install the MED-V workspace installer by running setup.exe. - **Tip**   - Because problems that can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe.   + **Tip** + Because problems that can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe. 3. Configure the packages to run in silent mode (no user interaction is required). Running in silent mode eliminates the prompt to close Internet Explorer if it is running and the prompt to start the MED-V Host Agent. Both actions are performed when the computer is restarted. - **Note**   + **Note** Installation of Windows Virtual PC requires you to restart the computer. You can create a single installation process and install all the components at the same time if you suppress the restart and ignore the prerequisites necessary for MED-V to install. You can also do this by using command-line arguments. For an example of these arguments, see [To install the MED-V components by using a batch file](#bkmk-batch). MED-V automatically starts when the computer is restarted. 4. Install MED-V and its components before installing Windows Virtual PC. See the example batch file later in this topic. - **Important**   + **Important** Select the **IGNORE\_PREREQUISITES** option as shown in the example batch file so that the MED-V components can be installed prior to the required VPC components. Install the MED-V components in this order to allow for the single restart. 5. Identify any other requirements necessary for the installation and for your software distribution system, such as target platforms and the free disk space. @@ -127,11 +127,10 @@ The following example, with the specified arguments, shows how to install 64-bit

    IGNORE_PREREQUISITES

    Installs without checking for Windows Virtual PC.

    -Note   -

    Only specify this argument if you are installing Windows Virtual PC as part of this installation.

    +Note

    Only specify this argument if you are installing Windows Virtual PC as part of this installation.

    -  +
    @@ -141,7 +140,7 @@ The following example, with the specified arguments, shows how to install 64-bit -  + ## Example @@ -171,9 +170,9 @@ wusa.exe Windows6.1-KB977206-x64.msu /norestart /quiet [Deploy the MED-V Components](deploy-the-med-v-components.md) -  - -  + + + diff --git a/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md b/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md index 438d2539d0..581db9047a 100644 --- a/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md +++ b/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md @@ -22,7 +22,7 @@ Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 includes a **MED-V Works **Important**   Before you start to run the wizards, make sure that you have a prepared VHD ready to install. For more information, see [Prepare a MED-V Image](prepare-a-med-v-image.md). -  + This section provides step-by-step instructions for installing or repairing the **MED-V Workspace Packager**. @@ -69,9 +69,9 @@ If the packager does not open as expected, you can try to repair the installatio [How to Uninstall the MED-V Components](how-to-uninstall-the-med-v-components.md) -  + -  + diff --git a/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md b/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md index e4c2f8386b..b933cc1510 100644 --- a/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md +++ b/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md @@ -27,29 +27,31 @@ You can use the MED-V Workspace Packager to manage URL redirection in the MED-V 3. In the **Manage Web Redirection** window, you can type, paste, or import a list of the URLs that are redirected to Internet Explorer in the MED-V workspace. - **Note**   + **Note** URL redirection in MED-V only supports the protocols HTTP and HTTPS. MED-V does not provide support for FTP or any other protocols. -   - Enter each web address on a single line, for example: - http://www.contoso.com/webapps/webapp1 +~~~ +Enter each web address on a single line, for example: - http://www.contoso.com/webapps/webapp2 +http://www.contoso.com/webapps/webapp1 - http://\*.contoso.com +http://www.contoso.com/webapps/webapp2 - http://www.contoso.com/webapps/\* +http://\*.contoso.com - **Important**   - If you import a text file that includes a URL that uses special characters (such as ~ ! @ \# and so on), make sure that you specify UTF-8 encoding when you save the text file. Special characters do not import correctly into the MED-V Workspace Packager if the text file was saved using the default ANSI encoding. +http://www.contoso.com/webapps/\* -   +**Important** +If you import a text file that includes a URL that uses special characters (such as ~ ! @ \# and so on), make sure that you specify UTF-8 encoding when you save the text file. Special characters do not import correctly into the MED-V Workspace Packager if the text file was saved using the default ANSI encoding. +~~~ -4. Click **Save as…** to save the updated URL redirection files in the specified folder. MED-V creates a registry file that contains the updated URL redirection information. Deploy the updated registry key by using Group Policy. For more information about how to use Group Policy, see [Group Policy Software Installation](https://go.microsoft.com/fwlink/?LinkId=195931) (https://go.microsoft.com/fwlink/?LinkId=195931). - MED-V also creates a Windows PowerShell script in the specified folder that you can use to re-create the updated MED-V workspace package. + +4. Click **Save as…** to save the updated URL redirection files in the specified folder. MED-V creates a registry file that contains the updated URL redirection information. Deploy the updated registry key by using Group Policy. For more information about how to use Group Policy, see [Group Policy Software Installation](https://go.microsoft.com/fwlink/?LinkId=195931) (https://go.microsoft.com/fwlink/?LinkId=195931). + + MED-V also creates a Windows PowerShell script in the specified folder that you can use to re-create the updated MED-V workspace package. ## Related topics @@ -58,9 +60,9 @@ You can use the MED-V Workspace Packager to manage URL redirection in the MED-V [Manage MED-V URL Redirection](manage-med-v-url-redirection.md) -  - -  + + + diff --git a/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md b/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md index 618753a5f0..a8214e0d7a 100644 --- a/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md +++ b/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md @@ -24,12 +24,12 @@ Typically, you deploy and install the MED-V Host Agent by using your company’s **Note**   The MED-V Guest Agent is installed automatically during first time setup. -  + **Important**   Close Internet Explorer before you install the MED-V Host Agent, otherwise conflicts can occur later with URL redirection. You can also do this by specifying a computer restart during a distribution. -  + **To install the MED-V Host Agent** @@ -52,7 +52,7 @@ Close Internet Explorer before you install the MED-V Host Agent, otherwise confl **Note**   Until a MED-V workspace is installed, the MED-V Host Agent can be started and runs, but provides no functionality. -  + ## Related topics @@ -63,9 +63,9 @@ Until a MED-V workspace is installed, the MED-V Host Agent can be started and ru [How to Uninstall the MED-V Components](how-to-uninstall-the-med-v-components.md) -  + -  + diff --git a/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md b/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md index 4a089430a4..5708a84057 100644 --- a/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md +++ b/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md @@ -24,7 +24,7 @@ In some cases, you might want to install applications on the MED-V workspace wit **Important**   If you publish an application that does not support UNC paths, we recommend that you map the application to a drive. -  + You can publish or unpublish applications to a deployed MED-V workspace by performing one of the following tasks: @@ -45,14 +45,14 @@ You can publish or unpublish applications to a deployed MED-V workspace by perfo **Note**   Frequently, the shortcut is automatically deleted from the host computer **Start** menu when you uninstall the application. However, in some cases, such as for a MED-V workspace that is configured for all users of a shared computer, you might have to manually delete the shortcut on the **Start** menu after the application is uninstalled. The end-user can do this by right-clicking the shortcut and selecting **Delete**. -   + To test that the application was published or unpublished, verify on the MED-V workspace whether the corresponding shortcut is available or not. **Note**   Applications that are included in Windows XP SP3 and are located in the virtual machine Start Menu folder are not automatically published to the host. They are controlled by registry settings that block automatic publishing. For more information, see [Windows Virtual PC Application Exclude List](windows-virtual-pc-application-exclude-list.md). -  + **To publish Control Panel items** @@ -67,7 +67,7 @@ Applications that are included in Windows XP SP3 and are located in the virtual **Caution**   When you create the shortcut, do not specify %SystemRoot%\\control.exe. This application will not be published because it is contained in the registry settings that block automatic publishing. -  + **How MED-V handles automatic application publishing** @@ -90,7 +90,7 @@ When you create the shortcut, do not specify %SystemRoot%\\control.exe. This app **Note**   A folder must already exist in the host computer Start Menu folder for MED-V to copy the shortcut there. MED-V does not create the folder if it does not already exist. -  + ## Related topics @@ -101,9 +101,9 @@ A folder must already exist in the host computer Start Menu folder for MED-V to [Windows Virtual PC Application Exclude List](windows-virtual-pc-application-exclude-list.md) -  + -  + diff --git a/mdop/medv-v2/how-to-test-application-publishing.md b/mdop/medv-v2/how-to-test-application-publishing.md index 1b2b5b7d9f..0e21fda4c9 100644 --- a/mdop/medv-v2/how-to-test-application-publishing.md +++ b/mdop/medv-v2/how-to-test-application-publishing.md @@ -65,9 +65,9 @@ After you have completed testing your MED-V workspace package and have verified [Deploying the MED-V Workspace Package](deploying-the-med-v-workspace-package.md) -  + -  + diff --git a/mdop/medv-v2/how-to-test-url-redirection.md b/mdop/medv-v2/how-to-test-url-redirection.md index 1077e5c86a..e003cb9d88 100644 --- a/mdop/medv-v2/how-to-test-url-redirection.md +++ b/mdop/medv-v2/how-to-test-url-redirection.md @@ -62,9 +62,9 @@ After you have completed testing your MED-V workspace package and have verified [Deploying the MED-V Workspace Package](deploying-the-med-v-workspace-package.md) -  + -  + diff --git a/mdop/medv-v2/how-to-uninstall-the-med-v-components.md b/mdop/medv-v2/how-to-uninstall-the-med-v-components.md index f12e602dc3..9a514186e2 100644 --- a/mdop/medv-v2/how-to-uninstall-the-med-v-components.md +++ b/mdop/medv-v2/how-to-uninstall-the-med-v-components.md @@ -24,7 +24,7 @@ Typically, you can configure your electronic software distribution (ESD) system **Important**   Before you can uninstall the MED-V Host Agent, you must first uninstall any installed MED-V workspace. -  + Use the following procedures to uninstall the MED-V components from your enterprise. @@ -51,7 +51,7 @@ The ESD client recognizes when the new packages are available and starts to unin **Note**   If MED-V is currently running, a dialog box appears and prompts you whether you want to shut it down. Click **Yes** to continue with the uninstallation. Click **No** to cancel the uninstallation. -   + Alternately, you can remove a MED-V workspace by running the `uninstall.exe` file, typically located at C:\\ProgramData\\Microsoft\\Medv\\Workspace. @@ -66,7 +66,7 @@ Alternately, you can remove a MED-V workspace by running the `uninstall.exe` fil **Note**   If you try to uninstall the MED-V Host Agent before you uninstall the MED-V workspace, a dialog box appears that states that you must first uninstall the MED-V workspace. Click **OK** to continue. -   + **To manually uninstall the MED-V Workspace Packager** @@ -79,16 +79,16 @@ Alternately, you can remove a MED-V workspace by running the `uninstall.exe` fil **Note**   You can uninstall the MED-V Workspace Packager at any time without affecting any deployed MED-V workspaces. -   + ## Related topics [Deploy the MED-V Components](deploy-the-med-v-components.md) -  + -  + diff --git a/mdop/medv-v2/how-to-verify-first-time-setup-settings.md b/mdop/medv-v2/how-to-verify-first-time-setup-settings.md index 9c22bba9e4..e7f28b9e80 100644 --- a/mdop/medv-v2/how-to-verify-first-time-setup-settings.md +++ b/mdop/medv-v2/how-to-verify-first-time-setup-settings.md @@ -22,7 +22,7 @@ While your test of first time setup is running or after it finishes, you can ver **Note**   For information about how to monitor the successful completion of first time setup throughout your enterprise after deployment, see [Monitoring MED-V Workspace Deployments](monitoring-med-v-workspace-deployments.md). -  + **To verify settings during first time setup** @@ -51,7 +51,7 @@ For information about how to monitor the successful completion of first time set **Note**   You can close the virtual machine window at any time and first time setup continues. -   + **To verify settings after first time setup finishes** @@ -84,7 +84,7 @@ For information about how to monitor the successful completion of first time set **Note**   If you encounter any problems when verifying your first time setup settings, see [Operations Troubleshooting](operations-troubleshooting-medv2.md). -  + After you have verified that your first time setup settings are correct, you can test other MED-V workspace configurations to verify that they function as intended, such as application publishing and URL redirection. @@ -101,9 +101,9 @@ After you have completed all testing of your MED-V workspace package and have ve [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  + -  + diff --git a/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md b/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md index 634bfd7d49..99eeb385f5 100644 --- a/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md +++ b/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md @@ -45,7 +45,7 @@ To calculate the required disk space, determine the following: **Important**   Do not use the .medv file size for your calculation because the .medv file is compressed. -   + - **Users per computer** – MED-V creates a MED-V workspace for each user on a computer; the MED-V workspace consumes disk space as each user logs on and the MED-V workspace is created. @@ -60,7 +60,7 @@ The following example shows a calculation based on three users of a MED-V worksp **Note**   A MED-V best practice is to calculate the required space by using a lab deployment to validate the requirements. -  + ### Locate the Files to Determine File Size @@ -98,7 +98,7 @@ The following locations contain the files for the computer and user settings: -  + ### Calculate the Disk Space Requirements for Shared MED-V Workspaces @@ -113,9 +113,9 @@ You can find the differencing disk and the saved state file for shared MED-V wor [Planning for MED-V](planning-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md b/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md index cd9e061d6b..6a9fb7c44b 100644 --- a/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md +++ b/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md @@ -32,12 +32,12 @@ After you have deployed a MED-V workspace, you have several different options av **Important**   To make sure that an installed application is automatically published to the host, install the application on the virtual machine for **All Users**. For more information about application publishing, see [How to Publish and Unpublish an Application on the MED-V Workspace](how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md). -  + **Tip**   MED-V does not support guest-to-host redirection for content handling, such as double-clicking a Microsoft Word document in Internet Explorer in the MED-V workspace. Therefore, the required applications, such as Microsoft Word, must be installed in MED-V workspace to provide the default content handling functionality that an end user might expect. -  + ## Adding and Removing Applications by Using Group Policy @@ -67,7 +67,7 @@ App-V applications that you publish to the MED-V workspace have file-type associ To force redirection of those file-type associations, query App-V for mapped file type associations by typing the following at a command prompt in the guest virtual machine: **sftmime /QUERY OBJ:TYPE**. Then, map those file type associations in the host computer. -  + ## Adding and Removing Applications on the Core Image @@ -79,14 +79,14 @@ For more information about how to add or remove applications on the core image, **Important**   We do not recommend this method of managing applications. If you add or remove applications on the core image and redeploy the MED-V workspace back out to your enterprise, first time setup must run again, and any data saved on the virtual machine is lost. -  + **Note**   Even though an application is installed into a MED-V workspace, you might also have to publish the application before it becomes available to the end user. For example, you might have to publish an installed application if the installation did not automatically create a shortcut on the **Start** menu. Likewise, to unpublish an application, you might have to manually remove a shortcut from the **Start** menu. By default, most applications are published at the time that they are installed, when shortcuts are automatically created and enabled. -  + ## Related topics @@ -95,9 +95,9 @@ By default, most applications are published at the time that they are installed, [How to Publish and Unpublish an Application on the MED-V Workspace](how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md) -  + -  + diff --git a/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md b/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md index 626d60a82c..fc9d0a46a6 100644 --- a/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md +++ b/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md @@ -24,7 +24,7 @@ The following section provides information to help you install software on the M **Caution**   For ease of MED-V workspace management after deployment, we recommend that you limit the number of components that you install on the MED-V image to those components that are required or that are helpful when using MED-V. For example, although they are not required to run MED-V, you can install an ESD system to use later for installing applications to a MED-V workspace and antivirus software for security on the image. -  + **Installing Software on a MED-V Image** @@ -41,7 +41,7 @@ For ease of MED-V workspace management after deployment, we recommend that you l **Note**   After installation is complete, you might have to close and then restart the virtual machine. -   + Repeat these steps for any software or application that you want to install on the MED-V image. We recommend that you limit the number of applications that you preinstall on the image. The recommended process for installing applications and other software on the image is to preinstall an ESD system now and to use it later to deploy software to the image. Alternately, you can also use Group Policy or App-V to add or remove applications on a MED-V workspace. For more information, see [Managing Applications Deployed to MED-V Workspaces](managing-applications-deployed-to-med-v-workspaces.md). @@ -60,9 +60,9 @@ After you have installed all of the software that you want on the MED-V image, y [Prepare a MED-V Image](prepare-a-med-v-image.md) -  + -  + diff --git a/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md b/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md index 11dce74b42..ccc7f402df 100644 --- a/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md +++ b/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md @@ -27,7 +27,7 @@ The MED-V workspace wake-up policy guarantees that the MED-V virtual machine is **Important**   The MED-V workspace wake-up policy is optimized for the Microsoft Update infrastructure. If you are using Microsoft System Center Configuration Manager to deploy non-Microsoft updates, we recommend that you also use the System Center Updates Publisher, which takes advantage of the same infrastructure as Microsoft Update and therefore benefits from the MED-V workspace wake-up policy. For more information, see [System Center Updates Publisher](https://go.microsoft.com/fwlink/?LinkId=200035) (https://go.microsoft.com/fwlink/?LinkId=200035). -  + When you created your MED-V workspace package, you configured when and how it starts, either when the end user logs on (**Fast Start**) or when the end user first opens a published application (**Normal Start**). Or you set the option to let the end user control this setting. @@ -38,7 +38,7 @@ However, for those cases in which **Fast Start** is not specified or the virtual **Note**   If the end user opens a published application during the update period, the required updates are applied, but MED-V is not automatically hibernated or shut down after the update period ends. Instead, MED-V continues running. -  + The MED-V workspace wake-up policy includes three main components: @@ -67,7 +67,7 @@ For more information about how to define your MED-V configuration values, see [M **Note**   A MED-V best practice is to set your wake up interval to match the time when MED-V virtual machines are planned to be updated regularly. In addition, we recommend that you configure these settings to resemble the host computer’s behavior. -  + ### Reboot Notification Using your ESD System @@ -76,7 +76,7 @@ You can configure your ESD system to notify MED-V whenever a restart is required **Important**   You must open the event with Modify Only rights and then signal it. If you do not open it with the correct permissions, it does not work. -  + ``` syntax /// @@ -97,9 +97,9 @@ When you signal this event, MED-V captures it and informs the virtual machine th [Managing Software Updates for MED-V Workspaces](managing-software-updates-for-med-v-workspaces.md) -  + -  + diff --git a/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md b/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md index 47165531df..c9a2d28a4c 100644 --- a/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md +++ b/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md @@ -33,12 +33,12 @@ If the value is still not found, MED-V uses the default. A general best practice is to set the value in the HKEY\_LOCAL\_MACHINE\\System hive or in the machine policy. But if you want the end user to be able to configure a particular setting, then you should leave it out. -**Note**   +**Note** Before you deploy your MED-V workspaces, you can use a script editor to change the Windows PowerShell script (.ps1 file) that the MED-V workspace packager created. For more information, see [Configuring Advanced Settings by Using Windows PowerShell](configuring-advanced-settings-by-using-windows-powershell.md). After you have deployed your MED-V workspaces, you can change certain MED-V configuration settings by editing the registry entries. -  + This section lists all the configurable MED-V registry keys and explains their uses. @@ -56,23 +56,23 @@ The following table provides information about the registry values associated wi -Name  -Type  -Data/Default  -Description  +Name +Type +Data/Default +Description -

    EventLogLevel 

    -

    DWORD 

    +

    EventLogLevel

    +

    DWORD

    Default=3

    The type of information that is logged in the event log. Levels include the following: 0 (None), 1 (Error), 2 (Warning), 3 (Information), 4 (Debug).

    -  + ## Fts Key @@ -96,28 +96,28 @@ The following table provides information about the registry values associated wi -

    AddUserToAdminGroupEnabled 

    +

    AddUserToAdminGroupEnabled

    DWORD

    Default=0

    -

    Configures whether first time setup automatically adds the end user to the administrator's group. 0 = false; 1 = true.

    +

    Configures whether first time setup automatically adds the end user to the administrator's group. 0 = false; 1 = true.

    -

    0 = false: First time setup does not automatically add the end user to the administrator's group.

    +

    0 = false: First time setup does not automatically add the end user to the administrator's group.

    -

    1 = true: First time setup automatically adds the end user to the administrator's group.

    +

    1 = true: First time setup automatically adds the end user to the administrator's group.

    -

    ComputerNameMask 

    +

    ComputerNameMask

    SZ

    -

    MEDV* 

    -

    The computer name mask that is used to create the guest virtual machine's computer name.

    +

    MEDV*

    +

    The computer name mask that is used to create the guest virtual machine's computer name.

    @@ -131,67 +131,67 @@ The following table provides information about the registry values associated wi

    DeleteVMStateTimeout

    DWORD

    Default=90

    -

    The time-out value, in seconds, when first time setup tries to delete the virtual machine. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, when first time setup tries to delete the virtual machine. Range = 0 to 2147483647.

    DetachVfdTimeout

    DWORD

    Default=120

    -

    The time-out value, in seconds, when first time setup tries to detach the virtual floppy disk from the virtual machine. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, when first time setup tries to detach the virtual floppy disk from the virtual machine. Range = 0 to 2147483647.

    -

    DialogUrl 

    +

    DialogUrl

    SZ

    -

    Customizable URL that links to internal webpage and is displayed by first time setup dialog messages. 

    +

    Customizable URL that links to internal webpage and is displayed by first time setup dialog messages.

    ExplorerTimeout

    DWORD

    Default=900

    -

    The time-out value, in seconds, that first time setup waits for Windows Explorer. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, that first time setup waits for Windows Explorer. Range = 0 to 2147483647.

    -

    FailureDialogMsg 

    +

    FailureDialogMsg

    MULTI_SZ

    -

    Message is found in resource file 

    +

    Message is found in resource file

    Customizable message that is displayed to the end user when first time setup cannot be completed.

    -

    GiveUserGroupRightsMaxRetryCount 

    -

    DWORD 

    +

    GiveUserGroupRightsMaxRetryCount

    +

    DWORD

    Default=3

    The maximum number of times that MED-V tries to give an end user group rights. Exceeding the specified retry value without being able to successfully give an end user group rights most likely causes a virtual machine preparation failure that is then subject to the MaxRetryCount value. Range = 0 to 2147483647.

    -

    GiveUserGroupRightsTimeout 

    +

    GiveUserGroupRightsTimeout

    DWORD

    Default=300

    -

    The time-out value, in seconds, when giving a user group rights. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, when giving a user group rights. Range = 0 to 2147483647.

    -

    LogFilePaths 

    +

    LogFilePaths

    MULTI_SZ

    -

    A list of the log file paths that MED-V collects during first time setup. 

    +

    A list of the log file paths that MED-V collects during first time setup.

    -

    MaxPostponeTime 

    +

    MaxPostponeTime

    DWORD

    Default=120

    -

    The maximum number of hours that first time setup can be postponed by the end user. Range = 0 to 2147483647.

    +

    The maximum number of hours that first time setup can be postponed by the end user. Range = 0 to 2147483647.

    -

    MaxRetryCount 

    +

    MaxRetryCount

    DWORD

    Default=3

    The maximum number of times that MED-V tries to prepare a virtual machine if each attempt ends in a failure other than a software error. When virtual machine preparation fails and the number of first time setup retries is exceeded, then MED-V informs the end user about the failure and does not give the option to retry. The count is re-set every time that MED-V is started. Range = 0 to 2147483647.

    -

    Mode 

    +

    Mode

    SZ

    Default=Unattended

    -

    Configures how first time setup interacts with the user. Possible values are as follows:

    +

    Configures how first time setup interacts with the user. Possible values are as follows:

    @@ -199,11 +199,10 @@ The following table provides information about the registry values associated wi

    Attended. The end user must enter information during first time setup.

    -Note   -

    If you created the Sysprep.inf file so that Mini-Setup requires user input to complete, then you must select Attended mode or problems might occur during first time setup.

    +Note

    If you created the Sysprep.inf file so that Mini-Setup requires user input to complete, then you must select Attended mode or problems might occur during first time setup.

    -  +
    @@ -219,34 +218,34 @@ The following table provides information about the registry values associated wi

    Silent. The virtual machine is not shown to the end user at all during first time setup.

    -

    NonInteractiveRetryTimeoutInc 

    +

    NonInteractiveRetryTimeoutInc

    DWORD

    Default=15

    -

    The time-out value, in minutes, that first time setup must be completed in first time setup interactive mode when re-attempting setup. Range = 0 to 2147483647.

    +

    The time-out value, in minutes, that first time setup must be completed in first time setup interactive mode when re-attempting setup. Range = 0 to 2147483647.

    -

    NonInteractiveTimeout 

    +

    NonInteractiveTimeout

    DWORD

    Default=45

    -

    The time-out value, in minutes, that first time setup must be completed in first time setup interactive mode. Range = 0 to 2147483647.

    +

    The time-out value, in minutes, that first time setup must be completed in first time setup interactive mode. Range = 0 to 2147483647.

    -

    PostponeUtcDateTimeLimit 

    +

    PostponeUtcDateTimeLimit

    SZ

    -

    The date and time, in UTC DateTime format, that first time setup can be postponed. Enter in the format "yyyy-MM-dd hh:mm" with hours specified by using the 24-hour clock standard.

    +

    The date and time, in UTC DateTime format, that first time setup can be postponed. Enter in the format "yyyy-MM-dd hh:mm" with hours specified by using the 24-hour clock standard.

    -

    RetryDialogMsg 

    +

    RetryDialogMsg

    MULTI_SZ

    -

    Message is found in resource file 

    +

    Message is found in resource file

    Customizable message that is displayed to the end user when first time setup must re-attempt setup.

    -

    SetComputerNameEnabled 

    +

    SetComputerNameEnabled

    DWORD

    Default=0

    -

    Configures whether the ComputerName entry under the [UserData] section of the Sysprep.inf file in the guest should be updated according to the specified ComputerNameMask.   0 = false; 1 = true.

    +

    Configures whether the ComputerName entry under the [UserData] section of the Sysprep.inf file in the guest should be updated according to the specified ComputerNameMask. 0 = false; 1 = true.

    @@ -261,10 +260,10 @@ The following table provides information about the registry values associated wi

    1 = true: The ComputerName entry in the Sysprep.inf file is updated according to the ComputerNameMask.

    -

    SetJoinDomainEnabled 

    +

    SetJoinDomainEnabled

    DWORD

    Default=0

    -

    Configures whether the JoinDomain setting under the [Identification] section of the Sysprep.inf file in the guest should be updated to match the settings on the host.  0 = false; 1 = true.

    +

    Configures whether the JoinDomain setting under the [Identification] section of the Sysprep.inf file in the guest should be updated to match the settings on the host. 0 = false; 1 = true.

    @@ -279,10 +278,10 @@ The following table provides information about the registry values associated wi

    1 = true: The JoinDomain setting in the Sysprep.inf file is updated to match the settings on the host.

    -

    SetMachineObjectOUEnabled 

    +

    SetMachineObjectOUEnabled

    DWORD

    Default=0

    -

    Configures whether the MachineObjectOU setting under the [Identification] section of the Sysprep.inf file in the guest is updated to match the host.  0 = false; 1 = true.

    +

    Configures whether the MachineObjectOU setting under the [Identification] section of the Sysprep.inf file in the guest is updated to match the host. 0 = false; 1 = true.

    @@ -297,16 +296,15 @@ The following table provides information about the registry values associated wi

    1 = true: The MachineObjectOU setting in the Sysprep.inf file is updated to match the settings on the host.

    -

    SetRegionalSettingsEnabled 

    +

    SetRegionalSettingsEnabled

    DWORD

    Default=0

    -

    Configures whether the settings under the [RegionalSettings] section of the Sysprep.inf file in the guest are updated to match the host.  0 = false; 1 = true.

    +

    Configures whether the settings under the [RegionalSettings] section of the Sysprep.inf file in the guest are updated to match the host. 0 = false; 1 = true.

    -Note   -

    By default, the setting for TimeZone in the guest is always synchronized with the TimeZone setting in the host.

    +Note

    By default, the setting for TimeZone in the guest is always synchronized with the TimeZone setting in the host.

    -  +
    @@ -322,10 +320,10 @@ The following table provides information about the registry values associated wi

    1 = true: The settings under the [RegionalSettings] section of the Sysprep.inf file in the guest are updated to match the host.

    -

    SetUserDataEnabled 

    +

    SetUserDataEnabled

    DWORD

    Default=0

    -

    Configures whether the FullName and the OrgName settings under the [UserData] section of the Sysprep.inf file in the guest are updated to match the settings on the host.  0 = false; 1 = true.

    +

    Configures whether the FullName and the OrgName settings under the [UserData] section of the Sysprep.inf file in the guest are updated to match the settings on the host. 0 = false; 1 = true.

    @@ -340,22 +338,22 @@ The following table provides information about the registry values associated wi

    1 = true: The FullName and OrgName settings in the Sysprep.inf file are updated to match the settings on the host.

    -

    StartDialogMsg 

    +

    StartDialogMsg

    MULTI_SZ

    -

    Message is found in resource file 

    -

    Customizable message that is displayed to the end user when first time setup is ready to start. 

    +

    Message is found in resource file

    +

    Customizable message that is displayed to the end user when first time setup is ready to start.

    TaskCancelTimeout

    DWORD

    Default=30

    -

    The time-out value, in seconds, that first time setup waits for a response from the virtual machine for a Cancel operation. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, that first time setup waits for a response from the virtual machine for a Cancel operation. Range = 0 to 2147483647.

    TaskVMTurnOffTimeout

    DWORD

    Default=60

    -

    The time-out value, in seconds, that first time setup waits for the virtual machine to shut down. Range = 0 to 2147483647.

    +

    The time-out value, in seconds, that first time setup waits for the virtual machine to shut down. Range = 0 to 2147483647.

    UpgradeTimeout

    @@ -366,7 +364,7 @@ The following table provides information about the registry values associated wi -  + ## UserExperience Key @@ -390,10 +388,10 @@ The following table provides information about the registry values associated wi -

    AppPublishingEnabled 

    +

    AppPublishingEnabled

    DWORD

    Default=1

    -

    Configures whether application publication from the guest to the host is enabled.  0 = false; 1 = true.

    +

    Configures whether application publication from the guest to the host is enabled. 0 = false; 1 = true.

    @@ -408,10 +406,10 @@ The following table provides information about the registry values associated wi

    1 = true: Enables application publishing from the guest to the host.

    -

    AudioSharingEnabled 

    +

    AudioSharingEnabled

    DWORD

    Default=1

    -

    Configures whether the sharing of the audio I/O device between the guest and the host is enabled.  0 = false; 1 = true.

    +

    Configures whether the sharing of the audio I/O device between the guest and the host is enabled. 0 = false; 1 = true.

    @@ -426,10 +424,10 @@ The following table provides information about the registry values associated wi

    1 = true: Enables the sharing of the audio I/O device between the guest and the host.

    -

    ClipboardSharingEnabled 

    +

    ClipboardSharingEnabled

    DWORD

    Default=1

    -

    Configures whether the sharing of the Clipboard between the guest and the host is enabled.  0 = false; 1 = true.

    +

    Configures whether the sharing of the Clipboard between the guest and the host is enabled. 0 = false; 1 = true.

    @@ -447,7 +445,7 @@ The following table provides information about the registry values associated wi

    DialogTimeout

    DWORD

    Default=300

    -

    The time, in seconds, before the first time setup Start Dialog times out. Range = 0 to 2147483647.

    +

    The time, in seconds, before the first time setup Start Dialog times out. Range = 0 to 2147483647.

    HideVmTimeout

    @@ -456,10 +454,10 @@ The following table provides information about the registry values associated wi

    The time-out value, in minutes, that the full-screen virtual machine window is hidden from the end user during a long logon attempt.

    -

    LogonStartEnabled 

    +

    LogonStartEnabled

    DWORD

    Default=1

    -

    Configures whether the guest should be started when the end user logs on to the desktop or when the first guest application is started.  0 = false; 1 = true.

    +

    Configures whether the guest should be started when the end user logs on to the desktop or when the first guest application is started. 0 = false; 1 = true.

    @@ -474,10 +472,10 @@ The following table provides information about the registry values associated wi

    1 = true: The guest is started when the end user logs on to the desktop.

    -

    PrinterSharingEnabled 

    +

    PrinterSharingEnabled

    DWORD

    Default=1

    -

    Configures whether the sharing of printers between the guest and the host is enabled.  0 = false; 1 = true.

    +

    Configures whether the sharing of printers between the guest and the host is enabled. 0 = false; 1 = true.

    @@ -492,16 +490,16 @@ The following table provides information about the registry values associated wi

    1 = true: Enables the sharing of printers between the guest and the host.

    -

    RebootAbsoluteDelayTimeout 

    +

    RebootAbsoluteDelayTimeout

    DWORD

    Default=1440

    -

    The time-out value, in minutes, that first time setup waits for a restart. Range = 0 to 2147483647.

    +

    The time-out value, in minutes, that first time setup waits for a restart. Range = 0 to 2147483647.

    -

    RedirectUrls 

    +

    RedirectUrls

    MULTI_SZ

    Specified URL list

    -

    Specifies a list of URLs to be redirected from the host to the guest. 

    +

    Specifies a list of URLs to be redirected from the host to the guest.

    SmartCardLogonEnabled

    @@ -521,18 +519,17 @@ The following table provides information about the registry values associated wi

    1 = true: Lets Smart Cards authenticate end users to MED-V.

    -Important   -

    If SmartCardLogonEnabled and CredentialCacheEnabled are both enabled, SmartCardLogonEnabled overrides CredentialCacheEnabled.

    +Important

    If SmartCardLogonEnabled and CredentialCacheEnabled are both enabled, SmartCardLogonEnabled overrides CredentialCacheEnabled.

    -  +
    -

    SmartCardSharingEnabled 

    +

    SmartCardSharingEnabled

    DWORD

    Default=1

    -

    Configures whether the sharing of Smart Cards between the guest and the host is enabled.  0 = false; 1 = true.

    +

    Configures whether the sharing of Smart Cards between the guest and the host is enabled. 0 = false; 1 = true.

    @@ -547,10 +544,10 @@ The following table provides information about the registry values associated wi

    1 = true: Enables the sharing of Smart Cards between the guest and the host.

    -

    USBDeviceSharingEnabled 

    +

    USBDeviceSharingEnabled

    DWORD

    Default=1

    -

    Configures whether the sharing of USB devices between the guest and the host is enabled.  0 = false; 1 = true.

    +

    Configures whether the sharing of USB devices between the guest and the host is enabled. 0 = false; 1 = true.

    @@ -567,7 +564,7 @@ The following table provides information about the registry values associated wi -  + ## VM Key @@ -591,10 +588,10 @@ The following table provides information about the registry values associated wi -

    CloseAction 

    +

    CloseAction

    SZ

    Default=HIBERNATE

    -

    The action that the virtual machine performs after the last application that is running is closed. This setting is ignored if the LogonStartEnabled value is enabled. Possible options are as follows:

    +

    The action that the virtual machine performs after the last application that is running is closed. This setting is ignored if the LogonStartEnabled value is enabled. Possible options are as follows:

    @@ -615,36 +612,36 @@ The following table provides information about the registry values associated wi

    TURN-OFF. This option can cause data loss because it is the same as turning off the power button or pulling out the power cord on a physical computer. Use this option only if you cannot use one of the other two options.

    -

    GuestMemFromHostMem 

    +

    GuestMemFromHostMem

    MULTI_SZ

    -

    378, 512, 1024, 1536, 2048 

    -

    A list of memory (MB) values for the guest. This value is used to determine how much RAM is available to the guest. Combined with HostMemToGuestMem, a lookup table is created to determine how much RAM to allocate on the guest virtual machine. Possible values can be from 128 to 3712.

    +

    378, 512, 1024, 1536, 2048

    +

    A list of memory (MB) values for the guest. This value is used to determine how much RAM is available to the guest. Combined with HostMemToGuestMem, a lookup table is created to determine how much RAM to allocate on the guest virtual machine. Possible values can be from 128 to 3712.

    -

    GuestUpdateDuration 

    +

    GuestUpdateDuration

    DWORD

    Default=240

    -

    The number of minutes that MED-V should keep the guest awake for automatic updating, starting at the time specified in the GuestUpdateTime value. Range = 0 to 1440. Setting this value to zero (0) disables the guest patching functionality.

    -

    For more information about guest patching for automatic updating, see [Managing Automatic Updates for MED-V Workspaces](managing-automatic-updates-for-med-v-workspaces.md).

    +

    The number of minutes that MED-V should keep the guest awake for automatic updating, starting at the time specified in the GuestUpdateTime value. Range = 0 to 1440. Setting this value to zero (0) disables the guest patching functionality.

    +

    For more information about guest patching for automatic updating, see Managing Automatic Updates for MED-V Workspaces.

    -

    GuestUpdateTime 

    +

    GuestUpdateTime

    SZ

    Default=00:00

    -

    The hour and minute each day when MED-V should wake up the guest for automatic updating, by using the 24-hour clock standard. Specify the time in the format HH:MM  

    -

    For more information about guest patching for automatic updating, see [Managing Automatic Updates for MED-V Workspaces](managing-automatic-updates-for-med-v-workspaces.md).

    +

    The hour and minute each day when MED-V should wake up the guest for automatic updating, by using the 24-hour clock standard. Specify the time in the format HH:MM

    +

    For more information about guest patching for automatic updating, see Managing Automatic Updates for MED-V Workspaces.

    -

    HostMemToGuestMem 

    +

    HostMemToGuestMem

    MULTI_SZ

    -

    1024, 2048, 4096, 8192, 16384 

    -

    A list of memory (MB) values for the guest, determined by the RAM available on the host. Combined with GuestMemFromHostMem, a lookup table is created to determine how much RAM to allocate on the guest virtual machine. Possible values can be from 1024 to 16384.

    +

    1024, 2048, 4096, 8192, 16384

    +

    A list of memory (MB) values for the guest, determined by the RAM available on the host. Combined with GuestMemFromHostMem, a lookup table is created to determine how much RAM to allocate on the guest virtual machine. Possible values can be from 1024 to 16384.

    HostMemToGuestMemCalcEnabled

    DWORD

    Default=1

    -

    Configures whether the memory allocated for the guest is calculated from the memory present on the host.  0 = false; 1 = true.

    +

    Configures whether the memory allocated for the guest is calculated from the memory present on the host. 0 = false; 1 = true.

    @@ -659,16 +656,16 @@ The following table provides information about the registry values associated wi

    1 = true: The memory allocated for the guest is calculated from the memory present on the host.

    -

    Memory 

    +

    Memory

    DWORD

    Default=512

    -

    The RAM (MB) that should be allocated for the guest virtual machine. This setting is ignored if the HostMemToGuestMemEnabled setting is enabled. Range=128 to 2048.

    +

    The RAM (MB) that should be allocated for the guest virtual machine. This setting is ignored if the HostMemToGuestMemEnabled setting is enabled. Range=128 to 2048.

    -

    MultiUserEnabled 

    +

    MultiUserEnabled

    DWORD

    Default=0

    -

    Configures whether multiple users share the same MED-V workspace.  0 = false; 1 = true.

    +

    Configures whether multiple users share the same MED-V workspace. 0 = false; 1 = true.

    @@ -683,10 +680,10 @@ The following table provides information about the registry values associated wi

    1 = true: Multiple users share the same MED-V workspace.

    -

    NetworkingMode 

    +

    NetworkingMode

    SZ

    Default=NAT

    -

    The kind of network connection used on the guest. Possible values are as follows:

    +

    The kind of network connection used on the guest. Possible values are as follows:

    @@ -698,18 +695,18 @@ The following table provides information about the registry values associated wi

    -

    NAT. MED-V uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    +

    NAT. MED-V uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    -

    TaskTimeout 

    +

    TaskTimeout

    DWORD

    Default=600

    -

    A general time-out value, in seconds, that MED-V waits for a task to be completed, such as restarting and shutting down. Range = 0 to 2147483647.

    +

    A general time-out value, in seconds, that MED-V waits for a task to be completed, such as restarting and shutting down. Range = 0 to 2147483647.

    -  + ## Guest Registry Settings @@ -729,17 +726,17 @@ The following table provides information about the guest registry value associat -Name  -Type  -Data/Default  +Name +Type +Data/Default Description

    EnableGPWorkarounds

    -

    DWORD 

    -

    Default=1 

    +

    DWORD

    +

    Default=1

    Configures how MED-V handles the keys BufferPolicyReads and GroupPolicyMinTransferRate.

    @@ -748,13 +745,12 @@ The following table provides information about the guest registry value associat

    By default, MED-V sets these keys as follows:

    BufferPolicyReads=1 and GroupPolicyMinTransferRate=0.

    -

    Create the EnableGPWorkarounds  key, if it is necessary, and set the key to zero if you do not want MED-V to change the default settings of BufferPolicyReads and GroupPolicyMinTransferRate.

    +

    Create the EnableGPWorkarounds key, if it is necessary, and set the key to zero if you do not want MED-V to change the default settings of BufferPolicyReads and GroupPolicyMinTransferRate.

    -Note   -

    If your MED-V workspace is running in NAT mode, EnableGPWorkarounds affects the registry keys BufferPolicyReads and GroupPolicyMinTransferRate. If your MED-V workspace is running in BRIDGED mode, EnableGPWorkarounds only affects the registry key BufferPolicyReads.

    +Note

    If your MED-V workspace is running in NAT mode, EnableGPWorkarounds affects the registry keys BufferPolicyReads and GroupPolicyMinTransferRate. If your MED-V workspace is running in BRIDGED mode, EnableGPWorkarounds only affects the registry key BufferPolicyReads.

    -  +

    1=true: MED-V sets the keys BufferPolicyReads=1 and GroupPolicyMinTransferRate=0 (if running in NAT mode) or just BufferPolicyReads=1 (if running in BRIDGED mode).

    0=false: MED-V does not make any changes to the keys BufferPolicyReads and GroupPolicyMinTransferRate.

    @@ -762,7 +758,7 @@ The following table provides information about the guest registry value associat -  + ## Related topics @@ -773,9 +769,9 @@ The following table provides information about the guest registry value associat [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  - -  + + + diff --git a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md index 77ab2350c8..4ceab3afe3 100644 --- a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md +++ b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md @@ -29,7 +29,7 @@ The WMI provider is implemented in the **root\\microsoft\\medv** namespace and i **Caution**   WMI browsing tools can be used to delete or modify classes and instances. Deleting or modifying certain classes and instances can result in the loss of valuable data and cause MED-V to function unpredictably. -  + You can use your preferred WMI browsing tool to view and edit MED-V configuration settings by following these steps. @@ -56,7 +56,7 @@ After you have finished viewing or editing MED-V configuration settings, close t **Important**   In some cases, a restart of the MED-V workspace is required for changes to MED-V configuration settings to take effect. -  + The following code shows the Managed Object Format (MOF) file that defines the **Setting** class. @@ -64,9 +64,9 @@ The following code shows the Managed Object Format (MOF) file that defines the * [dynamic: ToInstance, provider("TroubleShooting, Version=2.0.392.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"), singleton: DisableOverride ToInstance ToSubClass] class Setting : ConfigValueProvider { -                boolean UxSmartCardLogonEnabled = TRUE; -                [read] string User; -                [implemented] void Clear([in] string propertyName); + boolean UxSmartCardLogonEnabled = TRUE; + [read] string User; + [implemented] void Clear([in] string propertyName); }; ``` @@ -76,55 +76,55 @@ The **Setting** class inherits from the **ConfigValueProvider** class. The follo [abstract] class ConfigValueProvider { -                [write] string DiagEventLogLevel; -                [write] boolean FtsAddUserToAdminGroupEnabled; -                [write] string FtsComputerNameMask; -                [write] sint32 FtsDeleteVMStateTimeout; -                [write] sint32 FtsDetachVfdTimeout; -                [write] string FtsDialogUrl; -                [write] sint32 FtsExplorerTimeout; -                [write] string FtsFailureDialogMsg; -                [write] string FtsLogFilePaths[]; -                [write] sint32 FtsMaxPostponeTime; -                [write] sint32 FtsMaxRetryCount; -                [write] string FtsMode; -                [write] sint32 FtsNonInteractiveRetryTimeoutInc; -                [write] sint32 FtsNonInteractiveTimeout; -                [write] string FtsPostponeUtcDateTimeLimit; -                [write] string FtsRetryDialogMsg; -                [write] boolean FtsSetComputerNameEnabled; -                [write] boolean FtsSetJoinDomainEnabled; -                [write] boolean FtsSetMachineObjectOUEnabled; -                [write] boolean FtsSetRegionalSettingsEnabled; -                [write] boolean FtsSetUserDataEnabled; -                [write] string FtsStartDialogMsg; -                [write] sint32 FtsTaskCancelTimeout; -                [write] sint32 FtsTaskVMTurnOffTimeout; -                [write] sint32 FtsUpgradeTimeout; -                [write] boolean UxAppPublishingEnabled; -                [write] boolean UxAudioSharingEnabled; -                [write] boolean UxClipboardSharingEnabled; -                [write] boolean UxCredentialCacheEnabled; -                [write] sint32 UxDialogTimeout; -                [write] sint32 UxHideVmTimeout; -                [write] boolean UxLogonStartEnabled; -                [write] boolean UxPrinterSharingEnabled; -                [write] sint32 UxRebootAbsoluteDelayTimeout; -                [write] string UxRedirectUrls[]; -                [write] boolean UxShowExit; -                [write] boolean UxSmartCardLogonEnabled; -                [write] boolean UxSmartCardSharingEnabled; -                [write] boolean UxUSBDeviceSharingEnabled; -                [write] string VmCloseAction; -                [write] sint32 VmGuestMemFromHostMem[]; -                [write] sint32 VmGuestUpdateDuration; -                [write] string VmGuestUpdateTime; -                [write] sint32 VmHostMemToGuestMem[]; -                [write] boolean VmHostMemToGuestMemCalcEnabled; -                [write] sint32 VmMemory; -                [write] boolean VmMultiUserEnabled; -                [write] string VmNetworkingMode; -                [write] sint32 VmTaskTimeout; + [write] string DiagEventLogLevel; + [write] boolean FtsAddUserToAdminGroupEnabled; + [write] string FtsComputerNameMask; + [write] sint32 FtsDeleteVMStateTimeout; + [write] sint32 FtsDetachVfdTimeout; + [write] string FtsDialogUrl; + [write] sint32 FtsExplorerTimeout; + [write] string FtsFailureDialogMsg; + [write] string FtsLogFilePaths[]; + [write] sint32 FtsMaxPostponeTime; + [write] sint32 FtsMaxRetryCount; + [write] string FtsMode; + [write] sint32 FtsNonInteractiveRetryTimeoutInc; + [write] sint32 FtsNonInteractiveTimeout; + [write] string FtsPostponeUtcDateTimeLimit; + [write] string FtsRetryDialogMsg; + [write] boolean FtsSetComputerNameEnabled; + [write] boolean FtsSetJoinDomainEnabled; + [write] boolean FtsSetMachineObjectOUEnabled; + [write] boolean FtsSetRegionalSettingsEnabled; + [write] boolean FtsSetUserDataEnabled; + [write] string FtsStartDialogMsg; + [write] sint32 FtsTaskCancelTimeout; + [write] sint32 FtsTaskVMTurnOffTimeout; + [write] sint32 FtsUpgradeTimeout; + [write] boolean UxAppPublishingEnabled; + [write] boolean UxAudioSharingEnabled; + [write] boolean UxClipboardSharingEnabled; + [write] boolean UxCredentialCacheEnabled; + [write] sint32 UxDialogTimeout; + [write] sint32 UxHideVmTimeout; + [write] boolean UxLogonStartEnabled; + [write] boolean UxPrinterSharingEnabled; + [write] sint32 UxRebootAbsoluteDelayTimeout; + [write] string UxRedirectUrls[]; + [write] boolean UxShowExit; + [write] boolean UxSmartCardLogonEnabled; + [write] boolean UxSmartCardSharingEnabled; + [write] boolean UxUSBDeviceSharingEnabled; + [write] string VmCloseAction; + [write] sint32 VmGuestMemFromHostMem[]; + [write] sint32 VmGuestUpdateDuration; + [write] string VmGuestUpdateTime; + [write] sint32 VmHostMemToGuestMem[]; + [write] boolean VmHostMemToGuestMemCalcEnabled; + [write] sint32 VmMemory; + [write] boolean VmMultiUserEnabled; + [write] string VmNetworkingMode; + [write] sint32 VmTaskTimeout; }; ``` @@ -135,9 +135,9 @@ class ConfigValueProvider [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  + -  + diff --git a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md index a9bf24e246..f82ac07a75 100644 --- a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md +++ b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md @@ -21,67 +21,65 @@ You can use the MED-V Workspace Packager to manage certain settings in the MED-V **To manage settings in a MED-V workspace** -1. To open the **MED-V Workspace Packager**, click **Start**, click **All Programs**, click **Microsoft Enterprise Desktop Virtualization**, and then click **MED-V Workspace Packager**. +1. To open the **MED-V Workspace Packager**, click **Start**, click **All Programs**, click **Microsoft Enterprise Desktop Virtualization**, and then click **MED-V Workspace Packager**. -2. On the **MED-V Workspace Packager** main panel, click **Manage Settings**. +2. On the **MED-V Workspace Packager** main panel, click **Manage Settings**. -3. In the **Manage Settings** window, you can configure the following MED-V workspace settings: +3. In the **Manage Settings** window, you can configure the following MED-V workspace settings: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Start MED-V workspace

    Choose whether to start the MED-V workspace at user logon, at first use, or to let the end user decide when the MED-V workspace starts.

    The MED-V workspace starts in one of two ways: either when the end user logs on or when they first perform an action that requires MED-V, such as opening a published application or entering a URL that requires redirection.

    -

    You can either define this setting for the end user or let the end user control how MED-V starts.

    -
    - Note   -

    If you specify that the end user decides, the default behavior they experience is that the MED-V workspace starts when they log on. They can change the default by right-clicking the MED-V icon in the notification area and selecting MED-V User Settings. If you define this setting for the end user, they cannot change the way in which MED-V starts.

    -
    -
    -   -

    Networking

    Select Shared or Bridged for your networking setting. The default is Shared.

    Shared - The MED-V workspace uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    -

    Bridged - The MED-V workspace has its own network address, typically obtained through DHCP.

    Store credentials

    Choose whether you want to store the end user credentials.

    The default behavior is that credential storing is disabled so that the end user must be authenticated every time that they log on.

    -
    - Important   -

    Even though caching the end user’s credentials provides the best user experience, you should be aware of the risks involved.

    -

    The end user’s domain credential is stored in a reversible format in the Windows Credential Manager. An attacker could write a program that retrieves the password and thus gain access to the user’s credentials. You can only lessen this risk by disabling the storing of end user credentials.

    -
    -
    -   -
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

    Start MED-V workspace

    Choose whether to start the MED-V workspace at user logon, at first use, or to let the end user decide when the MED-V workspace starts.

    The MED-V workspace starts in one of two ways: either when the end user logs on or when they first perform an action that requires MED-V, such as opening a published application or entering a URL that requires redirection.

    +

    You can either define this setting for the end user or let the end user control how MED-V starts.

    +
    + Note

    If you specify that the end user decides, the default behavior they experience is that the MED-V workspace starts when they log on. They can change the default by right-clicking the MED-V icon in the notification area and selecting MED-V User Settings. If you define this setting for the end user, they cannot change the way in which MED-V starts.

    +
    +
    -   +

    Networking

    Select Shared or Bridged for your networking setting. The default is Shared.

    Shared - The MED-V workspace uses Network Address Translation (NAT) to share the host's IP for outgoing traffic.

    +

    Bridged - The MED-V workspace has its own network address, typically obtained through DHCP.

    Store credentials

    Choose whether you want to store the end user credentials.

    The default behavior is that credential storing is disabled so that the end user must be authenticated every time that they log on.

    +
    + Important

    Even though caching the end user’s credentials provides the best user experience, you should be aware of the risks involved.

    +

    The end user’s domain credential is stored in a reversible format in the Windows Credential Manager. An attacker could write a program that retrieves the password and thus gain access to the user’s credentials. You can only lessen this risk by disabling the storing of end user credentials.

    +
    +
    -4. Click **Save as…** to save the updated configuration settings in the specified folder. MED-V creates a registry file that contains the updated settings. Deploy the updated registry file by using Group Policy. For more information about how to use Group Policy, see [Group Policy Software Installation](https://go.microsoft.com/fwlink/?LinkId=195931) (https://go.microsoft.com/fwlink/?LinkId=195931). +
    - MED-V also creates a Windows PowerShell script in the specified folder that you can use to re-create this updated registry file. + + +4. Click **Save as…** to save the updated configuration settings in the specified folder. MED-V creates a registry file that contains the updated settings. Deploy the updated registry file by using Group Policy. For more information about how to use Group Policy, see [Group Policy Software Installation](https://go.microsoft.com/fwlink/?LinkId=195931) (https://go.microsoft.com/fwlink/?LinkId=195931). + + MED-V also creates a Windows PowerShell script in the specified folder that you can use to re-create this updated registry file. ## Related topics @@ -90,9 +88,9 @@ You can use the MED-V Workspace Packager to manage certain settings in the MED-V [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  - -  + + + diff --git a/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md b/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md index 252992aabd..cf173e2d6d 100644 --- a/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md +++ b/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md @@ -29,14 +29,14 @@ In most cases, MED-V handles printer redirection automatically. After first time **Note**   If applications are running on the MED-V workspace, the end user is prompted to let the restart continue or postpone it until later. If no applications are running, the restart is automatic and not shown to the end user. -  + Every time MED-V is re-started, it checks whether any new printers are installed on the host and, if found, retrieves the corresponding drivers from the network print server and installs them on the guest. MED-V then restarts the MED-V workspace just as when first time setup was completed. **Important**   After the relevant drivers are installed on the guest, the printers only become visible on the guest after the restart occurs. -  + If at any time a driver cannot be located or installed, it must be manually installed on the guest for the network printer to be available to the end user. @@ -51,16 +51,16 @@ The following list offers some additional guidance: **Warning**   If a printer is manually installed on the guest, and the same printer is later installed on the host, the result is that the printer is installed two times in the guest. To avoid this situation, a MED-V best practice is to manage printer redirection in one manner only: either disable redirection and install printers manually on the guest, or enable redirection and do not install printers manually on the guest. -  + ## Related topics [Manage MED-V Workspace Settings](manage-med-v-workspace-settings.md) -  + -  + diff --git a/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md b/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md index 838c2b6a1c..4dd09c0751 100644 --- a/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md +++ b/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md @@ -22,7 +22,7 @@ You have several different options available to you for providing software updat **Note**   For information about how to specify the configuration settings that define how MED-V receives automatic updates, see [Managing Automatic Updates for MED-V Workspaces](managing-automatic-updates-for-med-v-workspaces.md). -  + **Updating Software in a MED-V Workspace** @@ -45,7 +45,7 @@ For information about how to specify the configuration settings that define how **Important**   We do not recommend this method of managing software updates. In addition, if you update software in the core image and redeploy the MED-V workspace back out to your enterprise, first time setup must run again, and any data saved in the virtual machine is lost. -   + ## Related topics @@ -56,9 +56,9 @@ For information about how to specify the configuration settings that define how [How to Publish and Unpublish an Application on the MED-V Workspace](how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md) -  + -  + diff --git a/mdop/medv-v2/med-v-20-best-practices.md b/mdop/medv-v2/med-v-20-best-practices.md index 8edf9ea8a0..e402342e9f 100644 --- a/mdop/medv-v2/med-v-20-best-practices.md +++ b/mdop/medv-v2/med-v-20-best-practices.md @@ -50,7 +50,7 @@ If you want end users to see a service level agreement (SLA) before they access **Caution**   Even though a best practice is to run first time setup in **Unattended** mode, if you decide to set the local policy or registry entry to include an SLA in your image (virtual hard disk), you must also specify that first time setup is run in **Attended** mode, or first time setup can fail. -  + ### Compact the virtual hard disk @@ -101,9 +101,9 @@ To prevent antivirus activity from affecting the performance of the virtual desk [Security and Protection for MED-V](security-and-protection-for-med-v.md) -  + -  + diff --git a/mdop/medv-v2/med-v-20-deployment-overview.md b/mdop/medv-v2/med-v-20-deployment-overview.md index 2608c24bb9..eb8d227f1d 100644 --- a/mdop/medv-v2/med-v-20-deployment-overview.md +++ b/mdop/medv-v2/med-v-20-deployment-overview.md @@ -24,10 +24,10 @@ This section provides general information and instructions about how to install MED-V 2.0 is based on an application model, where the same methods that you use to deploy applications can be used to deploy and manage MED-V. A deployed MED-V solution includes two components: the MED-V Host Agent and Guest Agent. The MED-V Host Agent is installed on the Windows 7 desktop and the MED-V Guest Agent is installed on Windows XP inside the MED-V workspace. MED-V also includes a MED-V Workspace Packager that provides the information and tools necessary for creating and configuring MED-V workspaces. -**Important**   +**Important** MED-V only supports the installation of the MED-V Workspace Packager, the MED-V Host Agent, and the MED-V workspace for all users. Installing MED-V for the current user only by selecting **ALLUSERS=””** causes failures in the installation of the components and in the setup of the MED-V workspace. -  + ### The MED-V Installation Files @@ -41,10 +41,10 @@ The Host Agent installation file is named MED-V\_HostAgent\_Setup.exe. This file The MED-V Workspace Packager installation file is named MED-V\_WorkspacePackager\_Setup.exe. Use this file to install the MED-V Workspace Packager on a computer where you have administrator rights and permissions. The desktop administrator uses the MED-V Workspace Packager to create and manage MED-V workspaces. -**Note**   +**Note** The MED-V Guest Agent is installed automatically during first time setup. -  + ### The MED-V Deployment Process @@ -56,10 +56,10 @@ The following is a high-level overview of the MED-V installation and deployment 3. Deploy the required MED-V components throughout your enterprise. The required components of MED-V are Windows Virtual PC, the MED-V Host Agent, and the MED-V workspace. -**Important**   +**Important** Installation of the MED-V components requires administrative credentials. If an end user is installing MED-V, they are prompted to enter administrative credentials. Alternately, administrative credentials can be provided in context if you are installing by using an electronic software distribution (ESD) system. -  + ### The MED-V Components @@ -89,10 +89,10 @@ To deploy MED-V, copy all the required installation files to the host computer o You can perform the installation manually. However, we recommend that you use an electronic software distribution method to automate the deployment of the components. For more information, see [How to Deploy a MED-V Workspace Through an Electronic Software Distribution System](how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md). -**Note**   +**Note** For information about available command-line arguments to control install options, see [Command-Line Options for MED-V Installation Files](command-line-options-for-med-v-installation-files.md). -  + ## Deployment Steps @@ -105,29 +105,33 @@ When you deploy MED-V throughout your enterprise, there are two main considerati You can install these as part of the Windows 7 installations before you install MED-V, or you can install them as part of the MED-V distribution. However, MED-V does not include a mechanism for their deployment; they must be deployed by using an electronic software distribution (ESD) system or as part of the Windows 7 image. - **Important**   + **Important** When you install the MED-V components by using a batch file, a best practice is to specify that Windows Virtual PC and the Windows Virtual PC hotfix are installed after the MED-V Host Agent and the MED-V workspace package files. This means that Windows Update will not cause any interference with the installation process by requiring a restart. -   - **Note**   - After you install Windows Virtual PC, the computer must be restarted. -   +~~~ +**Note** +After you install Windows Virtual PC, the computer must be restarted. +~~~ -2. **MED-V Host Agent** – Install the MED-V Host Agent on the Windows 7 computer where MED-V will be run. This must be installed before installing the MED-V workspace and checks to make sure that Windows Virtual PC is installed. -3. **MED-V workspace** – You create the files that are required in this installation by using the MED-V Workspace Packager: the setup.exe, .medv, and .msi files. To install the MED-V workspace, run setup.exe; this triggers the other files as required. The installation places an entry in the registry under the local machine run key to start the MED-V Host Agent, which always runs MED-V when Windows is started. - **Important**   - The installation of the MED-V workspace can be run interactively by the end user or silently through an electronic software distribution system. Installation of the MED-V workspace requires administrative credentials, so end users must be administrators of their computers to install the MED-V workspace. Alternately, an electronic software distribution system typically runs in the system context and has sufficient permissions. +2. **MED-V Host Agent** – Install the MED-V Host Agent on the Windows 7 computer where MED-V will be run. This must be installed before installing the MED-V workspace and checks to make sure that Windows Virtual PC is installed. -   +3. **MED-V workspace** – You create the files that are required in this installation by using the MED-V Workspace Packager: the setup.exe, .medv, and .msi files. To install the MED-V workspace, run setup.exe; this triggers the other files as required. The installation places an entry in the registry under the local machine run key to start the MED-V Host Agent, which always runs MED-V when Windows is started. + + **Important** + The installation of the MED-V workspace can be run interactively by the end user or silently through an electronic software distribution system. Installation of the MED-V workspace requires administrative credentials, so end users must be administrators of their computers to install the MED-V workspace. Alternately, an electronic software distribution system typically runs in the system context and has sufficient permissions. + + + +~~~ +**Tip** +Because of problems that can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe. +~~~ - **Tip**   - Because of problems that can occur when you install MED-V from a network location, we recommend that you copy the MED-V workspace setup files locally and then run setup.exe. -   ### First Time Setup @@ -152,9 +156,9 @@ After first time setup is complete, the end user is notified that the published [Deployment of MED-V](deployment-of-med-v.md) -  - -  + + + diff --git a/mdop/medv-v2/med-v-20-release-notes.md b/mdop/medv-v2/med-v-20-release-notes.md index 8a77376bd5..51c9d5c1c7 100644 --- a/mdop/medv-v2/med-v-20-release-notes.md +++ b/mdop/medv-v2/med-v-20-release-notes.md @@ -41,7 +41,7 @@ This section provides the most up-to-date information about issues with the Micr **Note**   There are currently no known issues with MED-V 2.0. -  + ## Release Notes Copyright Information @@ -58,9 +58,9 @@ Microsoft, Active Directory, ActiveSync, MS-DOS, Windows, Windows Server, and W All other trademarks are property of their respective owners. -  + -  + diff --git a/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md b/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md index 17bf709dbb..4a1f38168d 100644 --- a/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md +++ b/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md @@ -36,7 +36,7 @@ For information about how to open the MED-V Administration Toolkit, see [Trouble **Warning**   Resetting the MED-V workspace causes first time setup to run again, and thus reloads the original virtual hard disk. All data that is stored in the MED-V workspace since first time setup was originally run will be deleted. -   + 2. Click **Reset**. @@ -49,9 +49,9 @@ For information about how to open the MED-V Administration Toolkit, see [Trouble [Viewing MED-V Workspace Configurations](viewing-med-v-workspace-configurations.md) -  + -  + diff --git a/mdop/medv-v2/viewing-and-configuring-med-v-logs.md b/mdop/medv-v2/viewing-and-configuring-med-v-logs.md index 4fb86e486b..831ec64b9b 100644 --- a/mdop/medv-v2/viewing-and-configuring-med-v-logs.md +++ b/mdop/medv-v2/viewing-and-configuring-med-v-logs.md @@ -31,7 +31,7 @@ Event Viewer opens and displays the corresponding event logs that you can use to **Note**   End users can only save event log files in the guest if they have administrative permissions. -  + ### To manually open the Event Viewer in the host computer @@ -51,7 +51,7 @@ You can also specify the event logging level by editing the EventLogLevel regist **Note**   The level you specify on the **MED-V Administration Toolkit** window applies to future MED-V event logging. If you set the level to capture all errors, warnings, and informational messages, then the event logs fill more quickly and older events are removed. -  + ## Related topics @@ -60,9 +60,9 @@ The level you specify on the **MED-V Administration Toolkit** window applies to [Viewing MED-V Workspace Configurations](viewing-med-v-workspace-configurations.md) -  + -  + diff --git a/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md b/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md index bdbd6e496b..6b98064476 100644 --- a/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md +++ b/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md @@ -51,7 +51,7 @@ Windows Virtual PC includes a feature known as the "Exclude List" that lets you **Important**   If applicable, remove the quotation marks from the full path when you enter it into the value data field. -   + 5. Close Registry Editor and restart the MED-V workspace virtual machine. @@ -66,9 +66,9 @@ You can also republish an excluded application to the host **Start** menu by del [How to Publish and Unpublish an Application on the MED-V Workspace](how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md) -  + -  + diff --git a/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md b/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md index a9f323bdbc..b2c6ffe718 100644 --- a/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md +++ b/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md @@ -144,10 +144,10 @@ If used, the two sample batch files provided run the SQL scripts in the followin - dbversion.sql -**Note**   +**Note** Careful consideration when modifying the scripts must be taken and should only be done by someone with the appropriate knowledge. Also, of the sample files presented only the following should be changed: **create\_schema.bat**, **create\_tables.bat**, **database.sql**, and **roles.sql**. All other files should not be modified in any way as this could cause the database to be created incorrectly, which will lead to the failure of App-V services to be installed. -  + The two sample batch files must be placed in the same directory where the rest of the SQL scripts were copied to on the computer. @@ -206,7 +206,7 @@ The following accounts will need to be created on the SQL server with specific p 2. Administrator in the “App-V Admins” group logs in to Application Virtualization Management Console and deletes the following objects from the Management Console. - **Warning**   + **Warning** This is required as the traditional setup populates certain records in the database that are not populated if you run the install against an already existing database. Delete the following objects: - Under “Server Groups,” “Default Server Group,” delete “Application Virtualization Management Server” @@ -215,7 +215,7 @@ The following accounts will need to be created on the SQL server with specific p - Under “Provider Policies,” delete “Default Provider” -   + 3. Administrator in the App-V admins group should then create: @@ -223,32 +223,34 @@ The following accounts will need to be created on the SQL server with specific p - Create a “Default Server Group” - **Note**   - You must create a “Default Server” group even if you will not be used. The server installer only looks for the "Default Server Group" when trying to add the server.  If there is no "Default Server Group" then the installation will fail. If you plan on using server groups other than the default that is fine, it’s just necessary to retain the "Default Server Group" if you plan on adding subsequent App-V Management Servers to your infrastructure. + **Note** + You must create a “Default Server” group even if you will not be used. The server installer only looks for the "Default Server Group" when trying to add the server. If there is no "Default Server Group" then the installation will fail. If you plan on using server groups other than the default that is fine, it’s just necessary to retain the "Default Server Group" if you plan on adding subsequent App-V Management Servers to your infrastructure. -   - - Assign the App-V Users Group to the New Provider Policy created above - - Under “Server Groups,” create a New Server Group, specifying the New Provider Policy +~~~ +- Assign the App-V Users Group to the New Provider Policy created above - - Under the New Server group, create a New Application Virtualization Management Server +- Under “Server Groups,” create a New Server Group, specifying the New Provider Policy - **Important**   - Do not restart the service before completing all of the above steps! +- Under the New Server group, create a New Application Virtualization Management Server -   + **Important** + Do not restart the service before completing all of the above steps! - - Administrator restarts the Application Virtualization Management Server service. + + +- Administrator restarts the Application Virtualization Management Server service. +~~~ ## Conclusion In conclusion, the information in this document allows an administrator to work with the SQL administrators to develop a deployment path that works for the security and administrative divisions in an organization. After reading this document and testing the tasks documented, an administrator should be ready to implement their App-V infrastructure in this type of environment. -  - -  + + + diff --git a/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md b/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md index 7d59d2e47f..080458ef89 100644 --- a/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md +++ b/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md @@ -23,69 +23,69 @@ You can manage the feature settings of certain Microsoft Desktop Optimization Pa **How to download and deploy the MDOP Group Policy templates** -1. Download the latest [MDOP Group Policy templates](https://www.microsoft.com/en-us/download/details.aspx?id=55531) +1. Download the latest [MDOP Group Policy templates](https://www.microsoft.com/en-us/download/details.aspx?id=55531) -2. Expand the downloaded .cab file by running `expand \MDOP_ADMX_Templates.cab -F:* ` +2. Expand the downloaded .cab file by running `expand \MDOP_ADMX_Templates.cab -F:* ` - **Warning**   - Do not extract the templates directly to the Group Policy deployment directory. Multiple technologies and versions are bundled in this file. + **Warning** + Do not extract the templates directly to the Group Policy deployment directory. Multiple technologies and versions are bundled in this file. -3. In the extracted folder, locate the technology-version .admx file. Certain MDOP technologies have multiple sets of Group Policy Objects (GPOs). For example, MBAM includes MBAM Management settings and MBAM User settings. +3. In the extracted folder, locate the technology-version .admx file. Certain MDOP technologies have multiple sets of Group Policy Objects (GPOs). For example, MBAM includes MBAM Management settings and MBAM User settings. -4. Locate the appropriate .adml file by language-culture (that is, *en-us* for English-United States). +4. Locate the appropriate .adml file by language-culture (that is, *en-us* for English-United States). -5. Copy the .admx and .adml files to a policy definition folder. Depending on where you store the templates, you can configure Group Policy settings from the local device or from any computer on the domain. +5. Copy the .admx and .adml files to a policy definition folder. Depending on where you store the templates, you can configure Group Policy settings from the local device or from any computer on the domain. - **Local files:** To configure Group Policy settings from the local device, copy template files to the following locations: - - - - - - - - - - - - - - - - - - - - -
    File typeFile location

    Group Policy template (.admx)

    %systemroot%\policyDefinitions

    Group Policy language file (.adml)

    %systemroot%\policyDefinitions\[MUIculture]

    + + + + + + + File type + File location + + + + +

    Group Policy template (.admx)

    +

    %systemroot%<strong>policyDefinitions

    + + +

    Group Policy language file (.adml)

    +

    %systemroot%<strong>policyDefinitions[MUIculture]

    + + + - **Domain central store:** To enable Group Policy settings configuration by a Group Policy administrator from any computer on the domain, copy files to the following locations on the domain controller: - - - - - - - - - - - - - - - - - - - - -
    File typeFile location

    Group Policy template (.admx)

    %systemroot%\sysvol\domain\policies\PolicyDefinitions

    Group Policy language file (.adml)

    %systemroot%\sysvol\domain\policies\PolicyDefinitions\[MUIculture]\[MUIculture]

    -

    For example, the U.S. English ADML language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us.

    + + + + + + + File type + File location + + + + +

    Group Policy template (.admx)

    +

    %systemroot%<strong>sysvol\domain\policies\PolicyDefinitions

    + + +

    Group Policy language file (.adml)

    +

    %systemroot%<strong>sysvol\domain\policies\PolicyDefinitions[MUIculture][MUIculture]

    +

    For example, the U.S. English ADML language-specific file will be stored in %systemroot%\sysvol\domain\policies\PolicyDefinitions\en-us.

    + + + 6. Edit the Group Policy settings using Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM) to configure Group Policy settings for the MDOP technology. @@ -110,42 +110,42 @@ For more information about supported MDOP Group Policy, see the specific documen

    Application Virtualization (App-V)

    App-V 5.0 and App-V 5.0 Service Packs

    -

    [How to Modify App-V 5.0 Client Configuration Using the ADMX Template and Group Policy](../appv-v5/how-to-modify-app-v-50-client-configuration-using-the-admx-template-and-group-policy.md)

    +

    How to Modify App-V 5.0 Client Configuration Using the ADMX Template and Group Policy

    User Experience Virtualization (UE-V)

    UE-V 2.0 and UE-V 2.1

    -

    [Configuring UE-V 2.x with Group Policy Objects](../uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md)

    +

    Configuring UE-V 2.x with Group Policy Objects

    UE-V 1.0 including 1.0 SP1

    -

    [Configuring UE-V with Group Policy Objects](../uev-v1/configuring-ue-v-with-group-policy-objects.md)

    +

    Configuring UE-V with Group Policy Objects

    Microsoft BitLocker Administration and Monitoring (MBAM)

    MBAM 2.5

    -

    [Planning for MBAM 2.5 Group Policy Requirements](../mbam-v25/planning-for-mbam-25-group-policy-requirements.md)

    +

    Planning for MBAM 2.5 Group Policy Requirements

    MBAM 2.0 including 2.0 SP1

    -

    [Planning for MBAM 2.0 Group Policy Requirements](../mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md)

    -

    [Deploying MBAM 2.0 Group Policy Objects](../mbam-v2/deploying-mbam-20-group-policy-objects-mbam-2.md)

    +

    Planning for MBAM 2.0 Group Policy Requirements

    +

    Deploying MBAM 2.0 Group Policy Objects

    MBAM 1.0

    -

    [How to Edit MBAM 1.0 GPO Settings](../mbam-v1/how-to-edit-mbam-10-gpo-settings.md)

    +

    How to Edit MBAM 1.0 GPO Settings

    -  + -  + -  + diff --git a/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md b/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md index 43d84169b9..ddac76e38c 100644 --- a/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md +++ b/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md @@ -141,12 +141,12 @@ UE-V 1.0 Service Pack 1 provides updates for both the UE-V Agent and the UE-V Ge -  + **Important**   While the UE-V Agent installation program (AgentSetup.exe) and UE-V Generator installation program (ToolSetup.exe) are translated into the languages above, the Windows Installer (.msi) files are only available in English. -  + ## Office 2007 Settings Location Templates @@ -261,11 +261,11 @@ When running the UE-V setup for UE-V Agent (AgentSetup.exe), the following retur -  + -  + -  + diff --git a/mdop/uev-v1/accessibility-for-ue-v.md b/mdop/uev-v1/accessibility-for-ue-v.md index 5cbdc15111..710364b2ab 100644 --- a/mdop/uev-v1/accessibility-for-ue-v.md +++ b/mdop/uev-v1/accessibility-for-ue-v.md @@ -33,7 +33,7 @@ You can access most commands by using two keystrokes. To use an access key: **Note**   To cancel the action that you are taking and hide the keyboard shortcuts, press ALT. -  + ### Documentation in alternative formats @@ -66,13 +66,13 @@ For information about the availability of Microsoft product documentation and bo

    (609) 987-8116

    -

    [http://www.learningally.org/](https://go.microsoft.com/fwlink/p/?linkid=239)

    +

    http://www.learningally.org/

    Web addresses can change, so you might be unable to connect to the website or sites that are mentioned here.

    -  + ### Customer service for people with hearing impairments @@ -94,9 +94,9 @@ For more information about how accessible technology for computers can help to i [Getting Started With User Experience Virtualization 1.0](getting-started-with-user-experience-virtualization-10.md) -  + -  + diff --git a/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md b/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md index 52ac1dbab4..4ff6a7f274 100644 --- a/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md +++ b/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md @@ -45,13 +45,13 @@ The following policy settings can be configured for UE-V:

    Settings storage path

    Computers and Users

    This policy setting configures where the user settings will be stored.

    -

    Provide a Universal Naming Convention (UNC) path and variables such as \\Server\SettingsShare\%username%.

    +

    Provide a Universal Naming Convention (UNC) path and variables such as \Server\SettingsShare%username%.

    Settings template catalog path

    Computers Only

    This policy setting configures where custom settings location templates are stored. This policy setting also configures whether the catalog will be used to replace the default Microsoft templates that are installed with the UE-V agent.

    -

    Provide a Universal Naming Convention (UNC) path such as \\Server\TemplateShare or a folder location on the computer.

    +

    Provide a Universal Naming Convention (UNC) path such as \Server\TemplateShare or a folder location on the computer.

    Select the check box to replace the default Microsoft templates.

    @@ -95,7 +95,7 @@ The following policy settings can be configured for UE-V: -  + **To configure computer-targeted policies** @@ -128,9 +128,9 @@ The UE-V agent uses the following order of precedence to determine synchronizati [Operations for UE-V 1.0](operations-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md b/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md index 30a6a4fad1..57534783a3 100644 --- a/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md +++ b/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md @@ -32,7 +32,7 @@ The UE-V Generator monitors an application to discover and capture the locations **Note**   UE-V templates cannot be created from virtualized applications or terminal services applications. However, settings synchronized using the templates can be applied to those applications. To create templates that support Virtual Desktop Infrastructure (VDI) and terminal services applications, open a Windows Installer File (.msi) version of the application with UE-V Generator. -  + **Excluded Locations** @@ -68,7 +68,7 @@ Use the UE-V Generator to create settings location templates for line-of-busines **Note**   Before the application is started, the system displays a prompt for **User Account Control**. Permission is required to monitor the registry and file locations that the application uses to store settings. -   + 4. After the application starts, close the application. The UE-V Generator records the locations where the application stores its settings. @@ -115,9 +115,9 @@ Use the UE-V Generator to create settings location templates for line-of-busines [Operations for UE-V 1.0](operations-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md b/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md index 01763c96b5..7a2b1288e2 100644 --- a/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md +++ b/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md @@ -59,7 +59,7 @@ When you create the settings storage share, you should limit access only to user -   + 4. Set the following NTFS permissions for the settings storage location folder: @@ -90,7 +90,7 @@ When you create the settings storage share, you should limit access only to user -   + 5. Click **OK** to close the dialog boxes. @@ -103,7 +103,7 @@ Additional security can be configured when a Windows server is utilized for the 2. Set registry key value to 1. -  + ## Related topics @@ -117,9 +117,9 @@ Deploy the Central Storage for User Experience Virtualization Settings Templates [Deploying the UE-V Agent](deploying-the-ue-v-agent.md) -  + -  + diff --git a/mdop/uev-v1/deploying-the-ue-v-agent.md b/mdop/uev-v1/deploying-the-ue-v-agent.md index bd718b4336..80f00c8ff1 100644 --- a/mdop/uev-v1/deploying-the-ue-v-agent.md +++ b/mdop/uev-v1/deploying-the-ue-v-agent.md @@ -91,7 +91,7 @@ The Microsoft User Experience Virtualization (UE-V) agent must run on each compu -  + During installation, the SettingsStoragePath command-line parameter specifies the settings storage location for the settings values. A settings storage location can be defined before deploying the UE-V Agent. If no settings storage location is defined, then UE-V uses the Active Directory user Home Directory as the settings storage location. When you specify the SettingsStoragePath configuration during setup and use the %username% as part of the value, this will roam the same user settings experience on all computers or sessions that a user logs into. If you specify the %username%\\%computername% variables as part of the SettingsStoragePath value, this will preserve the settings experience for each computer. @@ -100,7 +100,7 @@ Architecture-specific Windows Installer (.msi) files are provided for the UE-V a **Note**   During UE-V agent installation or uninstallation you can either use the AgentSetup.exe file or the AgentSetup<arch>.msi file, but not both. The same file must be used to uninstall the UE-V Agent as it was used to install the UE-V Agent. -  + Be sure to use the correct variable format when you install the UE-V agent. The following table provides examples of deployment options for using the AgentSetup.exe or the Windows Installer (.msi) installation files. @@ -122,42 +122,42 @@ Be sure to use the correct variable format when you install the UE-V agent. The

    Command prompt

    When you install the UE-V agent from a command prompt, use the %^username% variable format. If quotation marks are needed because of spaces in the settings storage path, use a batch script file for deployment.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%^username%

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%^username%

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%^username%

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%^username%

    Batch script

    When you install the UE-V Agent from a batch script file, use the %%username%% variable format. If you use this install method, you must escape the variable with the %% characters. Without this character, the script expands the username variable at install time, rather than at run time, causing UE-V to use a single settings storage location for all users.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\\server\settingsshare\%%username%%"

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\server\settingsshare%%username%%"

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\\server\settingsshare\%%username%%"

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\server\settingsshare%%username%%"

    PowerShell

    When you install the UE-V agent from a PowerShell prompt or PowerShell script, use the %username% variable format.

    -

    & AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%username%

    +

    & AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%username%

    -

    & msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%username%

    +

    & msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%username%

    Electronic software distribution, such as deployment of Configuration Manager Software Deployment)

    When you install the UE-V Agent with Configuration Manager, use the ^%username^% variable format.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\^%username^%

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare^%username^%

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\^%username^%

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare^%username^%

    -  + **Note**   The installation of the U-EV Agent requires Administrator rights and the computer will require a restart before the UE-V agent can run. -  + ## UE-V Agent deployment methods from a network share @@ -194,9 +194,9 @@ Updates for the UE-V agent software will be provided through Microsoft Update. D [Installing the UE-V Generator](installing-the-ue-v-generator.md) Deploy the User Experience Virtualization Agent -  + -  + diff --git a/mdop/uev-v1/deploying-ue-v-10.md b/mdop/uev-v1/deploying-ue-v-10.md index 928a24b72e..58a93cbff2 100644 --- a/mdop/uev-v1/deploying-ue-v-10.md +++ b/mdop/uev-v1/deploying-ue-v-10.md @@ -56,7 +56,7 @@ If you need to synchronize applications other than the default applications in t **Note**   Deploying custom templates requires a settings template catalog. The default Microsoft application templates are deployed with the UE-V Agent. -  + ## Topics for this product @@ -71,9 +71,9 @@ Deploying custom templates requires a settings template catalog. The default Mic [Troubleshooting UE-V 1.0](troubleshooting-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md b/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md index 3dfd841807..1d1459418d 100644 --- a/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md +++ b/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md @@ -42,7 +42,7 @@ If you are new to this product, we recommend that you read the documentation car **Note**   A downloadable version of this administrator’s guide is not available. However, you can learn about a special mode of the TechNet Library that allows you to select articles, group them in a collection, and print them or export them to a file at (https://go.microsoft.com/fwlink/?LinkId=272497). -  + ## Getting started with Microsoft User Experience Virtualization topics @@ -76,9 +76,9 @@ A downloadable version of this administrator’s guide is not available. However - [Troubleshooting UE-V 1.0](troubleshooting-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/installing-the-ue-v-generator.md b/mdop/uev-v1/installing-the-ue-v-generator.md index 910994721c..2729e3b8a1 100644 --- a/mdop/uev-v1/installing-the-ue-v-generator.md +++ b/mdop/uev-v1/installing-the-ue-v-generator.md @@ -36,7 +36,7 @@ The Microsoft User Experience Virtualization (UE-V) generator can be installed o **Note**   A prompt for User Account Control appears before the application is installed. Permission is required to install the UE-V generator. -   + 7. Click **Finish** to close the wizard after the installation is complete. You will need to restart your computer before you can run the UE-V Generator. @@ -51,9 +51,9 @@ The Microsoft User Experience Virtualization (UE-V) generator can be installed o [Planning for Custom Template Deployment for UE-V 1.0](planning-for-custom-template-deployment-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md b/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md index ea00c06740..efb3fdfb94 100644 --- a/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md +++ b/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md @@ -23,10 +23,10 @@ You can use WMI and PowerShell to manage Microsoft User Experience Virtualizatio 1. Stage the UE-V installer file in an accessible network share. - **Note**   + **Note** Use AgentSetup.exe to deploy both 32-bit and 64-bit versions of the UE-V Agent. Windows Installer Files versions, AgentSetupx86.msi and AgentSetupx64.msi, are available for each architecture. To uninstall the UE-V Agent at a later time using the installation file, you must use the same file type. -   + 2. Use one of the following PowerShell commands to install the agent. @@ -152,7 +152,7 @@ You can use WMI and PowerShell to manage Microsoft User Experience Virtualizatio -   + **How to export UE-V package settings and repair UE-V templates with PowerShell** @@ -185,7 +185,7 @@ You can use WMI and PowerShell to manage Microsoft User Experience Virtualizatio -   + **How to configure the UE-V Agent with WMI** @@ -265,13 +265,15 @@ You can use WMI and PowerShell to manage Microsoft User Experience Virtualizatio -   - Upon configuration of the UE-V Agent with WMI and PowerShell, the defined configuration is stored in the registry in the following locations: - `\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration` +~~~ +Upon configuration of the UE-V Agent with WMI and PowerShell, the defined configuration is stored in the registry in the following locations: - `\HKEY_CURRENT_USER\SOFTWARE\Microsoft\UEV\Agent\Configuration` +`\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration` + +`\HKEY_CURRENT_USER\SOFTWARE\Microsoft\UEV\Agent\Configuration` +~~~ ## Related topics @@ -280,9 +282,9 @@ You can use WMI and PowerShell to manage Microsoft User Experience Virtualizatio [Operations for UE-V 1.0](operations-for-ue-v-10.md) -  - -  + + + diff --git a/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md b/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md index 887f089adc..9bacdae69b 100644 --- a/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md +++ b/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md @@ -79,7 +79,7 @@ You must have administrator permissions to update, register, or unregister a set -   + The UE-V PowerShell features allow you to manage a group of settings templates deployed in your enterprise. To manage a group of templates using PowerShell, do the following. @@ -162,7 +162,7 @@ User Experience Virtualization provides the following set of WMI commands. Admin -   + **How to deploy the UE-V agent with PowerShell** @@ -171,7 +171,7 @@ User Experience Virtualization provides the following set of WMI commands. Admin **Note**   Use AgentSetup.exe to deploy both 32-bit and 64-bit versions of the UE-V Agent. Windows Installer Files versions, AgentSetupx86.msi and AgentSetupx64.msi, are available for each architecture. To uninstall the UE-V Agent at a later time using the installation file, you must use the same file type. -   + 2. Use one of the following PowerShell commands to install the agent. @@ -188,9 +188,9 @@ User Experience Virtualization provides the following set of WMI commands. Admin [Operations for UE-V 1.0](operations-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md index 7cc7609e59..de4bba54f9 100644 --- a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md +++ b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md @@ -121,9 +121,9 @@ When Internet Explorer bookmarks roam from one computer to another computer, the WORKAROUND: None -  + -  + diff --git a/mdop/uev-v1/migrating-ue-v-settings-packages.md b/mdop/uev-v1/migrating-ue-v-settings-packages.md index f6ad3233be..0584788218 100644 --- a/mdop/uev-v1/migrating-ue-v-settings-packages.md +++ b/mdop/uev-v1/migrating-ue-v-settings-packages.md @@ -40,7 +40,7 @@ Simply copying the files and folders will not preserve the security settings and **Note**   To monitor the copy progress, open MySettings.txt with a log file reader such as Trace32. -   + 4. Grant share-level permissions to the new share. Leave the NTFS permissions as they were set by Robocopy. @@ -53,9 +53,9 @@ Simply copying the files and folders will not preserve the security settings and [Operations for UE-V 1.0](operations-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md b/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md index 697b696a44..41e30f2c3a 100644 --- a/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md +++ b/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md @@ -40,7 +40,7 @@ When you use Group Policy to configure the settings template catalog path, you c **Note**   If you disable this policy setting after it has been enabled, the UE-V agent will not restore the default Microsoft templates. -  + If there are customized templates in the settings template catalog that use the same ID as the default Microsoft templates, and the UE-V agent is not configured to replace the default Microsoft templates, the Microsoft templates in the catalog will be ignored. @@ -49,7 +49,7 @@ You can also replace the default templates by using the UE-V PowerShell features **Note**   Old settings packages remain in the settings storage location even if new settings templates are deployed for an application. These packages are not read by the agent, but neither are they automatically deleted. -  + ## Related topics @@ -61,9 +61,9 @@ Old settings packages remain in the settings storage location even if new settin [Planning for UE-V Configuration Methods](planning-for-ue-v-configuration-methods.md) Planning for Custom Template Deployment -  + -  + diff --git a/mdop/uev-v1/planning-for-ue-v-configuration-methods.md b/mdop/uev-v1/planning-for-ue-v-configuration-methods.md index 06f0b7cbee..8e5be9114d 100644 --- a/mdop/uev-v1/planning-for-ue-v-configuration-methods.md +++ b/mdop/uev-v1/planning-for-ue-v-configuration-methods.md @@ -39,7 +39,7 @@ You can configure UE-V before, during, or after agent installation, depending on **Note**   Registry modification can result in data loss or the computer becoming unresponsive. We recommend that you use other configuration methods. -  + ### UE-V configuration settings @@ -66,9 +66,9 @@ The following are examples of UE-V configuration settings: [Planning for UE-V Configuration](planning-for-ue-v-configuration.md) -  + -  + diff --git a/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md b/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md index f1c478da23..79eebd7152 100644 --- a/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md +++ b/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md @@ -72,7 +72,7 @@ The UE-V agent installation software installs the agent and registers a default -  + Application settings are applied to the application when the application is started. They are saved when the application closes. @@ -117,7 +117,7 @@ User Experience Virtualization includes settings location templates that capture -  + The Windows desktop background and Ease of Access settings are applied when the user logs on, when the computer is unlocked, or upon remote connection to another computer. The agent saves these settings when the user logs off, when the computer is locked, or when a remote connection is disconnected. By default, Windows desktop background settings are roamed between computers of the same operating system version. @@ -128,7 +128,7 @@ UE-V does not support the roaming of settings between operating systems with dif **Note**   If you change the settings location templates that are provided by Microsoft, User Experience Virtualization might not work properly for the designated application or Windows settings group. -  + ## Prevent unintentional user Settings configuration @@ -165,9 +165,9 @@ For guidance on whether a line-of-business application should be synchronized, s [Deploying UE-V 1.0](deploying-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/supported-configurations-for-ue-v-10.md b/mdop/uev-v1/supported-configurations-for-ue-v-10.md index 19a3b73b38..2fca53cc15 100644 --- a/mdop/uev-v1/supported-configurations-for-ue-v-10.md +++ b/mdop/uev-v1/supported-configurations-for-ue-v-10.md @@ -22,7 +22,7 @@ Microsoft User Experience Virtualization (UE-V) supports the following described **Note**   Microsoft provides support for the current service pack, and in some cases, the preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). For more information about Microsoft Support Lifecycle Policy, see [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976). -  + ## Supported configurations for UE-V Agent and UE-V Generator @@ -82,7 +82,7 @@ The following table lists the operating systems that support the User Experience -  + There are no special RAM requirements that are specific to UE-V. @@ -91,7 +91,7 @@ The installation of the UE-V agent requires administrative rights and will requi **Important**   The Sync Your Settings feature in Windows 8 must be disabled to allow UE-V to function properly. Synchronization of settings with both Windows 8 and UE-V will result in unpredictable synchronization behavior. -  + ### Requirements for the Offline Files feature @@ -171,9 +171,9 @@ Supported Configurations for User Experience Virtualization [Deploying the UE-V Agent](deploying-the-ue-v-agent.md) -  + -  + diff --git a/mdop/uev-v1/ue-v-10-security-considerations.md b/mdop/uev-v1/ue-v-10-security-considerations.md index 371fc55059..ddbecb7393 100644 --- a/mdop/uev-v1/ue-v-10-security-considerations.md +++ b/mdop/uev-v1/ue-v-10-security-considerations.md @@ -57,130 +57,132 @@ Because settings packages may contain personal information, you should take care -   - 2. Set the following NTFS permissions for the settings storage location folder: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    User accountRecommended permissionsFolder

    Creator/Owner

    No Permissions

    No Permissions

    Domain Admins

    Full Control

    This Folder, Subfolders and Files

    Security group of UE-V users

    List Folder/Read Data, Create Folders/Append Data

    This Folder Only

    Everyone

    Remove all Permissions

    No Permissions

    +~~~ +2. Set the following NTFS permissions for the settings storage location folder: -   + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    User accountRecommended permissionsFolder

    Creator/Owner

    No Permissions

    No Permissions

    Domain Admins

    Full Control

    This Folder, Subfolders and Files

    Security group of UE-V users

    List Folder/Read Data, Create Folders/Append Data

    This Folder Only

    Everyone

    Remove all Permissions

    No Permissions

    - 3. Set the following share-level (SMB) permissions for the settings template catalog folder. - - - - - - - - - - - - - - - - - - - - - - - - - -
    User accountRecommend permissions

    Everyone

    No Permissions

    Domain Computers

    Read Permission Levels

    Administrators

    Read/Write Permission Levels

    -   +3. Set the following share-level (SMB) permissions for the settings template catalog folder. - 4. Set the following NTFS permissions for the settings template catalog folder. + + + + + + + + + + + + + + + + + + + + + + + + + +
    User accountRecommend permissions

    Everyone

    No Permissions

    Domain Computers

    Read Permission Levels

    Administrators

    Read/Write Permission Levels

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    User accountRecommended permissionsApply to

    Creator/Owner

    Full Control

    This Folder, Subfolders and Files

    Domain Computers

    List Folder Contents and Read

    This Folder, Subfolders and Files

    Everyone

    No Permissions

    No Permissions

    Administrators

    Full Control

    This Folder, Subfolders and Files

    -   -### Use Windows Server 2003 or later servers to host redirected file shares +4. Set the following NTFS permissions for the settings template catalog folder. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    User accountRecommended permissionsApply to

    Creator/Owner

    Full Control

    This Folder, Subfolders and Files

    Domain Computers

    List Folder Contents and Read

    This Folder, Subfolders and Files

    Everyone

    No Permissions

    No Permissions

    Administrators

    Full Control

    This Folder, Subfolders and Files

    +~~~ + + + +### Use Windows Server 2003 or later servers to host redirected file shares User settings package files contain personal information that is transferred between the client computer and the server that stores the settings packages. Because of this, you should ensure that the data is protected while it travels over the network. User settings data is vulnerable to these potential threats: interception of the data as it passes over the network; tampering with the data as it passes over the network; and spoofing of the server that hosts the data. -Several features of Windows Server 2003 and above can help to secure user data: +Several features of Windows Server 2003 and above can help to secure user data: -- **Kerberos** - Kerberos is standard on all versions of Windows 2000 and Windows Server 2003 and later. Kerberos ensures the highest level of security to network resources. NTLM authenticates the client only; Kerberos authenticates the server and the client. When NTLM is used, the client does not know whether the server is valid. This is particularly important if the client is exchanging personal files with the server, as is the case with Roaming Profiles. Kerberos provides better security than NTLM. Kerberos is not available on Windows NT version 4.0 or earlier operating systems. +- **Kerberos** - Kerberos is standard on all versions of Windows 2000 and Windows Server 2003 and later. Kerberos ensures the highest level of security to network resources. NTLM authenticates the client only; Kerberos authenticates the server and the client. When NTLM is used, the client does not know whether the server is valid. This is particularly important if the client is exchanging personal files with the server, as is the case with Roaming Profiles. Kerberos provides better security than NTLM. Kerberos is not available on Windows NT version 4.0 or earlier operating systems. - **IPsec** - The IP Security Protocol (IPsec) provides network-level authentication, data integrity, and encryption. IPsec ensures the following: @@ -220,7 +222,7 @@ To ensure that UE-V works optimally, create only the root share on the server, a This permission configuration allows users to create folders for settings storage. The UE-V agent creates and secures a settingspackage folder while running in the context of the user. The user receives full control to their settingspackage folder. Other users do not inherit access to this folder. You do not need to create and secure individual user directories. This will be done automatically by the agent that runs in the context of the user. -**Note**   +**Note** Additional security can be configured when a Windows server is utilized for the settings storage share. UE-V can be configured to verify that either the local administrator's group or the current user is the owner of the folder where settings packages are stored. To enable additional security use the following command: 1. Add a REG\_DWORD registry key named "RepositoryOwnerCheckEnabled" to `HKEY_LOCAL_MACHINE\Software\Microsoft\UEV\Agent\Configuration`. @@ -229,7 +231,7 @@ Additional security can be configured when a Windows server is utilized for the When this configuration setting is in place, the UE-V agent verifies that the local administrator’s group or current user is the owner of the settingspackage folder. If not, then the UE-V agent will not allow access to the folder. -  + If you must create folders for the users and ensure that you have the correct permissions set. @@ -244,9 +246,9 @@ If you redirect UE-V settings to a user’s home directory, be sure that the per [Security and Privacy for UE-V 1.0](security-and-privacy-for-ue-v-10.md) -  - -  + + + diff --git a/mdop/uev-v1/ue-v-checklist.md b/mdop/uev-v1/ue-v-checklist.md index 048b562a84..03c5bb4c70 100644 --- a/mdop/uev-v1/ue-v-checklist.md +++ b/mdop/uev-v1/ue-v-checklist.md @@ -33,42 +33,42 @@ Use this checklist to plan for preparing your computing environment for Microsof

    Review the Getting Started information about UE-V to gain a basic understanding of the product before you begin the deployment planning.

    -

    [Getting Started With User Experience Virtualization 1.0](getting-started-with-user-experience-virtualization-10.md)

    +

    Getting Started With User Experience Virtualization 1.0

    Prepare your environment for UE-V 1.0 deployment.

    -

    [Preparing Your Environment for UE-V](preparing-your-environment-for-ue-v.md)

    +

    Preparing Your Environment for UE-V

    Plan which applications end users can synchronize with UE-V 1.0.

    -

    [Planning Which Applications to Synchronize with UE-V 1.0](planning-which-applications-to-synchronize-with-ue-v-10.md)

    +

    Planning Which Applications to Synchronize with UE-V 1.0

    Custom settings templates only - create custom settings location templates and then define a setting template catalog.

    -

    [Deploying the Settings Template Catalog for UE-V 1.0](deploying-the-settings-template-catalog-for-ue-v-10.md)

    -

    [Create UE-V Settings Location Templates with the UE-V Generator](create-ue-v-settings-location-templates-with-the-ue-v-generator.md)

    +

    Deploying the Settings Template Catalog for UE-V 1.0

    +

    Create UE-V Settings Location Templates with the UE-V Generator

    Decide which method of configuration (Group Policy, PowerShell, ESD-command line, or batch file) works best for your environment and plan how to configure UE-V 1.0.

    -

    [Planning for UE-V Configuration Methods](planning-for-ue-v-configuration-methods.md)

    +

    Planning for UE-V Configuration Methods

    Deploy the network share to store settings packages.

    -

    [Deploying the Settings Storage Location for UE-V 1.0](deploying-the-settings-storage-location-for-ue-v-10.md)

    +

    Deploying the Settings Storage Location for UE-V 1.0

    Custom settings templates only – deploy the features that are required to create and store applications other than the UE-V default applications.

    -

    [Deploying the Settings Template Catalog for UE-V 1.0](deploying-the-settings-template-catalog-for-ue-v-10.md)

    -

    [Installing the UE-V Generator](installing-the-ue-v-generator.md)

    +

    Deploying the Settings Template Catalog for UE-V 1.0

    +

    Installing the UE-V Generator

    Familiarize yourself with the administration and management tasks for UE-V.

    -

    [Administering UE-V 1.0](administering-ue-v-10.md)

    +

    Administering UE-V 1.0

    -  + ## Related topics @@ -77,9 +77,9 @@ Use this checklist to plan for preparing your computing environment for Microsof [Deploying UE-V 1.0](deploying-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v1/user-experience-virtualization-privacy-statement.md b/mdop/uev-v1/user-experience-virtualization-privacy-statement.md index feb455a3a8..ecbbabaa59 100644 --- a/mdop/uev-v1/user-experience-virtualization-privacy-statement.md +++ b/mdop/uev-v1/user-experience-virtualization-privacy-statement.md @@ -163,9 +163,9 @@ For details about what information is collected and how it is used, see the Upda [Security and Privacy for UE-V 1.0](security-and-privacy-for-ue-v-10.md) -  + -  + diff --git a/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md index 5d649c81ef..349a791c43 100644 --- a/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md +++ b/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md @@ -61,13 +61,13 @@ For information about the availability of Microsoft product documentation and bo

    (609) 987-8116

    -

    [http://www.learningally.org/](https://go.microsoft.com/fwlink/p/?linkid=239)

    +

    http://www.learningally.org/

    Web addresses can change, so you might be unable to connect to the website or sites that are mentioned here.

    -  + ### Customer service for people with hearing impairments @@ -94,9 +94,9 @@ For more information about how accessible technology for computers can help to i [Technical Reference for UE-V 2.x](technical-reference-for-ue-v-2x-both-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md index d7376eca87..6acd7dcdd5 100644 --- a/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md +++ b/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md @@ -22,7 +22,7 @@ Microsoft User Experience Virtualization (UE-V) 2.0, 2.1, and 2.1 SP1 provide Wi **Note**   Administering UE-V 2 with Windows PowerShell requires Windows PowerShell 3.0 or higher. For a complete list of UE-V PowerShell cmdlets, see [UE-V 2 Cmdlet Reference](https://go.microsoft.com/fwlink/p/?LinkId=393495). -  + ## Managing the UE-V 2.x Agent and packages by using Windows PowerShell and WMI @@ -48,9 +48,9 @@ After you create and deploy UE-V settings location templates, you can manage tho [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md index db78d96d4b..b972d7f736 100644 --- a/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md +++ b/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md @@ -151,7 +151,7 @@ The Process data type is a container used to describe processes to be monitored -  + **Processes** The Processes data type represents a container for a collection of one or more Process elements. Two child elements are supported in the Processes sequence type: **Process** and **ShellProcess**. Process is an element of type Process and ShellProcess is of data type Empty. At least one item must be identified in the sequence. @@ -201,7 +201,7 @@ Settings is a container for all the settings that apply to a particular template -  + ### Name Element @@ -216,7 +216,7 @@ UE-V does not reference external DTDs, so it is not possible to use named entiti See for a complete list of character entities. UTF-8-encoded documents may include the Unicode characters directly. Saving templates through the UE-V Generator converts character entities to their Unicode representations automatically. -  + ### ID Element @@ -261,7 +261,7 @@ This value is queried to determine if a new version of a template should be appl - When the microsoft\\uev:SettingsLocationTemplate Update method is called through WMI -  + ### Author Element @@ -327,7 +327,7 @@ A value of **True** indicates that the string contains illegal characters. Here **Note**   The UE-V Generator encodes the greater than and less than characters as > and < respectively. -  + In rare circumstances, the FileName value will not necessarily include the .exe extension, but it should be specified as part of the value. For example, `MyApplictication.exe` should be specified instead of `MyApplictication`. The second example will not apply the template to the process if the actual name of the executable file is “MyApplication.exe”. @@ -344,7 +344,7 @@ If this element is absent, the settings location template ignores the process’ **Note**   UE-V does not support ARM processors in this version. -  + ### ProductName @@ -493,11 +493,11 @@ Application is a container for settings that apply to a particular application.

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id21).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -513,7 +513,7 @@ Application is a container for settings that apply to a particular application.

    Version

    -

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version21).

    +

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see Version.

    DeferToMSAccount

    @@ -529,16 +529,16 @@ Application is a container for settings that apply to a particular application.

    Processes

    -

    A container for a collection of one or more Process elements. For more information, see [Processes](#processes21).

    +

    A container for a collection of one or more Process elements. For more information, see Processes.

    Settings

    -

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data21).

    +

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in Data types.

    -  + ### Common Element @@ -556,11 +556,11 @@ Common is similar to an Application element, but it is always associated with tw

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id21).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -576,7 +576,7 @@ Common is similar to an Application element, but it is always associated with tw

    Version

    -

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version21).

    +

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see Version.

    DeferToMSAccount

    @@ -592,12 +592,12 @@ Common is similar to an Application element, but it is always associated with tw

    Settings

    -

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data21).

    +

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in Data types.

    -  + ### SettingsLocationTemplate Element @@ -615,11 +615,11 @@ This element defines the settings for a single application or a suite of applica

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id21).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -636,7 +636,7 @@ This element defines the settings for a single application or a suite of applica -  + ### Appendix: SettingsLocationTemplate.xsd @@ -1091,7 +1091,7 @@ The Process data type is a container used to describe processes to be monitored -  + **Processes** The Processes data type represents a container for a collection of one or more Process elements. Two child elements are supported in the Processes sequence type: **Process** and **ShellProcess**. Process is an element of type Process and ShellProcess is of data type Empty. At least one item must be identified in the sequence. @@ -1138,7 +1138,7 @@ Settings is a container for all the settings that apply to a particular template -  + ### Name Element @@ -1153,7 +1153,7 @@ UE-V does not reference external DTDs, so it is not possible to use named entiti See for a complete list of character entities. UTF-8-encoded documents may include the Unicode characters directly. Saving templates through the UE-V Generator converts character entities to their Unicode representations automatically. -  + ### ID Element @@ -1198,7 +1198,7 @@ This value is queried to determine if a new version of a template should be appl - When the microsoft\\uev:SettingsLocationTemplate Update method is called through WMI -  + ### Author Element @@ -1264,7 +1264,7 @@ A value of **True** indicates that the string contains illegal characters. Here **Note**   The UE-V Generator encodes the greater than and less than characters as > and < respectively. -  + In rare circumstances, the FileName value will not necessarily include the .exe extension, but it should be specified as part of the value. For example, `MyApplictication.exe` should be specified instead of `MyApplictication`. The second example will not apply the template to the process if the actual name of the executable file is “MyApplication.exe”. @@ -1281,7 +1281,7 @@ If this element is absent, the settings location template ignores the process’ **Note**   UE-V does not support ARM processors in this version. -  + ### ProductName @@ -1432,11 +1432,11 @@ Application is a container for settings that apply to a particular application.

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -1452,7 +1452,7 @@ Application is a container for settings that apply to a particular application.

    Version

    -

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version).

    +

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see Version.

    DeferToMSAccount

    @@ -1464,16 +1464,16 @@ Application is a container for settings that apply to a particular application.

    Processes

    -

    A container for a collection of one or more Process elements. For more information, see [Processes](#processes).

    +

    A container for a collection of one or more Process elements. For more information, see Processes.

    Settings

    -

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data).

    +

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in Data types.

    -  + ### Common Element @@ -1493,11 +1493,11 @@ Common is similar to an Application element, but it is always associated with tw

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -1513,7 +1513,7 @@ Common is similar to an Application element, but it is always associated with tw

    Version

    -

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version).

    +

    Identifies the version of the settings location template for administrative tracking of changes. For more information, see Version.

    DeferToMSAccount

    @@ -1525,12 +1525,12 @@ Common is similar to an Application element, but it is always associated with tw

    Settings

    -

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data).

    +

    A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in Data types.

    -  + ### SettingsLocationTemplate Element @@ -1550,11 +1550,11 @@ This element defines the settings for a single application or a suite of applica

    Name

    -

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name).

    +

    Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see Name.

    ID

    -

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see [ID](#id).

    +

    Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V Agent uses to reference the template at runtime. For more information, see ID.

    Description

    @@ -1571,7 +1571,7 @@ This element defines the settings for a single application or a suite of applica -  + ### Appendix: SettingsLocationTemplate.xsd @@ -1880,9 +1880,9 @@ Here is the SettingsLocationTemplate.xsd file showing its elements, child elemen [Technical Reference for UE-V 2.x](technical-reference-for-ue-v-2x-both-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md b/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md index de93fbefd9..e6dc6513a3 100644 --- a/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md +++ b/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md @@ -34,7 +34,7 @@ The Microsoft User Experience Virtualization (UE-V) 2.0, 2.1, or 2.1 SP1 Agent i **Note**   With the exception of Collect CEIP Data, these tasks must remain enabled as UE-V cannot function without them. -  + These scheduled tasks are not configurable with the UE-V tools. Administrators who want to change the scheduled task for these items can create a script that uses the Schtasks.exe command-line options. @@ -70,7 +70,7 @@ If upon installation the user or administrator choses to participate in the Cust -  + ### Monitor Application Settings @@ -95,7 +95,7 @@ The **Monitor Application Settings** task is used to synchronize settings for Wi -  + ### Sync Controller Application @@ -120,7 +120,7 @@ The **Sync Controller Application** task is used to start the Sync Controller to -  + For example, the following command configures the agent to synchronize settings every 15 minutes instead of the default 30 minutes. @@ -151,7 +151,7 @@ The **Synchronize Settings at Logoff** task is used to start an application at l -  + ### Template Auto Update @@ -176,7 +176,7 @@ The **Template Auto Update** task checks the settings template catalog for new, -  + **Example:** The following command configures the UE-V Agent to check the settings template catalog store every hour. @@ -207,7 +207,7 @@ The **Upload CEIP Data** task runs during the installation if the user or the ad -  + ## UE-V 2 Scheduled Task Details @@ -283,7 +283,7 @@ The following chart provides additional information about scheduled tasks for UE -  + **Legend** @@ -327,9 +327,9 @@ The following additional information applies to UE-V scheduled tasks: [Deploy UE-V 2.x for Custom Applications](deploy-ue-v-2x-for-custom-applications-new-uevv2.md#deploycatalogue) -  + -  + diff --git a/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md index 535aac6765..8b371ea90a 100644 --- a/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md +++ b/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md @@ -35,7 +35,7 @@ The Company Settings Center desktop application provides users with information - Configuration item in the UE-V Configuration Pack for System Center 2012 Configuration Manager: `Tray icon enabled` -   + - Control Panel application – In Control Panel, browse to **Appearance and Personalization**, and then click **Company Settings Center**. @@ -83,9 +83,9 @@ The Company Settings Center can include a hyperlink that users can click to get -  + -  + diff --git a/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md b/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md index 40ed244a0b..94ee14b167 100644 --- a/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md +++ b/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md @@ -82,13 +82,13 @@ The following policy settings can be configured for UE-V.

    Settings storage path

    Computers and Users

    This Group Policy setting configures where the user settings are to be stored.

    -

    Enter a Universal Naming Convention (UNC) path and variables such as \\Server\SettingsShare\%username%.

    +

    Enter a Universal Naming Convention (UNC) path and variables such as \Server\SettingsShare%username%.

    Settings template catalog path

    Computers Only

    This Group Policy setting configures where custom settings location templates are stored. This policy setting also configures whether the catalog is to be used to replace the default Microsoft templates that are installed with the UE-V Agent.

    -

    Enter a Universal Naming Convention (UNC) path such as \\Server\TemplateShare or a folder location on the computer.

    +

    Enter a Universal Naming Convention (UNC) path such as \Server\TemplateShare or a folder location on the computer.

    Select the check box to replace the default Microsoft templates.

    @@ -124,12 +124,12 @@ The following policy settings can be configured for UE-V. -  + **Note**   In addition, Group Policy settings are available for many desktop applications and Windows apps. You can use these settings to enable or disable settings synchronization for specific applications. -  + **Windows App Group Policy settings** @@ -170,7 +170,7 @@ In addition, Group Policy settings are available for many desktop applications a -  + For more information about synchronizing Windows apps, see [Windows App List](https://technet.microsoft.com/library/dn458925.aspx#win8applist). @@ -207,9 +207,9 @@ The UE-V Agent uses the following order of precedence to determine synchronizati [Manage Configurations for UE-V 2.x](manage-configurations-for-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md b/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md index fbaae75c0f..c5936123dc 100644 --- a/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md +++ b/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md @@ -79,7 +79,7 @@ The UE-V Configuration Pack includes tools to perform the following tasks: -   + - Verify compliance by confirming that UE-V is running. @@ -238,9 +238,9 @@ The UE-V Configuration Pack for Configuration Manager 2012 SP1 or later can be d [Manage Configurations for UE-V 2.x](manage-configurations-for-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md b/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md index 3a5b5821e0..b88d290654 100644 --- a/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md +++ b/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md @@ -44,10 +44,10 @@ UE-V requires a location in which to store user settings in settings package fil If you don’t create a settings storage location, the UE-V Agent will use Active Directory (AD) by default. -**Note**   +**Note** As a matter of [performance and capacity planning](https://technet.microsoft.com/library/dn458932.aspx#capacity) and to reduce problems with network latency, create settings storage locations on the same local networks where the users’ computers reside. We recommend 20 MB of disk space per user for the settings storage location. -  + ### Create a UE-V Settings Storage Location @@ -106,7 +106,7 @@ The UE-V Agent dynamically creates a user-specific settings storage path, with a -   + 4. Set the following NTFS file system permissions for the settings storage location folder. @@ -137,18 +137,18 @@ The UE-V Agent dynamically creates a user-specific settings storage path, with a -   + With this configuration, the UE-V Agent creates and secures a Settingspackage folder while it runs in the context of the user, and grants each user permission to create folders for settings storage. Users receive full control to their Settingspackage folder while other users cannot access it. -**Note**   +**Note** If you create the settings storage share on a computer running a Windows Server operating system, configure UE-V to verify that either the local Administrators group or the current user is the owner of the folder where settings packages are stored. To enable this additional security, specify this setting in the Windows Server Registry Editor: 1. Add a **REG\_DWORD** registry key named **"RepositoryOwnerCheckEnabled"** to **HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\UEV\\Agent\\Configuration**. 2. Set the registry key value to *1*. -  + ### Use Active Directory with UE-V 2.x @@ -167,7 +167,7 @@ You can configure UE-V before, during, or after UE-V Agent installation, dependi Supported operating systems for the domain controller that deploys the Group Policy Objects include the following: - Windows Server 2008 R2 + Windows Server 2008 R2 Windows Server 2012 and Windows Server 2012 R2 @@ -175,12 +175,12 @@ You can configure UE-V before, during, or after UE-V Agent installation, dependi - [Windows PowerShell and WMI](https://technet.microsoft.com/library/dn458937.aspx)**:** You can use scripted commands for Windows PowerShell and Windows Management Instrumentation (WMI) to modify configurations after you install the UE-V Agent. - **Note**   + **Note** Registry modification can result in data loss, or the computer becomes unresponsive. We recommend that you use other configuration methods. -   -- **Command-line or Batch Script Installation:** Parameters that are used when you [Deploy the UE-V Agent](#agent) configure many UE-V settings. Electronic software distribution systems, such as System Center 2012 Configuration Manager, use these parameters to configure their clients when they deploy and install the UE-V Agent software. + +- **Command-line or Batch Script Installation:** Parameters that are used when you [Deploy the UE-V Agent](#agent) configure many UE-V settings. Electronic software distribution systems, such as System Center 2012 Configuration Manager, use these parameters to configure their clients when they deploy and install the UE-V Agent software. ## Deploy the UE-V 2.x Agent @@ -189,10 +189,10 @@ The UE-V Agent is the core of a UE-V deployment and must run on each computer th **UE-V Agent Installation Files:** A single installation file, AgentSetup.exe, installs the UE-V Agent on both 32-bit and 64-bit operating systems. In addition, AgentSetupx86.msi or AgentSetupx64.msi architecture-specific Windows Installer files are provided, and since they are smaller, they might streamline the agent deployments. The [command-line parameters for the AgentSetup.exe installer](#params) are supported for the Windows Installer installation as well. -**Important**   +**Important** During UE-V Agent installation or uninstallation, you can either use the AgentSetup.exe file or the AgentSetup<arch>.msi file, but not both. The same file must be used to uninstall the UE-V Agent that was used to install the UE-V Agent. -  + ### To Deploy the UE-V Agent @@ -232,42 +232,42 @@ Use the following procedure to deploy the UE-V Agent from a network share.

    Command prompt

    When you install the UE-V Agent at a command prompt, use the %^username% variable format. If quotation marks are required because of spaces in the settings storage path, use a batch script file for deployment.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%^username%

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%^username%

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%^username%

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%^username%

    Batch script

    When you install the UE-V Agent from a batch script file, use the %%username%% variable format. If you use this installation method, you must escape the variable with the %% characters. Without this character, the script expands the username variable at installation time, rather than at run time, which causes UE-V to use a single settings storage location for all users.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\\server\settingsshare\%%username%%"

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\server\settingsshare%%username%%"

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\\server\settingsshare\%%username%%"

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath="\server\settingsshare%%username%%"

    Windows PowerShell

    When you install the UE-V Agent from a Windows PowerShell prompt or a Windows PowerShell script, use the %username% variable format.

    -

    & AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%username%

    +

    & AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%username%

    -

    & msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\%username%

    +

    & msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare%username%

    Electronic software distribution, such as deployment of Configuration Manager Software Deployment

    When you install the UE-V Agent by using Configuration Manager, use the ^%username^% variable format.

    -

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\^%username^%

    +

    AgentSetup.exe /quiet /norestart /log "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare^%username^%

    -

    msiexec.exe /i "<path to msi file>" /quiet /norestart /l*v "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\\server\settingsshare\^%username^%

    +

    msiexec.exe /i "<path to msi file>" /quiet /norestart /lv "%temp%\UE-VAgentInstaller.log" SettingsStoragePath=\server\settingsshare^%username^%

    -  -**Note**   + +**Note** The installation of the UE-V Agent requires administrator rights, and the computer requires a restart before the UE-V Agent can run. -  + ### Command-line parameters for UE-V Agent deployment @@ -296,12 +296,11 @@ The command-line parameters of the UE-V Agent are as follows.

    SettingsStoragePath

    Indicates the Universal Naming Convention (UNC) path that defines where settings are stored.

    -Important   -

    You must specify a SettingsStoragePath in UE-V 2.1 and UE-V 2.1 SP1. You can set the AdHomePath string to specify that the user's Active Directory home path is used. For example, SettingsStoragePath = \\share\path|AdHomePath.

    +Important

    You must specify a SettingsStoragePath in UE-V 2.1 and UE-V 2.1 SP1. You can set the AdHomePath string to specify that the user's Active Directory home path is used. For example, SettingsStoragePath = \share\path|AdHomePath.

    In UE-V 2.0, you can leave SettingsStoragePath blank to use the Active Directory home path instead.

    -  +

    %username% or %computername% environment variables are accepted. Scripting can require escaped variables.

    Default: <none>

    @@ -372,11 +371,10 @@ The command-line parameters of the UE-V Agent are as follows.

    ACCEPTLICENSETERMS

    Lets UE-V be installed silently. This must be set to True to install UE-V silently and bypass the requirement that the user accepts the UE-V license terms. If set to False or left empty, the user receives an error message and UE-V is not installed.

    -Important   -

    This parameter is required to install UE-V silently.

    +Important

    This parameter is required to install UE-V silently.

    -  +
    @@ -387,7 +385,7 @@ The command-line parameters of the UE-V Agent are as follows. -  + ### Update the UE-V Agent @@ -399,10 +397,10 @@ During a UE-V Agent upgrade, the default group of settings location templates fo The UE-V 2.x Agent introduces many new features and modifies how and when the agent uploads content to the settings storage share. The upgrade process automates these changes. To upgrade the UE-V Agent, run the UE-V Agent install package (AgentSetup.exe, AgentSetupx86.msi, or AgentSetupx64.msi) on users’ computers. -**Note**   +**Note** When you upgrade the UE-V Agent, you must use the same installer type (.exe file or .msi packet) that installed the previous UE-V Agent. For example, use the UE-V 2 AgentSetup.exe to upgrade UE-V 1.0 Agents that were installed by using AgentSetup.exe. -  + The following configurations are preserved when the Agent Setup program runs: @@ -412,12 +410,12 @@ The following configurations are preserved when the Agent Setup program runs: - Scheduled tasks (Interval settings are reset to their defaults) -**Note**   +**Note** A computer with UE-V 2.x settings location templates that are registered in the UE-V 1.0 Agent register errors in the Windows Event Log. -  -You can use Microsoft System Center 2012 Configuration Manager or another enterprise software distribution tool to automate and distribute the UE-V Agent upgrade. + +You can use Microsoft System Center 2012 Configuration Manager or another enterprise software distribution tool to automate and distribute the UE-V Agent upgrade. **Recommendations:** We recommend that you upgrade all of the UE-V 1.0 Agents in a computing environment, but it is not required. UE-V 2.x settings location templates can interact with a UE-V 1.0 Agent because they only share the settings from the settings storage path. We recommend, however, that you move the deployments to a single agent version to simplify management and to support UE-V. @@ -427,7 +425,7 @@ You might experience errors after you attempt one of the following operations: - Upgrade from UE-V 1.0 to UE-V 2 -- Upgrade to a newer version of Windows, for example, from Windows 7 to Windows 8 or from Windows 8 to Windows 8.1. +- Upgrade to a newer version of Windows, for example, from Windows 7 to Windows 8 or from Windows 8 to Windows 8.1. - Uninstall the agent after upgrading the UE-V Agent @@ -451,9 +449,9 @@ You can then retry the uninstall process or upgrade by installing the newer vers [Deploy UE-V 2.x for Custom Applications](deploy-ue-v-2x-for-custom-applications-new-uevv2.md) -  - -  + + + diff --git a/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md b/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md index 43f448f724..e86cfa6fc0 100644 --- a/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md +++ b/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md @@ -46,7 +46,7 @@ Once you have read through the planning material in [Prepare a UE-V 2.x Deployme **Note**   Templates that are deployed by using ESD or Group Policy must be registered with UE-V Windows Management Instrumentation (WMI) or Windows PowerShell. -   + ## Prepare to Deploy UE-V 2.x for Custom Applications @@ -68,7 +68,7 @@ The UE-V Generator monitors an application to discover and capture the locations **Note**   UE-V settings location templates cannot be created from virtualized applications or Terminal Services applications. However, settings that are synchronized by using the templates can be applied to those applications. To create templates that support Virtual Desktop Infrastructure (VDI) and Terminal Services applications, open a version of the Windows Installer (.msi) package of the application by using the UE-V Generator. For more information about synchronizing settings for virtual applications, see [Using UE-V 2.x with Application Virtualization Applications](using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md). -  + **Excluded Locations:** The discovery process excludes locations that commonly store application software files that do not synchronize settings well between user computers or computing environments. By default, these are excluded: @@ -98,7 +98,7 @@ When you use Group Policy to configure the settings template catalog path, you c **Note**   If you disable this policy setting after it has been enabled, the UE-V Agent does not restore the default Microsoft templates. -  + If there are customized templates in the settings template catalog that use the same ID as the default Microsoft templates, and the UE-V Agent is not configured to replace the default Microsoft templates, the Microsoft templates are ignored. @@ -107,7 +107,7 @@ You can also replace the default templates by using the UE-V Windows PowerShell **Note**   Old settings packages remain in the settings storage location even if you deploy new settings location templates for an application. These packages are not read by the agent, but neither are they automatically deleted. -  + ## Install the UEV 2.x Generator @@ -131,7 +131,7 @@ Install the Microsoft User Experience Virtualization (UE-V) 2.0 Generator on a c **Note**   A prompt for **User Account Control** appears before the application is installed. Permission is required to install the UE-V Generator. -   + 7. Click **Finish** to close the wizard after the installation is finished. You must restart your computer before you can run the UE-V Generator. @@ -140,7 +140,7 @@ Install the Microsoft User Experience Virtualization (UE-V) 2.0 Generator on a c **Note**   The UE-V 2 Generator can only be used to create templates for UE-V 2 Agents. In a mixed deployment of UE-V 1.0 Agents and UE-V 2 Agents, you should continue to use the UE-V 1.0 Generator until you have upgraded all UE-V Agents. -   + ## Deploy a Settings Template Catalog @@ -184,7 +184,7 @@ You can configure the settings template catalog path by using the installation c -   + 3. Set the following NTFS file system permissions for the settings template catalog folder. @@ -225,7 +225,7 @@ You can configure the settings template catalog path by using the installation c -   + 4. Click **OK** to close the dialog boxes. @@ -247,7 +247,7 @@ Use the UE-V Generator to create settings location templates for line-of-busines **Note**   Before the application is started, the system displays a prompt for **User Account Control**. Permission is required to monitor the registry and file locations that the application uses to store settings. -   + 4. After the application starts, close the application. The UE-V Generator records the locations where the application stores its settings. @@ -313,14 +313,14 @@ Templates that are deployed by using an ESD system or Group Policy Objects must **Note**   Templates on computers are updated daily. The update is based on changes to the settings template catalog. -   + 3. To manually update templates on a computer that runs the UE-V Agent, open an elevated command prompt, and browse to **%Program Files%\\Microsoft User Experience Virtualization \\ Agent \\ <x86 or x64 >**, and then run **ApplySettingsTemplateCatalog.exe**. **Note**   This program runs automatically during computer startup and daily at 3:30 A. M. to gather any new templates that were recently added to the catalog. -   + @@ -334,9 +334,9 @@ Templates that are deployed by using an ESD system or Group Policy Objects must [Deploy Required Features for UE-V 2.x](deploy-required-features-for-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md b/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md index 27b0dba976..a18ae22ef9 100644 --- a/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md +++ b/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md @@ -22,7 +22,7 @@ Follow the steps in this guide to quickly deploy Microsoft User Experience Virtu **Note**   The information in this section is repeated in greater detail throughout the rest of the documentation. So if you already know that UE-V 2 is the right solution and you don’t need to evaluate it, you can just go right to [Prepare a UE-V 2.x Deployment](prepare-a-ue-v-2x-deployment-new-uevv2.md). -  + The standard installation of UE-V synchronizes the default Microsoft Windows and Office settings and many Windows app settings. Make sure your test environment includes two or more user computers that share network access and you’ll be evaluating UE-V in just a short time. @@ -160,7 +160,7 @@ You’ll need to deploy a settings storage location, a standard network share wh -   + 2. Set the following NTFS file system permissions for the settings storage location folder. @@ -191,7 +191,7 @@ You’ll need to deploy a settings storage location, a standard network share wh -   + **Security Note:  ** @@ -259,9 +259,9 @@ You can change the settings in Computer B back to the original Computer A settin -  + -  + diff --git a/mdop/uev-v2/index.md b/mdop/uev-v2/index.md index cf1d9adb63..5e5f69c25f 100644 --- a/mdop/uev-v2/index.md +++ b/mdop/uev-v2/index.md @@ -67,24 +67,23 @@ This diagram shows how deployed UE-V components work together to synchronize set

    Settings location templates

    -

    UE-V uses XML files as settings location templates to monitor and synchronize desktop application settings and Windows desktop settings between user computers. By default, some settings location templates are included in UE-V . You can also create, edit, or validate custom settings location templates by [managing settings synchronization for custom applications](#customapps).

    +

    UE-V uses XML files as settings location templates to monitor and synchronize desktop application settings and Windows desktop settings between user computers. By default, some settings location templates are included in UE-V . You can also create, edit, or validate custom settings location templates by managing settings synchronization for custom applications.

    -Note   -

    Settings location templates are not required for Windows apps.

    +Note

    Settings location templates are not required for Windows apps.

    -  +

    Windows app list

    Settings for Windows apps are captured and applied dynamically. The app developer specifies the settings that are synchronized for each app. UE-V determines which Windows apps are enabled for settings synchronization using a managed list of apps. By default, this list includes most Windows apps.

    -

    You can add or remove applications in the Windows app list by following the procedures shown [here](https://technet.microsoft.com/library/dn458925.aspx).

    +

    You can add or remove applications in the Windows app list by following the procedures shown here.

    -  + ### Managing Settings Synchronization for Custom Applications @@ -103,12 +102,12 @@ Use these UE-V components to create and manage custom templates for your third-p

    Settings template catalog

    The settings template catalog is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores the custom settings location templates. The UE-V Agent checks this location once a day, retrieves new or updated templates, and updates its synchronization behavior.

    -

    If you use only the UE-V default settings location templates, then a settings template catalog is unnecessary. For more information about settings deployment catalogs, see [Configure a UE-V settings template catalog](https://technet.microsoft.com/library/dn458942.aspx#deploycatalogue).

    +

    If you use only the UE-V default settings location templates, then a settings template catalog is unnecessary. For more information about settings deployment catalogs, see Configure a UE-V settings template catalog.

    -  + ![ue-v generator process](images/ue-vgeneratorprocess.gif) @@ -133,15 +132,15 @@ Many Windows desktop applications, such as Notepad Many Windows settings, such as desktop background or wallpaper -**Note**   +**Note** You can also [customize UE-V to synchronize settings](https://technet.microsoft.com/library/dn458942.aspx) for applications other than those synchronized by default. -  + ## Compare UE-V to other Microsoft products -Use this table to compare UE-V to Synchronize Profiles in Windows 7, Synchronize Profiles in Windows 8, and the Sync PC Settings feature of Microsoft account. +Use this table to compare UE-V to Synchronize Profiles in Windows 7, Synchronize Profiles in Windows 8, and the Sync PC Settings feature of Microsoft account. @@ -156,7 +155,7 @@ Use this table to compare UE-V to Synchronize Profiles in Windows 7, Synchroniz - + @@ -276,7 +275,7 @@ Use this table to compare UE-V to Synchronize Profiles in Windows 7, Synchroniz
    FeatureSynchronize Profiles using Windows 7Synchronize Profiles using Windows 7 Synchronize Profiles using Windows 8 Synchronize Profiles using Windows 10 Microsoft account
    -  + ## UE-V 2.x Release Notes @@ -315,9 +314,9 @@ Find documentation, videos, and other resources for MDOP technologies. You can a -  - -  + + + diff --git a/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md b/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md index c43b34ca0d..2716ff5ef7 100644 --- a/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md +++ b/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md @@ -90,10 +90,10 @@ Restoring a user’s device restores the currently registered Template’s setti If the user’s UE-V settings storage path, domain, and Computer name match the current user then all of the settings for that user are synchronized, with only the latest settings applied. If a user logs on to a new device for the first time and these criteria are met, the settings data is applied to that device. - **Note**   + **Note** Accessibility and Windows Desktop settings require the user to re-logon to Windows to be applied. -   + - **Manual Restore** @@ -129,7 +129,7 @@ WMI and Windows PowerShell commands let you restore application and Windows sett -   + **To restore application settings and Windows settings with WMI** @@ -156,12 +156,14 @@ WMI and Windows PowerShell commands let you restore application and Windows sett -   - **Note**   - UE-V does not provide a settings rollback for Windows apps. -   +~~~ +**Note** +UE-V does not provide a settings rollback for Windows apps. +~~~ + + @@ -175,9 +177,9 @@ WMI and Windows PowerShell commands let you restore application and Windows sett [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  - -  + + + diff --git a/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md index 0bc37f2d0b..ba8db1fb4b 100644 --- a/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md +++ b/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md @@ -23,10 +23,10 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m 1. Stage the UE-V installer file in an accessible network share. - **Note**   + **Note** Use AgentSetup.exe to deploy both 32-bit and 64-bit versions of the UE-V Agent. Windows Installer packages, AgentSetupx86.msi and AgentSetupx64.msi, are available for each architecture. To uninstall the UE-V Agent at a later time by using the installation file, you must use the same file type. -   + 2. Use one of the following Windows PowerShell commands to install the UE-V Agent. @@ -36,164 +36,164 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m **To configure the UE-V Agent by using Windows PowerShell** -1. Open a Windows PowerShell window. To manage computer settings that affect all users of the computer by using the *Computer* parameter, open the window with an account that has administrator rights. +1. Open a Windows PowerShell window. To manage computer settings that affect all users of the computer by using the *Computer* parameter, open the window with an account that has administrator rights. -2. Use the following Windows PowerShell commands to configure the agent. +2. Use the following Windows PowerShell commands to configure the agent. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Windows PowerShell commandDescription

    Get-UevConfiguration

    +

    Gets the effective UE-V Agent settings. User-specific settings have precedence over the computer settings.

    Get-UevConfiguration - CurrentComputerUser

    +

    Gets the UE-V Agent settings values for the current user only.

    Get-UevConfiguration -Computer

    Gets the UE-V Agent configuration settings values for all users on the computer.

    Get-UevConfiguration -Details

    Gets the details for each configuration setting. Displays where the setting is configured or if it uses the default value. Is displayed if the current setting is valid.

    Set-UevConfiguration -Computer –ContactITDescription <IT description>

    Sets the text that is displayed in the Company Settings Center for the help link.

    Set-UevConfiguration -Computer -ContactITUrl <string>

    Sets the URL of the link in the Company Settings Center for the help link. Any URL protocol can be used.

    Set-UevConfiguration -Computer –EnableDontSyncWindows8AppSettings

    Configures the UE-V Agent to not synchronize any Windows apps for all users on the computer.

    Set-UevConfiguration -CurrentComputerUser – EnableDontSyncWindows8AppSettings

    Configures the UE-V Agent to not synchronize any Windows apps for the current computer user.

    Set-UevConfiguration -Computer –EnableFirstUseNotification

    Configures the UE-V Agent to display notification the first time the agent runs for all users on the computer.

    Set-UevConfiguration -Computer –DisableFirstUseNotification

    Configures the UE-V Agent to not display notification the first time that the agent runs for all users on the computer.

    Set-UevConfiguration -Computer –EnableSettingsImportNotify

    Configures the UE-V Agent to notify all users on the computer when settings synchronization is delayed.

    +

    Use the DisableSettingsImportNotify parameter to disable notification.

    Set-UevConfiguration - CurrentComputerUser -EnableSettingsImportNotify

    Configures the UE-V Agent to notify the current user when settings synchronization is delayed.

    +

    Use the DisableSettingsImportNotify parameter to disable notification.

    Set-UevConfiguration -Computer –EnableSyncUnlistedWindows8Apps

    Configures the UE-V Agent to synchronize all Windows apps that are not explicitly disabled by the Windows app list for all users of the computer. For more information, see "Get-UevAppxPackage" in Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI.

    +

    Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V Agent to synchronize only Windows apps that are explicitly enabled by the Windows App List.

    Set-UevConfiguration - CurrentComputerUser - EnableSyncUnlistedWindows8Apps

    Configures the UE-V Agent to synchronize all Windows apps that are not explicitly disabled by the Windows app list for the current user on the computer. For more information, see "Get-UevAppxPackage" in Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI.

    +

    Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V Agent to synchronize only Windows apps that are explicitly enabled by the Windows App List.

    Set-UevConfiguration –Computer –DisableSync

    Disables UE-V for all the users on the computer.

    +

    Use the EnableSync parameter to enable or re-enable.

    Set-UevConfiguration –CurrentComputerUser -DisableSync

    Disables UE-V for the current user on the computer.

    +

    Use the EnableSync parameter to enable or re-enable.

    Set-UevConfiguration -Computer –EnableTrayIcon

    Enables the UE-V icon in the notification area for all users of the computer.

    +

    Use the DisableTrayIcon parameter to disable the icon.

    Set-UevConfiguration -Computer -MaxPackageSizeInBytes <size in bytes>

    Configures the UE-V agent to report when a settings package file size reaches the defined threshold for all users on the computer. Sets the threshold package size in bytes.

    Set-UevConfiguration -CurrentComputerUser -MaxPackageSizeInBytes <size in bytes>

    Configures the UE-V agent to report when a settings package file size reaches the defined threshold. Sets the package size warning threshold for the current user.

    Set-UevConfiguration -Computer -SettingsImportNotifyDelayInSeconds

    Specifies the time in seconds before the user is notified for all users of the computer

    Set-UevConfiguration - CurrentComputerUser -SettingsImportNotifyDelayInSeconds

    Specifies the time in seconds before notification for the current user is sent.

    Set-UevConfiguration -Computer -SettingsStoragePath <path to _settings_storage_location>

    Defines a per-computer settings storage location for all users of the computer.

    Set-UevConfiguration -CurrentComputerUser -SettingsStoragePath <path to _settings_storage_location>

    Defines a per-user settings storage location.

    Set-UevConfiguration –Computer –SettingsTemplateCatalogPath <path to catalog>

    Sets the settings template catalog path for all users of the computer.

    Set-UevConfiguration -Computer -SyncMethod <sync method>

    Sets the synchronization method for all users of the computer: SyncProvider or None.

    Set-UevConfiguration -CurrentComputerUser -SyncMethod <sync method>

    Sets the synchronization method for the current user: SyncProvider or None.

    Set-UevConfiguration -Computer -SyncTimeoutInMilliseconds <timeout in milliseconds>

    Sets the synchronization time-out in milliseconds for all users of the computer

    Set- UevConfiguration -CurrentComputerUser -SyncTimeoutInMilliseconds <timeout in milliseconds>

    Set the synchronization time-out for the current user.

    Clear-UevConfiguration –Computer -<setting name>

    Clears the specified setting for all users on the computer.

    Clear-UevConfiguration –CurrentComputerUser -<setting name>

    Clears the specified setting for the current user only.

    Export-UevConfiguration <settings migration file>

    Exports the UE-V computer configuration to a settings migration file. The file name extension must be .uev.

    +

    The Export cmdlet exports all UE-V Agent settings that are configurable with the Computer parameter.

    Import-UevConfiguration <settings migration file>

    Imports the UE-V computer configuration from a settings migration file. The file name extension must be .uev.

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Windows PowerShell commandDescription

    Get-UevConfiguration

    -

    Gets the effective UE-V Agent settings. User-specific settings have precedence over the computer settings.

    Get-UevConfiguration - CurrentComputerUser

    -

    Gets the UE-V Agent settings values for the current user only.

    Get-UevConfiguration -Computer

    Gets the UE-V Agent configuration settings values for all users on the computer.

    Get-UevConfiguration -Details

    Gets the details for each configuration setting. Displays where the setting is configured or if it uses the default value. Is displayed if the current setting is valid.

    Set-UevConfiguration -Computer –ContactITDescription <IT description>

    Sets the text that is displayed in the Company Settings Center for the help link.

    Set-UevConfiguration -Computer -ContactITUrl <string>

    Sets the URL of the link in the Company Settings Center for the help link. Any URL protocol can be used.

    Set-UevConfiguration -Computer –EnableDontSyncWindows8AppSettings

    Configures the UE-V Agent to not synchronize any Windows apps for all users on the computer.

    Set-UevConfiguration -CurrentComputerUser – EnableDontSyncWindows8AppSettings

    Configures the UE-V Agent to not synchronize any Windows apps for the current computer user.

    Set-UevConfiguration -Computer –EnableFirstUseNotification

    Configures the UE-V Agent to display notification the first time the agent runs for all users on the computer.

    Set-UevConfiguration -Computer –DisableFirstUseNotification

    Configures the UE-V Agent to not display notification the first time that the agent runs for all users on the computer.

    Set-UevConfiguration -Computer –EnableSettingsImportNotify

    Configures the UE-V Agent to notify all users on the computer when settings synchronization is delayed.

    -

    Use the DisableSettingsImportNotify parameter to disable notification.

    Set-UevConfiguration - CurrentComputerUser -EnableSettingsImportNotify

    Configures the UE-V Agent to notify the current user when settings synchronization is delayed.

    -

    Use the DisableSettingsImportNotify parameter to disable notification.

    Set-UevConfiguration -Computer –EnableSyncUnlistedWindows8Apps

    Configures the UE-V Agent to synchronize all Windows apps that are not explicitly disabled by the Windows app list for all users of the computer. For more information, see "Get-UevAppxPackage" in [Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI](managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md).

    -

    Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V Agent to synchronize only Windows apps that are explicitly enabled by the Windows App List.

    Set-UevConfiguration - CurrentComputerUser - EnableSyncUnlistedWindows8Apps

    Configures the UE-V Agent to synchronize all Windows apps that are not explicitly disabled by the Windows app list for the current user on the computer. For more information, see "Get-UevAppxPackage" in [Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI](managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md).

    -

    Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V Agent to synchronize only Windows apps that are explicitly enabled by the Windows App List.

    Set-UevConfiguration –Computer –DisableSync

    Disables UE-V for all the users on the computer.

    -

    Use the EnableSync parameter to enable or re-enable.

    Set-UevConfiguration –CurrentComputerUser -DisableSync

    Disables UE-V for the current user on the computer.

    -

    Use the EnableSync parameter to enable or re-enable.

    Set-UevConfiguration -Computer –EnableTrayIcon

    Enables the UE-V icon in the notification area for all users of the computer.

    -

    Use the DisableTrayIcon parameter to disable the icon.

    Set-UevConfiguration -Computer -MaxPackageSizeInBytes <size in bytes>

    Configures the UE-V agent to report when a settings package file size reaches the defined threshold for all users on the computer. Sets the threshold package size in bytes.

    Set-UevConfiguration -CurrentComputerUser -MaxPackageSizeInBytes <size in bytes>

    Configures the UE-V agent to report when a settings package file size reaches the defined threshold. Sets the package size warning threshold for the current user.

    Set-UevConfiguration -Computer -SettingsImportNotifyDelayInSeconds

    Specifies the time in seconds before the user is notified for all users of the computer

    Set-UevConfiguration - CurrentComputerUser -SettingsImportNotifyDelayInSeconds

    Specifies the time in seconds before notification for the current user is sent.

    Set-UevConfiguration -Computer -SettingsStoragePath <path to _settings_storage_location>

    Defines a per-computer settings storage location for all users of the computer.

    Set-UevConfiguration -CurrentComputerUser -SettingsStoragePath <path to _settings_storage_location>

    Defines a per-user settings storage location.

    Set-UevConfiguration –Computer –SettingsTemplateCatalogPath <path to catalog>

    Sets the settings template catalog path for all users of the computer.

    Set-UevConfiguration -Computer -SyncMethod <sync method>

    Sets the synchronization method for all users of the computer: SyncProvider or None.

    Set-UevConfiguration -CurrentComputerUser -SyncMethod <sync method>

    Sets the synchronization method for the current user: SyncProvider or None.

    Set-UevConfiguration -Computer -SyncTimeoutInMilliseconds <timeout in milliseconds>

    Sets the synchronization time-out in milliseconds for all users of the computer

    Set- UevConfiguration -CurrentComputerUser -SyncTimeoutInMilliseconds <timeout in milliseconds>

    Set the synchronization time-out for the current user.

    Clear-UevConfiguration –Computer -<setting name>

    Clears the specified setting for all users on the computer.

    Clear-UevConfiguration –CurrentComputerUser -<setting name>

    Clears the specified setting for the current user only.

    Export-UevConfiguration <settings migration file>

    Exports the UE-V computer configuration to a settings migration file. The file name extension must be .uev.

    -

    The Export cmdlet exports all UE-V Agent settings that are configurable with the Computer parameter.

    Import-UevConfiguration <settings migration file>

    Imports the UE-V computer configuration from a settings migration file. The file name extension must be .uev.

    -   **To export UE-V package settings and repair UE-V templates by using Windows PowerShell** @@ -222,7 +222,7 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m -   + **To configure the UE-V Agent by using WMI** @@ -318,13 +318,15 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m -   - Upon configuration of the UE-V Agent with WMI and Windows PowerShell, the defined configuration is stored in the registry in the following locations. - `\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration` +~~~ +Upon configuration of the UE-V Agent with WMI and Windows PowerShell, the defined configuration is stored in the registry in the following locations. - `\HKEY_CURRENT_USER\SOFTWARE\Microsoft\UEV\Agent\Configuration` +`\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration` + +`\HKEY_CURRENT_USER\SOFTWARE\Microsoft\UEV\Agent\Configuration` +~~~ **To export UE-V package settings and repair UE-V templates by using WMI** @@ -355,9 +357,11 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m -   - **Got a suggestion for UE-V**? Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). **Got a UE-V issue**? Use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopuev). + +~~~ +**Got a suggestion for UE-V**? Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). **Got a UE-V issue**? Use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopuev). +~~~ ## Related topics @@ -366,9 +370,9 @@ You can use Windows Management Instrumentation (WMI) and Windows PowerShell to m [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  - -  + + + diff --git a/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md index fd781f99d3..8de1e74734 100644 --- a/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md +++ b/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md @@ -26,7 +26,7 @@ The WMI and Windows PowerShell features of UE-V include the ability to enable, d You must have administrator permissions to update, register, or unregister a settings location template. Administrator permissions are not required to enable, disable, or list templates. -****To manage settings location templates by using Windows PowerShell**** +***To manage settings location templates by using Windows PowerShell*** 1. Use an account with administrator rights to open a Windows PowerShell command prompt. @@ -155,7 +155,7 @@ You must have administrator permissions to update, register, or unregister a set -   + The UE-V Windows PowerShell features enable you to manage a group of settings templates that are deployed in your enterprise. Use the following procedure to manage a group of templates by using Windows PowerShell. @@ -334,12 +334,14 @@ User Experience Virtualization provides the following set of WMI commands. Admin -   - **Note**   - Where a list of Package Family Names is called by the WMI command, the list must be in quotes and separated by a pipe symbol, for example, `""`. -   +~~~ +**Note** +Where a list of Package Family Names is called by the WMI command, the list must be in quotes and separated by a pipe symbol, for example, `""`. +~~~ + + ### Deploying the UE-V Agent using Windows PowerShell @@ -347,10 +349,10 @@ User Experience Virtualization provides the following set of WMI commands. Admin 1. Stage the UE-V Agent installation package in an accessible network share. - **Note**   + **Note** Use AgentSetup.exe to deploy both 32-bit and 64-bit versions of the UE-V Agent. The Windows Installer packages, AgentSetupx86.msi and AgentSetupx64.msi, are available for each architecture. To uninstall the UE-V Agent at a later time by using the installation file, you must use the same file type. -   + 2. Use one of the following Windows PowerShell commands to install the UE-V Agent. @@ -367,9 +369,9 @@ User Experience Virtualization provides the following set of WMI commands. Admin [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  - -  + + + diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md index e66312a690..72c09ecf9e 100644 --- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md +++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md @@ -135,81 +135,81 @@ This section contains hotfixes and KB articles for UE-V 2.0.

    2927019

    Hotfix Package 1 for Microsoft User Experience Virtualization 2.0

    -

    [support.microsoft.com/kb/2927019](https://support.microsoft.com/kb/2927019)

    +

    support.microsoft.com/kb/2927019

    2903501

    UE-V: User Experience Virtualization (UE-V) compatibility with user profiles

    -

    [support.microsoft.com/kb/2903501/EN-US](https://support.microsoft.com/kb/2903501/EN-US)

    +

    support.microsoft.com/kb/2903501/EN-US

    2770042

    UE-V Registry Settings

    -

    [support.microsoft.com/kb/2770042/EN-US](https://support.microsoft.com/kb/2770042/EN-US)

    +

    support.microsoft.com/kb/2770042/EN-US

    2847017

    UE-V settings replicated by Internet Explorer

    -

    [support.microsoft.com/kb/2847017/EN-US](https://support.microsoft.com/kb/2847017/EN-US)

    +

    support.microsoft.com/kb/2847017/EN-US

    2930271

    Understanding the limitations of roaming Outlook signatures in Microsoft UE-V

    -

    [support.microsoft.com/kb/2930271/EN-US](https://support.microsoft.com/kb/2930271/EN-US)

    +

    support.microsoft.com/kb/2930271/EN-US

    2769631

    How to repair a corrupted UE-V install

    -

    [support.microsoft.com/kb/2769631/EN-US](https://support.microsoft.com/kb/2769631/EN-US)

    +

    support.microsoft.com/kb/2769631/EN-US

    2850989

    Migrating MAPI profiles with Microsoft UE-V is not supported

    -

    [support.microsoft.com/kb/2850989/EN-US](https://support.microsoft.com/kb/2850989/EN-US)

    +

    support.microsoft.com/kb/2850989/EN-US

    2769586

    UE-V roams empty folders and registry keys

    -

    [support.microsoft.com/kb/2769586/EN-US](https://support.microsoft.com/kb/2769586/EN-US)

    +

    support.microsoft.com/kb/2769586/EN-US

    2782997

    How To Enable Debug Logging in Microsoft User Experience Virtualization (UE-V)

    -

    [support.microsoft.com/kb/2782997/EN-US](https://support.microsoft.com/kb/2782997/EN-US)

    +

    support.microsoft.com/kb/2782997/EN-US

    2769570

    UE-V does not update the theme on RDS or VDI sessions

    -

    [support.microsoft.com/kb/2769570/EN-US](https://support.microsoft.com/kb/2769570/EN-US)

    +

    support.microsoft.com/kb/2769570/EN-US

    2901856

    Application settings do not sync after you force a restart on a UE-V-enabled computer

    -

    [support.microsoft.com/kb/2901856/EN-US](https://support.microsoft.com/kb/2901856/EN-US)

    +

    support.microsoft.com/kb/2901856/EN-US

    2850582

    How To Use Microsoft User Experience Virtualization With App-V Applications

    -

    [support.microsoft.com/kb/2850582/EN-US](https://support.microsoft.com/kb/2850582/EN-US)

    +

    support.microsoft.com/kb/2850582/EN-US

    3041879

    Current file versions for Microsoft User Experience Virtualization

    -

    [support.microsoft.com/kb/3041879/EN-US](https://support.microsoft.com/kb/3041879/EN-US)

    +

    support.microsoft.com/kb/3041879/EN-US

    2843592

    Information on User Experience Virtualization and High Availability

    -

    [support.microsoft.com/kb/2843592/EN-US](https://support.microsoft.com/kb/2843592/EN-US)

    +

    support.microsoft.com/kb/2843592/EN-US

    -  + -  + -  + diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md index 168bcec5f6..d8f9534765 100644 --- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md +++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md @@ -68,7 +68,7 @@ WORKAROUND: The UE-V installer (.msi) has two new command-line parameters that s -  + ### Registry settings do not synchronize between App-V and native applications on the same computer @@ -156,76 +156,76 @@ This section contains hotfixes and KB articles for UE-V 2.1.

    3018608

    UE-V 2.1 - TemplateConsole.exe crashes when UE-V WMI classes are missing

    -

    [support.microsoft.com/kb/3018608/EN-US](https://support.microsoft.com/kb/3018608/EN-US)

    +

    support.microsoft.com/kb/3018608/EN-US

    2903501

    UE-V: User Experience Virtualization (UE-V) compatibility with user profiles

    -

    [support.microsoft.com/kb/2903501/EN-US](https://support.microsoft.com/kb/2903501/EN-US)

    +

    support.microsoft.com/kb/2903501/EN-US

    2770042

    UE-V Registry Settings

    -

    [support.microsoft.com/kb/2770042/EN-US](https://support.microsoft.com/kb/2770042/EN-US)

    +

    support.microsoft.com/kb/2770042/EN-US

    2847017

    UE-V settings replicated by Internet Explorer

    -

    [support.microsoft.com/kb/2847017/EN-US](https://support.microsoft.com/kb/2847017/EN-US)

    +

    support.microsoft.com/kb/2847017/EN-US

    2769631

    How to repair a corrupted UE-V install

    -

    [support.microsoft.com/kb/2769631/EN-US](https://support.microsoft.com/kb/2769631/EN-US)

    +

    support.microsoft.com/kb/2769631/EN-US

    2850989

    Migrating MAPI profiles with Microsoft UE-V is not supported

    -

    [support.microsoft.com/kb/2850989/EN-US](https://support.microsoft.com/kb/2850989/EN-US)

    +

    support.microsoft.com/kb/2850989/EN-US

    2769586

    UE-V roams empty folders and registry keys

    -

    [support.microsoft.com/kb/2769586/EN-US](https://support.microsoft.com/kb/2769586/EN-US)

    +

    support.microsoft.com/kb/2769586/EN-US

    2782997

    How To Enable Debug Logging in Microsoft User Experience Virtualization (UE-V)

    -

    [support.microsoft.com/kb/2782997/EN-US](https://support.microsoft.com/kb/2782997/EN-US)

    +

    support.microsoft.com/kb/2782997/EN-US

    2769570

    UE-V does not update the theme on RDS or VDI sessions

    -

    [support.microsoft.com/kb/2769570/EN-US](https://support.microsoft.com/kb/2769570/EN-US)

    +

    support.microsoft.com/kb/2769570/EN-US

    2850582

    How To Use Microsoft User Experience Virtualization With App-V Applications

    -

    [support.microsoft.com/kb/2850582/EN-US](https://support.microsoft.com/kb/2850582/EN-US)

    +

    support.microsoft.com/kb/2850582/EN-US

    3041879

    Current file versions for Microsoft User Experience Virtualization

    -

    [support.microsoft.com/kb/3041879/EN-US](https://support.microsoft.com/kb/3041879/EN-US)

    +

    support.microsoft.com/kb/3041879/EN-US

    2843592

    Information on User Experience Virtualization and High Availability

    -

    [support.microsoft.com/kb/2843592/EN-US](https://support.microsoft.com/kb/2843592/EN-US)

    +

    support.microsoft.com/kb/2843592/EN-US

    -  + -  + -  + diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md index 5f878e59c4..643bc35ace 100644 --- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md +++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md @@ -68,7 +68,7 @@ WORKAROUND: The UE-V installer (.msi) has two new command-line parameters that s -  + ### Registry settings do not synchronize between App-V and native applications on the same computer @@ -167,76 +167,76 @@ This section contains hotfixes and KB articles for UE-V 2.1 SP1.

    3018608

    UE-V 2.1 - TemplateConsole.exe crashes when UE-V WMI classes are missing

    -

    [support.microsoft.com/kb/3018608/EN-US](https://support.microsoft.com/kb/3018608/EN-US)

    +

    support.microsoft.com/kb/3018608/EN-US

    2903501

    UE-V: User Experience Virtualization (UE-V) compatibility with user profiles

    -

    [support.microsoft.com/kb/2903501/EN-US](https://support.microsoft.com/kb/2903501/EN-US)

    +

    support.microsoft.com/kb/2903501/EN-US

    2770042

    UE-V Registry Settings

    -

    [support.microsoft.com/kb/2770042/EN-US](https://support.microsoft.com/kb/2770042/EN-US)

    +

    support.microsoft.com/kb/2770042/EN-US

    2847017

    UE-V settings replicated by Internet Explorer

    -

    [support.microsoft.com/kb/2847017/EN-US](https://support.microsoft.com/kb/2847017/EN-US)

    +

    support.microsoft.com/kb/2847017/EN-US

    2769631

    How to repair a corrupted UE-V install

    -

    [support.microsoft.com/kb/2769631/EN-US](https://support.microsoft.com/kb/2769631/EN-US)

    +

    support.microsoft.com/kb/2769631/EN-US

    2850989

    Migrating MAPI profiles with Microsoft UE-V is not supported

    -

    [support.microsoft.com/kb/2850989/EN-US](https://support.microsoft.com/kb/2850989/EN-US)

    +

    support.microsoft.com/kb/2850989/EN-US

    2769586

    UE-V roams empty folders and registry keys

    -

    [support.microsoft.com/kb/2769586/EN-US](https://support.microsoft.com/kb/2769586/EN-US)

    +

    support.microsoft.com/kb/2769586/EN-US

    2782997

    How To Enable Debug Logging in Microsoft User Experience Virtualization (UE-V)

    -

    [support.microsoft.com/kb/2782997/EN-US](https://support.microsoft.com/kb/2782997/EN-US)

    +

    support.microsoft.com/kb/2782997/EN-US

    2769570

    UE-V does not update the theme on RDS or VDI sessions

    -

    [support.microsoft.com/kb/2769570/EN-US](https://support.microsoft.com/kb/2769570/EN-US)

    +

    support.microsoft.com/kb/2769570/EN-US

    2850582

    How To Use Microsoft User Experience Virtualization With App-V Applications

    -

    [support.microsoft.com/kb/2850582/EN-US](https://support.microsoft.com/kb/2850582/EN-US)

    +

    support.microsoft.com/kb/2850582/EN-US

    3041879

    Current file versions for Microsoft User Experience Virtualization

    -

    [support.microsoft.com/kb/3041879/EN-US](https://support.microsoft.com/kb/3041879/EN-US)

    +

    support.microsoft.com/kb/3041879/EN-US

    2843592

    Information on User Experience Virtualization and High Availability

    -

    [support.microsoft.com/kb/2843592/EN-US](https://support.microsoft.com/kb/2843592/EN-US)

    +

    support.microsoft.com/kb/2843592/EN-US

    -  + -  + -  + diff --git a/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md b/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md index 4eb5166780..6b13a80d3d 100644 --- a/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md +++ b/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md @@ -40,7 +40,7 @@ Simply copying the files and folders does not preserve the security settings and **Note**   To monitor the copy progress, open MySettings.txt with a log viewer such as Trace32. -   + 4. Grant share-level permissions to the new share. Leave the NTFS file system permissions as they were set by Robocopy. @@ -53,9 +53,9 @@ Simply copying the files and folders does not preserve the security settings and [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md b/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md index 6d11720c7f..9d9a9348ec 100644 --- a/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md +++ b/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md @@ -86,10 +86,10 @@ See [User Experience Virtualization (UE-V) settings templates for Microsoft Offi When you install the UE-V 2.1 or 2.1 SP1 Agent, it registers a default group of settings location templates that capture settings values for these common Microsoft applications. -**Tip**   +**Tip** **Microsoft Office 2007 Settings Synchronization** – In UE-V 2.1 and 2.1 SP1, a settings location template is no longer included by default for Office 2007 applications. However, you can still use Office 2007 templates from UE-V 2.0 or earlier and can get the templates from the [UE-V template gallery](https://go.microsoft.com/fwlink/p/?LinkID=246589). -  + @@ -105,7 +105,7 @@ When you install the UE-V 2.1 or 2.1 SP1 Agent, it registers a default group of +

    (Download a list of all settings synced)

    +

    (Download a list of all settings synced)

    @@ -164,21 +162,21 @@ When you install the UE-V 2.1 or 2.1 SP1 Agent, it registers a default group of

    Microsoft Office 2010 applications

    -

    ([Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367))

    Microsoft Word 2010

    Microsoft Excel 2010

    Microsoft Outlook 2010

    @@ -122,7 +122,7 @@ When you install the UE-V 2.1 or 2.1 SP1 Agent, it registers a default group of

    Microsoft Office 2013 applications

    -

    ([Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367))

    Microsoft Word 2013

    Microsoft Excel 2013

    Microsoft Outlook 2013

    @@ -139,22 +139,20 @@ When you install the UE-V 2.1 or 2.1 SP1 Agent, it registers a default group of

    Microsoft OneDrive for Business 2013

    The UE-V 2.1 and 2.1 SP1 Microsoft Office 2013 settings location templates include improved Outlook signature support. We’ve added synchronization of default signature settings for new, reply, and forwarded emails.

    -Note   -

    An Outlook profile must be created for any device on which a user wants to sync their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization.

    +Note

    An Outlook profile must be created for any device on which a user wants to sync their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization.

    -  +

    Browser options: Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11

    Favorites, home page, tabs, and toolbars.

    -Note   -

    UE-V does not roam settings for Internet Explorer cookies.

    +Note

    UE-V does not roam settings for Internet Explorer cookies.

    -  +
    -  -**Note**   + +**Note** UE-V 2.1 SP1 does not synchronize settings between the Microsoft Calculator in Windows 10 and the Microsoft Calculator in previous operating systems. -  + ### Desktop applications synchronized by default in UE-V 2.0 When you install the UE-V 2.0 Agent, it registers a default group of settings location templates that capture settings values for these common Microsoft applications. -**Tip**   +**Tip** **Microsoft Office 2013 Settings Synchronization** – In UE-V 2.0, a settings location template is not included by default for Office 2013 applications, but is available for download from the [UE-V template gallery](https://go.microsoft.com/fwlink/p/?LinkID=246589). [Synchronizing Office 2013 with UE-V 2.0](synchronizing-office-2013-with-ue-v-20-both-uevv2.md) provides details about the supported templates that synchronize Office 2013 settings. -  + @@ -194,7 +192,7 @@ When you install the UE-V 2.0 Agent, it registers a default group of settings lo +

    (Download a list of all settings synced)

    +

    (Download a list of all settings synced)

    @@ -243,7 +240,7 @@ When you install the UE-V 2.0 Agent, it registers a default group of settings lo

    Microsoft Office 2007 applications

    -

    ([Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367))

    Microsoft Access 2007

    Microsoft Communicator 2007

    Microsoft Excel 2007

    @@ -210,7 +208,7 @@ When you install the UE-V 2.0 Agent, it registers a default group of settings lo

    Microsoft Office 2010 applications

    -

    ([Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367))

    Microsoft Word 2010

    Microsoft Excel 2010

    Microsoft Outlook 2010

    @@ -229,11 +227,10 @@ When you install the UE-V 2.0 Agent, it registers a default group of settings lo

    Browser options: Internet Explorer 8, Internet Explorer 9, and Internet Explorer 10

    Favorites, home page, tabs, and toolbars.

    -Note   -

    UE-V does not roam settings for Internet Explorer cookies.

    +Note

    UE-V does not roam settings for Internet Explorer cookies.

    -  +
    -  + ### Windows settings synchronized by default @@ -291,17 +288,17 @@ UE-V includes settings location templates that capture settings values for these -  -**Note**   + +**Note** Starting in Windows 8, UE-V does not roam settings related to the Start screen, such as items and locations. In addition, UE-V does not support synchronization of pinned taskbar items or Windows file shortcuts. -  -**Important**   + +**Important** UE-V 2.1 SP1 roams taskbar settings between Windows 10 devices. However, UE-V does not synchronize taskbar settings between Windows 10 devices and devices running previous operating systems. -  + @@ -362,7 +359,7 @@ UE-V 2.1 SP1 roams taskbar settings between Windows 10 devices. However, UE-V do
    -  + ### UE-V-support for Windows Apps @@ -370,10 +367,10 @@ For Windows apps, the app developer specifies the settings that are synchronized To display a list of Windows apps that can synchronize settings on a computer with their package family name, enabled status, and enabled source, at a Windows PowerShell command prompt, enter: `Get-UevAppxPackage` -**Note**   +**Note** As of Windows 8, UE-V does not synchronize Windows app settings if the domain user links their sign-in credentials to their Microsoft Account. This linking synchronizes settings to Microsoft OneDrive so UE-V, which disables synchronization of Windows app settings. -  + ### UE-V-support for Roaming Printers @@ -387,10 +384,10 @@ Printer roaming in UE-V requires one of these scenarios: - The printer driver can be obtained from Windows Update. -**Note**   +**Note** The UE-V printer roaming feature does **not** roam printer settings or preferences, such as printing double-sided. -  + ### Determine whether you need settings synchronized for other applications @@ -440,7 +437,7 @@ If you’ve decided that you need settings synchronized for other applications, Checklist box -

    Does the application store settings in the Program Files directory or in the file directory that is located in the Users\[User name]\AppData\LocalLow directory? Application data that is stored in either of these locations usually should not synchronize with the user, because this data is specific to the computer or because the data is too large to synchronize.

    +

    Does the application store settings in the Program Files directory or in the file directory that is located in the Users[User name]<strong>AppData<strong>LocalLow directory? Application data that is stored in either of these locations usually should not synchronize with the user, because this data is specific to the computer or because the data is too large to synchronize.

    Checklist box @@ -453,7 +450,7 @@ If you’ve decided that you need settings synchronized for other applications, -  + ## Other Considerations when Preparing a UE-V Deployment @@ -478,10 +475,10 @@ You should also consider these things when you are preparing to deploy UE-V: Many enterprise applications, including Microsoft Outlook and Lync, prompt users for their domain credentials at login. Users have the option of saving their credentials to disk to prevent having to enter them every time they open these applications. Enabling roaming credentials synchronization lets users save their credentials on one computer and avoid re-entering them on every computer they use in their environment. Users can synchronize some domain credentials with UE-V 2.1 and 2.1 SP1. -**Important**   +**Important** Credentials synchronization is disabled by default. You must explicitly enable credentials synchronization during deployment to implement this feature. -  + UE-V 2.1 and 2.1 SP1 can synchronize enterprise credentials, but do not roam credentials intended only for use on the local computer. @@ -489,10 +486,10 @@ Credentials are synchronous settings, meaning they are applied to your profile t Credentials synchronization is managed by its own settings location template, which is disabled by default. You can enable or disable this template through the same methods used for other templates. The template identifier for this feature is RoamingCredentialSettings. -**Important**   +**Important** If you are using Active Directory Credential Roaming in your environment, we recommend that you don’t enable the UE-V credential roaming template. -  + Use one of these methods to enable credentials synchronization: @@ -502,10 +499,10 @@ Use one of these methods to enable credentials synchronization: - Group Policy -**Note**   +**Note** Credentials are encrypted during synchronization. -  + [Company Settings Center](https://technet.microsoft.com/library/dn458903.aspx)**:** Check the Roaming Credential Settings check box under Windows Settings to enable credential synchronization. Uncheck the box to disable it. This check box only appears in Company Settings Center if your account is not configured to synchronize settings using a Microsoft Account. @@ -645,7 +642,7 @@ Before you proceed, make sure your environment includes these requirements for r -

    Windows 7

    +

    Windows 7

    Ultimate, Enterprise, or Professional Edition

    SP1

    32-bit or 64-bit

    @@ -654,7 +651,7 @@ Before you proceed, make sure your environment includes these requirements for r

    .NET Framework 4 or higher for UE-V 2.0.

    -

    Windows Server 2008 R2

    +

    Windows Server 2008 R2

    Standard, Enterprise, Datacenter, or Web Server

    SP1

    64-bit

    @@ -673,11 +670,10 @@ Before you proceed, make sure your environment includes these requirements for r

    Windows 10, pre-1607 version

    -Note   -

    Only UE-V 2.1 SP1 supports Windows 10, pre-1607 version

    +Note

    Only UE-V 2.1 SP1 supports Windows 10, pre-1607 version

    -  +

    Enterprise or Pro

    None

    @@ -704,7 +700,7 @@ Before you proceed, make sure your environment includes these requirements for r -  + Also… @@ -712,16 +708,16 @@ Also… - **Administrative Credentials** for any computer on which you’ll be installing -**Note**   +**Note** - Starting with WIndows 10, version 1607, UE-V is included with [Windows 10 for Enterprise](https://www.microsoft.com/en-us/WindowsForBusiness/windows-for-enterprise) and is no longer part of the Microsoft Desktop Optimization Pack. - The UE-V Windows PowerShell feature of the UE-V Agent requires .NET Framework 4 or higher and Windows PowerShell 3.0 or higher to be enabled. Download Windows PowerShell 3.0 [here](https://go.microsoft.com/fwlink/?LinkId=309609). -- Install .NET Framework 4 or .NET Framework 4.5 on computers that run the Windows 7 or the Windows Server 2008 R2 operating system. The Windows 8, Windows 8.1, and Windows Server 2012 operating systems come with .NET Framework 4.5 installed. The Windows 10 operating system comes with .NET Framework 4.6 installed. +- Install .NET Framework 4 or .NET Framework 4.5 on computers that run the Windows 7 or the Windows Server 2008 R2 operating system. The Windows 8, Windows 8.1, and Windows Server 2012 operating systems come with .NET Framework 4.5 installed. The Windows 10 operating system comes with .NET Framework 4.6 installed. - The “Delete Roaming Cache” policy for Mandatory profiles is not supported with UE-V and should not be used. -  + There are no special random access memory (RAM) requirements specific to UE-V. @@ -747,30 +743,30 @@ Enable this configuration through one of these methods: - During UE-V installation, at the command prompt or in a batch file, set the AgentSetup.exe parameter *SyncMethod = None*. [Deploying the UE-V 2.x Agent](https://technet.microsoft.com/library/dn458891.aspx#agent) provides more information. -- After the UE-V installation, use the Settings Management feature in System Center 2012 Configuration Manager or the MDOP ADMX templates to push the *SyncMethod = None* configuration. +- After the UE-V installation, use the Settings Management feature in System Center 2012 Configuration Manager or the MDOP ADMX templates to push the *SyncMethod = None* configuration. - Use Windows PowerShell or Windows Management Instrumentation (WMI) to set the *SyncMethod = None* configuration. - **Note**   + **Note** These last two methods do not work for pooled virtual desktop infrastructure (VDI) environments. -   + You must restart the computer before the settings start to synchronize. -**Note**   +**Note** If you set *SyncMethod = None*, any settings changes are saved directly to the server. If the network connection to the settings storage path is not found, then the settings changes are cached on the device and are synchronized the next time that the sync provider runs. If the settings storage path is not found and the user profile is removed from a pooled VDI environment on logoff, settings changes are lost and the user must reapply the change when the computer is reconnected to the settings storage path. -  + **Synchronization for external sync engines:** The *SyncMethod=External* parameter specifies that if UE-V settings are written to a local folder on the user computer, then any external sync engine (such as OneDrive for Business, Work Folders, Sharepoint, or Dropbox) can be used to apply these settings to the different computers that users access. **Support for shared VDI sessions:** UE-V 2.1 and 2.1 SP1 provide support for VDI sessions that are shared among end users. You can register and configure a special VDI template, which ensures that UE-V keeps all of its functionality intact for non-persistent VDI sessions. -**Note**   +**Note** If you do not enable VDI mode for non-persistent VDI sessions, certain features do not work, such as [back-up/restore and last known good (LKG)](https://technet.microsoft.com/library/dn878331.aspx). -  + The VDI template is provided with UE-V 2.1 and 2.1 SP1 and is typically available here after installation: C:\\Program Files\\Microsoft User Experience Virtualization\\Templates\\VdiState.xml @@ -778,7 +774,7 @@ The VDI template is provided with UE-V 2.1 and 2.1 SP1 and is typically availabl Install the UE-V Generator on the computer that is used to create custom settings location templates. This computer should be able to run the applications whose settings are synchronized. You must be a member of the Administrators group on the computer that runs the UE-V Generator software. -The UE-V Generator must be installed on a computer that uses an NTFS file system. The UE-V Generator software requires .NET Framework 4. For more information, see [Deploy UE-V 2.x for Custom Applications](deploy-ue-v-2x-for-custom-applications-new-uevv2.md). +The UE-V Generator must be installed on a computer that uses an NTFS file system. The UE-V Generator software requires .NET Framework 4. For more information, see [Deploy UE-V 2.x for Custom Applications](deploy-ue-v-2x-for-custom-applications-new-uevv2.md). ## Other resources for this product @@ -798,9 +794,9 @@ The UE-V Generator must be installed on a computer that uses an NTFS file system -  - -  + + + diff --git a/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md index e029566ef1..bc93749e20 100644 --- a/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md +++ b/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md @@ -25,7 +25,7 @@ This topic contains a brief overview of accounts and groups, log files, and othe **Important**   When you create the settings storage share, limit the share access to users who require access. -  + Because settings packages might contain personal information, you should take care to protect them as well as possible. In general, do the following: @@ -58,7 +58,7 @@ Because settings packages might contain personal information, you should take ca | Everyone | No permissions | | Domain computers | Read permission Levels | | Administrators | Read/write permission levels | -   + 4. Set the following NTFS permissions for the settings template catalog folder. | User account | Recommended permissions | Apply to | @@ -113,7 +113,7 @@ Additional security can be configured when a Windows Server is used for the sett When this configuration setting is in place, the UE-V Agent verifies that the local Administrators group or current user is the owner of the settings package folder. If not, then the UE-V Agent does not grant access to the folder. -  + If you must create folders for the users, ensure that you have the correct permissions set. @@ -133,9 +133,9 @@ If you redirect UE-V settings to a user’s home directory or a custom Active Di [Technical Reference for UE-V 2.x](technical-reference-for-ue-v-2x-both-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md index ef9ba7578a..8b8c565dc8 100644 --- a/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md +++ b/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md @@ -40,7 +40,7 @@ The following table explains the trigger events for classic applications and Win

    Windows Logon

    • Application and Windows settings are imported to the local cache from the settings storage location.

    • -
    • [Asynchronous Windows settings](https://technet.microsoft.com/library/dn458932.aspx#autosyncsettings2) are applied.

    • +
    • Asynchronous Windows settings are applied.

    • Synchronous Windows settings will be applied during the next Windows logon.

    • Application settings will be applied when the application starts.

    @@ -82,19 +82,18 @@ The following table explains the trigger events for classic applications and Win

    Application and Windows settings are synchronized between the settings storage location and the local cache.

    -Note   -

    Settings changes are not cached locally until an application closes. This trigger will not export changes made to a currently running application.

    +Note

    Settings changes are not cached locally until an application closes. This trigger will not export changes made to a currently running application.

    For Windows settings, this means that any changes will not be cached locally and exported until the next Lock (Asynchronous) or Logoff (Asynchronous and Synchronous).

    -  +

    Settings are applied in these cases:

    • Asynchronous Windows settings are applied directly.

    • Application settings are applied when the application starts.

    • Both asynchronous and synchronous Windows settings are applied during the next Windows logon.

    • -
    • Windows app (AppX) settings are applied during the next refresh. See [Monitor Application Settings](https://technet.microsoft.com/library/dn458944.aspx) for more information.

    • +
    • Windows app (AppX) settings are applied during the next refresh. See Monitor Application Settings for more information.

    NA

    @@ -106,7 +105,7 @@ The following table explains the trigger events for classic applications and Win -  + @@ -122,9 +121,9 @@ The following table explains the trigger events for classic applications and Win [Choose the Configuration Method for UE-V 2.x](https://technet.microsoft.com/library/dn458891.aspx#config) -  - -  + + + diff --git a/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md b/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md index 21679bc60f..16c4897c6f 100644 --- a/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md +++ b/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md @@ -35,7 +35,7 @@ UE-V monitors when an application opens by the program name and, optionally, by **Note**   If you publish the newly created template to the settings template catalog, the client does not receive the template until the sync provider updates the settings. To manually start this process, open **Task Scheduler**, expand **Task Scheduler Library**, expand **Microsoft**, and expand **UE-V**. In the results pane, right-click **Template Auto Update**, and then click **Run**. -   + 4. Start the App-V package. @@ -49,9 +49,9 @@ UE-V monitors when an application opens by the program name and, optionally, by [Administering UE-V 2.x](administering-ue-v-2x-new-uevv2.md) -  + -  + diff --git a/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md b/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md index 4e7149fbb9..ad1e2132a4 100644 --- a/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md +++ b/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md @@ -46,7 +46,7 @@ By default, UE-V synchronizes the settings of many of the Windows apps included **Note**   UE-V does not synchronize Windows app settings if the domain users link their sign-in credentials to their Microsoft account. This linking synchronizes settings to Microsoft OneDrive so UE-V only synchronizes the desktop applications. -  + ## Microsoft account linking @@ -78,9 +78,9 @@ Company Settings Center displays which settings are synchronized and lets users [Microsoft User Experience Virtualization (UE-V) 2.0 Release Notes](microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md) -  + -  + diff --git a/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md b/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md index f19fec789b..de567fa610 100644 --- a/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md +++ b/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md @@ -27,7 +27,7 @@ UE-V 2.1 includes the Microsoft Office 2013 settings location template with impr **Note**   An Outlook profile must be created for any device on which a user wants to sync their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization. -  + Previously UE-V included Microsoft Office 2010 settings location templates that were automatically distributed and registered with the UE-V Agent. UE-V 2.1 works with Office 365 to determine whether Office 2013 settings are roamed by Office 365. If settings are roamed by Office 365 they are not roamed by UE-V. [Overview of user and roaming settings for Office 2013](https://go.microsoft.com/fwlink/p/?LinkID=391220) provides more information. @@ -58,7 +58,7 @@ UE-V 2.1 gives customers the ability to synchronize credentials and certificates **Note**   In Windows 8 and later, Credential Manager contains web credentials. These credentials are not synchronized between users’ devices. -  + ## UE-V and Microsoft Account Synchronization @@ -78,7 +78,7 @@ UE-V 2.1 includes [support for VDI sessions](https://technet.microsoft.com/libra **Note**   If you do not enable VDI mode for non-persistent VDI sessions, certain features do not work, such as back-up/restore and LKG. -  + ## Administrative Backup and Restore @@ -104,9 +104,9 @@ UE-V now synchronizes touch keyboard personalization, the spelling dictionary, a [Microsoft User Experience Virtualization (UE-V) 2.1 Release Notes](microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md) -  + -  + diff --git a/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md b/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md index 99eab09970..b146bb839e 100644 --- a/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md +++ b/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md @@ -56,7 +56,7 @@ Printer roaming in UE-V requires one of these scenarios: **Note**   The UE-V printer roaming feature does **not** roam printer settings or preferences, such as printing double-sided. -  + ## Office 2013 Settings Location Template @@ -66,7 +66,7 @@ UE-V 2.1 and 2.1 SP1 include the Microsoft Office 2013 settings location templat **Note**   An Outlook profile must be created for any device on which a user wants to sync their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization. -  + Previously UE-V included Microsoft Office 2010 settings location templates that were automatically distributed and registered with the UE-V Agent. UE-V 2.1 works with Office 365 to determine whether Office 2013 settings are roamed by Office 365. If settings are roamed by Office 365 they are not roamed by UE-V. [Overview of user and roaming settings for Office 2013](https://go.microsoft.com/fwlink/p/?LinkID=391220) provides more information. @@ -92,9 +92,9 @@ UE-V 2.1 ships [Office 2013 and Office 2010 templates](https://technet.microsoft [Microsoft User Experience Virtualization (UE-V) 2.1 SP1 Release Notes](microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md) -  + -  + diff --git a/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md b/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md index 17fd946da9..a925e62689 100644 --- a/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md +++ b/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md @@ -64,7 +64,7 @@ Use the UE-V Generator to edit settings location templates. When the revised set **Note**   If you edit a UE-V 1.0 template by using the UE-V 2 Generator, the template is automatically converted to a UE-V 2 template. UE-V 1.0 Agents can no longer use the edited template. -  + **To edit a UE-V settings location template with the UE-V Generator** @@ -107,7 +107,7 @@ If you edit a UE-V 1.0 template by using the UE-V 2 Generator, the template is a **Note**   A settings location template is unique because of the template **ID**. If you copy the template and rename the .xml file, template registration fails because UE-V reads the template **ID** tag in the .xml file to determine the name, not the file name of the .xml file. UE-V also reads the **Version** number to know if anything has changed. If the version number is higher, UE-V updates the template. -   + 2. Open the settings location template file with an XML editor. @@ -165,9 +165,9 @@ Before you deploy any settings location template that you have downloaded from t [Deploy UE-V 2.x for Custom Applications](deploy-ue-v-2x-for-custom-applications-new-uevv2.md) -  + -  + diff --git a/smb/cloud-mode-business-setup.md b/smb/cloud-mode-business-setup.md index 43b8400a8a..c2d50ddd02 100644 --- a/smb/cloud-mode-business-setup.md +++ b/smb/cloud-mode-business-setup.md @@ -59,58 +59,58 @@ If this is the first time you're setting this up, and you'd like to see how it's 1. Go to the Office 365 page in the Microsoft Business site. Select **Try now** to use the Office 365 Business Premium Trial or select **Buy now** to sign up for Office 365 Business Premium. In this walkthrough, we'll select **Try now**. - **Figure 1** - Try or buy Office 365 + **Figure 1** - Try or buy Office 365 - ![Office 365 for business sign up](images/office365_tryorbuy_now.png) + ![Office 365 for business sign up](images/office365_tryorbuy_now.png) 2. Fill out the sign up form and provide information about you and your company. 3. Create a user ID and password to use to sign into your account. - This step creates an onmicrosoft.com email address. You can use this email address to sign in to the various admin centers. Save your sign-in info so you can use it to sign into https://portal.office.com (the admin portal). + This step creates an onmicrosoft.com email address. You can use this email address to sign in to the various admin centers. Save your sign-in info so you can use it to sign into https://portal.office.com (the admin portal). 4. Select **Create my account** and then enter the phone number you used in step 2 to verify your identity. You'll be asked to enter your verification code. 5. Select **You're ready to go...** which will take you to the Office 365 portal. - > [!NOTE] - > In the Office 365 portal, icons that are greyed out are still installing. + > [!NOTE] + > In the Office 365 portal, icons that are greyed out are still installing. - **Figure 2** - Office 365 portal + **Figure 2** - Office 365 portal - ![Office 365 portal](images/office365_portal.png) + ![Office 365 portal](images/office365_portal.png) 6. Select the **Admin** tile to go to the Office 365 admin center. 7. In the admin center, click **Next** to see the highlights and welcome info for the admin center. When you're done, click **Go to setup** to complete the Office 365 setup. - This may take up to a half hour to complete. + This may take up to a half hour to complete. - **Figure 3** - Office 365 admin center + **Figure 3** - Office 365 admin center - ![Office 365 admin center](images/office365_admin_portal.png) + ![Office 365 admin center](images/office365_admin_portal.png) 8. Go back to the Office 365 admin center to add or buy a domain. - 1. Select the **Domains** option. + 1. Select the **Domains** option. - **Figure 4** - Option to add or buy a domain + **Figure 4** - Option to add or buy a domain - ![Add or buy a domain in Office 365 admin center](images/office365_buy_domain.png) + ![Add or buy a domain in Office 365 admin center](images/office365_buy_domain.png) - 2. In the **Home > Domains** page, you will see the Microsoft-provided domain, such as *fabrikamdesign.onmicrosoft.com*. + 2. In the **Home > Domains** page, you will see the Microsoft-provided domain, such as *fabrikamdesign.onmicrosoft.com*. - **Figure 5** - Microsoft-provided domain + **Figure 5** - Microsoft-provided domain - ![Microsoft-provided domain](images/office365_ms_provided_domain.png) + ![Microsoft-provided domain](images/office365_ms_provided_domain.png) - - If you already have a domain, select **+ Add domain** to add your existing domain. If you select this option, you'll be required to verify that you own the domain. Follow the steps in the wizard to verify your domain. - - If you don't already own a domain, select **+ Buy domain**. If you're using a trial plan, you'll be required to upgrade your trial plan in order to buy a domain. Choose the subscription plan to use for your business and provide the details to complete your order. + - If you already have a domain, select **+ Add domain** to add your existing domain. If you select this option, you'll be required to verify that you own the domain. Follow the steps in the wizard to verify your domain. + - If you don't already own a domain, select **+ Buy domain**. If you're using a trial plan, you'll be required to upgrade your trial plan in order to buy a domain. Choose the subscription plan to use for your business and provide the details to complete your order. - Once you've added your domain, you'll see it listed in addition to the Microsoft-provided onmicrosoft.com domain. + Once you've added your domain, you'll see it listed in addition to the Microsoft-provided onmicrosoft.com domain. - **Figure 6** - Domains + **Figure 6** - Domains - ![Verify your domains in Office 365 admin center](images/office365_additional_domain.png) + ![Verify your domains in Office 365 admin center](images/office365_additional_domain.png) ### 1.2 Add users and assign product licenses Once you've set up Office and added your domain, it's time to add users so they have access to Office 365. People in your organization need an account before they can sign in and access Office 365. The easiest way to add users is to add them one at a time in the Office 365 admin center. @@ -121,32 +121,32 @@ When adding users, you can also assign admin privileges to certain users in your 1. In the Office 365 admin center, select **Users > Active users**. - **Figure 7** - Add users + **Figure 7** - Add users - ![Add Office 365 users](images/office365_users.png) + ![Add Office 365 users](images/office365_users.png) 2. In the **Home > Active users** page, add users individually or in bulk. - - To add users one at a time, select **+ Add a user**. + - To add users one at a time, select **+ Add a user**. - If you select this option, you'll see the **New user** screen and you can add details about the new user including their name, user name, role, and so on. You also have the opportunity to assign **Product licenses**. For detailed step-by-step info on adding a user account, see *Add a user account in the Office 365 admin center* in Add users individually or in bulk to Office 365 - Admin Help. + If you select this option, you'll see the **New user** screen and you can add details about the new user including their name, user name, role, and so on. You also have the opportunity to assign **Product licenses**. For detailed step-by-step info on adding a user account, see *Add a user account in the Office 365 admin center* in Add users individually or in bulk to Office 365 - Admin Help. - **Figure 8** - Add an individual user + **Figure 8** - Add an individual user - ![Add an individual user](images/office365_add_individual_user.png) + ![Add an individual user](images/office365_add_individual_user.png) - - To add multiple users at once, select **More** and then choose **+ Import multiple users**. If you select this option, you'll need to create and upload a CSV file containing the list of users. + - To add multiple users at once, select **More** and then choose **+ Import multiple users**. If you select this option, you'll need to create and upload a CSV file containing the list of users. - The **Import multiple users** screen includes a link where you can learn more about importing multiple users and also links for downloading a sample CSV file (one with headers only and another with headers and sample user information). For detailed step-by-step info on adding multiple users to Office 365, see Add several users at the same time to Office 365 - Admin Help. Once you've added all the users, don't forget to assign **Product licenses** to the new users. + The **Import multiple users** screen includes a link where you can learn more about importing multiple users and also links for downloading a sample CSV file (one with headers only and another with headers and sample user information). For detailed step-by-step info on adding multiple users to Office 365, see Add several users at the same time to Office 365 - Admin Help. Once you've added all the users, don't forget to assign **Product licenses** to the new users. - **Figure 9** - Import multiple users + **Figure 9** - Import multiple users - ![Import multiple users](images/office365_import_multiple_users.png) + ![Import multiple users](images/office365_import_multiple_users.png) 3. Verify that all the users you added appear in the list of **Active users**. The **Status** should indicate the product licenses that were assigned to them. - **Figure 10** - List of active users + **Figure 10** - List of active users - ![Verify users and assigned product licenses](images/o365_active_users.png) + ![Verify users and assigned product licenses](images/o365_active_users.png) ### 1.3 Add Microsoft Intune Microsoft Intune provides mobile device management, app management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to apps, data, and corporate resources from anywhere on almost any device while helping to keep corporate information secure. To learn more, see What is Intune? @@ -158,16 +158,16 @@ Microsoft Intune provides mobile device management, app management, and PC manag 3. Confirm your order to enable access to Microsoft Intune. 4. In the admin center, the Intune licenses will show as available and ready to be assigned to users. Select **Users > Active users** and then edit the product licenses assigned to the users to turn on **Intune A Direct**. - **Figure 11** - Assign Intune licenses + **Figure 11** - Assign Intune licenses - ![Assign Microsoft Intune licenses to users](images/o365_assign_intune_license.png) + ![Assign Microsoft Intune licenses to users](images/o365_assign_intune_license.png) 5. In the admin center, confirm that **Intune** shows up in the list under **Admin centers**. If it doesn't, sign out and then sign back in and then check again. 6. Select **Intune**. This will take you to the Intune management portal. - **Figure 12** - Microsoft Intune management portal + **Figure 12** - Microsoft Intune management portal - ![Microsoft Intune management portal](images/intune_portal_home.png) + ![Microsoft Intune management portal](images/intune_portal_home.png) Intune should now be added to your tenant. We'll come back to Intune later when we [Configure Microsoft Store for Business for app distribution](#17-configure-microsoft-store-for-business-for-app-distribution). @@ -178,30 +178,30 @@ Microsoft Azure is an open and flexible cloud platform that enables you to quick 1. In the Office 365 admin center, select **Admin centers > Azure AD**. - > [!NOTE] - > You will need Azure AD Premium to configure automatic MDM enrollment with Intune. + > [!NOTE] + > You will need Azure AD Premium to configure automatic MDM enrollment with Intune. 2. If you have not signed up for Azure AD before, you will see the following message. To proceed with the rest of the walkthrough, you need to activate an Azure subscription. - **Figure 13** - Access to Azure AD is not available + **Figure 13** - Access to Azure AD is not available - ![Access to Azure AD not available](images/azure_ad_access_not_available.png) + ![Access to Azure AD not available](images/azure_ad_access_not_available.png) 3. From the error message, select the country/region for your business. This should match with the location you specified when you signed up for Office 365. 4. Click **Azure subscription**. This will take you to a free trial sign up screen. - **Figure 14** - Sign up for Microsoft Azure + **Figure 14** - Sign up for Microsoft Azure - ![Sign up for Microsoft Azure](images/azure_ad_sign_up_screen.png) + ![Sign up for Microsoft Azure](images/azure_ad_sign_up_screen.png) 5. In the **Free trial sign up** screen, fill in the required information and then click **Sign up**. 6. After you sign up, you should see the message that your subscription is ready. Click **Start managing my service**. - **Figure 15** - Start managing your Azure subscription + **Figure 15** - Start managing your Azure subscription - ![Start managing your Azure subscription](images/azure_ad_successful_signup.png) + ![Start managing your Azure subscription](images/azure_ad_successful_signup.png) - This will take you to the Microsoft Azure portal. + This will take you to the Microsoft Azure portal. ### 1.5 Add groups in Azure AD This section is the walkthrough is optional. However, we recommend that you create groups in Azure AD to manage access to corporate resources, such as apps, policies and settings, and so on. For more information, see Managing access to resources with Azure Active Directory groups. @@ -212,38 +212,38 @@ To add Azure AD group(s), we will use the classic Azure portal, you will see a screen informing you that your directory is ready for use. - Afterwards, you should see a list of active directories. In the following example, **Fabrikam Design** is the active directory. + Afterwards, you should see a list of active directories. In the following example, **Fabrikam Design** is the active directory. - **Figure 16** - Azure first sign-in screen + **Figure 16** - Azure first sign-in screen - ![Select Azure AD](images/azure_portal_classic_configure_directory.png) + ![Select Azure AD](images/azure_portal_classic_configure_directory.png) 2. Select the directory (such as Fabrikam Design) to go to the directory's home page. - **Figure 17** - Directory home page + **Figure 17** - Directory home page - ![Directory home page](images/azure_portal_classic_directory_ready.png) + ![Directory home page](images/azure_portal_classic_directory_ready.png) 3. From the menu options on top, select **Groups**. - **Figure 18** - Azure AD groups + **Figure 18** - Azure AD groups - ![Add groups in Azure AD](images/azure_portal_classic_groups.png) + ![Add groups in Azure AD](images/azure_portal_classic_groups.png) 4. Select **Add a group** (from the top) or **Add group** at the bottom. 5. In the **Add Group** window, add a name, group type, and description for the group and click the checkmark to save your changes. The new group will appear on the groups list. - **Figure 19** - Newly added group in Azure AD + **Figure 19** - Newly added group in Azure AD - ![Verify the new group appears on the list](images/azure_portal_classic_all_users_group.png) + ![Verify the new group appears on the list](images/azure_portal_classic_all_users_group.png) 6. In the **Groups** tab, select the arrow next to the group (such as **All users**), add members to the group, and then save your changes. - The members that were added to the group will appear on the list. + The members that were added to the group will appear on the list. - **Figure 20** - Members in the new group + **Figure 20** - Members in the new group - ![Members added to the new group](images/azure_portal_classic_members_added.png) + ![Members added to the new group](images/azure_portal_classic_members_added.png) 7. Repeat steps 2-6 to add other groups. You can add groups based on their roles in your company, based on the apps that each group can use, and so on. @@ -259,37 +259,37 @@ You can read classic Azure portal, click on your company's Azure Active Directory to go back to the main window. Select **Applications** from the list of directory menu options. - The list of applications for your company will appear. **Microsoft Intune** will be one of the applications on the list. + The list of applications for your company will appear. **Microsoft Intune** will be one of the applications on the list. - **Figure 21** - List of applications for your company + **Figure 21** - List of applications for your company - ![List of applications for your company](images/azure_portal_classic_applications.png) + ![List of applications for your company](images/azure_portal_classic_applications.png) 2. Select **Microsoft Intune** to configure the application. 3. In the Microsoft Intune configuration page, click **Configure** to start automatic MDM enrollment configuration with Intune. - **Figure 22** - Configure Microsoft Intune in Azure + **Figure 22** - Configure Microsoft Intune in Azure - ![Configure Microsoft Intune in Azure](images/azure_portal_classic_configure_intune_app.png) + ![Configure Microsoft Intune in Azure](images/azure_portal_classic_configure_intune_app.png) 4. In the Microsoft Intune configuration page: - - In the **Properties** section, you should see a list of URLs for MDM discovery, MDM terms of use, and MDM compliance. + - In the **Properties** section, you should see a list of URLs for MDM discovery, MDM terms of use, and MDM compliance. - > [!NOTE] - > The URLs are automatically configured for your Azure AD tenant so you don't need to change them. + > [!NOTE] + > The URLs are automatically configured for your Azure AD tenant so you don't need to change them. - - In the **Manage devices for these users** section, you can specify which users' devices should be managed by Intune. - - **All** will enable all users' Windows 10 devices to be managed by Intune. - - **Groups** let you select whether only users that belong to a specific group will have their devices managed by Intune. + - In the **Manage devices for these users** section, you can specify which users' devices should be managed by Intune. + - **All** will enable all users' Windows 10 devices to be managed by Intune. + - **Groups** let you select whether only users that belong to a specific group will have their devices managed by Intune. - > [!NOTE] - > In this step, choose the group that contains all the users in your organization as members. This is the **All** group. + > [!NOTE] + > In this step, choose the group that contains all the users in your organization as members. This is the **All** group. 5. After you've chosen how to manage devices for users, select **Save** to enable automatic MDM enrollment with Intune. - **Figure 23** - Configure Microsoft Intune + **Figure 23** - Configure Microsoft Intune - ![Configure automatic MDM enrollment with Intune](images/azure_portal_classic_configure_intune_mdm_enrollment.png) + ![Configure automatic MDM enrollment with Intune](images/azure_portal_classic_configure_intune_mdm_enrollment.png) ### 1.7 Configure Microsoft Store for Business for app distribution Next, you'll need to configure Microsoft Store for Business to distribute apps with a management tool such as Intune. @@ -301,33 +301,33 @@ In this part of the walkthrough, we'll be working on the Microsoft Intune management portal, select **Admin**. 2. In the **Administration** workspace, click **Mobile Device Management**. If this is the first item you're using the portal, click **manage mobile devices** in the **Mobile Device Management** window. The page will refresh and you'll have new options under **Mobile Device Management**. - **Figure 24** - Mobile device management + **Figure 24** - Mobile device management - ![Set up mobile device management in Intune](images/intune_admin_mdm_configure.png) + ![Set up mobile device management in Intune](images/intune_admin_mdm_configure.png) 3. Sign into Microsoft Store for Business using the same tenant account that you used to sign into Intune. 4. Accept the EULA. 5. In the Store portal, select **Settings > Management tools** to go to the management tools page. 6. In the **Management tools** page, find **Microsoft Intune** on the list and click **Activate** to get Intune ready to use with Microsoft Store for Business. - **Figure 25** - Activate Intune as the Store management tool + **Figure 25** - Activate Intune as the Store management tool - ![Activate Intune from the Store portal](images/wsfb_management_tools_activate.png) + ![Activate Intune from the Store portal](images/wsfb_management_tools_activate.png) 7. Go back to the Intune management portal, select **Admin > Mobile Device Management**, expand **Windows**, and then choose **Store for Business**. 8. In the **Microsoft Store for Business** page, select **Configure Sync** to sync your Store for Business volume-purchased apps with Intune. - **Figure 26** - Configure Store for Business sync in Intune + **Figure 26** - Configure Store for Business sync in Intune - ![Configure Store for Business sync in Intune](images/intune_admin_mdm_store_sync.png) + ![Configure Store for Business sync in Intune](images/intune_admin_mdm_store_sync.png) 9. In the **Configure Microsoft Store for Business app sync** dialog box, check **Enable Microsoft Store for Business sync**. In the **Language** dropdown list, choose the language in which you want apps from the Store to be displayed in the Intune console and then click **OK**. - **Figure 27** - Enable Microsoft Store for Business sync in Intune + **Figure 27** - Enable Microsoft Store for Business sync in Intune - ![Enable Store for Business sync in Intune](images/intune_configure_store_app_sync_dialog.png) + ![Enable Store for Business sync in Intune](images/intune_configure_store_app_sync_dialog.png) - The **Microsoft Store for Business** page will refresh and it will show the details from the sync. + The **Microsoft Store for Business** page will refresh and it will show the details from the sync. **To buy apps from the Store** @@ -346,9 +346,9 @@ In the following example, we'll show you how to buy apps through the Microsoft S 1. In the Microsoft Store for Business portal, click **Shop**, scroll down to the **Made by Microsoft** category, and click **Show all** to see all the Microsoft apps in the list. - **Figure 28** - Shop for Store apps + **Figure 28** - Shop for Store apps - ![Shop for Store apps](images/wsfb_shop_microsoft_apps.png) + ![Shop for Store apps](images/wsfb_shop_microsoft_apps.png) 2. Click to select an app, such as **Reader**. This opens the app page. 3. In the app's Store page, click **Get the app**. You should see a dialog that confirms your order. Click **Close**. This will refresh the app's Store page. @@ -356,12 +356,12 @@ In the following example, we'll show you how to buy apps through the Microsoft S 5. Next, search for another app by name (such as **InstaNote**) or repeat steps 1-4 for the **InstaNote** app. 6. Go to **Manage > Inventory** and verify that the apps you purchased appear in your inventory. - **Figure 29** - App inventory shows the purchased apps + **Figure 29** - App inventory shows the purchased apps - ![Confirm that your inventory shows purchased apps](images/wsfb_manage_inventory_newapps.png) + ![Confirm that your inventory shows purchased apps](images/wsfb_manage_inventory_newapps.png) - > [!NOTE] - > Sync happens automatically, but it may take up to 24 hours for your organization's private store and 12 hours for Intune to sync all your purchased apps. You can force a sync to make this process happen faster. For more info, see [To sync recently purchased apps](#forceappsync). + > [!NOTE] + > Sync happens automatically, but it may take up to 24 hours for your organization's private store and 12 hours for Intune to sync all your purchased apps. You can force a sync to make this process happen faster. For more info, see [To sync recently purchased apps](#forceappsync). **To sync recently purchased apps** @@ -370,9 +370,9 @@ If you need to sync your most recently purchased apps and have it appear in your 1. In the Intune management portal, select **Admin > Mobile Device Management > Windows > Store for Business**. 2. In the **Microsoft Store for Business** page, click **Sync now** to force a sync. - **Figure 30** - Force a sync in Intune + **Figure 30** - Force a sync in Intune - ![Force a sync in Intune](images/intune_admin_mdm_forcesync.png) + ![Force a sync in Intune](images/intune_admin_mdm_forcesync.png) **To view purchased apps** - In the Intune management portal, select **Apps > Apps** and then choose **Volume-Purchased Apps** to see the list of available apps. Verify that the apps you purchased were imported correctly. @@ -387,33 +387,33 @@ To set up new Windows devices, go through the Windows initial device setup or fi **To set up a device** 1. Go through the Windows device setup experience. On a new or reset device, this starts with the **Hi there** screen on devices running Windows 10, version 1607 (Anniversary Update). The setup lets you: - - Fill in the details in the **Hi there** screen including your home country/region, preferred language, keyboard layout, and timezone - - Accept the EULA - - Customize the setup or use Express settings + - Fill in the details in the **Hi there** screen including your home country/region, preferred language, keyboard layout, and timezone + - Accept the EULA + - Customize the setup or use Express settings - **Figure 31** - First screen in Windows device setup + **Figure 31** - First screen in Windows device setup - ![First screen in Windows device setup](images/win10_hithere.png) + ![First screen in Windows device setup](images/win10_hithere.png) - > [!NOTE] - > During setup, if you don't have a Wi-Fi network configured, make sure you connect the device to the Internet through a wired/Ethernet connection. + > [!NOTE] + > During setup, if you don't have a Wi-Fi network configured, make sure you connect the device to the Internet through a wired/Ethernet connection. 2. In the **Who owns this PC?** screen, select **My work or school owns it** and click **Next**. 3. In the **Choose how you'll connect** screen, select **Join Azure Active Directory** and click **Next**. - **Figure 32** - Choose how you'll connect your Windows device + **Figure 32** - Choose how you'll connect your Windows device - ![Choose how you'll connect the Windows device](images/win10_choosehowtoconnect.png) + ![Choose how you'll connect the Windows device](images/win10_choosehowtoconnect.png) 4. In the **Let's get you signed in** screen, sign in using one of the user accounts you added in section [1.2 Add users and assign product licenses](#12-add-users-and-assign-product-licenses). We suggest signing in as one of the global administrators. Later, sign in on another device using one of the non-admin accounts. - **Figure 33** - Sign in using one of the accounts you added + **Figure 33** - Sign in using one of the accounts you added - ![Sign in using one of the accounts you added](images/win10_signin_admin_account.png) + ![Sign in using one of the accounts you added](images/win10_signin_admin_account.png) 5. If this is the first time you're signing in, you will be asked to update your password. Update the password and continue with sign-in and setup. - Windows will continue with setup and you may be asked to set up a PIN for Windows Hello if your organization has it enabled. + Windows will continue with setup and you may be asked to set up a PIN for Windows Hello if your organization has it enabled. ### 2.2 Verify correct device setup Verify that the device is set up correctly and boots without any issues. @@ -428,20 +428,20 @@ In the Intune management **To verify if the device is joined to Azure AD** 1. Check the device name on your PC. To do this, on your Windows PC, select **Settings > System > About** and then check **PC name**. - **Figure 34** - Check the PC name on your device + **Figure 34** - Check the PC name on your device - ![Check the PC name on your device](images/win10_settings_pcname.png) + ![Check the PC name on your device](images/win10_settings_pcname.png) 2. Log in to the Intune management portal. 3. Select **Groups** and then go to **Devices**. 4. In the **All Devices** page, look at the list of devices and select the entry that matches the name of your PC. - - Check that the device name appears in the list. Select the device and it will also show the current logged-in user in the **General Information** section. - - Check the **Management Channel** column and confirm that it says **Managed by Microsoft Intune**. - - Check the **AAD Registered** column and confirm that it says **Yes**. + - Check that the device name appears in the list. Select the device and it will also show the current logged-in user in the **General Information** section. + - Check the **Management Channel** column and confirm that it says **Managed by Microsoft Intune**. + - Check the **AAD Registered** column and confirm that it says **Yes**. - **Figure 35** - Check that the device appears in Intune + **Figure 35** - Check that the device appears in Intune - ![Check that the device appears in Intune](images/intune_groups_devices_list.png) + ![Check that the device appears in Intune](images/intune_groups_devices_list.png) ## 3. Manage device settings and features You can use Microsoft Intune admin settings and policies to manage features on your organization's mobile devices and computers. For more info, see [Manage settings and features on your devices with Microsoft Intune policies](https://docs.microsoft.com/intune/deploy-use/manage-settings-and-features-on-your-devices-with-microsoft-intune-policies). @@ -458,19 +458,19 @@ In some cases, if an app is missing from the device, you need to reconfigure the 4. Click **Next** at the bottom of the app deployment settings window or select **Deployment Action** on the left column to check the deployment settings for the app. 5. For each group that you selected, set **Approval** to **Required Install**. This automatically sets **Deadline** to **As soon as possible**. If **Deadline** is not automatically set, set it to **As soon as possible**. - **Figure 36** - Reconfigure an app's deployment setting in Intune + **Figure 36** - Reconfigure an app's deployment setting in Intune - ![Reconfigure app deployment settings in Intune](images/intune_apps_deploymentaction.png) + ![Reconfigure app deployment settings in Intune](images/intune_apps_deploymentaction.png) 6. Click **Finish**. 7. Repeat steps 2-6 for other apps that you want to deploy to the device(s) as soon as possible. -6. Verify that the app shows up on the device. To do this: - - Make sure you're logged in to the Windows device. - - Click the **Start** button and check the apps that appear in the **Recently added** section. If you don't see the apps that you deployed in Intune, give it a few minutes. Only apps that aren't already deployed on the device will appear in the **Recently added** section. +8. Verify that the app shows up on the device. To do this: + - Make sure you're logged in to the Windows device. + - Click the **Start** button and check the apps that appear in the **Recently added** section. If you don't see the apps that you deployed in Intune, give it a few minutes. Only apps that aren't already deployed on the device will appear in the **Recently added** section. - **Figure 37** - Confirm that additional apps were deployed to the device + **Figure 37** - Confirm that additional apps were deployed to the device - ![Confirm that additiional apps were deployed to the device](images/win10_deploy_apps_immediately.png) + ![Confirm that additiional apps were deployed to the device](images/win10_deploy_apps_immediately.png) ### 3.2 Configure other settings in Intune @@ -480,36 +480,36 @@ In some cases, if an app is missing from the device, you need to reconfigure the 3. On the **Create a New Policy** page, click **Windows** to expand the group, select **General Configuration (Windows 10 Desktop and Mobile and later)**, choose **Create and Deploy a Custom Policy**, and then click **Create Policy**. 4. On the **Create Policy** page, select **Device Capabilities**. 5. In the **General** section, add a name and description for this policy. For example: - - **Name**: Test Policy - Disable Camera - - **Description**: Disables the camera + - **Name**: Test Policy - Disable Camera + - **Description**: Disables the camera 6. Scroll down to the **Hardware** section, find **Allow camera is not configured**, toggle the button so that it changes to **Allow camera** and choose **No** from the dropdown list. - **Figure 38** - Add a configuration policy + **Figure 38** - Add a configuration policy - ![Add a configuration policy](images/intune_policy_disablecamera.png) + ![Add a configuration policy](images/intune_policy_disablecamera.png) 7. Click **Save Policy**. A confirmation window will pop up. 8. On the **Deploy Policy** confirmation window, select **Yes** to deploy the policy now. 9. On the **Management Deployment** window, select the user group(s) or device group(s) that you want to apply the policy to (for example, **All Users**), and then click **Add**. 10. Click **OK** to close the window. - **Figure 39** - The new policy should appear in the **Policies** list. + **Figure 39** - The new policy should appear in the **Policies** list. - ![New policy appears on the list](images/intune_policies_newpolicy_deployed.png) + ![New policy appears on the list](images/intune_policies_newpolicy_deployed.png) **To turn off Windows Hello and PINs during device setup** 1. In the Intune management portal, select **Admin**. 2. Go to **Mobile Device Management > Windows > Windows Hello for Business**. 3. In the **Windows Hello for Business** page, select **Disable Windows Hello for Business on enrolled devices**. - **Figure 40** - Policy to disable Windows Hello for Business + **Figure 40** - Policy to disable Windows Hello for Business - ![Disable Windows Hello for Business](images/intune_policy_disable_windowshello.png) + ![Disable Windows Hello for Business](images/intune_policy_disable_windowshello.png) 4. Click **Save**. - > [!NOTE] - > This policy is a tenant-wide Intune setting. It disables Windows Hello and required PINs during setup for all enrolled devices in a tenant. + > [!NOTE] + > This policy is a tenant-wide Intune setting. It disables Windows Hello and required PINs during setup for all enrolled devices in a tenant. To test whether these policies get successfully deployed to your tenant, go through [4. Add more devices and users](#4-add-more-devices-and-users) and setup another Windows device and login as one of the users. @@ -529,34 +529,34 @@ For other devices, such as those personally-owned by employees who need to conne 2. Select **Access work or school** and then click **Connect** in the **Connect to work or school** page. 3. In the **Set up a work or school account** window, click **Join this device to Azure Active Directory** to add an Azure AD account to the device. - **Figure 41** - Add an Azure AD account to the device + **Figure 41** - Add an Azure AD account to the device - ![Add an Azure AD account to the device](images/win10_add_new_user_join_aad.png) + ![Add an Azure AD account to the device](images/win10_add_new_user_join_aad.png) 4. In the **Let's get you signed in** window, enter the work credentials for the account and then click **Sign in** to authenticate the user. - **Figure 42** - Enter the account details + **Figure 42** - Enter the account details - ![Enter the account details](images/win10_add_new_user_account_aadwork.png) + ![Enter the account details](images/win10_add_new_user_account_aadwork.png) 5. You will be asked to update the password so enter a new password. 6. Verify the details to make sure you're connecting to the right organization and then click **Join**. - **Figure 43** - Make sure this is your organization + **Figure 43** - Make sure this is your organization - ![Make sure this is your organization](images/win10_confirm_organization_details.png) + ![Make sure this is your organization](images/win10_confirm_organization_details.png) 7. You will see a confirmation window that says the device is now connected to your organization. Click **Done**. - **Figure 44** - Confirmation that the device is now connected + **Figure 44** - Confirmation that the device is now connected - ![Confirmation that the device is now connected](images/win10_confirm_device_connected_to_org.png) + ![Confirmation that the device is now connected](images/win10_confirm_device_connected_to_org.png) 8. The **Connect to work or school** window will refresh and will now include an entry that shows you're connected to your organization's Azure AD. This means the device is now registered in Azure AD and enrolled in MDM and the account should have access to the organization's resources. - **Figure 45** - Device is now enrolled in Azure AD + **Figure 45** - Device is now enrolled in Azure AD - ![Device is enrolled in Azure AD](images/win10_device_enrolled_in_aad.png) + ![Device is enrolled in Azure AD](images/win10_device_enrolled_in_aad.png) 9. You can confirm that the new device and user are showing up as Intune-managed by going to the Intune management portal and following the steps in [2.3 Verify the device is Azure AD joined](#23-verify-the-device-is-azure-ad-joined). It may take several minutes before the new device shows up so check again later. diff --git a/smb/docfx.json b/smb/docfx.json index b86df232d5..5ea640e672 100644 --- a/smb/docfx.json +++ b/smb/docfx.json @@ -4,7 +4,7 @@ { "files": [ "**/*.md", - "**/*.yml" + "**/*.yml" ], "exclude": [ "**/obj/**", @@ -29,21 +29,21 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/windows/smb/breadcrumb/toc.json", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "TechNet.smb", - "folder_relative_path_in_docset": "./" - } - } - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/windows/smb/breadcrumb/toc.json", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "TechNet.smb", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [], "dest": "smb", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/smb/index.md b/smb/index.md index 3f7bb09bc7..4df3e742c1 100644 --- a/smb/index.md +++ b/smb/index.md @@ -22,12 +22,12 @@ ms.localizationpriority: medium

    Windows 10 for business
    Learn how Windows 10 and Windows devices can help your business.

    SMB blog
    Read about the latest stories, technology insights, and business strategies for SMBs.

    -

    How to buy
    Go here when you're ready to buy or want to learn more about Microsoft products you can use to help transform your business.

    +

    How to buy
    Go here when you're ready to buy or want to learn more about Microsoft products you can use to help transform your business.

    ## ![Deploy a Microsoft solution for your business](images/deploy.png) Deploy -

    [Get started: Deploy and manage a full cloud IT solution for your business](cloud-mode-business-setup.md)
    Find out how easy it is to deploy and manage a full cloud IT solution for your small to midsize business using Microsoft cloud services and tools.

    +

    Get started: Deploy and manage a full cloud IT solution for your business
    Find out how easy it is to deploy and manage a full cloud IT solution for your small to midsize business using Microsoft cloud services and tools.

    ## Related topics diff --git a/store-for-business/add-unsigned-app-to-code-integrity-policy.md b/store-for-business/add-unsigned-app-to-code-integrity-policy.md index c7d4d59952..8c1e9402e7 100644 --- a/store-for-business/add-unsigned-app-to-code-integrity-policy.md +++ b/store-for-business/add-unsigned-app-to-code-integrity-policy.md @@ -93,11 +93,11 @@ Catalog signing is a vital step to adding your unsigned apps to your code integr 3. Click **Upload** to upload your unsigned catalog files. These are the catalog files you created earlier in [Create catalog files for your unsigned app](#create-catalog-files). 4. After the files are uploaded, click **Sign** to sign the catalog files. 5. Click Download to download each item: - - signed catalog file - - default policy - - root certificate for your organization + - signed catalog file + - default policy + - root certificate for your organization - When you use the Device Guard signing portal to sign a catalog file, the signing certificate is added to the default policy. When you download the signed catalog file, you should also download the default policy and merge this code integrity policy with your existing code integrity policies to protect machines running the catalog file. You need to do this step to trust and run your catalog files. For more information, see the Merging code integrity policies in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide). + When you use the Device Guard signing portal to sign a catalog file, the signing certificate is added to the default policy. When you download the signed catalog file, you should also download the default policy and merge this code integrity policy with your existing code integrity policies to protect machines running the catalog file. You need to do this step to trust and run your catalog files. For more information, see the Merging code integrity policies in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide). 6. Open the root certificate that you downloaded, and follow the steps in **Certificate Import wizard** to install the certificate in your machine's certificate store. 7. Deploy signed catalogs to your managed devices. For more information, see Deploy catalog files with Group Policy, or Deploy catalog files with System Center Configuration Manager in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide). diff --git a/store-for-business/device-guard-signing-portal.md b/store-for-business/device-guard-signing-portal.md index e35e8ab175..2c0e080ed7 100644 --- a/store-for-business/device-guard-signing-portal.md +++ b/store-for-business/device-guard-signing-portal.md @@ -43,7 +43,7 @@ When you're uploading files for Device Guard signing, there are a few limits for | Maximum size for multiple files (uploaded in a group) | 4 MB | | Maximum number of files per upload | 15 files | - ## File types + ## File types Catalog and policy files have required files types. | File | Required file type | @@ -51,7 +51,7 @@ Catalog and policy files have required files types. | catalog files | .cat | | policy files | .bin | - ## Store for Business roles and permissions + ## Store for Business roles and permissions Signing code integrity policies and access to Device Guard portal requires the Device Guard signer role. ## Device Guard signing certificates diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index c36c5dff04..87b1471707 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -4,7 +4,7 @@ { "files": [ "**/*.md", - "**/**.yml" + "**/**.yml" ], "exclude": [ "**/obj/**", @@ -31,26 +31,28 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "breadcrumb_path": "/microsoft-store/breadcrumb/toc.json", - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "ms.author": "trudyha", - "ms.technology": "windows", - "ms.topic": "article", - "ms.date": "05/09/2017", - "searchScope": ["Store"], - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "MSDN.store-for-business", - "folder_relative_path_in_docset": "./" - } - } - }, + "breadcrumb_path": "/microsoft-store/breadcrumb/toc.json", + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "ms.author": "trudyha", + "ms.technology": "windows", + "ms.topic": "article", + "ms.date": "05/09/2017", + "searchScope": [ + "Store" + ], + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "MSDN.store-for-business", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [], "dest": "store-for-business", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/store-for-business/microsoft-store-for-business-education-powershell-module.md b/store-for-business/microsoft-store-for-business-education-powershell-module.md index dcba0e99ee..c3d282539a 100644 --- a/store-for-business/microsoft-store-for-business-education-powershell-module.md +++ b/store-for-business/microsoft-store-for-business-education-powershell-module.md @@ -18,7 +18,7 @@ manager: dansimp # Microsoft Store for Business and Education PowerShell module - preview **Applies to** -- Windows 10 +- Windows 10 Microsoft Store for Business and Education PowerShell module (preview) is now available on [PowerShell Gallery](https://go.microsoft.com/fwlink/?linkid=853459). @@ -52,7 +52,6 @@ To install **Microsoft Store for Business and Education PowerShell** with PowerS # Install the Microsoft Store for Business and Education PowerShell module from PowerShell Gallery Install-Module -Name MSStore - ``` ## Import Microsoft Store for Business and Education PowerShell module into the PowerShell session @@ -62,7 +61,6 @@ Once you install the module on your Windows 10 device, you will need to then imp # Import the MSStore module into this session Import-Module -Name MSStore - ``` Next, authorize the module to call **Microsoft Store for Business and Education** on your behalf. This step is required once, per user of the PowerShell module. @@ -73,7 +71,6 @@ To authorize the PowerShell module, run this command. You'll need to sign-in wit # Grant MSStore Access to your Microsoft Store for Business and Education Grant-MSStoreClientAppAccess - ``` You will be promted to sign in with your work or school account and then to authorize the PowerShell Module to access your **Microsoft Store for Business and Education** account. Once the module has been imported into the current PowerShell session and authorized to call into your **Microsoft Store for Business and Education** account, Azure PowerShell cmdlets are loaded and ready to be used. @@ -84,7 +81,6 @@ Service management should encounter no breaking changes as a result of the separ # View items in inventory (Apps & software) Get-MSStoreInventory - ``` >[!TIP] @@ -102,7 +98,6 @@ Most items in **Products and Services** in **Microsoft Store for Business and Ed # View products assigned to people Get-MSStoreSeatAssignments -ProductId 9NBLGGH4R2R6 -SkuId 0016 - ``` > [!Important] @@ -129,7 +124,6 @@ Add-MSStoreSeatAssignment -ProductId 9NBLGGH4R2R6 -SkuId 0016 -Username 'user@my # Reclaim a product (Product ID and SKU ID combination) from a User (user@host.com) Remove-MSStoreSeatAssignment -ProductId 9NBLGGH4R2R6 -SkuId 0016 -Username 'user@myorganization.onmicrosoft.com' - ``` ## Assign or reclaim a product with a .csv file @@ -145,7 +139,6 @@ Add-MSStoreSeatAssignments -ProductId 9NBLGGH4R2R6 -SkuId 0016 -PathToCsv C:\Pe # Reclaim a product (Product ID and SKU ID combination) from a User (user@host.com) Remove-MSStoreSeatAssignments -ProductId 9NBLGGH4R2R6 -SkuId 0016 -PathToCsv C:\People.csv -ColumnName UserPrincipalName - ``` ## Uninstall Microsoft Store for Business and Education PowerShell module @@ -155,5 +148,4 @@ You can remove **Microsoft Store for Business and Education PowerShell** from yo # Uninstall the MSStore Module Get-InstalledModule -Name "MSStore" -RequiredVersion 1.0 | Uninstall-Module - ``` diff --git a/store-for-business/microsoft-store-for-business-overview.md b/store-for-business/microsoft-store-for-business-overview.md index 56b9e85c28..9bed41bcbd 100644 --- a/store-for-business/microsoft-store-for-business-overview.md +++ b/store-for-business/microsoft-store-for-business-overview.md @@ -92,7 +92,7 @@ After your admin signs up for the Store for Business and Education, they can ass > [!NOTE] > Currently, the Basic purchaser role is only available for schools using Microsoft Store for Education. For more information, see [Microsoft Store for Education permissions](https://docs.microsoft.com/education/windows/education-scenarios-store-for-business?toc=/microsoft-store/education/toc.json#manage-domain-settings). - + In some cases, admins will need to add Azure Active Directory (AD) accounts for their employees. For more information, see [Manage user accounts and groups](manage-users-and-groups-microsoft-store-for-business.md). Also, if your organization plans to use a management tool, you’ll need to configure your management tool to sync with Store for Business and Education. @@ -197,7 +197,7 @@ Store for Business and Education is currently available in these markets.
  • Colombia
  • Comoros
  • Costa Rica
  • -
  • Côte D'ivoire
  • +
  • Côte D'ivoire
  • Croatia
  • Curçao
  • Cyprus
  • @@ -332,8 +332,7 @@ Store for Business and Education is currently available in these markets.
  • Viet Nam
  • Virgin Islands, U.S.
  • Zambia
  • -
  • Zimbabwe
       
  • - +
  • Zimbabwe
       

  • @@ -374,9 +373,9 @@ This table summarize what customers can purchase, depending on which Microsoft S > [!NOTE] > **Microsoft Store for Education customers with support for free apps and Minecraft: Education Edition** -- Admins can acquire free apps from **Microsoft Store for Education**. -- Admins need to use an invoice to purchase **Minecraft: Education Edition**. For more information, see [Invoice payment option](https://docs.microsoft.com/education/windows/school-get-minecraft#invoices). -- Teachers, or people with the Basic Purachaser role, can acquire free apps, but not **Minecraft: Education Edition**. +> - Admins can acquire free apps from **Microsoft Store for Education**. +> - Admins need to use an invoice to purchase **Minecraft: Education Edition**. For more information, see [Invoice payment option](https://docs.microsoft.com/education/windows/school-get-minecraft#invoices). +> - Teachers, or people with the Basic Purachaser role, can acquire free apps, but not **Minecraft: Education Edition**. ## Privacy notice @@ -384,7 +383,7 @@ Store for Business and Education services get names and email addresses of peopl - Granting and managing permissions - Managing app licenses - Distributing apps to people (names appear in a list that admins can select from) - + Store for Business and Education does not save names, or email addresses. Your use of Store for Business and Education is also governed by the [Microsoft Store for Business and Education Services Agreement](https://businessstore.microsoft.com/servicesagreement). diff --git a/store-for-business/prerequisites-microsoft-store-for-business.md b/store-for-business/prerequisites-microsoft-store-for-business.md index 2993d15b74..0d054ed947 100644 --- a/store-for-business/prerequisites-microsoft-store-for-business.md +++ b/store-for-business/prerequisites-microsoft-store-for-business.md @@ -51,20 +51,20 @@ While not required, you can use a management tool to distribute and manage apps. If your organization restricts computers on your network from connecting to the Internet, there is a set of URLs that need to be available for devices to use Microsoft Store. Some of the Microsoft Store features use Store services. Devices using Microsoft Store – either to acquire, install, or update apps – will need access to these URLs. If you use a proxy server to block traffic, your configuration needs to allow these URLs: -- login.live.com -- login.windows.net -- account.live.com -- clientconfig.passport.net -- windowsphone.com -- \*.wns.windows.com -- \*.microsoft.com -- \*.s-microsoft.com -- www.msftncsi.com (prior to Windows 10, version 1607) -- www.msftconnecttest.com/connecttest.txt (replaces www.msftncsi.com -starting with Windows 10, version 1607) -  +- login.live.com +- login.windows.net +- account.live.com +- clientconfig.passport.net +- windowsphone.com +- \*.wns.windows.com +- \*.microsoft.com +- \*.s-microsoft.com +- www.msftncsi.com (prior to Windows 10, version 1607) +- www.msftconnecttest.com/connecttest.txt (replaces www.msftncsi.com + starting with Windows 10, version 1607) + -  + diff --git a/store-for-business/roles-and-permissions-microsoft-store-for-business.md b/store-for-business/roles-and-permissions-microsoft-store-for-business.md index fdf61b9b8f..2163e6379a 100644 --- a/store-for-business/roles-and-permissions-microsoft-store-for-business.md +++ b/store-for-business/roles-and-permissions-microsoft-store-for-business.md @@ -32,7 +32,7 @@ This table lists the global user accounts and the permissions they have in Micro | Purchase apps | X | X | | Distribute apps | X | X | | Purchase subscription-based software | X | X | -  + **Global Administrator** - IT Pros with this account have full access to Microsoft Store. They can do everything allowed in the Microsoft Store Admin role, plus they can sign up for Microsoft Store. diff --git a/store-for-business/sfb-change-history.md b/store-for-business/sfb-change-history.md index b8bbce8a9a..5a3a21a49f 100644 --- a/store-for-business/sfb-change-history.md +++ b/store-for-business/sfb-change-history.md @@ -17,6 +17,7 @@ ms.localizationpriority: medium # Change history for Microsoft Store for Business and Microsoft Store for Education ## March 2019 + | New or changed topic | Description | | --- | --- | | [Understand your Microsoft Customer Agreement invoice](billing-understand-your-invoice-msfb.md) | New topic | @@ -26,12 +27,14 @@ ms.localizationpriority: medium | [Roles and permissions in Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md) | Add info for purchasing roles and permissions. | ## April 2018 + | New or changed topic | Description | | --- | --- | | [Configure access to Microsoft Store](https://docs.microsoft.com/windows/configuration/stop-employees-from-using-microsoft-store#a-href-idblock-store-group-policyablock-microsoft-store-using-group-policy) | Update on app updates when Microsoft Store is blocked. | | [What's New in Microsoft Store for Business and Education](whats-new-microsoft-store-business-education.md) | Update | ## March 2018 + | New or changed topic | Description | | --- | --- | | [Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business](manage-mpsa-software-microsoft-store-for-business.md) | New | @@ -75,6 +78,7 @@ ms.localizationpriority: medium | [Microsoft Store for Business and Education overview - supported markets](https://docs.microsoft.com/microsoft-store/windows-store-for-business-overview#supported-markets) | Updates for added market support. | ## June 2017 + | New or changed topic | Description | | -------------------- | ----------- | | [Notifications in Microsoft Store for Business and Education](notifications-microsoft-store-business.md) | New. Information about notification model in Microsoft Store for Business and Education. | @@ -82,12 +86,12 @@ ms.localizationpriority: medium | [Microsoft Store for Business and Education overview - supported markets](https://docs.microsoft.com/microsoft-store/windows-store-for-business-overview#supported-markets) | Updates for added market support. | ## July 2017 -  + | New or changed topic | Description | | -------------------- | ----------- | | [Manage Windows device deployment with Windows Autopilot Deployment](add-profile-to-devices.md) | New. Information about Windows Autopilot Deployment Program and how it is used in Microsoft Store for Business and Education. | | [Microsoft Store for Business and Education overview - supported markets](https://docs.microsoft.com/microsoft-store/windows-store-for-business-overview#supported-markets) | Updates for added market support. | -  + diff --git a/store-for-business/whats-new-microsoft-store-business-education.md b/store-for-business/whats-new-microsoft-store-business-education.md index f47bb23106..8d06648a0d 100644 --- a/store-for-business/whats-new-microsoft-store-business-education.md +++ b/store-for-business/whats-new-microsoft-store-business-education.md @@ -20,6 +20,7 @@ Microsoft Store for Business and Education regularly releases new and improved f ## Latest updates for Store for Business and Education **October 2018** + | | | |-----------------------|---------------------------------| | ![Security groups](images/security-groups-icon.png) |**Use security groups with Private store apps**

    On the details page for apps in your private store, you can set **Private store availability**. This allows you to choose which security groups can see an app in the private store.

    [Get more info](https://docs.microsoft.com/microsoft-store/app-inventory-management-microsoft-store-for-business#private-store-availability)

    **Applies to**:
    Microsoft Store for Business
    Microsoft Store for Education | diff --git a/store-for-business/working-with-line-of-business-apps.md b/store-for-business/working-with-line-of-business-apps.md index 23830839a0..3085320530 100644 --- a/store-for-business/working-with-line-of-business-apps.md +++ b/store-for-business/working-with-line-of-business-apps.md @@ -50,12 +50,12 @@ Admins need to invite developer or ISVs to become an LOB publisher. **To invite a developer to become an LOB publisher** -1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com). -2. Click **Manage**, click **Permissions**, and then choose **Line-of-business publishers**. -3. On the Line-of business publishers page, click **Invite** to send an email invitation to a developer. +1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com). +2. Click **Manage**, click **Permissions**, and then choose **Line-of-business publishers**. +3. On the Line-of business publishers page, click **Invite** to send an email invitation to a developer. - >[!Note] - > This needs to be the email address listed in contact info for the developer account. + >[!Note] + > This needs to be the email address listed in contact info for the developer account. ## Submit apps (LOB publisher) diff --git a/windows/access-protection/docfx.json b/windows/access-protection/docfx.json index b394742538..c24fcaa1ed 100644 --- a/windows/access-protection/docfx.json +++ b/windows/access-protection/docfx.json @@ -20,7 +20,7 @@ "files": [ "**/*.png", "**/*.jpg", - "**/*.gif" + "**/*.gif" ], "exclude": [ "**/obj/**", @@ -31,20 +31,21 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", - "ms.technology": "windows", - "ms.topic": "article", - "ms.author": "justinha", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "MSDN.win-access-protection", - "folder_relative_path_in_docset": "./" - } - } - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", + "ms.technology": "windows", + "ms.topic": "article", + "ms.author": "justinha", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "MSDN.win-access-protection", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [], - "dest": "win-access-protection" + "dest": "win-access-protection", + "markdownEngineName": "markdig" } } diff --git a/windows/application-management/app-v/appv-about-appv.md b/windows/application-management/app-v/appv-about-appv.md index dfec1f7a3e..f52c78ba07 100644 --- a/windows/application-management/app-v/appv-about-appv.md +++ b/windows/application-management/app-v/appv-about-appv.md @@ -51,8 +51,8 @@ The changes in App-V for Windows 10, version 1607 impact existing implementation * The App-V client is installed on user devices automatically with Windows 10, version 1607, and no longer has to be deployed separately. Performing an in-place upgrade to Windows 10, version 1607, on user devices automatically installs the App-V client. * In previous releases of App-V, the application sequencer was included in the Microsoft Desktop Optimization Pack. Although you’ll need to use the new application sequencer to create new virtualized applications, existing virtualized applications will continue to work. The App-V application sequencer is available from the [Windows 10 Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit). - >[!NOTE] - >If you're already using App-V 5.x, you don't need to redeploy the App-V server components, as they haven't changed since App-V 5.0's release. + >[!NOTE] + >If you're already using App-V 5.x, you don't need to redeploy the App-V server components, as they haven't changed since App-V 5.0's release. For more information about how to configure an existing App-V installation after upgrading user devices to Windows 10, see [Upgrading to App-V for Windows 10 from an existing installation](../app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md) and [Migrating to App-V for Windows 10 from a previous version](../app-v/appv-migrating-to-appv-from-a-previous-version.md). diff --git a/windows/application-management/app-v/appv-application-publishing-and-client-interaction.md b/windows/application-management/app-v/appv-application-publishing-and-client-interaction.md index 906530c89d..f852b68c53 100644 --- a/windows/application-management/app-v/appv-application-publishing-and-client-interaction.md +++ b/windows/application-management/app-v/appv-application-publishing-and-client-interaction.md @@ -379,33 +379,33 @@ The process then configures the client for package or connection group additions 3. Configure the packages by identifying the **Add** or **Update** operations. - 1. The App-V Client utilizes the AppX API from Windows and accesses the appv file from the publishing server. + 1. The App-V Client utilizes the AppX API from Windows and accesses the appv file from the publishing server. - 2. The package file is opened and the **AppXManifest.xml** and **StreamMap.xml** files are downloaded to the Package Store. + 2. The package file is opened and the **AppXManifest.xml** and **StreamMap.xml** files are downloaded to the Package Store. - 3. Completely stream publishing block data defined in the **StreamMap.xml** file. Publishing block data is stored in Package Store\\PkgGUID\\VerGUID\\Root. + 3. Completely stream publishing block data defined in the **StreamMap.xml** file. Publishing block data is stored in Package Store\\PkgGUID\\VerGUID\\Root. - - Icons: Targets of extension points. - - Portable Executable Headers (PE Headers): Targets of extension points that contain the base information about the image need on disk, accessed directly or through file types. - - Scripts: Download scripts directory for use throughout the publishing process. + - Icons: Targets of extension points. + - Portable Executable Headers (PE Headers): Targets of extension points that contain the base information about the image need on disk, accessed directly or through file types. + - Scripts: Download scripts directory for use throughout the publishing process. - 4. Populate the Package store by doing the following: + 4. Populate the Package store by doing the following: - 1. Create sparse files on disk that represent the extracted package for any directories listed. + 1. Create sparse files on disk that represent the extracted package for any directories listed. - 2. Stage top-level files and directories under root. + 2. Stage top-level files and directories under root. - All other files are created when the directory is listed as sparse on disk and streamed on demand. + All other files are created when the directory is listed as sparse on disk and streamed on demand. - 5. Create the machine catalog entries. Create the **Manifest.xml** and **DeploymentConfiguration.xml** files from the package files (if no **DeploymentConfiguration.xml** file in the package a placeholder is created). + 5. Create the machine catalog entries. Create the **Manifest.xml** and **DeploymentConfiguration.xml** files from the package files (if no **DeploymentConfiguration.xml** file in the package a placeholder is created). - 6. Create location of the package store in the registry **HKLM\\Software\\Microsoft\\AppV\\Client\\Packages\\PkgGUID\\Versions\\VerGUID\\Catalog**. + 6. Create location of the package store in the registry **HKLM\\Software\\Microsoft\\AppV\\Client\\Packages\\PkgGUID\\Versions\\VerGUID\\Catalog**. - 7. Create the **Registry.dat** file from the package store to **%ProgramData%\\Microsoft\\AppV\\Client\\VReg\\{VersionGUID}.dat**. + 7. Create the **Registry.dat** file from the package store to **%ProgramData%\\Microsoft\\AppV\\Client\\VReg\\{VersionGUID}.dat**. - 8. Register the package with the App-V Kernel Mode Driver at **HKLM\\Microsoft\\Software\\AppV\\MAV**. + 8. Register the package with the App-V Kernel Mode Driver at **HKLM\\Microsoft\\Software\\AppV\\MAV**. - 9. Invoke scripting from the **AppxManifest.xml** or **DeploymentConfig.xml** file for Package Add timing. + 9. Invoke scripting from the **AppxManifest.xml** or **DeploymentConfig.xml** file for Package Add timing. 4. Configure Connection Groups by adding and enabling or disabling. diff --git a/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell.md b/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell.md index d2746723e5..b6d62b3219 100644 --- a/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell.md +++ b/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell.md @@ -20,13 +20,13 @@ When you add or set a package to a computer running the App-V client before it's ## Apply the deployment configuration file with Windows PowerShell ->[!NOTE] ->The following example cmdlet uses the following two file paths for the package and configuration files: - > - >* C:\\Packages\\Contoso\\MyApp.appv - >* C:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml - > ->If your package and configuration files use different file paths than the example, feel free to replace them as needed. +> [!NOTE] +> The following example cmdlet uses the following two file paths for the package and configuration files: +> +> * C:\\Packages\\Contoso\\MyApp.appv +> * C:\\Packages\\Contoso\\DynamicConfigurations\\deploymentconfig.xml +> +> If your package and configuration files use different file paths than the example, feel free to replace them as needed. To specify a new default set of configurations for all users who will run the package on a specific computer, in a Windows PowerShell console, enter the following cmdlet: diff --git a/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell.md b/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell.md index b600093c77..e3abc3524a 100644 --- a/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell.md +++ b/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell.md @@ -22,12 +22,12 @@ When you publish a package to a specific user, you'll also need to specify a dyn Here's how to specify a user-specific configuration file: ->[!NOTE] ->The following example cmdlets use this example file path for its package: - > - >* C:\\Packages\\Contoso\\MyApp.appv. - > ->If your package file uses a different file path than the example, feel free to replace it as needed. +> [!NOTE] +> The following example cmdlets use this example file path for its package: +> +> * C:\\Packages\\Contoso\\MyApp.appv. +> +> If your package file uses a different file path than the example, feel free to replace it as needed. 1. Enter the following cmdlet in Windows PowerShell to add the package to the computer: diff --git a/windows/application-management/app-v/appv-capacity-planning.md b/windows/application-management/app-v/appv-capacity-planning.md index 51b9aabc7d..3d117f1d01 100644 --- a/windows/application-management/app-v/appv-capacity-planning.md +++ b/windows/application-management/app-v/appv-capacity-planning.md @@ -126,11 +126,11 @@ Example: Random delay for 500 clients with 120 requests per second is *4 × 500/ Computers running the App-V client connect to the App-V publishing server to send a publishing refresh request and receive a response. Round trip response time is measured on the computer running the App-V client, while processor time is measured on the publishing server. For more information about App-V Publishing Server supported configurations, see [App-V supported configurations](appv-supported-configurations.md). ->[!IMPORTANT] ->The following list displays the main factors to consider when setting up the App-V publishing server: - * The number of clients connecting simultaneously to a single publishing server. - * The number of packages in each refresh. - * The available network bandwidth in your environment between the client and the App-V publishing server. +> [!IMPORTANT] +> The following list displays the main factors to consider when setting up the App-V publishing server: +> * The number of clients connecting simultaneously to a single publishing server. +> * The number of packages in each refresh. +> * The available network bandwidth in your environment between the client and the App-V publishing server. |Scenario|Summary| |---|---| @@ -151,11 +151,11 @@ Computers running the App-V client connect to the App-V publishing server to sen Computers running the App-V client stream the virtual application package from the streaming server. Round trip response time is measured on the computer running the App-V client, and is the time taken to stream the entire package. ->[!IMPORTANT] ->The following list identifies the main factors to consider when setting up the App-V streaming server: - * The number of clients streaming application packages simultaneously from a single streaming server. - * The size of the package being streamed. - * The available network bandwidth in your environment between the client and the streaming server. +> [!IMPORTANT] +> The following list identifies the main factors to consider when setting up the App-V streaming server: +> * The number of clients streaming application packages simultaneously from a single streaming server. +> * The size of the package being streamed. +> * The available network bandwidth in your environment between the client and the streaming server. |Scenario|Summary| |---|---| diff --git a/windows/application-management/app-v/appv-client-configuration-settings.md b/windows/application-management/app-v/appv-client-configuration-settings.md index 7e22be31db..1d23aca023 100644 --- a/windows/application-management/app-v/appv-client-configuration-settings.md +++ b/windows/application-management/app-v/appv-client-configuration-settings.md @@ -24,93 +24,91 @@ You can use Group Policy to configure App-V client settings by navigating to the The following table provides information about App-V client configuration settings that can be configured through Windows PowerShell cmdlets: -| Windows PowerShell cmdlet or cmdlets,
    **Option**
    Type | Description | Disabled policy state keys and values | -|------------|------------|------------|------------| -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-PackageInstallationRoot**
    String | Specifies directory where all new applications and updates will be installed. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-PackageSourceRoot**
    String | Overrides source location for downloading package content. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-AllowHighCostLaunch**
    True (enabled); False (Disabled state) | This setting controls whether virtualized applications are launched on Windows 10 machines connected by a metered network connection (for example, 4G). | 0 | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReestablishmentRetries**
    Integer (0–99) | Specifies the number of times to retry a dropped session. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReestablishmentInterval**
    Integer (0–3600) | Specifies the number of seconds between attempts to reestablish a dropped session. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-LocationProvider**
    String | Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-CertFilterForClientSsl**
    String | Specifies the path to a valid certificate in the certificate store. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-VerifyCertificateRevocationList**
    True (enabled); False (Disabled state) | Verifies Server certificate revocation status before streaming with HTTPS. | 0 | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-SharedContentStoreMode**
    True (enabled); False (Disabled state) | Specifies that streamed package contents will be not be saved to the local hard disk. | 0 | -| Set-AppvPublishingServer

    **-Name**
    String | Displays the name of publishing server. | Policy value not written (same as Not Configured) | -| Set-AppvPublishingServer

    **-URL**
    String | Displays the URL of publishing server. | Policy value not written (same as Not Configured) | -| Set-AppvPublishingServer

    **-GlobalRefreshEnabled**
    True (enabled); False (Disabled state) | Enables global publishing refresh (Boolean) | False | -| Set-AppvPublishingServer

    **-GlobalRefreshOnLogon**
    True (enabled); False (Disabled state) | Triggers a global publishing refresh on sign in. (Boolean) | False | -| Set-AppvPublishingServer

    **-GlobalRefreshInterval**
    Integer (0–744) | Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, specify 0. | 0 | -| Set-AppvPublishingServer

    **-GlobalRefreshIntervalUnit**
    0 for hour, 1 for day | Specifies the interval unit (Hour 0–23, Day 0–31). | 1 | -| Set-AppvPublishingServer

    **-UserRefreshEnabled**
    True (enabled); False (Disabled state) | Enables user publishing refresh (Boolean) | False | -| Set-AppvPublishingServer

    **-UserRefreshOnLogon**
    True (enabled); False (Disabled state) | Triggers a user publishing refresh on sign in. (Boolean) Word count (with spaces): 60 | False | -| Set-AppvPublishingServer

    **-UserRefreshInterval**
    Word count (with spaces): 85
    Integer (0–744 Hours) | Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. | 0 | -| Set-AppvPublishingServer

    **-UserRefreshIntervalUnit**
    0 for hour, 1 for day | Specifies the interval unit (Hour 0–23, Day 0–31). | 1 | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-MigrationMode**
    True (enabled state); False (Disabled state) | Migration mode allows the App-V client to modify shortcuts and FTA’s for packages created by a previous version of App-V. | | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-EnablePackageScripts**
    True (enabled); False (Disabled state) | Enables scripts defined in the package manifest of configuration files that should run. | | -| Set-AppvClientConfiguration

    **-RoamingFileExclusions**
    String | Specifies the file paths relative to %userprofile% that do not roam with a user's profile. For example, ```/ROAMINGFILEEXCLUSIONS='desktop;my pictures'``` | | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-RoamingRegistryExclusions**
    String | Specifies the registry paths that do not roam with a user profile. For example, ```/ROAMINGREGISTRYEXCLUSIONS=software\\classes;software\\clients``` | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-IntegrationRootUser**
    String | Specifies the location to create symbolic links associated with the current version of a per-user published package. All virtual application extensions, such as shortcuts and file type associations, will point to this path. If you don't specify a path, symbolic links will not be used when you publish the package. For example, ```%localappdata%\\Microsoft\\AppV\\Client\\Integration```. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-IntegrationRootGlobal**
    String | Specifies the location to create symbolic links associated with the current version of a globally published package. All virtual application extensions, such as shortcuts and file type associations, will point to this path. If you don't specify a path, symbolic links will not be used when you publish the package. For example, ```%allusersprofile%\\Microsoft\\AppV\\Client\\Integration```. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-VirtualizableExtensions**
    String | A comma-delineated list of file name extensions that can be used to determine if a locally installed application can be run in the virtual environment. When shortcuts, FTAs, and other extension points are created during publishing, App-V will compare the file name extension to the list if the application associated with the extension point is locally installed. If the extension is located, the **RunVirtual** command-line parameter will be added, and the application will run virtually. For more information about the **RunVirtual** parameter, see [Running a locally installed application inside a virtual environment with virtualized applications](appv-running-locally-installed-applications-inside-a-virtual-environment.md). | Policy value not written | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingEnabled**
    True (enabled); False (Disabled state) | Returns information to a reporting server. | False | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingServerURL**
    String | Specifies the location on the reporting server where client information is saved. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingDataCacheLimit**
    Integer \[0–1024\] | Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over. Set between 0 and 1024. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingDataBlockSize**
    Integer \[1024 - Unlimited\] | Specifies the maximum size in bytes to transmit to the server for reporting upload requests. This can help avoid permanent transmission failures when the log has reached a significant size. Set between 1024 and unlimited. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingStartTime**
    Integer (0–23) | Specifies the time to initiate the client to send data to the reporting server. You must specify a valid integer between 0–23 corresponding to the hour of the day. By default the **ReportingStartTime** will start on the current day at 10 P.M.or 22.
    **Note** You should configure this setting to a time when computers running the App-V client are least likely to be offline. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingInterval**
    Integer | Specifies the retry interval that the client will use to resend data to the reporting server. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingRandomDelay**
    Integer \[0 - ReportingRandomDelay\] | Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and **ReportingRandomDelay** and will wait the specified duration before sending data. This can help to prevent collisions on the server. | Policy value not written (same as Not Configured) | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-EnableDynamicVirtualization
    **1 (Enabled), 0 (Disabled) | Enables supported Shell Extensions, Browser Helper Objects, and Active X controls to be virtualized and run with virtual applications. | | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-EnablePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | Enables the publishing refresh progress bar for the computer running the App-V Client. | | -| Sync-AppvPublishingServer

    **-HidePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | Hides the publishing refresh progress bar. | | -| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ProcessesUsingVirtualComponents**
    String | Specifies a list of process paths (that may contain wildcards) that are candidates for using dynamic virtualization (such as supported shell extensions, browser helper objects, and ActiveX controls). Only processes whose full path matches one of these items can use dynamic virtualization. | Empty string. | + +| Windows PowerShell cmdlet or cmdlets,
    **Option**
    Type | Description | Disabled policy state keys and values | +|------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------| +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-PackageInstallationRoot**
    String | Specifies directory where all new applications and updates will be installed. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-PackageSourceRoot**
    String | Overrides source location for downloading package content. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-AllowHighCostLaunch**
    True (enabled); False (Disabled state) | This setting controls whether virtualized applications are launched on Windows 10 machines connected by a metered network connection (for example, 4G). | 0 | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReestablishmentRetries**
    Integer (0–99) | Specifies the number of times to retry a dropped session. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReestablishmentInterval**
    Integer (0–3600) | Specifies the number of seconds between attempts to reestablish a dropped session. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-LocationProvider**
    String | Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-CertFilterForClientSsl**
    String | Specifies the path to a valid certificate in the certificate store. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-VerifyCertificateRevocationList**
    True (enabled); False (Disabled state) | Verifies Server certificate revocation status before streaming with HTTPS. | 0 | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-SharedContentStoreMode**
    True (enabled); False (Disabled state) | Specifies that streamed package contents will be not be saved to the local hard disk. | 0 | +| Set-AppvPublishingServer

    **-Name**
    String | Displays the name of publishing server. | Policy value not written (same as Not Configured) | +| Set-AppvPublishingServer

    **-URL**
    String | Displays the URL of publishing server. | Policy value not written (same as Not Configured) | +| Set-AppvPublishingServer

    **-GlobalRefreshEnabled**
    True (enabled); False (Disabled state) | Enables global publishing refresh (Boolean) | False | +| Set-AppvPublishingServer

    **-GlobalRefreshOnLogon**
    True (enabled); False (Disabled state) | Triggers a global publishing refresh on sign in. (Boolean) | False | +| Set-AppvPublishingServer

    **-GlobalRefreshInterval**
    Integer (0–744) | Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, specify 0. | 0 | +| Set-AppvPublishingServer

    **-GlobalRefreshIntervalUnit**
    0 for hour, 1 for day | Specifies the interval unit (Hour 0–23, Day 0–31). | 1 | +| Set-AppvPublishingServer

    **-UserRefreshEnabled**
    True (enabled); False (Disabled state) | Enables user publishing refresh (Boolean) | False | +| Set-AppvPublishingServer

    **-UserRefreshOnLogon**
    True (enabled); False (Disabled state) | Triggers a user publishing refresh on sign in. (Boolean) Word count (with spaces): 60 | False | +| Set-AppvPublishingServer

    **-UserRefreshInterval**
    Word count (with spaces): 85
    Integer (0–744 Hours) | Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. | 0 | +| Set-AppvPublishingServer

    **-UserRefreshIntervalUnit**
    0 for hour, 1 for day | Specifies the interval unit (Hour 0–23, Day 0–31). | 1 | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-MigrationMode**
    True (enabled state); False (Disabled state) | Migration mode allows the App-V client to modify shortcuts and FTA’s for packages created by a previous version of App-V. | | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-EnablePackageScripts**
    True (enabled); False (Disabled state) | Enables scripts defined in the package manifest of configuration files that should run. | | +| Set-AppvClientConfiguration

    **-RoamingFileExclusions**
    String | Specifies the file paths relative to %userprofile% that do not roam with a user's profile. For example, ```/ROAMINGFILEEXCLUSIONS='desktop;my pictures'``` | | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-RoamingRegistryExclusions**
    String | Specifies the registry paths that do not roam with a user profile. For example, ```/ROAMINGREGISTRYEXCLUSIONS=software\\classes;software\\clients``` | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-IntegrationRootUser**
    String | Specifies the location to create symbolic links associated with the current version of a per-user published package. All virtual application extensions, such as shortcuts and file type associations, will point to this path. If you don't specify a path, symbolic links will not be used when you publish the package. For example, ```%localappdata%\\Microsoft\\AppV\\Client\\Integration```. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-IntegrationRootGlobal**
    String | Specifies the location to create symbolic links associated with the current version of a globally published package. All virtual application extensions, such as shortcuts and file type associations, will point to this path. If you don't specify a path, symbolic links will not be used when you publish the package. For example, ```%allusersprofile%\\Microsoft\\AppV\\Client\\Integration```. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-VirtualizableExtensions**
    String | A comma-delineated list of file name extensions that can be used to determine if a locally installed application can be run in the virtual environment. When shortcuts, FTAs, and other extension points are created during publishing, App-V will compare the file name extension to the list if the application associated with the extension point is locally installed. If the extension is located, the **RunVirtual** command-line parameter will be added, and the application will run virtually. For more information about the **RunVirtual** parameter, see [Running a locally installed application inside a virtual environment with virtualized applications](appv-running-locally-installed-applications-inside-a-virtual-environment.md). | Policy value not written | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingEnabled**
    True (enabled); False (Disabled state) | Returns information to a reporting server. | False | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingServerURL**
    String | Specifies the location on the reporting server where client information is saved. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingDataCacheLimit**
    Integer \[0–1024\] | Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over. Set between 0 and 1024. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingDataBlockSize**
    Integer \[1024 - Unlimited\] | Specifies the maximum size in bytes to transmit to the server for reporting upload requests. This can help avoid permanent transmission failures when the log has reached a significant size. Set between 1024 and unlimited. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingStartTime**
    Integer (0–23) | Specifies the time to initiate the client to send data to the reporting server. You must specify a valid integer between 0–23 corresponding to the hour of the day. By default the **ReportingStartTime** will start on the current day at 10 P.M.or 22.
    **Note** You should configure this setting to a time when computers running the App-V client are least likely to be offline. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingInterval**
    Integer | Specifies the retry interval that the client will use to resend data to the reporting server. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ReportingRandomDelay**
    Integer \[0 - ReportingRandomDelay\] | Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and **ReportingRandomDelay** and will wait the specified duration before sending data. This can help to prevent collisions on the server. | Policy value not written (same as Not Configured) | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    -EnableDynamicVirtualization
    1 (Enabled), 0 (Disabled) | Enables supported Shell Extensions, Browser Helper Objects, and Active X controls to be virtualized and run with virtual applications. | | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-EnablePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | Enables the publishing refresh progress bar for the computer running the App-V Client. | | +| Sync-AppvPublishingServer

    **-HidePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | Hides the publishing refresh progress bar. | | +| Set-AppvClientConfiguration,
    Set-AppvPublishingServer

    **-ProcessesUsingVirtualComponents**
    String | Specifies a list of process paths (that may contain wildcards) that are candidates for using dynamic virtualization (such as supported shell extensions, browser helper objects, and ActiveX controls). Only processes whose full path matches one of these items can use dynamic virtualization. | Empty string. | ## App-V client configuration settings: registry keys The following table provides information about App-V client configuration settings that can be configured through the registry: -| **Setting name**
    Type | Registry key value | Disabled policy state keys and values | -|---------------------------|---------------------|---------------------------------------| -| **PackageInstallationRoot**
    String | Streaming\\PackageInstallationRoot | Policy value not written (same as Not Configured) | -| **PackageSourceRoot**
    String | Streaming\\PackageSourceRoot | Policy value not written (same as Not Configured) | -| **AllowHighCostLaunch**
    True (Enabled); False (Disabled state) | Streaming\\AllowHighCostLaunch | 0 | -| **ReestablishmentRetries**
    Integer (0–99) | Streaming\\ReestablishmentRetries | Policy value not written (same as Not Configured) | -| **ReestablishmentInterval**
    Integer (0–3600) | Streaming\\ReestablishmentInterval | Policy value not written (same as Not Configured) | -| **LocationProvider**
    String | Streaming\\LocationProvider | Policy value not written (same as Not Configured) | -| **CertFilterForClientSsl**
    String | Streaming\\CertFilterForClientSsl | Policy value not written (same as Not Configured) | -| **VerifyCertificateRevocationList**
    True (Enabled); False (Disabled state) | Streaming\\VerifyCertificateRevocationList | 0 | -| **SharedContentStoreMode**
    True (Enabled); False (Disabled state) | Streaming\\SharedContentStoreMode | 0 | -| **Name**
    String | Publishing\\Servers{serverId}\\FriendlyName | Policy value not written (same as Not Configured) | -| **URL**
    String | Publishing\\Servers{serverId}\\URL | Policy value not written (same as Not Configured) | -| **GlobalRefreshEnabled**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\GlobalEnabled | False | -| **GlobalRefreshOnLogon**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\GlobalLogonRefresh | False | -| **GlobalRefreshInterval**
    Integer (0–744) | Publishing\\Servers{serverId}\\GlobalPeriodicRefreshInterval | 0 | -| **GlobalRefreshIntervalUnit**
    0 for hour, 1 for day | Publishing\\Servers{serverId}\\GlobalPeriodicRefreshIntervalUnit | 1 | -| **UserRefreshEnabled**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\UserEnabled | False | -| **UserRefreshOnLogon**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\UserLogonRefresh | False | -| **UserRefreshInterval**
    Word count (with spaces): 85; Integer (0–744 Hours) | Publishing\\Servers{serverId}\\UserPeriodicRefreshInterval | 0 | -| **UserRefreshIntervalUnit**
    0 for hour, 1 for day | Publishing\\Servers{serverId}\\UserPeriodicRefreshIntervalUnit | 1 | -| **MigrationMode**
    True(Enabled state); False (Disabled state) | Coexistence\\MigrationMode | | -| **EnablePackageScripts**
    True (Enabled); False (Disabled state) | \\Scripting\\EnablePackageScripts | | -| **RoamingFileExclusions**
    String | | | -| **RoamingRegistryExclusions**
    String | Integration\\RoamingReglstryExclusions | Policy value not written (same as Not Configured) | -| **IntegrationRootUser**
    String | Integration\\IntegrationRootUser | Policy value not written (same as Not Configured) | -| **IntegrationRootGlobal**
    String | Integration\\IntegrationRootGlobal | Policy value not written (same as Not Configured) | -| **VirtualizableExtensions**
    String | Integration\\VirtualizableExtensions | Policy value not written | -| **ReportingEnabled**
    True (Enabled); False (Disabled state) | Reporting\\EnableReporting | False | -| **ReportingServerURL**
    String | Reporting\\ReportingServer | Policy value not written (same as Not Configured) | -| **ReportingDataCacheLimit**
    Integer \[0–1024\] | Reporting\\DataCacheLimit | Policy value not written (same as Not Configured) | -| **ReportingDataBlockSize**
    Integer \[1024–Unlimited\] | Reporting\\DataBlockSize | Policy value not written (same as Not Configured) | -| **ReportingStartTime**
    Integer (0–23) | Reporting\\ StartTime | Policy value not written (same as Not Configured) | -| **ReportingInterval**
    Integer | Reporting\\RetryInterval | Policy value not written (same as Not Configured) | -| **ReportingRandomDelay**
    Integer \[0 - ReportingRandomDelay\] | Reporting\\RandomDelay | Policy value not written (same as Not Configured) | -| **EnableDynamicVirtualization
    **1 (Enabled), 0 (Disabled) | HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\AppV\\Client\\Virtualization | | -| **EnablePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\AppV\\Client\\Publishing | | -| **HidePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | | | -| **ProcessesUsingVirtualComponents**
    String | Virtualization\\ProcessesUsingVirtualComponents | Empty string. | - - - +| **Setting name**
    Type | Registry key value | Disabled policy state keys and values | +|--------------------------------------------------------------------------------|-------------------------------------------------------------------------|---------------------------------------------------| +| **PackageInstallationRoot**
    String | Streaming\\PackageInstallationRoot | Policy value not written (same as Not Configured) | +| **PackageSourceRoot**
    String | Streaming\\PackageSourceRoot | Policy value not written (same as Not Configured) | +| **AllowHighCostLaunch**
    True (Enabled); False (Disabled state) | Streaming\\AllowHighCostLaunch | 0 | +| **ReestablishmentRetries**
    Integer (0–99) | Streaming\\ReestablishmentRetries | Policy value not written (same as Not Configured) | +| **ReestablishmentInterval**
    Integer (0–3600) | Streaming\\ReestablishmentInterval | Policy value not written (same as Not Configured) | +| **LocationProvider**
    String | Streaming\\LocationProvider | Policy value not written (same as Not Configured) | +| **CertFilterForClientSsl**
    String | Streaming\\CertFilterForClientSsl | Policy value not written (same as Not Configured) | +| **VerifyCertificateRevocationList**
    True (Enabled); False (Disabled state) | Streaming\\VerifyCertificateRevocationList | 0 | +| **SharedContentStoreMode**
    True (Enabled); False (Disabled state) | Streaming\\SharedContentStoreMode | 0 | +| **Name**
    String | Publishing\\Servers{serverId}\\FriendlyName | Policy value not written (same as Not Configured) | +| **URL**
    String | Publishing\\Servers{serverId}\\URL | Policy value not written (same as Not Configured) | +| **GlobalRefreshEnabled**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\GlobalEnabled | False | +| **GlobalRefreshOnLogon**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\GlobalLogonRefresh | False | +| **GlobalRefreshInterval**
    Integer (0–744) | Publishing\\Servers{serverId}\\GlobalPeriodicRefreshInterval | 0 | +| **GlobalRefreshIntervalUnit**
    0 for hour, 1 for day | Publishing\\Servers{serverId}\\GlobalPeriodicRefreshIntervalUnit | 1 | +| **UserRefreshEnabled**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\UserEnabled | False | +| **UserRefreshOnLogon**
    True (Enabled); False (Disabled state) | Publishing\\Servers{serverId}\\UserLogonRefresh | False | +| **UserRefreshInterval**
    Word count (with spaces): 85; Integer (0–744 Hours) | Publishing\\Servers{serverId}\\UserPeriodicRefreshInterval | 0 | +| **UserRefreshIntervalUnit**
    0 for hour, 1 for day | Publishing\\Servers{serverId}\\UserPeriodicRefreshIntervalUnit | 1 | +| **MigrationMode**
    True(Enabled state); False (Disabled state) | Coexistence\\MigrationMode | | +| **EnablePackageScripts**
    True (Enabled); False (Disabled state) | \\Scripting\\EnablePackageScripts | | +| **RoamingFileExclusions**
    String | | | +| **RoamingRegistryExclusions**
    String | Integration\\RoamingReglstryExclusions | Policy value not written (same as Not Configured) | +| **IntegrationRootUser**
    String | Integration\\IntegrationRootUser | Policy value not written (same as Not Configured) | +| **IntegrationRootGlobal**
    String | Integration\\IntegrationRootGlobal | Policy value not written (same as Not Configured) | +| **VirtualizableExtensions**
    String | Integration\\VirtualizableExtensions | Policy value not written | +| **ReportingEnabled**
    True (Enabled); False (Disabled state) | Reporting\\EnableReporting | False | +| **ReportingServerURL**
    String | Reporting\\ReportingServer | Policy value not written (same as Not Configured) | +| **ReportingDataCacheLimit**
    Integer \[0–1024\] | Reporting\\DataCacheLimit | Policy value not written (same as Not Configured) | +| **ReportingDataBlockSize**
    Integer \[1024–Unlimited\] | Reporting\\DataBlockSize | Policy value not written (same as Not Configured) | +| **ReportingStartTime**
    Integer (0–23) | Reporting\\ StartTime | Policy value not written (same as Not Configured) | +| **ReportingInterval**
    Integer | Reporting\\RetryInterval | Policy value not written (same as Not Configured) | +| **ReportingRandomDelay**
    Integer \[0 - ReportingRandomDelay\] | Reporting\\RandomDelay | Policy value not written (same as Not Configured) | +| EnableDynamicVirtualization
    1 (Enabled), 0 (Disabled) | HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\AppV\\Client\\Virtualization | | +| **EnablePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\AppV\\Client\\Publishing | | +| **HidePublishingRefreshUI**
    1 (Enabled), 0 (Disabled) | | | +| **ProcessesUsingVirtualComponents**
    String | Virtualization\\ProcessesUsingVirtualComponents | Empty string. | ## Related topics diff --git a/windows/application-management/app-v/appv-connection-group-virtual-environment.md b/windows/application-management/app-v/appv-connection-group-virtual-environment.md index 10e22fe39a..7fa1f3d1b5 100644 --- a/windows/application-management/app-v/appv-connection-group-virtual-environment.md +++ b/windows/application-management/app-v/appv-connection-group-virtual-environment.md @@ -30,7 +30,20 @@ The connection group that is used is based on the order in which a package appea Consider the following example section: ```XML - + + + + + ``` Assume that same DWORD value ABC (HKEY\_LOCAL\_MACHINE\\software\\contoso\\finapp\\region) is defined in the first and third package. diff --git a/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md b/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md index a9ee839ed6..27efb333f1 100644 --- a/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md +++ b/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md @@ -38,24 +38,24 @@ The App-V package converter will save the App-V 4.6 installation root folder and 2. You can enter the following cmdlets to check or convert packages: - - **Test-AppvLegacyPackage**—This cmdlet checks packages. It will return information about any failures with the package such as missing **.sft** files, an invalid source, **.osd** file errors, or invalid package version. This cmdlet will not parse the **.sft** file or do any in-depth validation. For information about options and basic functionality for this cmdlet, using Windows PowerShell, enter the following cmdlet: + - **Test-AppvLegacyPackage**—This cmdlet checks packages. It will return information about any failures with the package such as missing **.sft** files, an invalid source, **.osd** file errors, or invalid package version. This cmdlet will not parse the **.sft** file or do any in-depth validation. For information about options and basic functionality for this cmdlet, using Windows PowerShell, enter the following cmdlet: - ```PowerShell - Test-AppvLegacyPackage -? - ``` + ```PowerShell + Test-AppvLegacyPackage -? + ``` - - **ConvertFrom-AppvLegacyPackage**—This cmdlet converts packages from legacy versions to updated versions. To convert an existing package, enter the following cmdlet: + - **ConvertFrom-AppvLegacyPackage**—This cmdlet converts packages from legacy versions to updated versions. To convert an existing package, enter the following cmdlet: - ```PowerShell - ConvertFrom-AppvLegacyPackage C:\contentStore C:\convertedPackages - ``` + ```PowerShell + ConvertFrom-AppvLegacyPackage C:\contentStore C:\convertedPackages + ``` In this cmdlet, `C:\contentStore` represents the location of the existing package and `C:\convertedPackages` is the output directory to which the resulting App-V for Windows 10 virtual application package file will be saved. By default, if you do not specify a new name, the old package name will be used. Additionally, the package converter optimizes performance of packages in App-V for Windows 10 by setting the package to stream fault the App-V package.  This is more performant than the primary feature block and fully downloading the package. The flag **DownloadFullPackageOnFirstLaunch** allows you to convert the package and set the package to be fully downloaded by default. - >[!NOTE] - >Before you specify the output directory, you must create the output directory. + >[!NOTE] + >Before you specify the output directory, you must create the output directory. ### Advanced Conversion Tips diff --git a/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md b/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md index 55efbbf729..a33e8e481a 100644 --- a/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md +++ b/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md @@ -27,20 +27,20 @@ App-V Package Accelerators automatically sequence large, complex applications. A The following parameters are required to use the package accelerator cmdlet: - - *InstalledFilesPath* specifies the application installation path. - - *Installer* specifies the path to the application installer media. - - *InputPackagePath* specifies the path to the .appv package. - - *Path* specifies the output directory for the package. + - *InstalledFilesPath* specifies the application installation path. + - *Installer* specifies the path to the application installer media. + - *InputPackagePath* specifies the path to the .appv package. + - *Path* specifies the output directory for the package. - The following example cmdlet shows how you can create a package accelerator with an .appv package and the installation media: + The following example cmdlet shows how you can create a package accelerator with an .appv package and the installation media: - ```PowerShell - New-AppvPackageAccelerator -InputPackagePath -Installer -Path - ``` + ```PowerShell + New-AppvPackageAccelerator -InputPackagePath -Installer -Path + ``` - You can also use the following optional parameter with the **New-AppvPackageAccelerator** cmdlet: + You can also use the following optional parameter with the **New-AppvPackageAccelerator** cmdlet: - - *AcceleratorDescriptionFile* specifies the path to user-created package accelerator instructions. The package accelerator instructions are **.txt** or **.rtf** description files that will be included in the package created by the package accelerator. + - *AcceleratorDescriptionFile* specifies the path to user-created package accelerator instructions. The package accelerator instructions are **.txt** or **.rtf** description files that will be included in the package created by the package accelerator. diff --git a/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md b/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md index 74c21978be..44920d8d72 100644 --- a/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md +++ b/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md @@ -163,51 +163,51 @@ After you download the Office 2013 applications through the Office Deployment To 1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - * **SourcePath**: Point to the Office applications downloaded earlier. - * **ProductID**: Specify the type of licensing, as shown in the following examples: - * Subscription Licensing: - ```XML - - - - - - - - - - - ``` - In this example, the following changes were made to create a package with Subscription licensing: + * **SourcePath**: Point to the Office applications downloaded earlier. + * **ProductID**: Specify the type of licensing, as shown in the following examples: + * Subscription Licensing: + ```XML + + + + + + + + + + + ``` + In this example, the following changes were made to create a package with Subscription licensing: - * **SourcePath** is the path, which was changed to point to the Office applications that were downloaded earlier. - * **Product ID** for Office was changed to `O365ProPlusRetail`. - * **Product ID** for Visio was changed to `VisioProRetail`. - * Volume Licensing - ```XML - - - - - - - - - - - ``` - In this example, the following changes were made to create a package with Volume licensing: + * **SourcePath** is the path, which was changed to point to the Office applications that were downloaded earlier. + * **Product ID** for Office was changed to `O365ProPlusRetail`. + * **Product ID** for Visio was changed to `VisioProRetail`. + * Volume Licensing + ```XML + + + + + + + + + + + ``` + In this example, the following changes were made to create a package with Volume licensing: - * **SourcePath** is the source's path, which was changed to point to the Office applications that were downloaded earlier. - * **Product ID** for Office was changed to `ProPlusVolume`. - * **Product ID** for Visio was changed to `VisioProVolume`. - * **ExcludeApp** (optional) lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath. - * **PACKAGEGUID** (optional)—By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server. + * **SourcePath** is the source's path, which was changed to point to the Office applications that were downloaded earlier. + * **Product ID** for Office was changed to `ProPlusVolume`. + * **Product ID** for Visio was changed to `VisioProVolume`. + * **ExcludeApp** (optional) lets you specify Office programs that you don’t want included in the App-V package that the Office Deployment Tool creates. For example, you can exclude Access and InfoPath. + * **PACKAGEGUID** (optional)—By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use PACKAGEGUID to specify a different package ID for each package, which allows you to publish multiple App-V packages, created by the Office Deployment Tool, and manage them by using the App-V Server. - An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users. + An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2013 for some users, and create another package with Office 2013 and Visio 2013 for another set of users. - >[!NOTE] - >Even if you use unique package IDs, you can still deploy only one App-V package to a single device. + >[!NOTE] + >Even if you use unique package IDs, you can still deploy only one App-V package to a single device. 2. Use the **/packager** command to convert the Office applications to an Office 2013 App-V package. For example: @@ -228,11 +228,11 @@ After you download the Office 2013 applications through the Office Deployment To After you run the **/packager** command, the following folders will appear in the directory where you specified the package should be saved: - * **App-V Packages**, which contains an Office 2013 App-V package and two deployment configuration files.
    - * **WorkingDir** + * **App-V Packages**, which contains an Office 2013 App-V package and two deployment configuration files.
    + * **WorkingDir** - >[!NOTE] - >To troubleshoot any issues, see the log files in the %temp% directory (default). + >[!NOTE] + >To troubleshoot any issues, see the log files in the %temp% directory (default). 3. Verify that the Office 2013 App-V package works correctly: 1. Publish the Office 2013 App-V package that you created globally to a test computer and verify that the Office 2013 shortcuts appear. @@ -381,10 +381,10 @@ To upgrade an Office 2013 package, use the Office Deployment Tool. To upgrade a 1. Create a new Office 2013 package through the Office Deployment Tool that uses the most recent Office 2013 application software. The most recent Office 2013 bits can always be obtained through the download stage of creating an Office 2013 App-V Package. The newly created Office 2013 package will have the most recent updates and a new Version ID. All packages created using the Office Deployment Tool have the same lineage. - >[!NOTE] - >Office App-V packages have two Version IDs: - * An Office 2013 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool. - * A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2013 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2013 package. + > [!NOTE] + > Office App-V packages have two Version IDs: + > * An Office 2013 App-V Package Version ID that is unique across all packages created using the Office Deployment Tool. + > * A second App-V Package Version ID, x.x.x.x for example, in the AppX manifest that will only change if there is a new version of Office itself. For example, if a new Office 2013 release with upgrades is available, and a package is created through the Office Deployment Tool to incorporate these upgrades, the X.X.X.X version ID will change to reflect that the Office version itself has changed. The App-V server will use the X.X.X.X version ID to differentiate this package and recognize that it contains new upgrades to the previously published package, and as a result, publish it as an upgrade to the existing Office 2013 package. 2. Globally publish the newly created Office 2013 App-V Packages onto computers where you would like to apply the new updates. Since the new package has the same lineage of the older Office 2013 App-V Package, publishing the new package with the updates will only apply the new changes to the old package, and thus will be fast. 3. Upgrades will be applied in the same manner of any globally published App-V Packages. Because applications will probably be in use, upgrades might be delayed until the computer is rebooted. diff --git a/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md b/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md index 210ae0a677..d38f80fbd5 100644 --- a/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md +++ b/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md @@ -95,8 +95,8 @@ After you download the Office Deployment Tool, you can use it to get the latest The XML file included in the Office Deployment Tool specifies the product details, such as the languages and Office applications included. 1. **Customize the sample XML configuration file:** Use the sample XML configuration file that you downloaded with the Office Deployment Tool to customize the Office applications: - 1. Open the sample XML file in Notepad or your favorite text editor. - 2. With the sample **configuration.xml** file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the **configuration.xml** file: + 1. Open the sample XML file in Notepad or your favorite text editor. + 2. With the sample **configuration.xml** file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the **configuration.xml** file: ```XML @@ -129,16 +129,16 @@ The XML file included in the Office Deployment Tool specifies the product detail After editing the **configuration.xml** file to specify the desired product, languages, and the location where the Office 2016 applications will be saved to, you can save the configuration file under a name of your choice, such as "Customconfig.xml." 2. **Download the applications into the specified location:** Use an elevated command prompt and a 64-bit operating system to download the Office 2016 applications that will later be converted into an App-V package. The following is an example command: - `\\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml` + `\\server\Office2016\setup.exe /download \\server\Office2016\Customconfig.xml` - The following table describes the example command's elements: + The following table describes the example command's elements: - | Element | Description | - |-------------------------------|--------------------------------------| - | ```\\server\Office2016``` | This is the network share location that contains the Office Deployment Tool and the custom **Configuration.xml** file, which in this example is **Customconfig.xml**. | - | ``Setup.exe`` | This is the Office Deployment Tool. | - | ```/download``` | Downloads the Office 2016 applications that you specify in the **Customconfig.xml** file. | - | ```\\server\Office2016\Customconfig.xml```| This passes the XML configuration file required to complete the download process. In this example, the file used is **Customconfig.xml**. After using the download command, Office applications should be found in the location specified in the configuration file, which in this example is ```\\Server\Office2016```. | + | Element | Description | + |-------------------------------|--------------------------------------| + | ```\\server\Office2016``` | This is the network share location that contains the Office Deployment Tool and the custom **Configuration.xml** file, which in this example is **Customconfig.xml**. | + | ``Setup.exe`` | This is the Office Deployment Tool. | + | ```/download``` | Downloads the Office 2016 applications that you specify in the **Customconfig.xml** file. | + | ```\\server\Office2016\Customconfig.xml```| This passes the XML configuration file required to complete the download process. In this example, the file used is **Customconfig.xml**. After using the download command, Office applications should be found in the location specified in the configuration file, which in this example is ```\\Server\Office2016```. | ### Convert the Office applications into an App-V package @@ -164,34 +164,34 @@ After you download the Office 2016 applications through the Office Deployment To 1. In Notepad, reopen the CustomConfig.xml file, and make the following changes to the file: - * **SourcePath**: Change to the location where you saved the Office applications you downloaded during setup. - * **ProductID**: Specify the type of licensing, as shown in the following example: + * **SourcePath**: Change to the location where you saved the Office applications you downloaded during setup. + * **ProductID**: Specify the type of licensing, as shown in the following example: - * Subscription Licensing: - ```XML - - - - - - - - - - - ``` - This example made the following changes to create this Subscription Licensing package: + * Subscription Licensing: + ```XML + + + + + + + + + + + ``` + This example made the following changes to create this Subscription Licensing package: - * **SourcePath** was changed to point to the Office applications that were downloaded earlier. - * **Product ID** for Office was changed to `O365ProPlusRetail`. - * **Product ID** for Visio was changed to `VisioProRetail`. - * **ExcludeApp** (optional): Lets you specify Office programs that you don’t want included in the App-V package created by the Office Deployment Tool. For example, you can exclude Access. - * **PACKAGEGUID** (optional): By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use **PACKAGEGUID** to specify a different package ID for each package, which allows you to publish multiple App-V packages created by the Office Deployment Tool, and then manage your published packages with the App-V Server. + * **SourcePath** was changed to point to the Office applications that were downloaded earlier. + * **Product ID** for Office was changed to `O365ProPlusRetail`. + * **Product ID** for Visio was changed to `VisioProRetail`. + * **ExcludeApp** (optional): Lets you specify Office programs that you don’t want included in the App-V package created by the Office Deployment Tool. For example, you can exclude Access. + * **PACKAGEGUID** (optional): By default, all App-V packages created by the Office Deployment Tool share the same App-V Package ID. You can use **PACKAGEGUID** to specify a different package ID for each package, which allows you to publish multiple App-V packages created by the Office Deployment Tool, and then manage your published packages with the App-V Server. - An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users. + An example of when to use this parameter is if you create different packages for different users. For example, you can create a package with just Office 2016 for some users, and create another package with Office 2016 and Visio 2016 for another set of users. - >[!NOTE] - >Even if you use unique package IDs, you can still deploy only one App-V package to a single device. + >[!NOTE] + >Even if you use unique package IDs, you can still deploy only one App-V package to a single device. 2. Use the /packager command to convert the Office applications to an Office 2016 App-V package. The following is an example packager command: @@ -212,11 +212,11 @@ After you download the Office 2016 applications through the Office Deployment To After you run the **/packager** command, the following folders appear up in the directory where you specified the package should be saved: - * **App-V Packages**—contains an Office 2016 App-V package and two deployment configuration files. - * **WorkingDir** + * **App-V Packages**—contains an Office 2016 App-V package and two deployment configuration files. + * **WorkingDir** - >[!NOTE] - >To troubleshoot any issues, see the log files in the %temp% directory (default). + >[!NOTE] + >To troubleshoot any issues, see the log files in the %temp% directory (default). 3. Verify that the Office 2016 App-V package works correctly: 1. Publish the Office 2016 App-V package that you created globally to a test computer and verify that the Office 2016 shortcuts appear. diff --git a/windows/application-management/app-v/appv-deploying-the-appv-server.md b/windows/application-management/app-v/appv-deploying-the-appv-server.md index 1132ba2453..0827190013 100644 --- a/windows/application-management/app-v/appv-deploying-the-appv-server.md +++ b/windows/application-management/app-v/appv-deploying-the-appv-server.md @@ -35,7 +35,7 @@ App-V offers the following five server components, each of which serves a specif * **Management server.** Use the App-V management server and console to manage your App-V infrastructure. See [Administering App-V with the management console](appv-administering-virtual-applications-with-the-management-console.md) for more information about the management server. - >[!NOTE] + >[!NOTE] >If you are using App-V with your electronic software distribution solution, you don’t need to use the management server and console. However, you may want to take advantage of the reporting and streaming capabilities in App-V. * **Management database.** Use the App-V management database to facilitate database pre-deployments for App-V management. For more information about the management database, see [How to deploy the App-V server](appv-deploy-the-appv-server.md). * **Publishing server.** Use the App-V publishing server to host and stream virtual applications. The publishing server supports the HTTP and HTTPS protocols and does not require a database connection. To learn how to configure the publishing server, see [How to install the App-V publishing server](appv-install-the-publishing-server-on-a-remote-computer.md). diff --git a/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md b/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md index 71e125f5e4..cbaef2e7a4 100644 --- a/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md +++ b/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md @@ -21,65 +21,64 @@ Use the following procedure to configure the App-V for reporting. **To configure the computer running the App-V client for reporting** -1. Enable the App-V client. For more information, see [Enable the App-V desktop client](appv-enable-the-app-v-desktop-client.md). +1. Enable the App-V client. For more information, see [Enable the App-V desktop client](appv-enable-the-app-v-desktop-client.md). -2. After you have enabled the App-V client, use the **Set-AppvClientConfiguration** cmdlet to configure appropriate Reporting Configuration settings: +2. After you have enabled the App-V client, use the **Set-AppvClientConfiguration** cmdlet to configure appropriate Reporting Configuration settings: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, https://<reportingservername>:<reportingportnumber>.

    -
    - Note   -

    This is the port number that was assigned during the Reporting Server setup

    -
    -
    -   -

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SettingDescription

    ReportingEnabled

    Enables the client to return information to a reporting server. This setting is required for the client to collect the reporting data on the client.

    ReportingServerURL

    Specifies the location on the reporting server where client information is saved. For example, https://<reportingservername>:<reportingportnumber>.

    +
    + Note

    This is the port number that was assigned during the Reporting Server setup

    +
    +
    -   +

    Reporting Start Time

    This is set to schedule the client to automatically send the data to the server. This setting will indicate the hour at which the reporting data will start to send. It is in the 24 hour format and will take a number between 0-23.

    ReportingRandomDelay

    Specifies the maximum delay (in minutes) for data to be sent to the reporting server. When the scheduled task is started, the client generates a random delay between 0 and ReportingRandomDelay and will wait the specified duration before sending data.

    ReportingInterval

    Specifies the retry interval that the client will use to resend data to the reporting server.

    ReportingDataCacheLimit

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    ReportingDataBlockSize

    Specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The size applies to the cache in memory. When the limit is reached, the log file will roll over.

    -3. After the appropriate settings have been configured, the computer running the App-V client will automatically collect data and will send the data back to the reporting server. - Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** cmdlet. + +3. After the appropriate settings have been configured, the computer running the App-V client will automatically collect data and will send the data back to the reporting server. + + Additionally, administrators can manually send the data back in an on-demand manner using the **Send-AppvClientReport** cmdlet. diff --git a/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md b/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md index edebf0f9c5..ab69c602ad 100644 --- a/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md +++ b/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md @@ -29,8 +29,8 @@ Use the following procedure to install the database server and management server 4. On the **Feature selection** page, select the components you want to install by first selecting the **Management Server Database** checkbox, then selecting **Next**. 5. On the **Installation location** page, accept the default location and select **Next**. 6. On the initial **Create new management server database** page, accept the default selections if appropriate, then select **Next**. - * If you are using a custom SQL Server instance, select **Use a custom instance** and enter the name of the instance. - * If you are using a custom database name, select **Custom configuration** and enter the database name. + * If you are using a custom SQL Server instance, select **Use a custom instance** and enter the name of the instance. + * If you are using a custom database name, select **Custom configuration** and enter the database name. 7. On the next **Create new management server database** page, select **Use a remote computer**, then enter the remote machine account using the following format: ```Domain\MachineAccount```. >[!NOTE] @@ -45,8 +45,8 @@ Use the following procedure to install the database server and management server 4. On the **Feature selection** page, select the components you want to install by first selecting the **Reporting Server Database** checkbox, then selecting **Next**. 5. On the **Installation Location** page, accept the default location and select **Next**. 6. On the initial **Create new management server database** page, accept the default selections if appropriate, then select **Next**. - * If you're using a custom SQL Server instance, select **Use a custom instance** and enter the instance name. - * If you're using a custom database name, select **Custom configuration** and enter the database name. + * If you're using a custom SQL Server instance, select **Use a custom instance** and enter the instance name. + * If you're using a custom database name, select **Custom configuration** and enter the database name. 7. On the next **Create new management server database** page, select **Use a remote computer**, and enter the remote machine account using the following format: ```Domain\MachineAccount```. >[!NOTE] @@ -58,18 +58,18 @@ Use the following procedure to install the database server and management server 1. Copy the App-V server installation files to the computer on which you want to install it on. 2. To extract the App-V database scripts, open a command prompt and specify the location where the installation files are saved and run the following command: - ```SQL + ```SQL appv\_server\_setup.exe /LAYOUT /LAYOUTDIR=”InstallationExtractionLocation” - ``` + ``` 3. After the extraction has been completed, to access the App-V database scripts and instructions readme file: - * The App-V Management Database scripts and instructions readme are located in the following folder: **InstallationExtractionLocation** \\ **Database Scripts** \\ **Management Database**. - * The App-V Reporting Database scripts and instructions readme are located in the following folder: **InstallationExtractionLocation** \\ **Database Scripts** \\ **Reporting Database**. + * The App-V Management Database scripts and instructions readme are located in the following folder: **InstallationExtractionLocation** \\ **Database Scripts** \\ **Management Database**. + * The App-V Reporting Database scripts and instructions readme are located in the following folder: **InstallationExtractionLocation** \\ **Database Scripts** \\ **Reporting Database**. 4. For each database, copy the scripts to a share and modify them following the instructions in the readme file. - >[!NOTE] - >For more information about modifying the required SIDs contained in the scripts see, [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell](appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md). + >[!NOTE] + >For more information about modifying the required SIDs contained in the scripts see, [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell](appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md). 5. Run the scripts on the computer running Microsoft SQL Server. diff --git a/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md b/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md index e1fc8c81c8..a1a2580c13 100644 --- a/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md +++ b/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md @@ -25,12 +25,12 @@ To install the management server on a standalone computer and connect it to the 5. On the **Installation Location** page, accept the default location, then select **Next**. 6. On the **Configure Existing Management Database** page, select **Use a remote SQL Server**, then enter the computer running Microsoft SQL's machine name, such as ```SqlServerMachine```. - >[!NOTE] - >If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance**, then enter the instance's name. Specify the **SQL Server Database name** that this management server will use, such as ```AppvManagement```. + >[!NOTE] + >If the Microsoft SQL Server is deployed on the same server, select **Use local SQL Server**. For the SQL Server Instance, select **Use the default instance**. If you are using a custom Microsoft SQL Server instance, you must select **Use a custom instance**, then enter the instance's name. Specify the **SQL Server Database name** that this management server will use, such as ```AppvManagement```. 7. On the **Configure management server configuration** page, specify the following items: - * The AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation - * The **Website Name** you want to use for the management service. Accept the default if you do not have a custom name. - * For the **Port Binding**, specify a unique port number, such as **12345**. + * The AD group or account that will connect to the management console for administrative purposes for example **MyDomain\\MyUser** or **MyDomain\\AdminGroup**. The account or AD group you specify will be enabled to manage the server through the management console. You can add additional users or groups using the management console after installation + * The **Website Name** you want to use for the management service. Accept the default if you do not have a custom name. + * For the **Port Binding**, specify a unique port number, such as **12345**. 8. Select **Install**. 9. To confirm that the setup has completed successfully, open a web browser and enter the following URL: https://managementserver:portnumber/Console. If the installation was successful, you should see the **Management Console** appear without any error messages or warnings displayed. diff --git a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md index 6c5e554c0b..c2f081dd15 100644 --- a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md +++ b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md @@ -27,16 +27,16 @@ Use the following procedure to install the publishing server on a separate compu 5. On the **Installation location** page, accept the default location, then select **Next**. 6. On the **Configure publishing server configuration** page, specify the following items: - * The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. - * Specify the website name that you want to use for the publishing service. If you don't have a custom name, then use the default name. - * For the **Port binding**, specify a unique port number that will be used by App-V. For example, **54321**. + * The URL for the management service that the publishing server will connect to. For example, **http://ManagementServerName:12345**. + * Specify the website name that you want to use for the publishing service. If you don't have a custom name, then use the default name. + * For the **Port binding**, specify a unique port number that will be used by App-V. For example, **54321**. 7. On the **Ready to install** page, select **Install**. 8. After the installation is complete, the publishing server must be registered with the management server. In the App-V management console, use the following steps to register the server: 1. Open the App-V management server console. 2. In the left pane, select **Servers**, then select **Register New Server**. 3. Enter the server name and a description (if required), then select **Add**. -9. To verify that the publishing server is running correctly, you should import a package to the management server, entitle that package to an AD group, then publish it. Using an internet browser, open the following URL: **https://publishingserver:pubport**. If the server is running correctly, information like the following example should appear. +9. To verify that the publishing server is running correctly, you should import a package to the management server, entitle that package to an AD group, then publish it. Using an internet browser, open the following URL: https://publishingserver:pubport. If the server is running correctly, information like the following example should appear. ```SQL diff --git a/windows/application-management/app-v/appv-managing-connection-groups.md b/windows/application-management/app-v/appv-managing-connection-groups.md index 5ba868c2b4..76ced5b4de 100644 --- a/windows/application-management/app-v/appv-managing-connection-groups.md +++ b/windows/application-management/app-v/appv-managing-connection-groups.md @@ -32,40 +32,40 @@ In some previous versions of App-V, connection groups were referred to as Dynami -

    [About the Connection Group Virtual Environment](appv-connection-group-virtual-environment.md)

    +

    About the Connection Group Virtual Environment

    Describes the connection group virtual environment.

    -

    [About the Connection Group File](appv-connection-group-file.md)

    +

    About the Connection Group File

    Describes the connection group file.

    -

    [How to Create a Connection Group](appv-create-a-connection-group.md)

    +

    How to Create a Connection Group

    Explains how to create a new connection group.

    -

    [How to Create a Connection Group with User-Published and Globally Published Packages](appv-create-a-connection-group-with-user-published-and-globally-published-packages.md)

    +

    How to Create a Connection Group with User-Published and Globally Published Packages

    Explains how to create a new connection group that contains a mix of packages that are published to the user and published globally.

    -

    [How to Delete a Connection Group](appv-delete-a-connection-group.md)

    +

    How to Delete a Connection Group

    Explains how to delete a connection group.

    -

    [How to Publish a Connection Group](appv-publish-a-connection-group.md)

    +

    How to Publish a Connection Group

    Explains how to publish a connection group.

    -

    [How to Make a Connection Group Ignore the Package Version](appv-configure-connection-groups-to-ignore-the-package-version.md)

    +

    How to Make a Connection Group Ignore the Package Version

    Explains how to configure a connection group to accept any version of a package, which simplifies package upgrades and reduces the number of connection groups you need to create.

    -

    [How to Allow Only Administrators to Enable Connection Groups](appv-allow-administrators-to-enable-connection-groups.md)

    +

    How to Allow Only Administrators to Enable Connection Groups

    Explains how to configure the App-V client so that only administrators (not end users) can enable or disable connection groups.

    -  + @@ -77,9 +77,9 @@ In some previous versions of App-V, connection groups were referred to as Dynami - [Operations for App-V](appv-operations.md) -  + -  + diff --git a/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md b/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md index 6f716b335e..cd519bf28a 100644 --- a/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md +++ b/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md @@ -55,7 +55,7 @@ You can also use the `–OSDsToIncludeInPackage` parameter with the `ConvertFrom -  + ### Example conversion statement @@ -161,7 +161,7 @@ ConvertFrom-AppvLegacyPackage –SourcePath \\OldPkgStore\ContosoApp\ -  + ## Converting packages created using a prior version of App-V @@ -172,7 +172,7 @@ Use the package converter utility to upgrade virtual application packages create **Important**   After you convert an existing package you should test the package prior to deploying the package to ensure the conversion process was successful. -  + **What to know before you convert existing packages** @@ -190,7 +190,7 @@ After you convert an existing package you should test the package prior to deplo

    Virtual packages using DSC are not linked after conversion.

    -

    Link the packages using connection groups. See [Managing Connection Groups](appv-managing-connection-groups.md).

    +

    Link the packages using connection groups. See Managing Connection Groups.

    Environment variable conflicts are detected during conversion.

    @@ -203,7 +203,7 @@ After you convert an existing package you should test the package prior to deplo -  + When converting a package check for failing files or shortcuts, locate the item in App-V 4.6 package. It could possibly be a hard-coded path. Convert the path. @@ -233,19 +233,19 @@ There is no direct method to upgrade to a full App-V infrastructure. Use the inf

    Review prerequisites.

    -

    [App-V Server prerequisite software](appv-prerequisites.md#app-v-server-prerequisite-software).

    +

    App-V Server prerequisite software.

    Enable the App-V client.

    -

    [Enable the App-V desktop client](appv-enable-the-app-v-desktop-client.md).

    +

    Enable the App-V desktop client.

    Install App-V Server.

    -

    [How to Deploy the App-V Server](appv-deploy-the-appv-server.md).

    +

    How to Deploy the App-V Server.

    Migrate existing packages.

    -

    See [Converting packages created using a prior version of App-V](#converting-packages-created-using-a-prior-version-of-app-v) earlier in this topic.

    +

    See Converting packages created using a prior version of App-V earlier in this topic.

    diff --git a/windows/application-management/app-v/appv-performance-guidance.md b/windows/application-management/app-v/appv-performance-guidance.md index 35ac85427d..40047a8bd9 100644 --- a/windows/application-management/app-v/appv-performance-guidance.md +++ b/windows/application-management/app-v/appv-performance-guidance.md @@ -89,7 +89,7 @@ Deployment Environment -  + Expected Configuration @@ -110,7 +110,7 @@ Expected Configuration -  + IT Administration @@ -127,7 +127,7 @@ IT Administration -  + ### Usage Scenarios @@ -147,14 +147,14 @@ As you review the two scenarios, keep in mind that these approach the extremes.

    To provide the most optimal user experience, this approach leverages the capabilities of a UPM solution and requires additional image preparation and can incur some additional image management overhead.

    -

    The following describes many performance improvements in stateful non-persistent deployments. For more information, see [Sequencing Steps to Optimize Packages for Publishing Performance](#sequencing-steps-to-optimize-packages-for-publishing-performance) later in this topic.

    +

    The following describes many performance improvements in stateful non-persistent deployments. For more information, see Sequencing Steps to Optimize Packages for Publishing Performance later in this topic.

    The general expectations of the previous scenario still apply here. However, keep in mind that VM images are typically stored in very costly arrays; a slight alteration has been made to the approach. Do not pre-configure user-targeted virtual application packages in the base image.

    -

    The impact of this alteration is detailed in the [User Experience Walk-through](#bkmk-uewt) section of this document.

    +

    The impact of this alteration is detailed in the User Experience Walk-through section of this document.

    -  + ### Preparing your Environment @@ -177,9 +177,9 @@ The following table displays the required steps to prepare the base image and th

      -
    • Enable the App-V client as described in [Enable the App-V in-box client](appv-enable-the-app-v-desktop-client.md).

    • +
    • Enable the App-V client as described in Enable the App-V in-box client.

    • Enable UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

    • -
    • Configure for Shared Content Store (SCS) mode. For more information see [Deploying the App-V Sequencer and Configuring the Client](appv-deploying-the-appv-sequencer-and-client.md).

    • +
    • Configure for Shared Content Store (SCS) mode. For more information see Deploying the App-V Sequencer and Configuring the Client.

    • Configure Preserve User Integrations on Login Registry DWORD.

    • Pre-configure all user- and global-targeted packages for example, Add-AppvClientPackage.

    • Pre-configure all user- and global-targeted connection groups for example, Add-AppvClientConnectionGroup.

    • @@ -197,9 +197,9 @@ The following table displays the required steps to prepare the base image and th

      -
    • Enable the App-V client as described in [Enable the App-V in-box client](appv-enable-the-app-v-desktop-client.md).

    • +
    • Enable the App-V client as described in Enable the App-V in-box client.

    • Enable UE-V and download the App-V Settings Template from the UE-V template Gallery, see the following steps.

    • -
    • Configure for Shared Content Store (SCS) mode. For more information see [Deploying the App-V Sequencer and Configuring the Client](appv-deploying-the-appv-sequencer-and-client.md).

    • +
    • Configure for Shared Content Store (SCS) mode. For more information see Deploying the App-V Sequencer and Configuring the Client.

    • Configure Preserve User Integrations on Login Registry DWORD.

    • Pre-configure all global-targeted packages for example, Add-AppvClientPackage.

    • Pre-configure all global-targeted connection groups for example, Add-AppvClientConnectionGroup.

    • @@ -210,7 +210,7 @@ The following table displays the required steps to prepare the base image and th -  + **Configurations** - For critical App-V Client configurations and for a little more context and how-to, review the following information: @@ -231,7 +231,7 @@ The following table displays the required steps to prepare the base image and th

      Shared Content Store (SCS) Mode

        -
      • Configurable in Windows PowerShell with `Set-AppvClientConfiguration -SharedContentStoreMode 1`
        or configurable with Group Policy, as described in [Deploying the App-V Sequencer and Configuring the Client](appv-deploying-the-appv-sequencer-and-client.md).

      • +
      • Configurable in Windows PowerShell with Set-AppvClientConfiguration -SharedContentStoreMode 1
        or configurable with Group Policy, as described in Deploying the App-V Sequencer and Configuring the Client.

      When running the shared content store only publishing data is maintained on hard disk; other virtual application assets are maintained in memory (RAM).

      This helps to conserve local storage and minimize disk I/O per second (IOPS).

      @@ -262,7 +262,7 @@ The following table displays the required steps to prepare the base image and th -  + ### Configure UE-V solution for App-V Approach @@ -288,7 +288,7 @@ UE-V will only support removing the .lnk file type from the exclusion list in th **Important**   This topic describes how to change the Windows registry by using Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. You should make a backup copy of the registry files (System.dat and User.dat) before you change the registry. Microsoft cannot guarantee that the problems that might occur when you change the registry can be resolved. Change the registry at your own risk. -  + Using the Microsoft Registry Editor (regedit.exe), navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **UEV** \\ **Agent** \\ **Configuration** \\ **ExcludedFileTypes** and remove **.lnk** from the excluded file types. @@ -311,7 +311,7 @@ To enable an optimized login experience, for example the App-V approach for the App-V packages are not supported when using UPD with selected folders stored in the user profile disk. The Copy on Write driver does not handle UPD selected folders. -   + - Capturing changes to the locations, which constitute the user integrations, prior to session logoff. @@ -404,7 +404,7 @@ This following is a step-by-step walk-through of the App-V and UPM operations an -  + @@ -429,7 +429,7 @@ This following is a step-by-step walk-through of the App-V and UPM operations an
      -  + ### Impact to Package Life Cycle @@ -516,7 +516,7 @@ Several App-V features facilitate new scenarios or enable new customer deploymen -  + ### Removing FB1 @@ -555,7 +555,7 @@ Removing FB1 does not require the original application installer. After completi **Note**   This cmdlet requires an executable (.exe) or batch file (.bat). You must provide an empty (does nothing) executable or batch file. -   + @@ -582,7 +582,7 @@ Removing FB1 does not require the original application installer. After completi
      -  + ### Creating a new virtual application package on the sequencer @@ -619,7 +619,7 @@ When publishing a virtual application package, the App-V Client will detect if a -  + ### Disabling a Dynamic Configuration by using Windows PowerShell @@ -669,7 +669,7 @@ For documentation on How to Apply a Dynamic Configuration, see: -  + ### Determining what virtual fonts exist in the package diff --git a/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md b/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md index 09b74e41a0..178c952b5a 100644 --- a/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md +++ b/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md @@ -87,8 +87,8 @@ Use the following steps to modify the connection string to include ```failover p 2. Navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **AppV** \\ **Server** \\ **ManagementService**. 3. Modify the **MANAGEMENT\_SQL\_CONNECTION\_STRING** value with the ```failover partner = ``` value. 4. Restart management service using the IIS console. - >[!NOTE] - >Database Mirroring is on the list of [deprecated database engine features in SQL Server 2012]() due to the **AlwaysOn** feature available starting with Microsoft SQL Server 2012. + >[!NOTE] + >Database Mirroring is on the list of [deprecated database engine features in SQL Server 2012]() due to the **AlwaysOn** feature available starting with Microsoft SQL Server 2012. Click any of the following links for more information: diff --git a/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md b/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md index b3e784acf9..ae79aea7c4 100644 --- a/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md +++ b/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md @@ -90,11 +90,11 @@ To bypass the auto-registration operation for native Word 2010, follow these ste 1. Exit Word 2010. 2. Start the Registry Editor by doing the following: - * In Windows 7k, select **Start**, type **regedit** in the Start Search box, then select the Enter key. + * In Windows 7k, select **Start**, type **regedit** in the Start Search box, then select the Enter key. - * In Windows 8.1 or Windows 10, enter **regedit**, select **Enter** on the Start page, then select the Enter key. + * In Windows 8.1 or Windows 10, enter **regedit**, select **Enter** on the Start page, then select the Enter key. - If you're prompted for an administrator password, enter the password. If you're prompted for a confirmation, select **Continue**. + If you're prompted for an administrator password, enter the password. If you're prompted for a confirmation, select **Continue**. 3. Locate and then select the following registry subkey: ``` syntax diff --git a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md index 4ca7815a6d..9179e46022 100644 --- a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md @@ -28,7 +28,7 @@ The following are known issues and workarounds for Application Virtualization (A Unable to manually create a system-owned folder needed for the set-AppVClientConfiguration PowerShell cmdlet when using the PackageInstallationRoot, IntegrationRootUser, or IntegrationRootGlobal parameters. - Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. + Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. Failure to update an App-V package from App-V 5.x to the latest in-box version, by using the PowerShell sequencing commands. @@ -36,71 +36,70 @@ The following are known issues and workarounds for Application Virtualization (A Unable to modify the locale for auto-sequencing. - Open the C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml file and include the language code for your locale. For example, if you wanted Spanish (Spain), you'd use: es-ES. + Open the C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml file and include the language code for your locale. For example, if you wanted Spanish (Spain), you'd use: es-ES. - Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the Settings > Apps> Default Apps area. + Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the Settings > Apps> Default Apps area. The recommended workaround is to add the following code to the AppXManifest.xml file, underneath the <appv:Extensions> tag:
      
       <appv:Extension Category="AppV.URLProtocol">
      -	<appv:URLProtocol>
      -		<appv:Name>ftp</appv:Name>
      -		<appv:ApplicationURLProtocol>
      -			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      -			<appv:ShellCommands>
      -				<appv:DefaultCommand>open</appv:DefaultCommand>
      -				<appv:ShellCommand>
      -					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      -					<appv:Name>open</appv:Name>
      -					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      -					<appv:DdeExec>
      -						<appv:DdeCommand />
      -					</appv:DdeExec>
      -				</appv:ShellCommand>
      -			</appv:ShellCommands>
      -		</appv:ApplicationURLProtocol>
      -	</appv:URLProtocol>
      +    <appv:URLProtocol>
      +        <appv:Name>ftp</appv:Name>
      +        <appv:ApplicationURLProtocol>
      +            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      +            <appv:ShellCommands>
      +                <appv:DefaultCommand>open</appv:DefaultCommand>
      +                <appv:ShellCommand>
      +                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      +                    <appv:Name>open</appv:Name>
      +                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      +                    <appv:DdeExec>
      +                        <appv:DdeCommand />
      +                    </appv:DdeExec>
      +                </appv:ShellCommand>
      +            </appv:ShellCommands>
      +        </appv:ApplicationURLProtocol>
      +    </appv:URLProtocol>
       </appv:Extension>
       <appv:Extension Category="AppV.URLProtocol">
      -	<appv:URLProtocol>
      -		<appv:Name>http</appv:Name>
      -		<appv:ApplicationURLProtocol>
      -			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      -			<appv:ShellCommands>
      -				<appv:DefaultCommand>open</appv:DefaultCommand>
      -				<appv:ShellCommand>
      -					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      -					<appv:Name>open</appv:Name>
      -					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      -					<appv:DdeExec>
      -						<appv:DdeCommand />
      -					</appv:DdeExec>
      -				</appv:ShellCommand>
      -			</appv:ShellCommands>
      -		</appv:ApplicationURLProtocol>
      -	</appv:URLProtocol>
      +    <appv:URLProtocol>
      +        <appv:Name>http</appv:Name>
      +        <appv:ApplicationURLProtocol>
      +            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      +            <appv:ShellCommands>
      +                <appv:DefaultCommand>open</appv:DefaultCommand>
      +                <appv:ShellCommand>
      +                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      +                    <appv:Name>open</appv:Name>
      +                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      +                    <appv:DdeExec>
      +                        <appv:DdeCommand />
      +                    </appv:DdeExec>
      +                </appv:ShellCommand>
      +            </appv:ShellCommands>
      +        </appv:ApplicationURLProtocol>
      +    </appv:URLProtocol>
       </appv:Extension>
       <appv:Extension Category="AppV.URLProtocol">
      -	<appv:URLProtocol>
      -		<appv:Name>https</appv:Name>
      -		<appv:ApplicationURLProtocol>
      -			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      -			<appv:ShellCommands>
      -				<appv:DefaultCommand>open</appv:DefaultCommand>
      -				<appv:ShellCommand>
      -					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      -					<appv:Name>open</appv:Name>
      -					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      -					<appv:DdeExec>
      -						<appv:DdeCommand />
      -					</appv:DdeExec>
      -				</appv:ShellCommand>
      -			</appv:ShellCommands>
      -		</appv:ApplicationURLProtocol>
      -	</appv:URLProtocol>
      +    <appv:URLProtocol>
      +        <appv:Name>https</appv:Name>
      +        <appv:ApplicationURLProtocol>
      +            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
      +            <appv:ShellCommands>
      +                <appv:DefaultCommand>open</appv:DefaultCommand>
      +                <appv:ShellCommand>
      +                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
      +                    <appv:Name>open</appv:Name>
      +                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
      +                    <appv:DdeExec>
      +                        <appv:DdeCommand />
      +                    </appv:DdeExec>
      +                </appv:ShellCommand>
      +            </appv:ShellCommands>
      +        </appv:ApplicationURLProtocol>
      +    </appv:URLProtocol>
       </appv:Extension>
      -
      - +

    diff --git a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md index 610d4de61b..86d4b51e2a 100644 --- a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md +++ b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md @@ -36,7 +36,7 @@ MSI packages that were generated using an App-V sequencer from previous versions 4. From an elevated Windows PowerShell prompt, navigate to the following folder: - <Windows Kits 10 installation folder>**\Microsoft Application Virtualization\Sequencer\** + <Windows Kits 10 installation folder>**\Microsoft Application Virtualization\Sequencer\\** By default, this path will be:
    **C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\Sequencer** diff --git a/windows/application-management/app-v/appv-reporting.md b/windows/application-management/app-v/appv-reporting.md index f5f4db7791..1bb9d254d7 100644 --- a/windows/application-management/app-v/appv-reporting.md +++ b/windows/application-management/app-v/appv-reporting.md @@ -24,11 +24,11 @@ The following list displays the end–to-end high-level workflow for reporting i 1. The App-V Reporting server requires the following things: - * Internet Information Service (IIS) web server role - * Windows Authentication role (under **IIS / Security**) - * SQL Server installed and running with SQL Server Reporting Services (SSRS) + * Internet Information Service (IIS) web server role + * Windows Authentication role (under **IIS / Security**) + * SQL Server installed and running with SQL Server Reporting Services (SSRS) - To confirm SQL Server Reporting Services is running, enter in a web browser as administrator on the server that will host App-V Reporting. The SQL Server Reporting Services Home page should appear. + To confirm SQL Server Reporting Services is running, enter in a web browser as administrator on the server that will host App-V Reporting. The SQL Server Reporting Services Home page should appear. 2. Install the App-V reporting server and associated database. For more information about installing the reporting server see [How to install the Reporting Server on a standalone computer and connect it to the database](appv-install-the-reporting-server-on-a-standalone-computer.md). Configure the time when the computer running the App-V client should send data to the reporting server. 3. If you are not using an electronic software distribution system such as Configuration Manager to view reports then you can define reports in SQL Server Reporting Service. Download predefined appvshort Reports from the Download Center at [Application Virtualization SSRS Reports](https://www.microsoft.com/en-us/download/details.aspx?id=42630). diff --git a/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md b/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md index 45613b165c..9a36a05933 100644 --- a/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md +++ b/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md @@ -23,7 +23,7 @@ Use the following procedure to create a new App-V package using Windows PowerShe > [!NOTE]   > Before you use this procedure you must copy the associated installer files to the computer running the sequencer and you have read and understand the sequencer section of [Planning for the App-V Sequencer and Client Deployment](appv-planning-for-sequencer-and-client-deployment.md). -  + **To create a new virtual application by using Windows PowerShell** 1. Install the App-V sequencer. For more information about installing the sequencer see [How to Install the Sequencer](appv-install-the-sequencer.md). diff --git a/windows/application-management/app-v/appv-using-the-client-management-console.md b/windows/application-management/app-v/appv-using-the-client-management-console.md index edd0412abe..83bfa11219 100644 --- a/windows/application-management/app-v/appv-using-the-client-management-console.md +++ b/windows/application-management/app-v/appv-using-the-client-management-console.md @@ -24,8 +24,8 @@ This topic provides information about using the Application Virtualization (App- The client management console is separate from the App-V client itself. You can download the client management console from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=41186). -> [!NOTE] -To perform all of the actions available using the client management console, you must have administrative access on the computer running the App-V client. +> [!NOTE] +> To perform all of the actions available using the client management console, you must have administrative access on the computer running the App-V client. ## Options for managing the App-V client diff --git a/windows/application-management/apps-in-windows-10.md b/windows/application-management/apps-in-windows-10.md index 5c7e9bdead..5ce9e92dc8 100644 --- a/windows/application-management/apps-in-windows-10.md +++ b/windows/application-management/apps-in-windows-10.md @@ -155,32 +155,34 @@ System apps are integral to the operating system. Here are the typical system ap Here are the typical installed Windows apps in Windows 10 versions 1709, 1803, and 1809. -| Name | Full name | 1709 | 1803 | 1809 | Uninstall through UI? | -|--------------------|------------------------------------------|:----:|:----:|:----:|:---------------------:| -| Remote Desktop | Microsoft.RemoteDesktop | x | | x | Yes | -| Code Writer | ActiproSoftwareLLC.562882FEEB491 | x | x | | Yes | -| Eclipse Manager | 46928bounde.EclipseManager | x | x | | Yes | -| Pandora | PandoraMediaInc.29680B314EFC2 | x | x | | Yes | -| Photoshop Express | AdobeSystemIncorporated. AdobePhotoshop | x | x | | Yes | -| Duolingo | D5EA27B7.Duolingo- LearnLanguagesforFree | x | x | | Yes | -| Network Speed Test | Microsoft.NetworkSpeedTest | x | x | x | Yes | -| News | Microsoft.BingNews | x | x | x | Yes | -| Sway | Microsoft.Office.Sway | x | x | x | Yes | -| Microsoft.Advertising | Microsoft.Advertising.Xaml | x | x | x | Yes | -| | Microsoft.NET.Native.Framework.1.2 | x | x | | Yes | -| | Microsoft.NET.Native.Framework.1.3 | x | x | | Yes | -| | Microsoft.NET.Native.Framework.1.6 | x | x | x | Yes | -| | Microsoft.NET.Native.Framework.1.7 | | x | x | Yes | -| | Microsoft.NET.Native.Framework.2.0 | x | x | | Yes | -| | Microsoft.NET.Native.Runtime.1.1 | x | x | | Yes | -| | Microsoft.NET.Native.Runtime.1.3 | x | | | Yes | -| | Microsoft.NET.Native.Runtime.1.4 | x | x | | Yes | -| | Microsoft.NET.Native.Runtime.1.6 | x | x | x | Yes | -| | Microsoft.NET.Native.Runtime.1.7 | x | x | x | Yes | -| | Microsoft.NET.Native.Runtime.2.0 | x | x | | Yes | -| | Microsoft.Services.Store.Engagement | x | x | | Yes | -| | Microsoft.VCLibs.120.00 | x | x | | Yes | -| | Microsoft.VCLibs.140.00 | x | x | x | Yes | -| | Microsoft.VCLibs.120.00.Universal | x | | | Yes | -| | Microsoft.VCLibs.140.00.UWPDesktop | | x | | Yes | + +| Name | Full name | 1709 | 1803 | 1809 | Uninstall through UI? | +|-----------------------|------------------------------------------|:----:|:----:|:----:|:---------------------:| +| Remote Desktop | Microsoft.RemoteDesktop | x | | x | Yes | +| Code Writer | ActiproSoftwareLLC.562882FEEB491 | x | x | | Yes | +| Eclipse Manager | 46928bounde.EclipseManager | x | x | | Yes | +| Pandora | PandoraMediaInc.29680B314EFC2 | x | x | | Yes | +| Photoshop Express | AdobeSystemIncorporated. AdobePhotoshop | x | x | | Yes | +| Duolingo | D5EA27B7.Duolingo- LearnLanguagesforFree | x | x | | Yes | +| Network Speed Test | Microsoft.NetworkSpeedTest | x | x | x | Yes | +| News | Microsoft.BingNews | x | x | x | Yes | +| Sway | Microsoft.Office.Sway | x | x | x | Yes | +| Microsoft.Advertising | Microsoft.Advertising.Xaml | x | x | x | Yes | +| | Microsoft.NET.Native.Framework.1.2 | x | x | | Yes | +| | Microsoft.NET.Native.Framework.1.3 | x | x | | Yes | +| | Microsoft.NET.Native.Framework.1.6 | x | x | x | Yes | +| | Microsoft.NET.Native.Framework.1.7 | | x | x | Yes | +| | Microsoft.NET.Native.Framework.2.0 | x | x | | Yes | +| | Microsoft.NET.Native.Runtime.1.1 | x | x | | Yes | +| | Microsoft.NET.Native.Runtime.1.3 | x | | | Yes | +| | Microsoft.NET.Native.Runtime.1.4 | x | x | | Yes | +| | Microsoft.NET.Native.Runtime.1.6 | x | x | x | Yes | +| | Microsoft.NET.Native.Runtime.1.7 | x | x | x | Yes | +| | Microsoft.NET.Native.Runtime.2.0 | x | x | | Yes | +| | Microsoft.Services.Store.Engagement | x | x | | Yes | +| | Microsoft.VCLibs.120.00 | x | x | | Yes | +| | Microsoft.VCLibs.140.00 | x | x | x | Yes | +| | Microsoft.VCLibs.120.00.Universal | x | | | Yes | +| | Microsoft.VCLibs.140.00.UWPDesktop | | x | | Yes | + --- diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index cf14d39f29..c2200ff029 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -20,7 +20,7 @@ "files": [ "**/*.png", "**/*.jpg", - "**/*.gif" + "**/*.gif" ], "exclude": [ "**/obj/**", @@ -31,24 +31,24 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", - "ms.technology": "windows", - "ms.topic": "article", - "ms.author": "elizapo", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "MSDN.win-app-management", - "folder_relative_path_in_docset": "./" - } - } - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", + "ms.technology": "windows", + "ms.topic": "article", + "ms.author": "elizapo", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "MSDN.win-app-management", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [], "dest": "win-app-management", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/windows/application-management/manage-windows-mixed-reality.md b/windows/application-management/manage-windows-mixed-reality.md index 927a41a102..5c0ec34d50 100644 --- a/windows/application-management/manage-windows-mixed-reality.md +++ b/windows/application-management/manage-windows-mixed-reality.md @@ -17,7 +17,7 @@ ms.topic: article **Applies to** -- Windows 10 +- Windows 10 [Windows Mixed Reality](https://blogs.windows.com/windowsexperience/2017/10/03/the-era-of-windows-mixed-reality-begins-october-17/) was introduced in Windows 10, version 1709 (also known as the Fall Creators Update), as a [Windows 10 Feature on Demand (FOD)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). Features on Demand are Windows feature packages that can be added at any time. When a Windows 10 PC needs a new feature, it can request the feature package from Windows Update. @@ -30,24 +30,24 @@ Organizations that use Windows Server Update Services (WSUS) must take action to 1. [Check your version of Windows 10.](https://support.microsoft.com/help/13443/windows-which-operating-system) - >[!NOTE] - >You must be on at least Windows 10, version 1709, to run Windows Mixed Reality. + >[!NOTE] + >You must be on at least Windows 10, version 1709, to run Windows Mixed Reality. 2. Windows Mixed Reality Feature on Demand (FOD) is downloaded from Windows Update. If access to Windows Update is blocked, you must manually install the Windows Mixed Reality FOD. - a. Download the FOD .cab file for [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab). + a. Download the FOD .cab file for [Windows 10, version 1903](https://software-download.microsoft.com/download/pr/Microsoft-Windows-Holographic-Desktop-FOD-Package-31bf3856ad364e35-amd64.cab), [Windows 10, version 1809](https://software-download.microsoft.com/download/pr/microsoft-windows-holographic-desktop-fod-package31bf3856ad364e35amd64_1.cab), [Windows 10, version 1803](https://download.microsoft.com/download/9/9/3/9934B163-FA01-4108-A38A-851B4ACD1244/Microsoft-Windows-Holographic-Desktop-FOD-Package~31bf3856ad364e35~amd64~~.cab), or [Windows 10, version 1709](http://download.microsoft.com/download/6/F/8/6F816172-AC7D-4F45-B967-D573FB450CB7/Microsoft-Windows-Holographic-Desktop-FOD-Package.cab). - >[!NOTE] - >You must download the FOD .cab file that matches your operating system version. + >[!NOTE] + >You must download the FOD .cab file that matches your operating system version. - b. Use `Add-Package` to add Windows Mixed Reality FOD to the image. + b. Use `Add-Package` to add Windows Mixed Reality FOD to the image. ``` Add-Package Dism /Online /add-package /packagepath:(path) ``` - c. In **Settings** > **Update & Security** > **Windows Update**, select **Check for updates**. + c. In **Settings** > **Update & Security** > **Windows Update**, select **Check for updates**. IT admins can also create [Side by side feature store (shared folder)](https://technet.microsoft.com/library/jj127275.aspx) to allow access to the Windows Mixed Reality FOD. @@ -74,29 +74,28 @@ In the following example, the **Id** can be any generated GUID and the **Name** text/plain - <RuleCollection Type="Appx" EnforcementMode="Enabled"> - <FilePublisherRule Id="a9e18c21-ff8f-43cf-b9fc-db40eed693ba" Name="(Default Rule) All signed packaged apps" Description="Allows members of the Everyone group to run packaged apps that are signed." UserOrGroupSid="S-1-1-0" Action="Allow"> - <Conditions> - <FilePublisherCondition PublisherName="*" ProductName="*" BinaryName="*"> - <BinaryVersionRange LowSection="0.0.0.0" HighSection="*" /> - </FilePublisherCondition> - </Conditions> - </FilePublisherRule> - <FilePublisherRule Id="d26da4e7-0b01-484d-a8d3-d5b5341b2d55" Name="Block Mixed Reality Portal" Description="" UserOrGroupSid="S-1-1-0" Action="Deny"> - <Conditions> - <FilePublisherCondition PublisherName="CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Windows.HolographicFirstRun" BinaryName="*"> - <BinaryVersionRange LowSection="*" HighSection="*" /> - </FilePublisherCondition> - </Conditions> - </FilePublisherRule> - </RuleCollection>> + + + + + + + + + + + + + + + + > - ``` diff --git a/windows/application-management/remove-provisioned-apps-during-update.md b/windows/application-management/remove-provisioned-apps-during-update.md index a3f7008ec9..371e401c1a 100644 --- a/windows/application-management/remove-provisioned-apps-during-update.md +++ b/windows/application-management/remove-provisioned-apps-during-update.md @@ -41,12 +41,12 @@ Use the following steps to create a registry key: 1. Identify any provisioned apps you want removed. Record the package name for each app. 2. Create a .reg file to generate a registry key for each app. Use [this list of Windows 10, version 1709 registry keys](#registry-keys-for-provisioned-apps) as your starting point. - 1. Paste the list of registry keys into Notepad (or a text editor). - 2. Remove the registry keys belonging to the apps you want to keep. For example, if you want to keep the Bing Weather app, delete this registry key: - ```yaml - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\A ppxAllUserStore\Deprovisioned\Microsoft.BingWeather_8wekyb3d8bbwe] - ``` - 3. Save the file with a .txt extension, then right-click the file and change the extension to .reg. + 1. Paste the list of registry keys into Notepad (or a text editor). + 2. Remove the registry keys belonging to the apps you want to keep. For example, if you want to keep the Bing Weather app, delete this registry key: + ```yaml + HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\A ppxAllUserStore\Deprovisioned\Microsoft.BingWeather_8wekyb3d8bbwe] + ``` + 3. Save the file with a .txt extension, then right-click the file and change the extension to .reg. 3. Double-click the .reg file to create the registry keys. You can see the new keys in HKLM\\path-to-reg-keys. You're now ready to update your computer. After the update, check the list of apps in the computer to confirm the removed apps are still gone. diff --git a/windows/client-management/administrative-tools-in-windows-10.md b/windows/client-management/administrative-tools-in-windows-10.md index 1e6517c181..48150a2940 100644 --- a/windows/client-management/administrative-tools-in-windows-10.md +++ b/windows/client-management/administrative-tools-in-windows-10.md @@ -31,7 +31,7 @@ The tools in the folder might vary depending on which edition of Windows you are These tools were included in previous versions of Windows and the associated documentation for each tool should help you use these tools in Windows 10. The following list links to documentation for each tool. -  + - [Component Services]( https://go.microsoft.com/fwlink/p/?LinkId=708489) - [Computer Management](https://support.microsoft.com/kb/308423) @@ -58,7 +58,7 @@ These tools were included in previous versions of Windows and the associated doc [Diagnostic Data Viewer](https://docs.microsoft.com/windows/privacy/diagnostic-data-viewer-overview) -  + diff --git a/windows/client-management/advanced-troubleshooting-boot-problems.md b/windows/client-management/advanced-troubleshooting-boot-problems.md index 7e806f846f..e83a4bf8bd 100644 --- a/windows/client-management/advanced-troubleshooting-boot-problems.md +++ b/windows/client-management/advanced-troubleshooting-boot-problems.md @@ -21,13 +21,13 @@ ms.topic: troubleshooting There are several reasons why a Windows-based computer may have problems during startup. To troubleshoot boot problems, first determine in which of the following phases the computer gets stuck: -| **Phase** | **Boot Process** | **BIOS** | **UEFI** | -|--------|----------------------|------------------------------| | -| 1 | PreBoot | MBR/PBR (Bootstrap Code) | UEFI Firmware | -| 2 | Windows Boot Manager | %SystemDrive%\bootmgr | \EFI\Microsoft\Boot\bootmgfw.efi | -| 3 | Windows OS Loader | %SystemRoot%\system32\winload.exe | %SystemRoot%\system32\winload.efi | -| 4 | Windows NT OS Kernel | %SystemRoot%\system32\ntoskrnl.exe | | +| **Phase** | **Boot Process** | **BIOS** | **UEFI** | +|-----------|----------------------|------------------------------------|-----------------------------------| +| 1 | PreBoot | MBR/PBR (Bootstrap Code) | UEFI Firmware | +| 2 | Windows Boot Manager | %SystemDrive%\bootmgr | \EFI\Microsoft\Boot\bootmgfw.efi | +| 3 | Windows OS Loader | %SystemRoot%\system32\winload.exe | %SystemRoot%\system32\winload.efi | +| 4 | Windows NT OS Kernel | %SystemRoot%\system32\ntoskrnl.exe | | **1. PreBoot** @@ -177,7 +177,7 @@ After you run the command, you receive the following output: Scanning all disks for Windows installations. Please wait, since this may take a while...Successfully scanned Windows installations. Total identified Windows installations: 1{D}:\Windows Add installation to boot list? Yes/No/All: Y -5. Try again to start the system. +5. Try again to start the system. ### Method 4: Replace Bootmgr diff --git a/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md b/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md index 2eb1a09534..02586be4b6 100644 --- a/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md +++ b/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md @@ -38,6 +38,7 @@ The intention of this troubleshooter is to show how to find a starting point in ### Known Issues and fixes ** ** + | **OS version** | **Fixed in** | | --- | --- | | **Windows 10, version 1803** | [KB4284848](https://support.microsoft.com/help/4284848) | @@ -54,7 +55,7 @@ Make sure that you install the latest Windows updates, cumulative updates, and r - [Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/4009470) - [Windows Server 2012](https://support.microsoft.com/help/4009471) - [Windows 7 SP1 and Windows Server 2008 R2 SP1](https://support.microsoft.com/help/40009469) - + ## Data Collection 1. Network Capture with ETW. Enter the following at an elevated command prompt: diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index b6095ae643..e1365a820c 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -37,17 +37,17 @@ From its release, Windows 10 has supported remote connections to PCs that are jo 1. Open system properties for the remote PC. 2. Enable **Allow remote connections to this computer** and select **Allow connections only from computers running Remote Desktop with Network Level Authentication**. - ![Allow remote connections to this computer](images/allow-rdp.png) + ![Allow remote connections to this computer](images/allow-rdp.png) 3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users to connect to the PC, you must allow remote connections for the local **Authenticated Users** group. Click **Select Users**. - >[!NOTE] - >You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once and then running the following PowerShell cmdlet: - > - >`net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"`, where *FirstnameLastname* is the name of the user profile in C:\Users\, which is created based on DisplayName attribute in Azure AD. - > - >In Windows 10, version 1709, the user does not have to sign in to the remote device first. - > - >In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices. + >[!NOTE] + >You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once and then running the following PowerShell cmdlet: + > + >`net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"`, where *FirstnameLastname* is the name of the user profile in C:\Users\, which is created based on DisplayName attribute in Azure AD. + > + >In Windows 10, version 1709, the user does not have to sign in to the remote device first. + > + >In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices. 4. Enter **Authenticated Users**, then click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC. @@ -90,9 +90,9 @@ In organizations using only Azure AD, you can connect from an Azure AD-joined PC -  + -  + diff --git a/windows/client-management/data-collection-for-802-authentication.md b/windows/client-management/data-collection-for-802-authentication.md index 7168cd15ba..e866b0d7c4 100644 --- a/windows/client-management/data-collection-for-802-authentication.md +++ b/windows/client-management/data-collection-for-802-authentication.md @@ -74,7 +74,7 @@ Use the following steps to collect wireless and wired logs on Windows and Window ``` wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true wevtutil sl Microsoft-Windows-CAPI2/Operational /ms:104857600 - ``` + ``` 7. Run the following command from the command prompt on the client machine and start PSR to capture screen images: > [!NOTE] @@ -92,13 +92,13 @@ Use the following steps to collect wireless and wired logs on Windows and Window 10. Run the following commands from the command prompt on the NPS server. - - To stop RAS trace log and wireless scenario log: + - To stop RAS trace log and wireless scenario log: ``` netsh trace stop netsh ras set tracing * disabled ``` - - To disable and copy CAPI2 log: + - To disable and copy CAPI2 log: ``` wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:false @@ -106,13 +106,13 @@ Use the following steps to collect wireless and wired logs on Windows and Window ``` 11. Run the following commands on the client PC. - - To stop RAS trace log and wireless scenario log: + - To stop RAS trace log and wireless scenario log: ``` netsh trace stop netsh ras set tracing * disabled ``` - - To disable and copy the CAPI2 log: + - To disable and copy the CAPI2 log: ``` wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:false wevtutil.exe epl Microsoft-Windows-CAPI2/Operational C:\MSLOG\%COMPUTERNAME%_CAPI2.evtx @@ -120,14 +120,14 @@ Use the following steps to collect wireless and wired logs on Windows and Window 12. Save the following logs on the client and the NPS: - **Client** + **Client** - C:\MSLOG\%computername%_psr.zip - C:\MSLOG\%COMPUTERNAME%_CAPI2.evtx - C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl - C:\MSLOG\%COMPUTERNAME%_wireless_cli.cab - All log files and folders in %Systemroot%\Tracing - **NPS** + **NPS** - C:\MSLOG\%COMPUTERNAME%_CAPI2.evtx - C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl (%COMPUTERNAME%_wired_nps.etl for wired scenario) - C:\MSLOG\%COMPUTERNAME%_wireless_nps.cab (%COMPUTERNAME%_wired_nps.cab for wired scenario) diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index 54140237f9..e896532c51 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -20,7 +20,7 @@ "files": [ "**/*.png", "**/*.jpg", - "**/*.gif" + "**/*.gif" ], "exclude": [ "**/obj/**", @@ -31,23 +31,23 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", - "ms.technology": "windows", - "ms.topic": "article", - "feedback_system": "GitHub", - "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", - "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "MSDN.win-client-management", - "folder_relative_path_in_docset": "./" - } - } - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json", + "ms.technology": "windows", + "ms.topic": "article", + "feedback_system": "GitHub", + "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", + "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", + "_op_documentIdPathDepotMapping": { + "./": { + "depot_name": "MSDN.win-client-management", + "folder_relative_path_in_docset": "./" + } + } + }, "fileMetadata": {}, "template": [], "dest": "win-client-management", - "markdownEngineName": "dfm" + "markdownEngineName": "markdig" } } diff --git a/windows/client-management/mandatory-user-profile.md b/windows/client-management/mandatory-user-profile.md index b5519bc436..5e56cfbd09 100644 --- a/windows/client-management/mandatory-user-profile.md +++ b/windows/client-management/mandatory-user-profile.md @@ -18,7 +18,7 @@ ms.topic: article **Applies to** -- Windows 10 +- Windows 10 @@ -56,66 +56,68 @@ First, you create a default user profile with the customizations that you want, > [!NOTE] > Use a lab or extra computer running a clean installation of Windows 10 to create a default user profile. Do not use a computer that is required for business (that is, a production computer). This process removes all domain accounts from the computer, including user profile folders. - + 2. Configure the computer settings that you want to include in the user profile. For example, you can configure settings for the desktop background, uninstall default apps, install line-of-business apps, and so on. >[!NOTE] >Unlike previous versions of Windows, you cannot apply a Start and taskbar layout using a mandatory profile. For alternative methods for customizing the Start menu and taskbar, see [Related topics](#related-topics). 3. [Create an answer file (Unattend.xml)](https://msdn.microsoft.com/library/windows/hardware/dn915085.aspx) that sets the [CopyProfile](https://msdn.microsoft.com/library/windows/hardware/dn922656.aspx) parameter to **True**. The CopyProfile parameter causes Sysprep to copy the currently signed-on user’s profile folder to the default user profile. You can use [Windows System Image Manager](https://msdn.microsoft.com/library/windows/hardware/dn922445.aspx), which is part of the Windows Assessment and Deployment Kit (ADK) to create the Unattend.xml file. - + 3. Uninstall any application you do not need or want from the PC. For examples on how to uninstall Windows 10 Application see [Remove-AppxProvisionedPackage](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage?view=winserver2012-ps). For a list of uninstallable applications, see [Understand the different apps included in Windows 10](https://docs.microsoft.com/windows/application-management/apps-in-windows-10). - - >[!NOTE] - >It is highly recommended to uninstall unwanted or unneeded apps as it will speed up user sign-in times. + +~~~ + >[!NOTE] + >It is highly recommended to uninstall unwanted or unneeded apps as it will speed up user sign-in times. +~~~ 3. At a command prompt, type the following command and press **ENTER**. `sysprep /oobe /reboot /generalize /unattend:unattend.xml` (Sysprep.exe is located at: C:\Windows\System32\sysprep. By default, Sysprep looks for unattend.xml in this same folder.) - - >[!TIP] - >If you receive an error message that says "Sysprep was not able to validate your Windows installation", open %WINDIR%\System32\Sysprep\Panther\setupact.log and look for an entry like the following: - - >![Microsoft Bing Translator package](images/sysprep-error.png) - - >Use the [Remove-AppxProvisionedPackage](https://technet.microsoft.com/library/dn376476%28v=wps.620%29.aspx) and [Remove-AppxPackage -AllUsers](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage?view=win10-ps) cmdlet in Windows PowerShell to uninstall the app that is listed in the log. - -5. The sysprep process reboots the PC and starts at the first-run experience screen. Complete the set up, and then sign in to the computer using an account that has local administrator privileges. -6. Right-click Start, go to **Control Panel** (view by large or small icons) > **System** > **Advanced system settings**, and click **Settings** in the **User Profiles** section. - -7. In **User Profiles**, click **Default Profile**, and then click **Copy To**. + > [!TIP] + > If you receive an error message that says "Sysprep was not able to validate your Windows installation", open %WINDIR%\System32\Sysprep\Panther\setupact.log and look for an entry like the following: + > + > ![Microsoft Bing Translator package](images/sysprep-error.png) + > + > Use the [Remove-AppxProvisionedPackage](https://technet.microsoft.com/library/dn376476%28v=wps.620%29.aspx) and [Remove-AppxPackage -AllUsers](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage?view=win10-ps) cmdlet in Windows PowerShell to uninstall the app that is listed in the log. + +4. The sysprep process reboots the PC and starts at the first-run experience screen. Complete the set up, and then sign in to the computer using an account that has local administrator privileges. + +5. Right-click Start, go to **Control Panel** (view by large or small icons) > **System** > **Advanced system settings**, and click **Settings** in the **User Profiles** section. + +6. In **User Profiles**, click **Default Profile**, and then click **Copy To**. ![Example of UI](images/copy-to.png) -8. In **Copy To**, under **Permitted to use**, click **Change**. +7. In **Copy To**, under **Permitted to use**, click **Change**. ![Example of UI](images/copy-to-change.png) - -9. In **Select User or Group**, in the **Enter the object name to select** field, type `everyone`, click **Check Names**, and then click **OK**. -10. In **Copy To**, in the **Copy profile to** field, enter the path and folder name where you want to store the mandatory profile. The folder name must use the correct [extension](#extension) for the operating system version. For example, the folder name must end with “.v6” to identify it as a user profile folder for Windows 10, version 1607. +8. In **Select User or Group**, in the **Enter the object name to select** field, type `everyone`, click **Check Names**, and then click **OK**. + +9. In **Copy To**, in the **Copy profile to** field, enter the path and folder name where you want to store the mandatory profile. The folder name must use the correct [extension](#extension) for the operating system version. For example, the folder name must end with “.v6” to identify it as a user profile folder for Windows 10, version 1607. - If the device is joined to the domain and you are signed in with an account that has permissions to write to a shared folder on the network, you can enter the shared folder path. - If the device is not joined to the domain, you can save the profile locally and then copy it to the shared folder location. - + ![Example of UI](images/copy-to-path.png) -9. Click **OK** to copy the default user profile. +10. Click **OK** to copy the default user profile. **To make the user profile mandatory** - + 3. In File Explorer, open the folder where you stored the copy of the profile. >[!NOTE] >If the folder is not displayed, click **View** > **Options** > **Change folder and search options**. On the **View** tab, select **Show hidden files and folders**, clear **Hide protected operating system files**, click **Yes** to confirm that you want to show operating system files, and then click **OK** to save your changes. -1. Rename `Ntuser.dat` to `Ntuser.man`. +4. Rename `Ntuser.dat` to `Ntuser.man`. ## How to apply a mandatory user profile to users diff --git a/windows/client-management/mdm/accounts-csp.md b/windows/client-management/mdm/accounts-csp.md index 008cd950bc..810e5c83fa 100644 --- a/windows/client-management/mdm/accounts-csp.md +++ b/windows/client-management/mdm/accounts-csp.md @@ -31,6 +31,7 @@ Interior node for the account domain information. This node specifies the DNS hostname for a device. This setting can be managed remotely, but note that this not supported for devices hybrid joined to Azure Active Directory and an on-premises Active directory. The server must explicitly reboot the device for this value to take effect. A couple of macros can be embedded within the value for dynamic substitution. Using any of these macros will limit the new name to 15 characters. Available naming macros: + |Macro|Description|Example|Generated Name| |:---|:---|:---|:---| |%RAND:<# of digits>|Generates the specified number of random digits.|Test%RAND:6%|Test123456| diff --git a/windows/client-management/mdm/activesync-csp.md b/windows/client-management/mdm/activesync-csp.md index 5a7cd8bce5..f8b87748fa 100644 --- a/windows/client-management/mdm/activesync-csp.md +++ b/windows/client-management/mdm/activesync-csp.md @@ -26,7 +26,7 @@ On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is s The ./Vendor/MSFT/ActiveSync path is deprecated, but will continue to work in the short term. -  + The following diagram shows the ActiveSync configuration service provider management objects in tree format as used by Open Mobile Alliance Device Management (OMA DM), OMA Client Provisioning, and Enterprise DM. @@ -42,7 +42,7 @@ On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is s The ./Vendor/MSFT/ActiveSync path is deprecated, but will continue to work in the short term. -  + The supported operation is Get. @@ -205,7 +205,7 @@ Valid values are one of the following: - 5 – Email up to a month old is synced to the device. -**Options/ContentTypes/****_Content Type GUID_** +**Options/ContentTypes/***Content Type GUID* Defines the type of content to be individually enabled/disabled for sync. The *GUID* values allowed are one of the following: @@ -233,7 +233,7 @@ Required. A character string that specifies the name of the content type. > **Note**  In Windows 10, this node is currently not working. -  + Supported operations are Get, Replace, and Add (cannot Add after the account is created). @@ -257,9 +257,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md b/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md index a04f018252..174966d463 100644 --- a/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md +++ b/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md @@ -19,43 +19,43 @@ Here's a step-by-step guide to adding an Azure Active Directory tenant, adding a > **Note**  If you have paid subscriptions to Office 365, Microsoft Dynamics CRM Online, Enterprise Mobility Suite, or other Microsoft services, you have a free subscription to Azure AD. For step-by-step guide to register this free subscription, see [Register your free Azure Active Directory subscription.](#register-your-free-azure-active-directory-subscription) -1. Sign-up for Azure AD tenant from [this website](https://account.windowsazure.com/organization) by creating an administrator account for your organization. +1. Sign-up for Azure AD tenant from [this website](https://account.windowsazure.com/organization) by creating an administrator account for your organization. - ![sign up for azure ad tenant](images/azure-ad-add-tenant1.png) + ![sign up for azure ad tenant](images/azure-ad-add-tenant1.png) -2. Enter the information for your organization. Click **check availability** to verify that domain name that you selected is available. +2. Enter the information for your organization. Click **check availability** to verify that domain name that you selected is available. - ![sign up for azure ad](images/azure-ad-add-tenant2.png) + ![sign up for azure ad](images/azure-ad-add-tenant2.png) -3. Complete the login and country information. You must provide a valid phone number, then click **Send text message** or **Call me**. +3. Complete the login and country information. You must provide a valid phone number, then click **Send text message** or **Call me**. - ![create azure account](images/azure-ad-add-tenant3.png) + ![create azure account](images/azure-ad-add-tenant3.png) -4. Enter the code that you receive and then click **Verify code**. After the code is verified and the continue button turns green, click **continue**. +4. Enter the code that you receive and then click **Verify code**. After the code is verified and the continue button turns green, click **continue**. - ![add aad tenant](images/azure-ad-add-tenant3-b.png) + ![add aad tenant](images/azure-ad-add-tenant3-b.png) -5. After you finish creating your Azure account, you are ready to add an Azure AD subscription. +5. After you finish creating your Azure account, you are ready to add an Azure AD subscription. - If you don't have a paid subscription to any Microsoft service, you can purchase an Azure AD premium subscription. Go to Office 356 portal, and then sign in using the admin account that you just created in Step 4 (for example, user1@contosoltd.onmicrosoftcom). + If you don't have a paid subscription to any Microsoft service, you can purchase an Azure AD premium subscription. Go to Office 356 portal, and then sign in using the admin account that you just created in Step 4 (for example, user1@contosoltd.onmicrosoftcom). - ![login to office 365](images/azure-ad-add-tenant4.png) + ![login to office 365](images/azure-ad-add-tenant4.png) -6. Click **Install software**. +6. Click **Install software**. - ![login to office 365](images/azure-ad-add-tenant5.png) + ![login to office 365](images/azure-ad-add-tenant5.png) -7. In the Office 365 portal, select **Purchase Services** from the left nagivation. +7. In the Office 365 portal, select **Purchase Services** from the left nagivation. - ![purchase service option in admin center menu](images/azure-ad-add-tenant6.png) + ![purchase service option in admin center menu](images/azure-ad-add-tenant6.png) -8. On the **Purchase services** page, scroll down until you see **Azure Active Directory Premium**, then click to purchase. +8. On the **Purchase services** page, scroll down until you see **Azure Active Directory Premium**, then click to purchase. - ![azure active directory option in purchase services page](images/azure-ad-add-tenant7.png) + ![azure active directory option in purchase services page](images/azure-ad-add-tenant7.png) -9. Continue with your purchase. +9. Continue with your purchase. - ![azure active directory premium payment page](images/azure-ad-add-tenant8.png) + ![azure active directory premium payment page](images/azure-ad-add-tenant8.png) 10. After the purchase is completed, you can login to your Office 365 Admin Portal and you will see the **Azure AD** option from the Admin drop-down menu along with other services (SharePoint, Exchange, etc...). @@ -91,7 +91,7 @@ If you have paid subscriptions to Office 365, Microsoft Dynamics CRM Online, Ent ![register azuread](images/azure-ad-add-tenant15.png) -  + diff --git a/windows/client-management/mdm/alljoynmanagement-csp.md b/windows/client-management/mdm/alljoynmanagement-csp.md index 0c270b6acf..c2b7e64c26 100644 --- a/windows/client-management/mdm/alljoynmanagement-csp.md +++ b/windows/client-management/mdm/alljoynmanagement-csp.md @@ -22,7 +22,7 @@ The AllJoynManagement configuration service provider (CSP) is only supported in This CSP was added in Windows 10, version 1511. -  + For the firewall settings, note that PublicProfile and PrivateProfile are mutually exclusive. The Private Profile must be set on the directly on the device itself, and the only supported operation is Get. For PublicProfile, both Add and Get are supported. This CSP is intended to be used in conjunction with the AllJoyn Device System Bridge, and an understanding of the bridge will help when determining when and how to use this CSP. For more information, see [Device System Bridge (DSB) Project](https://go.microsoft.com/fwlink/p/?LinkId=615876) and [AllJoyn Device System Bridge](https://go.microsoft.com/fwlink/p/?LinkId=615877). @@ -38,19 +38,19 @@ The root node for the AllJoynManagement configuration service provider. **Services** List of all AllJoyn objects that are discovered on the AllJoyn bus. All AllJoyn objects that expose the "com.microsoft.alljoynmanagement.config" are included. -**Services/****_Node name_** +**Services/***Node name* The unique AllJoyn device ID (a GUID) that hosts one or more configurable objects. **Services/*Node name*/Port** The set of ports that the AllJoyn object uses to communicate configuration settings. Typically only one port is used for communication, but it is possible to specify additional ports. -**Services/*Node name*/Port/****_Node name_** +**Services/*Node name*/Port/***Node name* Port number used for communication. This is specified by the configurable AllJoyn object and reflected here. **Services/*Node name*/Port/*Node name*/CfgObject** The set of configurable interfaces that are available on the port of the AllJoyn object. -**Services/*Node name*/Port/*Node name*/CfgObject/****_Node name_** +**Services/*Node name*/Port/*Node name*/CfgObject/***Node name* The remainder of this URI is an escaped path to the configurable AllJoyn object hosted by the parent ServiceID and accessible by the parent PortNum. For example an AllJoyn Bridge with the Microsoft specific AllJoyn configuration interface "\\FabrikamService\\BridgeConfig" would be specified in the URI as: %2FFabrikamService%2FBridgeConfig. @@ -60,7 +60,7 @@ This is the credential store. An administrator can set credentials for each AllJ When a SyncML request arrives in the CSP to replace or query a configuration item on an AllJoyn object that requires authentication, then the CSP uses the credentials stored here during the authentication phase. -**Credentials/****_Node name_** +**Credentials/***Node name* This is the same service ID specified in \\AllJoynManagement\\Services\\ServiceID URI. It is typically implemented as a GUID. **Credentials/*Node name*/Key** @@ -139,9 +139,9 @@ Get the firewall PrivateProfile ``` -  + -  + diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index 92817f962b..3422279612 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -17,10 +17,10 @@ ms.date: 04/30/2018 The AppLocker configuration service provider is used to specify which applications are allowed or disallowed. There is no user interface shown for apps that are blocked. -> **Note**   +> **Note** > When you create a list of allowed apps, all [inbox apps](#inboxappsandcomponents) are also blocked, and you must include them in your list of allowed apps. Don't forget to add the inbox apps for Phone, Messaging, Settings, Start, Email and accounts, Work and school, and other apps that you need. > -> In Windows 10 Mobile, when you create a list of allowed apps, the [settings app that rely on splash apps](#settingssplashapps) are blocked. To unblock these apps, you must include them in your list of allowed apps. +> In Windows 10 Mobile, when you create a list of allowed apps, the [settings app that rely on splash apps](#settingssplashapps) are blocked. To unblock these apps, you must include them in your list of allowed apps. > > Delete/unenrollment is not properly supported unless Grouping values are unique across enrollments. If multiple enrollments use the same Grouping value, then unenrollment will not work as expected since there are duplicate URIs that get deleted by the resource manager. To prevent this problem, the Grouping value should include some randomness. The best practice is to use a randomly generated GUID. However, there is no requirement on the exact value of the node. @@ -35,10 +35,10 @@ Defines the root node for the AppLocker configuration service provider. **ApplicationLaunchRestrictions** Defines restrictions for applications. -> [!NOTE]   +> [!NOTE] > When you create a list of allowed apps, all [inbox apps](#inboxappsandcomponents) are also blocked, and you must include them in your list of allowed apps. Don't forget to add the inbox apps for Phone, Messaging, Settings, Start, Email and accounts, Work and school, and other apps that you need. > -> In Windows 10 Mobile, when you create a list of allowed apps, the [settings app that rely on splash apps](#settingssplashapps) are blocked. To unblock these apps, you must include them in your list of allowed apps. +> In Windows 10 Mobile, when you create a list of allowed apps, the [settings app that rely on splash apps](#settingssplashapps) are blocked. To unblock these apps, you must include them in your list of allowed apps. Additional information: @@ -64,7 +64,7 @@ Exempt examples: Additional information: -- [Recommended deny list for Windows Information Protection](#recommended-deny-list-for-windows-information-protection) - example for Windows 10, version 1607 that denies known unenlightened Microsoft apps from accessing enterprise data as an allowed app. This ensures an administrator does not accidentally make these apps Windows Information Protection allowed, and avoid known compatibility issues related to automatic file encryption with these applications. +- [Recommended deny list for Windows Information Protection](#recommended-deny-list-for-windows-information-protection) - example for Windows 10, version 1607 that denies known unenlightened Microsoft apps from accessing enterprise data as an allowed app. This ensures an administrator does not accidentally make these apps Windows Information Protection allowed, and avoid known compatibility issues related to automatic file encryption with these applications. Each of the previously listed nodes contains a **Grouping** node. @@ -89,7 +89,7 @@ Each of the previously listed nodes contains a **Grouping** node. -  + In addition, each **Grouping** node contains one or more of the following nodes: @@ -137,7 +137,7 @@ In addition, each **Grouping** node contains one or more of the following nodes: -  + Each of the previous nodes contains one or more of the following leaf nodes: @@ -157,7 +157,7 @@ Each of the previous nodes contains one or more of the following leaf nodes:

    Policy

    Policy nodes define the policy for launching executables, Windows Installer files, scripts, store apps, and DLL files. The contents of a given Policy node is precisely the XML format for a RuleCollection node in the corresponding AppLocker XML policy.

    Policy nodes are a Base64-encoded blob of the binary policy representation. The binary policy may be signed or unsigned.

    -

    For CodeIntegrity/Policy, you can use the [certutil -encode](https://go.microsoft.com/fwlink/p/?LinkId=724364) command line tool to encode the data to base-64.

    +

    For CodeIntegrity/Policy, you can use the certutil -encode command line tool to encode the data to base-64.

    Here is a sample certutil invocation:

    ``` @@ -186,16 +186,16 @@ certutil -encode WinSiPolicy.p7b WinSiPolicy.cer -  + ## Find publisher and product name of apps -You can pair a Windows Phone (Windows 10 Mobile, version 1511) to your desktop using the Device Portal on the phone to get the various types of information, including publisher name and product name of apps installed on the phone. This procedure describes pairing your phone to your desktop using WiFi. +You can pair a Windows Phone (Windows 10 Mobile, version 1511) to your desktop using the Device Portal on the phone to get the various types of information, including publisher name and product name of apps installed on the phone. This procedure describes pairing your phone to your desktop using WiFi. If this procedure does not work for you, try the other methods for pairing described in [Device Portal for Mobile](https://msdn.microsoft.com/windows/uwp/debug-test-perf/device-portal-mobile). -**To find Publisher and PackageFullName for apps installed on Windows 10 Mobile** +**To find Publisher and PackageFullName for apps installed on Windows 10 Mobile** 1. On your Windows Phone, go to **Settings**. Choose **Update & security**. Then choose **For developers**. 2. Choose **Developer mode**. @@ -255,7 +255,7 @@ The following table show the mapping of information to the AppLocker publisher r -  + Here is an example AppLocker publisher rule: @@ -289,26 +289,28 @@ You can get the publisher name and product name of apps using a web API. -   - Here is the example for Microsoft OneNote: - Request +~~~ +Here is the example for Microsoft OneNote: - ``` syntax - https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata - ``` +Request - Result +``` syntax +https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata +``` - ``` syntax - { - "packageFamilyName": "Microsoft.Office.OneNote_8wekyb3d8bbwe", - "packageIdentityName": "Microsoft.Office.OneNote", - "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", - "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" - } - ``` +Result + +``` syntax +{ + "packageFamilyName": "Microsoft.Office.OneNote_8wekyb3d8bbwe", + "packageIdentityName": "Microsoft.Office.OneNote", + "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", + "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" +} +``` +~~~ @@ -339,12 +341,12 @@ You can get the publisher name and product name of apps using a web API.
    -  + ## Settings apps that rely on splash apps -When you create a list of allowed apps in Windows 10 Mobile, you must also include the subset of Settings apps that rely on splash apps in your list of allowed apps. These apps are blocked unless they are explicitly added to the list of allowed apps. The following table shows the subset of Settings apps that rely on splash apps . +When you create a list of allowed apps in Windows 10 Mobile, you must also include the subset of Settings apps that rely on splash apps in your list of allowed apps. These apps are blocked unless they are explicitly added to the list of allowed apps. The following table shows the subset of Settings apps that rely on splash apps . The product name is first part of the PackageFullName followed by the version number. @@ -366,16 +368,16 @@ The product name is first part of the PackageFullName followed by the version nu | SettingsPageAppsCorner | 5b04b775-356b-4aa0-aaf8-6491ffea580a\_1.0.0.0\_neutral\_\_4vefaa8deck74 | 5b04b775-356b-4aa0-aaf8-6491ffea580a | | SettingsPagePhoneNfc | b0894dfd-4671-4bb9-bc17-a8b39947ffb6\_1.0.0.0\_neutral\_\_1prqnbg33c1tj | b0894dfd-4671-4bb9-bc17-a8b39947ffb6 | -  + ## Inbox apps and components The following list shows the apps that may be included in the inbox. -> **Note**  This list identifies system apps that ship as part of Windows that you can add to your AppLocker policy to ensure proper functioning of the operating system. If you decide to block some of these apps, we recommend a thorough testing before deploying to your production environment. Failure to do so may result in unexpected failures and can significantly degrade the user experience. +> **Note** This list identifies system apps that ship as part of Windows that you can add to your AppLocker policy to ensure proper functioning of the operating system. If you decide to block some of these apps, we recommend a thorough testing before deploying to your production environment. Failure to do so may result in unexpected failures and can significantly degrade the user experience. + -  @@ -589,7 +591,7 @@ The following list shows the apps that may be included in the inbox. +

    PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"

    @@ -834,7 +836,7 @@ The following list shows the apps that may be included in the inbox.
    Microsoft Frameworks ProductID = 00000000-0000-0000-0000-000000000000 -

    PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"

    -  + ## Whitelist examples @@ -941,7 +943,7 @@ The following example disables the Mixed Reality Portal. In the example, the **I ``` -The following example for Windows 10 Mobile denies all apps and allows the following apps: +The following example for Windows 10 Mobile denies all apps and allows the following apps: - [settings app that rely on splash apps](#settingssplashapps) - most of the [inbox apps](#inboxappsandcomponents), but not all. @@ -1657,7 +1659,7 @@ The following example for Windows 10 Holographic for Business denies all apps an ``` ## Recommended deny list for Windows Information Protection -The following example for Windows 10, version 1607 denies known unenlightened Microsoft apps from accessing enterprise data as an allowed app. (An administrator might still use an exempt rule, instead.) This ensures an administrator does not accidentally make these apps Windows Information Protection allowed, and avoid known compatibility issues related to automatic file encryption with these applications. +The following example for Windows 10, version 1607 denies known unenlightened Microsoft apps from accessing enterprise data as an allowed app. (An administrator might still use an exempt rule, instead.) This ensures an administrator does not accidentally make these apps Windows Information Protection allowed, and avoid known compatibility issues related to automatic file encryption with these applications. In this example, Contoso is the node name. We recommend using a GUID for this node. @@ -1817,9 +1819,9 @@ In this example, Contoso is the node name. We recommend using a GUID for this no [Configuration service provider reference](configuration-service-provider-reference.md) -  - -  + + + diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 4d815371a0..644edc9197 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -60,7 +60,7 @@ Here's an example: > [!Tip] > In this example the double \\\ is required because it's in JSON and JSON escapes \ into \\\\. If an MDM server uses JSON parser\composer, they should ask customers to type only one \\, which will be \\\ in the JSON. If user types \\\\, it'll become \\\\\\\ in JSON, which will cause erroneous results. For the same reason, domain\account used in Configuration xml does not need \\\ but only one \\, because xml does not (need to) escape \\. -> +> > This applies to both domain\account, AzureAD\someone@contoso.onmicrosoft.com, i.e. as long as a \ used in JSON string.  When configuring the kiosk mode app, the account name will be used to find the target user. The account name includes domain name and user name. @@ -393,51 +393,51 @@ KioskModeApp Replace ``` syntax -    -      -        -          -          -          -          -          -          -          -        -      -      -        -                      -                      -                        -                          -                            -                              -                              -                              -                              -                              -                            -                            -                              -                              -                            -                          -                        -                      -                    -                ]]> -      -      -    -    -      MultiAppKioskUser -      -    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ]]> + + + + + + + MultiAppKioskUser + + + ``` diff --git a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md index a2bb7eec9f..6b89551570 100644 --- a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md +++ b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md @@ -43,7 +43,7 @@ Azure AD Join also enables company owned devices to be automatically enrolled in > **Important**  Every user enabled for automatic MDM enrollment with Azure AD Join must be assigned a valid [Azure Active Directory Premium](https://msdn.microsoft.com/library/azure/dn499825.aspx) license. -  + ### BYOD scenario Windows 10 also introduces a simpler way to configure personal devices to access work apps and resources. Users can add their Microsoft work account to Windows and enjoy simpler and safer access to the apps and resources of the organization. During this process, Azure AD detects if the organization has configured an MDM. If that’s the case, Windows attempts to enroll the device in MDM as part of the “add account” flow. It’s important to note that in the BYOD case, users can reject the MDM Terms of Use—in which case the device is not enrolled in MDM and access to corporate resources is typically restricted. @@ -66,7 +66,7 @@ Once a user has an Azure AD account added to Windows 10 and enrolled in MDM, th > **Note**  Users cannot remove the device enrollment through the **Work access** user interface because management is tied to the Azure AD or work account. -  + ### MDM endpoints involved in Azure AD integrated enrollment Azure AD MDM enrollment is a two-step process: @@ -109,7 +109,7 @@ The MDM vendor must first register the application in their home tenant and mark > **Note**  For the MDM provider, if you don't have an existing Azure AD tentant with an Azure AD subscription that you manage, follow the step-by-step guide in [Add an Azure AD tenant and Azure AD subscription](add-an-azure-ad-tenant-and-azure-ad-subscription.md) to set up a tenant, add a subscription, and manage it via the Azure Portal. -  + The keys used by the MDM application to request access tokens from Azure AD are managed within the tenant of the MDM vendor and not visible to individual customers. The same key is used by the multi-tenant MDM application to authenticate itself with Azure AD, regardless of the customer tenent to which the device being managed belongs. Use the following steps to register a cloud-based MDM application with Azure AD. At this time, you need to work with the Azure AD engineering team to expose this application through the Azure AD app gallery. @@ -204,7 +204,7 @@ You should work with the Azure AD engineering team if your MDM application is cl -  + ### Add on-premises MDM to the app gallery There are no special requirements for adding on-premises MDM to the app gallery.There is a generic entry for administrator to add an app to their tenant. @@ -265,7 +265,7 @@ An MDM page must adhere to a predefined theme depending on the scenario that is -  + ## Terms of Use protocol semantics The Terms of Use endpoint is hosted by the MDM server. During the Azure AD Join protocol flow, Windows performs a full-page redirect to this endpoint. This enables the MDM to display the terms and conditions that apply and allows the user to accept or reject the terms associated with enrollment. After the user accepts the terms, the MDM redirects back to Windows for the enrollment process to continue. @@ -307,7 +307,7 @@ The following parameters are passed in the query string: -  + ### Access token A bearer access token is issued by Azure AD is passed in the authorization header of the HTTP request. Here is a typical format: @@ -338,7 +338,7 @@ The following claims are expected in the access token passed by Windows to the T

    TID

    -

    A claim representing the tenant ID of the tenant. In the example above, it's Fabrikam.

    +

    A claim representing the tenant ID of the tenant. In the example above, it's Fabrikam.

    Resource

    @@ -346,10 +346,10 @@ The following claims are expected in the access token passed by Windows to the T -  -> **Note**  There is no device ID claim in the access token because the device may not yet be enrolled at this time. + +> Note There is no device ID claim in the access token because the device may not yet be enrolled at this time. -  + To retrieve the list of group memberships for the user, you can use the [Azure AD Graph API](https://go.microsoft.com/fwlink/p/?LinkID=613654). Here's an example URL. @@ -450,7 +450,7 @@ The following table shows the error codes. -  + ## Enrollment protocol with Azure AD With Azure integrated MDM enrollment, there is no discovery phase and the discovery URL is directly passed down to the system from Azure. The following table shows the comparison between the traditional and Azure enrollments. @@ -590,7 +590,7 @@ With Azure integrated MDM enrollment, there is no discovery phase and the discov -  + ## Management protocol with Azure AD @@ -918,9 +918,9 @@ When a user is enrolled into MDM through Azure Active Directory Join and then di -  + -  + diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index bfe7a92369..43e5c83627 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -38,22 +38,22 @@ The following diagram shows the BitLocker configuration service provider in tree - - - - - - - + + + + + + + - - - - - - - + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck markcheck markcross markcross markcross markcross markcross markcheck markcheck mark
    @@ -63,7 +63,7 @@ The following diagram shows the BitLocker configuration service provider in tree - 1 – Require Storage cards to be encrypted.

    Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on.

    - +

    If you want to disable this policy use the following SyncML:

    ``` syntax @@ -93,22 +93,22 @@ The following diagram shows the BitLocker configuration service provider in tree - - - - - - - + + + + + + + - - - - - - - + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck markcheck markcross markcheck markcheck markcheck markcheck markcheck markcheck mark
    @@ -138,33 +138,33 @@ The following diagram shows the BitLocker configuration service provider in tree

    Data type is integer. Supported operations are Add, Get, Replace, and Delete.

    **EncryptionMethodByDriveType** -

    Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)".

    +

    Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)".

    - - - - - - - + + + + + + + - - - - - - - + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

    ADMX Info:

      -
    • GP English name: *Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)*
    • -
    • GP name: *EncryptionMethodWithXts_Name*
    • -
    • GP path: *Windows Components/Bitlocker Drive Encryption*
    • -
    • GP ADMX file name: *VolumeEncryption.admx*
    • +
    • GP English name: Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)
    • +
    • GP name: EncryptionMethodWithXts_Name
    • +
    • GP path: Windows Components/Bitlocker Drive Encryption
    • +
    • GP ADMX file name: VolumeEncryption.admx
    > [!Tip] @@ -186,7 +186,7 @@ The following diagram shows the BitLocker configuration service provider in tree

    EncryptionMethodWithXtsFdvDropDown_Name = Select the encryption method for fixed data drives.

    EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for removable data drives.

    -

    The possible values for 'xx' are:

    +

    The possible values for 'xx' are:

    - 3 = AES-CBC 128 - 4 = AES-CBC 256 @@ -216,33 +216,33 @@ The following diagram shows the BitLocker configuration service provider in tree

    Data type is string. Supported operations are Add, Get, Replace, and Delete.

    **SystemDrivesRequireStartupAuthentication** -

    This setting is a direct mapping to the Bitlocker Group Policy "Require additional authentication at startup".

    +

    This setting is a direct mapping to the Bitlocker Group Policy "Require additional authentication at startup".

    - - - - - - - + + + + + + + - - - - - - - + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

    ADMX Info:

      -
    • GP English name: *Require additional authentication at startup*
    • -
    • GP name: *ConfigureAdvancedStartup_Name*
    • -
    • GP path: *Windows Components/Bitlocker Drive Encryption/Operating System Drives*
    • -
    • GP ADMX file name: *VolumeEncryption.admx*
    • +
    • GP English name: Require additional authentication at startup
    • +
    • GP name: ConfigureAdvancedStartup_Name
    • +
    • GP path: Windows Components/Bitlocker Drive Encryption/Operating System Drives
    • +
    • GP ADMX file name: VolumeEncryption.admx
    > [!Tip] @@ -253,7 +253,7 @@ The following diagram shows the BitLocker configuration service provider in tree > [!Note] > Only one of the additional authentication options can be required at startup, otherwise an error occurs. -

    If you want to use BitLocker on a computer without a TPM, set the "ConfigureNonTPMStartupKeyUsage_Name" data. In this mode either a password or a USB drive is required for start-up. When using a startup key, the key information used to encrypt the drive is stored on the USB drive, creating a USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password then you will need to use one of the BitLocker recovery options to access the drive.

    +

    If you want to use BitLocker on a computer without a TPM, set the "ConfigureNonTPMStartupKeyUsage_Name" data. In this mode either a password or a USB drive is required for start-up. When using a startup key, the key information used to encrypt the drive is stored on the USB drive, creating a USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password then you will need to use one of the BitLocker recovery options to access the drive.

    On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require insertion of a USB flash drive containing a startup key, the entry of a 6-digit to 20-digit personal identification number (PIN), or both.

    @@ -281,13 +281,13 @@ The following diagram shows the BitLocker configuration service provider in tree
  • ConfigureTPMUsageDropDown_Name = (for computer with TPM) Configure TPM startup.
  • -

    The possible values for 'xx' are:

    +

    The possible values for 'xx' are:

    • true = Explicitly allow
    • false = Policy not set
    -

    The possible values for 'yy' are:

    +

    The possible values for 'yy' are:

    • 2 = Optional
    • 1 = Required
    • @@ -313,33 +313,33 @@ The following diagram shows the BitLocker configuration service provider in tree

      Data type is string. Supported operations are Add, Get, Replace, and Delete.

      **SystemDrivesMinimumPINLength** -

      This setting is a direct mapping to the Bitlocker Group Policy "Configure minimum PIN length for startup".

      +

      This setting is a direct mapping to the Bitlocker Group Policy "Configure minimum PIN length for startup".

      - - - - - - - + + + + + + + - - - - - - - + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

      ADMX Info:

        -
      • GP English name:*Configure minimum PIN length for startup*
      • -
      • GP name: *MinimumPINLength_Name*
      • -
      • GP path: *Windows Components/Bitlocker Drive Encryption/Operating System Drives*
      • -
      • GP ADMX file name: *VolumeEncryption.admx*
      • +
      • GP English name:Configure minimum PIN length for startup
      • +
      • GP name: MinimumPINLength_Name
      • +
      • GP path: Windows Components/Bitlocker Drive Encryption/Operating System Drives
      • +
      • GP ADMX file name: VolumeEncryption.admx
      > [!Tip] @@ -382,33 +382,33 @@ The following diagram shows the BitLocker configuration service provider in tree

      Data type is string. Supported operations are Add, Get, Replace, and Delete.

      **SystemDrivesRecoveryMessage** -

      This setting is a direct mapping to the Bitlocker Group Policy "Configure pre-boot recovery message and URL" (PrebootRecoveryInfo_Name).

      +

      This setting is a direct mapping to the Bitlocker Group Policy "Configure pre-boot recovery message and URL" (PrebootRecoveryInfo_Name).

      - - - - - - - + + + + + + + - - - - - - - + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

      ADMX Info:

        -
      • GP English name: *Configure pre-boot recovery message and URL*
      • -
      • GP name: *PrebootRecoveryInfo_Name*
      • -
      • GP path: *Windows Components/Bitlocker Drive Encryption/Operating System Drives*
      • -
      • GP ADMX file name: *VolumeEncryption.admx*
      • +
      • GP English name: Configure pre-boot recovery message and URL
      • +
      • GP name: PrebootRecoveryInfo_Name
      • +
      • GP path: Windows Components/Bitlocker Drive Encryption/Operating System Drives
      • +
      • GP ADMX file name: VolumeEncryption.admx
      > [!Tip] @@ -417,18 +417,18 @@ The following diagram shows the BitLocker configuration service provider in tree

      This setting lets you configure the entire recovery message or replace the existing URL that are displayed on the pre-boot key recovery screen when the OS drive is locked.

      -

      If you set the value to "1" (Use default recovery message and URL), the default BitLocker recovery message and URL will be displayed in the pre-boot key recovery screen. If you have previously configured a custom recovery message or URL and want to revert to the default message, you must keep the policy enabled and set the value "1" (Use default recovery message and URL). - -

      If you set the value to "2" (Use custom recovery message), the message you set in the "RecoveryMessage_Input" data field will be displayed in the pre-boot key recovery screen. If a recovery URL is available, include it in the message.

      - -

      If you set the value to "3" (Use custom recovery URL), the URL you type in the "RecoveryUrl_Input" data field will replace the default URL in the default recovery message, which will be displayed in the pre-boot key recovery screen.

      - +

      If you set the value to "1" (Use default recovery message and URL), the default BitLocker recovery message and URL will be displayed in the pre-boot key recovery screen. If you have previously configured a custom recovery message or URL and want to revert to the default message, you must keep the policy enabled and set the value "1" (Use default recovery message and URL). + +

      If you set the value to "2" (Use custom recovery message), the message you set in the "RecoveryMessage_Input" data field will be displayed in the pre-boot key recovery screen. If a recovery URL is available, include it in the message.

      + +

      If you set the value to "3" (Use custom recovery URL), the URL you type in the "RecoveryUrl_Input" data field will replace the default URL in the default recovery message, which will be displayed in the pre-boot key recovery screen.

      +

      Sample value for this node to enable this policy is:

      ``` syntax ``` -

      The possible values for 'xx' are:

      +

      The possible values for 'xx' are:

      - 0 = Empty - 1 = Use default recovery message and URL (in this case you don't need to specify a value for "RecoveryMessage_Input" or "RecoveryUrl_Input"). @@ -463,33 +463,33 @@ The following diagram shows the BitLocker configuration service provider in tree

      Data type is string. Supported operations are Add, Get, Replace, and Delete.

      **SystemDrivesRecoveryOptions** -

      This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected operating system drives can be recovered" (OSRecoveryUsage_Name).

      +

      This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected operating system drives can be recovered" (OSRecoveryUsage_Name).

      - - - - - - - + + + + + + + - - - - - - - + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

      ADMX Info:

        -
      • GP English name: *Choose how BitLocker-protected operating system drives can be recovered*
      • -
      • GP name: *OSRecoveryUsage_Name*
      • -
      • GP path: *Windows Components/Bitlocker Drive Encryption/Operating System Drives*
      • -
      • GP ADMX file name: *VolumeEncryption.admx*
      • +
      • GP English name: Choose how BitLocker-protected operating system drives can be recovered
      • +
      • GP name: OSRecoveryUsage_Name
      • +
      • GP path: Windows Components/Bitlocker Drive Encryption/Operating System Drives
      • +
      • GP ADMX file name: VolumeEncryption.admx
      > [!Tip] @@ -497,18 +497,17 @@ The following diagram shows the BitLocker configuration service provider in tree

      This setting allows you to control how BitLocker-protected operating system drives are recovered in the absence of the required startup key information. This setting is applied when you turn on BitLocker.

      -

      The "OSAllowDRA_Name" (Allow certificate-based data recovery agent) data field is used to specify whether a data recovery agent can be used with BitLocker-protected operating system drives. Before a data recovery agent can be used it must be added from the Public Key Policies item in either the Group Policy Management Console or the Local Group Policy Editor. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information about adding data recovery agents.

      - -

      In "OSRecoveryPasswordUsageDropDown_Name" and "OSRecoveryKeyUsageDropDown_Name" (Configure user storage of BitLocker recovery information) set whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key.

      - -

      Set "OSHideRecoveryPage_Name" (Omit recovery options from the BitLocker setup wizard) to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting.

      - -

      Set "OSActiveDirectoryBackup_Name" (Save BitLocker recovery information to Active Directory Domain Services), to choose which BitLocker recovery information to store in AD DS for operating system drives (OSActiveDirectoryBackupDropDown_Name). If you set "1" (Backup recovery password and key package), both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you set "2" (Backup recovery password only), only the recovery password is stored in AD DS.

      - -

      Set the "OSRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds.

      - -> [!Note] -> If the "OSRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field is set, a recovery password is automatically generated. +

      The "OSAllowDRA_Name" (Allow certificate-based data recovery agent) data field is used to specify whether a data recovery agent can be used with BitLocker-protected operating system drives. Before a data recovery agent can be used it must be added from the Public Key Policies item in either the Group Policy Management Console or the Local Group Policy Editor. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information about adding data recovery agents.

      + +

      In "OSRecoveryPasswordUsageDropDown_Name" and "OSRecoveryKeyUsageDropDown_Name" (Configure user storage of BitLocker recovery information) set whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key.

      + +

      Set "OSHideRecoveryPage_Name" (Omit recovery options from the BitLocker setup wizard) to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting.

      + +

      Set "OSActiveDirectoryBackup_Name" (Save BitLocker recovery information to Active Directory Domain Services), to choose which BitLocker recovery information to store in AD DS for operating system drives (OSActiveDirectoryBackupDropDown_Name). If you set "1" (Backup recovery password and key package), both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you set "2" (Backup recovery password only), only the recovery password is stored in AD DS.

      + +

      Set the "OSRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds.

      + +> [!Note]
      > If the "OSRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for operating system drives) data field is set, a recovery password is automatically generated.

      If you enable this setting, you can control the methods available to users to recover data from BitLocker-protected operating system drives.

      @@ -520,21 +519,21 @@ The following diagram shows the BitLocker configuration service provider in tree ``` -

      The possible values for 'xx' are:

      +

      The possible values for 'xx' are:

      • true = Explicitly allow
      • false = Policy not set
      -

      The possible values for 'yy' are:

      +

      The possible values for 'yy' are:

      • 2 = Allowed
      • 1 = Required
      • 0 = Disallowed
      -

      The possible values for 'zz' are:

      +

      The possible values for 'zz' are:

      • 2 = Store recovery passwords only
      • 1 = Store recovery passwords and key packages
      • @@ -561,33 +560,33 @@ The following diagram shows the BitLocker configuration service provider in tree

        Data type is string. Supported operations are Add, Get, Replace, and Delete.

        **FixedDrivesRecoveryOptions** -

        This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected fixed drives can be recovered" ().

        +

        This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected fixed drives can be recovered" ().

        - - - - - - - + + + + + + + - - - - - - - + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

        ADMX Info:

          -
        • GP English name: *Choose how BitLocker-protected fixed drives can be recovered*
        • -
        • GP name: *FDVRecoveryUsage_Name*
        • -
        • GP path: *Windows Components/Bitlocker Drive Encryption/Fixed Drives*
        • -
        • GP ADMX file name: *VolumeEncryption.admx*
        • +
        • GP English name: Choose how BitLocker-protected fixed drives can be recovered
        • +
        • GP name: FDVRecoveryUsage_Name
        • +
        • GP path: Windows Components/Bitlocker Drive Encryption/Fixed Drives
        • +
        • GP ADMX file name: VolumeEncryption.admx
        > [!Tip] @@ -595,20 +594,19 @@ The following diagram shows the BitLocker configuration service provider in tree

        This setting allows you to control how BitLocker-protected fixed data drives are recovered in the absence of the required credentials. This setting is applied when you turn on BitLocker.

        -

        The "FDVAllowDRA_Name" (Allow data recovery agent) data field is used to specify whether a data recovery agent can be used with BitLocker-protected fixed data drives. Before a data recovery agent can be used it must be added from the Public Key Policies item in either the Group Policy Management Console or the Local Group Policy Editor. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information about adding data recovery agents.

        - -

        In "FDVRecoveryPasswordUsageDropDown_Name" (Configure user storage of BitLocker recovery information) set whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key.

        - -

        Set "FDVHideRecoveryPage_Name" (Omit recovery options from the BitLocker setup wizard) to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting.

        - -

        Set "FDVActiveDirectoryBackup_Name" (Save BitLocker recovery information to Active Directory Domain Services) to enable saving the recovery key to AD.

        - -

        Set the "FDVRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for fixed data drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds.

        +

        The "FDVAllowDRA_Name" (Allow data recovery agent) data field is used to specify whether a data recovery agent can be used with BitLocker-protected fixed data drives. Before a data recovery agent can be used it must be added from the Public Key Policies item in either the Group Policy Management Console or the Local Group Policy Editor. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information about adding data recovery agents.

        -

        Set the "FDVActiveDirectoryBackupDropDown_Name" (Configure storage of BitLocker recovery information to AD DS) to choose which BitLocker recovery information to store in AD DS for fixed data drives. If you select "1" (Backup recovery password and key package), both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you select "2" (Backup recovery password only) only the recovery password is stored in AD DS.

        - -> [!Note] -> If the "FDVRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for fixed data drives) data field is set, a recovery password is automatically generated. +

        In "FDVRecoveryPasswordUsageDropDown_Name" (Configure user storage of BitLocker recovery information) set whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key.

        + +

        Set "FDVHideRecoveryPage_Name" (Omit recovery options from the BitLocker setup wizard) to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting.

        + +

        Set "FDVActiveDirectoryBackup_Name" (Save BitLocker recovery information to Active Directory Domain Services) to enable saving the recovery key to AD.

        + +

        Set the "FDVRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for fixed data drives) data field if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds.

        + +

        Set the "FDVActiveDirectoryBackupDropDown_Name" (Configure storage of BitLocker recovery information to AD DS) to choose which BitLocker recovery information to store in AD DS for fixed data drives. If you select "1" (Backup recovery password and key package), both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you select "2" (Backup recovery password only) only the recovery password is stored in AD DS.

        + +> [!Note]
        > If the "FDVRequireActiveDirectoryBackup_Name" (Do not enable BitLocker until recovery information is stored in AD DS for fixed data drives) data field is set, a recovery password is automatically generated.

        If you enable this setting, you can control the methods available to users to recover data from BitLocker-protected fixed data drives.

        @@ -620,13 +618,13 @@ The following diagram shows the BitLocker configuration service provider in tree ``` -

        The possible values for 'xx' are:

        +

        The possible values for 'xx' are:

        • true = Explicitly allow
        • false = Policy not set
        -

        The possible values for 'yy' are:

        +

        The possible values for 'yy' are:

        • 2 = Allowed
        • 1 = Required
        • @@ -634,7 +632,7 @@ The following diagram shows the BitLocker configuration service provider in tree
        -

        The possible values for 'zz' are:

        +

        The possible values for 'zz' are:

        • 2 = Store recovery passwords only
        • 1 = Store recovery passwords and key packages
        • @@ -660,33 +658,33 @@ The following diagram shows the BitLocker configuration service provider in tree

          Data type is string. Supported operations are Add, Get, Replace, and Delete.

          **FixedDrivesRequireEncryption** -

          This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to fixed drives not protected by BitLocker" (FDVDenyWriteAccess_Name).

          +

          This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to fixed drives not protected by BitLocker" (FDVDenyWriteAccess_Name).

          - - - - - - - + + + + + + + - - - - - - - + + + + + + +
          HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
          cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

          ADMX Info:

            -
          • GP English name: *Deny write access to fixed drives not protected by BitLocker*
          • -
          • GP name: *FDVDenyWriteAccess_Name*
          • -
          • GP path: *Windows Components/Bitlocker Drive Encryption/Fixed Drives*
          • -
          • GP ADMX file name: *VolumeEncryption.admx*
          • +
          • GP English name: Deny write access to fixed drives not protected by BitLocker
          • +
          • GP name: FDVDenyWriteAccess_Name
          • +
          • GP path: Windows Components/Bitlocker Drive Encryption/Fixed Drives
          • +
          • GP ADMX file name: VolumeEncryption.admx
          > [!Tip] @@ -722,33 +720,33 @@ The following diagram shows the BitLocker configuration service provider in tree

          Data type is string. Supported operations are Add, Get, Replace, and Delete.

          **RemovableDrivesRequireEncryption** -

          This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to removable drives not protected by BitLocker" (RDVDenyWriteAccess_Name).

          +

          This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to removable drives not protected by BitLocker" (RDVDenyWriteAccess_Name).

          - - - - - - - + + + + + + + - - - - - - - + + + + + + +
          HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
          cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark

          ADMX Info:

            -
          • GP English name: *Deny write access to removable drives not protected by BitLocker*
          • -
          • GP name: *RDVDenyWriteAccess_Name*
          • -
          • GP path: *Windows Components/Bitlocker Drive Encryption/Removeable Drives*
          • -
          • GP ADMX file name: *VolumeEncryption.admx*
          • +
          • GP English name: Deny write access to removable drives not protected by BitLocker
          • +
          • GP name: RDVDenyWriteAccess_Name
          • +
          • GP path: Windows Components/Bitlocker Drive Encryption/Removeable Drives
          • +
          • GP ADMX file name: VolumeEncryption.admx
          > [!Tip] @@ -758,12 +756,11 @@ The following diagram shows the BitLocker configuration service provider in tree

          If you enable this setting, all removable data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access.

          -

          If the "RDVCrossOrg" (Deny write access to devices configured in another organization) option is set, only drives with identification fields matching the computer's identification fields will be given write access. When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields. These fields are defined by the "Provide the unique identifiers for your organization" group policy setting.

          - +

          If the "RDVCrossOrg" (Deny write access to devices configured in another organization) option is set, only drives with identification fields matching the computer's identification fields will be given write access. When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields. These fields are defined by the "Provide the unique identifiers for your organization" group policy setting.

          +

          If you disable or do not configure this policy setting, all removable data drives on the computer will be mounted with read and write access.

          - -> [!Note] -> This policy setting can be overridden by the group policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" group policy setting is enabled this policy setting will be ignored. + +> [!Note]
          > This policy setting can be overridden by the group policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" group policy setting is enabled this policy setting will be ignored.

          Sample value for this node to enable this policy is:

          @@ -771,7 +768,7 @@ The following diagram shows the BitLocker configuration service provider in tree ``` -

          The possible values for 'xx' are:

          +

          The possible values for 'xx' are:

          • true = Explicitly allow
          • false = Policy not set
          • @@ -806,22 +803,22 @@ The following diagram shows the BitLocker configuration service provider in tree - - - - - - - + + + + + + + - - - - - - - + + + + + + +
            HomeProBusinessEnterpriseEducationMobileMobile EnterpriseHomeProBusinessEnterpriseEducationMobileMobile Enterprise
            cross markcheck markcheck markcheck markcheck markcross markcross markcross markcheck markcheck markcheck markcheck markcross markcross mark
            @@ -832,16 +829,16 @@ The following diagram shows the BitLocker configuration service provider in tree ``` syntax - 110 - - - ./Device/Vendor/MSFT/BitLocker/AllowWarningForOtherDiskEncryption - - - int - - 0 - + 110 + + + ./Device/Vendor/MSFT/BitLocker/AllowWarningForOtherDiskEncryption + + + int + + 0 + ``` @@ -860,9 +857,9 @@ Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where pol > [!Note] > This policy is only supported in Azure AD accounts. - + "AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, silent encryption is enforced. - + If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user is the current logged on user in the system. The expected values for this policy are: @@ -936,7 +933,7 @@ The following example is provided to show proper format and should not be taken - + $CmdID$ @@ -953,7 +950,7 @@ The following example is provided to show proper format and should not be taken - + $CmdID$ @@ -966,7 +963,7 @@ The following example is provided to show proper format and should not be taken - + $CmdID$ @@ -981,7 +978,7 @@ The following example is provided to show proper format and should not be taken - + $CmdID$ @@ -1031,7 +1028,7 @@ The following example is provided to show proper format and should not be taken - + $CmdID$ @@ -1044,7 +1041,7 @@ The following example is provided to show proper format and should not be taken - + diff --git a/windows/client-management/mdm/bootstrap-csp.md b/windows/client-management/mdm/bootstrap-csp.md index 52b621e4c6..509638a1e4 100644 --- a/windows/client-management/mdm/bootstrap-csp.md +++ b/windows/client-management/mdm/bootstrap-csp.md @@ -18,12 +18,12 @@ ms.date: 06/26/2017 The BOOTSTRAP configuration service provider sets the Trusted Provisioning Server (TPS) for the device. > **Note**  BOOTSTRAP CSP is only supported in Windows 10 Mobile. - -  - +> +> +> > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_DEVICE\_MANAGEMENT\_ADMIN capabilities to be accessed from a network configuration application. -  + The following image shows the BOOTSTRAP configuration service provider in tree format as used by Open Mobile Alliance (OMA) Client Provisioning. The OMA Device Management protocol is not supported with this configuration service provider. @@ -40,9 +40,9 @@ Required. Specifies the location of a Trusted Provisioning Server (TPS). The PRO [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/browserfavorite-csp.md b/windows/client-management/mdm/browserfavorite-csp.md index 5cec6c34a5..c2cbd2a8d2 100644 --- a/windows/client-management/mdm/browserfavorite-csp.md +++ b/windows/client-management/mdm/browserfavorite-csp.md @@ -19,14 +19,14 @@ The BrowserFavorite configuration service provider is used to add and remove URL > **Note**  BrowserFavorite CSP is only supported in Windows Phone 8.1. -  + The BrowserFavorite configuration service provider manages only the favorites at the root favorite folder level. It does not manage subfolders under the root favorite folder nor does it manage favorites under a subfolder. > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_INTERNET\_EXPLORER\_FAVORITES capabilities to be accessed from a network configuration application. -  + The following diagram shows the BrowserFavorite configuration service provider in tree format as used by Open Mobile Alliance Device (OMA) Client Provisioning. The OMA Device Management protocol is not supported with this configuration service provider. @@ -37,7 +37,7 @@ Required. Specifies the user-friendly name of the favorite URL that is displayed > **Note**  The *favorite name* should contain only characters that are valid in the Windows file system. The invalid characters are: \\ / : \* ? " < > | -  + Adding the same favorite twice adds only one occurrence to the Favorites list. If a favorite is added when another favorite with the same name but a different URL is already in the Favorites list, the existing favorite is replaced with the new favorite. @@ -98,16 +98,16 @@ The following table shows the Microsoft custom elements that this configuration -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md b/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md index 1eb1da0ded..9e077af341 100644 --- a/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md +++ b/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md @@ -37,7 +37,7 @@ The **Bulk assign and reclaim seats from users** operation returns reclaimed or -  + ### URI parameters The following parameters may be specified in the request URI. @@ -73,13 +73,13 @@ The following parameters may be specified in the request URI.

            seatAction

            -

            [SeatAction](data-structures-windows-store-for-business.md#seataction)

            +

            SeatAction

            -  + ## Response ### Response body @@ -112,9 +112,9 @@ The response body contains [BulkSeatOperationResultSet](data-structures-windows- -  + -  + diff --git a/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md b/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md index 66ba8aace8..6e07079869 100644 --- a/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md +++ b/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md @@ -37,7 +37,7 @@ On the desktop and mobile devices, you can use an enrollment certificate or enro > - Bulk enrollment does not work in Intune standalone environment. > - Bulk enrollment works in System Center Configuration Manager (SCCM) + Intune hybrid environment where the ppkg is generated from the SCCM console. -  + ## What you need @@ -53,27 +53,27 @@ On the desktop and mobile devices, you can use an enrollment certificate or enro Using the ICD, create a provisioning package using the enrollment information required by your organization. Ensure that you have all the configuration settings. -1. Open the Windows ICD tool (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). -2. Click **Advanced Provisioning**. +1. Open the Windows ICD tool (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). +2. Click **Advanced Provisioning**. - ![icd start page](images/bulk-enrollment7.png) -3. Enter a project name and click **Next**. -4. Select **All Windows editions**, since Provisioning CSP is common to all Windows 10 editions, then click **Next**. -5. Skip **Import a provisioning package (optional)** and click **Finish**. -6. Expand **Runtime settings** > **Workplace**. -7. Click **Enrollments**, enter a value in **UPN**, and then click **Add**. - The UPN is a unique identifier for the enrollment. For bulk enrollment, this must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com". -8. On the left navigation pane, expand the **UPN** and then enter the information for the rest of the settings for enrollment process. - Here is the list of available settings: - - **AuthPolicy** - Select **OnPremise**. - - **DiscoveryServiceFullUrl** - specify the full URL for the discovery service. - - **EnrollmentServiceFullUrl** - Optional and in most cases, it should be left blank. - - **PolicyServiceFullUrl** - Optional and in most cases, it should be left blank. - - **Secret** - Password - For detailed descriptions of these settings, see [Provisioning CSP](provisioning-csp.md). - Here is the screenshot of the ICD at this point. - ![bulk enrollment screenshot](images/bulk-enrollment.png) -9. Configure the other settings, such as the Wi-Fi connections so that the device can join a network before joining MDM (e.g., **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**). + ![icd start page](images/bulk-enrollment7.png) +3. Enter a project name and click **Next**. +4. Select **All Windows editions**, since Provisioning CSP is common to all Windows 10 editions, then click **Next**. +5. Skip **Import a provisioning package (optional)** and click **Finish**. +6. Expand **Runtime settings** > **Workplace**. +7. Click **Enrollments**, enter a value in **UPN**, and then click **Add**. + The UPN is a unique identifier for the enrollment. For bulk enrollment, this must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com". +8. On the left navigation pane, expand the **UPN** and then enter the information for the rest of the settings for enrollment process. + Here is the list of available settings: + - **AuthPolicy** - Select **OnPremise**. + - **DiscoveryServiceFullUrl** - specify the full URL for the discovery service. + - **EnrollmentServiceFullUrl** - Optional and in most cases, it should be left blank. + - **PolicyServiceFullUrl** - Optional and in most cases, it should be left blank. + - **Secret** - Password + For detailed descriptions of these settings, see [Provisioning CSP](provisioning-csp.md). + Here is the screenshot of the ICD at this point. + ![bulk enrollment screenshot](images/bulk-enrollment.png) +9. Configure the other settings, such as the Wi-Fi connections so that the device can join a network before joining MDM (e.g., **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**). 10. When you are done adding all the settings, on the **File** menu, click **Save**. 11. On the main menu click **Export** > **Provisioning package**. @@ -93,34 +93,34 @@ Using the ICD, create a provisioning package using the enrollment information re Using the ICD, create a provisioning package using the enrollment information required by your organization. Ensure that you have all the configuration settings. -1. Open the Windows ICD tool (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). -2. Click **Advanced Provisioning**. -3. Enter a project name and click **Next**. -4. Select **Common to all Windows editions**, since Provisioning CSP is common to all Windows 10 editions. -5. Skip **Import a provisioning package (optional)** and click **Finish**. -6. Specify the certificate. - 1. Go to **Runtime settings** > **Certificates** > **ClientCertificates**. - 2. Enter a **CertificateName** and then click **Add**. - 3. Enter the **CertificatePasword**. - 4. For **CertificatePath**, browse and select the certificate to be used. - 5. Set **ExportCertificate** to False. - 6. For **KeyLocation**, select **Software only**. +1. Open the Windows ICD tool (by default, %windir%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). +2. Click **Advanced Provisioning**. +3. Enter a project name and click **Next**. +4. Select **Common to all Windows editions**, since Provisioning CSP is common to all Windows 10 editions. +5. Skip **Import a provisioning package (optional)** and click **Finish**. +6. Specify the certificate. + 1. Go to **Runtime settings** > **Certificates** > **ClientCertificates**. + 2. Enter a **CertificateName** and then click **Add**. + 3. Enter the **CertificatePasword**. + 4. For **CertificatePath**, browse and select the certificate to be used. + 5. Set **ExportCertificate** to False. + 6. For **KeyLocation**, select **Software only**. - ![icd certificates section](images/bulk-enrollment8.png) -7. Specify the workplace settings. - 1. Got to **Workplace** > **Enrollments**. - 2. Enter the **UPN** for the enrollment and then click **Add**. - The UPN is a unique identifier for the enrollment. For bulk enrollment, this must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com". - 3. On the left column, expand the **UPN** and then enter the information for the rest of the settings for enrollment process. - Here is the list of available settings: - - **AuthPolicy** - Select **Certificate**. - - **DiscoveryServiceFullUrl** - specify the full URL for the discovery service. - - **EnrollmentServiceFullUrl** - Optional and in most cases, it should be left blank. - - **PolicyServiceFullUrl** - Optional and in most cases, it should be left blank. - - **Secret** - the certificate thumbprint. - For detailed descriptions of these settings, see [Provisioning CSP](provisioning-csp.md). -8. Configure the other settings, such as the Wi-Fi connection so that the device can join a network before joining MDM (e.g., **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**). -9. When you are done adding all the settings, on the **File** menu, click **Save**. + ![icd certificates section](images/bulk-enrollment8.png) +7. Specify the workplace settings. + 1. Got to **Workplace** > **Enrollments**. + 2. Enter the **UPN** for the enrollment and then click **Add**. + The UPN is a unique identifier for the enrollment. For bulk enrollment, this must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com". + 3. On the left column, expand the **UPN** and then enter the information for the rest of the settings for enrollment process. + Here is the list of available settings: + - **AuthPolicy** - Select **Certificate**. + - **DiscoveryServiceFullUrl** - specify the full URL for the discovery service. + - **EnrollmentServiceFullUrl** - Optional and in most cases, it should be left blank. + - **PolicyServiceFullUrl** - Optional and in most cases, it should be left blank. + - **Secret** - the certificate thumbprint. + For detailed descriptions of these settings, see [Provisioning CSP](provisioning-csp.md). +8. Configure the other settings, such as the Wi-Fi connection so that the device can join a network before joining MDM (e.g., **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**). +9. When you are done adding all the settings, on the **File** menu, click **Save**. 10. Export and build the package (steps 10-13 in the procedure above). 11. Apply the package to some test devices and verify that they work. For more information, see [Apply a provisioning package](#apply-a-provisioning-package). 12. Apply the package to your devices. @@ -163,7 +163,7 @@ Here are links to step-by-step provisioning topics in Technet. - [Provision PCs with apps and certificates for initial deployment](https://technet.microsoft.com/itpro/windows/deploy/provision-pcs-with-apps-and-certificates) - [Provision PCs with common settings for initial deployment](https://technet.microsoft.com/itpro/windows/deploy/provision-pcs-for-initial-deployment) -  + diff --git a/windows/client-management/mdm/cellularsettings-csp.md b/windows/client-management/mdm/cellularsettings-csp.md index f8fa543dde..d982a50e25 100644 --- a/windows/client-management/mdm/cellularsettings-csp.md +++ b/windows/client-management/mdm/cellularsettings-csp.md @@ -53,16 +53,16 @@ The following image shows the CellularSettings CSP in tree format as used by Ope -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/certificatestore-csp.md b/windows/client-management/mdm/certificatestore-csp.md index eb1f7be7c5..514837edc2 100644 --- a/windows/client-management/mdm/certificatestore-csp.md +++ b/windows/client-management/mdm/certificatestore-csp.md @@ -19,7 +19,7 @@ The CertificateStore configuration service provider is used to add secure socket > **Note**   The CertificateStore configuration service provider does not support installing client certificates. -  + For the CertificateStore CSP, you cannot use the Replace command unless the node already exists. @@ -34,7 +34,7 @@ Supported operation is Get. > **Note**  Root/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing root certificates. -  + **CA/System** Defines the certificate store that contains cryptographic information, including intermediary certification authorities. @@ -43,7 +43,7 @@ Supported operation is Get. > **Note**  CA/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing CA certificates. -  + **My/User** Defines the certificate store that contains public keys for client certificates. This is only used by enterprise servers to push down the public key of a client certificate. The client certificate is used by the device client to authenticate itself to the enterprise server for device management and downloading enterprise applications. @@ -52,7 +52,7 @@ Supported operation is Get. > **Note**  My/User is case sensitive. -  + **My/System** Defines the certificate store that contains public key for client certificate. This is only used by enterprise server to push down the public key of the client cert. The client cert is used by the device to authenticate itself to the enterprise server for device management and enterprise app downloading. @@ -61,7 +61,7 @@ Supported operation is Get. > **Note**  My/System is case sensitive. -  + ***CertHash*** Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. @@ -105,9 +105,9 @@ Supported operation is Get. > **Note**  Please use the ClientCertificateInstall CSP to install SCEP certificates moving forward. All enhancements to SCEP will happen in that CSP. -  + -**My/SCEP/****_UniqueID_** +**My/SCEP/***UniqueID* Required for SCEP certificate enrollment. A unique ID to differentiate certificate enrollment requests. Format is node. Supported operations are Get, Add, Replace, and Delete. @@ -119,7 +119,7 @@ Supported operations are Add, Replace, and Delete. > **Note**   Though the children nodes under Install support Replace commands, after the Exec command is sent to the device, the device takes the values that are set when the Exec command is accepted. You should not expect the node value change that occurs after the Exec command is accepted to impact the current undergoing enrollment. You should check the Status node value and make sure that the device is not at an unknown stage before changing the children node values. -  + **My/SCEP/*UniqueID*/Install/ServerURL** Required for SCEP certificate enrollment. Specifies the certificate enrollment server. The server could specify multiple server URLs separated by a semicolon. Value type is string. @@ -213,7 +213,7 @@ Valid values are one of the following: > **Note**   The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server. -  + **My/SCEP/*UniqueID*/Install/ValidPeriodUnits** Optional. Specifies desired number of units used in validity period and subject to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. The valid period specified by MDM overwrites the valid period specified in the certificate template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days. Value type is an integer. @@ -222,7 +222,7 @@ Supported operations are Get, Add, Delete, and Replace. > **Note**   The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server. -  + **My/SCEP/*UniqueID*/Install/Enroll** Required. Triggers the device to start the certificate enrollment. The MDM server can later query the device to find out whether the new certificate is added. Value type is null, which means that this node does not contain a value. @@ -279,7 +279,7 @@ Optional. Specifies the URL of certificate renewal server. If this node does not > **Note**  The renewal process follows the same steps as device enrollment, which means that it starts with Discovery service, followed by Enrollment policy service, and then Enrollment web service. -  + Supported operations are Add, Get, Delete, and Replace. @@ -292,7 +292,7 @@ Supported operations are Add, Get, Delete, and Replace. > **Note**   When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands. -  + **My/WSTEP/Renew/RetryInterval** Optional. Specifies the retry interval (in days) when the previous renewal failed. It applies to both manual certificate renewal and ROBO automatic certificate renewal. The retry schedule stops at the certificate expiration date. @@ -307,7 +307,7 @@ Supported operations are Add, Get, Delete, and Replace. > **Note**   When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands. -  + **My/WSTEP/Renew/ROBOSupport** Optional. Notifies the client if the MDM enrollment server supports ROBO auto certificate renewal. Value type is bool. @@ -318,7 +318,7 @@ Supported operations are Add, Get, Delete, and Replace. > **Note**   When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands. -  + **My/WSTEP/Renew/Status** Required. Shows the latest action status for this certificate. Value type is an integer. @@ -629,9 +629,9 @@ Configure the device to automatically renew an MDM client certificate with the s [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/cleanpc-csp.md b/windows/client-management/mdm/cleanpc-csp.md index 1c4bb94a8c..1db25f77c0 100644 --- a/windows/client-management/mdm/cleanpc-csp.md +++ b/windows/client-management/mdm/cleanpc-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/cleanpc-ddf.md b/windows/client-management/mdm/cleanpc-ddf.md index 3dc1ead06d..b92d596c4e 100644 --- a/windows/client-management/mdm/cleanpc-ddf.md +++ b/windows/client-management/mdm/cleanpc-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/clientcertificateinstall-csp.md b/windows/client-management/mdm/clientcertificateinstall-csp.md index 0488238174..d80e8b3401 100644 --- a/windows/client-management/mdm/clientcertificateinstall-csp.md +++ b/windows/client-management/mdm/clientcertificateinstall-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 10/16/2018 --- @@ -30,7 +30,7 @@ The following image shows the ClientCertificateInstall configuration service pro ![clientcertificateinstall csp](images/provisioning-csp-clientcertificateinstall.png) **Device or User** -

            For device certificates, use **./Device/Vendor/MSFT** path and for user certificates use **./User/Vendor/MSFT** path. +

            For device certificates, use ./Device/Vendor/MSFT path and for user certificates use ./User/Vendor/MSFT path. **ClientCertificateInstall**

            The root node for the ClientCertificateInstaller configuration service provider. @@ -40,7 +40,7 @@ The following image shows the ClientCertificateInstall configuration service pro

            Supported operation is Get. -**ClientCertificateInstall/PFXCertInstall/****_UniqueID_** +**ClientCertificateInstall/PFXCertInstall/***UniqueID*

            Required for PFX certificate installation. A unique ID to differentiate different certificate install requests.

            The data type format is node. @@ -72,7 +72,7 @@ The following image shows the ClientCertificateInstall configuration service pro

            Supported operations are Get, Add, Delete, and Replace. **ClientCertificateInstall/PFXCertInstall/*UniqueID*/PFXCertBlob** -

            CRYPT\_DATA\_BLOB structure that contains a PFX packet with the exported and encrypted certificates and keys. The Add operation triggers the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, KeyExportable) are present before this is called. This also sets the Status node to the current Status of the operation. +

            CRYPT_DATA_BLOB structure that contains a PFX packet with the exported and encrypted certificates and keys. The Add operation triggers the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, KeyExportable) are present before this is called. This also sets the Status node to the current Status of the operation.

            The data type format is binary. @@ -82,7 +82,7 @@ The following image shows the ClientCertificateInstall configuration service pro

            If Add is called on this node for a new PFX, the certificate will be added. When a certificate does not exist, Replace operation on this node will fail. -

            In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate CRYPT\_DATA\_BLOB, which can be found in [CRYPT\_INTEGER\_BLOB](https://go.microsoft.com/fwlink/p/?LinkId=523871). +

            In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate CRYPT_DATA_BLOB, which can be found in CRYPT_INTEGER_BLOB. **ClientCertificateInstall/PFXCertInstall/*UniqueID*/PFXCertPassword**

            Password that protects the PFX blob. This is required if the PFX is password protected. @@ -109,7 +109,7 @@ The following image shows the ClientCertificateInstall configuration service pro > **Note**  You can only set PFXKeyExportable to true if KeyLocation=3. For any other KeyLocation value, the CSP will fail. -  +

            The data type bool.

            Supported operations are Get, Add, and Replace. @@ -140,8 +140,8 @@ The following image shows the ClientCertificateInstall configuration service pro > **Note**  An alert is sent after the SCEP certificate is installed. -  -**ClientCertificateInstall/SCEP/****_UniqueID_** + +**ClientCertificateInstall/SCEP/***UniqueID*

            A unique ID to differentiate different certificate installation requests. @@ -152,7 +152,7 @@ The following image shows the ClientCertificateInstall configuration service pro > **Note**  Although the child nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values that are set when the Exec command is accepted. The server should not expect the node value change after Exec command is accepted, as it will impact the current enrollment underway. The server should check the Status node value and make sure the device is not at an unknown state before changing child node values. -  + **ClientCertificateInstall/SCEP/*UniqueID*/Install/ServerURL**

            Required for SCEP certificate enrollment. Specifies the certificate enrollment server. Multiple server URLs can be listed, separated by semicolons. @@ -168,7 +168,7 @@ The following image shows the ClientCertificateInstall configuration service pro

            Supported operations are Add, Get, Delete, and Replace. **ClientCertificateInstall/SCEP/*UniqueID*/Install/EKUMapping** -

            Required. Specifies extended key usages. Subject to SCEP server configuration. The list of OIDs are separated by a plus **+**. For example, *OID1*+*OID2*+*OID3*. +

            Required. Specifies extended key usages. Subject to SCEP server configuration. The list of OIDs are separated by a plus +. For example, OID1+OID2+OID3. Data type is string.

            Required for enrollment. Specifies the key usage bits (0x80, 0x20, 0xA0, etc.) for the certificate in decimal format. The value should at least have the second (0x20), fourth (0x80) or both bits set. If the value doesn’t have those bits set, the configuration will fail. @@ -189,7 +189,7 @@ Data type is string. > **Note**  Even if the private key is protected by TPM, it is not protected with a TPM PIN. -  +

            The data type is an integer corresponding to one of the following values: | Value | Description | @@ -199,7 +199,7 @@ Data type is string. | 3 | (Default) Private key saved in software KSP. | | 4 | Private key protected by Windows Hello for Business (formerly known as Microsoft Passport for Work). If this option is specified, the ContainerName must be specifed, otherwise enrollment will fail. | -  +

            Supported operations are Add, Get, Delete, and Replace. **ClientCertificateInstall/SCEP/*UniqueID*/Install/KeyUsage** @@ -236,7 +236,7 @@ Data type is string. > **Note**  This name is typically ignored by the SCEP server; therefore the MDM server typically doesn’t need to provide it. -  +

            Data type is string.

            Supported operations are Add, Get, Delete, and Replace. @@ -253,7 +253,7 @@ Data type is string.

            Supported operations are Add, Get, Delete, and Replace. **ClientCertificateInstall/SCEP/*UniqueID*/Install/HashAlgorithm** -

            Required. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated with **+**. +

            Required. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated with +.

            For Windows Hello for Business, only SHA256 is the supported algorithm. @@ -271,7 +271,7 @@ Data type is string. **ClientCertificateInstall/SCEP/*UniqueID*/Install/SubjectAlternativeNames**

            Optional. Specifies subject alternative names (SAN). Multiple alternative names can be specified by this node. Each name is the combination of name format+actual name. Refer to the name type definitions in MSDN for more information. -

            Each pair is separated by semicolon. For example, multiple SANs are presented in the format of *\[name format1\]*+*\[actual name1\]*;*\[name format 2\]*+*\[actual name2\]*. +

            Each pair is separated by semicolon. For example, multiple SANs are presented in the format of [name format1]+[actual name1];[name format 2]+[actual name2].

            Data type is string. @@ -290,7 +290,7 @@ Data type is string. > **Note**  The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) to the SCEP server as part of certificate enrollment request. Depending on the server configuration, the server defines how to use this valid period to create the certificate. -  +

            Supported operations are Add, Get, Delete, and Replace. **ClientCertificateInstall/SCEP/*UniqueID*/Install/ValidPeriodUnits** @@ -300,7 +300,7 @@ Data type is string. >**Note**  The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) to the SCEP server as part of certificate enrollment request. Depending on the server configuration, the server defines how to use this valid period to create the certificate. -  +

            Supported operations are Add, Get, Delete, and Replace. **ClientCertificateInstall/SCEP/*UniqueID*/Install/ContainerName** @@ -354,7 +354,7 @@ Data type is string. | 16 | Action failed | | 32 | Unknown | -  + **ClientCertificateInstall/SCEP/*UniqueID*/ErrorCode**

            Optional. An integer value that indicates the HRESULT of the last enrollment error code. @@ -668,9 +668,9 @@ Add a PFX certificate. The PFX certificate password is encrypted with a custom c [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/clientcertificateinstall-ddf-file.md b/windows/client-management/mdm/clientcertificateinstall-ddf-file.md index e7728bbc2f..fac4c7f79c 100644 --- a/windows/client-management/mdm/clientcertificateinstall-ddf-file.md +++ b/windows/client-management/mdm/clientcertificateinstall-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/cm-cellularentries-csp.md b/windows/client-management/mdm/cm-cellularentries-csp.md index 915948b850..4e20e3ff3e 100644 --- a/windows/client-management/mdm/cm-cellularentries-csp.md +++ b/windows/client-management/mdm/cm-cellularentries-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 08/02/2017 --- @@ -22,24 +22,24 @@ The following diagram shows the CM\_CellularEntries configuration service provid ![cm\-cellularentries csp](images/provisioning-csp-cm-cellularentries.png) -**_entryname_** +***entryname***

            Defines the name of the connection.

            -

            The [CMPolicy configuration service provider](cmpolicy-csp.md) uses the value of *entryname* to identify the connection that is associated with a policy and [CM\_ProxyEntries configuration service provider](cm-proxyentries-csp.md) uses the value of *entryname* to identify the connection that is associated with a proxy.

            +

            The CMPolicy configuration service provider uses the value of entryname to identify the connection that is associated with a policy and CM_ProxyEntries configuration service provider uses the value of entryname to identify the connection that is associated with a proxy.

            **AlwaysOn**

            Type: Int. Specifies if the Connection Manager will automatically attempt to connect to the APN when a connection is available. -

            A value of "0" specifies that AlwaysOn is not supported, and the Connection Manager will only attempt to connect to the APN when an application requests the connection. This setting is recommended for applications that use a connection occasionally, for example, an APN that only controls MMS. +

            A value of "0" specifies that AlwaysOn is not supported, and the Connection Manager will only attempt to connect to the APN when an application requests the connection. This setting is recommended for applications that use a connection occasionally, for example, an APN that only controls MMS. -

            A value of "1" specifies that AlwaysOn is supported, and the Connection Manager will automatically attempt to connect to the APN when it is available. This setting is recommended for general purpose Internet APNs. +

            A value of "1" specifies that AlwaysOn is supported, and the Connection Manager will automatically attempt to connect to the APN when it is available. This setting is recommended for general purpose Internet APNs.

            There must be at least one AlwaysOn Internet connection provisioned for the mobile operator. **AuthType**

            Optional. Type: String. Specifies the method of authentication used for a connection. -

            A value of "CHAP" specifies the Challenge Handshake Application Protocol. A value of "PAP" specifies the Password Authentication Protocol. A value of "None" specifies that the UserName and Password parameters are ignored. The default value is "None". +

            A value of "CHAP" specifies the Challenge Handshake Application Protocol. A value of "PAP" specifies the Password Authentication Protocol. A value of "None" specifies that the UserName and Password parameters are ignored. The default value is "None". **ConnectionType**

            Optional. Type: String. Specifies the type of connection used for the APN. The following connection types are available: @@ -77,48 +77,48 @@ The following diagram shows the CM\_CellularEntries configuration service provid -  + **Desc.langid**

            Optional. Specifies the UI display string used by the defined language ID. -

            A parameter name in the format of Desc.langid will be used as the language-specific identifier for the specified entry. For example, a parameter defined as `Desc.0409` with a value of `"GPRS Connection"` will force "GPRS Connection" to be displayed in the UI to represent this connection when the device is set to English language (language ID 0409). Descriptions for multiple languages may be provisioned using this mechanism, and the system will automatically switch among them if the user changes language preferences on the device. If no **Desc** parameter is provisioned for a given language, the system will default to the name used to create the entry. +

            A parameter name in the format of Desc.langid will be used as the language-specific identifier for the specified entry. For example, a parameter defined as Desc.0409 with a value of "GPRS Connection" will force "GPRS Connection" to be displayed in the UI to represent this connection when the device is set to English language (language ID 0409). Descriptions for multiple languages may be provisioned using this mechanism, and the system will automatically switch among them if the user changes language preferences on the device. If no Desc parameter is provisioned for a given language, the system will default to the name used to create the entry. **Enabled**

            Specifies if the connection is enabled. -

            A value of "0" specifies that the connection is disabled. A value of "1" specifies that the connection is enabled. +

            A value of "0" specifies that the connection is disabled. A value of "1" specifies that the connection is enabled. **IpHeaderCompression**

            Optional. Specifies if IP header compression is enabled. -

            A value of "0" specifies that IP header compression for the connection is disabled. A value of "1" specifies that IP header compression for the connection is enabled. +

            A value of "0" specifies that IP header compression for the connection is disabled. A value of "1" specifies that IP header compression for the connection is enabled. **Password** -

            Required if AuthType is set to a value other than "None". Specifies the password used to connect to the APN. +

            Required if AuthType is set to a value other than "None". Specifies the password used to connect to the APN. **SwCompression**

            Optional. Specifies if software compression is enabled. -

            A value of "0" specifies that software compression for the connection is disabled. A value of "1" specifies that software compression for the connection is enabled. +

            A value of "0" specifies that software compression for the connection is disabled. A value of "1" specifies that software compression for the connection is enabled. **UserName** -

            Required if AuthType is set to a value other than "None". Specifies the user name used to connect to the APN. +

            Required if AuthType is set to a value other than "None". Specifies the user name used to connect to the APN. **UseRequiresMappingsPolicy**

            Optional. Specifies if the connection requires a corresponding mappings policy. -

            A value of "0" specifies that the connection can be used for any general Internet communications. A value of "1" specifies that the connection is only used if a mapping policy is present. +

            A value of "0" specifies that the connection can be used for any general Internet communications. A value of "1" specifies that the connection is only used if a mapping policy is present. -

            For example, if the multimedia messaging service (MMS) APN should not have any other traffic except MMS, you can configure a mapping policy that sends MMS traffic to this connection. Then, you set the value of UseRequiresMappingsPolicy to be equal to "1" and Connection Manager will only use the connection for MMS traffic. Without this, Connection Manager will try to use the connection for any general purpose Internet traffic. +

            For example, if the multimedia messaging service (MMS) APN should not have any other traffic except MMS, you can configure a mapping policy that sends MMS traffic to this connection. Then, you set the value of UseRequiresMappingsPolicy to be equal to "1" and Connection Manager will only use the connection for MMS traffic. Without this, Connection Manager will try to use the connection for any general purpose Internet traffic. **Version** -

            Type: Int. Specifies the XML version number and is used to verify that the XML is supported by Connection Manager's configuration service provider. +

            Type: Int. Specifies the XML version number and is used to verify that the XML is supported by Connection Manager's configuration service provider. -

            This value must be "1" if included. +

            This value must be "1" if included. **GPRSInfoAccessPointName** -

            Specifies the logical name to select the GPRS gateway. For more information about allowable values, see GSM specification 07.07 "10.1.1 Define PDP Context +CGDCONT". +

            Specifies the logical name to select the GPRS gateway. For more information about allowable values, see GSM specification 07.07 "10.1.1 Define PDP Context +CGDCONT". **Roaming**

            Optional. Type: Int. This parameter specifies the roaming conditions under which the connection should be activated. The following conditions are available: @@ -134,20 +134,20 @@ The following diagram shows the CM\_CellularEntries configuration service provid

            Optional. Type: GUID. Specifies a GUID to use to identify a specific connection in the modem. If a value is not specified, the default value is 00000000-0000-0000-0000-000000000000. This parameter is only used on LTE devices. **ApnId** -

            Optional. Type: Int. Specifies the purpose of the APN. If a value is not specified, the default value is "0" (none). This parameter is only used on LTE devices. +

            Optional. Type: Int. Specifies the purpose of the APN. If a value is not specified, the default value is "0" (none). This parameter is only used on LTE devices. **IPType** -

            Optional. Type: String. Specifies the network protocol of the connection. Available values are "IPv4", "IPv6", "IPv4v6", and "IPv4v6xlat". If a value is not specified, the default value is "IPv4". +

            Optional. Type: String. Specifies the network protocol of the connection. Available values are "IPv4", "IPv6", "IPv4v6", and "IPv4v6xlat". If a value is not specified, the default value is "IPv4". > [!Warning]   > Do not use IPv6 or IPv4v6xlat on a device or network that does not support IPv6. Data functionality will not work. In addition, the device will not be able to connect to a roaming network that does not support IPv6 unless you configure roaming connections with an IPType of IPv4v6. -  + **ExemptFromDisablePolicy** -

            Added back in Windows 10, version 1511. Optional. Type: Int. This should only be specified for special purpose connections whose applications directly manage their disable state (such as MMS). A value of "0" specifies that the connection is subject to the disable policy used by general purpose connections (not exempt). A value of "1" specifies that the connection is exempt. If a value is not specified, the default value is "0" (not exempt). +

            Added back in Windows 10, version 1511. Optional. Type: Int. This should only be specified for special purpose connections whose applications directly manage their disable state (such as MMS). A value of "0" specifies that the connection is subject to the disable policy used by general purpose connections (not exempt). A value of "1" specifies that the connection is exempt. If a value is not specified, the default value is "0" (not exempt). -

            To allow MMS when data is set to OFF, set both ExemptFromDisablePolicy and UseRequiresMappingsPolicy to "1". This indicates that the connection is a dedicated MMS connection and that it should not be disabled when all other connections are disabled. As a result, MMS can be sent and received when data is set to OFF. Note that sending MMS while roaming is still not allowed. +

            To allow MMS when data is set to OFF, set both ExemptFromDisablePolicy and UseRequiresMappingsPolicy to "1". This indicates that the connection is a dedicated MMS connection and that it should not be disabled when all other connections are disabled. As a result, MMS can be sent and received when data is set to OFF. Note that sending MMS while roaming is still not allowed. > [!Important]   > Do not set ExemptFromDisablePolicy to "1", ExemptFromRoaming to "1", or UseRequiresMappingsPolicy to "1" for general purpose connections. @@ -157,26 +157,26 @@ The following diagram shows the CM\_CellularEntries configuration service provid - Hide the toggle for AllowMmsIfDataIsOff by setting AllowMmsIfDataIsOffEnabled to 0 (default is 1) - Set AllowMMSIfDataIsOff to 1 (default is 0) -  + **ExemptFromRoaming** -

            Added back in Windows 10, version 1511. Optional. Type: Int. This should be specified only for special purpose connections whose applications directly manage their roaming state. It should never be used with general purpose connections. A value of "0" specifies that the connection is subject to the roaming policy (not exempt). A value of "1" specifies that the connection is exempt (unaffected by the roaming policy). If a value is not specified, the default value is "0" (not exempt). +

            Added back in Windows 10, version 1511. Optional. Type: Int. This should be specified only for special purpose connections whose applications directly manage their roaming state. It should never be used with general purpose connections. A value of "0" specifies that the connection is subject to the roaming policy (not exempt). A value of "1" specifies that the connection is exempt (unaffected by the roaming policy). If a value is not specified, the default value is "0" (not exempt). **TetheringNAI** -

            Optional. Type: Int. CDMA only. Specifies if the connection is a tethering connection. A value of "0" specifies that the connection is not a tethering connection. A value of "1" specifies that the connection is a tethering connection. If a value is not specified, the default value is "0". +

            Optional. Type: Int. CDMA only. Specifies if the connection is a tethering connection. A value of "0" specifies that the connection is not a tethering connection. A value of "1" specifies that the connection is a tethering connection. If a value is not specified, the default value is "0". **IdleDisconnectTimeout**

            Optional. Type: Int. Specifies how long an on-demand connection can be unused before Connection Manager tears the connection down. This value is specified in seconds. Valid value range is 5 to 60 seconds. If not specified, the default is 30 seconds. -> [!Important]   -

            You must specify the IdleDisconnectTimeout value when updating an on-demand connection to ensure that the desired value is still configured. If it is not specified, the default value of 30 seconds may be used. - -  - -> [!Note]   +> [!Important] +>

            You must specify the IdleDisconnectTimeout value when updating an on-demand connection to ensure that the desired value is still configured. If it is not specified, the default value of 30 seconds may be used. +> +> +> +> [!Note] > If tear-down/activation requests occur too frequently, this value should be set to greater than 5 seconds. -  + **SimIccId**

            For single SIM phones, this parm is optional. However, it is highly recommended to include this value when creating future updates. For dual SIM phones, this parm is required. Type: String. Specifies the SIM ICCID that services the connection. @@ -300,16 +300,16 @@ The following table shows the Microsoft custom elements that this configuration -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/cm-proxyentries-csp.md b/windows/client-management/mdm/cm-proxyentries-csp.md index 3ff2f56ed0..ef176f2dab 100644 --- a/windows/client-management/mdm/cm-proxyentries-csp.md +++ b/windows/client-management/mdm/cm-proxyentries-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -18,12 +18,12 @@ ms.date: 06/26/2017 The CM\_ProxyEntries configuration service provider is used to configure proxy connections on the mobile device. > **Note**  CM\_ProxyEntries CSP is only supported in Windows 10 Mobile. - -  - +> +> +> > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application. -  + The following diagram shows the CM\_ProxyEntries configuration service provider management object in tree format as used by Open Mobile Alliance Client Provisioning (OMA CP) and OMA Device Management(OMA DM). Support for OMA DM was added in Windows 10, version 1607. @@ -135,16 +135,16 @@ The following table shows the Microsoft custom elements that this configuration -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/cmpolicy-csp.md b/windows/client-management/mdm/cmpolicy-csp.md index a9fab76e3a..d8cf450f41 100644 --- a/windows/client-management/mdm/cmpolicy-csp.md +++ b/windows/client-management/mdm/cmpolicy-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -20,7 +20,7 @@ The CMPolicy configuration service provider defines rules that the Connection Ma > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application. -  + Each policy entry identifies one or more applications in combination with a host pattern. The policy entry is assigned a list of connection details that Connection Manager uses to satisfy connection requests matching the application and host patterns. CMPolicy configuration service provider can have multiple policies @@ -63,7 +63,7 @@ Specifies whether the list of connections is in preference order. A value of "0" specifies that the connections are not listed in order of preference. A value of "1" indicates that the listed connections are in order of preference. -**Conn****_XXX_** +**Conn***XXX* Enumerates the connections associated with the policy. Element names begin with "Conn" followed by three digits which increment starting from "000". For example, a policy which applied to five connections would have element entries named "Conn000", "Conn001", "Conn002", "Conn003", and "Conn004". **ConnectionID** @@ -112,7 +112,7 @@ For `CMST_CONNECTION_TYPE`, specify the GUID for the desired connection type. Th -  + For `CMST_CONNECTION_NETWORK_TYPE`, specify the GUID for the desired network type. The curly brackets {} around the GUID are required. The following network types are available: @@ -187,7 +187,7 @@ For `CMST_CONNECTION_NETWORK_TYPE`, specify the GUID for the desired network typ -  + For `CMST_CONNECTION_DEVICE_TYPE`, specify the GUID for the desired device type. The curly brackets {} around the GUID are required. The following device types are available: @@ -222,7 +222,7 @@ For `CMST_CONNECTION_DEVICE_TYPE`, specify the GUID for the desired device type. -  + **Type** Specifies the type of connection being referenced. The following list describes the available connection types: @@ -498,16 +498,16 @@ Adding a host-based mapping policy: -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/cmpolicyenterprise-csp.md b/windows/client-management/mdm/cmpolicyenterprise-csp.md index 281f03939b..3c64181792 100644 --- a/windows/client-management/mdm/cmpolicyenterprise-csp.md +++ b/windows/client-management/mdm/cmpolicyenterprise-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -20,7 +20,7 @@ The CMPolicyEnterprise configuration service provider is used by the enterprise > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application. -  + Each policy entry identifies one or more applications in combination with a host pattern. The policy entry is assigned a list of connection details that Connection Manager uses to satisfy connection requests matching the application and host patterns. CMPolicyEnterprise configuration service provider can have multiple policies @@ -63,7 +63,7 @@ Specifies whether the list of connections is in preference order. A value of "0" specifies that the connections are not listed in order of preference. A value of "1" indicates that the listed connections are in order of preference. -**Conn****_XXX_** +**Conn***XXX* Enumerates the connections associated with the policy. Element names begin with "Conn" followed by three digits which increment starting from "000". For example, a policy which applied to five connections would have element entries named "Conn000", "Conn001", "Conn002", "Conn003", and "Conn004". **ConnectionID** @@ -112,7 +112,7 @@ For `CMST_CONNECTION_TYPE`, specify the GUID for the desired connection type. Th -  + For `CMST_CONNECTION_NETWORK_TYPE`, specify the GUID for the desired network type. The curly brackets {} around the GUID are required. The following network types are available: @@ -187,7 +187,7 @@ For `CMST_CONNECTION_NETWORK_TYPE`, specify the GUID for the desired network typ -  + For `CMST_CONNECTION_DEVICE_TYPE`, specify the GUID for the desired device type. The curly brackets {} around the GUID are required. The following device types are available: @@ -222,7 +222,7 @@ For `CMST_CONNECTION_DEVICE_TYPE`, specify the GUID for the desired device type. -  + **Type** Specifies the type of connection being referenced. The following list describes the available connection types: @@ -498,16 +498,16 @@ Adding a host-based mapping policy: -  + ## Related topics [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/cmpolicyenterprise-ddf-file.md b/windows/client-management/mdm/cmpolicyenterprise-ddf-file.md index e0eec083d9..47aa9e66c4 100644 --- a/windows/client-management/mdm/cmpolicyenterprise-ddf-file.md +++ b/windows/client-management/mdm/cmpolicyenterprise-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 28bda96abc..5aaeaf180d 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 05/13/2019 --- @@ -2712,7 +2712,7 @@ The following list shows the configuration service providers supported in Window | [WiFi CSP](wifi-csp.md) | ![cross mark](images/crossmark.png) | ![check mark](images/checkmark.png) | | [WindowsLicensing CSP](windowslicensing-csp.md) | ![check mark](images/checkmark.png) | ![check mark](images/checkmark.png) | -  + ## CSPs supported in Microsoft Surface Hub - [AccountManagement CSP](accountmanagement-csp.md) @@ -2769,7 +2769,7 @@ The following list shows the configuration service providers supported in Window


            - Footnotes: + Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. diff --git a/windows/client-management/mdm/create-a-custom-configuration-service-provider.md b/windows/client-management/mdm/create-a-custom-configuration-service-provider.md index 9d15da9e96..b87b2182df 100644 --- a/windows/client-management/mdm/create-a-custom-configuration-service-provider.md +++ b/windows/client-management/mdm/create-a-custom-configuration-service-provider.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -45,11 +45,11 @@ This code must be compiled into a single .dll file and added to a package by usi

            File location

            -

            %DataDrive%\SharedData\OEM\CSP\

            +

            %DataDrive%\SharedData\OEM\CSP</p>

            Registry location

            -

            $(HKLM.SOFTWARE)\OEM\CSP\

            +

            $(HKLM.SOFTWARE)\OEM\CSP</p> @@ -88,7 +88,7 @@ To make the configuration service provider accessible from WAP XML, you must reg ``` -  + diff --git a/windows/client-management/mdm/customdeviceui-csp.md b/windows/client-management/mdm/customdeviceui-csp.md index 2ea7eb7d4d..180daaf203 100644 --- a/windows/client-management/mdm/customdeviceui-csp.md +++ b/windows/client-management/mdm/customdeviceui-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -30,7 +30,7 @@ AppID string value is the default appid/AUMID to launch during startup. The supp **BackgroundTasksToLaunch** List of package names of background tasks that need to be launched on device startup. The supported operation is Get. -**BackgroundTasksToLaunch/****_BackgroundTaskPackageName_** +**BackgroundTasksToLaunch/***BackgroundTaskPackageName* Package Full Name of the App that needs be launched in the background. This can contain no entry points, a single entry point, or multiple entry points. The supported operations are Add, Delete, Get, and Replace. ## SyncML examples @@ -98,9 +98,9 @@ Package Full Name of the App that needs be launched in the background. This can ``` -  + -  + diff --git a/windows/client-management/mdm/customdeviceui-ddf.md b/windows/client-management/mdm/customdeviceui-ddf.md index a2ba26d51e..e220b8845a 100644 --- a/windows/client-management/mdm/customdeviceui-ddf.md +++ b/windows/client-management/mdm/customdeviceui-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/data-structures-windows-store-for-business.md b/windows/client-management/mdm/data-structures-windows-store-for-business.md index 700d7fc62b..52f529971f 100644 --- a/windows/client-management/mdm/data-structures-windows-store-for-business.md +++ b/windows/client-management/mdm/data-structures-windows-store-for-business.md @@ -11,7 +11,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- @@ -81,7 +81,7 @@ Specifies the properties of the alternate identifier. -  + ## BulkSeatOperationResultSet @@ -100,16 +100,16 @@ Specifies the properties of the alternate identifier.

            seatDetails

            -

            collection of [SeatDetails](#seatdetails)

            +

            collection of SeatDetails

            failedSeatOperations

            -

            collection of [FailedSeatRequest](#failedseatrequest)

            +

            collection of FailedSeatRequest

            -  + ## FailedSeatRequest @@ -132,7 +132,7 @@ Specifies the properties of the alternate identifier.

            productKey

            -

            [ProductKey](#productkey)

            +

            ProductKey

            userName

            @@ -141,7 +141,7 @@ Specifies the properties of the alternate identifier. -  + ## FrameworkPackageDetails @@ -172,7 +172,7 @@ Specifies the properties of the alternate identifier.

            location

            -

            [PackageLocation](#packagelocation)

            +

            PackageLocation

            @@ -187,17 +187,17 @@ Specifies the properties of the alternate identifier.

            architectures

            -

            collection of [ProductArchitectures](#productarchitectures)

            +

            collection of ProductArchitectures

            packageFormat

            -

            [ProductPackageFormat](#productpackageformat)

            +

            ProductPackageFormat

            platforms

            -

            collection of [ProductPlatform](#productplatform)

            +

            collection of ProductPlatform

            @@ -213,7 +213,7 @@ Specifies the properties of the alternate identifier. -  + ## InventoryDistributionPolicy @@ -241,7 +241,7 @@ Specifies the properties of the alternate identifier. -  + ## InventoryEntryDetails @@ -262,7 +262,7 @@ Specifies the properties of the alternate identifier.

            productKey

            -

            [ProductKey](#productkey)

            +

            ProductKey

            Identifier used on subsequent requests to get additional content including product descriptions, offline license, and download URLs.

            @@ -282,23 +282,23 @@ Specifies the properties of the alternate identifier.

            licenseType

            -

            [LicenseType](#licensetype)

            +

            LicenseType

            Indicates whether the set of seats for a given application supports online or offline licensing.

            distributionPolicy

            -

            [InventoryDistributionPolicy](#inventorydistributionpolicy)

            +

            InventoryDistributionPolicy

            status

            -

            [InventoryStatus](#inventorystatus)

            +

            InventoryStatus

            -  + ## InventoryResultSet @@ -324,13 +324,13 @@ Specifies the properties of the alternate identifier.

            inventoryEntries

            -

            collection of [InventoryEntryDetails](#inventoryentrydetails)

            +

            collection of InventoryEntryDetails

            -  + ## InventoryStatus @@ -358,7 +358,7 @@ Specifies the properties of the alternate identifier. -  + ## LicenseType @@ -386,7 +386,7 @@ Specifies the properties of the alternate identifier. -  + ## LocalizedProductDetail @@ -424,18 +424,18 @@ Specifies the properties of the localized product.

            images

            -

            collection of [ProductImage](#productimage)

            +

            collection of ProductImage

            Artwork and icon associated with the application.

            publisher

            -

            [PublisherDetails](#publisherdetails)

            +

            PublisherDetails

            Publisher of the application.

            -  + ## OfflineLicense @@ -456,7 +456,7 @@ Specifies the properties of the localized product.

            productKey

            -

            [ProductKey](#productkey)

            +

            ProductKey

            Identifies a set of seats associated with an application.

            @@ -482,7 +482,7 @@ Specifies the properties of the localized product. -  + ## PackageContentInfo @@ -501,7 +501,7 @@ Specifies the properties of the localized product.

            productPlatforms

            -

            collection of [ProductPlatform](#productplatform)

            +

            collection of ProductPlatform

            packageFormat

            @@ -510,7 +510,7 @@ Specifies the properties of the localized product. -  + ## PackageLocation @@ -537,7 +537,7 @@ Specifies the properties of the localized product. -  + ## ProductArchitectures @@ -567,7 +567,7 @@ Specifies the properties of the localized product. -  + ## ProductDetails @@ -588,7 +588,7 @@ Specifies the properties of the localized product.

            productKey

            -

            [ProductKey](#productkey)

            +

            ProductKey

            Identifier used on subsequent requests to get additional content including product descriptions, offline license, and download URLs.

            @@ -613,7 +613,7 @@ Specifies the properties of the localized product.

            alternateIds

            -

            collection of [AlternateIdentifier](#alternateidentifier)

            +

            collection of AlternateIdentifier

            The identifiers that can be used to instantiate the installation of on online application.

            @@ -623,13 +623,13 @@ Specifies the properties of the localized product.

            supportedPlatforms

            -

            collection of [ProductPlatform](#productplatform)

            +

            collection of ProductPlatform

            -  + ## ProductImage @@ -658,7 +658,7 @@ Specifies the properties of the product image.

            purpose

            string

            -

            Tag for the purpose of the image, e.g. "screenshot" or "logo".

            +

            Tag for the purpose of the image, e.g. "screenshot" or "logo".

            height

            @@ -678,12 +678,12 @@ Specifies the properties of the product image.

            backgroundColor

            string

            -

            Format "#RRGGBB"

            +

            Format "#RRGGBB"

            foregroundColor

            string

            -

            Format "#RRGGBB"

            +

            Format "#RRGGBB"

            fileSize

            @@ -693,7 +693,7 @@ Specifies the properties of the product image. -  + ## ProductKey @@ -727,7 +727,7 @@ Specifies the properties of the product key. -  + ## ProductPackageDetails @@ -748,7 +748,7 @@ Specifies the properties of the product key.

            frameworkDependencyPackages

            -

            collection of [FrameworkPackageDetails](#frameworkpackagedetails)

            +

            collection of FrameworkPackageDetails

            @@ -763,7 +763,7 @@ Specifies the properties of the product key.

            location

            -

            [PackageLocation](#packagelocation)

            +

            PackageLocation

            @@ -778,17 +778,17 @@ Specifies the properties of the product key.

            architectures

            -

            collection of [ProductArchitectures](#productarchitectures)

            +

            collection of ProductArchitectures

            Values {x86, x64, arm, neutral}

            packageFormat

            -

            [ProductPackageFormat](#productpackageformat)

            +

            ProductPackageFormat

            Extension of the package file.

            platforms

            -

            collection of [ProductPlatform](#productplatform)

            +

            collection of ProductPlatform

            @@ -804,7 +804,7 @@ Specifies the properties of the product key. -  + ## ProductPackageFormat @@ -831,7 +831,7 @@ Specifies the properties of the product key. -  + ## ProductPackageSet @@ -857,13 +857,13 @@ Specifies the properties of the product key.

            productPackages

            -

            collection of [ProductPackageDetails](#productpackagedetails)

            +

            collection of ProductPackageDetails

            A collection of application packages.

            -  + ## ProductPlatform @@ -886,16 +886,16 @@ Specifies the properties of the product key.

            minVersion

            -

            [VersionInfo](#versioninfo)

            +

            VersionInfo

            maxTestedVersion

            -

            [VersionInfo](#versioninfo)

            +

            VersionInfo

            -  + ## PublisherDetails @@ -929,7 +929,7 @@ Specifies the properties of the publisher details. -  + ## SeatAction @@ -953,7 +953,7 @@ Specifies the properties of the publisher details. -  + ## SeatDetails @@ -975,7 +975,7 @@ Specifies the properties of the publisher details.

            assignedTo

            string

            -

            Format = UPN (user@domain)

            +

            Format = UPN (user

            dateAssigned

            @@ -984,18 +984,18 @@ Specifies the properties of the publisher details.

            state

            -

            [SeatState](#seatstate)

            +

            SeatState

            productKey

            -

            [ProductKey](#productkey)

            +

            ProductKey

            -  + ## SeatDetailsResultSet @@ -1014,7 +1014,7 @@ Specifies the properties of the publisher details.

            seats

            -

            collection of [SeatDetails](#seatdetails)

            +

            collection of SeatDetails

            continuationToken

            @@ -1023,7 +1023,7 @@ Specifies the properties of the publisher details. -  + ## SeatState @@ -1047,7 +1047,7 @@ Specifies the properties of the publisher details. -  + ## SupportedProductPlatform @@ -1070,20 +1070,20 @@ Specifies the properties of the publisher details.

            minVersion

            -

            [VersionInfo](#versioninfo)

            +

            VersionInfo

            maxTestedVersion

            -

            [VersionInfo](#versioninfo)

            +

            VersionInfo

            architectures

            -

            collection of [ProductArchitecture](#productarchitecture)

            +

            collection of ProductArchitecture

            -  + ## VersionInfo diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index afde8f3ab7..c0c253a025 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/19/2018 --- @@ -28,7 +28,7 @@ An interior node to group all threats detected by Windows Defender. Supported operation is Get. -**Detections/****_ThreatId_** +**Detections/***ThreatId* The ID of a threat that has been detected by Windows Defender. Supported operation is Get. @@ -122,7 +122,7 @@ The following table describes the supported values: | 50 | Ransomware | | 51 | ASR Rule | -  + Supported operation is Get. diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md index 87906b1a14..d9e0290636 100644 --- a/windows/client-management/mdm/defender-ddf.md +++ b/windows/client-management/mdm/defender-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/12/2018 --- diff --git a/windows/client-management/mdm/design-a-custom-windows-csp.md b/windows/client-management/mdm/design-a-custom-windows-csp.md index 617adc067d..52c0a36f2f 100644 --- a/windows/client-management/mdm/design-a-custom-windows-csp.md +++ b/windows/client-management/mdm/design-a-custom-windows-csp.md @@ -11,7 +11,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -36,13 +36,13 @@ Nodes can represent anything from abstract concepts or collections (such as emai For example, a hypothetical Email configuration service provider might have these nodes: -- Account: The name of the email account (such as "Hotmail") +- Account: The name of the email account (such as "Hotmail") -- Username: The user name or email address ("exampleAccount@hotmail.com") +- Username: The user name or email address ("exampleAccount@hotmail.com") -- Password: The user's password +- Password: The user's password -- Server: The DNS address of the server ("mail-serv1-example.mail.hotmail.com") +- Server: The DNS address of the server ("mail-serv1-example.mail.hotmail.com") The `Account`, `Username`, and `Server` nodes would hold text-based information about the email account, the user's email address, and the server address associated with that account. The `Password` node, however, might hold a binary hash of the user's password. @@ -159,9 +159,9 @@ For internally transactioned nodes, the practice of implementing the contrary co -  + -  + diff --git a/windows/client-management/mdm/devdetail-csp.md b/windows/client-management/mdm/devdetail-csp.md index 7ee5f6c5b3..1fe3abbba1 100644 --- a/windows/client-management/mdm/devdetail-csp.md +++ b/windows/client-management/mdm/devdetail-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/11/2018 --- @@ -39,9 +39,9 @@ The following diagram shows the DevDetail configuration service provider managem

            Supported operation is Get. **FwV** -

            Required. Returns the firmware version, as defined in the registry key HKEY\_LOCAL\_MACHINE\\System\\Platform\\DeviceTargetingInfo\\PhoneFirmwareRevision. +

            Required. Returns the firmware version, as defined in the registry key HKEY_LOCAL_MACHINE\System\Platform\DeviceTargetingInfo\PhoneFirmwareRevision. -

            For Windows 10 for desktop editions (Home, Pro, Enterprise, and Education), it returns the BIOS version as defined in the registry key HKEY\_LOCAL\_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\\BIOSVersion. +

            For Windows 10 for desktop editions (Home, Pro, Enterprise, and Education), it returns the BIOS version as defined in the registry key HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion.

            Supported operation is Get. @@ -51,9 +51,9 @@ The following diagram shows the DevDetail configuration service provider managem

            Supported operation is Get. **HwV** -

            Required. Returns the hardware version, as defined in the registry key HKEY\_LOCAL\_MACHINE\\System\\Platform\\DeviceTargetingInfo\\PhoneRadioHardwareRevision. +

            Required. Returns the hardware version, as defined in the registry key HKEY_LOCAL_MACHINE\System\Platform\DeviceTargetingInfo\PhoneRadioHardwareRevision. -

            For Windows 10 for desktop editions, it returns the BIOS version as defined in the registry key HKEY\_LOCAL\_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\\BIOSVersion. +

            For Windows 10 for desktop editions, it returns the BIOS version as defined in the registry key HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion.

            Supported operation is Get. @@ -96,12 +96,12 @@ The following diagram shows the DevDetail configuration service provider managem

            Supported operation is Get. **Ext/Microsoft/OSPlatform** -

            Required. Returns the OS platform of the device. For Windows 10 for desktop editions, it returns the ProductName as defined in HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProductName. +

            Required. Returns the OS platform of the device. For Windows 10 for desktop editions, it returns the ProductName as defined in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName.

            Supported operation is Get. **Ext/Microsoft/ProcessorType** -

            Required. Returns the processor type of the device as documented in SYSTEM\_INFO. +

            Required. Returns the processor type of the device as documented in SYSTEM_INFO.

            Supported operation is Get. @@ -111,7 +111,7 @@ The following diagram shows the DevDetail configuration service provider managem

            Supported operation is Get. **Ext/Microsoft/Resolution** -

            Required. Returns the UI screen resolution of the device (example: "480x800"). +

            Required. Returns the UI screen resolution of the device (example: "480x800").

            Supported operation is Get. @@ -121,7 +121,7 @@ The following diagram shows the DevDetail configuration service provider managem

            Supported operation is Get. **Ext/Microsoft/ProcessorArchitecture** -

            Required. Returns the processor architecture of the device as "arm" or "x86". +

            Required. Returns the processor architecture of the device as "arm" or "x86".

            Supported operation is Get. @@ -197,9 +197,9 @@ Value type is string. Supported operation is Get. [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/devdetail-ddf-file.md b/windows/client-management/mdm/devdetail-ddf-file.md index e50c2f6693..cf446d6f9a 100644 --- a/windows/client-management/mdm/devdetail-ddf-file.md +++ b/windows/client-management/mdm/devdetail-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/11/2018 --- diff --git a/windows/client-management/mdm/developersetup-csp.md b/windows/client-management/mdm/developersetup-csp.md index 576088e972..0d4d601d86 100644 --- a/windows/client-management/mdm/developersetup-csp.md +++ b/windows/client-management/mdm/developersetup-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2018 --- @@ -17,7 +17,7 @@ ms.date: 06/26/2018 The DeveloperSetup configuration service provider (CSP) is used to configure Developer Mode on the device and connect to the Windows Device Portal. For more information about the Windows Device Portal, see [Windows Device Portal overview](https://msdn.microsoft.com/windows/uwp/debug-test-perf/device-portal). This CSP was added in Windows 10, version 1703. > [!NOTE] -The DeveloperSetup configuration service provider (CSP) is only supported in Windows 10 Holographic Enterprise edition and with runtime provisioning via provisioning packages. It is not supported in MDM. +> The DeveloperSetup configuration service provider (CSP) is only supported in Windows 10 Holographic Enterprise edition and with runtime provisioning via provisioning packages. It is not supported in MDM. The following diagram shows the DeveloperSetup configuration service provider in tree format. @@ -61,7 +61,7 @@ The user name must contain only ASCII characters and cannot contain a colon (:). **DevicePortal/Connection/HttpPort**

            An integer value that is used to configure the HTTP port for incoming connections to the Windows Device Portal service. -If authentication is enabled, **HttpPort** will redirect the user to the (required) **HttpsPort**. +If authentication is enabled, HttpPort will redirect the user to the (required) HttpsPort.

            The only supported operation is Replace. diff --git a/windows/client-management/mdm/developersetup-ddf.md b/windows/client-management/mdm/developersetup-ddf.md index 01b8ff9b57..40345355d5 100644 --- a/windows/client-management/mdm/developersetup-ddf.md +++ b/windows/client-management/mdm/developersetup-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/device-update-management.md b/windows/client-management/mdm/device-update-management.md index a202ad1f31..be9b52c3f1 100644 --- a/windows/client-management/mdm/device-update-management.md +++ b/windows/client-management/mdm/device-update-management.md @@ -9,7 +9,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 11/15/2017 --- @@ -146,7 +146,7 @@ The following diagram shows the Update policies in a tree format. > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -

            Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. +

            Added in Windows 10, version 1607. Allows the IT admin (when used with Update/ActiveHoursStart) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. > [!NOTE] > The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. @@ -171,7 +171,7 @@ The following diagram shows the Update policies in a tree format. > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -

            Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. +

            Added in Windows 10, version 1607. Allows the IT admin (when used with Update/ActiveHoursEnd) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. > [!NOTE] > The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. @@ -200,7 +200,7 @@ The following diagram shows the Update policies in a tree format. > [!IMPORTANT] > This option should be used only for systems under regulatory compliance, as you will not get security updates as well. -  +

            If the policy is not configured, end-users get the default behavior (Auto install and restart). @@ -290,7 +290,7 @@ The following diagram shows the Update policies in a tree format. **Update/DeferFeatureUpdatesPeriodInDays** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -

            Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +>

            Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.

            Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. @@ -322,9 +322,9 @@ The following diagram shows the Update policies in a tree format. - Update/RequireDeferUpgrade must be set to 1 - System/AllowTelemetry must be set to 1 or higher -

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

            If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. @@ -391,9 +391,9 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego

            Supported values are 0-8, which refers to the number of months to defer upgrades. -

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

            If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. **Update/EngagedRestartDeadline** > [!NOTE] @@ -496,14 +496,14 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego - 0 (default) – Deferrals are not paused. - 1 – Deferrals are paused. -

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

            If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +

            If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. **Update/PauseFeatureUpdates** > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -

            Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +>

            Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.

            Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. @@ -674,7 +674,7 @@ Example

            To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. -

            Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. +

            Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. > [!Note] > If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. @@ -703,11 +703,11 @@ The update approval list enables IT to approve individual updates and update cla > **Note**  For the Windows 10 build, the client may need to reboot after additional updates are added. -  + Supported operations are Get and Add. -**ApprovedUpdates/****_Approved Update Guid_** +**ApprovedUpdates/***Approved Update Guid* Specifies the update GUID. To auto-approve a class of updates, you can specify the [Update Classifications](https://go.microsoft.com/fwlink/p/?LinkId=526723) GUIDs. We strongly recommend to always specify the DefinitionsUpdates classification (E0789628-CE08-4437-BE74-2495B842F43B), which are used for anti-malware signatures. There are released periodically (several times a day). Some businesses may also want to auto-approve security updates to get them deployed quickly. @@ -730,7 +730,7 @@ Specifies the approved updates that failed to install on a device. Supported operation is Get. -**FailedUpdates/****_Failed Update Guid_** +**FailedUpdates/***Failed Update Guid* Update identifier field of the UpdateIdentity GUID that represent an update that failed to download or install. Supported operation is Get. @@ -750,7 +750,7 @@ The updates that are installed on the device. Supported operation is Get. -**InstalledUpdates/****_Installed Update Guid_** +**InstalledUpdates/***Installed Update Guid* UpdateIDs that represent the updates installed on a device. Supported operation is Get. @@ -760,7 +760,7 @@ The updates that are applicable and not yet installed on the device. This includ Supported operation is Get. -**InstallableUpdates/****_Installable Update Guid_** +**InstallableUpdates/***Installable Update Guid* Update identifiers that represent the updates applicable and not installed on a device. Supported operation is Get. @@ -784,7 +784,7 @@ The updates that require a reboot to complete the update session. Supported operation is Get. -**PendingRebootUpdates/****_Pending Reboot Update Guid_** +**PendingRebootUpdates/***Pending Reboot Update Guid* Update identifiers for the pending reboot state. Supported operation is Get. @@ -885,7 +885,7 @@ Here's the list of corresponding Group Policy settings in HKLM\\Software\\Polici

            -  + Here is the list of older policies that are still supported for backward compatibility. You can use these for Windows 10, version 1511 devices. @@ -904,7 +904,7 @@ For policies supported for Windows Update for Business, when you set policies fo For policies supported for Windows Update for Business, when you set 1511 policies on a device running 1607, the you will get the expected behavior for 1511 policies. -  + ## Update management user experience screenshot @@ -968,7 +968,7 @@ The following diagram and screenshots show the process flow of the device update ![mdm device update management screenshot](images/deviceupdatescreenshot3.png)![mdm device update management screenshot](images/deviceupdatescreenshot4.png)![mdm device update management screenshot](images/deviceupdatescreenshot5.png)![mdm device update management screenshot](images/deviceupdatescreenshot6.png)![mdm device update management screenshot](images/deviceupdatescreenshot7.png)![mdm device update management screenshot](images/deviceupdatescreenshot8.png)![mdm device update management screenshot](images/deviceupdatescreenshot9.png) -  + diff --git a/windows/client-management/mdm/deviceinstanceservice-csp.md b/windows/client-management/mdm/deviceinstanceservice-csp.md index 5c14ee1d22..c6e8ab6ccd 100644 --- a/windows/client-management/mdm/deviceinstanceservice-csp.md +++ b/windows/client-management/mdm/deviceinstanceservice-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -22,7 +22,7 @@ Stop using DeviceInstanceService CSP and use the updated [DeviceStatus CSP](devi The DeviceInstance CSP is only supported in Windows 10 Mobile. -  + The following diagram shows the DeviceInstanceService configuration service provider in tree format. @@ -110,9 +110,9 @@ Response from the phone. [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/devicelock-csp.md b/windows/client-management/mdm/devicelock-csp.md index cb8b185fef..2bece89b6c 100644 --- a/windows/client-management/mdm/devicelock-csp.md +++ b/windows/client-management/mdm/devicelock-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/devicelock-ddf-file.md b/windows/client-management/mdm/devicelock-ddf-file.md index a249ff3213..cc93e15019 100644 --- a/windows/client-management/mdm/devicelock-ddf-file.md +++ b/windows/client-management/mdm/devicelock-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/devicemanageability-csp.md b/windows/client-management/mdm/devicemanageability-csp.md index ad5d478635..a8dfc8baa9 100644 --- a/windows/client-management/mdm/devicemanageability-csp.md +++ b/windows/client-management/mdm/devicemanageability-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 11/01/2017 --- diff --git a/windows/client-management/mdm/devicemanageability-ddf.md b/windows/client-management/mdm/devicemanageability-ddf.md index bfa3efbdbd..68319351d5 100644 --- a/windows/client-management/mdm/devicemanageability-ddf.md +++ b/windows/client-management/mdm/devicemanageability-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/devicestatus-csp.md b/windows/client-management/mdm/devicestatus-csp.md index 08e97f0a6a..aa39a5d6ed 100644 --- a/windows/client-management/mdm/devicestatus-csp.md +++ b/windows/client-management/mdm/devicestatus-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 04/30/2019 --- @@ -38,9 +38,9 @@ Required. Node for queries on the SIM cards. > **Note**  Multiple SIMs are supported. -  + -**DeviceStatus/CellularIdentities/****_IMEI_** +**DeviceStatus/CellularIdentities/***IMEI* The unique International Mobile Station Equipment Identity (IMEI) number of the mobile device. An IMEI is present for each SIM card on the device. **DeviceStatus/CellularIdentities/*IMEI*/IMSI** @@ -76,7 +76,7 @@ Supported operation is Get. **DeviceStatus/NetworkIdentifiers** Node for queries on network and device properties. -**DeviceStatus/NetworkIdentifiers/****_MacAddress_** +**DeviceStatus/NetworkIdentifiers/***MacAddress* MAC address of the wireless network card. A MAC address is present for each network card on the device. **DeviceStatus/NetworkIdentifiers/*MacAddress*/IPAddressV4** diff --git a/windows/client-management/mdm/devicestatus-ddf.md b/windows/client-management/mdm/devicestatus-ddf.md index e8928bba41..5aa865e2d8 100644 --- a/windows/client-management/mdm/devicestatus-ddf.md +++ b/windows/client-management/mdm/devicestatus-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 03/12/2018 --- diff --git a/windows/client-management/mdm/devinfo-csp.md b/windows/client-management/mdm/devinfo-csp.md index 94796e03d6..ebaf036a85 100644 --- a/windows/client-management/mdm/devinfo-csp.md +++ b/windows/client-management/mdm/devinfo-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/devinfo-ddf-file.md b/windows/client-management/mdm/devinfo-ddf-file.md index 062bdb471f..f4c3cd2ec3 100644 --- a/windows/client-management/mdm/devinfo-ddf-file.md +++ b/windows/client-management/mdm/devinfo-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md b/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md index 21b2eaf642..43537416dd 100644 --- a/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md +++ b/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/25/2018 --- diff --git a/windows/client-management/mdm/diagnosticlog-csp.md b/windows/client-management/mdm/diagnosticlog-csp.md index a6c66fe387..5336d57012 100644 --- a/windows/client-management/mdm/diagnosticlog-csp.md +++ b/windows/client-management/mdm/diagnosticlog-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -51,7 +51,7 @@ The changes on **State**, **Keywords** and **TraceLevel** takes effect immediate > **Note**  Microsoft-WindowsPhone-Enterprise-Diagnostics-Provider (GUID - 3da494e4-0fe2-415C-b895-fb5265c5c83b) has the required debug resource files built into Windows OS, which will allow the logs files to be decoded on the remote machine. Any other logs may not have the debug resources required to decode. -  + ### Channel-based tracing @@ -114,7 +114,7 @@ Interior node to contain dynamic child interior nodes for active providers. The supported operation is Get. -**EtwLog/Collectors/****_CollectorName_** +**EtwLog/Collectors/***CollectorName* Dynamic nodes to represent active collector configuration. Supported operations are Add, Delete, and Get. @@ -174,7 +174,7 @@ The following table represents the possible values: | 0 | Stopped | | 1 | Started | -  + **EtwLog/Collectors/*CollectorName*/TraceLogFileMode** Specifies the log file logging mode. @@ -208,7 +208,7 @@ The following table lists the possible values: -  + **EtwLog/Collectors/*CollectorName*/TraceControl** Specifies the logging and report action state. @@ -222,7 +222,7 @@ The following table lists the possible values: | START | Start log tracing. | | STOP | Stop log tracing | -  + The supported operation is Execute. @@ -290,12 +290,12 @@ Interior node to contain dynamic child interior nodes for active providers. The supported operation is Get. -**EtwLog/Collectors/*CollectorName*/Providers/****_ProviderGUID_** +**EtwLog/Collectors/*CollectorName*/Providers/***ProviderGUID* Dynamic nodes to represent active provider configuration per provider GUID. > **Note**  Microsoft-WindowsPhone-Enterprise-Diagnostics-Provider (GUID - 3da494e4-0fe2-415C-b895-fb5265c5c83b) has the required debug resource files built into Windows OS, which will allow the logs files to be decoded on the remote machine. Any other logs may not have the debug resources required to decode. -  + Supported operations are Add, Delete, and Get. @@ -384,7 +384,7 @@ The following table lists the possible values. -  + Set provider **TraceLevel** @@ -495,7 +495,7 @@ The following table lists the possible values. Default value is TRUE. -  + Set provider **State** @@ -525,7 +525,7 @@ Interior node to contain dynamic child interior nodes for registered channels. The supported operation is Get. -**EtwLog/Channels/****_ChannelName_** +**EtwLog/Channels/***ChannelName* Dynamic nodes to represent a registered channel. The node name must be a valid Windows event log channel name, such as "Microsoft-Client-Licensing-Platform%2FAdmin" Supported operations are Add, Delete, and Get. @@ -655,7 +655,7 @@ The following table lists the possible values. -  + Get channel **State** @@ -734,7 +734,7 @@ Node to contain child nodes for log file transportation protocols and correspond **FileDownload/DMChannel** Node to contain child nodes using DM channel for transport protocol. -**FileDownload/DMChannel/****_FileContext_** +**FileDownload/DMChannel/***FileContext* Dynamic interior nodes that represents per log file context. **FileDownload/DMChannel/*FileContext*/BlockSizeKB** @@ -894,7 +894,7 @@ Get **BlockData** **FileDownload/DMChannel/*FileContext*/DataBlocks** Node to transfer the selected log file block to the DM server. -**FileDownload/DMChannel/*FileContext*/DataBlocks/****_BlockNumber_** +**FileDownload/DMChannel/*FileContext*/DataBlocks/***BlockNumber* The data type is Base64. The only supported operation is Get. @@ -911,9 +911,9 @@ The only supported operation is Get. 7. Increase **BlockIndexToRead** 8. Repeat step 5 to 7 until **BlockIndexToRead == (BlockIndexToRead – 1)** -  + -  + diff --git a/windows/client-management/mdm/diagnosticlog-ddf.md b/windows/client-management/mdm/diagnosticlog-ddf.md index 58435621ae..3478b5e5d9 100644 --- a/windows/client-management/mdm/diagnosticlog-ddf.md +++ b/windows/client-management/mdm/diagnosticlog-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/disconnecting-from-mdm-unenrollment.md b/windows/client-management/mdm/disconnecting-from-mdm-unenrollment.md index c7f0f8b58d..416d53867b 100644 --- a/windows/client-management/mdm/disconnecting-from-mdm-unenrollment.md +++ b/windows/client-management/mdm/disconnecting-from-mdm-unenrollment.md @@ -11,7 +11,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/dmacc-csp.md b/windows/client-management/mdm/dmacc-csp.md index 637d515a5e..52960d3977 100644 --- a/windows/client-management/mdm/dmacc-csp.md +++ b/windows/client-management/mdm/dmacc-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -19,7 +19,7 @@ The DMAcc configuration service provider allows an OMA Device Management (DM) ve > **Note**  This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_DEVICE\_MANAGEMENT\_ADMIN capabilities to be accessed from a network configuration application. -  + For the DMAcc CSP, you cannot use the Replace command unless the node already exists. @@ -64,7 +64,7 @@ Interior node for DM server address. Required. -**AppAddr/****_ObjectName_** +**AppAddr/***ObjectName* Required. Defines the OMA DM server address. Only one server address can be configured. When mapping the [w7 APPLICATION configuration service provider](w7-application-csp.md) to the DMAcc Configuration Service Provider, the name of this element is "1". This is the first DM address encountered in the w7 APPLICATION configuration service provider, other DM accounts are ignored. @@ -86,7 +86,7 @@ Interior node for port information. Optional. -**Port/****_ObjectName_** +**Port/***ObjectName* Required. Only one port number can be configured. When mapping the [w7 APPLICATION configuration service provider](w7-application-csp.md) to the DMAcc Configuration Service Provider, the name of this element is "1". @@ -108,7 +108,7 @@ Value type is string. Supported operations are Add, Get, and Replace. ***AccountUID*/AppAuth** Optional. Defines authentication settings. -**AppAuth/****_ObjectName_** +**AppAuth/***ObjectName* Required. Defines one set of authentication settings. When mapping the [w7 APPLICATION configuration service provider](w7-application-csp.md) to the DMAcc Configuration Service Provider, the name of this element is same name as the AAuthLevel value ("CLRED" or "SRVCRED"). @@ -258,7 +258,7 @@ Stores specifies which certificate stores the DM client will search to find the > **Note**   %EF%80%80 is the UTF8-encoded character U+F000. -  + Subject specifies the certificate to search for. For example, to specify that you want a certificate with a particular Subject attribute (“CN=Tester,O=Microsoft”), use the following: @@ -279,9 +279,9 @@ Supported operations are Add, and Replace. [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/dmacc-ddf-file.md b/windows/client-management/mdm/dmacc-ddf-file.md index b6adaadd2e..08a6e0517f 100644 --- a/windows/client-management/mdm/dmacc-ddf-file.md +++ b/windows/client-management/mdm/dmacc-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index 1579736e04..61f105479e 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 11/01/2017 --- @@ -37,7 +37,7 @@ Required. The root node for all settings that belong to a single management serv Supported operation is Get. -**Provider/****_ProviderID_** +**Provider/***ProviderID* Required. This node contains the URI-encoded value of the bootstrapped device management account’s Provider ID. Scope is dynamic. This value is set and controlled by the MDM server. As a best practice, use text that doesn’t require XML/URI escaping. For Intune, use **MS DM Server** for Windows desktop or **SCConfigMgr** for Windows mobile for the _ProviderID_. @@ -57,14 +57,14 @@ Supported operations are Get and Add. > **Note**   Although hardware device IDs are guaranteed to be unique, there is a concern that this is not ultimately enforceable during a DM session. The device ID could be changed through the w7 APPLICATION configuration service provider’s **USEHWDEVID** parm by another management server. So during enterprise bootstrap and enrollment, a new device ID is specified by the enterprise server. This node is required and must be set by the server before the client certificate renewal is triggered. -  + **Provider/*ProviderID*/ExchangeID** Optional. Character string that contains the unique Exchange device ID used by the Outlook account of the user the session is running against. This is useful for the enterprise management server to correlate and merge records for a device that is managed by exchange and natively managed by a dedicated management server. > **Note**  In some cases for the desktop, this node will return "not found" until the user sets up their email. -  + Supported operation is Get. @@ -101,7 +101,7 @@ Required. The character string that contains the device management server addres > **Note**  When the ManagementServerAddressList value is set, the device ignores the value in ManagementServiceAddress. -  + The DMClient configuration service provider will save the address to the same location as the w7 and DMS configuration service providers to ensure the management client has a single place to retrieve the current server address. The initial value for this node is the same server address value as bootstrapped via the [w7 APPLICATION configuration service provider](w7-application-csp.md). @@ -148,7 +148,7 @@ This node is only supported in Windows 10 and later. Once you set the value to 2.0, it will not go back to 1.0. -  + Supported operations are Get, Replace, and Delete. @@ -227,7 +227,7 @@ Added in Windows 10, version 1607. The list of management server URLs in the fo > **Note**  The < and > should be escaped. -  + ``` syntax @@ -322,7 +322,7 @@ If there is no infinite schedule set, then a 24-hour schedule is created and sch -  + **Valid poll schedule: initial enrollment only \[no infinite schedule\]** @@ -373,13 +373,13 @@ If there is no infinite schedule set, then a 24-hour schedule is created and sch -  + **Invalid poll schedule: disable all poll schedules** > **Note**   Disabling poll schedules results in UNDEFINED behavior and enrollment may fail if poll schedules are all set to zero. -  + @@ -428,7 +428,7 @@ If there is no infinite schedule set, then a 24-hour schedule is created and sch
            -  + **Invalid poll schedule: two infinite schedules** @@ -487,7 +487,7 @@ If there is no infinite schedule set, then a 24-hour schedule is created and sch -  + If the device was previously enrolled in MDM with polling schedule configured via registry key values directly, the MDM server that supports using DMClient CSP to update polling schedule must first send an Add command to add a **./Vendor/MSFT/DMClient/Enrollment/<ProviderID>/Poll** node before it sends a Get/Replace command to query or update polling parameters via DMClient CSP @@ -624,7 +624,7 @@ The status error mapping is listed below. -  + **Provider/*ProviderID*/CustomEnrollmentCompletePage** Optional. Added in Windows 10, version 1703. @@ -791,9 +791,9 @@ The following SyncML shows how to remotely unenroll the device. Note that this c [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/dmclient-ddf-file.md b/windows/client-management/mdm/dmclient-ddf-file.md index 5c4188f573..fe540b8745 100644 --- a/windows/client-management/mdm/dmclient-ddf-file.md +++ b/windows/client-management/mdm/dmclient-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md index df8680a620..e915f4d790 100644 --- a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md +++ b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md @@ -18,7 +18,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -46,16 +46,16 @@ Microsoft recommends that this function is not used to configure the following t > **Note**  The **DMProcessConfigXMLFiltered** function has full functionality in Windows 10 Mobile and Windows Phone 8.1, but it has a read-only functionality in Windows 10 desktop. -  + ## Syntax ```C++ HRESULT STDAPICALLTYPE DMProcessConfigXMLFiltered( -        LPCWSTR pszXmlIn, -  const WCHAR   **rgszAllowedCspNode, -  const DWORD   dwNumAllowedCspNodes, -        BSTR    *pbstrXmlOut + LPCWSTR pszXmlIn, + const WCHAR   **rgszAllowedCspNode, + const DWORD   dwNumAllowedCspNodes, + BSTR    *pbstrXmlOut ); ``` @@ -63,25 +63,25 @@ HRESULT STDAPICALLTYPE DMProcessConfigXMLFiltered( *pszXmlIn*

              -
            • \[in\] The null–terminated input XML buffer containing the configuration data. The parameter holds the XML that will be used to configure the phone. **DMProcessConfigXMLFiltered** accepts only OMA Client Provisioning XML (also known as WAP provisioning). It does not accept OMA DM SyncML XML (also known as SyncML).
            • +
            • [in] The null–terminated input XML buffer containing the configuration data. The parameter holds the XML that will be used to configure the phone. DMProcessConfigXMLFiltered accepts only OMA Client Provisioning XML (also known as WAP provisioning). It does not accept OMA DM SyncML XML (also known as SyncML).

            *rgszAllowedCspNode*
              -
            • \[in\] Array of **WCHAR\*** that specify which configuration service provider nodes are allowed to be invoked.
            • +
            • [in] Array of WCHAR\* that specify which configuration service provider nodes are allowed to be invoked.

            *dwNumAllowedCspNodes*
              -
            • \[in\] Number of elements passed in *rgszAllowedCspNode*.
            • +
            • [in] Number of elements passed in rgszAllowedCspNode.

            *pbstrXmlOut*
              -
            • \[out\] The resulting null–terminated XML from configuration. The caller of **DMProcessConfigXMLFiltered** is responsible for cleanup of the output buffer that the *pbstrXmlOut* parameter references. Use [**SysFreeString**](https://msdn.microsoft.com/library/windows/hardware/ms221481) to free the memory.
            • +
            • [out] The resulting null–terminated XML from configuration. The caller of DMProcessConfigXMLFiltered is responsible for cleanup of the output buffer that the pbstrXmlOut parameter references. Use SysFreeString to free the memory.

            @@ -126,7 +126,7 @@ Returns the standard **HRESULT** value **S\_OK** to indicate success. The follow -  + ## Remarks @@ -136,20 +136,20 @@ The usage of **DMProcessConfigXMLFiltered** depends on the configuration service ``` XML -    -        -            -            -            -            -            -        -    -    -        -            -        -    + + + + + + + + + + + + + + ``` @@ -158,8 +158,8 @@ Then, the second parameter in the call to **DMProcessConfigXMLFiltered** would h ``` C++ LPCWSTR rgszAllowedCspNodes[] = { -    L"NAPDEF", -    L"BrowserFavorite" + L"NAPDEF", + L"BrowserFavorite" }; ``` @@ -172,18 +172,18 @@ WCHAR szProvxmlContent[] = L"..."; BSTR bstr = NULL; HRESULT hr = DMProcessConfigXMLFiltered( -                szProvxmlContent, -                rgszAllowedCspNodes, -                _countof(rgszAllowedCspNodes), -                &bstr -                ); + szProvxmlContent, + rgszAllowedCspNodes, + _countof(rgszAllowedCspNodes), + &bstr + ); /* check error */ if ( bstr != NULL ) { -    SysFreeString( bstr ); -    bstr = NULL; + SysFreeString( bstr ); + bstr = NULL; } ``` @@ -226,7 +226,7 @@ if ( bstr != NULL ) [**SysFreeString**](https://msdn.microsoft.com/library/windows/hardware/ms221481) -  + diff --git a/windows/client-management/mdm/dmsessionactions-csp.md b/windows/client-management/mdm/dmsessionactions-csp.md index 9b53d8eb7b..c8c2490a37 100644 --- a/windows/client-management/mdm/dmsessionactions-csp.md +++ b/windows/client-management/mdm/dmsessionactions-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 ms.reviewer: manager: dansimp @@ -28,25 +28,25 @@ The following diagram shows the DMSessionActions configuration service provider **./Device/Vendor/MSFT/DMSessionActions or ./User/Vendor/MSFT/DMSessionActions**

            Defines the root node for the DMSessionActions configuration service provider.

            -**_ProviderID_** +***ProviderID***

            Group settings per device management (DM) server. Each group of settings is distinguished by the Provider ID of the server. It must be the same DM server Provider ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process. Only one enterprise management server is supported, which means that there should be only one ProviderID node under NodeCache.

            Scope is dynamic. Supported operations are Get, Add, and Delete.

            -**_ProviderID_/CheckinAlertConfiguration** +***ProviderID*/CheckinAlertConfiguration**

            Node for the custom configuration of alerts to be sent during MDM sync session.

            -**_ProviderID_/CheckinAlertConfiguration/Nodes** +***ProviderID*/CheckinAlertConfiguration/Nodes**

            Required. Root node for URIs to be queried. Scope is dynamic.

            Supported operation is Get.

            -**_ProviderID_/CheckinAlertConfiguration/Nodes/_NodeID_** +***ProviderID*/CheckinAlertConfiguration/Nodes/*NodeID***

            Required. Information about each node is stored under NodeID as specified by the server. This value must not contain a comma. Scope is dynamic.

            Supported operations are Get, Add, and Delete.

            -**_ProviderID_/CheckinAlertConfiguration/Nodes/_NodeID_/NodeURI** +***ProviderID*/CheckinAlertConfiguration/Nodes/*NodeID*/NodeURI**

            Required. The value is a complete OMA DM node URI. It can specify either an interior node or a leaf node in the device management tree. Scope is dynamic.

            Value type is string. Supported operations are Add, Get, Replace, and Delete.

            diff --git a/windows/client-management/mdm/dmsessionactions-ddf.md b/windows/client-management/mdm/dmsessionactions-ddf.md index a30991d792..73f1b3bd8f 100644 --- a/windows/client-management/mdm/dmsessionactions-ddf.md +++ b/windows/client-management/mdm/dmsessionactions-ddf.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/dynamicmanagement-csp.md b/windows/client-management/mdm/dynamicmanagement-csp.md index 4892360b02..d4ae55a285 100644 --- a/windows/client-management/mdm/dynamicmanagement-csp.md +++ b/windows/client-management/mdm/dynamicmanagement-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/dynamicmanagement-ddf.md b/windows/client-management/mdm/dynamicmanagement-ddf.md index ee4f5c1d50..535ff0c740 100644 --- a/windows/client-management/mdm/dynamicmanagement-ddf.md +++ b/windows/client-management/mdm/dynamicmanagement-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/eap-configuration.md b/windows/client-management/mdm/eap-configuration.md index 7a291be7b0..f5c142c001 100644 --- a/windows/client-management/mdm/eap-configuration.md +++ b/windows/client-management/mdm/eap-configuration.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/email2-csp.md b/windows/client-management/mdm/email2-csp.md index 4a699697da..1971fbca41 100644 --- a/windows/client-management/mdm/email2-csp.md +++ b/windows/client-management/mdm/email2-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/email2-ddf-file.md b/windows/client-management/mdm/email2-ddf-file.md index 4be32a6c7b..b0f92b1548 100644 --- a/windows/client-management/mdm/email2-ddf-file.md +++ b/windows/client-management/mdm/email2-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md b/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md index 3c266d7857..bfee22a337 100644 --- a/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md +++ b/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 11/01/2017 ms.reviewer: manager: dansimp @@ -93,135 +93,135 @@ See [Support Tip: Ingesting Office ADMX-backed policies using Microsoft Intune]( In this example, the policy is in **Administrative Templates > System > App-V > Publishing**. - 1. Double-click **Publishing Server 2 Settings** to see the parameters you need to configure when you enable this policy. + 1. Double-click **Publishing Server 2 Settings** to see the parameters you need to configure when you enable this policy. - ![Enable publishing server 2 policy](images/admx-appv-publishingserver2.png) + ![Enable publishing server 2 policy](images/admx-appv-publishingserver2.png) - ![Enable publishing server 2 settings](images/admx-app-v-enablepublishingserver2settings.png) + ![Enable publishing server 2 settings](images/admx-app-v-enablepublishingserver2settings.png) - 2. Find the variable names of the parameters in the ADMX file. + 2. Find the variable names of the parameters in the ADMX file. - You can find the ADMX file name in the policy description in Policy CSP. In this example, the filename appv.admx is listed in [AppVirtualization/PublishingAllowServer2](policy-configuration-service-provider.md#appvirtualization-publishingallowserver2). + You can find the ADMX file name in the policy description in Policy CSP. In this example, the filename appv.admx is listed in [AppVirtualization/PublishingAllowServer2](policy-configuration-service-provider.md#appvirtualization-publishingallowserver2). - ![Publishing server 2 policy description](images/admx-appv-policy-description.png) + ![Publishing server 2 policy description](images/admx-appv-policy-description.png) - 3. Navigate to **C:\Windows\PolicyDefinitions** (default location of the admx files) and open appv.admx. + 3. Navigate to **C:\Windows\PolicyDefinitions** (default location of the admx files) and open appv.admx. - 4. Search for GP name **Publishing_Server2_policy**. + 4. Search for GP name **Publishing_Server2_policy**. - 5. Under **policy name="Publishing_Server2_Policy"** you can see the \ listed. The text id and enum id represents the data id you need to include in the SyncML data payload. They correspond to the fields you see in GP Editor. + 5. Under **policy name="Publishing_Server2_Policy"** you can see the \ listed. The text id and enum id represents the data id you need to include in the SyncML data payload. They correspond to the fields you see in GP Editor. - Here is the snippet from appv.admx: + Here is the snippet from appv.admx: - ``` syntax - - + ``` syntax + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - ``` + + ``` - 6. From the \ tag, copy all the text id and enum id and create an XML with data id and value fields. The value field contains the configuration settings you would enter in the GP Editor. + 6. From the \ tag, copy all the text id and enum id and create an XML with data id and value fields. The value field contains the configuration settings you would enter in the GP Editor. - Here is the example XML for Publishing_Server2_Policy : + Here is the example XML for Publishing_Server2_Policy : - ``` syntax - - - - - - - - - - - ``` + ``` syntax + + + + + + + + + + + ``` - 7. Create the SyncML to enable the policy. Payload contains \ and name/value pairs. + 7. Create the SyncML to enable the policy. Payload contains \ and name/value pairs. - Here is the example for **AppVirtualization/PublishingAllowServer2**: + Here is the example for **AppVirtualization/PublishingAllowServer2**: > [!Note] > The \ payload must be XML encoded. To avoid encoding, you can use CData if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). If you are using Intune, select String as the data type. diff --git a/windows/client-management/mdm/enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md b/windows/client-management/mdm/enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md index 7756ef487e..b177cf578b 100644 --- a/windows/client-management/mdm/enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md +++ b/windows/client-management/mdm/enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index 9e718811af..c6cbf4062b 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 10/04/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/enterprise-app-management.md b/windows/client-management/mdm/enterprise-app-management.md index 7bed4a4f9d..42c5475d1f 100644 --- a/windows/client-management/mdm/enterprise-app-management.md +++ b/windows/client-management/mdm/enterprise-app-management.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/22/2017 --- @@ -51,7 +51,7 @@ Inventory is specific to the package full name and lists bundled packs and resou > **Note**  On Windows 10 Mobile, XAP packages have the product ID in place of both the package family name and package full name. -  + Here are the nodes for each package full name: - Name @@ -303,14 +303,14 @@ If you purchased an app from the Store for Business and the app is specified for Here are the requirements for this scenario: -- The location of the app can be a local files system (C:\\StagedApps\\app1.appx), a UNC path (\\\\server\\share\\app1.apx), or an HTTPS location (https://contoso.com/app1.appx\_ -- The user must have permission to access the content location. For HTTPs, you can use server authentication or certificate authentication using a certificate associated with the enrollment. HTTP locations are supported, but not recommended because of lack of authentication requirements. -- The device does not need to have connectivity to the Microsoft Store, store services, or the have the Microsoft Store UI be enabled. -- The user must be logged in, but association with AAD identity is not required. +- The location of the app can be a local files system (C:\\StagedApps\\app1.appx), a UNC path (\\\\server\\share\\app1.apx), or an HTTPS location (https://contoso.com/app1.appx\_ +- The user must have permission to access the content location. For HTTPs, you can use server authentication or certificate authentication using a certificate associated with the enrollment. HTTP locations are supported, but not recommended because of lack of authentication requirements. +- The device does not need to have connectivity to the Microsoft Store, store services, or the have the Microsoft Store UI be enabled. +- The user must be logged in, but association with AAD identity is not required. > **Note**  You must unlock the device to deploy nonStore apps or you must deploy the app license before deploying the offline apps. For details, see [Deploy an offline license to a user](#deploy-an-offline-license-to-a-user). -  + The Add command for the package family name is required to ensure proper removal of the app at unenrollment. Here is an example of a line-of-business app installation. @@ -420,18 +420,18 @@ Provisioning allows you to stage the app to the device and all users of the devi Here are the requirements for this scenario: -- The location of the app can be the local files system (C:\\StagedApps\\app1.appx), a UNC path (\\\\server\\share\\app1.apx), or an HTTPS location (https://contoso.com/app1.appx\_ -- The user must have permission to access the content location. For HTTPs, you can use server authentication or certificate authentication using a certificate associated with the enrollment. HTTP locations are supported, but not recommended because of lack of authentication requirements. -- The device does not need to have connectivity to the Microsoft Store, or store services enabled. -- The device does not need any AAD identity or domain membership. -- For nonStore app, your device must be unlocked. -- For Store offline apps, the required licenses must be deployed prior to deploying the apps. +- The location of the app can be the local files system (C:\\StagedApps\\app1.appx), a UNC path (\\\\server\\share\\app1.apx), or an HTTPS location (https://contoso.com/app1.appx\_ +- The user must have permission to access the content location. For HTTPs, you can use server authentication or certificate authentication using a certificate associated with the enrollment. HTTP locations are supported, but not recommended because of lack of authentication requirements. +- The device does not need to have connectivity to the Microsoft Store, or store services enabled. +- The device does not need any AAD identity or domain membership. +- For nonStore app, your device must be unlocked. +- For Store offline apps, the required licenses must be deployed prior to deploying the apps. To provision app for all users of a device from a hosted location, the management server performs an Add and Exec command on the AppInstallation node in the device context. The Add command for the package family name is required to ensure proper removal of the app at unenrollment. > **Note**  When you remove the provisioned app, it will not remove it from the users that already installed the app. -  + Here is an example of app installation. @@ -626,7 +626,7 @@ You can remove provisioned apps from a device for a specific version or for all > **Note**  You can only remove an app that has an inventory value IsProvisioned = 1. -  + Removing provisioned app occurs in the device context. Here is an example for removing a provisioned app from a device. @@ -827,7 +827,7 @@ In Windows 10 Mobile IT administrators can set a policy to restrict user applic > **Note**  The feature is only for Windows 10 Mobile. -  + The RestrictAppDataToSystemVolume policy in [Policy CSP](policy-configuration-service-provider.md) enables you to restrict all user application data to stay on the system volume. When the policy is not configured or if it is disabled, and you move a package or when it is installed to a difference volume, then the user application data will moved to the same volume. You can set this policy to 0 (off, default) or 1. Here is an example. @@ -899,7 +899,7 @@ Here is an example. ``` -  + diff --git a/windows/client-management/mdm/enterpriseapn-csp.md b/windows/client-management/mdm/enterpriseapn-csp.md index 249f445de9..29b5d5bdd5 100644 --- a/windows/client-management/mdm/enterpriseapn-csp.md +++ b/windows/client-management/mdm/enterpriseapn-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/22/2017 --- @@ -17,7 +17,7 @@ ms.date: 09/22/2017 The EnterpriseAPN configuration service provider (CSP) is used by the enterprise to provision an APN for the Internet. > [!Note] -Starting in Windows 10, version 1703 the EnterpriseAPN CSP is supported in Windows 10 Home, Pro, Enterprise, and Education editions. +> Starting in Windows 10, version 1703 the EnterpriseAPN CSP is supported in Windows 10 Home, Pro, Enterprise, and Education editions. The following image shows the EnterpriseAPN configuration service provider in tree format. @@ -26,7 +26,7 @@ The following image shows the EnterpriseAPN configuration service provider in tr **EnterpriseAPN**

            The root node for the EnterpriseAPN configuration service provider.

            -**EnterpriseAPN/****_ConnectionName_** +**EnterpriseAPN/***ConnectionName*

            Name of the connection as seen by Windows Connection Manager.

            Supported operations are Add, Get, Delete, and Replace.

            @@ -52,7 +52,7 @@ The following image shows the EnterpriseAPN configuration service provider in tr

            Supported operations are Add, Get, Delete, and Replace.

            **EnterpriseAPN/*ConnectionName*/ClassId** -

            GUID that defines the APN class to the modem. This is the same as the OEMConnectionId in CM\_CellularEntries CSP. Normally this setting is not present. It is only required when IsAttachAPN is true and the attach APN is not only used as the Internet APN.

            +

            GUID that defines the APN class to the modem. This is the same as the OEMConnectionId in CM_CellularEntries CSP. Normally this setting is not present. It is only required when IsAttachAPN is true and the attach APN is not only used as the Internet APN.

            Supported operations are Add, Get, Delete, and Replace.

            @@ -278,9 +278,9 @@ atomicZ [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/enterpriseapn-ddf.md b/windows/client-management/mdm/enterpriseapn-ddf.md index 11bc724620..1d9abd598e 100644 --- a/windows/client-management/mdm/enterpriseapn-ddf.md +++ b/windows/client-management/mdm/enterpriseapn-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enterpriseappmanagement-csp.md b/windows/client-management/mdm/enterpriseappmanagement-csp.md index e9ccd4bc7d..34a8571486 100644 --- a/windows/client-management/mdm/enterpriseappmanagement-csp.md +++ b/windows/client-management/mdm/enterpriseappmanagement-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -19,7 +19,7 @@ The EnterpriseAppManagement enterprise configuration service provider is used to > **Note**   The EnterpriseAppManagement CSP is only supported in Windows 10 Mobile. -  + The following diagram shows the EnterpriseAppManagement configuration service provider in tree format. @@ -57,7 +57,7 @@ Supported operations are Get and Add. > **Note**   Do NOT use Subject=CN%3DB1C43CD0-1624-5FBB-8E54-34CF17DFD3A1\\x00. The server must replace this value in the supplied client certificate. If your server returns a client certificate containing the same Subject value, this can cause unexpected behavior. The server should always override the subject value and not use the default device-provided Device ID Subject= Subject=CN%3DB1C43CD0-1624-5FBB-8E54-34CF17DFD3A1\\x00 -  + ***EnterpriseID*/Status** Required. The integer value that indicates the current status of the application enrollment. Valid values are 0 (ENABLED), 1 (INSTALL\_DISABLED), 2 (REVOKED), and 3 (INVALID). Scope is dynamic. @@ -79,7 +79,7 @@ Required. The root node for individual enterprise application inventory settings Supported operation is Get. -**/Inventory/****_ProductID_** +**/Inventory/***ProductID* Optional. A node that contains s single enterprise application product ID in GUID format. Scope is dynamic. Supported operation is Get. @@ -109,7 +109,7 @@ Required. This node groups application download-related parameters. The enterpri Supported operation is Get. -**/Download/****_ProductID_** +**/Download/***ProductID* Optional. This node contains the GUID for the installed enterprise application. Each installed application has a unique ID. Scope is dynamic. Supported operations are Get, Add, and Replace. @@ -168,12 +168,12 @@ Required. The integer value that indicates the status of the current download pr

            7:DOWNLOAD_FAILED

            -

            Unable to connect to server, file doesn't exist, etc.

            +

            Unable to connect to server, file doesn't exist, etc.

            -  + Scope is dynamic. Supported operations are Get, Add, and Replace. @@ -438,11 +438,11 @@ Install or update the installed app with the product ID “{B316008A-141D-4A79-8 To perform an XAP update, create the Name, URL, Version, and DownloadInstall nodes first, then perform an “execute” on the “DownloadInstall” node (all within an “Atomic” operation). If the application does not exist, the application will be silently installed without any user interaction. If the application cannot be installed, the user will be notified with an Alert dialog. > **Note**   -1. If a previous app-update node existed for this product ID (the node can persist for up to 1 week or 7 days after an installation has completed), then a 418 (already exist) error would be returned on the “Add”. To get around the 418 error, the server should issue a Replace command for the Name, URL, and Version nodes, and then execute on the “DownloadInstall” (within an “Atomic” operation). +> 1. If a previous app-update node existed for this product ID (the node can persist for up to 1 week or 7 days after an installation has completed), then a 418 (already exist) error would be returned on the “Add”. To get around the 418 error, the server should issue a Replace command for the Name, URL, and Version nodes, and then execute on the “DownloadInstall” (within an “Atomic” operation). -2. The application product ID curly braces need to be escaped where { is %7B and } is %7D. +2. The application product ID curly braces need to be escaped where { is %7B and } is %7D. -  + ``` syntax @@ -535,9 +535,9 @@ Uninstall an installed enterprise application with product ID “{7BB316008A-141 [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/enterpriseappvmanagement-csp.md b/windows/client-management/mdm/enterpriseappvmanagement-csp.md index db6ba1d443..03c5e1ef06 100644 --- a/windows/client-management/mdm/enterpriseappvmanagement-csp.md +++ b/windows/client-management/mdm/enterpriseappvmanagement-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 ms.reviewer: manager: dansimp @@ -26,47 +26,47 @@ The following diagram shows the EnterpriseAppVManagement configuration service p

            Used to query App-V package information (post-publish).

            **AppVPackageManagement/EnterpriseID** -

            Used to query package information. Value is always "HostedInstall".

            +

            Used to query package information. Value is always "HostedInstall".

            **AppVPackageManagement/EnterpriseID/PackageFamilyName**

            Package ID of the published App-V package.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName***

            Version ID of the published App-V package.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/Name** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/Name**

            Name specified in the published AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/Version** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/Version**

            Version specified in the published AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/Publisher** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/Publisher**

            Publisher as specified in the published asset information of the AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/InstallLocation** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/InstallLocation**

            Local package path specified in the published asset information of the AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/InstallDate** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/InstallDate**

            Date the app was installed, as specified in the published asset information of the AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/Users** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/Users**

            Registered users for app, as specified in the published asset information of the AppV package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/AppVPackageId** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/AppVPackageId**

            Package ID of the published App-V package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/AppVVersionId** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/AppVVersionId**

            Version ID of the published App-V package.

            Value type is string. Supported operation is Get.

            -**AppVPackageManagement/_EnterpriseID_/_PackageFamilyName_/_PackageFullName_/AppVPackageUri** +**AppVPackageManagement/*EnterpriseID*/*PackageFamilyName*/*PackageFullName*/AppVPackageUri**

            Package URI of the published App-V package.

            Value type is string. Supported operation is Get.

            @@ -103,9 +103,8 @@ The following diagram shows the EnterpriseAppVManagement configuration service p - SYN\C_PROGRESS_UNPUBLISH_PACKAGES (4) - App-V packages unpublish in progress.

            Value type is string. Supported operation is Get.

            - -**AppVPublishing/LastSync/SyncProgress** -

            Latest sync state. One of the following values may be returned:

            + +AppVPublishing/LastSync/SyncProgress

            Latest sync state. One of the following values may be returned:

            - SYNC\_STATUS_IDLE (0) - App-V Sync is idle. - SYNC\_STATUS\_PUBLISH_STARTED (1) - App-V Sync is initializing. @@ -119,17 +118,17 @@ The following diagram shows the EnterpriseAppVManagement configuration service p

            Used to perform App-V synchronization.

            **AppVPublishing/Sync/PublishXML** -

            Used to execute the App-V synchronization using the Publishing protocol. For more information about the protocol see [[MS-VAPR]: Virtual Application Publishing and Reporting (App-V) Protocol](https://msdn.microsoft.com/library/mt739986.aspx).

            +

            Used to execute the App-V synchronization using the Publishing protocol. For more information about the protocol see [MS-VAPR]: Virtual Application Publishing and Reporting (App-V) Protocol.

            Supported operations are Get, Delete, and Execute.

            **AppVDynamicPolicy**

            Used to set App-V Policy Configuration documents for publishing packages.

            -**AppVDynamicPolicy/_ConfigurationId_** +**AppVDynamicPolicy/*ConfigurationId***

            ID for App-V Policy Configuration document for publishing packages (referenced in the Publishing protocol document).

            -**AppVDynamicPolicy/_ConfigurationId_/Policy** +**AppVDynamicPolicy/*ConfigurationId*/Policy**

            XML for App-V Policy Configuration documents for publishing packages.

            Value type is xml. Supported operations are Add, Get, Delete, and Replace.

            diff --git a/windows/client-management/mdm/enterpriseappvmanagement-ddf.md b/windows/client-management/mdm/enterpriseappvmanagement-ddf.md index aff8c33766..49a8f17488 100644 --- a/windows/client-management/mdm/enterpriseappvmanagement-ddf.md +++ b/windows/client-management/mdm/enterpriseappvmanagement-ddf.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/enterpriseassignedaccess-csp.md b/windows/client-management/mdm/enterpriseassignedaccess-csp.md index 59abfb78fd..0416e3badf 100644 --- a/windows/client-management/mdm/enterpriseassignedaccess-csp.md +++ b/windows/client-management/mdm/enterpriseassignedaccess-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/12/2017 --- @@ -596,7 +596,7 @@ The following sample file contains configuration for enabling tile manipulation. Entry | Description ----------- | ------------ CSP Runner | Allows CSPs to be executed on the device per user role. You can use this to implement role specific policies, such as changing the color scheme when an admin logs on the device, or to set configurations per role. -  + **LockscreenWallpaper/** The parent node of the lock screen-related parameters that let administrators query and manage the lock screen image on devices. Supported operations are Add, Delete, Get and Replace. @@ -722,7 +722,7 @@ The accent color to apply as the foreground color for tiles, controls, and other -  + Supported operations are Get and Replace. @@ -1168,7 +1168,7 @@ Supported operations are Get and Replace.

            2500

            -

            UTC+13 Nuku'alofa

            +

            UTC+13 Nuku'alofa

            @@ -1190,7 +1190,7 @@ The XML examples in this section show how to perform various tasks by using OMA > **Note**  These examples are XML snippets and do not include all sections that are required for a complete lockdown XML file. -  + ### Assigned Access settings @@ -1198,12 +1198,12 @@ The following example shows how to add a new policy. ``` syntax -    -      "/> -    + + + "/> + + ``` @@ -1213,11 +1213,11 @@ The following example shows how to specify the language to display on the device ``` syntax -    -      + + -    + ``` @@ -1253,22 +1253,22 @@ The following example shows how to change the accent color to one of the standar ``` syntax -    -       -         1 -          -             -             ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID -             -             -               int -             -             -            7 -          -       -       -    + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID + + + int + + + 7 + + + + ``` @@ -1276,22 +1276,22 @@ The following example shows how to change the theme. ``` syntax -    -       -           1 -           -               -                   ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeBackground -               -               -                   int -               -               -               1 -           -       -       -    + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeBackground + + + int + + + 1 + + + + ``` @@ -1299,19 +1299,19 @@ The following example shows how to set a custom theme accent color for the enter ``` syntax -    -      1 -       -          -             ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID -          -          -            int -          -          -         151 -       -    + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Theme/ThemeAccentColorID + + + int + + + 151 + + 2 @@ -1335,17 +1335,17 @@ Use the examples in this section to set a new lock screen and manage the lock sc ``` syntax 2 -    -      ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName -    -      chr -      text/plain -    -    c:\windows\system32\lockscreen\480x800\Wallpaper_015.jpg -    + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + chr + text/plain + + c:\windows\system32\lockscreen\480x800\Wallpaper_015.jpg + + ``` @@ -1353,12 +1353,12 @@ The following example shows how to query the device for the file being used as t ``` syntax 2 -    -      ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName -    + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + ``` @@ -1366,22 +1366,22 @@ The following example shows how to change the existing lock screen image to one ``` syntax -    -       -         2 -          -             -               ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName -             -             -               chr -               text/plain -             -            c:\windows\system32\lockscreen\480x800\Wallpaper_015.jpg -          -       -       -    + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/LockScreenWallpaper/BGFileName + + + chr + text/plain + + c:\windows\system32\lockscreen\480x800\Wallpaper_015.jpg + + + + ``` @@ -1391,21 +1391,21 @@ The following example shows how to set the time zone to UTC-07 Mountain Time (US ``` syntax -    -       -         2 -          -             -               ./Vendor/MSFT/EnterpriseAssignedAccess/Clock/TimeZone -             -             -               int -             -            500 -          -       -       -    + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Clock/TimeZone + + + int + + 500 + + + + ``` @@ -1413,21 +1413,21 @@ The following example shows how to set the time zone to Pacific Standard Time (U ``` syntax -    -       -         2 -          -             -               ./Vendor/MSFT/EnterpriseAssignedAccess/Clock/TimeZone -             -             -               int -             -            400  -          -       -       -    + + + 2 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Clock/TimeZone + + + int + + 400  + + + + ``` @@ -1437,21 +1437,21 @@ The following example shows how to set the language. ``` syntax -    -       -         1 -          -             -               ./Vendor/MSFT/EnterpriseAssignedAccess/Locale/Language -             -             -               int -             -            1033 -          -       -       -    + + + 1 + + + ./Vendor/MSFT/EnterpriseAssignedAccess/Locale/Language + + + int + + 1033 + + + + ``` @@ -1667,11 +1667,11 @@ The following table lists the product ID and AUMID for each app that is included -  + -  + -  + diff --git a/windows/client-management/mdm/enterpriseassignedaccess-ddf.md b/windows/client-management/mdm/enterpriseassignedaccess-ddf.md index d297f21aa8..d1f0ed0a9f 100644 --- a/windows/client-management/mdm/enterpriseassignedaccess-ddf.md +++ b/windows/client-management/mdm/enterpriseassignedaccess-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enterpriseassignedaccess-xsd.md b/windows/client-management/mdm/enterpriseassignedaccess-xsd.md index 9c2289785c..b71be0c522 100644 --- a/windows/client-management/mdm/enterpriseassignedaccess-xsd.md +++ b/windows/client-management/mdm/enterpriseassignedaccess-xsd.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/enterprisedataprotection-csp.md b/windows/client-management/mdm/enterprisedataprotection-csp.md index c894556adf..725444b2b6 100644 --- a/windows/client-management/mdm/enterprisedataprotection-csp.md +++ b/windows/client-management/mdm/enterprisedataprotection-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 08/09/2017 --- @@ -20,7 +20,7 @@ The EnterpriseDataProtection configuration service provider (CSP) is used to con >- To make WIP functional the AppLocker CSP and the network isolation specific settings must also be configured. For more information, see [AppLocker CSP](applocker-csp.md) and NetworkIsolation policies in [Policy CSP](policy-configuration-service-provider.md). >- This CSP was added in Windows 10, version 1607. -  + While WIP has no hard dependency on VPN, for best results you should configure VPN profiles first before you configure the WIP policies. For VPN best practice recommendations, see [VPNv2 CSP](vpnv2-csp.md). @@ -52,13 +52,13 @@ The following diagram shows the EnterpriseDataProtection CSP in tree format.

            Supported operations are Add, Get, Replace and Delete. Value type is integer. **Settings/EnterpriseProtectedDomainNames** -

            A list of domains used by the enterprise for its user identities separated by pipes ("|").The first domain in the list must be the primary enterprise ID, that is, the one representing the managing authority for WIP. User identities from one of these domains is considered an enterprise managed account and data associated with it should be protected. For example, the domains for all email accounts owned by the enterprise would be expected to appear in this list. Attempts to change this value will fail when the WIP cleanup is running. +

            A list of domains used by the enterprise for its user identities separated by pipes ("|").The first domain in the list must be the primary enterprise ID, that is, the one representing the managing authority for WIP. User identities from one of these domains is considered an enterprise managed account and data associated with it should be protected. For example, the domains for all email accounts owned by the enterprise would be expected to appear in this list. Attempts to change this value will fail when the WIP cleanup is running.

            Changing the primary enterprise ID is not supported and may cause unexpected behavior on the client. > **Note**  The client requires domain name to be canonical, otherwise the setting will be rejected by the client. -  +

            Here are the steps to create canonical domain names: @@ -97,7 +97,7 @@ The following diagram shows the EnterpriseDataProtection CSP in tree format. > **Note**  This setting is only supported in Windows 10 Mobile. -  +

            Supported operations are Add, Get, Replace and Delete. Value type is integer. @@ -113,122 +113,122 @@ The binary blob is the serialized version of following structure: // //  Recovery Policy Data Structures // -  + typedef struct _RECOVERY_POLICY_HEADER { -    USHORT      MajorRevision; -    USHORT      MinorRevision; -    ULONG       RecoveryKeyCount; + USHORT      MajorRevision; + USHORT      MinorRevision; + ULONG       RecoveryKeyCount; } RECOVERY_POLICY_HEADER, *PRECOVERY_POLICY_HEADER; -  + typedef struct _RECOVERY_POLICY_1_1    { -        RECOVERY_POLICY_HEADER  RecoveryPolicyHeader; -        RECOVERY_KEY_1_1        RecoveryKeyList[1]; + RECOVERY_POLICY_HEADER  RecoveryPolicyHeader; + RECOVERY_KEY_1_1        RecoveryKeyList[1]; }   RECOVERY_POLICY_1_1, *PRECOVERY_POLICY_1_1; -  + #define EFS_RECOVERY_POLICY_MAJOR_REVISION_1   (1) #define EFS_RECOVERY_POLICY_MINOR_REVISION_0   (0) -  + #define EFS_RECOVERY_POLICY_MINOR_REVISION_1   (1) -  + /////////////////////////////////////////////////////////////////////////////// //                                                                            / //  RECOVERY_KEY Data Structure                                               / //                                                                            / /////////////////////////////////////////////////////////////////////////////// -  + // // Current format of recovery data. // -  + typedef struct _RECOVERY_KEY_1_1   { -        ULONG               TotalLength; -        EFS_PUBLIC_KEY_INFO PublicKeyInfo; + ULONG               TotalLength; + EFS_PUBLIC_KEY_INFO PublicKeyInfo; } RECOVERY_KEY_1_1, *PRECOVERY_KEY_1_1; -  -  + + typedef struct _EFS_PUBLIC_KEY_INFO { -  -    // -    // The length of this entire structure, including string data -    // appended to the end. The length should be a multiple of 8 for -    // 64 bit alignment -    // -  -    ULONG Length; -  -    // -    // Sid of owner of the public key (regardless of format). -   // This field is to be treated as a hint only. -    // -  -    ULONG PossibleKeyOwner; -  -    // -    // Contains information describing how to interpret -    // the public key information -    // -  -    ULONG KeySourceTag; -  -    union { -  -        struct { -  -            // -            // The following fields contain offsets based at the -            // beginning of the structure.  Each offset is to -            // a NULL terminated WCHAR string. -            // -  -            ULONG ContainerName; -            ULONG ProviderName; -  -            // -            // The exported public key used to encrypt the FEK. -            // This field contains an offset from the beginning of the -            // structure. -            // -  -            ULONG PublicKeyBlob; -  -            // -            // Length of the PublicKeyBlob in bytes -            // -  -            ULONG PublicKeyBlobLength; -  -        } ContainerInfo; -  -        struct { -  -            ULONG CertificateLength;       // in bytes -            ULONG Certificate;             // offset from start of structure -  -        } CertificateInfo; -  -  -        struct { -  -            ULONG ThumbprintLength;        // in bytes -            ULONG CertHashData;            // offset from start of structure -  -        } CertificateThumbprint; -    }; -  -  -  + + // + // The length of this entire structure, including string data + // appended to the end. The length should be a multiple of 8 for + // 64 bit alignment + // + + ULONG Length; + + // + // Sid of owner of the public key (regardless of format). + // This field is to be treated as a hint only. + // + + ULONG PossibleKeyOwner; + + // + // Contains information describing how to interpret + // the public key information + // + + ULONG KeySourceTag; + + union { + + struct { + + // + // The following fields contain offsets based at the + // beginning of the structure.  Each offset is to + // a NULL terminated WCHAR string. + // + + ULONG ContainerName; + ULONG ProviderName; + + // + // The exported public key used to encrypt the FEK. + // This field contains an offset from the beginning of the + // structure. + // + + ULONG PublicKeyBlob; + + // + // Length of the PublicKeyBlob in bytes + // + + ULONG PublicKeyBlobLength; + + } ContainerInfo; + + struct { + + ULONG CertificateLength;       // in bytes + ULONG Certificate;             // offset from start of structure + + } CertificateInfo; + + + struct { + + ULONG ThumbprintLength;        // in bytes + ULONG CertHashData;            // offset from start of structure + + } CertificateThumbprint; + }; + + + } EFS_PUBLIC_KEY_INFO, *PEFS_PUBLIC_KEY_INFO; -  + // // Possible KeyTag values // -  + typedef enum _PUBLIC_KEY_SOURCE_TAG { -    EfsCryptoAPIContainer = 1, -    EfsCertificate, -    EfsCertificateThumbprint + EfsCryptoAPIContainer = 1, + EfsCertificate, + EfsCertificateThumbprint } PUBLIC_KEY_SOURCE_TAG, *PPUBLIC_KEY_SOURCE_TAG; -  + ```

            For EFSCertificate KeyTag, it is expected to be a DER ENCODED binary certificate. @@ -236,7 +236,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {

            Supported operations are Add, Get, Replace and Delete. Value type is base-64 encoded certificate. **Settings/RevokeOnUnenroll** -

            This policy controls whether to revoke the WIP keys when a device unenrolls from the management service. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after unenrollment. If the keys are not revoked, there will be no revoked file cleanup subsequently. Prior to sending the unenroll command, when you want a device to do a selective wipe when it is unenrolled, then you should explicitly set this policy to 1. +

            This policy controls whether to revoke the WIP keys when a device unenrolls from the management service. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after unenrollment. If the keys are not revoked, there will be no revoked file cleanup subsequently. Prior to sending the unenroll command, when you want a device to do a selective wipe when it is unenrolled, then you should explicitly set this policy to 1.

            The following list shows the supported values: @@ -246,7 +246,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {

            Supported operations are Add, Get, Replace and Delete. Value type is integer. **Settings/RevokeOnMDMHandoff** -

            Added in Windows 10, version 1703. This policy controls whether to revoke the WIP keys when a device upgrades from MAM to MDM. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after upgrade. This is recommended if the MDM service is configured with the same WIP EnterpriseID as the MAM service. +

            Added in Windows 10, version 1703. This policy controls whether to revoke the WIP keys when a device upgrades from MAM to MDM. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after upgrade. This is recommended if the MDM service is configured with the same WIP EnterpriseID as the MAM service. - 0 - Don't revoke keys - 1 (dafault) - Revoke keys @@ -267,7 +267,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {

            Supported operations are Add, Get, Replace and Delete. Value type is integer. **Settings/SMBAutoEncryptedFileExtensions** -

            Added in Windows 10, version 1703. Specifies a list of file extensions, so that files with these extensions are encrypted when copying from an SMB share within the corporate boundary as defined in the Policy CSP nodes for [NetworkIsolation/EnterpriseIPRange](policy-configuration-service-provider.md#networkisolation-enterpriseiprange) and [NetworkIsolation/EnterpriseNetworkDomainNames](policy-configuration-service-provider.md#networkisolation-enterprisenetworkdomainnames). Use semicolon (;) delimiter in the list. +

            Added in Windows 10, version 1703. Specifies a list of file extensions, so that files with these extensions are encrypted when copying from an SMB share within the corporate boundary as defined in the Policy CSP nodes for NetworkIsolation/EnterpriseIPRange and NetworkIsolation/EnterpriseNetworkDomainNames. Use semicolon (;) delimiter in the list.

            When this policy is not specified, the existing auto-encryption behavior is applied. When this policy is configured, only files with the extensions in the list will be encrypted.

            Supported operations are Add, Get, Replace and Delete. Value type is string. @@ -317,7 +317,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG { -  +

            Bit 0 indicates whether WIP is on or off. @@ -325,7 +325,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {

            Bit 3 indicates whether the mandatory WIP policies are configured. If one or more of the mandatory WIP policies are not configured, the bit 3 is set to 0 (zero). -

            Here's the list of mandatory WIP policies: +

            Here's the list of mandatory WIP policies: - EDPEnforcementLevel in EnterpriseDataProtection CSP - DataRecoveryCertificate in EnterpriseDataProtection CSP @@ -337,9 +337,9 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {

            Supported operation is Get. Value type is integer. -  + -  + diff --git a/windows/client-management/mdm/enterprisedataprotection-ddf-file.md b/windows/client-management/mdm/enterprisedataprotection-ddf-file.md index b2bf6ad7d0..ba56cffc06 100644 --- a/windows/client-management/mdm/enterprisedataprotection-ddf-file.md +++ b/windows/client-management/mdm/enterprisedataprotection-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md b/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md index 1e31fb63b0..a8d02b09c0 100644 --- a/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md +++ b/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/11/2017 --- @@ -29,7 +29,7 @@ The root node for the EnterpriseDesktopAppManagement configuration service provi **MSI** Node for all settings. -**MSI/****_ProductID_** +**MSI/***ProductID* The MSI product code for the application. **MSI/*ProductID*/Version** @@ -86,7 +86,7 @@ Status of the application. Value type is string. Supported operation is Get. | Enforcement Failed | 60 | | Enforcement Completed | 70 | -  + **MSI/*ProductID*/LastError** The last error code during the application installation process. This is typically stored as an HRESULT format. Depending on what was occurring when the error happened, this could be the result of executing MSIExec.exe or the error result from an API that failed. @@ -136,7 +136,7 @@ The following table describes the fields in the previous sample: | CmdID | Input value used to reference the request. Responses will include this value which can be used to match request and response. | | LocURI | Path to Win32 CSP command processor. | -  + **SyncML to perform MSI operations for application uninstall** @@ -164,7 +164,7 @@ The following table describes the fields in the previous sample: | CmdID | Input value used to reference the request. Responses will include this value which can be used to match request and response. | | LocURI | Path to Win32 CSP command processor, including the Product ID (in this example, 1803A630-3C38-4D2B-9B9A-0CB37243539C) property escaped for XML formatting. | -  + **SyncML to perform MSI operations for application status reporting** @@ -192,7 +192,7 @@ The following table describes the fields in the previous sample: | CmdID | Input value used to reference the request. Responses will include this value which can be used to match request and response. | | LocURI | Path to Win32 CSP command processor, including the Product ID (in this example, 1803A630-3C38-4D2B-9B9A-0CB37243539C) property escaped for XML formatting. | -  + **SyncML to perform MSI install operations for an application targeted to a specific user on the device. The Add command is required to preceed the Exec command.** @@ -282,11 +282,11 @@ The following table describes the fields in the previous sample: -  + > **Note**  Information status on the MSI job will be reported using standard OMA-DM notification mechanism. The status reported is represented using standard MSIEXEC return codes as HRESULT as defined in the MSIEXEC topic on Microsoft TechNet at . -  + **SyncML to perform MSI install operations for an application targeted to all users on the device (per-device installation)** @@ -407,7 +407,7 @@ The following table MsiInstallJob describes the schema elements. -  + Here is an example of a common response to a request @@ -479,7 +479,7 @@ For Intune standalone environment, the MSI package will determine the MSI execut -  + The following table applies to SCCM hybrid environment. @@ -520,7 +520,7 @@ The following table applies to SCCM hybrid environment. -  + ## How to determine the package type from the MSI package @@ -558,9 +558,9 @@ Here's a list of references: ``` -  + -  + diff --git a/windows/client-management/mdm/enterprisedesktopappmanagement-ddf-file.md b/windows/client-management/mdm/enterprisedesktopappmanagement-ddf-file.md index ab251ba2e5..b398685592 100644 --- a/windows/client-management/mdm/enterprisedesktopappmanagement-ddf-file.md +++ b/windows/client-management/mdm/enterprisedesktopappmanagement-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md b/windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md index 343c4f9241..f010fb161f 100644 --- a/windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md +++ b/windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/enterpriseext-csp.md b/windows/client-management/mdm/enterpriseext-csp.md index 3d33bb910b..db803ea8c5 100644 --- a/windows/client-management/mdm/enterpriseext-csp.md +++ b/windows/client-management/mdm/enterpriseext-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/enterpriseext-ddf.md b/windows/client-management/mdm/enterpriseext-ddf.md index 6910078cd8..2595b3dd28 100644 --- a/windows/client-management/mdm/enterpriseext-ddf.md +++ b/windows/client-management/mdm/enterpriseext-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enterpriseextfilessystem-csp.md b/windows/client-management/mdm/enterpriseextfilessystem-csp.md index d12545a344..a661803173 100644 --- a/windows/client-management/mdm/enterpriseextfilessystem-csp.md +++ b/windows/client-management/mdm/enterpriseextfilessystem-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -19,7 +19,7 @@ The EnterpriseExtFileSystem configuration service provider (CSP) allows IT admin > **Note**  The EnterpriseExtFileSystem CSP is only supported in Windows 10 Mobile. -  + File contents are embedded directly into the syncML message, so there is a limit to the size of the file that can be retrieved from the device. The default limit is 0x100000 (1 MB). You can configure this limit by using the following registry key: **Software\\Microsoft\\Provisioning\\CSPs\\.\\Vendor\\MSFT\\EnterpriseExtFileSystem\\MaxFileReadSize**. @@ -33,32 +33,32 @@ The following list describes the characteristics and parameters.

            The root node for the EnterpriseExtFileSystem configuration service provider. Supported operations are Add and Get.

            **Persistent** -

            The EnterpriseExtFileSystem CSP allows an enterprise to read, write, delete and list files in this folder. When an app writes data to the Persistent folder, it accesses that data from the EnterpriseExtFileSystem\\Persistent node. Files written to the Persistent folder persists over ordinary power cycles.

            +

            The EnterpriseExtFileSystem CSP allows an enterprise to read, write, delete and list files in this folder. When an app writes data to the Persistent folder, it accesses that data from the EnterpriseExtFileSystem\Persistent node. Files written to the Persistent folder persists over ordinary power cycles.

            > **Important**  There is a limit to the amount of data that can be persisted, which varies depending on how much disk space is available on one of the partitions. This data cap amount (that can be persisted) varies by manufacturer. - -  - +> +> +> > **Note**   When the IT admin triggers a **doWipePersistProvisionedData** action using [RemoteWipe CSP](remotewipe-csp.md), items stored in the Persistent folder are persisted over wipe and restored when the device boots again. The contents are not persisted if a **doWipe** action is triggered. -  + **NonPersistent** -

            The EnterpriseExtFileSystem CSP allows an enterprise to read, write, delete and list files in this folder. When an app writes data to the Non-Persistent folder, it accesses that data from the EnterpriseExtFileSystem\\NonPersistent node. Files written to the NonPersistent folder will persist over ordinary power cycles.

            +

            The EnterpriseExtFileSystem CSP allows an enterprise to read, write, delete and list files in this folder. When an app writes data to the Non-Persistent folder, it accesses that data from the EnterpriseExtFileSystem\NonPersistent node. Files written to the NonPersistent folder will persist over ordinary power cycles.

            When the device is wiped, any data stored in the NonPersistent folder is deleted.

            **OemProfile** -

            Added in Windows 10, version 1511. The EnterpriseExtFileSystem CSP allows an enterprise to deploy an OEM profile on the device, such as a barcode scanner profile then can be consumed by the OEM barcode scanner driver. The file is placed into the \\data\\shareddata\\oem\\public\\profile\\ folder of the device.

            +

            Added in Windows 10, version 1511. The EnterpriseExtFileSystem CSP allows an enterprise to deploy an OEM profile on the device, such as a barcode scanner profile then can be consumed by the OEM barcode scanner driver. The file is placed into the \data\shareddata\oem\public\profile\ folder of the device.

            ***Directory*** -

            The name of a directory in the device file system. Any *Directory* node can have directories and files as child nodes.

            +

            The name of a directory in the device file system. Any Directory node can have directories and files as child nodes.

            Use the Add command to create a new directory. You cannot use it to add a new directory under a file system root.

            -

            Use the Get command to return the list of child node names under *Directory*.

            +

            Use the Get command to return the list of child node names under Directory.

            -

            Use the Get command with ?List=Struct to recursively return all child node names, including subdirectory names, under *Directory*.

            +

            Use the Get command with ?List=Struct to recursively return all child node names, including subdirectory names, under Directory.

            ***Filename***

            The name of a file in the device file system.

            @@ -119,9 +119,9 @@ The following example shows how to push a file to the device. ``` -  + -  + diff --git a/windows/client-management/mdm/enterpriseextfilesystem-ddf.md b/windows/client-management/mdm/enterpriseextfilesystem-ddf.md index 89f03fde28..86dc28c67d 100644 --- a/windows/client-management/mdm/enterpriseextfilesystem-ddf.md +++ b/windows/client-management/mdm/enterpriseextfilesystem-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 --- diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md index 8355510b3f..cdadc5ca2d 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 08/27/2018 --- @@ -30,7 +30,7 @@ The following image shows the EnterpriseModernAppManagement configuration servic For user context, use **./User/Vendor/MSFT** path and for device context, use **./Device/Vendor/MSFT** path. > [!Note] -> Windows Holographic and Windows 10 Mobile only support per-user configuration of the EnterpriseModernAppManagement CSP. +> Windows Holographic and Windows 10 Mobile only support per-user configuration of the EnterpriseModernAppManagement CSP. **AppManagement** Required. Used for inventory and app management (post-install). @@ -46,7 +46,7 @@ Required. Reports the last error code returned by the update scan. Supported operation is Get. **AppManagement/AppInventoryResults** -Added in Windows 10, version 1511. Required. Returns the results for app inventory that was created after the AppInventoryQuery operation. +Added in Windows 10, version 1511. Required. Returns the results for app inventory that was created after the AppInventoryQuery operation. Supported operation is Get. @@ -64,7 +64,7 @@ Here's an example of AppInventoryResults operation. ``` **AppManagement/AppInventoryQuery** -Added in Windows 10, version 1511. Required. Specifies the query for app inventory. +Added in Windows 10, version 1511. Required. Specifies the query for app inventory. Query parameters: @@ -129,8 +129,7 @@ Parameters:
        • User (optional): Specifies the SID of the particular user for whom to remove the package; only the package for the specified user can be removed.
        • -
        - +

      Supported operation is Execute. The following example removes a package for all users: @@ -198,7 +197,7 @@ Added in Windows 10, version 1809. Returns the last user release ID on the devic Value type is string. Supported operation is Get. -**.../****_PackageFamilyName_** +**.../***PackageFamilyName* Optional. Package family name (PFN) of the app. There is one for each PFN on the device when reporting inventory. These items are rooted under their signing origin. Supported operations are Get and Delete. @@ -226,7 +225,7 @@ Here's an example for uninstalling an app: ``` -**.../*PackageFamilyName*/****_PackageFullName_** +**.../*PackageFamilyName*/***PackageFullName* Optional. Full name of the package installed. Supported operations are Get and Delete. @@ -234,7 +233,7 @@ Supported operations are Get and Delete. > [!Note] > XAP files use a product ID in place of PackageFullName. Here's an example of XAP product ID (including the braces), {12345678-9012-3456-7890-123456789012}. -  + **.../*PackageFamilyName*/*PackageFullName*/Name** Required. Name of the app. Value type is string. @@ -263,7 +262,7 @@ Required. Install location of the app on the device. Value type is string. > [!Note] > Not applicable to XAP files. -  + Supported operation is Get. **.../*PackageFamilyName*/*PackageFullName*/IsFramework** @@ -272,7 +271,7 @@ Required. Whether or not the app is a framework package. Value type is int. The > [!Note] > Not applicable to XAP files. - Supported operation is Get. + Supported operation is Get. **.../*PackageFamilyName*/*PackageFullName*/IsBundle** Required. The value is 1 if the package is an app bundle and 0 (zero) for all other cases. Value type is int. @@ -289,7 +288,7 @@ Required. Resource ID of the app. This is null for the main app, ~ for a bundle, > [!Note] > Not applicable to XAP files. -  + Supported operation is Get. **.../*PackageFamilyName*/*PackageFullName*/PackageStatus** @@ -311,7 +310,7 @@ Required. Specifies whether the package state has changed and requires a reinsta > [!Note] > Not applicable to XAP files. -  + Supported operation is Get. **.../*PackageFamilyName*/*PackageFullName*/Users** @@ -335,10 +334,10 @@ Required. Specifies whether you want to block a specific app from being updated Supported operations are Add, Get, Delete, and Replace. **.../*PackageFamilyName*/AppSettingPolicy** (only for ./User/Vendor/MSFT) -Added in Windows 10, version 1511. Interior node for all managed app setting values. This node is only supported in the user context. +Added in Windows 10, version 1511. Interior node for all managed app setting values. This node is only supported in the user context. -**.../*PackageFamilyName*/AppSettingPolicy/****_SettingValue_** (only for ./User/Vendor/MSFT) -Added in Windows 10, version 1511. The *SettingValue* and data represent a key value pair to be configured for the app. The node represents the name of the key and the data represents the value. You can find this value in LocalSettings in the Managed.App.Settings container. +**.../*PackageFamilyName*/AppSettingPolicy/***SettingValue* (only for ./User/Vendor/MSFT) +Added in Windows 10, version 1511. The *SettingValue* and data represent a key value pair to be configured for the app. The node represents the name of the key and the data represents the value. You can find this value in LocalSettings in the Managed.App.Settings container. This setting only works for apps that support the feature and it is only supported in the user context. @@ -400,8 +399,8 @@ NonRemovable requires admin permission. This can only be set per device, not per Value type is integer. Supported operations are Add, Get, and Replace. Valid values: -- 0 – app is not in the nonremovable app policy list -- 1 – app is included in the nonremovable app policy list +- 0 – app is not in the nonremovable app policy list +- 1 – app is included in the nonremovable app policy list **Examples:** @@ -469,7 +468,7 @@ Data 1 = app is in the app policy list **AppInstallation** Required node. Used to perform app installation. -**AppInstallation/****_PackageFamilyName_** +**AppInstallation/***PackageFamilyName* Optional node. Package family name (PFN) of the app. There is one for each PFN on the device when reporting inventory. These items are rooted under their signing origin. Supported operations are Get and Add. @@ -477,7 +476,7 @@ Supported operations are Get and Add. > [!Note] > XAP files use a product ID in place of PackageFamilyName. Here's an example of XAP product ID (including the braces), {12345678-9012-3456-7890-123456789012}. -  + **AppInstallation/*PackageFamilyName*/StoreInstall** Required. Command to perform an install of an app and a license from the Microsoft Store. @@ -496,7 +495,7 @@ Supported operation is Get. > [!Note] > This element is not present after the app is installed. -  + **AppInstallation/*PackageFamilyName*/LastErrorDescription** Required. Description of last error relating to the app installation. @@ -506,7 +505,7 @@ Supported operation is Get. > [!Note] > This element is not present after the app is installed. -  + **AppInstallation/*PackageFamilyName*/Status** Required. Status of app installation. The following values are returned: @@ -520,7 +519,7 @@ Supported operation is Get. > [!Note] > This element is not present after the app is installed. -  + **AppInstallation/*PackageFamilyName*/ProgessStatus** Required. An integer the indicates the progress of the app installation. For https locations, this indicates the download progress. ProgressStatus is not available for provisioning and it is only for user-based installations. In provisioning, the value is always 0 (zero). @@ -529,20 +528,20 @@ Supported operation is Get. > [!Note] > This element is not present after the app is installed. -  + **AppLicenses** Required node. Used to manage licenses for app scenarios. **AppLicenses/StoreLicenses** Required node. Used to manage licenses for store apps. -**AppLicenses/StoreLicenses/****_LicenseID_** +**AppLicenses/StoreLicenses/***LicenseID* Optional node. License ID for a store installed app. The license ID is generally the PFN of the app. Supported operations are Add, Get, and Delete. **AppLicenses/StoreLicenses/*LicenseID*/LicenseCategory** -Added in Windows 10, version 1511. Required. Category of license that is used to classify various license sources. Valid value: +Added in Windows 10, version 1511. Required. Category of license that is used to classify various license sources. Valid value: - Unknown - unknown license category - Retail - license sold through retail channels, typically from the Microsoft Store @@ -553,7 +552,7 @@ Added in Windows 10, version 1511. Required. Category of license that is used Supported operation is Get. **AppLicenses/StoreLicenses/*LicenseID*/LicenseUsage** -Added in Windows 10, version 1511. Required. Indicates the allowed usage for the license. Valid values: +Added in Windows 10, version 1511. Required. Indicates the allowed usage for the license. Valid values: - Unknown - usage is unknown - Online - the license is only valid for online usage. This is for applications with concurrence requirements, such as an app used on several computers, but can only be used on one at any given time. @@ -563,7 +562,7 @@ Added in Windows 10, version 1511. Required. Indicates the allowed usage for t Supported operation is Get. **AppLicenses/StoreLicenses/*LicenseID*/RequesterID** -Added in Windows 10, version 1511. Required. Identifier for the entity that requested the license, such as the client who acquired the license. For example, all licenses issued by the Store for Business for a particular enterprise client has the same RequesterID. +Added in Windows 10, version 1511. Required. Identifier for the entity that requested the license, such as the client who acquired the license. For example, all licenses issued by the Store for Business for a particular enterprise client has the same RequesterID. Supported operation is Get. @@ -573,7 +572,7 @@ Required. Command to add license. Supported operation is Execute. **AppLicenses/StoreLicenses/*LicenseID*/GetLicenseFromStore** -Added in Windows 10, version 1511. Required. Command to get license from the store. +Added in Windows 10, version 1511. Required. Command to get license from the store. Supported operation is Execute. @@ -600,7 +599,7 @@ The result contains a list of apps, such as \App1/App2/App\. Subsequent query for a specific app for its properties. ``` syntax - + 1 @@ -623,9 +622,9 @@ Subsequent query for a specific app for its properties. [Configuration service provider reference](configuration-service-provider-reference.md) -  - -  + + + diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md index fb4f856c50..803f46cf73 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/27/2018 --- diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-xsd.md b/windows/client-management/mdm/enterprisemodernappmanagement-xsd.md index f6e58a18dc..936f55389a 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-xsd.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-xsd.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- diff --git a/windows/client-management/mdm/euiccs-csp.md b/windows/client-management/mdm/euiccs-csp.md index 30ff5e4bdf..22341aa348 100644 --- a/windows/client-management/mdm/euiccs-csp.md +++ b/windows/client-management/mdm/euiccs-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 03/02/2018 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/euiccs-ddf-file.md b/windows/client-management/mdm/euiccs-ddf-file.md index 496ada00d8..0f282ff7df 100644 --- a/windows/client-management/mdm/euiccs-ddf-file.md +++ b/windows/client-management/mdm/euiccs-ddf-file.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 03/02/2018 --- diff --git a/windows/client-management/mdm/federated-authentication-device-enrollment.md b/windows/client-management/mdm/federated-authentication-device-enrollment.md index dc4af9f7d2..2ff5dbb9e0 100644 --- a/windows/client-management/mdm/federated-authentication-device-enrollment.md +++ b/windows/client-management/mdm/federated-authentication-device-enrollment.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 07/28/2017 --- @@ -37,7 +37,7 @@ The discovery web service provides the configuration information necessary for a > **Note**  The administrator of the discovery service must create a host with the address enterpriseenrollment.*domain\_name*.com. -  + The automatic discovery flow of the device uses the domain name of the email address that was submitted to the Workplace settings screen during sign in. The automatic discovery system constructs a URI that uses this hostname by appending the subdomain “enterpriseenrollment” to the domain of the email address, and by appending the path “/EnrollmentServer/Discovery.svc”. For example, if the email address is “sample@contoso.com”, the resulting URI for first Get request would be: http://enterpriseenrollment.contoso.com/EnrollmentServer/Discovery.svc @@ -133,7 +133,7 @@ The discovery response is in the XML format and includes the following fields: > **Note**  The HTTP server response must not set Transfer-Encoding to Chunked; it must be sent as one message. -  + When authentication policy is set to be Federated, Web Authentication Broker (WAB) will be leveraged by the enrollment client to get a security token. The WAB start page URL is provided by the discovery service in the response message. The enrollment client will call the WAB API within the response message to start the WAB process. WAB pages are server hosted web pages. The server should build those pages to fit the device screen nicely and be as consistent as possible to other builds in the MDM enrollment UI. The opaque security token that is returned from WAB as an endpage will be used by the enrollment client as the device security secret during the client certificate enrollment request call. @@ -142,13 +142,13 @@ When authentication policy is set to be Federated, Web Authentication Broker (WA > - Append the OS version as a parameter in the AuthenticationServiceURL. > - Parse out the OS version from the AuthenticiationServiceURL when the OS sends the response for authentication. -  + A new XML tag, AuthenticationServiceUrl, is introduced in the DiscoveryResponse XML to allow the server to specify the WAB page start URL. For Federated authentication, this XML tag must exist. > **Note**  The enrollment client is agnostic with regards to the protocol flows for authenticating and returning the security token. While the server might prompt for user credentials directly or enter into a federation protocol with another server and directory service, the enrollment client is agnostic to all of this. To remain agnostic, all protocol flows pertaining to authentication that involve the enrollment client are passive, that is, browser-implemented. -  + The following are the explicit requirements for the server. @@ -162,8 +162,8 @@ The enrollment client issues an HTTPS request as follows: AuthenticationServiceUrl?appru=&login_hint= ``` -- <appid> is of the form ms-app://string -- <User Principal Name> is the name of the enrolling user, for example, user@constoso.com as input by the user in an enrollment sign in page. The value of this attribute serves as a hint that can be used by the authentication server as part of the authentication. +- <appid> is of the form ms-app://string +- <User Principal Name> is the name of the enrolling user, for example, user@constoso.com as input by the user in an enrollment sign in page. The value of this attribute serves as a hint that can be used by the authentication server as part of the authentication. After authentication is complete, the auth server should return an HTML form document with a POST method action of appid identified in the query string parameter. @@ -301,7 +301,7 @@ MS-XCEP supports very flexible enrollment policies using various Complex Types a > **Note**  The HTTP server response must not set Transfer-Encoding to Chunked; it must be sent as one message. -  + The following snippet shows the policy web service response. @@ -395,7 +395,7 @@ The RST may also specify a number of AdditionalContext items, such as DeviceType > **Note**  The policy service and the enrollment service must be on the same server; that is, they must have the same host name. -  + The following example shows the enrollment web service request for federated authentication. @@ -486,7 +486,7 @@ After validating the request, the web service looks up the assigned certificate > **Note**  The HTTP server response must not set Transfer-Encoding to Chunked; it must be sent as one message. -  + Similar to the TokenType in the RST, the RSTR will use a custom ValueType in the BinarySecurityToken (http://schemas.microsoft.com/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc), because the token is more than an X.509 v3 certificate. @@ -638,7 +638,7 @@ The following code shows sample provisioning XML (presented in the preceding pac - Also important is SSLCLIENTCERTSEARCHCRITERIA, which is used for selecting the certificate to be used for client authentication. The search is based on the subject attribute of the signed user certificate. - CertificateStore/WSTEP enables certificate renewal. If the server does not support it, do not set it. -  + diff --git a/windows/client-management/mdm/filesystem-csp.md b/windows/client-management/mdm/filesystem-csp.md index bdb4a8f0cc..f0745bb496 100644 --- a/windows/client-management/mdm/filesystem-csp.md +++ b/windows/client-management/mdm/filesystem-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -18,12 +18,12 @@ ms.date: 06/26/2017 The FileSystem configuration service provider is used to query, add, modify, and delete files, file directories, and file attributes on the mobile device. It can retrieve information about or manage files in ROM, files in persistent store and files on any removable storage card that is present in the device. It works for files that are hidden from the user as well as those that are visible to the user. > **Note**  FileSystem CSP is only supported in Windows 10 Mobile. - -  - +> +> +> > **Note**   This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_OEM capabilities to be accessed from a network configuration application. -  + The following diagram shows the FileSystem configuration service provider management object in tree format as used by OMA DM. The OMA Client Provisioning protocol is not supported by this configuration service provider. @@ -103,9 +103,9 @@ The following properties are supported for files: [Configuration service provider reference](configuration-service-provider-reference.md) -  + -  + diff --git a/windows/client-management/mdm/firewall-csp.md b/windows/client-management/mdm/firewall-csp.md index 2590793de2..c6322ae0bb 100644 --- a/windows/client-management/mdm/firewall-csp.md +++ b/windows/client-management/mdm/firewall-csp.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 01/26/2018 ms.reviewer: manager: dansimp @@ -40,11 +40,11 @@ The following diagram shows the Firewall configuration service provider in tree

      Value type in integer. Supported operation is Get.

      **MdmStore/Global/CurrentProfiles** -

      Integer value that contains a bitmask of the current enforced profiles that are maintained by the server firewall host. See [FW_PROFILE_TYPE](https://msdn.microsoft.com/library/cc231559.aspx) for the bitmasks that are used to identify profile types. This value is available only in the dynamic store; therefore, it is not merged and has no merge law.

      +

      Integer value that contains a bitmask of the current enforced profiles that are maintained by the server firewall host. See FW_PROFILE_TYPE for the bitmasks that are used to identify profile types. This value is available only in the dynamic store; therefore, it is not merged and has no merge law.

      Value type in integer. Supported operation is Get.

      **MdmStore/Global/DisableStatefulFtp** -

      Boolean value. If false, the firewall performs stateful File Transfer Protocol (FTP) filtering to allow secondary connections. True means stateful FTP is disabled. The merge law for this option is to let "true" values win.

      +

      Boolean value. If false, the firewall performs stateful File Transfer Protocol (FTP) filtering to allow secondary connections. True means stateful FTP is disabled. The merge law for this option is to let "true" values win.

      Default value is false.

      Data type is bool. Supported operations are Add, Get, Replace, and Delete.

      @@ -54,12 +54,12 @@ The following diagram shows the Firewall configuration service provider in tree

      Value type is integer. Supported operations are Add, Get, Replace, and Delete.

      **MdmStore/Global/PresharedKeyEncoding** -

      Specifies the preshared key encoding that is used. The value is integer and MUST be a valid value from the [PRESHARED_KEY_ENCODING_VALUES enumeration](https://msdn.microsoft.com/library/cc231525.aspx). The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value.

      +

      Specifies the preshared key encoding that is used. The value is integer and MUST be a valid value from the PRESHARED_KEY_ENCODING_VALUES enumeration. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value.

      Default value is 1.

      Value type is integer. Supported operations are Add, Get, Replace, and Delete.

      **MdmStore/Global/IPsecExempt** -

      This value configures IPsec exceptions. The value is integer and MUST be a combination of the valid flags that are defined in [IPSEC_EXEMPT_VALUES](https://msdn.microsoft.com/library/cc231523.aspx); therefore, the maximum value MUST always be IPSEC_EXEMPT_MAX-1 for servers supporting a schema version of 0x0201 and IPSEC_EXEMPT_MAX_V2_0-1 for servers supporting a schema version of 0x0200. If the maximum value is exceeded when the method RRPC_FWSetGlobalConfig (Opnum 4) is called, the method returns ERROR_INVALID_PARAMETER. This error code is returned if no other preceding error is discovered. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value.

      +

      This value configures IPsec exceptions. The value is integer and MUST be a combination of the valid flags that are defined in IPSEC_EXEMPT_VALUES; therefore, the maximum value MUST always be IPSEC_EXEMPT_MAX-1 for servers supporting a schema version of 0x0201 and IPSEC_EXEMPT_MAX_V2_0-1 for servers supporting a schema version of 0x0200. If the maximum value is exceeded when the method RRPC_FWSetGlobalConfig (Opnum 4) is called, the method returns ERROR_INVALID_PARAMETER. This error code is returned if no other preceding error is discovered. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value.

      Default value is 0.

      Value type is integer. Supported operations are Add, Get, Replace, and Delete.

      @@ -78,7 +78,7 @@ The following diagram shows the Firewall configuration service provider in tree

      Value type is string. Supported operation is Get.

      **MdmStore/Global/BinaryVersionSupported** -

      This value contains the binary version of the structures and data types that are supported by the server. This value is not merged. In addition, this value is always a fixed value for a specific firewall and advanced security component's software build. This value identifies a policy configuration option that is supported only on servers that have a schema version of 0x0201.

      +

      This value contains the binary version of the structures and data types that are supported by the server. This value is not merged. In addition, this value is always a fixed value for a specific firewall and advanced security component's software build. This value identifies a policy configuration option that is supported only on servers that have a schema version of 0x0201.

      Value type is string. Supported operation is Get.

      **MdmStore/Global/OpportunisticallyMatchAuthSetPerKM** @@ -117,7 +117,7 @@ The following diagram shows the Firewall configuration service provider in tree

      Value type is bool. Supported operations are Add, Get and Replace.

      **/Shielded** -

      Boolean value. If this value is true and EnableFirewall is on, the server MUST block all incoming traffic regardless of other policy settings. The merge law for this option is to let "true" values win.

      +

      Boolean value. If this value is true and EnableFirewall is on, the server MUST block all incoming traffic regardless of other policy settings. The merge law for this option is to let "true" values win.

      Default value is false.

      Value type is bool. Supported operations are Get and Replace.

      @@ -194,12 +194,12 @@ Sample syncxml to provision the firewall settings to evaluate

      Value type is integer. Supported operations are Add, Get and Replace.

      **/DisableStealthModeIpsecSecuredPacketExemption** -

      Boolean value. This option is ignored if DisableStealthMode is true. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used.

      +

      Boolean value. This option is ignored if DisableStealthMode is true. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used.

      Default value is true.

      Value type is bool. Supported operations are Add, Get and Replace.

      **FirewallRules** -

      A list of rules controlling traffic through the Windows Firewall. Each Rule ID is OR'ed. Within each rule ID each Filter type is AND'ed.

      +

      A list of rules controlling traffic through the Windows Firewall. Each Rule ID is OR'ed. Within each rule ID each Filter type is AND'ed.

      **FirewallRules/_FirewallRuleName_**

      Unique alpha numeric identifier for the rule. The rule name must not include a forward slash (/).

      @@ -247,39 +247,39 @@ Sample syncxml to provision the firewall settings to evaluate

      If not specified, the default is All.

      Value type is string. Supported operations are Add, Get, Replace, and Delete.

      -**FirewallRules/_FirewallRuleName_/LocalAddressRanges** -

      Comma separated list of local addresses covered by the rule. The default value is "\*". Valid tokens include:

      +**FirewallRules/*FirewallRuleName*/LocalAddressRanges** +

      Comma separated list of local addresses covered by the rule. The default value is "". Valid tokens include:

        -
      • "\*" indicates any local address. If present, this must be the only token included.
      • +
      • "" indicates any local address. If present, this must be the only token included.
      • A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255.
      • A valid IPv6 address.
      • -
      • An IPv4 address range in the format of "start address - end address" with no spaces included.
      • -
      • An IPv6 address range in the format of "start address - end address" with no spaces included.
      • +
      • An IPv4 address range in the format of "start address - end address" with no spaces included.
      • +
      • An IPv6 address range in the format of "start address - end address" with no spaces included.

      If not specified, the default is All.

      Value type is string. Supported operations are Add, Get, Replace, and Delete.

      -**FirewallRules/_FirewallRuleName_/RemoteAddressRanges** -

      List of comma separated tokens specifying the remote addresses covered by the rule. The default value is "\*". Valid tokens include:

      +**FirewallRules/*FirewallRuleName*/RemoteAddressRanges** +

      List of comma separated tokens specifying the remote addresses covered by the rule. The default value is "". Valid tokens include:

        -
      • "\*" indicates any remote address. If present, this must be the only token included.
      • -
      • "Defaultgateway"
      • -
      • "DHCP"
      • -
      • "DNS"
      • -
      • "WINS"
      • -
      • "Intranet"
      • -
      • "RmtIntranet"
      • -
      • "Internet"
      • -
      • "Ply2Renders"
      • -
      • "LocalSubnet" indicates any local address on the local subnet. This token is not case-sensitive.
      • +
      • "" indicates any remote address. If present, this must be the only token included.
      • +
      • "Defaultgateway"
      • +
      • "DHCP"
      • +
      • "DNS"
      • +
      • "WINS"
      • +
      • "Intranet"
      • +
      • "RmtIntranet"
      • +
      • "Internet"
      • +
      • "Ply2Renders"
      • +
      • "LocalSubnet" indicates any local address on the local subnet. This token is not case-sensitive.
      • A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255.
      • A valid IPv6 address.
      • -
      • An IPv4 address range in the format of "start address - end address" with no spaces included.
      • -
      • An IPv6 address range in the format of "start address - end address" with no spaces included.
      • +
      • An IPv4 address range in the format of "start address - end address" with no spaces included.
      • +
      • An IPv6 address range in the format of "start address - end address" with no spaces included.

      If not specified, the default is All.

      Value type is string. Supported operations are Add, Get, Replace, and Delete.

      -

      The tokens "Intranet", "RmtIntranet", "Internet" and "Ply2Renders" are supported on Windows 10, version 1809, and later.

      +

      The tokens "Intranet", "RmtIntranet", "Internet" and "Ply2Renders" are supported on Windows 10, version 1809, and later.

      **FirewallRules/_FirewallRuleName_/Description**

      Specifies the description of the rule.

      @@ -291,7 +291,7 @@ Sample syncxml to provision the firewall settings to evaluate

      Boolean value. Supported operations are Get and Replace.

      **FirewallRules/_FirewallRuleName_/Profiles** -

      Specifies the profiles to which the rule belongs: Domain, Private, Public. . See [FW_PROFILE_TYPE](https://msdn.microsoft.com/library/cc231559.aspx) for the bitmasks that are used to identify profile types.

      +

      Specifies the profiles to which the rule belongs: Domain, Private, Public. . See FW_PROFILE_TYPE for the bitmasks that are used to identify profile types.

      If not specified, the default is All.

      Value type is integer. Supported operations are Get and Replace.

      diff --git a/windows/client-management/mdm/firewall-ddf-file.md b/windows/client-management/mdm/firewall-ddf-file.md index 5e5abb4983..c3d8ccf3cf 100644 --- a/windows/client-management/mdm/firewall-ddf-file.md +++ b/windows/client-management/mdm/firewall-ddf-file.md @@ -5,7 +5,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 12/05/2017 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/get-inventory.md b/windows/client-management/mdm/get-inventory.md index c0fe264e41..12d263d212 100644 --- a/windows/client-management/mdm/get-inventory.md +++ b/windows/client-management/mdm/get-inventory.md @@ -11,7 +11,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- @@ -41,7 +41,7 @@ The **Get Inventory** operation retrieves information from the Microsoft Store f -  + ### URI parameters @@ -77,7 +77,7 @@ The following parameters may be specified in the request URI.

      licenseTypes

      -

      collection of [LicenseType](data-structures-windows-store-for-business.md#licensetype)

      +

      collection of LicenseType

      {online,offline}

      Optional. A collection of license types

      @@ -165,7 +165,7 @@ Here are some examples. The response contains [InventoryResultSet](data-structures-windows-store-for-business.md#inventoryresultset). -  + diff --git a/windows/client-management/mdm/get-localized-product-details.md b/windows/client-management/mdm/get-localized-product-details.md index 5ad5e50e55..0670c37682 100644 --- a/windows/client-management/mdm/get-localized-product-details.md +++ b/windows/client-management/mdm/get-localized-product-details.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-offline-license.md b/windows/client-management/mdm/get-offline-license.md index d946d5a2eb..c4c8f1d5a8 100644 --- a/windows/client-management/mdm/get-offline-license.md +++ b/windows/client-management/mdm/get-offline-license.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-product-details.md b/windows/client-management/mdm/get-product-details.md index 8195ee011f..3ccd310755 100644 --- a/windows/client-management/mdm/get-product-details.md +++ b/windows/client-management/mdm/get-product-details.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-product-package.md b/windows/client-management/mdm/get-product-package.md index bfc01a2ad9..116e40631b 100644 --- a/windows/client-management/mdm/get-product-package.md +++ b/windows/client-management/mdm/get-product-package.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-product-packages.md b/windows/client-management/mdm/get-product-packages.md index 441ae23c75..ce6f18cad7 100644 --- a/windows/client-management/mdm/get-product-packages.md +++ b/windows/client-management/mdm/get-product-packages.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-seat.md b/windows/client-management/mdm/get-seat.md index 5c16448cbf..598dc8d6a6 100644 --- a/windows/client-management/mdm/get-seat.md +++ b/windows/client-management/mdm/get-seat.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-seats-assigned-to-a-user.md b/windows/client-management/mdm/get-seats-assigned-to-a-user.md index 2b2e9123db..9d03679ed5 100644 --- a/windows/client-management/mdm/get-seats-assigned-to-a-user.md +++ b/windows/client-management/mdm/get-seats-assigned-to-a-user.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/get-seats.md b/windows/client-management/mdm/get-seats.md index 02bf38d456..4b0862844a 100644 --- a/windows/client-management/mdm/get-seats.md +++ b/windows/client-management/mdm/get-seats.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 09/18/2017 --- diff --git a/windows/client-management/mdm/healthattestation-csp.md b/windows/client-management/mdm/healthattestation-csp.md index 2834a587ca..b794b4cf63 100644 --- a/windows/client-management/mdm/healthattestation-csp.md +++ b/windows/client-management/mdm/healthattestation-csp.md @@ -8,7 +8,7 @@ ms.author: v-madhi ms.topic: article ms.prod: w10 ms.technology: windows -author: v-madhi +author: manikadhiman ms.date: 06/26/2017 --- @@ -55,9 +55,8 @@ The following is a list of functions performed by the Device HealthAttestation C
    -![healthattestation session diagram](images/healthattestation_1.png) - -**DHA session data (Device HealthAttestation session data)** +healthattestation session diagram
    +DHA session data (Device HealthAttestation session data)

    The following list of data is produced or consumed in one DHA-Transaction:

    • DHA-BootData: the device boot data (TCG logs, PCR values, device/TPM certificate, boot and TPM counters) that are required for validating device boot health.
    • @@ -73,7 +72,7 @@ The following is a list of functions performed by the Device HealthAttestation C
    • Nonce: a crypto protected number that is generated by MDM-Server, which protects the DHA-Session from man-in-the-middle type attacks
    -**DHA-Enabled MDM (Device HealthAttestation enabled device management solution)** +DHA-Enabled MDM (Device HealthAttestation enabled device management solution)

    Device HealthAttestation enabled (DHA-Enabled) device management solution is a device management tool that is integrated with the DHA feature.

    DHA-Enabled device management solutions enable enterprise IT managers to raise the security protection bar for their managed devices based on hardware (TPM) protected data that can be trusted even if a device is compromized by advanced security threats or running a malicious (jailbroken) operating system.

    The following list of operations are performed by DHA-Enabled-MDM:

    @@ -84,7 +83,7 @@ The following is a list of functions performed by the Device HealthAttestation C
  • Gets the device health report (DHA-Report) from DHA-Service, which triggers compliance action
  • -**DHA-CSP (Device HealthAttestation Configuration Service Provider)** +DHA-CSP (Device HealthAttestation Configuration Service Provider)

    The Device HealthAttestation Configuration Service Provider (DHA-CSP) uses a device’s TPM and firmware to measure critical security properties of the device’s BIOS and Windows boot, such that even on a system infected with kernel level malware or a rootkit, these properties cannot be spoofed.

    The following list of operations are performed by DHA-CSP:

      @@ -94,7 +93,7 @@ The following is a list of functions performed by the Device HealthAttestation C
    • Receives attestation requests (DHA-Requests) from a DHA-Enabled MDM, and replies with Device Health Attestation data (DHA-Data)
    -**DHA-Service (Device HealthAttestation Service)** +DHA-Service (Device HealthAttestation Service)

    Device HealthAttestation Service (DHA-Service) validates the data it receives from DHA-CSP and issues a highly trusted hardware (TPM) protected report (DHA-Report) to DHA-Enabled device management solutions through a tamper resistant and tamper evident communication channel.

    DHA-Service is available in 2 flavors: “DHA-Cloud” and “DHA-Server2016”. DHA-Service supports a variety of implementation scenarios including cloud, on premises, air-gapped, and hybrid scenarios.

    @@ -194,7 +193,7 @@ The following diagram shows the Device HealthAttestation configuration service p

    The supported operation is Get.

    -

    The following list shows some examples of supported values. For the complete list of status see [Device HealthAttestation CSP status and error codes](#device-healthattestation-csp-status-and-error-codes).

    +

    The following list shows some examples of supported values. For the complete list of status see Device HealthAttestation CSP status and error codes.

    - 0 - (HEALTHATTESTATION\_CERT\_RETRI_UNINITIALIZED): DHA-CSP is preparing a request to get a new DHA-EncBlob from DHA-Service - 1 - (HEALTHATTESTATION\_CERT\_RETRI_REQUESTED): DHA-CSP is waiting for the DHA-Service to respond back, and issue a DHA-EncBlob to the device @@ -400,8 +399,8 @@ Here is an example: AAAAAAAAAFFFFFFF - - + + 2 @@ -410,7 +409,7 @@ Here is an example: - + 3 @@ -538,7 +537,7 @@ Each of these are described in further detail in the following sections, along w - Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks. **BitlockerStatus** (at boot time) -

    When Bitlocker is reported "on" at boot time, the device is able to protect data that is stored on the drive from unauthorized access, when the system is turned off or goes to hibernation.

    +

    When Bitlocker is reported "on" at boot time, the device is able to protect data that is stored on the drive from unauthorized access, when the system is turned off or goes to hibernation.

    Windows BitLocker Drive Encryption, encrypts all data stored on the Windows operating system volume. BitLocker uses the TPM to help protect the Windows operating system and user data and helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen.

    @@ -556,9 +555,9 @@ Each of these are described in further detail in the following sections, along w **BootManagerRevListVersion**

    This attribute indicates the version of the Boot Manager that is running on the device, to allow you to track and manage the security of the boot sequence/environment.

    -

    If BootManagerRevListVersion = \[CurrentVersion\], then allow access.

    +

    If BootManagerRevListVersion = [CurrentVersion], then allow access.

    -

    If BootManagerRevListVersion != \[CurrentVersion\], then take one of the following actions that align with your enterprise policies:

    +

    If BootManagerRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:

    - Disallow all access - Disallow access to HBI and MBI assets @@ -568,9 +567,9 @@ Each of these are described in further detail in the following sections, along w **CodeIntegrityRevListVersion**

    This attribute indicates the version of the code that is performing integrity checks during the boot sequence. Using this attribute can help you detect if the device is running the latest version of the code that performs integrity checks, or if it is exposed to security risks (revoked) and enforce an appropriate policy action.

    -

    If CodeIntegrityRevListVersion = \[CurrentVersion\], then allow access.

    +

    If CodeIntegrityRevListVersion = [CurrentVersion], then allow access.

    -

    If CodeIntegrityRevListVersion != \[CurrentVersion\], then take one of the following actions that align with your enterprise policies:

    +

    If CodeIntegrityRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:

    - Disallow all access - Disallow access to HBI and MBI assets @@ -670,7 +669,7 @@ Each of these are described in further detail in the following sections, along w

    If WinPE = 1 (True), then limit access to remote resources that are required for Windows OS installation.

    **ELAMDriverLoaded** (Windows Defender) -

    To use this reporting feature you must disable "Hybrid Resume" on the device. Early launch anti-malware (ELAM) provides protection for the computers in your network when they start up and before third-party drivers initialize.

    +

    To use this reporting feature you must disable "Hybrid Resume" on the device. Early launch anti-malware (ELAM) provides protection for the computers in your network when they start up and before third-party drivers initialize.

    In the current release, this attribute only monitors/reports if a Microsoft 1st party ELAM (Windows Defender) was loaded during initial boot.

    @@ -734,7 +733,7 @@ Each of these are described in further detail in the following sections, along w **TPMVersion**

    This attribute identifies the version of the TPM that is running on the attested device.

    -

    TPMVersion node provides to replies "1" and "2":

    +

    TPMVersion node provides to replies "1" and "2":