From db641a3a204325bec8c1c521d51eaa28895b26d0 Mon Sep 17 00:00:00 2001 From: LucasArona Date: Fri, 10 Jul 2020 21:03:22 +0200 Subject: [PATCH 1/6] Wrong registry path for the analysis --- windows/deployment/upgrade/setupdiag.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index bea5439367..bca001f87a 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -48,7 +48,7 @@ When run by Windows Setup, the following [parameters](#parameters) are used: - /Output:%windir%\logs\SetupDiag\SetupDiagResults.xml - /RegPath:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupDiag\Results -The resulting SetupDiag analysis can be found at **%WinDir%\Logs\SetupDiag\SetupDiagResults.xml** and in the registry under **HKLM\Setup\SetupDiag\Results**. +The resulting SetupDiag analysis can be found at **%WinDir%\Logs\SetupDiag\SetupDiagResults.xml** and in the registry under **HKLM\SYSTEM\Setup\SetupDiag\Results**. If the upgrade process proceeds normally, the **Sources** directory including **setupdiag.exe** is moved under **%SystemDrive%\Windows.Old** for cleanup. If the **Windows.old** directory is deleted later, **setupdiag.exe** will also be removed. From bc7a223b76794015eee9693faebdbc3780221c75 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Sat, 11 Jul 2020 16:23:09 +0530 Subject: [PATCH 2/6] added new link as per the user report #7144 , so I inserted **how Microsoft identifies malware and pua website link** **https://docs.microsoft.com/windows/security/threat-protection/intelligence/criteria** --- .../security/threat-protection/intelligence/developer-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/developer-faq.md b/windows/security/threat-protection/intelligence/developer-faq.md index ce1d4ec198..2441fc8c12 100644 --- a/windows/security/threat-protection/intelligence/developer-faq.md +++ b/windows/security/threat-protection/intelligence/developer-faq.md @@ -31,7 +31,7 @@ Submit the file in question as a software developer. Wait until your submission If you're not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We will use the information you provide to investigate further if necessary. -We encourage all software vendors and developers to read about how Microsoft identifies malware and unwanted software. +We encourage all software vendors and developers to read about [how Microsoft identifies malware and pua.](https://docs.microsoft.com/windows/security/threat-protection/intelligence/criteria) ## Why is Microsoft asking for a copy of my program? From 205a0ec6372ab111917baba55d6b1f7501938911 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Sat, 11 Jul 2020 22:07:44 +0530 Subject: [PATCH 3/6] Update windows/security/threat-protection/intelligence/developer-faq.md Accepted Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../security/threat-protection/intelligence/developer-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/developer-faq.md b/windows/security/threat-protection/intelligence/developer-faq.md index 2441fc8c12..b959041a16 100644 --- a/windows/security/threat-protection/intelligence/developer-faq.md +++ b/windows/security/threat-protection/intelligence/developer-faq.md @@ -31,7 +31,7 @@ Submit the file in question as a software developer. Wait until your submission If you're not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We will use the information you provide to investigate further if necessary. -We encourage all software vendors and developers to read about [how Microsoft identifies malware and pua.](https://docs.microsoft.com/windows/security/threat-protection/intelligence/criteria) +We encourage all software vendors and developers to read about [how Microsoft identifies malware and Potentially Unwanted Applications (PUA)](https://docs.microsoft.com/windows/security/threat-protection/intelligence/criteria). ## Why is Microsoft asking for a copy of my program? From 27cee5c4db8684bc8c41f65d41eff7570628c3c8 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Sat, 11 Jul 2020 22:46:20 +0530 Subject: [PATCH 4/6] Update windows/security/threat-protection/intelligence/developer-faq.md accepted Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../security/threat-protection/intelligence/developer-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/developer-faq.md b/windows/security/threat-protection/intelligence/developer-faq.md index b959041a16..8bf5c9b5f3 100644 --- a/windows/security/threat-protection/intelligence/developer-faq.md +++ b/windows/security/threat-protection/intelligence/developer-faq.md @@ -31,7 +31,7 @@ Submit the file in question as a software developer. Wait until your submission If you're not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We will use the information you provide to investigate further if necessary. -We encourage all software vendors and developers to read about [how Microsoft identifies malware and Potentially Unwanted Applications (PUA)](https://docs.microsoft.com/windows/security/threat-protection/intelligence/criteria). +We encourage all software vendors and developers to read about [how Microsoft identifies malware and Potentially Unwanted Applications (PUA)](criteria.md). ## Why is Microsoft asking for a copy of my program? From 1c75515cd0b0d769315c968726564a3c4352bae2 Mon Sep 17 00:00:00 2001 From: John Bae Date: Mon, 13 Jul 2020 10:11:26 -0400 Subject: [PATCH 5/6] Update user-driven.md fixed typo in line 134 *downloaded --- windows/deployment/windows-autopilot/user-driven.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/user-driven.md b/windows/deployment/windows-autopilot/user-driven.md index 7786be9c94..7f4087f9a0 100644 --- a/windows/deployment/windows-autopilot/user-driven.md +++ b/windows/deployment/windows-autopilot/user-driven.md @@ -131,7 +131,7 @@ For VPN configurations that automatically connect, the validation steps may be d To validate the end-to-end process, ensure the needed Windows 10 cumulative update has been installed on Windows 10 1903 or Windows 10 1909. This can be done manually during OOBE by first downloading the latest cumulative from https://catalog.update.microsoft.com and then manually installing it: - Press Shift-F10 to open a command prompt. -- Insert a USB key containing the donwloaded update. +- Insert a USB key containing the downloaded update. - Install the update using the command (substituting the real file name): WUSA.EXE .msu /quiet - Reboot the computer using the command: shutdown.exe /r /t 0 From edb4daf1fcbb3e1f4c0dd4305184a4d8963726bb Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 13 Jul 2020 09:18:37 -0700 Subject: [PATCH 6/6] pencil edit --- windows/deployment/windows-autopilot/user-driven.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/user-driven.md b/windows/deployment/windows-autopilot/user-driven.md index 7f4087f9a0..2f93c58513 100644 --- a/windows/deployment/windows-autopilot/user-driven.md +++ b/windows/deployment/windows-autopilot/user-driven.md @@ -101,7 +101,7 @@ The following additional requirements apply for Hybrid Azure AD Join with VPN su - Windows 10 1909 + December 10th Cumulative update (KB4530684, OS build 18363.535) or higher - Windows 10 2004 or later - Enable the new “Skip domain connectivity check” toggle in the Hybrid Azure AD Join Autopilot profile. -- A VPN configuration that can be deployed via Intune that enables the user to manualy establish a VPN connection from the Windows logon screen, or one that automatically establishes a VPN connection as needed. +- A VPN configuration that can be deployed via Intune that enables the user to manually establish a VPN connection from the Windows logon screen, or one that automatically establishes a VPN connection as needed. The specific VPN configuration required depends on the VPN software and authentication being used. For third-party (non-Microsoft) VPN solutions, this typically would involve deploying a Win32 app (containing the VPN client software itself as well as any specific connection information, e.g. VPN endpoint host names) via Intune Management Extensions. Consult your VPN provider's documentation for configuration details specific to that provider.