mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
add files from other draft branch
This commit is contained in:
parent
51810533ba
commit
c46da727cd
@ -184,49 +184,80 @@
|
|||||||
href: update/deploy-updates-intune.md
|
href: update/deploy-updates-intune.md
|
||||||
- name: Monitor Windows client updates
|
- name: Monitor Windows client updates
|
||||||
items:
|
items:
|
||||||
- name: Monitor Windows Updates
|
- name: Monitor with Update Compliance (preview version)
|
||||||
|
href: update/update-compliance-v2-overview.md
|
||||||
|
items:
|
||||||
|
- name: Enable Update Compliance (preview)
|
||||||
|
items:
|
||||||
|
- name: Update Compliance prerequisites
|
||||||
|
href: update/update-compliance-v2-prerequisites.md
|
||||||
|
- name: Enable the Update Compliance solution
|
||||||
|
href: update/update-compliance-v2-enable.md
|
||||||
|
- name: Configure clients with a script
|
||||||
|
href: update/update-compliance-configuration-script.md
|
||||||
|
- name: Configure clients manually
|
||||||
|
href: update/update-compliance-configuration-manual.md
|
||||||
|
- name: Configure clients with Microsoft Endpoint Manager
|
||||||
|
href: update/update-compliance-configuration-mem.md
|
||||||
|
- name: Software updates in the Microsoft admin center (preview)
|
||||||
|
href: update/update-status-admin-center.md
|
||||||
|
- name: Schema reference (preview)
|
||||||
items:
|
items:
|
||||||
- name: Monitor Windows Updates with Update Compliance
|
- name: Update Compliance schema reference
|
||||||
href: update/update-compliance-monitor.md
|
href: update/update-compliance-v2-schema.md
|
||||||
- name: Get started
|
- name: UCClient
|
||||||
items:
|
href: update/update-compliance-v2-schema-ucclient.md
|
||||||
- name: Get started with Update Compliance
|
- name: UCClientUpdateStatus
|
||||||
href: update/update-compliance-get-started.md
|
href: update/update-compliance-v2-schema-ucclientupdatestatus.md
|
||||||
- name: Update Compliance configuration script
|
- name: UCServiceUpdateStatus
|
||||||
href: update/update-compliance-configuration-script.md
|
href: update/update-compliance-v2-schema-ucserviceupdatestatus.md
|
||||||
- name: Manually configuring devices for Update Compliance
|
- name: UCUpdateAlert
|
||||||
href: update/update-compliance-configuration-manual.md
|
href: update/update-compliance-v2-schema-ucupdatealert.md
|
||||||
- name: Configuring devices for Update Compliance in Microsoft Endpoint Manager
|
- name: UCDeviceAlert
|
||||||
href: update/update-compliance-configuration-mem.md
|
href: update/update-compliance-v2-schema-ucdevicealert.md
|
||||||
- name: Update Compliance monitoring
|
- name: Monitor updates with Update Compliance (GA)
|
||||||
items:
|
href: update/update-compliance-monitor.md
|
||||||
- name: Use Update Compliance
|
items:
|
||||||
href: update/update-compliance-using.md
|
- name: Get started (GA)
|
||||||
- name: Need attention report
|
items:
|
||||||
href: update/update-compliance-need-attention.md
|
- name: Get started with Update Compliance
|
||||||
- name: Security update status report
|
href: update/update-compliance-get-started.md
|
||||||
href: update/update-compliance-security-update-status.md
|
- name: Update Compliance configuration script
|
||||||
- name: Feature update status report
|
href: update/update-compliance-configuration-script.md
|
||||||
href: update/update-compliance-feature-update-status.md
|
- name: Manually configuring devices for Update Compliance
|
||||||
- name: Safeguard holds report
|
href: update/update-compliance-configuration-manual.md
|
||||||
href: update/update-compliance-safeguard-holds.md
|
- name: Configuring devices for Update Compliance in Microsoft Endpoint Manager
|
||||||
- name: Delivery Optimization in Update Compliance
|
href: update/update-compliance-configuration-mem.md
|
||||||
href: update/update-compliance-delivery-optimization.md
|
- name: Update Compliance monitoring (GA)
|
||||||
- name: Data handling and privacy in Update Compliance
|
items:
|
||||||
href: update/update-compliance-privacy.md
|
- name: Use Update Compliance
|
||||||
- name: Update Compliance schema reference
|
href: update/update-compliance-using.md
|
||||||
href: update/update-compliance-schema.md
|
- name: Need attention report
|
||||||
items:
|
href: update/update-compliance-need-attention.md
|
||||||
- name: WaaSUpdateStatus
|
- name: Security update status report
|
||||||
href: update/update-compliance-schema-waasupdatestatus.md
|
href: update/update-compliance-security-update-status.md
|
||||||
- name: WaaSInsiderStatus
|
- name: Feature update status report
|
||||||
href: update/update-compliance-schema-waasinsiderstatus.md
|
href: update/update-compliance-feature-update-status.md
|
||||||
- name: WaaSDepoymentStatus
|
- name: Safeguard holds report
|
||||||
href: update/update-compliance-schema-waasdeploymentstatus.md
|
href: update/update-compliance-safeguard-holds.md
|
||||||
- name: WUDOStatus
|
- name: Delivery Optimization in Update Compliance
|
||||||
href: update/update-compliance-schema-wudostatus.md
|
href: update/update-compliance-delivery-optimization.md
|
||||||
- name: WUDOAggregatedStatus
|
- name: Data handling and privacy in Update Compliance
|
||||||
href: update/update-compliance-schema-wudoaggregatedstatus.md
|
href: update/update-compliance-privacy.md
|
||||||
|
- name: Schema reference (GA)
|
||||||
|
items:
|
||||||
|
- name: Update Compliance schema reference
|
||||||
|
href: update/update-compliance-schema.md
|
||||||
|
- name: WaaSUpdateStatus
|
||||||
|
href: update/update-compliance-schema-waasupdatestatus.md
|
||||||
|
- name: WaaSInsiderStatus
|
||||||
|
href: update/update-compliance-schema-waasinsiderstatus.md
|
||||||
|
- name: WaaSDepoymentStatus
|
||||||
|
href: update/update-compliance-schema-waasdeploymentstatus.md
|
||||||
|
- name: WUDOStatus
|
||||||
|
href: update/update-compliance-schema-wudostatus.md
|
||||||
|
- name: WUDOAggregatedStatus
|
||||||
|
href: update/update-compliance-schema-wudoaggregatedstatus.md
|
||||||
- name: Troubleshooting
|
- name: Troubleshooting
|
||||||
items:
|
items:
|
||||||
- name: Resolve upgrade errors
|
- name: Resolve upgrade errors
|
||||||
|
52
windows/deployment/update-compliance-v2-enable.md
Normal file
52
windows/deployment/update-compliance-v2-enable.md
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
---
|
||||||
|
title: Enable the Update Compliance solution
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: How to enable the Update Compliance through the Azure portal
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Enable Update Compliance
|
||||||
|
|
||||||
|
Update Compliance is offered as an Azure Marketplace application that's is linked to a new or existing [Azure Log Analytics](/azure/log-analytics/query-language/get-started-analytics-portal) workspace within your Azure subscription. Note that, for the following steps, you must have either an Owner or Contributor [Azure role](/azure/role-based-access-control/rbac-and-directory-admin-roles#azure-roles) as a minimum in order to add the solution.
|
||||||
|
|
||||||
|
## Add Update Compliance to your Azure subscription
|
||||||
|
|
||||||
|
To add Update Compliance to your Azure subscription, follow these steps:
|
||||||
|
|
||||||
|
### Select or create a new Log Analytics workspace
|
||||||
|
|
||||||
|
1. Sign in to the Azure portal at [https://portal.azure.com](https://portal.azure.com).
|
||||||
|
1. In the Azure portal, type **Log Analytics** in the search bar. As you begin typing, the list filters based on your input.
|
||||||
|
1. Select **Log Analytics workspaces**.
|
||||||
|
1. If you already have a Log Analytics workspace, determine which Log Analytics workspace you'd like to use for Update Compliance. Ensure the workspace is in a **Compatible Log Analytics region** from the table listed in the [prerequisites](update-compliance-v2-prerequisites.md#log-analytics-regions).
|
||||||
|
- [Azure Update Management](/azure/automation/automation-intro#update-management) users should use the same workspace for Update Compliance.
|
||||||
|
1. If you don't have an existing Log Analytics workspace or you don't want to use a current workspaces, [create a new workspace](/azure/azure-monitor/logs/quick-create-workspace) in a [compatible region](update-compliance-v2-prerequisites.md#log-analytics-regions).
|
||||||
|
|
||||||
|
###
|
||||||
|
1. Go to the [Update Compliance page in the Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.WaaSUpdateInsights?tab=Overview). You might need to sign into your Azure subscription to access this.
|
||||||
|
1. Select **Get it now**.
|
||||||
|
1.
|
||||||
|
<!--
|
||||||
|
1. Choose an existing or configure a new Log Analytics Workspace, ensuring it is in a **Compatible Log Analytics region** from the table listed in the [prerequisites](update-compliance-v2-prerequisites.md#log-analytics-regions). Although an Azure subscription is required, you won't be charged for ingestion of Update Compliance data.
|
||||||
|
- [Azure Update Management](/azure/automation/automation-intro#update-management) users should use the same workspace for Update Compliance.
|
||||||
|
1. After your workspace is configured and selected, select **Create**. You'll receive a notification when the solution has been successfully created. -->
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> The `CommercialID` for the Log Analytics workspace is no longer required when configuring your clients.
|
||||||
|
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
Once you've added Update Compliance to a workspace in your Azure subscription, you'll need to configure any devices you want to monitor. Enroll devices into Update Compliance using any of the following methods:
|
||||||
|
|
||||||
|
- [Configure clients with a script](update-compliance-configuration-script.md)
|
||||||
|
- [Configure clients manually](update-compliance-configuration-manual.md)
|
||||||
|
- [Configure clients with Microsoft Endpoint Manager](update-compliance-configuration-mem.md)
|
54
windows/deployment/update-compliance-v2-overview.md
Normal file
54
windows/deployment/update-compliance-v2-overview.md
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance overview
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: Overview of Update Compliance to explain what it's used for and the cloud services it relies on.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Update Compliance overview
|
||||||
|
<!--37063317, 30141258, 37063041-->
|
||||||
|
***(Applies to: Windows 11 & Windows 10)***
|
||||||
|
|
||||||
|
Update Compliance is a cloud-based solution that provides information about the compliance of your Azure Active Directory joined devices with Windows updates. Update Compliance is offered through the [Azure portal](https://portal.azure.com), and it's included as part of the Windows 10 or Windows 11 prerequisite licenses. Update Compliance helps you:
|
||||||
|
|
||||||
|
- Monitor security, quality, and feature updates for Windows 11 and Windows 10 devices
|
||||||
|
- Report on devices with update compliance issues
|
||||||
|
- Review [Delivery Optimization](../do/waas-delivery-optimization.md) bandwidth savings across multiple content types
|
||||||
|
|
||||||
|
:::image type="content" source="media/37063317-update-compliance-overview.png" alt-text="Screenshot showing Update Compliance dashboard in the Azure portal" lightbox="media/37063317-update-compliance-overview.png":::
|
||||||
|
|
||||||
|
## How Update Compliance works
|
||||||
|
|
||||||
|
You'll set up Update Compliance by enrolling into the solution from the Azure portal. You'll then configure your Azure AD joined devices to send Windows client diagnostic data to the solution. Update Compliance uses the diagnostic data the clients send for all of its reporting. It collects system data such as:
|
||||||
|
|
||||||
|
- Update deployment progress
|
||||||
|
- Delivery Optimization usage data
|
||||||
|
- Windows Update for Business configuration data
|
||||||
|
|
||||||
|
Update Compliance sends this client diagnostic data to an [Azure Log Analytics workspace](/azure/azure-monitor/logs/log-analytics-overview) that you own. It sorts and analyzes the data then presents it to you using rich visual reports within the Azure portal. The Azure Log Analytics ingestion and retention charges aren't incurred on your Azure subscription for Update Compliance data.
|
||||||
|
|
||||||
|
## Use your Update Compliance data
|
||||||
|
|
||||||
|
Since the data from your clients is stored in a Log Analytics workspace, you can go beyond the standard reports to analyze and display your data in multiple ways. Some of the ways you could display your data include:
|
||||||
|
|
||||||
|
- Using the built-in or [custom workbooks](/azure/azure-monitor/visualize/workbooks-overview)
|
||||||
|
:::image type="content" source="media/37063317-update-compliance-workbooks.png" alt-text="Screenshot showing a a list of the built-in workbooks that come with the Update Compliance solution." lightbox="media/37063317-update-compliance-workbooks.png":::
|
||||||
|
- Using the built-in Kusto (KQL) queries or [custom queries](/azure/azure-monitor/logs/log-query-overview)
|
||||||
|
:::image type="content" source="media/37063317-update-compliance-kusto-query.png" alt-text="Screenshot showing a built-in Kusto query being run against the Update Compliance data." lightbox="media/37063317-update-compliance-kusto-query.png":::
|
||||||
|
- Developing your own custom views by integrating the [Log Analytics data](/azure/azure-monitor/visualize/tutorial-logs-dashboards) into other tools such as:
|
||||||
|
- [Operations Management Suite](/azure/azure-monitor/agents/om-agents)
|
||||||
|
- [Power BI](/azure/azure-monitor/logs/log-powerbi)
|
||||||
|
- Other tools for [querying the data](/azure/azure-monitor/logs/log-query-overview)
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
- Review the [Update Compliance prerequisites](update-compliance-v2-prerequisites.md)
|
||||||
|
|
114
windows/deployment/update-compliance-v2-prerequisites.md
Normal file
114
windows/deployment/update-compliance-v2-prerequisites.md
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance prerequisites
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: Prerequisites for Update Compliance
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Update Compliance prerequisites
|
||||||
|
<!--37063317, 30141258, 37063041-->
|
||||||
|
***(Applies to: Windows 11 & Windows 10)***
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Update Compliance is a Windows service hosted in Azure that uses Windows diagnostic data. You should be aware that Update Compliance doesn't meet [US Government community compliance (GCC)](/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc#us-government-community-compliance) requirements. For a list of GCC offerings for Microsoft products and services, see the [Microsoft Trust Center](/compliance/regulatory/offering-home). Update Compliance is available in the Azure Commercial cloud, but not available for GCC High or United States Department of Defense customers.
|
||||||
|
## Update Compliance prerequisites
|
||||||
|
|
||||||
|
Before you begin the process to add Update Compliance to your Azure subscription, ensure you can meet the prerequisites.
|
||||||
|
|
||||||
|
### Azure and Azure Active Directory
|
||||||
|
|
||||||
|
- An Azure subscription with [Azure Active Directory](/azure/active-directory/)
|
||||||
|
- You must have either an Owner or Contributor [Azure role](/azure/role-based-access-control/rbac-and-directory-admin-roles#azure-roles) as a minimum in order to add the Update Compliance solution.
|
||||||
|
- Devices must be Azure Active Directory joined and meet the below OS, diagnostic, and endpoint access requirements
|
||||||
|
- Devices that are Workplace joined only (Azure AD registered) aren't supported with Update Compliance
|
||||||
|
|
||||||
|
### Operating systems and editions
|
||||||
|
|
||||||
|
- Windows 11 Professional, Education, Enterprise, and [Enterprise multi-session](/azure/virtual-desktop/windows-10-multisession-faq) editions
|
||||||
|
- Windows 10 Professional, Education, Enterprise, and [Enterprise multi-session](/azure/virtual-desktop/windows-10-multisession-faq) editions
|
||||||
|
|
||||||
|
Update Compliance only provides data for the standard Desktop Windows client version and is not currently compatible with Windows Server, Surface Hub, IoT, or other versions.
|
||||||
|
|
||||||
|
### Windows client servicing channels
|
||||||
|
|
||||||
|
Update Compliance supports Windows client devices on the following channels:
|
||||||
|
|
||||||
|
- General Availability Channel
|
||||||
|
- Long-term Servicing Channel (LTSC).
|
||||||
|
- Update Compliance *counts* Windows Insider Preview devices, but doesn't currently provide detailed deployment insights for them.
|
||||||
|
|
||||||
|
### Diagnostic data requirements
|
||||||
|
|
||||||
|
At minimum, Update Compliance requires devices to send diagnostic data at *Required* level (previously *Basic*). Some queries in Update Compliance require devices to send diagnostic data at the following levels:
|
||||||
|
|
||||||
|
- *Optional* level (previously *Full*) for Windows 11 devices
|
||||||
|
- *Enhanced* level for Windows 10 devices
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> Device names don't appear in Update Compliance unless you individually opt-in devices by using policy. The configuration script does this for you, but when using other client configuration methods, set one of the following to display device names:
|
||||||
|
> - CSP: System/[AllowDeviceNameInDiagnosticData](/windows/client-management/mdm/policy-csp-system#system-allowdevicenameindiagnosticdata)
|
||||||
|
> - Group Policy: **Allow device name to be sent in Windows diagnostic data** under **Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds**
|
||||||
|
|
||||||
|
For more information about what's included in different diagnostic levels, see [Diagnostics, feedback, and privacy in Windows](https://support.microsoft.com/windows/diagnostics-feedback-and-privacy-in-windows-28808a2b-a31b-dd73-dcd3-4559a5199319).
|
||||||
|
|
||||||
|
### Data transmission requirements
|
||||||
|
|
||||||
|
<!--Using include for endpoint access requirements-->
|
||||||
|
[!INCLUDE [Endpoints for Update Compliance](./includes/update-compliance-endpoints.md)]
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> It is not currently supported to programmatically enroll to Update Compliance via the [Azure CLI](/cli/azure) or otherwise. You must manually add Update Compliance to your Azure subscription.
|
||||||
|
|
||||||
|
## Log Analytics prerequisites
|
||||||
|
|
||||||
|
### Permissions
|
||||||
|
|
||||||
|
- To edit and write queries, we recommend the [Log Analytics Contributor](/azure/role-based-access-control/built-in-roles#log-analytics-contributor) role.
|
||||||
|
|
||||||
|
- To read and only view data, we recommend the [Log Analytics Reader](/azure/role-based-access-control/built-in-roles#log-analytics-reader) role.
|
||||||
|
|
||||||
|
### Log Analytics regions
|
||||||
|
|
||||||
|
Update Compliance can use a Log Analytics workspace in the following regions:
|
||||||
|
|
||||||
|
|Compatible Log Analytics regions |
|
||||||
|
| ------------------------------- |
|
||||||
|
|Australia Central |
|
||||||
|
|Australia East |
|
||||||
|
|Australia Southeast |
|
||||||
|
|Brazil South |
|
||||||
|
|Canada Central |
|
||||||
|
|Central India |
|
||||||
|
|Central US |
|
||||||
|
|East Asia |
|
||||||
|
|East US |
|
||||||
|
|East US 2 |
|
||||||
|
|Eastus2euap(canary) |
|
||||||
|
|France Central |
|
||||||
|
|Japan East |
|
||||||
|
|Korea Central |
|
||||||
|
|North Central US |
|
||||||
|
|North Europe |
|
||||||
|
|South Africa North |
|
||||||
|
|South Central US |
|
||||||
|
|Southeast Asia |
|
||||||
|
|Switzerland North |
|
||||||
|
|Switzerland West |
|
||||||
|
|UK West |
|
||||||
|
|UK south |
|
||||||
|
|West Central US |
|
||||||
|
|West Europe |
|
||||||
|
|West US |
|
||||||
|
|West US 2 |
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
- [Enable the Update Compliance solution](update-compliance-v2-enable.md) in the Azure portal
|
76
windows/deployment/update-compliance-v2-schema-ucclient.md
Normal file
76
windows/deployment/update-compliance-v2-schema-ucclient.md
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance Data Schema - UCClient
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: UCClient schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# UCClient
|
||||||
|
|
||||||
|
UCClient acts as an individual device's record. It contains data such as the currently installed build, the device's name, the OS Edition, and active hours (quantitative).
|
||||||
|
|
||||||
|
|Field |Type |Example |Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **AzureADDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Azure AD Device ID |
|
||||||
|
| **AzureADTenantId** | [string](/azure/kusto/query/scalar-data-types/string) | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Azure AD Tenant ID |
|
||||||
|
| **City** | [string](/azure/kusto/query/scalar-data-types/string) | `Redmond` | The last-reported location of device (city), based on IP address. |
|
||||||
|
| **Country** | [string](/azure/kusto/query/scalar-data-types/string) | `US` | The last-reported location of device (country), based on IP address. Shown as country code. |
|
||||||
|
| **DeviceFamily** | [string](/azure/kusto/query/scalar-data-types/string) | `PC, Phone` | The device family such as PC, Phone |
|
||||||
|
| **DeviceFormFactor** | [string](/azure/kusto/query/scalar-data-types/string) | `Notebook` | The device form factor such as Notebook, Desktop, Phone |
|
||||||
|
| **DeviceManufacturer** | [string](/azure/kusto/query/scalar-data-types/string) | `Hewlett-Packard` | The device OEM Manufacturer such as Hewlett-Packard |
|
||||||
|
| **DeviceModel** | [string](/azure/kusto/query/scalar-data-types/string) | `HP7420 Workstation` | The device's OEM model such as HP7420 Workstation |
|
||||||
|
| **DeviceName** | [string](/azure/kusto/query/scalar-data-types/string) | `JohnPC-Contoso` | Client-provided device name |
|
||||||
|
| **GlobalDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `g:9832741921341` | The global device identifier. |
|
||||||
|
| **IsVirtual** | [bool](/azure/kusto/query/scalar-data-types/bool) | `TRUE` | Whether device is a Virtual Device |
|
||||||
|
| **LastCensusScanTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The last time this device performed a successful Census Scan, if any. |
|
||||||
|
| **LastWUScanTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The last time this device performed a successful WU Scan, if any. |
|
||||||
|
| **OSArchitecture** | [string](/azure/kusto/query/scalar-data-types/string) | `x86` | The architecture of the OS (not the device) this device is currently on. |
|
||||||
|
| **OSBuild** | [string](/azure/kusto/query/scalar-data-types/string) | `10.0.18363.836` | The full OS build installed on this device, such as Major.Minor.Build.Revision |
|
||||||
|
| **OSBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `da` | The Major, in int format, this device is on |
|
||||||
|
| **OSEdition** | [string](/azure/kusto/query/scalar-data-types/string) | `Professional` | The Windows SKU/Edition |
|
||||||
|
| **OSFeatureUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string)| `Compliant` | Whether or not the device is on the latest Feature Update being Offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSFeatureUpdateEOSTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The end of service date of the Feature Update currently installed on the device. |
|
||||||
|
| **OSFeatureUpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The release date of the Feature Update currently installed on the device. |
|
||||||
|
| **OSFeatureUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `InService;EndOfService` | Whether or not the device is on the latest available Feature Update, for its Feature Update. |
|
||||||
|
| **OSQualityUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `NotCompliant` | Whether or not the device is on the latest Quality Update being Offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSQualityUpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The release date of the Quality Update currently installed on the device. |
|
||||||
|
| **OSQualityUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string)| `Latest;NotLatest` | Whether or not the device is on the latest available Quality Update, for its Feature Update. |
|
||||||
|
| **OSRevisionNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `836` | The revision, in int format, this device is on. |
|
||||||
|
| **OSSecurityUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `NotCompliant` | Whether or not the device is on the latest Security update (QU, Classification=Security) being offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSSecurityUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string)| `Latest;NotLatest;MultipleSecurityUpdatesMissing` | Whether or not the device is on the latest available Security Update, for its Feature Update. |
|
||||||
|
| **OSServicingChannel** | [string](/azure/kusto/query/scalar-data-types/string) | `SAC` | The elected Windows 10 Servicing Channel of the device. |
|
||||||
|
| **OSVersion** | [string](/azure/kusto/query/scalar-data-types/string) | `1909` | The Win10 OS Version (such as 19H2, 20H1, 20H2) currently installed on the device. |
|
||||||
|
| **PrimaryDiskFreeCapacityMb** | [int](/azure/kusto/query/scalar-data-types/int) | `1132` | Free disk capacity of the primary disk in megabytes. |
|
||||||
|
| **SCCMClientId** | [string](/azure/kusto/query/scalar-data-types/string) | `5AB72FAC-93AB-4954-9AB0-6557D0EFA245` | Configuration Manager Client ID, if available. |
|
||||||
|
| **TimeGenerated** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time the snapshot generated this specific record. This is to determine to which batch snapshot this record belongs. |
|
||||||
|
| **Type** | [string](/azure/kusto/query/scalar-data-types/string) | `DeviceEvent` | The EntityType. |
|
||||||
|
| **UpdateConnectivityLevel** | [string](/azure/kusto/query/scalar-data-types/string) | `Insufficient` | Whether or not this device is maintaining a sufficiently cumulative and continuous connection to Windows Update so the update can progress optimally. |
|
||||||
|
| **WUAutomaticUpdates** | [int](/azure/kusto/query/scalar-data-types/int) | `5` | CSP: AllowAutoUpdate &'AuOptions' Enables the IT admin to manage automatic update behavior to scan, download, and install updates. |
|
||||||
|
| **WUDeadlineNoAutoRestart** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP:ConfigureDeadlineNoAutoReboot. Devices won't automatically restart outside of active hours until the deadline is reached, 1 is Enabled, 0 is Disabled (default)|
|
||||||
|
| **WUDODownloadMode** | [string](/azure/kusto/query/scalar-data-types/string) | `Simple (99)` | The WU DO DownloadMode configuration, brought over from Update Compliance. |
|
||||||
|
| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: ConfigureDeadlineForFeatureUpdatesThe WU Feature Update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values >0 indicate the deadline in days. |
|
||||||
|
| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: DeferFeatureUpdates. The WU Feature Update Deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values >0 indicate the policy setting. |
|
||||||
|
| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | `7` | The WU grace period for feature update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the Grace Period in days. |
|
||||||
|
| **WUFeaturePauseEndTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesEndTimeThe time WU Feature Update Pause will end, if activated, else null. |
|
||||||
|
| **WUFeaturePauseStartTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP: PauseFeatureUpdatesStartTime. The time WU Feature Update Pause was activated, if activated, else null. Feature Updates will be paused for 35 days from the specified start date. |
|
||||||
|
| **WUFeaturePauseState** | [string](/azure/kusto/query/scalar-data-types/string) | `NotConfigured` | Indicates pause status of device for FU, possible values are Paused, NotPaused, NotConfigured. |
|
||||||
|
| **WUNotificationLevel** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: UpdateNotificationLevel. This policy allows you to define what Windows Update notifications users see. </br> </br> 0 - Use the default Windows Update notifications (default) </br> 1 - Turn off all notifications, excluding restart warnings </br> 2 - Turn off all notifications, including restart warnings |
|
||||||
|
| **WUPauseUXDisabled** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: SetDisablePauseUXAccess. This policy allows the IT admin to disable the "Pause Updates" feature. When this policy is enabled, the user can't access the "Pause updates" feature. Supported values 0, 1. |
|
||||||
|
| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | `7` | CSP: ConfigureDeadlineForQualityUpdates The WU Quality Update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. |
|
||||||
|
| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | `-1` | CSP: DeferQualityUpdatesThe WU Quality Update Deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values greater than 0 indicate the policy setting. |
|
||||||
|
| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | The WU grace period for quality update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the Grace Period in days. |
|
||||||
|
| **WUQualityPauseEndTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesEndTimeThe time WU Quality Update Pause will end, if activated, else null. |
|
||||||
|
| **WUQualityPauseStartTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesStartTime The time WU Quality Update Pause was activated; if activated; else null. |
|
||||||
|
| **WUQualityPauseState** | [string](/azure/kusto/query/scalar-data-types/string) | `NotConfigured` | Indicates pause status of device for QU, possible values are Paused, NotPaused, NotConfigured. |
|
||||||
|
| **WURestartNotification** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP: AutoRestartRequiredNotificationDismissal. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. The following list shows the supported values: </br> </br> 1 is Auto Dismissal (default) </br> </br> 2 is User Dismissal. |
|
||||||
|
| **WUServiceURLConfigured** | [string](/azure/kusto/query/scalar-data-types/string) | `http://abcd-srv:8530` | CSP:UpdateServiceUrl. The following list shows the supported values: </br> </br> Not configured: The device checks for updates from Microsoft Update. </br> </br> Set to a URL, such as `http://abcd-srv:8530`: The device checks for updates from the WSUS server at the specified URL.|
|
||||||
|
| **WUUXDisabled** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP:SetDisableUXWUAccess.This policy allows the IT admin to remove access to scan Windows Update. When this policy is enabled, the user can't access the Windows Update scan, download, and install features. Default is 0. Supported values 0, 1. |
|
||||||
|
|
@ -0,0 +1,59 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance Data Schema - UCClientUpdateStatus
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: UCClientUpdateStatus schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# UCClientUpdateStatus
|
||||||
|
|
||||||
|
Update Event that combines the latest client-based data with the latest service-based data to create a complete picture for one device (client) and one update.
|
||||||
|
|
||||||
|
| Field | Type | Example | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **AzureADDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | A string corresponding to the Azure AD Tenant to which the device belongs. |
|
||||||
|
| **AzureADTenantId** | [string](/azure/kusto/query/scalar-data-types/string) | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | A string corresponding to this device's Azure AD Device ID |
|
||||||
|
| **ClientState** | [string](/azure/kusto/query/scalar-data-types/string) | `Installing` | Higher-level bucket of ClientSubstate. |
|
||||||
|
| **ClientSubstate** | [string](/azure/kusto/query/scalar-data-types/string) | `DownloadStart` | Last-known state of this update relative to the device, from the client (the device's WDD). |
|
||||||
|
| **ClientSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | `2300` | Ranking of Client Substates for sequential ordering in funnel-type views. The rankings between ServiceSubstate and ClientSubstate can be used together. |
|
||||||
|
| **ClientSubstateTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime of last Client Substate transition |
|
||||||
|
| **DeploymentId** | [string](/azure/kusto/query/scalar-data-types/string) | `cf1b12a3-3d84-4ce3-bc8e-de48459e252d` | The identifier of the Deployment that is targeting this update to this device, else empty. |
|
||||||
|
| **DeviceName** | [string](/azure/kusto/query/scalar-data-types/string) | `JohnPC-Contoso` | Device's given name |
|
||||||
|
| **EventData** | [string](/azure/kusto/query/scalar-data-types/string) {json} | `{}` | Json to fill with arbitrary K/V pairs. Used to populate contextual data that would otherwise be sparsely populated if elevated to a field always present in the schema. |
|
||||||
|
| **FurthestClientSubstate** | [string](/azure/kusto/query/scalar-data-types/string) | `DownloadComplete` | Furthest clientSubstate |
|
||||||
|
| **FurthestClientSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | `2400` | Ranking of furthest clientSubstate |
|
||||||
|
| **GlobalDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `g:9832741921341` | Microsoft internal Global Device Identifier |
|
||||||
|
| **IsUpdateHealthy** | bool | `TRUE` | True: No issues preventing this device from updating to this update have been found. False: There's something that may prevent this device from updating. |
|
||||||
|
| **OfferReceivedTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime when device last reported entering OfferReceived, else empty. |
|
||||||
|
| **RestartRequiredTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime when device first reported entering RebootRequired (or RebootPending), else empty. |
|
||||||
|
| **SCCMClientId** | [string](/azure/kusto/query/scalar-data-types/string) | `5AB72FAC-93AB-4954-9AB0-6557D0EFA245` | A string corresponding to the Configuration Manager Client ID on the device. |
|
||||||
|
| **TargetBuild** | [string](/azure/kusto/query/scalar-data-types/string) | `10.0.18363.836` | The full build of the content this DeviceUpdateEvent is tracking. For Windows 10 updates, this would correspond to the full build (10.0.14393.385). |
|
||||||
|
| **TargetBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `18363` | Integer of the Major portion of Build. |
|
||||||
|
| **TargetKBNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `4524570` | KB Article. |
|
||||||
|
| **TargetRevisionNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `836` | Integer or the Minor (or Revision) portion of Build. |
|
||||||
|
| **TargetVersion** | [int](/azure/kusto/query/scalar-data-types/int) | `1909` | The target OS Version such as 1909. |
|
||||||
|
| **TimeGenerated** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time the snapshot generated this specific record. This is to determine to which batch snapshot this record belongs. |
|
||||||
|
| **Type** | [string](/azure/kusto/query/scalar-data-types/string) | `DeviceUpdateEvent` | The EntityType |
|
||||||
|
| **UpdateCategory** | [string](/azure/kusto/query/scalar-data-types/string) | `WindowsFeatureUpdate` | The type of content this DeviceUpdateEvent is tracking. |
|
||||||
|
| **UpdateClassification** | [string](/azure/kusto/query/scalar-data-types/string) | `Upgrade` | Whether this content is an Upgrade (FU), Security (QU), NonSecurity (QU) |
|
||||||
|
| **UpdateConnectivityLevel** | [string](/azure/kusto/query/scalar-data-types/string) | `Sufficient-Medium` | Whether or not this device is maintaining a sufficiently cumulative and continuous connection to Windows Update so the update can progress optimally. |
|
||||||
|
| **UpdateDisplayName** | [string](/azure/kusto/query/scalar-data-types/string) | `Windows 10 1909` | The long-form display name for the given update. Varies on content type (FU/QU) |
|
||||||
|
| **UpdateHealthGroupL1** | [string](/azure/kusto/query/scalar-data-types/string) | `Policy preventing update` | Grouping design to describe the current update installation's "health", L1 (highest-level) |
|
||||||
|
| **UpdateHealthGroupL2** | [string](/azure/kusto/query/scalar-data-types/string) | `Policy configured to not update` | Second grouping, subset of L1, more detailed |
|
||||||
|
| **UpdateHealthGroupL3** | [string](/azure/kusto/query/scalar-data-types/string) | `Windows Update Services stopped or disabled` | Third grouping, subset of L3, more detailed |
|
||||||
|
| **UpdateHealthGroupRankL1** | [int](/azure/kusto/query/scalar-data-types/int) | `0100` | Integer for ranking the L1 UpdateHealthGroup |
|
||||||
|
| **UpdateHealthGroupRankL2** | [int](/azure/kusto/query/scalar-data-types/int) | `0010` | Integer for ranking the L2 UpdateHealthGroup |
|
||||||
|
| **UpdateHealthGroupRankL3** | [int](/azure/kusto/query/scalar-data-types/int) | `0001` | Integer for ranking the L3 UpdateHealthGroup |
|
||||||
|
| **UpdateInstalledTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime when event transitioned to UpdateInstalled, else empty. |
|
||||||
|
| **UpdateManufacturer** | [string](/azure/kusto/query/scalar-data-types/string) | `Microsoft` | Manufacturer of update. Microsoft for WU FU/QU, for D&F name of driver manufacturer such as NVIDIA |
|
||||||
|
| **UpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The release date of the update |
|
||||||
|
| **UpdateSource** | [string](/azure/kusto/query/scalar-data-types/string) | `UUP` | The source of the update - UUP, MUv6, Media |
|
||||||
|
|
@ -0,0 +1,76 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance Data Schema - UCDeviceAlert
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: UCDeviceAlert schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# UCDeviceAlert
|
||||||
|
|
||||||
|
These alerts are activated as a result of an issue that is device-specific. It isn't specific to the combination of a specific update and a specific device. Like UpdateAlerts, the AlertType indicates where the Alert comes from (ServiceDeviceAlert, ClientDeviceAlert). For example, an EndOfService alert is a ClientDeviceAlert, as a build no longer being serviced (EOS) is a client-wide state. Meanwhile, DeviceRegistrationIssues in WUfB DS will be a ServiceDeviceAlert, as it's a device-wide state in the service to not be correctly registered.
|
||||||
|
|
||||||
|
|Field |Type |Example |Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **AzureADDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Azure AD Device ID |
|
||||||
|
| **AzureADTenantId** | [string](/azure/kusto/query/scalar-data-types/string) | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Azure AD Tenant ID |
|
||||||
|
| **City** | [string](/azure/kusto/query/scalar-data-types/string) | `Redmond` | The last-reported location of device (city), based on IP address. |
|
||||||
|
| **Country** | [string](/azure/kusto/query/scalar-data-types/string) | `US` | The last-reported location of device (country), based on IP address. Shown as country code. |
|
||||||
|
| **DeviceFamily** | [string](/azure/kusto/query/scalar-data-types/string) | `PC, Phone` | The device family such as PC, Phone |
|
||||||
|
| **DeviceFormFactor** | [string](/azure/kusto/query/scalar-data-types/string) | `Notebook` | The device form factor such as Notebook, Desktop, Phone |
|
||||||
|
| **DeviceManufacturer** | [string](/azure/kusto/query/scalar-data-types/string) | `Hewlett-Packard` | The device OEM Manufacturer such as Hewlett-Packard |
|
||||||
|
| **DeviceModel** | [string](/azure/kusto/query/scalar-data-types/string) | `HP7420 Workstation` | The device's OEM model such as HP7420 Workstation |
|
||||||
|
| **DeviceName** | [string](/azure/kusto/query/scalar-data-types/string) | `JohnPC-Contoso` | Client-provided device name |
|
||||||
|
| **GlobalDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `g:9832741921341` | The global device identifier. |
|
||||||
|
| **IsVirtual** | [bool](/azure/kusto/query/scalar-data-types/bool) | `TRUE` | Whether device is a Virtual Device |
|
||||||
|
| **LastCensusScanTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The last time this device performed a successful Census Scan, if any. |
|
||||||
|
| **LastWUScanTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The last time this device performed a successful WU Scan, if any. |
|
||||||
|
| **OSArchitecture** | [string](/azure/kusto/query/scalar-data-types/string) | `x86` | The architecture of the OS (not the device) this device is currently on. |
|
||||||
|
| **OSBuild** | [string](/azure/kusto/query/scalar-data-types/string) | `10.0.18363.836` | The full OS build installed on this device, for example, Major.Minor.Build.Revision |
|
||||||
|
| **OSBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `da` | The Major, in int format, this device is on |
|
||||||
|
| **OSEdition** | [string](/azure/kusto/query/scalar-data-types/string) | `Professional` | The Windows SKU/Edition |
|
||||||
|
| **OSFeatureUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `Compliant` | Whether or not the device is on the latest Feature Update being Offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSFeatureUpdateEOSTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The end of service date of the Feature Update currently installed on the device. |
|
||||||
|
| **OSFeatureUpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The release date of the Feature Update currently installed on the device. |
|
||||||
|
| **OSFeatureUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `InService;EndOfService` | Whether or not the device is on the latest available Feature Update, for its Feature Update. |
|
||||||
|
| **OSQualityUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `NotCompliant` | Whether or not the device is on the latest Quality Update being Offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSQualityUpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The release date of the Quality Update currently installed on the device. |
|
||||||
|
| **OSQualityUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `Latest;NotLatest` | Whether or not the device is on the latest available Quality Update, for its Feature Update. |
|
||||||
|
| **OSRevisionNumber** | [int](/azure/kusto/query/scalar-data-types/int) | `836` | The revision, in int format, this device is on. |
|
||||||
|
| **OSSecurityUpdateComplianceStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `NotCompliant` | Whether or not the device is on the latest Security update (QU, Classification=Security) being offered by WUfB DS, else NotApplicable. |
|
||||||
|
| **OSSecurityUpdateStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `Latest;NotLatest;MultipleSecurityUpdatesMissing` | Whether or not the device is on the latest available Security Update, for its Feature Update. |
|
||||||
|
| **OSServicingChannel** | [string](/azure/kusto/query/scalar-data-types/string) | `SAC` | The elected Windows 10 Servicing Channel of the device. |
|
||||||
|
| **OSVersion** | [string](/azure/kusto/query/scalar-data-types/string) | `1909` | The Win10 OS Version (such as 19H2, 20H1, 20H2) currently installed on the device. |
|
||||||
|
| **PrimaryDiskFreeCapacityMb** | [int](/azure/kusto/query/scalar-data-types/int) | `1132` | Free disk capacity of the primary disk in megabytes. |
|
||||||
|
| **SCCMClientId** | [string](/azure/kusto/query/scalar-data-types/string) | `5AB72FAC-93AB-4954-9AB0-6557D0EFA245` | Configuration Manager Client ID, if available. |
|
||||||
|
| **TimeGenerated** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time the snapshot generated this specific record. This is to determine to which batch snapshot this record belongs. |
|
||||||
|
| **Type** | [string](/azure/kusto/query/scalar-data-types/string) | `DeviceEvent` | The EntityType. |
|
||||||
|
| **UpdateConnectivityLevel** | [string](/azure/kusto/query/scalar-data-types/string) | `Insufficient` | Whether or not this device is maintaining a sufficiently cumulative and continuous connection to Windows Update so the update can progress optimally. |
|
||||||
|
| **WUAutomaticUpdates** | [int](/azure/kusto/query/scalar-data-types/int) | `5` | CSP: AllowAutoUpdate &'AuOptions' Enables the IT admin to manage automatic update behavior to scan, download, and install updates. |
|
||||||
|
| **WUDeadlineNoAutoRestart** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP:ConfigureDeadlineNoAutoReboot. Devices won't automatically restart outside of active hours until the deadline is reached, 1 is Enabled, 0 is Disabled (default) |
|
||||||
|
| **WUDODownloadMode** | [string](/azure/kusto/query/scalar-data-types/string) | `Simple (99)` | The WU DO DownloadMode configuration, brought over from Update Compliance. |
|
||||||
|
| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: ConfigureDeadlineForFeatureUpdatesThe WU Feature Update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values greater than 0 indicate the deadline in days. |
|
||||||
|
| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: DeferFeatureUpdates. The WU Feature Update Deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values >0 indicate the policy setting. |
|
||||||
|
| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | `7` | The WU grace period for feature update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the Grace Period in days. |
|
||||||
|
| **WUFeaturePauseEndTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesEndTimeThe time WU Feature Update Pause will end, if activated, else null. |
|
||||||
|
| **WUFeaturePauseStartTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP: PauseFeatureUpdatesStartTime. The time WU Feature Update Pause was activated, if activated, else null. Feature Updates will be paused for 35 days from the specified start date. |
|
||||||
|
| **WUFeaturePauseState** | [string](/azure/kusto/query/scalar-data-types/string) | `NotConfigured` | Indicates pause status of device for FU, possible values are Paused, NotPaused, NotConfigured. |
|
||||||
|
| **WUNotificationLevel** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: UpdateNotificationLevel. This policy allows you to define what Windows Update notifications users see. </br> 0 - Use the default Windows Update notifications (default) </br> 1 - Turn off all notifications, excluding restart warnings </br> 2 - Turn off all notifications, including restart warnings |
|
||||||
|
| **WUPauseUXDisabled** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | CSP: SetDisablePauseUXAccess. This policy allows the IT admin to disable the "Pause Updates" feature. When this policy is enabled, the user can't access the "Pause updates" feature. Supported values 0, 1. |
|
||||||
|
| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | `7` | CSP: ConfigureDeadlineForQualityUpdates The WU Quality Update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values >0 indicate the deadline in days. |
|
||||||
|
| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | `-1` | CSP: DeferQualityUpdatesThe WU Quality Update Deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values >0 indicate the policy setting. |
|
||||||
|
| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | `0` | The WU grace period for quality update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the Grace Period in days. |
|
||||||
|
| **WUQualityPauseEndTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesEndTimeThe time WU Quality Update Pause will end, if activated, else null. |
|
||||||
|
| **WUQualityPauseStartTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | CSP:PauseQualityUpdatesStartTime The time WU Quality Update Pause was activated; if activated; else null. |
|
||||||
|
| **WUQualityPauseState** | [string](/azure/kusto/query/scalar-data-types/string) | `NotConfigured` | Indicates pause status of device for QU, possible values are Paused, NotPaused, NotConfigured. |
|
||||||
|
| **WURestartNotification** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP: AutoRestartRequiredNotificationDismissal. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. The following list shows the supported values: </br> 1 is Auto Dismissal. (default) </br> 2 is User Dismissal. |
|
||||||
|
| **WUServiceURLConfigured** | [string](/azure/kusto/query/scalar-data-types/string) | `http://abcd-srv:8530` | CSP:UpdateServiceUrl. The following list shows the supported values: </br> </br> Not configured. The device checks for updates from Microsoft Update. </br> </br> Set to a URL, such as `http://abcd-srv:8530`, the device checks for updates from the WSUS server at the specified URL.|
|
||||||
|
| **WUUXDisabled** | [int](/azure/kusto/query/scalar-data-types/int) | `1` | CSP:SetDisableUXWUAccess.This policy allows the IT admin to remove access to scan Windows Update. When this policy is enabled, the user can't access the Windows Update scan, download, and install features. Default is 0. Supported values 0, 1. |
|
||||||
|
|
@ -0,0 +1,41 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance Data Schema - UCServiceUpdateStatus
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: UCServiceUpdateStatus schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# UCServiceUpdateStatus
|
||||||
|
|
||||||
|
Update Event that comes directly from the service-side. The event has only service-side information for one device (client), and one update, in one deployment. This event has certain fields removed from it in favor of being able to show data in near real-time.
|
||||||
|
|
||||||
|
| Field | Type | Example | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **AzureADDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | If this DeviceUpdateEvent is from content deployed by a DSS policy, this GUID will map to that policy, otherwise it will be empty. |
|
||||||
|
| **AzureADTenantId** | [string](/azure/kusto/query/scalar-data-types/string) | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | A GUID corresponding to the Azure AD Tenant to which the device belongs. |
|
||||||
|
| **DeploymentId** | [string](/azure/kusto/query/scalar-data-types/string) | `cf1b12a3-3d84-4ce3-bc8e-de48459e252d` | If this DeviceUpdateEvent is from content deployed by a DSS policy, this GUID will map to that policy, otherwise it will be empty. |
|
||||||
|
| **DeploymentIsExpedited** | [bool](/azure/kusto/query/scalar-data-types/bool) | `FALSE` | Whether this content is being expedited by WUfB DS. |
|
||||||
|
| **GlobalDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `g:9832741921341` | Microsoft internal Global Device Identifier |
|
||||||
|
| **OfferReadyTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime of OfferReady transition. If empty, not yet been Offered. |
|
||||||
|
| **ProjectedOfferReadyTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | Projected time update will be Offered to device. If empty, unknown. |
|
||||||
|
| **ServiceState** | [string](/azure/kusto/query/scalar-data-types/string) | `Offering` | High-level state of update's status relative to device, service-side. |
|
||||||
|
| **ServiceSubstate** | [string](/azure/kusto/query/scalar-data-types/string) | `OfferReady` | Low-level state of update's status relative to device, service-side. |
|
||||||
|
| **ServiceSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | `100` | Ranking of Substates for sequential ordering in funnel-type views. The rankings between ServiceSubstate and ClientSubstate can be used together. |
|
||||||
|
| **ServiceSubstateTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime of last ServiceSubstate transition. |
|
||||||
|
| **TargetBuild** | [string](/azure/kusto/query/scalar-data-types/string) | `10.0.18363.836` | The full build for the content this event is tracking. For Windows 10, this string corresponds to "10.0.Build.Revision" |
|
||||||
|
| **TargetVersion** | [int](/azure/kusto/query/scalar-data-types/int) | `1909` | The version of content this DeviceUpdateEvent is tracking. For Windows 10 updates, this number would correspond to the YR/MO version format used (1903). |
|
||||||
|
| **TimeGenerated** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | Time snapshot ran; OR same as EventDateTimeUTC in the case of NRT (future) |
|
||||||
|
| **Type** | [string](/azure/kusto/query/scalar-data-types/string) | `ServiceUpdateEvent` | The EntityType |
|
||||||
|
| **UpdateCategory** | [string](/azure/kusto/query/scalar-data-types/string) | `WindowsFeatureUpdate` | The type of content this DeviceUpdateEvent is tracking. |
|
||||||
|
| **UpdateClassification** | [string](/azure/kusto/query/scalar-data-types/string) | `Upgrade` | Whether this content is an Upgrade (FU), Security (QU), NonSecurity (QU) |
|
||||||
|
| **UpdateDisplayName** | [string](/azure/kusto/query/scalar-data-types/string) | `2022-04 Cumulative Update for Windows 10 Version 21H1 for x64-based Systems (KB5012599)` | Friendly update display name. For Windows OS updates, there's a naming convention. For D&F, it's DriverFileName |
|
||||||
|
| **UpdateManufacturer** | [string](/azure/kusto/query/scalar-data-types/string) | `Microsoft` | Manufacturer of update. Microsoft for WU FU/QU, for D&F name of driver manufacturer such as NVIDIA |
|
||||||
|
| **UpdateReleaseTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | DateTime of update's release date. |
|
@ -0,0 +1,52 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance Data Schema - UCUpdateAlert
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: UCUpdateAlert schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# UCUpdateAlert
|
||||||
|
|
||||||
|
Alert for both client and service update. Contains information that needs attention, relative to one device (client), one update, and one deployment (if relevant). Certain fields may be blank depending on the UpdateAlert's AlertType field; for example, ServiceUpdateAlert will not necessarily contain client-side statuses.
|
||||||
|
|
||||||
|
|
||||||
|
|Field |Type |Example |Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| **AlertClassification** | [string](/azure/kusto/query/scalar-data-types/string) | `Error` | Whether this Alert is an Error, a Warning, or Informational. |
|
||||||
|
| **AlertData** | [string](/azure/kusto/query/scalar-data-types/string) {json} | `{ "freeDiskCapacityMb": 3213, "contentSizeMb": 4381}` | An optional string formatted as a json payload containing metadata for the alert. |
|
||||||
|
| **AlertId** | [string](/azure/kusto/query/scalar-data-types/string) | `9e107d9d372bb6826bd81d3542a419d6` | The unique identifier of this Alert. |
|
||||||
|
| **AlertRank** | [int](/azure/kusto/query/scalar-data-types/int) | `1000` | Integer ranking of Alert for prioritization during troubleshooting |
|
||||||
|
| **AlertStatus** | [string](/azure/kusto/query/scalar-data-types/string) | `Active` | Whether this Alert is Active, Resolved, or Deleted. |
|
||||||
|
| **AlertSubtype** | [string](/azure/kusto/query/scalar-data-types/string) | `DiskFull` | The Subtype of Alert. |
|
||||||
|
| **AlertType** | [string](/azure/kusto/query/scalar-data-types/string) | `ClientUpdateAlert` | The type of Alert such as ClientUpdateAlert or ServiceUpdateAlert. Indicates which fields will be present. |
|
||||||
|
| **AzureADDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Azure AD Device ID of the device, if available. |
|
||||||
|
| **AzureADTenantId** | [string](/azure/kusto/query/scalar-data-types/string) | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Azure AD Tenant ID of the device. |
|
||||||
|
| **ClientSubstate** | [string](/azure/kusto/query/scalar-data-types/string) | `DownloadStart` | If the Alert is from the Client, the ClientSubstate at the time this Alert was activated or updated, else Empty. |
|
||||||
|
| **ClientSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | `2300` | Rank of ClientSubstate |
|
||||||
|
| **DeploymentId** | [string](/azure/kusto/query/scalar-data-types/string) | `cf1b12a3-3d84-4ce3-bc8e-de48459e252d` | The Deployment this Alert is relative to, if there's one. |
|
||||||
|
| **Description** | [string](/azure/kusto/query/scalar-data-types/string) | `Disk full` | A localized string translated from a combination of other Alert fields + language preference that describes the issue in detail. |
|
||||||
|
| **DeviceName** | [string](/azure/kusto/query/scalar-data-types/string) | `JohnPC-Contoso` | The given device's name |
|
||||||
|
| **ErrorCode** | [string](/azure/kusto/query/scalar-data-types/string) | `0x8326CFA2D_C3FD` | The Error Code, if any, that triggered this Alert. In the case of Client-based explicit alerts, error codes can have extended error codes, which are appended to the error code with an underscore separator. |
|
||||||
|
| **ErrorSymName** | [string](/azure/kusto/query/scalar-data-types/string) | `WU_E_DISK_FULL` | The symbolic name that maps to the Error Code, if any. Otherwise empty. |
|
||||||
|
| **GlobalDeviceId** | [string](/azure/kusto/query/scalar-data-types/string) | `g:1298371934870` | Internal Microsoft Global identifier, if available. |
|
||||||
|
| **Recommendation** | [string](/azure/kusto/query/scalar-data-types/string) | `Free up disk space.` | A localized string translated from RecommendedAction, Message, and other fields (depending on source of Alert) that provides a recommended action. |
|
||||||
|
| **ResolvedTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time this alert was resolved, else empty. |
|
||||||
|
| **SCCMClientId** | [string](/azure/kusto/query/scalar-data-types/string) | `5AB72FAC-93AB-4954-9AB0-6557D0EFA245` | SCCM Client ID of the device, if available. |
|
||||||
|
| **ServiceSubstate** | [string](/azure/kusto/query/scalar-data-types/string) | `OfferReady` | If the Alert is from the Service, the ServiceSubstate at the time this Alert was activated or updated, else Empty. |
|
||||||
|
| **ServiceSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | `100` | Rank of ServiceSubstate |
|
||||||
|
| **StartTime** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time this alert was activated. |
|
||||||
|
| **TargetBuild** | [string](/azure/kusto/query/scalar-data-types/string) | `18363.836` | The Windows 10 Major.Revision this UpdateAlert is relative to. |
|
||||||
|
| **TargetVersion** | [string](/azure/kusto/query/scalar-data-types/string) | `1909` | The Windows 10 Build this UpdateAlert is relative to. |
|
||||||
|
| **TimeGenerated** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | `2020-05-14 09:26:03.478039` | The time the snapshot generated this specific record. This is to determine to which batch snapshot this record belongs. |
|
||||||
|
| **Type** | [string](/azure/kusto/query/scalar-data-types/string) | `UpdateAlert` | The entity type. |
|
||||||
|
| **UpdateCategory** | [string](/azure/kusto/query/scalar-data-types/string) | `WindowsFeatureUpdate` | The type of content this DeviceUpdateEvent is tracking. |
|
||||||
|
| **UpdateClassification** | [string](/azure/kusto/query/scalar-data-types/string) | `Upgrade` | Whether this content is an Upgrade (FU), Security (QU), NonSecurity (QU) |
|
||||||
|
| **URL** | [string](/azure/kusto/query/scalar-data-types/string) | `aka.ms/errordetail32152` | An optional URL to get more in-depth information related to this alert. |
|
43
windows/deployment/update-compliance-v2-schema.md
Normal file
43
windows/deployment/update-compliance-v2-schema.md
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
title: Update Compliance version 2 Data Schema
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dougeby
|
||||||
|
description: An overview of Update Compliance version 2data schema
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.collection: M365-analytics
|
||||||
|
ms.topic: reference
|
||||||
|
---
|
||||||
|
|
||||||
|
# Update Compliance version 2 schema
|
||||||
|
|
||||||
|
When the visualizations provided in the default experience don't fulfill your reporting needs, or if you need to troubleshoot issues with devices, it's valuable to understand the schema for Update Compliance and have a high-level understanding of the capabilities of [Azure Monitor log queries](/azure/azure-monitor/log-query/query-language) to power additional dashboards, integration with external data analysis tools, automated alerting, and more.
|
||||||
|
|
||||||
|
The table below summarizes the different tables that are part of the Update Compliance solution. To learn how to navigate Azure Monitor Logs to find this data, see [Get started with log queries in Azure Monitor](/azure/azure-monitor/log-query/get-started-queries).
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Data is collected daily. The TimeGenerated field shows the time data was collected. It's added by Log Analytics when data is collected. Device data from the past 28 days is collected, even if no new data has been generated since the last time. LastScan is a clearer indicator of data freshness (that is, the last time the values were updated), while TimeGenerated indicates the freshness of data within Log Analytics.
|
||||||
|
|
||||||
|
|Table |Category |Description |
|
||||||
|
|--|--|--|
|
||||||
|
| [**UCClient**](update-compliance-v2-schema-ucclient.md) | Device record | UCClient acts as an individual device's record. It contains data such as the currently installed build, the device's name, the OS Edition, and active hours (quantitative). |
|
||||||
|
| [**UCClientUpdateStatus**](update-compliance-v2-schema-ucclientupdatestatus.md) | Device record | Update Event that combines the latest client-based data with the latest service-based data to create a complete picture for one device (client) and one update. |
|
||||||
|
| [**UCServiceUpdateStatus**](update-compliance-v2-schema-ucserviceupdatestatus.md) | Service record | Update Event that comes directly from the service-side. The event has only service-side information for one device (client), and one update, in one deployment. This event has certain fields removed from it in favor of being able to show data in near real-time. |
|
||||||
|
| [**UCUpdateAlert**](update-compliance-v2-schema-ucupdatealert.md) | Service and device records | Alert for both client and service update. Contains information that needs attention, relative to one device (client), one update, and one deployment (if relevant). Certain fields may be blank depending on the UpdateAlert's AlertType field; for example, ServiceUpdateAlert will not necessarily contain client-side statuses. |
|
||||||
|
| [**UCDeviceAlert**] (update-compliance-v2-schema-ucdevicealert.md)| Service and device record | These alerts are activated as a result of an issue that is device-specific. It isn't specific to the combination of a specific update and a specific device. Like UpdateAlerts, the AlertType indicates where the Alert comes from (ServiceDeviceAlert, ClientDeviceAlert). For example, an EndOfService alert is a ClientDeviceAlert, as a build no longer being serviced (EOS) is a client-wide state. Meanwhile, DeviceRegistrationIssues in WUfB DS will be a ServiceDeviceAlert, as it's a device-wide state in the service to not be correctly registered. |
|
||||||
|
|
||||||
|
## Schema used by earlier version of Update Compliance
|
||||||
|
|
||||||
|
You may notice that you can also access the schema used by an earlier version of Update Compliance. The table below is provided as a
|
||||||
|
|
||||||
|
|Table |Category |Description |
|
||||||
|
|--|--|--|
|
||||||
|
|[**WaaSUpdateStatus**](update-compliance-schema-waasupdatestatus.md) |Device record |This table houses device-centric data and acts as the device record for Update Compliance. Each record provided in daily snapshots map to a single device in a single tenant. This table has data such as the current device's installed version of Windows, whether it is on the latest available updates, and whether the device needs attention. |
|
||||||
|
|[**WaaSInsiderStatus**](update-compliance-schema-waasinsiderstatus.md) |Device record |This table houses device-centric data specifically for devices enrolled to the Windows Insider Program. Devices enrolled to the Windows Insider Program do not currently have any WaaSDeploymentStatus records, so do not have Update Session data to report on update deployment progress. |
|
||||||
|
|[**WaaSDeploymentStatus**](update-compliance-schema-waasdeploymentstatus.md) |Update Session record |This table tracks a specific update on a specific device. Multiple WaaSDeploymentStatus records can exist simultaneously for a given device, as each record is specific to a given update and its type. For example, a device can have both a WaaSDeploymentStatus tracking a Windows Feature Update, as well as one tracking a Windows Quality Update, at the same time. |
|
||||||
|
|[**WUDOStatus**](update-compliance-schema-wudostatus.md) |Delivery Optimization record |This table provides information, for a single device, on their bandwidth utilization across content types in the event they use [Delivery Optimization](https://support.microsoft.com/help/4468254/windows-update-delivery-optimization-faq). |
|
||||||
|
|[**WUDOAggregatedStatus**](update-compliance-schema-wudoaggregatedstatus.md) |Delivery Optimization record |This table aggregates all individual WUDOStatus records across the tenant and summarizes bandwidth savings across all devices enrolled to Delivery Optimization. |
|
46
windows/deployment/update-status-admin-center.md
Normal file
46
windows/deployment/update-status-admin-center.md
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft admin center software updates page
|
||||||
|
manager: dougeby
|
||||||
|
description: Microsoft admin center populates Update Compliance data into the software updates page.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.collection:
|
||||||
|
- M365-analytics
|
||||||
|
- highpri
|
||||||
|
ms.topic: article
|
||||||
|
ms.date: 04/10/2022
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft admin center software updates page
|
||||||
|
<!--37063317-->
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows 11
|
||||||
|
- Update compliance
|
||||||
|
- Microsoft admin center
|
||||||
|
|
||||||
|
The **Software updates** page in the [Microsoft admin center](https://admin.microsoft.com) is a high-level overview of the status of updates in your environment. The **Software updates** page has following three tab to help you monitor your clients:
|
||||||
|
|
||||||
|
- **Microsoft 365 Apps**: Displays update status for Microsoft 365 Apps.
|
||||||
|
- For more information about the **Microsoft 365 Apps** tab, see [Microsoft 365 Apps updates in the admin center](/microsoft-365/admin/admin-overview/admin-center-overview).
|
||||||
|
- **Windows**: Displays compliance charts for cumulative updates and feature updates for Windows clients. This article contains information about this tab.
|
||||||
|
- **Exchange Server**: Displays update status for Exchange servers.
|
||||||
|
- For more information about the **Microsoft 365 Apps** tab, see [Exchange updates in the admin center](/microsoft-365/admin/admin-overview/admin-center-overview).
|
||||||
|
|
||||||
|
|
||||||
|
**Insert awesome picture here**
|
||||||
|
|
||||||
|
|
||||||
|
## Windows updates in the admin center
|
||||||
|
|
||||||
|
The **Windows** tab in the **Software updates** page in the Microsoft admin center is populated by data from [Update Compliance](update-compliance-get-started.md). The tab contains a high-level overview of update compliance for Windows clients in your environment. The **Devices by update status** chart gives you a visual representation of how many devices are in the following states for the monthly cumulative updates:
|
||||||
|
|
||||||
|
- Up to date
|
||||||
|
- Missing security updates
|
||||||
|
- Un-supported operating system
|
Binary file not shown.
After Width: | Height: | Size: 503 KiB |
Binary file not shown.
After Width: | Height: | Size: 426 KiB |
Binary file not shown.
After Width: | Height: | Size: 210 KiB |
Loading…
x
Reference in New Issue
Block a user