mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
fixing warnings some more
This commit is contained in:
parent
e9929d6d8a
commit
c838c702ae
@ -241,7 +241,7 @@ On **CM01**:
|
||||
2. Right-click **PS1 - Primary Site 1**, point to **Configure Site Components**, and then select **Software Distribution**.
|
||||
3. On the **Network Access Account** tab, select **Specify the account that accesses network locations** and add the *New Account* **CONTOSO\\CM\_NAA** as the Network Access account (password: pass@word1). Use the new **Verify** option to verify that the account can connect to the **\\\\DC01\\sysvol** network share.
|
||||
|
||||

|
||||

|
||||
|
||||
Test the connection for the Network Access account.
|
||||
|
||||
@ -261,7 +261,7 @@ On **CM01**:
|
||||
* Require a password when computers use PXE
|
||||
* Password and Confirm password: pass@word1
|
||||
|
||||

|
||||

|
||||
|
||||
Configure the CM01 distribution point for PXE.
|
||||
|
||||
|
@ -164,7 +164,7 @@ In this example, you use three security groups from Table 1 in [Build deployment
|
||||
10. In the **OMA-URI** box, type **./Vendor/MSFT/Policy/Config/Update/DeferFeatureUpdatesPeriodInDays**.
|
||||
11. In the **Value** box, type **28**, and then click **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
9. Click **Save Policy**.
|
||||
|
||||
@ -205,7 +205,7 @@ You have now configured the **Ring 2 Pilot Business Users** deployment ring to e
|
||||
|
||||
11. In the **Value** box, type **0**, and then click **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
12. Click **Save Policy**.
|
||||
|
||||
|
@ -229,11 +229,11 @@ Ensure the VM booted from the installation ISO, click **Next** then click **Inst
|
||||
|
||||
After the VM restarts, during OOBE, it's fine to select **Set up for personal use** or **Domain join instead** and then choose an offline account on the **Sign in** screen. This will offer the fastest way to the desktop. For example:
|
||||
|
||||

|
||||

|
||||
|
||||
Once the installation is complete, sign in and verify that you are at the Windows 10 desktop, then create your first Hyper-V checkpoint. Checkpoints are used to restore the VM to a previous state. You will create multiple checkpoints throughout this lab, which can be used later to go through the process again.
|
||||
|
||||

|
||||

|
||||
|
||||
To create your first checkpoint, open an elevated Windows PowerShell prompt on the computer running Hyper-V (not on the VM) and run the following:
|
||||
|
||||
@ -497,7 +497,7 @@ Under **Manage**, click **Assignments**, and then with the **Include** tab highl
|
||||
|
||||
Click **Select** and then click **Save**.
|
||||
|
||||

|
||||

|
||||
|
||||
It's also possible to assign specific users to a profile, but we will not cover this scenario in the lab. For more detailed information, see [Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/intune/enrollment-autopilot).
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user