diff --git a/devices/surface-hub/setup-worksheet-surface-hub.md b/devices/surface-hub/setup-worksheet-surface-hub.md
index 49b0f51d45..a77cf5850f 100644
--- a/devices/surface-hub/setup-worksheet-surface-hub.md
+++ b/devices/surface-hub/setup-worksheet-surface-hub.md
@@ -33,7 +33,7 @@ You should fill out one list for each Surface Hub you need to configure, althoug
If your network uses a proxy for network and/or Internet access, you must provide a script or server/port information.
- Proxy script: http://contoso/proxy.pa
+ Proxy script: http://contoso/proxy.pa
- OR -
Server and port info: 10.10.10.100, port 80
diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md
index 07d07e34a6..eff3b9bb69 100644
--- a/devices/surface/TOC.md
+++ b/devices/surface/TOC.md
@@ -1,21 +1,25 @@
# [Surface](index.md)
-## [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
-## [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)
+## [Deploy Surface devices](deploy.md)
+### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md)
+### [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md)
+### [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)
+### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)
+### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)
+#### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
+#### [Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md)
+## [Surface firmware and driver updates](update.md)
+### [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
+### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
+### [Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md)
+### [Surface Dock Updater](surface-dock-updater.md)
## [Deploy Surface app with Windows Store for Business](deploy-surface-app-with-windows-store-for-business.md)
-## [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md)
-## [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)
-## [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)
-## [Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md)
-## [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
## [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
-## [Surface Data Eraser](microsoft-surface-data-eraser.md)
-## [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)
-### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
-## [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md)
-## [Surface Dock Updater](surface-dock-updater.md)
+### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
## [Surface Enterprise Management Mode](surface-enterprise-management-mode.md)
### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
-## [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md)
+## [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md)
+## [Surface Data Eraser](microsoft-surface-data-eraser.md)
+
diff --git a/devices/surface/advanced-uefi-security-features-for-surface.md b/devices/surface/advanced-uefi-security-features-for-surface.md
new file mode 100644
index 0000000000..9c6edd4717
--- /dev/null
+++ b/devices/surface/advanced-uefi-security-features-for-surface.md
@@ -0,0 +1,3 @@
+---
+redirect_url: https://technet.microsoft.com/itpro/surface/advanced-uefi-security-features-for-surface-pro-3
+---
\ No newline at end of file
diff --git a/devices/surface/deploy.md b/devices/surface/deploy.md
new file mode 100644
index 0000000000..517aca2f0b
--- /dev/null
+++ b/devices/surface/deploy.md
@@ -0,0 +1,43 @@
+---
+title: Deploy Surface devices (Surface)
+description: Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator.
+ms.prod: w10
+ms.mktglfcycl: manage
+ms.pagetype: surface, devices
+ms.sitesec: library
+author: heatherpoulsen
+---
+
+# Deploy Surface devices
+
+Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator.
+
+## In this section
+
+| Topic | Description |
+| --- | --- |
+| [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) | Walk through the recommended process of how to deploy Windows 10 to your Surface devices with the Microsoft Deployment Toolkit.|
+| [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md)| Find out how to perform a Windows 10 upgrade deployment to your Surface devices. |
+| [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)| Walk through the process of customizing the Surface out-of-box experience for end users in your organization.|
+| [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)| Get guidance and answers to help you perform a network deployment to Surface devices.|
+| [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)| See how Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices. |
+
+
+
+
+
+## Related topics
+
+
+[Surface TechCenter](https://technet.microsoft.com/windows/surface)
+
+[Surface for IT pros blog](http://blogs.technet.com/b/surface/)
+
+
+
+
+
+
+
+
+
diff --git a/devices/surface/images/using-sda-driverfiles-fig1.png b/devices/surface/images/using-sda-driverfiles-fig1.png
new file mode 100644
index 0000000000..51244bfe16
Binary files /dev/null and b/devices/surface/images/using-sda-driverfiles-fig1.png differ
diff --git a/devices/surface/images/using-sda-installcommand-fig2.png b/devices/surface/images/using-sda-installcommand-fig2.png
new file mode 100644
index 0000000000..61a4fbd1f2
Binary files /dev/null and b/devices/surface/images/using-sda-installcommand-fig2.png differ
diff --git a/devices/surface/images/using-sda-newinstall-fig3.png b/devices/surface/images/using-sda-newinstall-fig3.png
new file mode 100644
index 0000000000..ff18b67e3e
Binary files /dev/null and b/devices/surface/images/using-sda-newinstall-fig3.png differ
diff --git a/devices/surface/index.md b/devices/surface/index.md
index 20b688e39b..39305ac4af 100644
--- a/devices/surface/index.md
+++ b/devices/surface/index.md
@@ -12,96 +12,28 @@ author: heatherpoulsen
# Surface
-## Purpose
-
-
This library provides guidance to help you deploy Windows on Surface devices, keep those devices up to date, and easily manage and support Surface devices in your organization.
For more information on planning for, deploying, and managing Surface devices in your organization, see the [Surface TechCenter](https://technet.microsoft.com/en-us/windows/surface).
## In this section
+| Topic | Description |
+| --- | --- |
+| [Deploy Surface devices](deploy.md) | Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator. |
+| [Surface firmware and driver updates](update.md) | Find out how to download and manage the latest firmware and driver updates for your Surface device. |
+| [Deploy Surface app with Windows Store for Business](deploy-surface-app-with-windows-store-for-business.md) | Find out how to add and download Surface app with Windows Store for Business, as well as install Surface app with PowerShell and MDT. |
+| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. |
+| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. |
+| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. |
+| [Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md) | Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the hardware of your Surface device. |
+| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
+
+
+
+
-
-
-
-
-
-
-
-
-
-
-[Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md) |
-Find out how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices. |
-
-
-[Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md) |
-Walk through the process of customizing the Surface out-of-box experience for end users in your organization. |
-
-
-[Deploy Surface app with Windows Store for Business](deploy-surface-app-with-windows-store-for-business.md) |
-Find out how to add and download Surface app with Windows Store for Business, as well as install Surface app with PowerShell and MDT. |
-
-
-[Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) |
-Walk through the recommended process of how to deploy Windows 10 to your Surface devices with the Microsoft Deployment Toolkit. |
-
-
-[Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) |
-Get a list of the available downloads for Surface devices and links to download the drivers and firmware for your device. |
-
-
-[Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) |
-Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. |
-
-
-[Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md) |
-Get guidance and answers to help you perform a network deployment to Surface devices. |
-
-
-[Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md) |
-Read about the different methods you can use to manage the process of Surface Dock firmware updates. |
-
-
-[Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md) |
-Explore the available options to manage firmware and driver updates for Surface devices. |
-
-
-[Manage Surface UEFI settings](manage-surface-uefi-settings.md) |
-Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. |
-
-
-[Surface Data Eraser](microsoft-surface-data-eraser.md) |
-Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
-
-
-[Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) |
-See how Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices. |
-
-
-[Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md) |
-Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the hardware of your Surface device. |
-
-
-[Surface Dock Updater](surface-dock-updater.md) |
-Get a detailed walkthrough of Microsoft Surface Dock Updater. |
-
-
-[Surface Enterprise Management Mode](surface-enterprise-management-mode.md) |
-See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization.
- |
-
-
-[Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md) |
-Find out how to perform a Windows 10 upgrade deployment to your Surface devices. |
-
-
-
diff --git a/devices/surface/manage-surface-uefi-settings.md b/devices/surface/manage-surface-uefi-settings.md
index 246334a4d4..a34215254f 100644
--- a/devices/surface/manage-surface-uefi-settings.md
+++ b/devices/surface/manage-surface-uefi-settings.md
@@ -14,7 +14,8 @@ author: miladCA
Current and future generations of Surface devices, including Surface Pro 4 and Surface Book, use a unique UEFI firmware engineered by Microsoft specifically for these devices. This firmware allows for significantly greater control of the device’s operation over firmware versions in earlier generation Surface devices, including the support for touch, mouse, and keyboard operation. By using the Surface UEFI settings you can easily enable or disable internal devices or components, configure security to protect UEFI settings from being changed, and adjust the Surface device boot settings.
->**Note:** Surface Pro 3, Surface 3, Surface Pro 2, Surface 2, Surface Pro, and Surface do not use the Surface UEFI and instead use firmware provided by third-party manufacturers, such as AMI.
+>[!NOTE]
+>Surface Pro 3, Surface 3, Surface Pro 2, Surface 2, Surface Pro, and Surface do not use the Surface UEFI and instead use firmware provided by third-party manufacturers, such as AMI.
You can enter the Surface UEFI settings on your Surface device by pressing the **Volume Up** button and the **Power** button simultaneously. Hold the **Volume Up** button until the Surface logo is displayed, which indicates that the device has begun to boot.
@@ -137,3 +138,7 @@ Use the **Restart Now** button on the **Exit** page to exit UEFI settings, as sh

*Figure 8. Click Restart Now to exit Surface UEFI and restart the device*
+
+## Related topics
+
+[Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
\ No newline at end of file
diff --git a/devices/surface/microsoft-surface-deployment-accelerator.md b/devices/surface/microsoft-surface-deployment-accelerator.md
index 169358ad9a..9c4d792a9d 100644
--- a/devices/surface/microsoft-surface-deployment-accelerator.md
+++ b/devices/surface/microsoft-surface-deployment-accelerator.md
@@ -115,6 +115,10 @@ This version is the original release of SDA. This version of SDA includes suppor
* Windows 8.1
-
+## Related topics
+
+[Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
+
+[Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md)
diff --git a/devices/surface/surface-enterprise-management-mode.md b/devices/surface/surface-enterprise-management-mode.md
index 981d6dae06..3361d3002c 100644
--- a/devices/surface/surface-enterprise-management-mode.md
+++ b/devices/surface/surface-enterprise-management-mode.md
@@ -13,7 +13,8 @@ author: jobotto
Microsoft Surface Enterprise Management Mode (SEMM) is a feature of Surface devices with Surface UEFI that allows you to secure and manage firmware settings within your organization. With SEMM, IT professionals can prepare configurations of UEFI settings and install them on a Surface device. In addition to the ability to configure UEFI settings, SEMM also uses a certificate to protect the configuration from unauthorized tampering or removal.
->**Note**: SEMM is only available on devices with Surface UEFI firmware, such as Surface Pro 4 and Surface Book. For more information about Surface UEFI, see [Manage Surface UEFI Settings](https://technet.microsoft.com/en-us/itpro/surface/manage-surface-uefi-settings).
+>[!NOTE]
+>SEMM is only available on devices with Surface UEFI firmware, such as Surface Pro 4 and Surface Book. For more information about Surface UEFI, see [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).
When Surface devices are configured by SEMM and secured with the SEMM certificate, they are considered *enrolled* in SEMM. When the SEMM certificate is removed and control of UEFI settings is returned to the user of the device, the Surface device is considered *unenrolled* in SEMM.
@@ -25,7 +26,8 @@ The primary workspace of SEMM is Microsoft Surface UEFI Configurator, as shown i
*Figure 1. Microsoft Surface UEFI Configurator*
->**Note**: Windows 10 is required to run Microsoft Surface UEFI Configurator
+>[!NOTE]
+>Windows 10 is required to run Microsoft Surface UEFI Configurator
You can use the Microsoft Surface UEFI Configurator tool in three modes:
@@ -36,7 +38,7 @@ You can use the Microsoft Surface UEFI Configurator tool in three modes:
#### Download Microsoft Surface UEFI Configurator
-You can download Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/en-us/download/details.aspx?id=46703) page in the Microsoft Download Center.
+You can download Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) page in the Microsoft Download Center.
### Configuration package
@@ -48,7 +50,8 @@ Surface UEFI configuration packages are the primary mechanism to implement and m
See the [Surface Enterprise Management Mode certificate requirements](#surface-enterprise-management-mode-certificate-requirements) section of this article for more information about the requirements for the SEMM certificate.
->**Note**: You can also specify a UEFI password with SEMM that is required to view the **Security**, **Devices**, **Boot Configuration**, or **Enterprise Management** pages of Surface UEFI.
+>[!NOTE]
+>You can also specify a UEFI password with SEMM that is required to view the **Security**, **Devices**, **Boot Configuration**, or **Enterprise Management** pages of Surface UEFI.
After a device is enrolled in SEMM, the configuration file is read and the settings specified in the file are applied to UEFI. When you run a configuration package on a device that is already enrolled in SEMM, the signature of the configuration file is checked against the certificate that is stored in the device firmware. If the signature does not match, no changes are applied to the device.
@@ -85,7 +88,8 @@ You can configure the following advanced settings with SEMM:
* Display of the Surface UEFI **Devices** page
* Display of the Surface UEFI **Boot** page
->**Note**: When you create a SEMM configuration package, two characters are shown on the **Successful** page, as shown in Figure 5.
+>[!NOTE]
+>When you create a SEMM configuration package, two characters are shown on the **Successful** page, as shown in Figure 5.

@@ -113,11 +117,13 @@ In some scenarios, it may be impossible to use a Surface UEFI reset package. (Fo
When you use the process on the **Enterprise Management** page to reset SEMM on a Surface device, you are provided with a Reset Request. This Reset Request can be saved as a file to a USB drive, copied as text, or read as a QR Code with a mobile device to be easily emailed or messaged. Use the Microsoft Surface UEFI Configurator Reset Request option to load a Reset Request file or enter the Reset Request text or QR Code. Microsoft Surface UEFI Configurator will generate a verification code that can be entered on the Surface device. If you enter the code on the Surface device and click **Restart**, the device will be unenrolled from SEMM.
->**Note**: A Reset Request expires two hours after it is created.
+>[!NOTE]
+>A Reset Request expires two hours after it is created.
## Surface Enterprise Management Mode certificate requirements
->**Note**: The SEMM certificate is required to perform any modification to SEMM or Surface UEFI settings on enrolled Surface devices. If the SEMM certificate is corrupted or lost, SEMM cannot be removed or reset. Manage your SEMM certificate accordingly with an appropriate solution for backup and recovery.
+>[!NOTE]
+>The SEMM certificate is required to perform any modification to SEMM or Surface UEFI settings on enrolled Surface devices. If the SEMM certificate is corrupted or lost, SEMM cannot be removed or reset. Manage your SEMM certificate accordingly with an appropriate solution for backup and recovery.
Packages created with the Microsoft Surface UEFI Configurator tool are signed with a certificate. This certificate ensures that after a device is enrolled in SEMM, only packages created with the approved certificate can be used to modify the settings of UEFI. The following settings are recommended for the SEMM certificate:
@@ -132,8 +138,9 @@ Packages created with the Microsoft Surface UEFI Configurator tool are signed wi
It is also recommended that the SEMM certificate be authenticated in a two-tier public key infrastructure (PKI) architecture where the intermediate certification authority (CA) is dedicated to SEMM, enabling certificate revocation. For more information about a two-tier PKI configuration, see [Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy](https://technet.microsoft.com/library/hh831348).
->**Note**: You can use the following PowerShell script to create a self-signed certificate for use in proof-of-concept scenarios.
- To use this script, copy the following text into Notepad and save the file as a PowerShell script (.ps1). This script creates a certificate with a password of `12345678`.
The certificate generated by this script is not recommended for production environments.
+>[!NOTE]
+>You can use the following PowerShell script to create a self-signed certificate for use in proof-of-concept scenarios.
+ > To use this script, copy the following text into Notepad and save the file as a PowerShell script (.ps1). This script creates a certificate with a password of `12345678`.
The certificate generated by this script is not recommended for production environments.
```
if (-not (Test-Path "Demo Certificate")) { New-Item -ItemType Directory -Force -Path "Demo Certificate" }
@@ -160,4 +167,11 @@ $TestUefiV2 | Export-PfxCertificate -Password $pw -FilePath "Demo Certificate\Te
For use with SEMM and Microsoft Surface UEFI Configurator, the certificate must be exported with the private key and with password protection. Microsoft Surface UEFI Configurator will prompt you to select the SEMM certificate file (.pfx) and certificate password when it is required.
->**Note**: For organizations that use an offline root in their PKI infrastructure, Microsoft Surface UEFI Configurator must be run in an environment connected to the root CA to authenticate the SEMM certificate. The packages generated by Microsoft Surface UEFI Configurator can be transferred as files and therefore can be transferred outside the offline network environment with removable storage, such as a USB stick.
+>[!NOTE]
+>For organizations that use an offline root in their PKI infrastructure, Microsoft Surface UEFI Configurator must be run in an environment connected to the root CA to authenticate the SEMM certificate. The packages generated by Microsoft Surface UEFI Configurator can be transferred as files and therefore can be transferred outside the offline network environment with removable storage, such as a USB stick.
+
+## Related topics
+
+[Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
+
+[Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
\ No newline at end of file
diff --git a/devices/surface/update.md b/devices/surface/update.md
new file mode 100644
index 0000000000..3e00c77e71
--- /dev/null
+++ b/devices/surface/update.md
@@ -0,0 +1,38 @@
+---
+title: Surface firmware and driver updates (Surface)
+description: Find out how to download and manage the latest firmware and driver updates for your Surface device.
+ms.prod: w10
+ms.mktglfcycl: manage
+ms.pagetype: surface, devices
+ms.sitesec: library
+author: heatherpoulsen
+---
+
+# Surface firmware and driver updates
+
+Find out how to download and manage the latest firmware and driver updates for your Surface device.
+
+## In this section
+
+| Topic | Description |
+| --- | --- |
+| [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)| Get a list of the available downloads for Surface devices and links to download the drivers and firmware for your device.|
+| [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)| Explore the available options to manage firmware and driver updates for Surface devices.|
+| [Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md)| Read about the different methods you can use to manage the process of Surface Dock firmware updates.|
+| [Surface Dock Updater](surface-dock-updater.md)| Get a detailed walkthrough of Microsoft Surface Dock Updater.|
+
+
+## Related topics
+
+[Surface TechCenter](https://technet.microsoft.com/windows/surface)
+
+[Surface for IT pros blog](http://blogs.technet.com/b/surface/)
+
+
+
+
+
+
+
+
+
diff --git a/devices/surface/using-the-sda-deployment-share.md b/devices/surface/using-the-sda-deployment-share.md
new file mode 100644
index 0000000000..043150076c
--- /dev/null
+++ b/devices/surface/using-the-sda-deployment-share.md
@@ -0,0 +1,163 @@
+---
+title: Using the Microsoft Surface Deployment Accelerator deployment share (Surface)
+description: Explore the scenarios where you can use SDA to meet the deployment needs of your organization including Proof of Concept, pilot deployment, as well as import additional drivers and applications.
+keywords: deploy, install, automate, deployment solution
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.pagetype: surface, devices
+ms.sitesec: library
+author: Scottmca
+---
+
+# Using the Microsoft Surface Deployment Accelerator deployment share
+
+With Microsoft Surface Deployment Accelerator (SDA), you can quickly and easily set up a deployment solution that is ready to deploy Windows to Surface devices. The prepared environment is built on powerful deployment technologies available from Microsoft, such as the [Microsoft Deployment Toolkit (MDT)](https://technet.microsoft.com/en-us/windows/dn475741), and is capable of immediately performing a deployment after configuration. See [Step-by-Step: Surface Deployment Accelerator](https://technet.microsoft.com/en-us/itpro/surface/step-by-step-surface-deployment-accelerator) for a comprehensive walkthrough of using the SDA wizard to set up a deployment share and perform a deployment.
+
+For more information about SDA and information on how to download SDA, see [Microsoft Surface Deployment Accelerator (SDA)](https://technet.microsoft.com/en-us/itpro/surface/microsoft-surface-deployment-accelerator).
+
+Using SDA provides these primary benefits:
+
+* With SDA, you can create a ready-to-deploy environment that can deploy to target devices as fast as your download speeds allow. The wizard experience enables you to check a few boxes and then the automated process builds your deployment environment for you.
+
+* With SDA, you prepare a deployment environment built on the industry leading deployment solution of MDT. With MDT you can scale from a relatively basic deployment of a few Surface devices to a solution capable of deploying to thousands of devices including all of the different makes and models in your organization and all of the applications required by each device and user.
+
+This article explores four scenarios where you can use SDA to meet the needs of your organization. See [Deploy Windows 10](https://technet.microsoft.com/en-us/itpro/windows/deploy/index) to explore the capabilities of MDT and the Windows deployment technologies available from Microsoft in greater detail.
+
+## Perform a Proof of Concept deployment
+
+One of the primary scenarios for use of SDA is as a Proof of Concept. A *Proof of Concept* (PoC) enables you to test or evaluate the capabilities of a solution or technology. A PoC is often used to illustrate the benefits of the solution or technology to decision makers. For example, if you want to recommend Surface devices as a replacement of older point of sale (POS) systems, you could perform a PoC to demonstrate how Surface devices provide superior computing power, flexibility, and connectivity when compared to alternate options.
+
+Using SDA to prepare a PoC of Surface devices enables you to very quickly prepare a demonstration of Surface device or devices, which gives you more time for customization or preparation. The flexibility of SDA even lets you import resources, like applications and drivers, from existing MDT deployment infrastructure. See the [Work with existing deployment shares](#work-with-existing-deployment-shares) section later in this article for more information.
+
+SDA is also an excellent PoC of the capabilities of MDT. SDA demonstrates just how quickly an MDT deployment environment can be prepared and made ready for deployment to devices. It also shows just how flexible and customizable the MDT solution can be, with support for Windows 10 and Windows 8.1, for Windows Store and desktop applications, and several models of Surface devices.
+
+Some recommendations for a successful PoC with SDA are:
+
+* Keep your SDA deployment environment separate from your production network. This ensures optimal performance and reduces potential for conflicts during your PoC deployment.
+
+* Use a fresh and updated instance of Windows Server to house your SDA deployment share to maintain the simplicity and performance of the demonstration environment.
+
+* Test the deployment process before you demonstrate your PoC. This reduces the potential for unexpected situations and keeps the demonstration focused on the deployment process and Surface devices.
+
+* Use offline files with SDA to further reduce installation times.
+
+* For help with your PoC, contact [Surface Support](https://www.microsoft.com/surface/en-us/support/contact-us-business).
+
+## Perform a pilot deployment
+
+A pilot deployment differs from a PoC. Where a PoC is usually a closed demonstration that is performed prior to the deployment process in order to get approval for the use of certain technologies or solutions, a *pilot deployment* is performed during the deployment process as a limited scope deployment for testing and validation. The focus of a pilot deployment can be as narrow as only a handful of devices, or wide enough to include a significant portion of your organization.
+
+>[!NOTE]
+>A pilot deployment should not replace the testing process that should be performed regularly in the lab as the deployment environment is built and developed. A deployment solution should be tested in virtual and physical environments as new applications and drivers are added and when task sequences are modified and before a pilot deployment is performed.
+
+For example, you are tasked with deploying Surface devices to mobile workers and you want to test the organization’s MDT deployment process by providing a small number of devices to executives. You can use SDA to create an isolated Surface deployment environment and then copy the task sequence, applications, and drivers needed from the production deployment share. This not only enables you to quickly create a Surface deployment, but it also minimizes the risk to the production deployment process used for other types of devices.
+
+For small organizations, the pilot deployment environment of SDA may suffice as a complete deployment solution. Even if you do not have an existing deployment environment, you can import drivers and applications (covered later in this article) to provide a complete deployment solution based on MDT. Even without previous knowledge of MDT or Windows deployment, you can follow the [Step-by-Step: Surface Deployment Accelerator](https://technet.microsoft.com/en-us/itpro/surface/step-by-step-surface-deployment-accelerator) article to get started with a deployment to Surface devices.
+
+## Import additional drivers
+
+The SDA deployment share includes all of the drivers needed for Surface devices. This includes the drivers for the components inside the Surface device, such as the wireless network adapter and the main chipset, as well as drivers for Surface accessories, such as the Surface Dock or Surface USB Ethernet adapters. The SDA deployment share does not, however, include drivers for third-party devices or peripherals.
+
+For example, you may intend to use your Surface device with a thermal printer, credit card reader, and barcode scanner as a POS terminal. In this scenario, the thermal printer, credit card reader, and barcode scanner will very likely require installation of drivers to operate properly. You could potentially download and install these drivers from Windows Update when each peripheral is connected, or you could install the driver package from the manufacturer manually on each Surface device, but the ideal solution is to have these drivers already present in Windows so that when the peripheral is connected, it will just work.
+
+Because SDA is built on MDT, adding the drivers to the SDA deployment share is easy and simple.
+
+>[!NOTE]
+>The drivers must be in the Setup Information File (.inf) format. If the drivers for your device come as an executable file (.exe), they may need to be extracted or installed to procure the .inf file. Some device drivers come packaged with applications, for example an all-in-one printer bundled with scan software. These applications will need to be installed separately from the drivers.
+
+To import drivers for a peripheral device:
+
+1. Download the drivers for your device from the manufacturer web site.
+
+2. Open the MDT Deployment Workbench.
+
+3. Expand the **Deployment Shares** node and expand the SDA deployment share.
+
+4. Expand the **Out-of-Box Drivers** folder.
+
+5. Select the folder of the Surface model for which you would like to include this driver.
+
+6. Click **Import Drivers** to start the Import Drivers Wizard, as shown in Figure 1.
+
+ 
+
+ *Figure 1. Provide the location of your driver files*
+
+7. The Import Drivers Wizard presents a series of steps:
+
+ - **Specify Directory** – Click **Browse** and navigate to the folder where you stored the drivers in Step 1.
+ - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process.
+ - **Progress** – While the drivers are imported, a progress bar is displayed on this page.
+ - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the Import Drivers Wizard.
+
+8. Repeat Steps 5-7 for each Surface model on which you would like to include this driver.
+
+9. Close the Deployment Workbench.
+
+After the drivers are imported for the Surface model, the deployment task sequence will automatically select the drivers during the deployment process and include them in the Windows environment. When you connect your device, such as the barcode scanner in the example, Windows should automatically detect the device and you should be able to use it immediately.
+
+>[!NOTE]
+>You can even import drivers for other computer makes and models to support other devices. See **Step 5: Prepare the drivers repository** in [Deploy a Windows 10 image using MDT 2013 Update 2](https://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-a-windows-10-image-using-mdt) for more information about how to import drivers for other makes and models.
+
+## Import additional applications
+
+As with drivers, the SDA deployment share can be pre-configured with apps like the Surface App and Microsoft Office 365. You can also add applications to the SDA deployment share and configure them to be installed on your Surface devices during deployment of Windows. In the ideal scenario, your Surface devices deployed with the SDA deployment share will include all of the applications needed to be ready for your end users.
+
+In the previous example for including drivers for a POS system, you would also need to include POS software for processing transactions and recording the input from the barcode scanner and credit card reader. To import an application and prepare it for installation on your Surface devices during Windows deployment:
+
+1. Download the application installation files or locate the installation media for your application.
+
+2. Determine the command line instruction for silent installation, usually provided by the developer of the application. For Windows Installer files (.msi), see [Standard Installer Command-Line Options](https://msdn.microsoft.com/library/windows/desktop/aa372024) in the Windows Dev Center.
+
+3. Open the MDT Deployment Workbench.
+
+4. Expand the **Deployment Shares** node and expand the SDA deployment share.
+
+5. Expand the **Applications** folder.
+
+6. Click **New Application** to start the New Application Wizard, as shown in Figure 2.
+
+ 
+
+ *Figure 2: Provide the command to install your application*
+
+7. Follow the steps of the New Application Wizard:
+
+ - **Application Type** – Click **Application with Source Files**, and then click **Next**.
+ - **Details** – Enter a name for the application in the **Application Name** field. Enter publisher, version, and language information in the **Publisher**, **Version**, and **Language** fields if desired. Click **Next**.
+ - **Source** – Click **Browse** to navigate to and select the folder with the application installation files procured in Step 1, and then click **Next**.
+ - **Destination** – Enter a name for the folder where the application files will be stored in the **Specify the Name of the Directory that Should Be Created** field or click **Next** to accept the default name.
+ - **Command Details** – Enter the silent command-line instruction, for example `setup.msi /quiet /norestart`
+ - **Summary** – Review the specified configuration on this page before you click **Next** to begin the import process.
+ - **Progress** – While the installation files are imported, a progress bar is displayed on this page.
+ - **Confirmation** – When the import process completes, the success of the process is displayed on this page. Click **Finish** to complete the New Application Wizard.
+
+8. Click the **Task Sequences** folder, right-click **1 - Deploy Microsoft Surface**, and then click **Properties**.
+
+9. Click the **Task Sequence** tab to view the steps that are included in the new task sequence.
+
+10. Select the **Windows Update (Pre-Application Installation)** step, and then click **Add**.
+
+11. Hover the mouse over **General** under the **Add** menu, and then click **Install Application**. This will add a new step after the selected step for the installation of a specific application as shown in Figure 3.
+
+ 
+
+ *Figure 3. A new Install Application step for Sample POS App*
+
+12. On the **Properties** tab of the new **Install Application** step, enter **Install - Sample POS App** in the **Name** field, where *Sample POS App* is the name of your app.
+
+13. Click **Install a Single Application**, and then click **Browse** to view available applications that have been imported into the deployment share.
+
+14. Select your app from the list of applications, and then click **OK**.
+
+15. Click **OK** to close the task sequence properties.
+
+16. Close the Deployment Workbench.
+
+## Work with existing deployment shares
+
+One of the many benefits of an MDT deployment share is the simplicity of how deployment resources are stored. The MDT deployment share is, at its core, just a standard network file share. All deployment resources, such as Windows images, application installation files, and drivers, are stored in a share that can be browsed with File Explorer, copied and pasted, and moved just like any other file share, provided that you have the necessary permissions. This makes working with deployment resources extremely easy. MDT even allows you to make it easier by allowing you to open multiple deployment shares from the Deployment Workbench and to transfer or copy resources between them.
+
+This ability gives SDA some extra capabilities when used in an environment with an existing MDT infrastructure. For example, if you install SDA on an isolated server to prepare a PoC and then log on to your production MDT deployment share from the Deployment Workbench on your SDA server, you can copy applications, drivers, task sequences, and other components into the SDA deployment share that is prepared with Surface apps and drivers. With this process, in a very short amount time, you can have a deployment environment ready to deploy your organization’s precise requirements to Surface devices.
+
+You can also use this capability in reverse. For example, you can copy the Surface drivers, deployment task sequences, and apps directly into a lab or testing environment following a successful PoC. Using these resources, you can immediately begin to integrate Surface deployment into your existing deployment infrastructure.
diff --git a/education/windows/TOC.md b/education/windows/TOC.md
index 64da3956f1..2e31b14786 100644
--- a/education/windows/TOC.md
+++ b/education/windows/TOC.md
@@ -1,5 +1,4 @@
# [Windows 10 for Education](index.md)
-## [Change history for Windows 10 for Education](change-history-edu.md)
## [Windows 10 editions for education customers](windows-editions-for-education-customers.md)
## [Setup options for Windows 10](set-up-windows-10.md)
### [Use the Set up School PCs app ](use-set-up-school-pcs-app.md)
@@ -18,3 +17,4 @@
## [Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)
## [Deploy Windows 10 in a school district](deploy-windows-10-in-a-school-district.md)
## [Chromebook migration guide](chromebook-migration-guide.md)
+## [Change history for Windows 10 for Education](change-history-edu.md)
diff --git a/mdop/TOC.md b/mdop/TOC.md
index 56e5ab8cd5..edac2c521e 100644
--- a/mdop/TOC.md
+++ b/mdop/TOC.md
@@ -1,21 +1,21 @@
# [Microsoft Desktop Optimization Pack](index.md)
-## [Advanced Group Policy Management](agpm/)
+## [Advanced Group Policy Management](agpm/index.md)
## [Application Virtualization]()
-### [Application Virtualization 5](appv-v5/)
-### [Application Virtualization 4](appv-v4/)
+### [Application Virtualization 5](appv-v5/index.md)
+### [Application Virtualization 4](appv-v4/index.md)
### [SoftGrid Application Virtualization](softgrid-application-virtualization.md)
## [Diagnostics and Recovery Toolset]()
-### [Diagnostics and Recovery Toolset 10](dart-v10/)
-### [Diagnostics and Recovery Toolset 8](dart-v8/)
-### [Diagnostics and Recovery Toolset 7](dart-v7/)
+### [Diagnostics and Recovery Toolset 10](dart-v10/index.md)
+### [Diagnostics and Recovery Toolset 8](dart-v8/index.md)
+### [Diagnostics and Recovery Toolset 7](dart-v7/index.md)
### [Diagnostics and Recovery Toolset 6.5](dart-v65.md)
## [Microsoft Bitlocker Administration and Monitoring]()
-### [Microsoft Bitlocker Administration and Monitoring 2.5](mbam-v25/)
-### [Microsoft Bitlocker Administration and Monitoring 2](mbam-v2/)
-### [Microsoft Bitlocker Administration and Monitoring 1](mbam-v1/)
+### [Microsoft Bitlocker Administration and Monitoring 2.5](mbam-v25/index.md)
+### [Microsoft Bitlocker Administration and Monitoring 2](mbam-v2/index.md)
+### [Microsoft Bitlocker Administration and Monitoring 1](mbam-v1/index.md)
## [Microsoft Enterprise Desktop Virtualization]()
-### [Microsoft Enterprise Desktop Virtualization 2](medv-v2/)
+### [Microsoft Enterprise Desktop Virtualization 2](medv-v2/index.md)
## [User Experience Virtualization]()
-### [User Experience Virtualization 2](uev-v2/)
-### [User Experience Virtualization 1](uev-v1/)
-## [MDOP Solutions and Scenarios](solutions/)
\ No newline at end of file
+### [User Experience Virtualization 2](uev-v2/index.md)
+### [User Experience Virtualization 1](uev-v1/index.md)
+## [MDOP Solutions and Scenarios](solutions/index.md)
\ No newline at end of file
diff --git a/windows/TOC.md b/windows/TOC.md
index 42192a7b73..67fcd1b517 100644
--- a/windows/TOC.md
+++ b/windows/TOC.md
@@ -1,6 +1,6 @@
# [Windows 10 and Windows 10 Mobile](index.md)
-## [What's new in Windows 10](whats-new/)
-## [Plan for Windows 10 deployment](plan/)
-## [Deploy Windows 10](deploy/)
-## [Keep Windows 10 secure](keep-secure/)
-## [Manage and update Windows 10](manage/)
\ No newline at end of file
+## [What's new in Windows 10](whats-new/index.md)
+## [Plan for Windows 10 deployment](plan/index.md)
+## [Deploy Windows 10](deploy/index.md)
+## [Keep Windows 10 secure](keep-secure/index.md)
+## [Manage and update Windows 10](manage/index.md)
\ No newline at end of file
diff --git a/windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md b/windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md
index 425d7331d5..878c230d72 100644
--- a/windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md
+++ b/windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md
@@ -36,13 +36,12 @@ This section will show you how to import some network and storage drivers for Wi
5. On the **Select drivers to include in the boot image** page, select the **Zero Touch WinPE x64** boot image. Also select the **Update distribution points when finished** check box, and click **Next** twice.
-
+
-Figure 21. Add drivers to Windows PE.
-
-**Note**
-The Updating Boot Image part of the wizard will appear to hang when displaying Done. It will complete in a minute or two.
+*Figure 21. Add drivers to Windows PE*
+>[!NOTE]
+>The Updating Boot Image part of the wizard will appear to hang when displaying Done. It will complete in a minute or two.
## Add drivers for Windows 10
@@ -56,31 +55,28 @@ This section illustrates how to add drivers for Windows 10 through an example in
3. On the **Specify the details for the imported driver** page, click **Categories**, create a category named Windows 10 x64 - HP EliteBook 8560w, and then click **Next**.
- 
+ 
- Figure 22. Create driver categories.
+ *Figure 22. Create driver categories*
4. On the **Select the packages to add the imported driver** page, click **New Package**, use the following settings for the package, and then click **Next**:
- 1. Name: Windows 10 x64 - HP EliteBook 8560w
+ * Name: Windows 10 x64 - HP EliteBook 8560w
- 2. Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\HP EliteBook 8560w
-
- **Note**
- The package path does not yet exist, so you have to type it in. The wizard will create the new package in that folder.
+ * Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\HP EliteBook 8560w
+ >[!NOTE]
+ >The package path does not yet exist, so you have to type it in. The wizard will create the new package in that folder.
5. On the **Select drivers to include in the boot image** page, do not select anything, and click **Next** twice. After the package has been created, click **Close**.
-**Note**
-If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
-
-
-
-
-
-Figure 23. Drivers imported and a new driver package created.
+ >[!NOTE]
+ >If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
+
+ 
+
+ *Figure 23. Drivers imported and a new driver package created*
## Related topics
diff --git a/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md b/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md
index c00676a646..f259ac4131 100644
--- a/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md
+++ b/windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md
@@ -25,7 +25,7 @@ For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is
## Create a task sequence using the MDT Integration Wizard
-This section will walk you through the process of creating a System Center 2012 R2 Configuration Manager task sequence for production use.
+This section walks you through the process of creating a System Center 2012 R2 Configuration Manager task sequence for production use.
1. On CM01, using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**.
@@ -33,27 +33,27 @@ This section will walk you through the process of creating a System Center 2012
3. On the **General** page, assign the following settings and then click **Next**:
- 1. Task sequence name: Windows 10 Enterprise x64 RTM
+ * Task sequence name: Windows 10 Enterprise x64 RTM
- 2. Task sequence comments: Production image with Office 2013
+ * Task sequence comments: Production image with Office 2013
4. On the **Details** page, assign the following settings and then click **Next**:
- 1. Join a Domain
+ * Join a Domain
- 2. Domain: contoso.com
+ * Domain: contoso.com
- 1. Account: CONTOSO\\CM\_JD
+ * Account: CONTOSO\\CM\_JD
- 2. Password: Passw0rd!
+ * Password: Passw0rd!
- 3. Windows Settings
+ * Windows Settings
- 1. User name: Contoso
+ * User name: Contoso
- 2. Organization name: Contoso
+ * Organization name: Contoso
- 3. Product key: <blank>
+ * Product key: <blank>
5. On the **Capture Settings** page, accept the default settings, and click **Next**.
@@ -88,12 +88,10 @@ After you create the task sequence, we recommend that you configure the task seq
2. In the **Install** group, select the **Set Variable for Drive Letter** action and configure the following:
- - OSDPreserveDriveLetter: True
-
- **Note**
- If you don't change this value, your Windows installation will end up in E:\\Windows.
-
-
+ * OSDPreserveDriveLetter: True
+
+ >[!NOTE]
+ >If you don't change this value, your Windows installation will end up in E:\\Windows.
3. In the **Post Install** group, select **Apply Network Settings**, and configure the Domain OU value to use the **Contoso / Workstations** OU (browse for values).
@@ -103,57 +101,55 @@ After you create the task sequence, we recommend that you configure the task seq
6. After the **Post Install / Drivers** group, add an **Apply Driver Package** action with the following settings:
- 1. Name: HP EliteBook 8560w
+ * Name: HP EliteBook 8560w
- 2. Driver Package: Windows 10 x64 - HP EliteBook 8560w
+ * Driver Package: Windows 10 x64 - HP EliteBook 8560w
- 3. Options: Task Sequence Variable: Model equals HP EliteBook 8560w
-
- **Note**
- You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
-
-
-
- 
-
- Figure 24. The driver package options.
+ * Options: Task Sequence Variable: Model equals HP EliteBook 8560w
+
+ >[!NOTE]
+ >You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
+
+ 
+
+ *Figure 24. The driver package options*
7. In the **State Restore / Install Applications** group, select the **Install Application** action.
8. Select the **Install the following applications** option, and add the OSD / Adobe Reader XI - OSD Install application to the list.
- 
+ 
- Figure 25. Add an application to the Configuration Manager task sequence.
+ *Figure 25. Add an application to the Configuration Manager task sequence*
9. In the **State Restore** group, after the **Set Status 5** action, add a **Request State Store** action with the following settings:
- 1. Restore state from another computer
+ * Restore state from another computer
- 2. If computer account fails to connect to state store, use the Network Access account
+ * If computer account fails to connect to state store, use the Network Access account
- 3. Options: Continue on error
+ * Options: Continue on error
- 4. Options / Condition:
-
- 1. Task Sequence Variable
-
- 2. USMTLOCAL not equals True
+ * Options / Condition:
+
+ * Task Sequence Variable
+
+ * USMTLOCAL not equals True
10. In the **State Restore** group, after the **Restore User State** action, add a **Release State Store** action with the following settings:
- 1. Options: Continue on error
+ * Options: Continue on error
- 2. Options / Condition:
-
- 1. Task Sequence Variable
-
- 2. USMTLOCAL not equals True
+ * Options / Condition:
+
+ * Task Sequence Variable
+
+ * USMTLOCAL not equals True
11. Click **OK**.
-**Note**
-The Request State Store and Release State Store actions need to be added for common computer replace scenarios.
+>[!NOTE]
+>The Request State Store and Release State Store actions need to be added for common computer replace scenarios.
diff --git a/windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md b/windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md
index 4ee378dc32..4e7b504b13 100644
--- a/windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md
+++ b/windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md
@@ -22,15 +22,13 @@ Microsoft System Center 2012 R2 Configuration Manager supports deploying applica
For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
-**Note**
-Even though the new application model is fully supported to deploy via the task sequence, the most reliable way to deploy software via the task sequence is still the legacy packages, especially if you deploy many applications.
-
-
+>[!NOTE]
+>Even though the new application model is fully supported to deploy via the task sequence, the most reliable way to deploy software via the task sequence is still the legacy packages, especially if you deploy many applications.
## Example: Create the Adobe Reader XI application
-The steps below show you how to create the Adobe Reader XI application. This section assumes that you have downloaded the MSI version of Adobe Reader XI to the C:\\Setup\\Adobe Reader XI folder on CM01.
+The following steps show you how to create the Adobe Reader XI application. This section assumes that you have downloaded the MSI version of Adobe Reader XI to the C:\\Setup\\Adobe Reader XI folder on CM01.
1. On CM01, using File Explorer, copy the **C:\\Setup\\Adobe Reader XI** folder to the **E:\\Sources\\Software\\Adobe** folder.
@@ -42,17 +40,17 @@ The steps below show you how to create the Adobe Reader XI application. This sec
5. In the Create Application Wizard, on the **General** page, use the following settings:
- 1. Automatically detect information about this application from installation files
+ * Automatically detect information about this application from installation files
- 2. Type: Windows Installer (\*.msi file)
+ * Type: Windows Installer (\*.msi file)
- 3. Location: \\\\CM01\\Sources$\\Software\\Adobe\\Adobe Reader XI
+ * Location: \\\\CM01\\Sources$\\Software\\Adobe\\Adobe Reader XI
- 4. \\AdbeRdr11000\_en\_US.msi
+ * \\AdbeRdr11000\_en\_US.msi
- 
+ 
- Figure 19. The Create Application Wizard.
+ *Figure 19. The Create Application Wizard*
6. Click **Next**, and wait while Configuration Manager parses the MSI file.
@@ -60,14 +58,12 @@ The steps below show you how to create the Adobe Reader XI application. This sec
8. On the **General Information** page, name the application Adobe Reader XI - OSD Install, click **Next** twice, and then click **Close**.
- **Note**
- Since it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence.
-
-
-
- 
-
- Figure 20. Add the "OSD Install" suffix to the application name.
+ >[!NOTE]
+ >Because it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence.
+
+ 
+
+ *Figure 20. Add the "OSD Install" suffix to the application name*
9. In the **Applications** node, select the Adobe Reader XI - OSD Install application, and click **Properties** on the ribbon bar.
diff --git a/windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md b/windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md
index 61adccf988..635e1c0291 100644
--- a/windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md
+++ b/windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md
@@ -6,7 +6,6 @@ keywords: configure, deploy, upgrade
ms.prod: w10
localizationpriority: high
ms.mktglfcycl: deploy
-localizationpriority: high
ms.sitesec: library
author: mtniehaus
---
@@ -29,19 +28,19 @@ This section will walk you through the process of creating the E:\\MDTProduction
1. On CM01, using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. Use the following settings for the New Deployment Share Wizard:
- 1. Deployment share path: E:\\MDTProduction
+ * Deployment share path: E:\\MDTProduction
- 2. Share name: MDTProduction$
+ * Share name: MDTProduction$
- 3. Deployment share description: MDT Production
+ * Deployment share description: MDT Production
- 4. Options: <default settings>
+ * Options: <default settings>
2. Right-click the **MDT Production** deployment share, and select **Properties**. In the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box, and click **OK**.
-
+ 
-Figure 26. Enabling MDT monitoring for Configuration Manager.
+ *Figure 26. Enable MDT monitoring for Configuration Manager*
## Create and share the Logs folder
@@ -83,14 +82,14 @@ This section will show you how to configure the rules (the Windows 10 x64 Settin
ApplyGPOPack=NO
```
- 
+ 
- Figure 27. The Settings package, holding the rules and the Unattend.xml template used during deployment
+ *Figure 27. The Settings package, holding the rules and the Unattend.xml template used during deployment*
3. Update the distribution point for the **Windows 10 x64 Settings** package by right-clicking the **Windows 10 x64 Settings** package and selecting **Update Distribution Points**.
-**Note**
-Although you have not yet added a distribution point, you still need to select Update Distribution Points. That process also updates the Configuration Manager 2012 content library with changes.
+ >[!NOTE]
+ >Although you have not yet added a distribution point, you still need to select Update Distribution Points. That process also updates the Configuration Manager 2012 content library with changes.
@@ -116,13 +115,13 @@ This sections provides steps to help you create a deployment for the task sequen
3. On the **Deployment Settings** page, use the following settings and then click **Next**:
- 1. Purpose: Available
+ * Purpose: Available
- 2. Make available to the following: Only media and PXE
+ * Make available to the following: Only media and PXE
- 
-
- Figure 28. Configure the deployment settings.
+ 
+
+ *Figure 28. Configure the deployment settings*
4. On the **Scheduling** page, accept the default settings and click **Next**.
@@ -132,9 +131,9 @@ This sections provides steps to help you create a deployment for the task sequen
7. On the **Distribution Points** page, accept the default settings, click **Next** twice, and then click **Close**.
-
+ 
-Figure 29. The Windows 10 Enterprise x64 RTM task sequence deployed to the All Unknown Computers collections available for media and PXE.
+ *Figure 29. The Windows 10 Enterprise x64 RTM task sequence deployed to the All Unknown Computers collections available for media and PXE*
## Configure Configuration Manager to prompt for the computer name during deployment (optional)
@@ -147,20 +146,18 @@ This section provides steps to help you configure the All Unknown Computers coll
2. In the **Collection Variables** tab, create a new variable with the following settings:
- 1. Name: OSDComputerName
+ * Name: OSDComputerName
- 2. Clear the **Do not display this value in the Configuration Manager console** check box.
+ * Clear the **Do not display this value in the Configuration Manager console** check box.
3. Click **OK**.
-**Note**
-Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
-
-
-
-
-
-Figure 30. Configure a collection variable.
+ >[!NOTE]
+ >Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
+
+ 
+
+ *Figure 30. Configure a collection variable*
## Related topics
diff --git a/windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md b/windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md
index 395beb960d..a2caee8ea8 100644
--- a/windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md
+++ b/windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md
@@ -25,32 +25,28 @@ To monitor an operating system deployment conducted through System Center 2012 R
1. On CM01, using the Deployment Workbench, expand **MDT Production**, and use the **Monitoring** node to view the deployment process (press **F5** to refresh).
- **Note**
- It takes a little while for the task sequence to start reporting monitor information, so if PC0001 does not appear when you press F5 the first time, wait 20 seconds and try again.
+ >[!NOTE]
+ >It takes a little while for the task sequence to start reporting monitor information, so if PC0001 does not appear when you press F5 the first time, wait 20 seconds and try again.
-
-
- 
-
- Figure 33. PC0001 being deployed by Configuration Manager.
+ 
+
+ *Figure 33. PC0001 being deployed by Configuration Manager*
2. When you see the PC0001 entry, double-click **PC0001**, and then click **DaRT Remote Control** and review the **Remote Control** option.
3. The task sequence will now run and do the following:
- 1. Install the Windows 10 operating system.
+ * Install the Windows 10 operating system.
- 2. Install the Configuration Manager client and the client hotfix.
+ * Install the Configuration Manager client and the client hotfix.
- 3. Join the machine to the domain.
-
- 4. Install the application added to the task sequence.
-
- **Note**
- You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress.
-
-
+ * Join the machine to the domain.
+ * Install the application added to the task sequence.
+
+ >[!NOTE]
+ >You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress.
+
4. If time permits, allow the deployment of PC0001 to complete. Then log in as Administrator in the CONTOSO domain and verify that Adobe Reader XI was installed.
## Related topics
diff --git a/windows/keep-secure/bitlocker-how-to-enable-network-unlock.md b/windows/keep-secure/bitlocker-how-to-enable-network-unlock.md
index 3f2fc5e488..0155f5ed15 100644
--- a/windows/keep-secure/bitlocker-how-to-enable-network-unlock.md
+++ b/windows/keep-secure/bitlocker-how-to-enable-network-unlock.md
@@ -146,12 +146,12 @@ To create a self-signed certificate, you can either use the New-SelfSignedCertif
Windows PowerShell example:
```syntax
-New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -Subject "CN=BitLocker Network Unlock certificate" -Provider "Microsoft Software Key Storage Provider" -KeyUsage KeyEncipherment -KeyUsageProperty Decrypt -KeyLength 2048 -HashAlgorithm sha512 -TextExtension @("1.3.6.1.4.1.311.21.10={text}OID=1.3.6.1.4.1.311.67.1.1","2.5.29.37={text}1.3.6.1.4.1.311.67.1.1")
+New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -Subject "CN=BitLocker Network Unlock certificate" -Provider "Microsoft Software Key Storage Provider" -KeyUsage KeyEncipherment -KeyUsageProperty Decrypt,Sign -KeyLength 2048 -HashAlgorithm sha512 -TextExtension @("1.3.6.1.4.1.311.21.10={text}OID=1.3.6.1.4.1.311.67.1.1","2.5.29.37={text}1.3.6.1.4.1.311.67.1.1")
```
Certreq example:
-1. Create a text file with an .inf extension. For example, notepad.exe BitLocker-NetworkUnlock.inf
+1. Create a text file with an .inf extension. For example, notepad.exe BitLocker-NetworkUnlock.inf.
2. Add the following contents to the previously created file:
``` syntax
@@ -162,7 +162,7 @@ Certreq example:
Exportable=true
RequestType=Cert
KeyUsage="CERT_KEY_ENCIPHERMENT_KEY_USAGE"
- KeyUsageProperty="NCRYPT_ALLOW_DECRYPT_FLAG"
+ KeyUsageProperty="NCRYPT_ALLOW_DECRYPT_FLAG | NCRYPT_ALLOW_SIGNING_FLAG"
KeyLength=2048
SMIME=FALSE
HashAlgorithm=sha512
@@ -179,9 +179,9 @@ Certreq example:
certreq -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer
```
-4. Verify the previous command properly created the certificate by confirming the .cer file exists
-5. Launch the Certificate Manager by running **certmgr.msc**
-6. Create a .pfx file by opening the **Certificates – Current User\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file.
+4. Verify the previous command properly created the certificate by confirming the .cer file exists.
+5. Launch Certificates - Local Machine by running **certlm.msc**.
+6. Create a .pfx file by opening the **Certificates – Local Computer\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file.
### Step Five: Deploy the private key and certificate to the WDS server
@@ -192,27 +192,27 @@ With the certificate and key created, deploy them to the infrastructure to prope
3. In the **File to Import** dialog, choose the .pfx file created previously.
4. Enter the password used to create the .pfx and complete the wizard.
-### Step Six: Configure Group Policy settings for Network Unlock
+### Step Six: Configure Group Policy settings for Network Unlock
With certificate and key deployed to the WDS server for Network Unlock, the final step is to use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock using the Network Unlock key. Group Policy settings for BitLocker can be found under **\\Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption** using the Local Group Policy Editor or the Microsoft Management Console.
The following steps describe how to enable the Group Policy setting that is a requirement for configuring Network Unlock.
-1. Open Group Policy Management Console (gpmc.msc)
-2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option
-3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers
+1. Open Group Policy Management Console (gpmc.msc).
+2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option.
+3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers.
The following steps describe how to deploy the required Group Policy setting:
>**Note:** The Group Policy settings **Allow network unlock at startup** and **Add Network Unlock Certificate** were introduced in Windows Server 2012.
-1. Copy the .cer file created for Network Unlock to the domain controller
-2. On the domain controller, launch Group Policy Management Console (gpmc.msc)
+1. Copy the .cer file created for Network Unlock to the domain controller.
+2. On the domain controller, launch Group Policy Management Console (gpmc.msc).
3. Create a new Group Policy Object or modify an existing object to enable the **Allow network unlock at startup** setting.
-4. Deploy the public certificate to clients
+4. Deploy the public certificate to clients:
- 1. Within Group Policy Management Console, navigate to the following location: **Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate**
- 2. Right-click the folder and choose **Add Network Unlock Certificate**
+ 1. Within Group Policy Management Console, navigate to the following location: **Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate**.
+ 2. Right-click the folder and choose **Add Network Unlock Certificate**.
3. Follow the wizard steps and import the .cer file that was copied earlier.
>**Note:** Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before deploying a new one. The Network Unlock certificate is located in the **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** key on the client computer.
@@ -221,16 +221,16 @@ The following steps describe how to deploy the required Group Policy setting:
An additional step is for enterprises to use TPM+PIN protectors for an extra level of security. To require TPM+PIN protectors in an environment, do the following:
-1. Open Group Policy Management Console (gpmc.msc)
-2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option
-3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers
+1. Open Group Policy Management Console (gpmc.msc).
+2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option.
+3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers.
### Create the certificate template for Network Unlock
The following steps detail how to create a certificate template for use with BitLocker Network Unlock. A properly configured Active Directory Services Certification Authority can use this certificate to create and issue Network Unlock certificates.
1. Open the Certificates Template snap-in (certtmpl.msc).
-2. Locate the User template. Right-click the template name and select **Duplicate Template**
+2. Locate the User template. Right-click the template name and select **Duplicate Template**.
3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to Windows Server 2012 and Windows 8respectively. Ensure the **Show resulting changes** dialog box is selected.
4. Select the **General** tab of the template. The **Template display name** and **Template name** should clearly identify that the template will be used for Network Unlock. Clear the checkbox for the **Publish certificate in Active Directory** option.
5. Select the **Request Handling** tab. Select **Encryption** from the **Purpose** drop down menu. Ensure the **Allow private key to be exported** option is selected.
@@ -246,9 +246,9 @@ The following steps detail how to create a certificate template for use with Bit
- **Name:** **BitLocker Network Unlock**
- **Object Identifier:** **1.3.6.1.4.1.311.67.1.1**
-14. Select the newly created **BitLocker Network Unlock** application policy and select **OK**
+14. Select the newly created **BitLocker Network Unlock** application policy and select **OK**.
15. With the **Extensions** tab still open, select the **Edit Key Usage Extension** dialog, select the **Allow key exchange only with key encryption (key encipherment)** option. Select the **Make this extension critical** option.
-16. Select the **Security** tab. Confirm that the **Domain Admins** group has been granted **Enroll** permission
+16. Select the **Security** tab. Confirm that the **Domain Admins** group has been granted **Enroll** permission.
17. Select **OK** to complete configuration of the template.
To add the Network Unlock template to the Certification Authority, open the Certification Authority snap-in (certsrv.msc). Right-click the **Certificate Templates** item and choose **New, Certificate Template to issue**. Select the previously created BitLocker Network Unlock certificate.
@@ -328,8 +328,8 @@ Files to gather when troubleshooting BitLocker Network Unlock include:
In the right pane, click **Enable Log**.
2. The DHCP subnet configuration file (if one exists).
-3. The output of the BitLocker status on the volume, this can be gathered into a text file using **manage-bde -status** or **Get-BitLockerVolume** in Windows PowerShell
-4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address
+3. The output of the BitLocker status on the volume, this can be gathered into a text file using **manage-bde -status** or **Get-BitLockerVolume** in Windows PowerShell.
+4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address.
## Configure Network Unlock Group Policy settings on earlier versions
@@ -346,7 +346,7 @@ The following steps can be used to configure Network Unlock on these older syste
3. [Step Three: Install the Network Unlock feature](#bkmk-stepthree)
4. [Step Four: Create the Network Unlock certificate](#bkmk-stepfour)
5. [Step Five: Deploy the private key and certificate to the WDS server](#bkmk-stepfive)
-6. **Step Six: Configure registry settings for Network Unlock**
+6. [Step Six: Configure registry settings for Network Unlock](#bkmk-stepsix)
Apply the registry settings by running the following certutil script on each computer running any of the client operating systems designated in the **Applies To** list at the beginning of this topic.
certutil -f -grouppolicy -addstore FVE_NKP BitLocker-NetworkUnlock.cer
diff --git a/windows/keep-secure/create-and-verify-an-efs-dra-certificate.md b/windows/keep-secure/create-and-verify-an-efs-dra-certificate.md
index 4f1cf1dfd9..06392494c0 100644
--- a/windows/keep-secure/create-and-verify-an-efs-dra-certificate.md
+++ b/windows/keep-secure/create-and-verify-an-efs-dra-certificate.md
@@ -77,7 +77,7 @@ It's possible that you might revoke data from an unenrolled device only to later
1. Have your employee sign in to the unenrolled device, open a command prompt, and type:
- `Robocopy “%localappdata%\Microsoft\WIP\Recovery” <“new_location”> /EFSRAW`
+ `Robocopy “%localappdata%\Microsoft\EDP\Recovery” <“new_location”> /EFSRAW`
Where *<”new_location”>* is in a different directory. This can be on the employee’s device or on a Windows 8 or Windows Server 2012 or newer server file share that can be accessed while you're logged in as a data recovery agent.
@@ -87,7 +87,7 @@ It's possible that you might revoke data from an unenrolled device only to later
3. Have your employee sign in to the unenrolled device, and type:
- `Robocopy <”new_location”> “%localappdata%\Microsoft\WIP\Recovery\Input”`
+ `Robocopy <”new_location”> “%localappdata%\Microsoft\EDP\Recovery\Input”`
4. Ask the employee to lock and unlock the device.
diff --git a/windows/keep-secure/create-wip-policy-using-intune.md b/windows/keep-secure/create-wip-policy-using-intune.md
index 7a107e086c..0b829ac6ce 100644
--- a/windows/keep-secure/create-wip-policy-using-intune.md
+++ b/windows/keep-secure/create-wip-policy-using-intune.md
@@ -380,7 +380,7 @@ There are no default locations included with WIP, you must add each of your netw
|