From b76cf67c80b30a9885524a9b26b634f994fc0f74 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Mon, 12 Feb 2024 15:57:30 -0800
Subject: [PATCH 01/20] other-prods-8743531
---
.../update/update-other-microsoft-products.md | 79 +++++++++++++++++++
1 file changed, 79 insertions(+)
create mode 100644 windows/deployment/update/update-other-microsoft-products.md
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
new file mode 100644
index 0000000000..79b113ef1f
--- /dev/null
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -0,0 +1,79 @@
+---
+title: Update other Microsoft products
+titleSuffix: Windows Update for Business
+description: List of other Microsoft products that are updated when install updates for other Microsoft products (allowmuupdateservice) is used.
+ms.service: windows-client
+ms.subservice: itpro-updates
+ms.topic: reference
+author: mestew
+ms.author: mstewart
+manager: aaroncz
+appliesto:
+- ✅ Windows 11
+- ✅ Windows 10
+ms.date:02/14/2024
+---
+
+# Update other Microsoft products
+
+This article contians a list of other Microsoft products that might be updated when the following policy is used:
+
+
+- Group policy: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Manage end user experience: Install updates for other Microsoft products element under Configure Automatic Updates.
+- MDM: [Update/AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#update-allowmuupdateservice).
+
+> [!Note]
+> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#update-excludewudriversinqualityupdate).
+
+
+## List of other Microsoft products
+
+The following
+
+
+- Active Directory Rights Management Service
+- AppFabric
+- Azure File Sync
+- Bing Bar
+- Bing IME
+- BizTalk
+- East Asia IME for Windows Content
+- Exchange
+- IME Dictionary Update
+- Live Search
+- MED-V
+- Microsoft Advanced Threat Analytics
+- Microsoft Application Virtualization
+- Microsoft Azure StorSimple
+- Microsoft Dynamics CRM
+- Microsoft Information Protection
+- Microsoft Lync Server and Microsoft Lync
+- Microsoft Monitoring Agent
+- Microsoft SRS Device
+- Microsoft StreamInsight
+- Mobile and IoT
+- MSRC
+- Office 2016 (MSI versions of Office)
+- PlayReady
+- Project Honolulu
+- SCOM/SCVMM
+- SEGDR
+- Silverlight
+- Skype for Business
+- SQL
+- System Center Application Controller
+- System Center Configuration Manager
+- System Center Data Protection Manager
+- System Center Operations Manager
+- System Center Orchestrator
+- System Center Virtual Machine Manager
+- Visual Studio
+- Windows Azure Hyper-V Recovery Manager
+- Windows Azure Pack - Web Sites
+- Windows Azure Pack
+- Windows Azure Service Bus
+- Windows Embedded Developer Update
+- Windows Intune
+- Windows Live Sign-in Assistant
+- Windows Small Business Server
+- Zune
From be5a8456b47c21046816f1eb3cd5260aeadfa71c Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Mon, 12 Feb 2024 16:03:59 -0800
Subject: [PATCH 02/20] other-prods-8743531
---
windows/deployment/TOC.yml | 2 ++
windows/deployment/update/update-other-microsoft-products.md | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml
index d96a476eb7..187db39a40 100644
--- a/windows/deployment/TOC.yml
+++ b/windows/deployment/TOC.yml
@@ -386,6 +386,8 @@
href: /windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
- name: Additional Windows Update settings
href: update/waas-wu-settings.md
+ - name: Update other Microsoft products
+ href: update/update-other-microsoft-products.md
- name: Delivery Optimization reference
href: do/waas-delivery-optimization-reference.md?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
- name: Windows client in S mode
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index 79b113ef1f..4a498e83a1 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -28,7 +28,7 @@ This article contians a list of other Microsoft products that might be updated w
## List of other Microsoft products
-The following
+The following is a list of other Microsoft products that might be updated:
- Active Directory Rights Management Service
From a5fd0f944f1c95318b538ed94427b3bec5ea1760 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Mon, 12 Feb 2024 16:08:58 -0800
Subject: [PATCH 03/20] other-prods-8743531
---
windows/deployment/update/update-other-microsoft-products.md | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index 4a498e83a1..33c94d69fc 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -55,8 +55,7 @@ The following is a list of other Microsoft products that might be updated:
- MSRC
- Office 2016 (MSI versions of Office)
- PlayReady
-- Project Honolulu
-- SCOM/SCVMM
+- Windows Admin Center
- SEGDR
- Silverlight
- Skype for Business
From 36c10a21ad0709c06a3938670fa8162aa381f027 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Mon, 12 Feb 2024 16:17:45 -0800
Subject: [PATCH 04/20] other-prods-8743531
---
windows/client-management/mdm/policy-csp-update.md | 5 +++--
windows/deployment/update/waas-configure-wufb.md | 4 ++--
windows/deployment/update/waas-integrate-wufb.md | 3 ++-
windows/deployment/update/waas-wufb-group-policy.md | 4 ++--
4 files changed, 9 insertions(+), 7 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md
index ff2d3b69e6..d52bea489c 100644
--- a/windows/client-management/mdm/policy-csp-update.md
+++ b/windows/client-management/mdm/policy-csp-update.md
@@ -1,7 +1,7 @@
---
title: Update Policy CSP
description: Learn more about the Update Area in Policy CSP.
-ms.date: 01/31/2024
+ms.date: 02/14/2024
---
@@ -2287,7 +2287,8 @@ Allows the IT admin to manage whether to scan for app updates from Microsoft Upd
> [!NOTE]
-> Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service:
+> - For a list of other Microsoft products that might be updated, see [Update other Microsoft products](/windows/deployment/update/update-other-microsoft-products).
+> - Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service:
>
> ```powershell
> $MUSM = New-Object -ComObject "Microsoft.Update.ServiceManager"
diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md
index 4a74fbe288..cd8a399645 100644
--- a/windows/deployment/update/waas-configure-wufb.md
+++ b/windows/deployment/update/waas-configure-wufb.md
@@ -16,7 +16,7 @@ appliesto:
- ✅ Windows Server 2022
- ✅ Windows Server 2019
- ✅ Windows Server 2016
-ms.date: 11/30/2023
+ms.date: 02/14/2024
---
# Configure Windows Update for Business
@@ -127,7 +127,7 @@ Starting with Windows 10, version 1703, using Settings to control the pause beha
Quality updates are typically published on the second Tuesday of every month, although they can be released at any time. You can define if, and for how long, you would like to defer receiving quality updates following their availability. You can defer receiving these quality updates for a period of up to 30 days from their release by setting the **DeferQualityUpdatesPeriodinDays** value.
-You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates.
+You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
**Policy settings for deferring quality updates**
diff --git a/windows/deployment/update/waas-integrate-wufb.md b/windows/deployment/update/waas-integrate-wufb.md
index 54a680ab36..4502205725 100644
--- a/windows/deployment/update/waas-integrate-wufb.md
+++ b/windows/deployment/update/waas-integrate-wufb.md
@@ -11,7 +11,7 @@ ms.localizationpriority: medium
appliesto:
- ✅ Windows 11
- ✅ Windows 10
-ms.date: 12/31/2017
+ms.date: 02/14/2024
---
# Integrate Windows Update for Business with management solutions
@@ -68,6 +68,7 @@ For Windows 10, version 1607 and later, devices can be configured to receive upd
- Device is configured to defer quality updates using Windows Update for Business and to be managed by WSUS
- Device is configured to **receive updates for other Microsoft products** along with updates to Windows (**Update/AllowMUUpdateService** = enabled)
+ - For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
- Admin has also placed Microsoft Update, non-Microsoft, and locally published update content on the WSUS server
In this example, the deferral behavior for updates to Office and other non-Windows products is slightly different than if WSUS weren't enabled.
diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md
index 6b757b2706..244cdf3e0f 100644
--- a/windows/deployment/update/waas-wufb-group-policy.md
+++ b/windows/deployment/update/waas-wufb-group-policy.md
@@ -17,7 +17,7 @@ appliesto:
- ✅ Windows Server 2022
- ✅ Windows Server 2019
- ✅ Windows Server 2016
-ms.date: 11/30/2023
+ms.date: 02/14/2024
---
# Walkthrough: Use Group Policy to configure Windows Update for Business
@@ -65,7 +65,7 @@ You can control when updates are applied, for example by deferring when an updat
Both feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device.
-To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**.
+To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
Drivers are automatically enabled because they're beneficial to device systems. We recommend that you allow the driver policy to allow drivers to update on devices (the default), but you can turn off this setting if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use the Group Policy Management Console to go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not include drivers with Windows Updates** and enable the policy.
From d92e823a742935cca20b0b9108154194c60bf961 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Tue, 13 Feb 2024 10:34:21 -0800
Subject: [PATCH 05/20] other-prods-8743531
---
windows/deployment/update/update-other-microsoft-products.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index 33c94d69fc..59ca070943 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -11,7 +11,7 @@ manager: aaroncz
appliesto:
- ✅ Windows 11
- ✅ Windows 10
-ms.date:02/14/2024
+ms.date: 02/14/2024
---
# Update other Microsoft products
From 74c1f6d284094e2b81558d58ca2d03c4418bba3d Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Tue, 13 Feb 2024 15:09:28 -0800
Subject: [PATCH 06/20] other-prods-8743531
---
.../update/update-other-microsoft-products.md | 10 ++++------
1 file changed, 4 insertions(+), 6 deletions(-)
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index 59ca070943..3c3379c19d 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -18,19 +18,18 @@ ms.date: 02/14/2024
This article contians a list of other Microsoft products that might be updated when the following policy is used:
-
-- Group policy: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Manage end user experience: Install updates for other Microsoft products element under Configure Automatic Updates.
-- MDM: [Update/AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#update-allowmuupdateservice).
+- **Group policy**: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates
+ - `Install updates for other Microsoft products` element under Configure Automatic Updates
+- **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice).
> [!Note]
-> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#update-excludewudriversinqualityupdate).
+> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate).
## List of other Microsoft products
The following is a list of other Microsoft products that might be updated:
-
- Active Directory Rights Management Service
- AppFabric
- Azure File Sync
@@ -56,7 +55,6 @@ The following is a list of other Microsoft products that might be updated:
- Office 2016 (MSI versions of Office)
- PlayReady
- Windows Admin Center
-- SEGDR
- Silverlight
- Skype for Business
- SQL
From 5016ff2843a0b9d2a0a761d368628eb318636c98 Mon Sep 17 00:00:00 2001
From: "Vinay Pamnani (from Dev Box)"
Date: Tue, 27 Feb 2024 09:44:06 -0700
Subject: [PATCH 07/20] Add note to DMClient CSP
---
windows/client-management/mdm/dmclient-csp.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md
index f32ff8f609..176c97901a 100644
--- a/windows/client-management/mdm/dmclient-csp.md
+++ b/windows/client-management/mdm/dmclient-csp.md
@@ -14,6 +14,9 @@ ms.date: 01/18/2024
The DMClient configuration service provider (CSP) has more enterprise-specific mobile device management (MDM) configuration settings. These settings identify the device in the enterprise domain, include security mitigation for certificate renewal, and are used for server-triggered enterprise unenrollment.
+
+> [!IMPORTANT]
+> The DMClient CSP nodes are intended to be configured by the MDM server to manage device configuration and security features. Custom URI settings for this CSP are not supported for IT admin management scenarios due to the complexity of the settings.
From e93e3b954306050a41dd0269af828c87fa938e3a Mon Sep 17 00:00:00 2001
From: "Vinay Pamnani (from Dev Box)"
Date: Tue, 27 Feb 2024 09:52:04 -0700
Subject: [PATCH 08/20] Change to note
---
windows/client-management/mdm/dmclient-csp.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md
index 176c97901a..535eaf637a 100644
--- a/windows/client-management/mdm/dmclient-csp.md
+++ b/windows/client-management/mdm/dmclient-csp.md
@@ -15,7 +15,7 @@ ms.date: 01/18/2024
The DMClient configuration service provider (CSP) has more enterprise-specific mobile device management (MDM) configuration settings. These settings identify the device in the enterprise domain, include security mitigation for certificate renewal, and are used for server-triggered enterprise unenrollment.
-> [!IMPORTANT]
+> [!NOTE]
> The DMClient CSP nodes are intended to be configured by the MDM server to manage device configuration and security features. Custom URI settings for this CSP are not supported for IT admin management scenarios due to the complexity of the settings.
From e3c30af7caf43c5402a723a98521c705dbf25b7a Mon Sep 17 00:00:00 2001
From: shdyas
Date: Tue, 27 Feb 2024 10:58:21 -0800
Subject: [PATCH 09/20] Updating contributors to exclude docfx files
---
education/docfx.json | 8 ++------
store-for-business/docfx.json | 8 ++------
windows/application-management/docfx.json | 6 ++----
windows/client-management/docfx.json | 7 ++-----
windows/configuration/docfx.json | 6 ++----
windows/deployment/docfx.json | 6 ++----
windows/hub/docfx.json | 6 ++----
windows/privacy/docfx.json | 6 ++----
windows/security/docfx.json | 8 ++------
windows/whats-new/docfx.json | 6 ++----
10 files changed, 20 insertions(+), 47 deletions(-)
diff --git a/education/docfx.json b/education/docfx.json
index 312b5ddf47..fc2afcf78e 100644
--- a/education/docfx.json
+++ b/education/docfx.json
@@ -52,21 +52,17 @@
"titleSuffix": "Windows Education",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"Kellylorenebaker",
"jborsecnik",
- "tiburd",
- "AngelaMotherofDragons",
"dstrome",
- "v-dihans",
"garycentric",
"v-stsavell",
"beccarobins",
"Stacyrch140",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
]
},
"fileMetadata": {
diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json
index 459fd0974e..aa4e529b45 100644
--- a/store-for-business/docfx.json
+++ b/store-for-business/docfx.json
@@ -56,21 +56,17 @@
},
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"Kellylorenebaker",
"jborsecnik",
- "tiburd",
- "AngelaMotherofDragons",
"dstrome",
- "v-dihans",
"garycentric",
"v-stsavell",
"beccarobins",
"Stacyrch140",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
]
},
"fileMetadata": {},
diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json
index c8640f09dd..3ae47c9c54 100644
--- a/windows/application-management/docfx.json
+++ b/windows/application-management/docfx.json
@@ -53,17 +53,15 @@
"titleSuffix": "Windows Application Management",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json
index 865ebfff70..786cdc38de 100644
--- a/windows/client-management/docfx.json
+++ b/windows/client-management/docfx.json
@@ -59,18 +59,15 @@
"titleSuffix": "Windows Client Management",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"american-dipper",
- "angelamotherofdragons",
"v-stsavell",
"stacyrch140",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json
index d0ed927da8..5a1e0c6d23 100644
--- a/windows/configuration/docfx.json
+++ b/windows/configuration/docfx.json
@@ -57,17 +57,15 @@
"titleSuffix": "Configure Windows",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json
index 9a1dbf00d0..1a33b5aa03 100644
--- a/windows/deployment/docfx.json
+++ b/windows/deployment/docfx.json
@@ -52,17 +52,15 @@
"titleSuffix": "Windows Deployment",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json
index f7971d2b46..b841547fcb 100644
--- a/windows/hub/docfx.json
+++ b/windows/hub/docfx.json
@@ -55,17 +55,15 @@
"titleSuffix": "Windows for IT Pros",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
]
},
"fileMetadata": {},
diff --git a/windows/privacy/docfx.json b/windows/privacy/docfx.json
index 45e5e07ca5..217f63d407 100644
--- a/windows/privacy/docfx.json
+++ b/windows/privacy/docfx.json
@@ -50,17 +50,15 @@
"titleSuffix": "Windows Privacy",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
]
},
"searchScope": [
diff --git a/windows/security/docfx.json b/windows/security/docfx.json
index a502927d7f..370237fab6 100644
--- a/windows/security/docfx.json
+++ b/windows/security/docfx.json
@@ -56,20 +56,16 @@
"titleSuffix": "Windows Security",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
- "AngelaMotherofDragons",
"dstrome",
- "v-dihans",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json
index 3977d46f28..036edeba6f 100644
--- a/windows/whats-new/docfx.json
+++ b/windows/whats-new/docfx.json
@@ -52,17 +52,15 @@
"titleSuffix": "What's new in Windows",
"contributors_to_exclude": [
"rjagiewich",
- "traya1",
- "rmca14",
"claydetels19",
"jborsecnik",
- "tiburd",
"garycentric",
"beccarobins",
"Stacyrch140",
"v-stsavell",
"American-Dipper",
- "shdyas"
+ "shdyas",
+ "alekyaj"
],
"searchScope": [
"Windows 10"
From 2077a43f4fe7bc9c8b99b971ac7a541d11773871 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Tue, 27 Feb 2024 11:59:26 -0800
Subject: [PATCH 10/20] update metadata
---
windows/deployment/update/update-other-microsoft-products.md | 2 +-
windows/deployment/update/waas-configure-wufb.md | 2 +-
windows/deployment/update/waas-integrate-wufb.md | 2 +-
windows/deployment/update/waas-wufb-group-policy.md | 2 +-
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index 3c3379c19d..c264aae8ba 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -11,7 +11,7 @@ manager: aaroncz
appliesto:
- ✅ Windows 11
- ✅ Windows 10
-ms.date: 02/14/2024
+ms.date: 02/27/2024
---
# Update other Microsoft products
diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md
index c152fd21ae..cf98c00264 100644
--- a/windows/deployment/update/waas-configure-wufb.md
+++ b/windows/deployment/update/waas-configure-wufb.md
@@ -16,7 +16,7 @@ appliesto:
- ✅ Windows Server 2022
- ✅ Windows Server 2019
- ✅ Windows Server 2016
-ms.date: 02/14/2024
+ms.date: 02/27/2024
---
# Configure Windows Update for Business
diff --git a/windows/deployment/update/waas-integrate-wufb.md b/windows/deployment/update/waas-integrate-wufb.md
index 4502205725..892daae8af 100644
--- a/windows/deployment/update/waas-integrate-wufb.md
+++ b/windows/deployment/update/waas-integrate-wufb.md
@@ -11,7 +11,7 @@ ms.localizationpriority: medium
appliesto:
- ✅ Windows 11
- ✅ Windows 10
-ms.date: 02/14/2024
+ms.date: 02/27/2024
---
# Integrate Windows Update for Business with management solutions
diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md
index 244cdf3e0f..a039f0c714 100644
--- a/windows/deployment/update/waas-wufb-group-policy.md
+++ b/windows/deployment/update/waas-wufb-group-policy.md
@@ -17,7 +17,7 @@ appliesto:
- ✅ Windows Server 2022
- ✅ Windows Server 2019
- ✅ Windows Server 2016
-ms.date: 02/14/2024
+ms.date: 02/27/2024
---
# Walkthrough: Use Group Policy to configure Windows Update for Business
From 5bc84bcb821de4d925c771240c09397b078ac211 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Tue, 27 Feb 2024 12:05:06 -0800
Subject: [PATCH 11/20] update metadata
---
windows/deployment/update/update-other-microsoft-products.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md
index c264aae8ba..01f1505029 100644
--- a/windows/deployment/update/update-other-microsoft-products.md
+++ b/windows/deployment/update/update-other-microsoft-products.md
@@ -16,11 +16,11 @@ ms.date: 02/27/2024
# Update other Microsoft products
-This article contians a list of other Microsoft products that might be updated when the following policy is used:
+This article contains a list of other Microsoft products that might be updated when the following policy is used:
- **Group policy**: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates
- `Install updates for other Microsoft products` element under Configure Automatic Updates
-- **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice).
+- **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice)
> [!Note]
> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate).
From 4a3effcb910ced7c7d109b880b43256442df1139 Mon Sep 17 00:00:00 2001
From: shdyas
Date: Tue, 27 Feb 2024 12:36:39 -0800
Subject: [PATCH 12/20] Updating exclude contributors with alekyaj
---
education/docfx.json | 3 ++-
store-for-business/docfx.json | 3 ++-
windows/application-management/docfx.json | 3 ++-
windows/client-management/docfx.json | 3 ++-
windows/configuration/docfx.json | 3 ++-
windows/deployment/docfx.json | 3 ++-
windows/hub/docfx.json | 3 ++-
windows/privacy/docfx.json | 3 ++-
windows/security/docfx.json | 3 ++-
windows/whats-new/docfx.json | 3 ++-
10 files changed, 20 insertions(+), 10 deletions(-)
diff --git a/education/docfx.json b/education/docfx.json
index fc2afcf78e..eea7a3655b 100644
--- a/education/docfx.json
+++ b/education/docfx.json
@@ -62,7 +62,8 @@
"Stacyrch140",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
]
},
"fileMetadata": {
diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json
index aa4e529b45..25f77170a7 100644
--- a/store-for-business/docfx.json
+++ b/store-for-business/docfx.json
@@ -66,7 +66,8 @@
"Stacyrch140",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
]
},
"fileMetadata": {},
diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json
index 3ae47c9c54..aaf0200895 100644
--- a/windows/application-management/docfx.json
+++ b/windows/application-management/docfx.json
@@ -61,7 +61,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json
index 786cdc38de..7cf011a598 100644
--- a/windows/client-management/docfx.json
+++ b/windows/client-management/docfx.json
@@ -67,7 +67,8 @@
"v-stsavell",
"stacyrch140",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json
index 5a1e0c6d23..2e2a420982 100644
--- a/windows/configuration/docfx.json
+++ b/windows/configuration/docfx.json
@@ -65,7 +65,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json
index 1a33b5aa03..bec5d5f304 100644
--- a/windows/deployment/docfx.json
+++ b/windows/deployment/docfx.json
@@ -60,7 +60,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json
index b841547fcb..bc332f4606 100644
--- a/windows/hub/docfx.json
+++ b/windows/hub/docfx.json
@@ -63,7 +63,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
]
},
"fileMetadata": {},
diff --git a/windows/privacy/docfx.json b/windows/privacy/docfx.json
index 217f63d407..efaa2cfb39 100644
--- a/windows/privacy/docfx.json
+++ b/windows/privacy/docfx.json
@@ -58,7 +58,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
]
},
"searchScope": [
diff --git a/windows/security/docfx.json b/windows/security/docfx.json
index 370237fab6..1968fc1509 100644
--- a/windows/security/docfx.json
+++ b/windows/security/docfx.json
@@ -65,7 +65,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json
index 036edeba6f..4190a4dfc5 100644
--- a/windows/whats-new/docfx.json
+++ b/windows/whats-new/docfx.json
@@ -60,7 +60,8 @@
"v-stsavell",
"American-Dipper",
"shdyas",
- "alekyaj"
+ "alekyaj",
+ "rmca14"
],
"searchScope": [
"Windows 10"
From d86a825fe318ed691fba775178e97c16f0377516 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Tue, 27 Feb 2024 15:44:39 -0800
Subject: [PATCH 13/20] dep-rm-pnrp-8786199
---
windows/whats-new/removed-features.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md
index ce69865676..7c0ccb1e1f 100644
--- a/windows/whats-new/removed-features.md
+++ b/windows/whats-new/removed-features.md
@@ -8,7 +8,7 @@ ms.author: mstewart
manager: aaroncz
ms.topic: conceptual
ms.subservice: itpro-fundamentals
-ms.date: 01/30/2024
+ms.date: 02/29/2024
ms.collection:
- highpri
- tier1
@@ -48,7 +48,7 @@ The following features and functionalities have been removed from the installed
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 |
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 |
-| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was removed in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. | 1909 |
+| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. **[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. | 1909 |
| Taskbar settings roaming | Roaming of taskbar settings is removed in this release. This feature was announced as no longer being developed in Windows 10, version 1903. | 1909 |
| Desktop messaging app doesn't offer messages sync | The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. The sync feature has been removed from all devices. Due to this change, you'll only be able to access messages from the device that received the message. | 1903 |
|Business Scanning also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| 1809 |
From 42ac5897d6b6da566258f55efa82cff440f78a88 Mon Sep 17 00:00:00 2001
From: "Yong Rhee [MSFT]" <56358587+YongRhee-MSFT@users.noreply.github.com>
Date: Wed, 28 Feb 2024 07:05:28 -0800
Subject: [PATCH 14/20] Update policy-csp-defender.md
Fixing a description for "DisableScanningNetworkFiles".
---
windows/client-management/mdm/policy-csp-defender.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index ce5814933e..05224f59fc 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -712,7 +712,8 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
-This policy setting allows you to configure real-time scanning for files that are accessed over the network. It is recommended to enable this setting.
+This policy setting allows you to configure scheduled scans and on-demand scans (manually initiated scans) for files that are accessed over the network. It is recommended to enable this setting.
+Note: real-time protection (on-access) scanning are not impacted by this policy.
- If you enable this setting or do not configure this setting, network files will be scanned.
- If you disable this setting, network files will not be scanned.
From 7f94be367e2cba1376775b560a328660c0ee6b15 Mon Sep 17 00:00:00 2001
From: "Vinay Pamnani (from Dev Box)"
Date: Wed, 28 Feb 2024 10:39:16 -0700
Subject: [PATCH 15/20] Fix broken link
---
windows/client-management/mdm/policy-csp-admx-icm.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-admx-icm.md b/windows/client-management/mdm/policy-csp-admx-icm.md
index 17e2fbb340..643e4044d3 100644
--- a/windows/client-management/mdm/policy-csp-admx-icm.md
+++ b/windows/client-management/mdm/policy-csp-admx-icm.md
@@ -1,7 +1,7 @@
---
title: ADMX_ICM Policy CSP
description: Learn more about the ADMX_ICM Area in Policy CSP.
-ms.date: 01/18/2024
+ms.date: 02/28/2024
---
@@ -843,7 +843,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa
This policy setting allows you to remove access to Windows Update.
-- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at , from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
+- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at `https://windowsupdate.microsoft.com`, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
- If you disable or don't configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update.
From e52b5670532787b197dab01be5b802df3ccaed4f Mon Sep 17 00:00:00 2001
From: Vinay Pamnani <37223378+vinaypamnani-msft@users.noreply.github.com>
Date: Wed, 28 Feb 2024 10:57:35 -0700
Subject: [PATCH 16/20] Update
windows/client-management/mdm/policy-csp-defender.md
---
windows/client-management/mdm/policy-csp-defender.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index 05224f59fc..45009e6780 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -712,7 +712,7 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
-This policy setting allows you to configure scheduled scans and on-demand scans (manually initiated scans) for files that are accessed over the network. It is recommended to enable this setting.
+This policy setting allows you to configure scheduled scans and on-demand (manually initiated) scans for files that are accessed over the network. It is recommended to enable this setting.
Note: real-time protection (on-access) scanning are not impacted by this policy.
- If you enable this setting or do not configure this setting, network files will be scanned.
From 031fb28632407f8cc791576f52bff711fb8e8621 Mon Sep 17 00:00:00 2001
From: Vinay Pamnani <37223378+vinaypamnani-msft@users.noreply.github.com>
Date: Wed, 28 Feb 2024 10:57:40 -0700
Subject: [PATCH 17/20] Update
windows/client-management/mdm/policy-csp-defender.md
---
windows/client-management/mdm/policy-csp-defender.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index 45009e6780..ba4d3d7bde 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -713,7 +713,8 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
This policy setting allows you to configure scheduled scans and on-demand (manually initiated) scans for files that are accessed over the network. It is recommended to enable this setting.
-Note: real-time protection (on-access) scanning are not impacted by this policy.
+>[!NOTE]
+> Real-time protection (on-access) scanning is not impacted by this policy.
- If you enable this setting or do not configure this setting, network files will be scanned.
- If you disable this setting, network files will not be scanned.
From 18a468ac697c4a400e9139e45a32caa084907ead Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Wed, 28 Feb 2024 10:58:00 -0800
Subject: [PATCH 18/20] Update windows/whats-new/removed-features.md
metadata tweak
---
windows/whats-new/removed-features.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md
index 7c0ccb1e1f..985b865c6a 100644
--- a/windows/whats-new/removed-features.md
+++ b/windows/whats-new/removed-features.md
@@ -8,7 +8,7 @@ ms.author: mstewart
manager: aaroncz
ms.topic: conceptual
ms.subservice: itpro-fundamentals
-ms.date: 02/29/2024
+ms.date: 02/28/2024
ms.collection:
- highpri
- tier1
From 57d86085fe2f083050fe41e0004c82d6ceda24c7 Mon Sep 17 00:00:00 2001
From: Meghan Stewart <33289333+mestew@users.noreply.github.com>
Date: Wed, 28 Feb 2024 11:51:13 -0800
Subject: [PATCH 19/20] correct-num
---
windows/whats-new/removed-features.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md
index 985b865c6a..149c2ffc91 100644
--- a/windows/whats-new/removed-features.md
+++ b/windows/whats-new/removed-features.md
@@ -48,7 +48,7 @@ The following features and functionalities have been removed from the installed
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 |
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 |
-| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. **[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. | 1909 |
+| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. **[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. | 1909 |
| Taskbar settings roaming | Roaming of taskbar settings is removed in this release. This feature was announced as no longer being developed in Windows 10, version 1903. | 1909 |
| Desktop messaging app doesn't offer messages sync | The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. The sync feature has been removed from all devices. Due to this change, you'll only be able to access messages from the device that received the message. | 1903 |
|Business Scanning also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| 1809 |
From 881bc4f066354ffc71f669597496ca64de1b8ff9 Mon Sep 17 00:00:00 2001
From: BMathew <32939761+bmathew17@users.noreply.github.com>
Date: Wed, 28 Feb 2024 16:04:01 -0800
Subject: [PATCH 20/20] Minor typo (state->stale)
Fixed link to match actual page title
---
.../deploy/windows-autopatch-register-devices.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md
index 27c2f9f084..b7245596bf 100644
--- a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md
+++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md
@@ -62,7 +62,7 @@ An [Microsoft Entra dual state](/azure/active-directory/devices/hybrid-azuread-j
In the dual state, you end up having two Microsoft Entra device records with different join types for the same device. In this case, the Hybrid Microsoft Entra device record takes precedence over the Microsoft Entra registered device record for any type of authentication in Microsoft Entra ID, which makes the Microsoft Entra registered device record stale.
-It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage state devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
+It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage stale devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
> [!WARNING]
> If you don't clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, you might end up seeing devices failing to meet the **Intune or Cloud-Attached (Device must be either Intune-managed or Co-managed)** pre-requisite check in the **Not ready** tab because it's expected that these stale Microsoft Entra devices aren't enrolled into the Intune service anymore.