Merge remote-tracking branch 'refs/remotes/origin/master' into rs1
@ -52,7 +52,7 @@
|
||||
"Conceptual": "Content"
|
||||
}
|
||||
},
|
||||
{
|
||||
{
|
||||
"docset_name": "mdop",
|
||||
"build_output_subfolder": "mdop",
|
||||
"locale": "en-us",
|
||||
|
@ -20,6 +20,7 @@
|
||||
#### [Accessibility](accessibility-surface-hub.md)
|
||||
#### [Change the Surface Hub device account](change-surface-hub-device-account.md)
|
||||
#### [Device reset](device-reset-suface-hub.md)
|
||||
#### [End a Surface Hub meeting with I'm Done](i-am-done-finishing-your-surface-hub-meeting.md)
|
||||
#### [Install apps on your Surface Hub](install-apps-on-surface-hub.md)
|
||||
#### [Manage settings with a local admin account](manage-settings-with-local-admin-account-surface-hub.md)
|
||||
#### [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md)
|
||||
|
@ -0,0 +1,87 @@
|
||||
---
|
||||
title: I am done - ending a Surface Hub meeting
|
||||
description: To end a Surface Hub meeting, tap I am Done. Surface Hub cleans up the application state, operating system state, and the user interface so that Surface Hub is ready for the next meeting.
|
||||
keywords: I am Done, end Surface Hub meeting, finish Surface Hub meeting, clean up Surface Hub meeting
|
||||
author: TrudyHa
|
||||
---
|
||||
|
||||
# End a Surface Hub meeting with I'm Done
|
||||
Surface Hub is a collaboration device designed to be used simultaneously and sequentially by multiple people. At the end of a Surface Hub meeting, one of the attendees can tap or click **I'm Done** to end the meeting. Tapping **I'm Done** tells Surface Hub to clean up info from the current meeting, so that it will be ready for the next meeting. When a meeting attendee taps **I'm Done**, Surface Hub cleans up, or resets, these states.
|
||||
- Applications
|
||||
- Operating system
|
||||
- User interface
|
||||
|
||||
This topic explains what **I'm Done** resets for each of these states.
|
||||
|
||||
## Applications
|
||||
When you start apps on Surface Hub, they are stored in memory and data is stored at the application level. Data is available to all users during that session (or meeting) until date is removed or overwritten. When **I'm done** is selected, Surface Hub application state is cleared out by closing applications, deleting browser history, resetting applications, and removing Skype logs.
|
||||
|
||||
### Close applications
|
||||
Surface Hub closes all visible windows, including Win32 and Universal Windows Platform (UWP) applications. The application close stage uses the multitasking view to query the visible windows. Win32 windows that do not close within a certain timeframe are closed using **TerminateProcess**.
|
||||
|
||||
### Delete browser history
|
||||
Surface Hub uses Delete Browser History (DBH) in Edge to clear Edge history and cached data. This is similar to how a user can clear out their browser history manually, but **I'm Done** also ensures that application states are cleared and data is removed before the next session, or meeting, starts.
|
||||
|
||||
### Reset applications
|
||||
**I'm Done** resets the state of each application that is installed on the Surface Hub. Resetting an application clears all background tasks, application data, notifications, and user consent dialogs. Applications are returned to their first-run state for the next people that use Surface Hub.
|
||||
|
||||
### Remove Skype logs
|
||||
Skype does not store personally-identifiable information on Surface Hub. Information is stored in the Skype service to meet existing Skype for Business guidance. Local Skype logging information is the only data removed when **I'm Done** is selected. This includes Unified Communications Client Platform (UCCP) logs and media logs.
|
||||
|
||||
## Operating System
|
||||
The operating system hosts a variety of information about the state of the sessions that needs to be cleared after each Surface Hub meeting.
|
||||
### File System
|
||||
Meeting attendees have access to a limited set of directories on the Surface Hub. When **I'm Done** is selected, Surface Hub clears these directories:<br>
|
||||
- Music
|
||||
- Videos
|
||||
- Documents
|
||||
- Pictures
|
||||
- Downloads
|
||||
|
||||
Surface Hub also clears these directories, since many applications often write to them:
|
||||
- Desktop
|
||||
- Favorites
|
||||
- Recent
|
||||
- Public Documents
|
||||
- Public Music
|
||||
- Public Videos
|
||||
- Public Downloads
|
||||
|
||||
### Credentials
|
||||
User credentials that are stored in **TokenBroker**, **PasswordVault**, or **Credential Manager** are cleared when you tap I’m done.
|
||||
|
||||
## User interface
|
||||
User interface (UI) settings are returned to their default values when **I'm Done** is selected.
|
||||
|
||||
### UI items
|
||||
- Reset Quick Actions to default state
|
||||
- Clear Toast notifications
|
||||
- Reset volume levels
|
||||
- Reset Cortana relaunch count
|
||||
- Reset sidebar width
|
||||
- Reset tablet mode layout
|
||||
|
||||
### Accessibility
|
||||
Accessibility features and apps are returned to default settings when **I'm Done** is selected.
|
||||
- Filter keys
|
||||
- High contrast
|
||||
- Stickey keys
|
||||
- Toggle keys
|
||||
- Mouse keys
|
||||
- Magnifier
|
||||
- Narrator
|
||||
|
||||
### Clipboard
|
||||
The clipboard is cleared to remove data that was copied to the clipboard during the session.
|
||||
|
||||
## Frequently asked questions
|
||||
**What happens if I forget to tap I'm Done at the end of a meeting, and someone else uses the Surface Hub later?**<br>
|
||||
When you don't tap **I"m Done** at the end of your meeting, Surface Hub enters a Resume state. This is similar to leaving content on a whiteboard in a meeting room, and forgetting to erase the whiteboard. When you return to the meeting room, that content will still be on the whiteboard unless someone erarses it. With Surface Hub, meeting content is still available if an attendee doesn't tap **I'm Done**. However, Surface Hub removes all meeting data during daily maintenance. Any meeting that wasn't ended with **I'm Done** will be cleaned up during maintenance.
|
||||
|
||||
**Are documents recoverable?**<br>
|
||||
Removing files from the hard drive when **I'm Done** is selected is just like any other file deletion from a hard disk drive. 3rd-party software might be able to recover data from the hard disk drive, but file recovery is not a supported feature on Surface Hub.
|
||||
|
||||
**Do the clean-up actions from I'm Done comply with the US Department of Defense clearing and sanitizing standard: DoD 5220.22-M?**<br>
|
||||
No. Currently, the clean-up actions from **I'm Done** do not comply with this standard.
|
||||
|
||||
|
@ -6,6 +6,7 @@
|
||||
## [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)
|
||||
## [Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md)
|
||||
## [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
|
||||
## [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
|
||||
## [Surface Data Eraser](microsoft-surface-data-eraser.md)
|
||||
## [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)
|
||||
### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
|
||||
|
@ -6,7 +6,7 @@ keywords: ["Surface, Surface Pro 3, security, features, configure, hardware, dev
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Advanced UEFI security features for Surface
|
||||
@ -24,9 +24,7 @@ Before you can configure the advanced security features of your Surface device,
|
||||
## Manually configure additional security settings
|
||||
|
||||
|
||||
**Note** To enter firmware setup on a Surface device, begin with the device powered off, press and hold the **Volume Up** button, then press and release the **Power** button, then release the **Volume Up** button after the device has begun to boot.
|
||||
|
||||
|
||||
>**Note:** To enter firmware setup on a Surface device, begin with the device powered off, press and hold the **Volume Up** button, then press and release the **Power** button, then release the **Volume Up** button after the device has begun to boot.
|
||||
|
||||
After the v3.11.760.0 UEFI update is installed on a Surface device, an additional UEFI menu named **Advanced Device Security** becomes available. If you click this menu, the following options are displayed:
|
||||
|
||||
@ -57,9 +55,8 @@ As an IT professional with administrative privileges, you can automate the confi
|
||||
|
||||
**Sample scripts**
|
||||
|
||||
**Note** The UEFI password used in the sample scripts below is presented in clear text. We strongly recommend saving the scripts in a protected location and running them in a controlled environment.
|
||||
>**Note**: The UEFI password used in the sample scripts below is presented in clear text. We strongly recommend saving the scripts in a protected location and running them in a controlled environment.
|
||||
|
||||
|
||||
|
||||
Show all configurable options:
|
||||
|
||||
|
@ -6,31 +6,26 @@ keywords: ["deploy, customize, automate, deployment, network, Pen, pair, boot"]
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Customize the OOBE for Surface deployments
|
||||
|
||||
|
||||
This article will walk you through the process of customizing the Surface out-of-box experience for end users in your organization.
|
||||
This article walks you through the process of customizing the Surface out-of-box experience for end users in your organization.
|
||||
|
||||
It is common practice in a Windows deployment to customize the user experience for the first startup of deployed computers — the out-of-box experience, or OOBE.
|
||||
|
||||
**Note**
|
||||
OOBE is also often used to describe the phase, or configuration pass, of Windows setup during which the user experience is displayed. For more information about the OOBE phase of setup, see [How Configuration Passes Work](http://msdn.microsoft.com/library/windows/hardware/dn898581(v=vs.85).aspx).
|
||||
|
||||
|
||||
>**Note:** OOBE is also often used to describe the phase, or configuration pass, of Windows setup during which the user experience is displayed. For more information about the OOBE phase of setup, see [How Configuration Passes Work](http://msdn.microsoft.com/library/windows/hardware/dn898581.aspx).
|
||||
|
||||
In some scenarios, you may want to provide complete automation to ensure that at the end of a deployment, computers are ready for use without any interaction from the user. In other scenarios, you may want to leave key elements of the experience for users to perform necessary actions or select between important choices. For administrators deploying to Surface devices, each of these scenarios presents a unique challenge to overcome.
|
||||
|
||||
This article provides a summary of the scenarios where a deployment might require additional steps. It also provides the required information to ensure that the desired experience is achieved on any newly deployed Surface device. This article is intended for administrators who are familiar with the deployment process, as well as concepts such as answer files and [reference images](http://go.microsoft.com/fwlink/p/?LinkID=618042).
|
||||
|
||||
**Note**
|
||||
Although the OOBE phase of setup is still run during a deployment with an automated deployment solution such as the [Microsoft Deployment Toolkit (MDT)](http://go.microsoft.com/fwlink/p/?LinkId=618117) or System Center Configuration Manager Operating System Deployment (OSD), it is automated by the settings supplied in the Deployment Wizard and task sequence. For more information see:
|
||||
|
||||
- [Deploy Windows 10 with the Microsoft Deployment Toolkit](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit)
|
||||
|
||||
- [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager)
|
||||
>**Note:** Although the OOBE phase of setup is still run during a deployment with an automated deployment solution such as the [Microsoft Deployment Toolkit (MDT)](http://go.microsoft.com/fwlink/p/?LinkId=618117) or System Center Configuration Manager Operating System Deployment (OSD), it is automated by the settings supplied in the Deployment Wizard and task sequence. For more information see:<br/>
|
||||
- [Deploy Windows 10 with the Microsoft Deployment Toolkit](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit)
|
||||
<br/>
|
||||
- [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager)
|
||||
|
||||
|
||||
|
||||
@ -53,8 +48,7 @@ To provide the factory Surface Pen pairing experience in OOBE, you must copy fou
|
||||
- %windir%\\system32\\oobe\\info\\default\\1033\\PenError\_en-US.png
|
||||
- %windir%\\system32\\oobe\\info\\default\\1033\\PenSuccess\_en-US.png
|
||||
|
||||
**Note**
|
||||
You should copy the files from a factory image for the same model Surface device that you intend to deploy to. For example, you should use the files from a Surface Pro 3 to deploy to Surface Pro 3, and the files from Surface Book to deploy Surface Book, but you should not use the files from a Surface Pro 3 to deploy Surface Book or Surface Pro 4.
|
||||
>**Note:** You should copy the files from a factory image for the same model Surface device that you intend to deploy to. For example, you should use the files from a Surface Pro 3 to deploy to Surface Pro 3, and the files from Surface Book to deploy Surface Book, but you should not use the files from a Surface Pro 3 to deploy Surface Book or Surface Pro 4.
|
||||
|
||||
|
||||
|
||||
|
@ -6,7 +6,7 @@ keywords: ["update Surface, newest, latest, download, firmware, driver, tablet,
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Download the latest firmware and drivers for Surface devices
|
||||
@ -26,14 +26,12 @@ Driver and firmware updates for Surface devices are released in one of two ways:
|
||||
|
||||
Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices and are detailed here in this article.
|
||||
|
||||
**Note**
|
||||
To simplify the process of locating drivers for your device, downloads for Surface devices have been reorganized to separate pages for each model. Bookmark the Microsoft Download Center page for your device from the links provided on this page. Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file.
|
||||
|
||||
>**Note:** To simplify the process of locating drivers for your device, downloads for Surface devices have been reorganized to separate pages for each model. Bookmark the Microsoft Download Center page for your device from the links provided on this page. Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file.
|
||||
|
||||
|
||||
Recent additions to the downloads for Surface devices provide you with options to install Windows 10 on your Surface devices and update LTE devices with the latest Windows 10 drivers and firmware.
|
||||
|
||||
**Note** A battery charge of 40% or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](http://go.microsoft.com/fwlink/p/?LinkId=618106) for more information.
|
||||
>**Note:** A battery charge of 40% or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](http://go.microsoft.com/fwlink/p/?LinkId=618106) for more information.
|
||||
|
||||
|
||||
|
||||
|
@ -6,7 +6,7 @@ keywords: ["network", "wireless", "device", "deploy", "authenticaion", "protocol
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices
|
||||
|
@ -6,7 +6,7 @@ keywords: ["ethernet, deploy, removable, network, connectivity, boot, firmware,
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Ethernet adapters and Surface deployment
|
||||
@ -53,7 +53,7 @@ To boot a Surface device from an alternative boot device, follow these steps:
|
||||
3. Press and release the **Power** button.
|
||||
4. After the system begins to boot from the USB stick or Ethernet adapter, release the **Volume Down** button.
|
||||
|
||||
**Note** In addition to an Ethernet adapter, a keyboard must also be connected to the Surface device to enter the preinstallation environment and navigate the deployment wizard.
|
||||
>**Note:** In addition to an Ethernet adapter, a keyboard must also be connected to the Surface device to enter the preinstallation environment and navigate the deployment wizard.
|
||||
|
||||
|
||||
|
||||
|
BIN
devices/surface/images/manage-surface-uefi-fig2.png
Normal file
After Width: | Height: | Size: 20 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig3.png
Normal file
After Width: | Height: | Size: 13 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig4.png
Normal file
After Width: | Height: | Size: 65 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig5.png
Normal file
After Width: | Height: | Size: 57 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig6.png
Normal file
After Width: | Height: | Size: 104 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig7.png
Normal file
After Width: | Height: | Size: 36 KiB |
BIN
devices/surface/images/manage-surface-uefi-fig8.png
Normal file
After Width: | Height: | Size: 45 KiB |
BIN
devices/surface/images/manage-surface-uefi-figure-1.png
Normal file
After Width: | Height: | Size: 74 KiB |
@ -15,6 +15,9 @@ author: heatherpoulsen
|
||||
|
||||
|
||||
This library provides guidance to help you deploy Windows on Surface devices, keep those devices up to date, and easily manage and support Surface devices in your organization.
|
||||
|
||||
For more information on planning for, deploying, and managing Surface devices in your organization, see the [Surface TechCenter](https://technet.microsoft.com/en-us/windows/surface).
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
@ -32,15 +35,15 @@ This library provides guidance to help you deploy Windows on Surface devices, ke
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td><p>[Advanced UEFI security features for Surface](advanced-uefi-security-features-for-surface.md)</p></td>
|
||||
<td><p>This article describes how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.</p></td>
|
||||
<td><p>Find out how to install and configure the v3.11.760.0 UEFI update to enable additional security options for Surface Pro 3 devices.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td><p>[Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)</p></td>
|
||||
<td><p>This article will walk you through the process of customizing the Surface out-of-box experience for end users in your organization.</p></td>
|
||||
<td><p>Walk through the process of customizing the Surface out-of-box experience for end users in your organization.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)</p></td>
|
||||
<td><p>This article provides a list of the available downloads for Surface devices and links to download the drivers and firmware for your device.</p></td>
|
||||
<td><p>Get a list of the available downloads for Surface devices and links to download the drivers and firmware for your device.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td><p>[Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)</p></td>
|
||||
@ -48,7 +51,7 @@ This library provides guidance to help you deploy Windows on Surface devices, ke
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md)</p></td>
|
||||
<td><p>This article provides guidance and answers to help you perform a network deployment to Surface devices.</p></td>
|
||||
<td><p>Get guidance and answers to help you perform a network deployment to Surface devices.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td><p>[Manage Surface Dock firmware updates](manage-surface-dock-firmware-updates.md)</p></td>
|
||||
@ -56,23 +59,27 @@ This library provides guidance to help you deploy Windows on Surface devices, ke
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)</p></td>
|
||||
<td><p>This article describes the available options to manage firmware and driver updates for Surface devices.</p></td>
|
||||
<td><p>Explore the available options to manage firmware and driver updates for Surface devices.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td><p>[Manage Surface UEFI settings](manage-surface-uefi-settings.md)<p></td>
|
||||
<td><p>Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Surface Data Eraser](microsoft-surface-data-eraser.md)</p></td>
|
||||
<td><p>Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)</p></td>
|
||||
<td><p>Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td><p>[Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)</p></td>
|
||||
<td><p>See how Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td><p>[Surface Diagnostic Toolkit](surface-diagnostic-toolkit.md)</p></td>
|
||||
<td><p>Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the hardware of your Surface device.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<tr class="even">
|
||||
<td><p>[Surface Dock Updater](surface-dock-updater.md)</p></td>
|
||||
<td><p>This article provides a detailed walkthrough of Microsoft Surface Dock Updater.</p></td>
|
||||
<td><p>Get a detailed walkthrough of Microsoft Surface Dock Updater.</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
@ -5,7 +5,7 @@ ms.assetid: 86DFC0C0-C842-4CD1-A2D7-4425471FFE3F
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Manage Surface Dock firmware updates
|
||||
@ -13,16 +13,13 @@ author: heatherpoulsen
|
||||
|
||||
Read about the different methods you can use to manage the process of Surface Dock firmware updates.
|
||||
|
||||
The Surface Dock provides external connectivity to Surface devices through a single cable connection that includes Power, Ethernet, Audio, USB 3.0, and DisplayPort. The numerous connections provided by the Surface Dock are enabled by a smart chipset within the Surface Dock device. Like a Surface device’s chipset, the chipset that is built into the Surface Dock is controlled by firmware.
|
||||
The Surface Dock provides external connectivity to Surface devices through a single cable connection that includes Power, Ethernet, Audio, USB 3.0, and DisplayPort. The numerous connections provided by the Surface Dock are enabled by a smart chipset within the Surface Dock device. Like a Surface device’s chipset, the chipset that is built into the Surface Dock is controlled by firmware. For more information about the Surface Dock, see the [Surface Dock demonstration](https://technet.microsoft.com/en-us/mt697552) video.
|
||||
|
||||
Like the firmware for Surface devices, firmware for Surface Dock is also contained within a downloaded driver that is visible in Device Manager. This driver stages the firmware update files on the Surface device. When a Surface Dock is connected and the driver is loaded, the newer version of the firmware staged by the driver is detected and firmware files are copied to the Surface Dock. The Surface Dock then begins a two-phase process to apply the firmware internally. Each phase requires the Surface Dock to be disconnected from the Surface device before the firmware is applied. The driver copies the firmware into the dock, but only applies it when the user disconnects the Surface device from the Surface Dock. This ensures that there are no disruptions because the firmware is only applied when the user leaves their desk with the device.
|
||||
|
||||
**Note**
|
||||
You can learn more about the firmware update process for Surface devices and how firmware is updated through driver installation at the following links:
|
||||
|
||||
- [How to manage and update your drivers and firmware for Surface](http://go.microsoft.com/fwlink/p/?LinkId=785353) from Microsoft Mechanics
|
||||
|
||||
- [Windows Update Makes Surface Better](http://go.microsoft.com/fwlink/p/?LinkId=785354)on the Microsoft Devices Blog
|
||||
>**Note:** You can learn more about the firmware update process for Surface devices and how firmware is updated through driver installation at the following links:<br/>
|
||||
- [How to manage and update Surface drivers and firmware](https://technet.microsoft.com/en-us/mt697551) from Microsoft Mechanics
|
||||
- [Windows Update Makes Surface Better](http://go.microsoft.com/fwlink/p/?LinkId=785354) on the Microsoft Devices Blog
|
||||
|
||||
|
||||
|
||||
@ -70,8 +67,7 @@ There are three methods you can use to update the firmware of the Surface Dock:
|
||||
|
||||
Windows Update is the method that most users will use. The drivers for the Surface Dock are downloaded automatically from Windows Update and the dock update process is initiated without additional user interaction. The two-phase dock update process described earlier occurs in the background as the user connects and disconnects the Surface Dock during normal use.
|
||||
|
||||
**Note**
|
||||
The driver version that is displayed in Device Manager may be different from the firmware version that the Surface Dock is using.
|
||||
>**Note:** The driver version that is displayed in Device Manager may be different from the firmware version that the Surface Dock is using.
|
||||
|
||||
|
||||
|
||||
@ -82,10 +78,8 @@ This method is used mostly in environments where Surface device drivers and firm
|
||||
|
||||
For more information about how to deploy MSI packages see [Create and deploy an application with System Center Configuration Manager](http://go.microsoft.com/fwlink/p/?LinkId=785355).
|
||||
|
||||
**Note**
|
||||
When drivers are installed through Windows Update or the MSI package, registry keys are added that indicate the version of firmware installed on the Surface Dock and contained within the Surface Dock driver. These registry keys can be found in:
|
||||
|
||||
**HLKM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WUDF\\Services\\SurfaceDockFwUpdate\\Parameters**
|
||||
>**Note:** When drivers are installed through Windows Update or the MSI package, registry keys are added that indicate the version of firmware installed on the Surface Dock and contained within the Surface Dock driver. These registry keys can be found in:<br/><br/>
|
||||
**HLKM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WUDF\\Services\\SurfaceDockFwUpdate\\Parameters**
|
||||
|
||||
Firmware status is displayed for both the main chipset (displayed as **Component10**) and the DisplayPort chipset (displayed as **Component20**). For each chipset there are four keys, where *xx* is **10** or **20** corresponding to each chipset:
|
||||
|
||||
@ -97,7 +91,7 @@ Firmware status is displayed for both the main chipset (displayed as **Component
|
||||
|
||||
- **Component*xx*FirmwareUpdateStatusRejectReason** – This key changes as the firmware update is processed. It should result in 0 after the successful installation of Surface Dock firmware.
|
||||
|
||||
These registry keys are not present unless you have installed updated Surface Dock drivers through Windows Update or MSI deployment.
|
||||
>**Note:** These registry keys are not present unless you have installed updated Surface Dock drivers through Windows Update or MSI deployment.
|
||||
|
||||
|
||||
|
||||
|
@ -6,7 +6,7 @@ keywords: ["Surface, Surface Pro 3, firmware, update, device, manage, deploy, dr
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Manage Surface driver and firmware updates
|
||||
|
138
devices/surface/manage-surface-uefi-settings.md
Normal file
@ -0,0 +1,138 @@
|
||||
---
|
||||
title: Manage Surface UEFI settings (Surface)
|
||||
description: Use Surface UEFI settings to enable or disable devices or components, configure security settings, and adjust Surface device boot settings.
|
||||
keywords: firmware, security, features, configure, hardware
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: devices, surface
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
#Manage Surface UEFI settings
|
||||
|
||||
Current and future generations of Surface devices, including Surface Pro 4 and Surface Book, use a unique UEFI firmware engineered by Microsoft specifically for these devices. This firmware allows for significantly greater control of the device’s operation over firmware versions in earlier generation Surface devices, including the support for touch, mouse, and keyboard operation. By using the Surface UEFI settings you can easily enable or disable internal devices or components, configure security to protect UEFI settings from being changed, and adjust the Surface device boot settings.
|
||||
|
||||
>**Note:** Surface Pro 3, Surface 3, Surface Pro 2, Surface 2, Surface Pro, and Surface do not use the Surface UEFI and instead use firmware provided by third-party manufacturers, such as AMI.
|
||||
|
||||
You can enter the Surface UEFI settings on your Surface device by pressing the **Volume Up** button and the **Power** button simultaneously. Hold the **Volume Up** button until the Surface logo is displayed, which indicates that the device has begun to boot.
|
||||
|
||||
##PC information
|
||||
|
||||
On the **PC information** page, detailed information about your Surface device is provided:
|
||||
|
||||
- **Model** – Your Surface device’s model will be displayed here, such as Surface Book or Surface Pro 4. The exact configuration of your device is not shown, (such as processor, disk size, or memory size).
|
||||
- **UUID** – This Universally Unique Identification number is specific to your device and is used to identify the device during deployment or management.
|
||||
|
||||
- **Serial Number** – This number is used to identify this specific Surface device for asset tagging and support scenarios.
|
||||
- **Asset Tag** – The asset tag is assigned to the Surface device with the [Asset Tag Tool](https://www.microsoft.com/en-us/download/details.aspx?id=44076).
|
||||
|
||||
You will also find detailed information about the firmware of your Surface device. Surface devices have several internal components that each run different versions of firmware. The firmware version of each of the following devices is displayed on the **PC information** page (as shown in Figure 1):
|
||||
|
||||
- System UEFI
|
||||
|
||||
- SAM Controller
|
||||
|
||||
- Intel Management Engine
|
||||
|
||||
- System Embedded Controller
|
||||
|
||||
- Touch Firmware
|
||||
|
||||
*Figure 1. System information and firmware version information*
|
||||
|
||||

|
||||
|
||||
You can find up-to-date information about the latest firmware version for your Surface device in the [Surface Update History](https://www.microsoft.com/surface/en-us/support/install-update-activate/surface-update-history) for your device.
|
||||
|
||||
##Security
|
||||
|
||||
On the **Security** page of Surface UEFI settings, you can set a password to protect UEFI settings. This password must be entered when you boot the Surface device to UEFI. The password can contain the following characters (as shown in Figure 2):
|
||||
|
||||
- Uppercase letters: A-Z
|
||||
|
||||
- Lowercase letters: a-z
|
||||
|
||||
- Numbers: 1-0
|
||||
|
||||
- Special characters: !@#$%^&*()?<>{}[]-_=+|.,;:’`”
|
||||
|
||||
The password must be at least 6 characters and is case sensitive.
|
||||
|
||||
*Figure 2. Add a password to protect Surface UEFI settings*
|
||||
|
||||

|
||||
|
||||
On the **Security** page you can also change the configuration of Secure Boot on your Surface device. Secure Boot technology prevents unauthorized boot code from booting on your Surface device, which protects against bootkit and rootkit-type malware infections. You can disable Secure Boot to allow your Surface device to boot third-party operating systems or bootable media. You can also configure Secure Boot to work with third-party certificates, as shown in Figure 3. Read more about [Secure Boot](https://msdn.microsoft.com/windows/hardware/commercialize/manufacture/desktop/secure-boot-overview) in the TechNet Library.
|
||||
|
||||
*Figure 3. Configure Secure Boot*
|
||||
|
||||

|
||||
|
||||
You can also enable or disable the Trusted Platform Module (TPM) device on the **Security** page, as shown in Figure 4. The TPM is used to authenticate encryption for your device’s data with BitLocker. Read more about [BitLocker](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/bitlocker-overview) in the TechNet Library.
|
||||
|
||||
*Figure 4. Configure Surface UEFI security settings*
|
||||
|
||||

|
||||
|
||||
##Devices
|
||||
|
||||
On the **Devices** page you can enable or disable specific devices and components of your Surface device. Devices that you can enable or disable on this page include:
|
||||
|
||||
- Docking and USB Ports
|
||||
|
||||
- MicroSD or SD Card Slot
|
||||
|
||||
- Rear Camera
|
||||
|
||||
- Front Camera
|
||||
|
||||
- Infrared (IR) Camera
|
||||
|
||||
- Wi-Fi and Bluetooth
|
||||
|
||||
- Onboard Audio (Speakers and Microphone)
|
||||
|
||||
Each device is listed with a slider button that you can move to **On** (enabled) or **Off** (disabled) position, as shown in Figure 5.
|
||||
|
||||
*Figure 5. Enable and disable specific devices*
|
||||
|
||||

|
||||
|
||||
##Boot configuration
|
||||
|
||||
On the **Boot Configuration** page, you can change the order of your boot devices and/or enable or disable boot of the following devices:
|
||||
|
||||
- Windows Boot Manager
|
||||
|
||||
- USB Storage
|
||||
|
||||
- PXE Network
|
||||
|
||||
- Internal Storage
|
||||
|
||||
You can boot from a specific device immediately, or you can swipe left on that device’s entry in the list using the touchscreen. You can also boot immediately to a USB device or USB Ethernet adapter when the Surface device is powered off by pressing the **Volume Down** button and the **Power** button simultaneously.
|
||||
|
||||
For the specified boot order to take effect, you must set the **Enable Alternate Boot Sequence** option to **On**, as shown in Figure 6.
|
||||
|
||||
*Figure 6. Configure the boot order for your Surface device*
|
||||
|
||||

|
||||
|
||||
You can also turn on and off IPv6 support for PXE with the **Enable IPv6 for PXE Network Boot** option, for example when performing a Windows deployment using PXE where the PXE server is configured for IPv4 only.
|
||||
|
||||
##About
|
||||
|
||||
The **About** page displays regulatory information, such as compliance with FCC rules, as shown in Figure 7.
|
||||
|
||||
*Figure 7. Regulatory information is displayed on the About page*
|
||||
|
||||

|
||||
|
||||
##Exit
|
||||
|
||||
Use the **Restart Now** button on the **Exit** page to exit UEFI settings, as shown in Figure 8.
|
||||
|
||||
*Figure 8. Click Restart Now to exit Surface UEFI and restart the device*
|
||||
|
||||

|
@ -6,7 +6,7 @@ keywords: ["tool", "USB", "data", "erase"]
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Microsoft Surface Data Eraser
|
||||
@ -40,15 +40,10 @@ Some scenarios where Microsoft Surface Data Eraser can be helpful include:
|
||||
|
||||
- Standard practice when performing reimaging for devices used with sensitive data
|
||||
|
||||
**Note**
|
||||
Third-party devices, Surface devices running Windows RT (including Surface and Surface 2), and Surface Pro are not compatible with Microsoft Surface Data Eraser.
|
||||
>**Note:** Third-party devices, Surface devices running Windows RT (including Surface and Surface 2), and Surface Pro are not compatible with Microsoft Surface Data Eraser.
|
||||
|
||||
|
||||
>**Note:** Because the ability to boot to USB is required to run Microsoft Surface Data Eraser, if the device is not configured to boot from USB or if the device is unable to boot or POST successfully, the Microsoft Surface Data Eraser tool will not function.
|
||||
|
||||
**Note**
|
||||
Because the ability to boot to USB is required to run Microsoft Surface Data Eraser, if the device is not configured to boot from USB or if the device is unable to boot or POST successfully, the Microsoft Surface Data Eraser tool will not function.
|
||||
|
||||
|
||||
|
||||
## How to create a Microsoft Surface Data Eraser USB stick
|
||||
|
||||
@ -74,12 +69,8 @@ After the creation tool is installed, follow these steps to create a Microsoft S
|
||||
Figure 1. Start the Microsoft Surface Data Eraser tool
|
||||
|
||||
4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 2, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost.
|
||||
|
||||
**Note**
|
||||
If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB.
|
||||
|
||||
|
||||
|
||||
>**Note:** If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB.
|
||||
|
||||

|
||||
|
||||
Figure 2. USB thumb drive selection
|
||||
|
@ -6,7 +6,7 @@ keywords: ["deploy", "install", "tool"]
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Microsoft Surface Deployment Accelerator
|
||||
@ -20,7 +20,7 @@ Microsoft Surface Deployment Accelerator is built on the powerful suite of deplo
|
||||
|
||||
You can find more information about how to deploy to Surface devices, including step-by-step walkthroughs of customized deployment solution implementation, on the Deploy page of the [Surface TechCenter](http://go.microsoft.com/fwlink/p/?LinkId=691693).
|
||||
|
||||
### Download Microsoft Surface Deployment Accelerator
|
||||
**Download Microsoft Surface Deployment Accelerator**
|
||||
|
||||
You can download the installation files for Microsoft Surface Deployment Accelerator from the Microsoft Download Center. To download the installation files:
|
||||
|
||||
@ -60,8 +60,7 @@ When the Microsoft Surface Deployment Accelerator completes, you can use the dep
|
||||
|
||||
You can modify the task sequence in the MDT Deployment Workbench to [include your own apps](http://go.microsoft.com/fwlink/p/?linkid=691700), or to [pause the automated installation routine](http://go.microsoft.com/fwlink/p/?linkid=691701). While the installation is paused, you can make changes to customize your reference image. After the image is captured, you can configure a deployment task sequence and distribute this custom configuration by using the same network boot capabilities as before.
|
||||
|
||||
**Note**
|
||||
With Microsoft Surface Deployment Accelerator v1.9.0258, Surface Pro 3, Surface Pro 4, and Surface Book are supported for Windows 10 deployment, and Surface Pro 3 is supported for Windows 8.1 deployment.
|
||||
>**Note:** With Microsoft Surface Deployment Accelerator v1.9.0258, Surface Pro 3, Surface Pro 4, and Surface Book are supported for Windows 10 deployment, and Surface Pro 3 is supported for Windows 8.1 deployment.
|
||||
|
||||
|
||||
|
||||
@ -76,8 +75,7 @@ Figure 2. Specify a local source for Surface driver and app files
|
||||
|
||||
You can find a full list of available driver downloads at [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
|
||||
|
||||
**Note**
|
||||
Downloaded files do not need to be extracted. The downloaded files can be left as .zip files as long as they are stored in one folder.
|
||||
>**Note:** Downloaded files do not need to be extracted. The downloaded files can be left as .zip files as long as they are stored in one folder.
|
||||
|
||||
|
||||
|
||||
|
@ -6,7 +6,7 @@ keywords: ["deploy, configure"]
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Step by step: Surface Deployment Accelerator
|
||||
@ -37,8 +37,7 @@ The tool installs in the Surface Deployment Accelerator program group, as shown
|
||||
|
||||
Figure 2. The Surface Deployment Accelerator program group and icon
|
||||
|
||||
**Note**
|
||||
At this point the tool has not yet prepared any deployment environment or downloaded any materials from the Internet.
|
||||
>**Note:** At this point the tool has not yet prepared any deployment environment or downloaded any materials from the Internet.
|
||||
|
||||
|
||||
|
||||
@ -47,8 +46,7 @@ At this point the tool has not yet prepared any deployment environment or downlo
|
||||
|
||||
The following steps show how you create a deployment share for Windows 10 that supports Surface Pro 3, Surface Pro 4, Surface Book, the Surface Firmware Tool, and the Surface Asset Tag Tool. As you follow the steps below, make the selections that are applicable for your organization. For example, you could choose to deploy Windows 10 to Surface Book only, without any of the Surface apps.
|
||||
|
||||
**Note**
|
||||
SDA lets you create deployment shares for both Windows 8.1 and Windows 10 deployments, but you can only create a single deployment share at a time. Therefore, to create both Windows 8.1 and Windows 10 deployment shares, you will need to run the tool twice.
|
||||
>**Note:** SDA lets you create deployment shares for both Windows 8.1 and Windows 10 deployments, but you can only create a single deployment share at a time. Therefore, to create both Windows 8.1 and Windows 10 deployment shares, you will need to run the tool twice.
|
||||
|
||||
|
||||
|
||||
@ -116,8 +114,7 @@ SDA lets you create deployment shares for both Windows 8.1 and Windows 10 depl
|
||||
|
||||
If you are unable to connect to the Internet with your deployment server, or if you want to download the Surface drivers and apps separately, you can specify a local source for the driver an app files at the time of deployment share creation. On the **Configure** page of the SDA wizard, select the **Copy from a Local Directory** check box, as shown in Figure 6. The **Download from the Internet** check box will be automatically deselected. Enter the folder location where you have placed the driver and app files in the **Local Path** field, as shown in Figure 6.
|
||||
|
||||
**Note**
|
||||
All of the downloaded driver and applications files must be located in the same folder. The driver and app files do not need to be extracted from the downloaded .zip files.
|
||||
>**Note:** All of the downloaded driver and applications files must be located in the same folder. The driver and app files do not need to be extracted from the downloaded .zip files.
|
||||
|
||||
|
||||
|
||||
@ -125,8 +122,7 @@ All of the downloaded driver and applications files must be located in the same
|
||||
|
||||
Figure 6. Specify the Surface driver and app files from a local path
|
||||
|
||||
**Note**
|
||||
The **Copy from a Local Directory** check box is only available in SDA version 1.90.0221 or later.
|
||||
>**Note:** The **Copy from a Local Directory** check box is only available in SDA version 1.90.0221 or later.
|
||||
|
||||
|
||||
|
||||
@ -134,8 +130,7 @@ The **Copy from a Local Directory** check box is only available in SDA version 1
|
||||
|
||||
You can use USB media to perform an SDA deployment if your Surface device is unable to boot from the network. For example, if you do not have a Microsoft Surface Ethernet Adapter or Microsoft Surface dock to facilitate network boot (PXE boot). The USB drive produced by following these steps includes a complete copy of the SDA deployment share and can be run on a Surface device without a network connection.
|
||||
|
||||
**Note**
|
||||
The offline media files for the complete SDA deployment share are approximately 9 GB in size. Your USB drive must be at least 9 GB in size. A 16 GB USB drive is recommended.
|
||||
>**Note:** The offline media files for the complete SDA deployment share are approximately 9 GB in size. Your USB drive must be at least 9 GB in size. A 16 GB USB drive is recommended.
|
||||
|
||||
|
||||
|
||||
@ -149,8 +144,7 @@ Before you can create bootable media files within the MDT Deployment Workbench o
|
||||
|
||||
4. **clean** – Removes all configuration from your USB drive.
|
||||
|
||||
**Warning**
|
||||
This step will remove all information from your drive. Verify that your USB drive does not contain any needed data before you perform the **clean** command.
|
||||
>**Warning:** This step will remove all information from your drive. Verify that your USB drive does not contain any needed data before you perform the **clean** command.
|
||||
|
||||
|
||||
|
||||
@ -168,8 +162,7 @@ Before you can create bootable media files within the MDT Deployment Workbench o
|
||||
|
||||
Figure 7. Use DiskPart to prepare a USB drive for boot
|
||||
|
||||
**Note**
|
||||
You can format your USB drive with FAT32 from Disk Management, but you must still use DiskPart to set the partition as active for the drive to boot properly.
|
||||
>**Note:** You can format your USB drive with FAT32 from Disk Management, but you must still use DiskPart to set the partition as active for the drive to boot properly.
|
||||
|
||||
|
||||
|
||||
@ -276,8 +269,7 @@ When you run the task sequence, you will be prompted to provide the following in
|
||||
|
||||
- A product key, if one is required
|
||||
|
||||
**Note**
|
||||
If you are deploying the same version of Windows as the version that came on your device, no product key is required.
|
||||
>**Note:** If you are deploying the same version of Windows as the version that came on your device, no product key is required.
|
||||
|
||||
|
||||
|
||||
@ -293,8 +285,7 @@ The **2 – Create Windows Reference Image** task sequence is used to perform a
|
||||
|
||||
Like the **1 – Deploy Microsoft Surface** task sequence, the **2 – Create Windows Reference Image** task sequence performs a deployment of the unaltered Windows image directly from the installation media. Creation of a reference image should always be performed on a virtual machine. Using a virtual machine as your reference system helps to ensure that the resulting image is compatible with different hardware configurations.
|
||||
|
||||
**Note**
|
||||
Using a virtual machine when you create a reference image for Windows deployment is a recommended practice for performing Windows deployments with Microsoft deployment tools including the Microsoft Deployment Toolkit and System Center Configuration Manager. These Microsoft deployment technologies use the hardware agnostic images produced from a virtual machine and a collection of managed drivers to deploy to different configurations of hardware. For more information see [Deploy a Windows 10 image using MDT 2013 Update 1](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-a-windows-10-image-using-mdt).
|
||||
>**Note:** Using a virtual machine when you create a reference image for Windows deployment is a recommended practice for performing Windows deployments with Microsoft deployment tools including the Microsoft Deployment Toolkit and System Center Configuration Manager. These Microsoft deployment technologies use the hardware agnostic images produced from a virtual machine and a collection of managed drivers to deploy to different configurations of hardware. For more information see [Deploy a Windows 10 image using MDT 2013 Update 1](http://technet.microsoft.com/en-us/itpro/windows/deploy/deploy-a-windows-10-image-using-mdt).
|
||||
|
||||
|
||||
|
||||
|
@ -6,7 +6,7 @@ keywords: ["hardware, device, tool, test, component"]
|
||||
ms.prod: W8
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: miladCA
|
||||
---
|
||||
|
||||
# Microsoft Surface Diagnostic Toolkit
|
||||
@ -16,8 +16,7 @@ Find out how you can use the Microsoft Surface Diagnostic Toolkit to test the ha
|
||||
|
||||
The [Microsoft Surface Diagnostic Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=618121) is a small, portable diagnostic tool that runs through a suite of tests to diagnose the hardware of Surface devices. The Microsoft Surface Diagnostic Toolkit executable file is less than 3 MB, which allows it to be distributed through email. It does not require installation, so it can be run directly from a USB stick or over the network. The Microsoft Surface Diagnostic Toolkit walks you through several tests of individual components including the touchscreen, cameras, and sensors.
|
||||
|
||||
**Note**
|
||||
A Surface device must boot into Windows to run the Microsoft Surface Diagnostic Toolkit. The Microsoft Surface Diagnostic Toolkit will run only on the following Surface devices:
|
||||
>**Note:** A Surface device must boot into Windows to run the Microsoft Surface Diagnostic Toolkit. The Microsoft Surface Diagnostic Toolkit will run only on the following Surface devices:
|
||||
|
||||
- Surface Book
|
||||
|
||||
@ -33,12 +32,7 @@ A Surface device must boot into Windows to run the Microsoft Surface Diagnostic
|
||||
|
||||
- Surface Pro
|
||||
|
||||
|
||||
|
||||
**Note**
|
||||
Security software and built-in security measures in many email applications and services will block executable files that are transferred through email. To email the Surface Diagnostic Toolkit, attach the .zip archive file as downloaded from the Surface Tools for IT page without extracting it first. You can also create a custom .zip archive that contains the .exe file. (For example, if you want to localize the text as described in the [Localization](#localization) section of this article.)
|
||||
|
||||
|
||||
>**Note:** Security software and built-in security measures in many email applications and services will block executable files that are transferred through email. To email the Surface Diagnostic Toolkit, attach the .zip archive file as downloaded from the Surface Tools for IT page without extracting it first. You can also create a custom .zip archive that contains the .exe file. (For example, if you want to localize the text as described in the [Localization](#localization) section of this article.)
|
||||
|
||||
Running the Microsoft Surface Diagnostic Toolkit is a hands-on activity. The test sequence includes several tests that require you to perform actions or observe the outcome of the test, and then click the applicable **Pass** or **Fail** button. Some tests require connectivity to external devices, like an external display. Other tests use the built in Windows troubleshooters. At the end of testing, a visual report of the test results is displayed and you are given the option to save a log file or copy the results to the clipboard.
|
||||
|
||||
@ -56,8 +50,7 @@ To run a full set of tests with the Microsoft Surface Diagnostic Toolkit, you sh
|
||||
|
||||
- External speakers or headphones
|
||||
|
||||
**Note**
|
||||
The Microsoft Surface Diagnostic Toolkit tests verify only the hardware of a Surface device and do not test or resolve issues with the operating system or software.
|
||||
>**Note:** The Microsoft Surface Diagnostic Toolkit tests verify only the hardware of a Surface device and do not test or resolve issues with the operating system or software.
|
||||
|
||||
|
||||
|
||||
@ -122,8 +115,7 @@ These files and logs are stored in a .zip file saved by the Microsoft Surface Di
|
||||
|
||||
### <a href="" id="type-cover--test"></a>Type Cover test
|
||||
|
||||
**Note**
|
||||
A Surface Type Cover is required for this test.
|
||||
>**Note:** A Surface Type Cover is required for this test.
|
||||
|
||||
|
||||
|
||||
@ -131,8 +123,7 @@ If a Surface Type Cover is not detected, the test prompts you to connect the Typ
|
||||
|
||||
### Integrated keyboard test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book and requires that the Surface Book be docked to the keyboard.
|
||||
>**Note:** This test is only applicable to Surface Book and requires that the Surface Book be docked to the keyboard.
|
||||
|
||||
|
||||
|
||||
@ -140,8 +131,7 @@ This test is essentially the same as the Type Cover test, except the integrated
|
||||
|
||||
### Canvas mode battery test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book.
|
||||
>**Note:** This test is only applicable to Surface Book.
|
||||
|
||||
|
||||
|
||||
@ -149,8 +139,7 @@ Depending on which mode Surface Book is in, different batteries are used to powe
|
||||
|
||||
### Clipboard mode battery test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book.
|
||||
>**Note:** This test is only applicable to Surface Book.
|
||||
|
||||
|
||||
|
||||
@ -158,8 +147,7 @@ Disconnect the Surface Book from the keyboard to work in clipboard mode. In clip
|
||||
|
||||
### Laptop mode battery test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book.
|
||||
>**Note:** This test is only applicable to Surface Book.
|
||||
|
||||
|
||||
|
||||
@ -171,8 +159,7 @@ In this test the battery is discharged for a few seconds and tested for health a
|
||||
|
||||
### Discrete graphics (dGPU) test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book models with a discrete graphics processor.
|
||||
>**Note:** This test is only applicable to Surface Book models with a discrete graphics processor.
|
||||
|
||||
|
||||
|
||||
@ -180,8 +167,7 @@ This test will query the device information of current hardware to check for the
|
||||
|
||||
### Discrete graphics (dGPU) fan test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book models with a discrete graphics processor.
|
||||
>**Note:** This test is only applicable to Surface Book models with a discrete graphics processor.
|
||||
|
||||
|
||||
|
||||
@ -189,8 +175,7 @@ The discrete graphics processor in the Surface Book includes a separate cooling
|
||||
|
||||
### Muscle wire test
|
||||
|
||||
**Note**
|
||||
This test is only applicable to Surface Book.
|
||||
>**Note:** This test is only applicable to Surface Book.
|
||||
|
||||
|
||||
|
||||
@ -198,8 +183,7 @@ To disconnect the Surface Book from the keyboard, software must instruct the mus
|
||||
|
||||
### Dead pixel and display artifacts tests
|
||||
|
||||
**Note**
|
||||
Before you run this test, be sure to clean the screen of dust or smudges.
|
||||
>**Note:** Before you run this test, be sure to clean the screen of dust or smudges.
|
||||
|
||||
|
||||
|
||||
@ -219,8 +203,7 @@ The Surface touchscreen should detect input across the entire screen of the devi
|
||||
|
||||
### <a href="" id="digitizer-pen--test"></a>Digitizer pen test
|
||||
|
||||
**Note**
|
||||
A Microsoft Surface Pen is required for this test.
|
||||
>**Note:** A Microsoft Surface Pen is required for this test.
|
||||
|
||||
|
||||
|
||||
@ -240,8 +223,7 @@ This test prompts you to use the volume rocker to turn the volume all the way up
|
||||
|
||||
### <a href="" id="micro-sd-or-sd--slot-test--"></a>Micro SD or SD slot test
|
||||
|
||||
**Note**
|
||||
This test requires a micro SD or SD card that is compatible with the slot in your Surface device.
|
||||
>**Note:** This test requires a micro SD or SD card that is compatible with the slot in your Surface device.
|
||||
|
||||
|
||||
|
||||
@ -253,8 +235,7 @@ This test displays the **Recording** tab of the Sound item in Control Panel. The
|
||||
|
||||
### <a href="" id="video-out--test"></a>Video out test
|
||||
|
||||
**Note**
|
||||
This test requires an external display with the applicable connection for your Surface device.
|
||||
>**Note:** This test requires an external display with the applicable connection for your Surface device.
|
||||
|
||||
|
||||
|
||||
@ -262,8 +243,7 @@ Surface devices provide a Mini DisplayPort connection for connecting to an exter
|
||||
|
||||
### <a href="" id="bluetooth--test"></a>Bluetooth test
|
||||
|
||||
**Note**
|
||||
This test requires a Bluetooth device. The device must be set to pairing mode or made discoverable to perform this test.
|
||||
>**Note:** This test requires a Bluetooth device. The device must be set to pairing mode or made discoverable to perform this test.
|
||||
|
||||
|
||||
|
||||
@ -275,8 +255,7 @@ Use this test to verify that the cameras on your Surface device are operating pr
|
||||
|
||||
### <a href="" id="speaker-test--"></a>Speaker test
|
||||
|
||||
**Note**
|
||||
Headphones or external speakers are required to test the headphone jack in this test.
|
||||
>**Note:** Headphones or external speakers are required to test the headphone jack in this test.
|
||||
|
||||
|
||||
|
||||
@ -284,8 +263,7 @@ This test plays audio over left and right channels respectively, both for the in
|
||||
|
||||
### <a href="" id="network-test--"></a>Network test
|
||||
|
||||
**Note**
|
||||
Connect the Surface device to a Wi-Fi network before you run this test. Connections that are made during the test are removed when the test is completed.
|
||||
>**Note:** Connect the Surface device to a Wi-Fi network before you run this test. Connections that are made during the test are removed when the test is completed.
|
||||
|
||||
|
||||
|
||||
@ -317,8 +295,7 @@ The ambient light sensor is used to automatically adjust screen brightness relat
|
||||
|
||||
### <a href="" id="device-orientation-test--"></a>Device orientation test
|
||||
|
||||
**Note**
|
||||
Before you run this test, disable rotation lock from the Action Center if enabled.
|
||||
>**Note:** Before you run this test, disable rotation lock from the Action Center if enabled.
|
||||
|
||||
|
||||
|
||||
@ -330,8 +307,7 @@ This test cycles the screen through brightness levels from 0 percent to 100 perc
|
||||
|
||||
### <a href="" id="system-assessment--"></a>System assessment
|
||||
|
||||
**Note**
|
||||
The Surface device must be connected to AC power before you can run this test.
|
||||
>**Note:** The Surface device must be connected to AC power before you can run this test.
|
||||
|
||||
|
||||
|
||||
@ -350,8 +326,7 @@ If your Surface device has encountered an error that caused the device to fail o
|
||||
|
||||
You can run the Microsoft Surface Diagnostic Toolkit from the command line or as part of a script. The tool supports the following arguments:
|
||||
|
||||
**Note**
|
||||
Many of the tests performed by the Microsoft Surface Diagnostic Toolkit require technician interaction. The Microsoft Surface Diagnostic Toolkit cannot run unattended.
|
||||
>**Note:** Many of the tests performed by the Microsoft Surface Diagnostic Toolkit require technician interaction. The Microsoft Surface Diagnostic Toolkit cannot run unattended.
|
||||
|
||||
|
||||
|
||||
@ -506,8 +481,7 @@ By default, the Microsoft Surface Diagnostic Toolkit is available in English onl
|
||||
|
||||
6. Save the SurfaceDiagnosticTool\_v1.0.60.0.locale file.
|
||||
|
||||
**Note**
|
||||
The SurfaceDiganosticTool\_v1.0.60.0.locale file must be located in the same folder and have the same name other than the file extension as the Microsoft Surface Diagnostic Toolkit executable file to use the custom prompt text. The SurfaceDiganosticTool\_v1.0.60.0.locale is an .xml file and must use UTF-8 encoding.
|
||||
>**Note:** The SurfaceDiganosticTool\_v1.0.60.0.locale file must be located in the same folder and have the same name other than the file extension as the Microsoft Surface Diagnostic Toolkit executable file to use the custom prompt text. The SurfaceDiganosticTool\_v1.0.60.0.locale is an .xml file and must use UTF-8 encoding.
|
||||
|
||||
|
||||
|
||||
|
@ -5,7 +5,7 @@ ms.assetid: 1FEFF277-F7D1-4CB4-8898-FDFE8CBE1D5C
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: heatherpoulsen
|
||||
author: jobotto
|
||||
---
|
||||
|
||||
# Microsoft Surface Dock Updater
|
||||
@ -17,8 +17,7 @@ The [Microsoft Surface Dock Updater](http://go.microsoft.com/fwlink/p/?LinkId=61
|
||||
|
||||
When you run the Microsoft Surface Dock Updater installer you will be prompted to accept an End User License Agreement (EULA).
|
||||
|
||||
**Note**
|
||||
Updating Surface Dock firmware requires connectivity to the Surface Dock, available only on Surface Pro 3, Surface Pro 4, and Surface Book devices. A Surface Pro 3, Surface Pro 4, or Surface Book is required to successfully install Microsoft Surface Dock Updater.
|
||||
>**Note:** Updating Surface Dock firmware requires connectivity to the Surface Dock, available only on Surface Pro 3, Surface Pro 4, and Surface Book devices. A Surface Pro 3, Surface Pro 4, or Surface Book is required to successfully install Microsoft Surface Dock Updater.
|
||||
|
||||
## Update a Surface Dock with Microsoft Surface Dock Updater
|
||||
|
||||
@ -73,8 +72,7 @@ To update a Surface Dock with Microsoft Surface Dock Updater, follow these steps
|
||||
|
||||
9. If you want to update multiple Surface Docks in one sitting, you can click the **Update another Surface Dock** button to begin the process on the next Surface Dock.
|
||||
|
||||
**Note**
|
||||
The LED in the Ethernet port of the dock will blink while the update is in progress. Please wait until the LED stops blinking before you unplug your Surface Dock from power.
|
||||
>**Note:** The LED in the Ethernet port of the dock will blink while the update is in progress. Please wait until the LED stops blinking before you unplug your Surface Dock from power.
|
||||
|
||||
|
||||
|
||||
@ -96,11 +94,12 @@ Microsoft Surface Dock Updater logs its progress into the Event Log, as shown in
|
||||
| 12102 | Event in the DisplayPort chipset firmware update process |
|
||||
| 12105 | Error |
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 8. Surface Dock Updater events in Event Viewer
|
||||
|
||||

|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
|
@ -5,10 +5,12 @@ ms.assetid: 6475fc87-a6f7-4fa8-b0aa-de19f2dea7e5
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Activate by Proxy an Active Directory Forest
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate by proxy an Active Directory (AD) forest for an isolated workgroup that does not have Internet access. ADBA enables certain volume products to inherit activation from the domain.
|
||||
|
||||
**Important**
|
||||
@ -20,47 +22,30 @@ In a typical proxy-activation scenario, the VAMT host computer distributes a pro
|
||||
For workgroups that are isolated from any larger network, you can still perform an AD forest activation. This requires installing a second instance of VAMT on a computer in the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. You can also activate by proxy a KMS Host key (CSVLK) in the core network if you do not want the host computer to connect to Microsoft over the Internet.
|
||||
|
||||
## Requirements
|
||||
|
||||
Before performing proxy activation, ensure that the network and the VAMT installation meet the following requirements:
|
||||
- There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you must also have VAMT installed on one of the computers in the workgroup.
|
||||
|
||||
- VAMT has administrative permissions to the Active Directory domain.
|
||||
|
||||
**To perform an Active Directory forest proxy activation**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the left-side pane, click the **Active Directory-Based Activation** node.
|
||||
|
||||
3. In the right-side **Actions** pane, click **Proxy activate forest** to open the **Install Product Key** dialog box.
|
||||
|
||||
4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to activate.
|
||||
|
||||
5. If you want to rename the ADBA object, enter a new Active Directory-Based Activation Object name.
|
||||
|
||||
**Important**
|
||||
If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed.
|
||||
|
||||
5. If you want to rename the ADBA object, enter a new Active Directory-Based Activation Object name. If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed.
|
||||
6. Enter the name of the file where you want to save the offline installation ID, or browse to the file location and then click **Open**. If you are activating an AD forest in an isolated workgroup, save the .cilx file to a removable media device.
|
||||
|
||||
7. Click **Install Key**.
|
||||
|
||||
VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. The activated object and the date that it was created appear in the **Active Directory-Based Activation** node in the center pane.
|
||||
|
||||
7. Click **Install Key**. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. The activated object and the date that it was created appear in the **Active Directory-Based Activation** node in the center pane.
|
||||
9. Insert the removable media into the VAMT host that has Internet access. Make sure that you are on the root node, and that the **Volume Activation Management Tool** view is displayed in the center pane.
|
||||
|
||||
10. In the right-side **Actions** pane, click **Acquire confirmation IDs for CILX** to open the **Acquire confirmation IDs for file** dialog box.
|
||||
|
||||
11. In the **Acquire confirmation IDs for file** dialog box, browse to where the .cilx file you exported from the isolated workgroup host computer is located. Select the file, and then click **Open**. VAMT displays an **Acquiring Confirmation IDs** message while it contacts Microsoft and acquires the CIDs.
|
||||
|
||||
12. When the CID collection process is complete, VAMT displays a **Volume Activation Management Tool** message that shows how many confirmation IDs were successfully acquired, and the name of the file to which the IDs were saved. Click **OK** to close the message.
|
||||
|
||||
13. Remove the storage device that contains the .cilx file from the Internet-connected VAMT host computer and insert it into the VAMT host computer in the isolated workgroup.
|
||||
|
||||
14. Open VAMT and then click the **Active Directory-Based Activation** node in the left-side pane.
|
||||
|
||||
15. In the right-side **Actions** pane, click **Apply confirmation ID to Active Directory domain**, browse to the .cilx file and then click **Open**.
|
||||
|
||||
VAMT displays the **Activating Active Directory** dialog box until it completes the requested action. The activated object and the date that it was created appear in the **Active Directory-Based Activation** node in the center pane.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Add and Remove Computers](add-remove-computers-vamt.md)
|
@ -5,46 +5,41 @@ ms.assetid: 9b5bc193-799b-4aa5-9d3e-0e495f7195d3
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Activate an Active Directory Forest Online
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate an Active Directory (AD) forest over the Internet. ADBA enables certain products to inherit activation from the domain.
|
||||
|
||||
**Important**
|
||||
ADBA is only applicable to Generic Volume License Keys (GVLKs) and KMS Host keys (CSVLKs). To use ADBA, one or more KMS Host keys (CSVLKs) must be installed on the AD forest, and client keys (GVLKs) must be installed on the client products.
|
||||
|
||||
## Requirements
|
||||
|
||||
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
||||
|
||||
- VAMT is installed on a host computer that has Internet access.
|
||||
|
||||
- VAMT has administrative permissions to the Active Directory domain.
|
||||
|
||||
- The KMS Host key (CSVLK) you intend to use is added to VAMT in the **Product Keys** node.
|
||||
|
||||
|
||||
**To perform an online Active Directory forest activation**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the left-side pane, click the **Active Directory-Based Activation** node.
|
||||
|
||||
3. In the right-side **Actions** pane, click **Online activate forest** to open the **Install Product Key** dialog box.
|
||||
|
||||
4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to apply to the AD forest.
|
||||
|
||||
5. If required, enter a new Active Directory-Based Activation Object name
|
||||
|
||||
**Important**
|
||||
If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed.
|
||||
|
||||
6. Click **Install Key**.
|
||||
|
||||
7. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action.
|
||||
|
||||
The activated object and the date that is was created appear in the **Active Directory-Based Activation** node in the center pane.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Scenario 1: Online Activation](scenario-online-activation-vamt.md)
|
||||
- [Add and Remove Computers](add-remove-computers-vamt.md)
|
@ -2,16 +2,16 @@
|
||||
title: Activate using Active Directory-based activation (Windows 10)
|
||||
description: Active Directory-based activation is implemented as a role service that relies on AD DS to store activation objects.
|
||||
ms.assetid: 08cce6b7-7b5b-42cf-b100-66c363a846af
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: CFaw
|
||||
---
|
||||
|
||||
# Activate using Active Directory-based activation
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -21,25 +21,16 @@ author: CFaw
|
||||
- Windows Server 2008 R2
|
||||
|
||||
**Looking for retail activation?**
|
||||
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
Active Directory-based activation is implemented as a role service that relies on AD DS to store activation objects. Active Directory-based activation requires that the forest schema be updated by adprep.exe on a computer running Windows Server 2012 R2 or Windows Server 2012, but after the schema is updated, older domain controllers can still activate clients.
|
||||
|
||||
Any domain-joined computers running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 with a GVLK will be activated automatically and transparently. They will stay activated as long as they remain members of the domain and maintain periodic contact with a domain controller. Activation takes place after the Licensing service starts. When this service starts, the computer contacts AD DS automatically, receives the activation object, and is activated without user intervention.
|
||||
|
||||
To allow computers with GVLKs to activate themselves, use the Volume Activation Tools console in Windows Server 2012 R2 or the VAMT in earlier versions of Windows Server to create an object in the AD DS forest. You create this activation object by submitting a KMS host key to Microsoft, as shown in Figure 10.
|
||||
|
||||
The process proceeds as follows:
|
||||
|
||||
1. Perform one of the following tasks:
|
||||
|
||||
- Install the Volume Activation Services server role on a domain controller running Windows Server 2012 R2, and add a KMS host key by using the Volume Activation Tools Wizard.
|
||||
|
||||
- Extend the domain to the Windows Server 2012 R2 schema level, and add a KMS host key by using the VAMT.
|
||||
|
||||
2. Microsoft verifies the KMS host key, and an activation object is created.
|
||||
|
||||
3. Client computers are activated by receiving the activation object from a domain controller during startup.
|
||||
|
||||

|
||||
@ -47,23 +38,15 @@ The process proceeds as follows:
|
||||
**Figure 10**. The Active Directory-based activation flow
|
||||
|
||||
For environments in which all computers are running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2, and they are joined to a domain, Active Directory-based activation is the best option for activating all client computers and servers, and you may be able to remove any KMS hosts from your environment.
|
||||
|
||||
If an environment will continue to contain earlier volume licensing operating systems and applications or if you have workgroup computers outside the domain, you need to maintain a KMS host to maintain activation status for earlier volume licensing editions of Windows and Office.
|
||||
|
||||
Clients that are activated with Active Directory-based activation will maintain their activated state for up to 180 days since the last contact with the domain, but they will periodically attempt to reactivate before then and at the end of the 180day period. By default, this reactivation event occurs every seven days.
|
||||
|
||||
When a reactivation event occurs, the client queries AD DS for the activation object. Client computers examine the activation object and compare it to the local edition as defined by the GVLK. If the object and GVLK match, reactivation occurs. If the AD DS object cannot be retrieved, client computers use KMS activation. If the computer is removed from the domain, when the computer or the Software Protection service is restarted, the operating system will change the status from activated to not activated, and the computer will try to activate with KMS.
|
||||
|
||||
## Step-by-step configuration: Active Directory-based activation
|
||||
**Note**
|
||||
You must be a member of the local Administrators group on all computers mentioned in these steps. You also need to be a member of the Enterprise Administrators group, because setting up Active Directory-based activation changes forest-wide settings.
|
||||
|
||||
**To configure Active Directory-based activation on Windows Server 2012 R2, complete the following steps:**
|
||||
|
||||
1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller.
|
||||
|
||||
2. Launch Server Manager.
|
||||
|
||||
3. Add the Volume Activation Services role, as shown in Figure 11.
|
||||
|
||||

|
||||
@ -97,18 +80,13 @@ You must be a member of the local Administrators group on all computers mentione
|
||||
8. After activating the key, click **Commit**, and then click **Close**.
|
||||
|
||||
## Verifying the configuration of Active Directory-based activation
|
||||
|
||||
To verify your Active Directory-based activation configuration, complete the following steps:
|
||||
|
||||
1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing.
|
||||
|
||||
2. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key.
|
||||
|
||||
3. If the computer is not joined to your domain, join it to the domain.
|
||||
|
||||
4. Sign in to the computer.
|
||||
|
||||
5. Open Windows Explorer, right-click **Computer**, and then click **Properties**.
|
||||
|
||||
6. Scroll down to the **Windows activation** section, and verify that this client has been activated.
|
||||
|
||||
**Note**<br>
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Activate using Key Management Service (Windows 10)
|
||||
ms.assetid: f2417bfe-7d25-4e82-bc07-de316caa8dac
|
||||
description:
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Activate using Key Management Service
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -25,29 +26,25 @@ author: jdeckerMS
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
There are three possible scenarios for volume activation of Windows 10 or Windows Server 2012 R2 by using a Key Management Service (KMS) host:
|
||||
|
||||
- Host KMS on a computer running Windows 10
|
||||
|
||||
- Host KMS on a computer running Windows Server 2012 R2
|
||||
|
||||
- Host KMS on a computer running an earlier version of Windows
|
||||
|
||||
Check out [Windows 10 Volume Activation Tips](https://blogs.technet.microsoft.com/askcore/2015/09/15/windows-10-volume-activation-tips/).
|
||||
|
||||
## Key Management Service in Windows 10
|
||||
|
||||
Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7.
|
||||
|
||||
Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers.
|
||||
|
||||
To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft’s activation services.
|
||||
|
||||
**Configure KMS in Windows 10**
|
||||
|
||||
1. Open an elevated command prompt.
|
||||
|
||||
2. Enter one of the following commands.
|
||||
- To install a KMS key, type **slmgr.vbs /ipk <KmsKey>**.
|
||||
- To activate online, type **slmgr.vbs /ato**.
|
||||
- To activate by using the telephone, type **slui.exe 4**.
|
||||
|
||||
3. After activating the KMS key, restart the Software Protection Service.
|
||||
|
||||
For more information, see the information for Windows 7 in [Deploy KMS Activation](http://go.microsoft.com/fwlink/p/?LinkId=717032).
|
||||
@ -61,19 +58,18 @@ You cannot install a client KMS key into the KMS in Windows Server.
|
||||
This scenario is commonly used in larger organizations that do not find the overhead of using a server a burden.
|
||||
|
||||
**Note**
|
||||
|
||||
If you receive error 0xC004F015 when trying to activate Windows 10 Enterprise, see [KB 3086418](http://go.microsoft.com/fwlink/p/?LinkId=620687).
|
||||
|
||||
**Configure KMS in Windows Server 2012 R2**
|
||||
|
||||
1. Sign in to a computer running Windows Server 2012 R2 with an account that has local administrative credentials.
|
||||
|
||||
2. Launch Server Manager.
|
||||
|
||||
3. Add the Volume Activation Services role, as shown in Figure 4.
|
||||
|
||||

|
||||
|
||||
**Figure 4**. Adding the Volume Activation Services role in Server Manager
|
||||
**Figure 4**. Adding the Volume Activation Services role in Server Manager\
|
||||
|
||||
4. When the role installation is complete, click the link to launch the Volume Activation Tools (Figure 5).
|
||||
|
||||
@ -81,11 +77,10 @@ If you receive error 0xC004F015 when trying to activate Windows 10 Enterprise,
|
||||
|
||||
**Figure 5**. Launching the Volume Activation Tools
|
||||
|
||||
5. Select the **Key Management Service (KMS)** option, and specify the computer that will act as the KMS host (Figure 6).
|
||||
|
||||
5. Select the **Key Management Service (KMS)** option, and specify the computer that will act as the KMS host (Figure 6).
|
||||
This can be the same computer on which you installed the role or another computer. For example, it can be a client computer running Windows 10.
|
||||
|
||||

|
||||

|
||||
|
||||
**Figure 6**. Configuring the computer as a KMS host
|
||||
|
||||
@ -96,60 +91,50 @@ If you receive error 0xC004F015 when trying to activate Windows 10 Enterprise,
|
||||
**Figure 7**. Installing your KMS host key
|
||||
|
||||
7. If asked to confirm replacement of an existing key, click **Yes**.
|
||||
|
||||
8. After the product key is installed, you must activate it. Click **Next** (Figure 8).
|
||||
|
||||

|
||||
|
||||
**Figure 8**. Activating the software
|
||||
|
||||
The KMS key can be activated online or by phone. See Figure 9.
|
||||
The KMS key can be activated online or by phone. See Figure 9.
|
||||
|
||||

|
||||

|
||||
|
||||
**Figure 9**. Choosing to activate online
|
||||
**Figure 9**. Choosing to activate online
|
||||
|
||||
Now that the KMS host is configured, it will begin to listen for activation requests. However, it will not activate clients successfully until the activation threshold is met.
|
||||
|
||||
## Verifying the configuration of Key Management Service
|
||||
You can verify KMS volume activation from the KMS host server or from the client computer. KMS volume activation requires a minimum threshold of 25 computers before activation requests will be processed. The verification process described here will increment the activation count each time a client computer contacts the KMS host, but unless the activation threshold is reached, the verification will take the form of an error message rather than a confirmation message.
|
||||
|
||||
You can verify KMS volume activation from the KMS host server or from the client computer. KMS volume activation requires a minimum threshold of 25 computers before activation requests will be processed. The verification process described here will increment the activation count each time a client computer contacts the KMS host, but unless the activation threshold is reached, the verification will take the form of an error message rather than a confirmation message.
|
||||
**Note**
|
||||
|
||||
If you configured Active Directory-based activation before configuring KMS activation, you must use a client computer that will not first try to activate itself by using Active Directory-based activation. You could use a workgroup computer that is not joined to a domain or a computer running Windows 7 or Windows Server 2008 R2.
|
||||
|
||||
To verify that KMS volume activation works, complete the following steps:
|
||||
|
||||
1. On the KMS host, open the event log and confirm that DNS publishing is successful.
|
||||
|
||||
2. On a client computer, open a Command Prompt window, type **Slmgr.vbs /ato**, and then press ENTER.<p>
|
||||
The **/ato** command causes the operating system to attempt activation by using whichever key has been installed in the operating system. The response should show the license state and detailed Windows version information.
|
||||
|
||||
3. On a client computer or the KMS host, open an elevated Command Prompt window, type **Slmgr /dlv**, and then press ENTER.<p>
|
||||
|
||||
The **/dlv** command displays the detailed licensing information. The response should return an error that states that the KMS activation count is too low. This confirms that KMS is functioning correctly, even though the client has not been activated.
|
||||
|
||||
For more information about the use and syntax of slmgr.vbs, see [Slmgr.vbs Options](http://go.microsoft.com/fwlink/p/?LinkId=733639).
|
||||
|
||||
## Key Management Service in earlier versions of Windows
|
||||
|
||||
If you have already established a KMS infrastructure in your organization for an earlier version of Windows, you may want to continue using that infrastructure to activate computers running Windows 10 or Windows Server 2012 R2. Your existing KMS host must be running Windows 7 or later. To upgrade your KMS host, complete the following steps:
|
||||
|
||||
1. Download and install the correct update for your current KMS host operating system. Restart the computer as directed.
|
||||
|
||||
2. Request a new KMS host key from the Volume Licensing Service Center.
|
||||
|
||||
3. Install the new KMS host key on your KMS host.
|
||||
|
||||
4. Activate the new KMS host key by running the slmrg.vbs script.
|
||||
|
||||
For detailed instructions, see [Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows](http://go.microsoft.com/fwlink/p/?LinkId=618265) and [Update that enables Windows 7 and Windows Server 2008 R2 KMS hosts to activate Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=626590).
|
||||
|
||||
## See also
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Activate clients running Windows 10 (Windows 10)
|
||||
description: After you have configured Key Management Service (KMS) or Active Directory-based activation on your network, activating a client running Windows 10 is easy.
|
||||
ms.assetid: 39446e49-ad7c-48dc-9f18-f85a11ded643
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Activate clients running Windows 10
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -25,78 +26,75 @@ author: jdeckerMS
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
After you have configured Key Management Service (KMS) or Active Directory-based activation on your network, activating a client running Windows 10 is easy. If the computer has been configured with a Generic Volume License Key (GVLK), neither IT nor the user need take any action. It just works.
|
||||
|
||||
Enterprise edition images and installation media should already be configured with the GVLK. When the client computer starts, the Licensing service examines the current licensing condition of the computer.
|
||||
|
||||
If activation or reactivation is required, the following sequence occurs:
|
||||
|
||||
1. If the computer is a member of a domain, it asks a domain controller for a volume activation object. If Active Directory-based activation is configured, the domain controller returns the object. If the object matches the edition of the software that is installed and the computer has a matching GVLK, the computer is activated (or reactivated), and it will not need to be activated again for 180 days, although the operating system will attempt reactivation at much shorter, regular intervals.
|
||||
|
||||
2. If the computer is not a member of a domain or if the volume activation object is not available, the computer will issue a DNS query to attempt to locate a KMS server. If a KMS server can be contacted, activation occurs if the KMS has a key that matches the computer’s GVLK.
|
||||
|
||||
3. The computer tries to activate against Microsoft servers if it is configured with a MAK.
|
||||
|
||||
If the client is not able to activate itself successfully, it will periodically try again. The frequency of the retry attempts depends on the current licensing state and whether the client computer has been successfully activated in the past. For example, if the client computer had been previously activated by Active Directory-based activation, it will periodically try to contact the domain controller at each restart.
|
||||
|
||||
## How Key Management Service works
|
||||
|
||||
KMS uses a client–server topology. KMS client computers can locate KMS host computers by using DNS or a static configuration. KMS clients contact the KMS host by using RPCs carried over TCP/IP.
|
||||
|
||||
### Key Management Service activation thresholds
|
||||
|
||||
You can activate physical computers and virtual machines by contacting a KMS host. To qualify for KMS activation, there must be a minimum number of qualifying computers (called the activation threshold). KMS clients will be activated only after this threshold has been met. Each KMS host counts the number of computers that have requested activation until the threshold is met.
|
||||
|
||||
A KMS host responds to each valid activation request from a KMS client with the count of how many computers have already contacted the KMS host for activation. Client computers that receive a count below the activation threshold are not activated. For example, if the first two computers that contact the KMS host are running Windows 10, the first receives an activation count of 1, and the second receives an activation count of 2. If the next computer is a virtual machine on a computer running Windows 10, it receives an activation count of 3, and so on. None of these computers will be activated, because computers running Windows 10, like other client operating system versions, must receive an activation count of 25 or more.
|
||||
|
||||
When KMS clients are waiting for the KMS to reach the activation threshold, they will connect to the KMS host every two hours to get the current activation count. They will be activated when the threshold is met.
|
||||
|
||||
In our example, if the next computer that contacts the KMS host is running Windows Server 2012 R2, it receives an activation count of 4, because activation counts are cumulative. If a computer running Windows Server 2012 R2 receives an activation count that is 5 or more, it is activated. If a computer running Windows 10 receives an activation count of 25 or more, it is activated.
|
||||
|
||||
### Activation count cache
|
||||
|
||||
To track the activation threshold, the KMS host keeps a record of the KMS clients that request activation. The KMS host gives each KMS client a client ID designation, and the KMS host saves each client ID in a table. By default, each activation request remains in the table for up to 30 days. When a client renews its activation, the cached client ID is removed from the table, a new record is created, and the 30day period begins again. If a KMS client computer does not renew its activation within 30 days, the KMS host removes the corresponding client ID from the table and reduces the activation count by one.
|
||||
|
||||
However, the KMS host only caches twice the number of client IDs that are required to meet the activation threshold. Therefore, only the 50 most recent client IDs are kept in the table, and a client ID could be removed much sooner than 30 days.
|
||||
|
||||
The total size of the cache is set by the type of client computer that is attempting to activate. If a KMS host receives activation requests only from servers, the cache will hold only 10 client IDs (twice the required 5). If a client computer running Windows 10 contacts that KMS host, KMS increases the cache size to 50 to accommodate the higher threshold. KMS never reduces the cache size.
|
||||
|
||||
### Key Management Service connectivity
|
||||
|
||||
KMS activation requires TCP/IP connectivity. By default, KMS hosts and clients use DNS to publish and find the KMS. The default settings can be used, which require little or no administrative action, or KMS hosts and client computers can be manually configured based on network configuration and security requirements.
|
||||
|
||||
### Key Management Service activation renewal
|
||||
|
||||
KMS activations are valid for 180 days (the *activation validity interval*). To remain activated, KMS client computers must renew their activation by connecting to the KMS host at least once every 180 days. By default, KMS client computers attempt to renew their activation every 7 days. If KMS activation fails, the client computer retries every two hours. After a client computer’s activation is renewed, the activation validity interval begins again.
|
||||
|
||||
### Publication of the Key Management Service
|
||||
|
||||
The KMS uses service (SRV) resource records in DNS to store and communicate the locations of KMS hosts. KMS hosts use the DNS dynamic update protocol, if available, to publish the KMS service (SRV) resource records. If dynamic update is not available or the KMS host does not have rights to publish the resource records, the DNS records must be published manually, or you must configure client computers to connect to specific KMS hosts.
|
||||
|
||||
### Client discovery of the Key Management Service
|
||||
|
||||
By default, KMS client computers query DNS for KMS information. The first time a KMS client computer queries DNS for KMS information, it randomly chooses a KMS host from the list of service (SRV) resource records that DNS returns. The address of a DNS server that contains the service (SRV) resource records can be listed as a suffixed entry on KMS client computers, which allows one DNS server to advertise the service (SRV) resource records for KMS, and KMS client computers with other primary DNS servers to find it.
|
||||
|
||||
Priority and weight parameters can be added to the DnsDomainPublishList registry value for KMS. Establishing KMS host priority groupings and weighting within each group allows you to specify which KMS host the client computers should try first and balances traffic among multiple KMS hosts. Only Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 provide these priority and weight parameters.
|
||||
|
||||
If the KMS host that a client computer selects does not respond, the KMS client computer removes that KMS host from its list of service (SRV) resource records and randomly selects another KMS host from the list. When a KMS host responds, the KMS client computer caches the name of the KMS host and uses it for subsequent activation and renewal attempts. If the cached KMS host does not respond on a subsequent renewal, the KMS client computer discovers a new KMS host by querying DNS for KMS service (SRV) resource records.
|
||||
|
||||
By default, client computers connect to the KMS host for activation by using anonymous RPCs through TCP port 1688. (You can change the default port.) After establishing a TCP session with the KMS host, the client computer sends a single request packet. The KMS host responds with the activation count. If the count meets or exceeds the activation threshold for that operating system, the client computer is activated and the session is closed. The KMS client computer uses this same process for renewal requests. 250 bytes are used for communication each way.
|
||||
|
||||
### Domain Name System server configuration
|
||||
The default KMS automatic publishing feature requires the service (SRV) resource record and support for DNS dynamic update protocol. KMS client computer default behavior and the KMS service (SRV) resource record publishing are supported on a DNS server that is running Microsoft software or any other DNS server that supports service (SRV) resource records (per Internet Engineering Task Force \[IETF\] Request for Comments \[RFC\] 2782) and dynamic updates (per IETF RFC 2136). For example, Berkeley Internet Domain Name versions 8.x and 9.x support service (SRV) resource records and dynamic update.
|
||||
|
||||
The default KMS automatic publishing feature requires the service (SRV) resource record and support for DNS dynamic update protocol. KMS client computer default behavior and the KMS service (SRV) resource record publishing are supported on a DNS server that is running Microsoft software or any other DNS server that supports service (SRV) resource records (per Internet Engineering Task Force \[IETF\] Request for Comments \[RFC\] 2782) and dynamic updates (per IETF RFC 2136). For example, Berkeley Internet Domain Name versions 8.x and 9.x support service (SRV) resource records and dynamic update.
|
||||
The KMS host must be configured so that it has the credentials needed to create and update the following resource records on the DNS servers: service (SRV), IPv4 host (A), and IPv6 host (AAAA), or the records need to be created manually. The recommended solution for giving the KMS host the needed credentials is to create a security group in AD DS, then add all KMS hosts to that group. On a DNS server that is running Microsoft software, ensure that this security group is given full control over the \_VLMCS.\_TCP record in each DNS domain that will contain the KMS service (SRV) resource records.
|
||||
|
||||
### Activating the first Key Management Service host
|
||||
|
||||
KMS hosts on the network need to install a KMS key, and then be activated with Microsoft. Installation of a KMS key enables the KMS on the KMS host. After installing the KMS key, complete the activation of the KMS host by telephone or online. Beyond this initial activation, a KMS host does not communicate any information to Microsoft. KMS keys are only installed on KMS hosts, never on individual KMS client computers.
|
||||
|
||||
### Activating subsequent Key Management Service hosts
|
||||
|
||||
Each KMS key can be installed on up to six KMS hosts. These hosts can be physical computers or virtual machines. After activating a KMS host, the same host can be reactivated up to nine times with the same key. If the organization needs more than six KMS hosts, you can request additional activations for your organization’s KMS key by calling a Microsoft Volume [Licensing Activation Center](http://go.microsoft.com/fwlink/p/?LinkID=618264) to request an exception.
|
||||
|
||||
## How Multiple Activation Key works
|
||||
|
||||
A MAK is used for one-time activation with Microsoft’s hosted activation services. Each MAK has a predetermined number of allowed activations. This number is based on volume licensing agreements, and it might not match the organization’s exact license count. Each activation that uses a MAK with the Microsoft hosted activation service counts toward the activation limit.
|
||||
|
||||
You can activate computers by using a MAK in two ways:
|
||||
|
||||
- **MAK independent activation**. Each computer independently connects and is activated with Microsoft over the Internet or by telephone. MAK independent activation is best suited to computers within an organization that do not maintain a connection to the corporate network. MAK independent activation is shown in Figure 16.
|
||||
|
||||

|
||||
|
||||
**Figure 16**. MAK independent activation
|
||||
|
||||
- **MAK proxy activation**. MAK proxy activation enables a centralized activation request on behalf of multiple computers with one connection to Microsoft. You configure MAK proxy activation by using the VAMT. MAK proxy activation is appropriate for environments in which security concerns restrict direct access to the Internet or the corporate network. It is also suited for development and test labs that lack this connectivity. MAK proxy activation with the VAMT is shown in Figure 17.
|
||||
|
||||

|
||||
@ -108,21 +106,16 @@ A MAK is recommended for computers that rarely or never connect to the corporate
|
||||
You can use a MAK for individual computers or with an image that can be duplicated or installed by using Microsoft deployment solutions. You can also use a MAK on a computer that was originally configured to use KMS activation. This is useful for moving a computer off the core network to a disconnected environment.
|
||||
|
||||
### Multiple Activation Key architecture and activation
|
||||
MAK independent activation installs a MAK product key on a client computer. The key instructs that computer to activate itself with Microsoft servers over the Internet.
|
||||
|
||||
MAK independent activation installs a MAK product key on a client computer. The key instructs that computer to activate itself with Microsoft servers over the Internet.
|
||||
In MAK proxy activation, the VAMT installs a MAK product key on a client computer, obtains the installation ID from the target computer, sends the installation ID to Microsoft on behalf of the client, and obtains a confirmation ID. The tool then activates the client computer by installing the confirmation ID.
|
||||
|
||||
## Activating as a standard user
|
||||
|
||||
Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 do not require administrator privileges for activation, but this change does not allow standard user accounts to remove computers running Windows 7 or Windows Server 2008 R2 from the activated state. An administrator account is still required for other activation- or license-related tasks, such as “rearm.”
|
||||
|
||||
## See also
|
||||
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,28 +5,23 @@ ms.assetid: c1dac3bd-6a86-4c45-83dd-421e63a398c0
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: CFaw
|
||||
---
|
||||
|
||||
# Active Directory-Based Activation Overview
|
||||
|
||||
Active Directory-Based Activation (ADBA) enables enterprises to activate computers through a connection to their domain. Many companies have computers at offsite locations that use products that are registered to the company. Previously these computers needed to either use a retail key or a Multiple Activation Key (MAK), or physically connect to the network in order to activate their products by using Key Management Services (KMS). ADBA provides a way to activate these products if the computers can join the company’s domain. When the user joins their computer to the domain, the ADBA object automatically activates Windows installed on their computer, as long as the computer has a Generic Volume License Key (GVLK) installed. No single physical computer is required to act as the activation object, because it is distributed throughout the domain.
|
||||
|
||||
## Active Directory-Based Activation Scenarios
|
||||
|
||||
VAMT enables IT Professionals to manage and activate the Active Directory-Based Activation object. Activation can be performed by using a scenario such as the following:
|
||||
|
||||
- Online activation: To activate an ADBA forest online, the user selects the **Online activate forest** function, selects a KMS Host key (CSVLK) to use, and gives the Active Directory-Based Activation Object a name.
|
||||
|
||||
- Proxy activation: For a proxy activation, the user first selects the **Proxy activate forest** function, selects a KMS Host key (CSVLK) to use, gives the Active Directory-Based Activation Object a name, and provides a file name to save the CILx file that contains the Installation ID. Next, the user takes that file to a computer that is running VAMT with an Internet connection and then selects the **Acquire confirmation IDs for CILX** function on the VAMT landing page, and provides the original CILx file. When VAMT has loaded the Confirmation IDs into the original CILx file, the user takes this file back to the original VAMT instance, where the user completes the proxy activation process by selecting the **Apply confirmation ID to Active Directory domain** function.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [How to Activate an Active Directory Forest Online](http://go.microsoft.com/fwlink/p/?LinkId=246565)
|
||||
- [How to Proxy Activate an Active Directory Forest](http://go.microsoft.com/fwlink/p/?LinkId=246566)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,10 +5,12 @@ ms.assetid: a48fbc23-917d-40f7-985c-e49702c05e51
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Add and Manage Products
|
||||
|
||||
This section describes how to add client computers into the Volume Activation Management Tool (VAMT). After the computers are added, you can manage the products that are installed on your network.
|
||||
|
||||
## In this Section
|
||||
@ -18,14 +20,6 @@ This section describes how to add client computers into the Volume Activation Ma
|
||||
|[Add and Remove Computers](add-remove-computers-vamt.md) |Describes how to add client computers to VAMT. |
|
||||
|[Update Product Status](update-product-status-vamt.md) |Describes how to update the status of product license. |
|
||||
|[Remove Products](remove-products-vamt.md) |Describes how to remove a product from the product list. |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -6,32 +6,26 @@ ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: jdeckerMS
|
||||
ms.pagetype: activation
|
||||
---
|
||||
|
||||
# Add and Remove Computers
|
||||
|
||||
You can add computers that have any of the supported Windows or Office products installed to a Volume Activation Management Tool (VAMT) database by using the **Discover products** function. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query. You can remove computers from a VAMT database by using the **Delete** function. After you add the computers, you can add the products that are installed on the computers by running the **Update license status** function.
|
||||
|
||||
Before adding computers, ensure that the Windows Management Instrumentation (WMI) firewall exception required by VAMT has been enabled on all target computers. For more information see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
## To add computers to a VAMT database
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. Click **Discover products** in the **Actions** menu in the right-side pane to open the **Discover Products** dialog box.
|
||||
|
||||
3. In the **Discover products** dialog box, click **Search for computers in the Active Directory** to display the search options, then click the search option you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query.
|
||||
|
||||
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**, then under **Domain Filter Criteria**, in the list of domain names click the name of the domain you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||
|
||||
- To search by individual computer name or IP address, click **Manually enter name or IP address**, then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
||||
|
||||
- To search for computers in a workgroup, click **Search for computers in the workgroup**, then under **Workgroup Filter Criteria**, in the list of workgroup names click the name of the workgroup you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||
|
||||
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box provided. VAMT will validate only the LDAP query syntax, but will otherwise run the query without further checks.
|
||||
|
||||
4. Click **Search**.
|
||||
|
||||
5. VAMT searches for the specified computers and adds them to the VAMT database. During the search, VAMT displays the **Finding computers** message shown below.
|
||||
|
||||
To cancel the search, click **Cancel**. When the search is complete the names of the newly-discovered computers appear in the product list view in the center pane.
|
||||
|
||||

|
||||
@ -40,36 +34,25 @@ Before adding computers, ensure that the Windows Management Instrumentation (WMI
|
||||
This step adds only the computers to the VAMT database, and not the products that are installed on the computers. To add the products, you need to run the **Update license status** function.
|
||||
|
||||
## To add products to VAMT
|
||||
|
||||
1. In the **Products** list, select the computers that need to have their product information added to the VAMT database.
|
||||
|
||||
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
5. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||
|
||||
6. VAMT displays the **Collecting product information** dialog box while it collects the licensing status of all supported products on the selected computers. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
||||
|
||||
## To remove computers from a VAMT database
|
||||
|
||||
You can delete a computer by clicking on it in the product list view, and then clicking **Delete** in the **Selected Item** menu in the right-hand pane. In the **Confirm Delete Selected Products** dialog box that appears, click **Yes** to delete the computer. If a computer has multiple products listed, you must delete each product to completely remove the computer from the VAMT database.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,30 +5,30 @@ ms.assetid: feac32bb-fb96-4802-81b8-c69220dcfcce
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Add and Remove a Product Key
|
||||
|
||||
Before you can use a Multiple Activation Key (MAK), retail, or KMS Host key (CSVLK) product key, you must first add it to the Volume Activation Management Tool (VAMT) database.
|
||||
|
||||
## To Add a Product Key
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the left-side pane, right-click the **Product Keys** node to open the **Actions** menu.
|
||||
|
||||
3. Click **Add product keys** to open the **Add Product Keys** dialog box.
|
||||
|
||||
4. In the **Add Product Keys** dialog box, select from one of the following methods to add product keys:
|
||||
|
||||
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys separated by line breaks, and click **Add Key(s)**.
|
||||
|
||||
- To import a Comma Separated Values (CSV) file containing a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
||||
|
||||
**Note**
|
||||
If you are activating a large number of products with a MAK, you should refresh the activation count of the MAK, to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
||||
|
||||
## Remove a Product Key
|
||||
|
||||
- To remove a product key from the list, simply select the key in the list and click **Delete** on the **Selected Items** menu in the right-side pane. Click **Yes** to confirm deletion of the product key. Removing a product key from the VAMT database will not affect the activation state of any products or computers on the network.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Manage Product Keys](manage-product-keys-vamt.md)
|
@ -2,16 +2,15 @@
|
||||
title: Appendix Information sent to Microsoft during activation (Windows 10)
|
||||
ms.assetid: 4bfff495-07d0-4385-86e3-7a077cbd64b8
|
||||
description:
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Appendix: Information sent to Microsoft during activation
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -27,60 +26,39 @@ author: jdeckerMS
|
||||
When you activate a computer running Windows 10, the following information is sent to Microsoft:
|
||||
|
||||
- The Microsoft product code (a five-digit code that identifies the Windows product you are activating)
|
||||
|
||||
- A channel ID or site code that identifies how the Windows product was originally obtained
|
||||
|
||||
For example, a channel ID or site code identifies whether the product was originally purchased from a retail store, obtained as an evaluation copy, obtained through a volume licensing program, or preinstalled by a computer manufacturer.
|
||||
|
||||
- The date of installation and whether the installation was successful
|
||||
|
||||
- Information that helps confirm that your Windows product key has not been altered
|
||||
|
||||
- Computer make and model
|
||||
|
||||
- Version information for the operating system and software
|
||||
|
||||
- Region and language settings
|
||||
|
||||
- A unique number called a *globally unique identifier*, which is assigned to your computer
|
||||
|
||||
- Product key (hashed) and product ID
|
||||
|
||||
- BIOS name, revision number, and revision date
|
||||
|
||||
- Volume serial number (hashed) of the hard disk drive
|
||||
|
||||
- The result of the activation check
|
||||
|
||||
This includes error codes and the following information about any activation exploits and related malicious or unauthorized software that was found or disabled:
|
||||
|
||||
- The activation exploit’s identifier
|
||||
|
||||
- The activation exploit’s current state, such as cleaned or quarantined
|
||||
|
||||
- Computer manufacturer’s identification
|
||||
|
||||
- The activation exploit’s file name and hash in addition to a hash of related software components that may indicate the presence of an activation exploit
|
||||
|
||||
- The name and a hash of the contents of your computer’s startup instructions file
|
||||
|
||||
- If your Windows license is on a subscription basis, information about how your subscription works
|
||||
|
||||
Standard computer information is also sent, but your computer’s IP address is only retained temporarily.
|
||||
|
||||
## Use of information
|
||||
Microsoft uses the information to confirm that you have a licensed copy of the software. Microsoft does not use the information to contact individual consumers.
|
||||
|
||||
Microsoft uses the information to confirm that you have a licensed copy of the software. Microsoft does not use the information to contact individual consumers.
|
||||
For additional details, see [Windows 10 Privacy Statement](http://go.microsoft.com/fwlink/p/?LinkId=619879).
|
||||
|
||||
## See also
|
||||
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,29 +2,24 @@
|
||||
title: Assign applications using roles in MDT (Windows 10)
|
||||
description: This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer.
|
||||
ms.assetid: d82902e4-de9c-4bc4-afe0-41d649b83ce7
|
||||
keywords: ["settings, database, deploy"]
|
||||
keywords: settings, database, deploy
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Assign applications using roles in MDT
|
||||
|
||||
|
||||
This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer. For the purposes of this topic, the application we are adding is Adobe Reader XI. In addition to using computer-specific entries in the database, you can use roles in MDT to group settings together.
|
||||
|
||||
## <a href="" id="sec01"></a>Create and assign a role entry in the database
|
||||
|
||||
|
||||
1. On MDT01, using Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration** and then expand **Database**.
|
||||
|
||||
2. In the **Database** node, right-click **Role**, select **New**, and create a role entry with the following settings:
|
||||
|
||||
1. Role name: Standard PC
|
||||
|
||||
2. Applications / Lite Touch Applications:
|
||||
|
||||
3. Install - Adobe Reader XI - x86
|
||||
|
||||

|
||||
@ -33,13 +28,9 @@ Figure 12. The Standard PC role with the application added
|
||||
|
||||
## <a href="" id="sec02"></a>Associate the role with a computer in the database
|
||||
|
||||
|
||||
After creating the role, you can associate it with one or more computer entries.
|
||||
|
||||
1. Using Deployment Workbench, expand **MDT Production**, expand **Advanced Configuration**, expand **Database**, and select **Computers**.
|
||||
|
||||
2. In the **Computers** node, double-click the **PC00075** entry, and add the following setting:
|
||||
|
||||
- Roles: Standard PC
|
||||
|
||||

|
||||
@ -48,17 +39,13 @@ Figure 13. The Standard PC role added to PC00075 (having ID 1 in the database).
|
||||
|
||||
## <a href="" id="sec03"></a>Verify database access in the MDT simulation environment
|
||||
|
||||
|
||||
When the database is populated, you can use the MDT simulation environment to simulate a deployment. The applications are not installed, but you can see which applications would be installed if you did a full deployment of the computer.
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
|
||||
2. Modify the C:\\MDT\\CustomSettings.ini file to look like the following:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=CSettings, CRoles, RApplications, Default
|
||||
|
||||
[Default]
|
||||
_SMSTSORGNAME=Contoso
|
||||
OSInstall=Y
|
||||
@ -90,7 +77,6 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
SkipCapture=YES
|
||||
SkipFinalSummary=NO
|
||||
EventService=http://MDT01:9800
|
||||
|
||||
[CSettings]
|
||||
SQLServer=MDT01
|
||||
Instance=SQLEXPRESS
|
||||
@ -100,7 +86,6 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
Table=ComputerSettings
|
||||
Parameters=UUID, AssetTag, SerialNumber, MacAddress
|
||||
ParameterCondition=OR
|
||||
|
||||
[CRoles]
|
||||
SQLServer=MDT01
|
||||
Instance=SQLEXPRESS
|
||||
@ -110,7 +95,6 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
Table=ComputerRoles
|
||||
Parameters=UUID, AssetTag, SerialNumber, MacAddress
|
||||
ParameterCondition=OR
|
||||
|
||||
[RApplications]
|
||||
SQLServer=MDT01
|
||||
Instance=SQLEXPRESS
|
||||
@ -127,6 +111,7 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
``` syntax
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
|
||||
```
|
||||
|
||||

|
||||
@ -135,26 +120,12 @@ Figure 14. ZTIGather.log displaying the application GUID belonging to the Adobe
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md)
|
||||
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Build a distributed environment for Windows 10 deployment (Windows 10)
|
||||
description: In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations.
|
||||
ms.assetid: a6cd5657-6a16-4fff-bfb4-44760902d00c
|
||||
keywords: ["replication, replicate, deploy, configure, remote"]
|
||||
keywords: replication, replicate, deploy, configure, remote
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Build a distributed environment for Windows 10 deployment
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations. If you work in a distributed environment, replicating the deployment shares is an important part of the deployment solution. With images reaching 5 GB in size or more, you can't deploy machines in a remote office over the wire. You need to replicate the content, so that the clients can do local deployments.
|
||||
@ -26,14 +25,11 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## <a href="" id="sec01"></a>Replicate deployment shares
|
||||
|
||||
|
||||
Replicating the content between MDT01 (New York) and MDT02 (Stockholm) can be done in a number of different ways. The most common content replication solutions with Microsoft Deployment Toolkit (MDT) 2013 use either the Linked Deployment Shares (LDS) feature or Distributed File System Replication (DFS-R). Some organizations have used a simple robocopy script for replication of the content.
|
||||
|
||||
**Note**
|
||||
Robocopy has options that allow for synchronization between folders. It has a simple reporting function; it supports transmission retry; and, by default, it will only copy/remove files from the source that are newer than files on the target.
|
||||
|
||||
|
||||
|
||||
### Linked deployment shares in MDT 2013 Update 2
|
||||
|
||||
LDS is a built-in feature in MDT for replicating content. However, LDS works best with strong connections such as LAN connections with low latency. For most WAN links, DFS-R is the better option.
|
||||
@ -44,19 +40,13 @@ DFS-R is not only very fast and reliable, but it also offers central monitoring,
|
||||
|
||||
## <a href="" id="sec02"></a>Set up Distributed File System Replication (DFS-R) for replication
|
||||
|
||||
|
||||
Setting up DFS-R for replication is a quick and straightforward process. You prepare the deployment servers and then create a replication group. To complete the setup, you configure some replication settings.
|
||||
|
||||
### Prepare MDT01 for replication
|
||||
|
||||
1. On MDT01, using Server Manager, click **Add roles and features**.
|
||||
|
||||
2. On the **Select installation type** page, select **Role-based or feature-based installation**.
|
||||
|
||||
3. On the **Select destination server** page, select **MDT01.contoso.com** and click **Next**.
|
||||
|
||||
4. On the **Select server roles** page, expand **File and Storage Services (Installed)** and expand **File and iSCSI Services (Installed)**.
|
||||
|
||||
5. In the **Roles** list, select **DFS Replication**. In the **Add Roles and Features Wizard** dialog box, select **Add Features**, and then click **Next**.
|
||||
|
||||

|
||||
@ -64,43 +54,31 @@ Setting up DFS-R for replication is a quick and straightforward process. You pre
|
||||
Figure 2. Adding the DFS Replication role to MDT01.
|
||||
|
||||
6. On the **Select features** page, accept the default settings, and click **Next**.
|
||||
|
||||
7. On the **Confirm installation selections** page, click **Install**.
|
||||
|
||||
8. On the **Installation progress** page, click **Close**.
|
||||
|
||||
### Prepare MDT02 for replication
|
||||
|
||||
1. On MDT02, using Server Manager, click **Add roles and features**.
|
||||
|
||||
2. On the **Select installation type** page, select **Role-based or feature-based installation**.
|
||||
|
||||
3. On the **Select destination server** page, select **MDT02.contoso.com** and click **Next**.
|
||||
|
||||
4. On the **Select server roles** page, expand **File and Storage Services (Installed)** and expand **File and iSCSI Services (Installed)**.
|
||||
|
||||
5. In the **Roles** list, select **DFS Replication**. In the **Add Roles and Features Wizard** dialog box, select **Add Features**, and then click **Next**.
|
||||
|
||||
6. On the **Select features** page, accept the default settings, and click **Next**.
|
||||
|
||||
7. On the **Confirm installation selections** page, click **Install**.
|
||||
|
||||
8. On the **Installation progress** page, click **Close**.
|
||||
|
||||
### Create the MDTProduction folder on MDT02
|
||||
|
||||
1. On MDT02, using File Explorer, create the **E:\\MDTProduction** folder.
|
||||
|
||||
2. Share the **E:\\MDTProduction** folder as **MDTProduction$**. Use the default permissions.
|
||||
|
||||

|
||||
|
||||
Figure 3. Sharing the **E:\\MDTProduction folder** on MDT02.
|
||||
|
||||
### Configure the deployment share
|
||||
|
||||
When you have multiple deployment servers sharing the same content, you need to configure the Bootstrap.ini file with information about which server to connect to based on where the client is located. In MDT, that can be done by using the DefaultGateway property.
|
||||
|
||||
1. On MDT01, using Notepad, navigate to the **E:\\MDTProduction\\Control** folder and modify the Boostrap.ini file to look like this:
|
||||
|
||||
``` syntax
|
||||
@ -118,14 +96,10 @@ When you have multiple deployment servers sharing the same content, you need to
|
||||
UserID=MDT_BA
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
**Note**
|
||||
The DeployRoot value needs to go into the Bootstrap.ini file, but you can use the same logic in the CustomSettings.ini file. For example, you can redirect the logs to the local deployment server (SLSHARE), or have the User State Migration Tool (USMT) migration store (UDDIR) local. To learn more about USMT, see [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md) and [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md).
|
||||
|
||||
|
||||
|
||||
2. Save the Bootstrap.ini file.
|
||||
|
||||
3. Using the Deployment Workbench, right-click the **MDT Production** deployment share and select **Update Deployment Share**.
|
||||
|
||||

|
||||
@ -133,7 +107,6 @@ When you have multiple deployment servers sharing the same content, you need to
|
||||
Figure 4. Updating the MDT Production deployment share.
|
||||
|
||||
4. Use the default settings for the Update Deployment Share Wizard.
|
||||
|
||||
5. After the update is complete, use the Windows Deployment Services console. In the **Boot Images** node, right-click the **MDT Production x64** boot image and select **Replace Image**.
|
||||
|
||||

|
||||
@ -141,20 +114,12 @@ When you have multiple deployment servers sharing the same content, you need to
|
||||
Figure 5. Replacing the updated boot image in WDS.
|
||||
|
||||
6. Browse and select the **E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim** boot image, and then complete Replace Boot Image Wizard using the default settings.
|
||||
|
||||
## <a href="" id="sec03"></a>Replicate the content
|
||||
|
||||
|
||||
Once the MDT01 and MDT02 servers are prepared, you are ready to configure the actual replication.
|
||||
|
||||
### Create the replication group
|
||||
|
||||
1. On MDT01, using DFS Management, right-click **Replication**, and select **New Replication Group**.
|
||||
|
||||
2. On the **Replication Group Type** page, select **Multipurpose replication group**, and click **Next**.
|
||||
|
||||
3. On the **Name and Domain** page, assign the **MDTProduction** name, and click **Next**.
|
||||
|
||||
4. On the **Replication Group Members** page, click **Add**, add **MDT01** and **MDT02**, and then click **Next**.
|
||||
|
||||

|
||||
@ -162,15 +127,10 @@ Once the MDT01 and MDT02 servers are prepared, you are ready to configure the ac
|
||||
Figure 6. Adding the Replication Group Members.
|
||||
|
||||
5. On the **Topology Selection** page, select the **Full mesh** option and click **Next**.
|
||||
|
||||
6. On the **Replication Group Schedule and Bandwidth** page, accept the default settings and click **Next**.
|
||||
|
||||
7. On the **Primary Member** page, select **MDT01** and click **Next**.
|
||||
|
||||
8. On the **Folders to Replicate** page, click **Add**, type in **E:\\MDTProduction** as the folder to replicate, click **OK**, and then click **Next**.
|
||||
|
||||
9. On the **Local Path of MDTProduction** on the **Other Members** page, select **MDT02**, and click **Edit**.
|
||||
|
||||
10. On the **Edit** page, select the **Enabled** option, type in **E:\\MDTProduction** as the local path of folder, select the **Make the selected replicated folder on this member read-only** check box, click **OK**, and then click **Next**.
|
||||
|
||||

|
||||
@ -178,23 +138,14 @@ Once the MDT01 and MDT02 servers are prepared, you are ready to configure the ac
|
||||
Figure 7. Configure the MDT02 member.
|
||||
|
||||
11. On the **Review Settings and Create Replication Group** page, click **Create**.
|
||||
|
||||
12. On the **Confirmation** page, click **Close**.
|
||||
|
||||
### Configure replicated folders
|
||||
|
||||
1. On MDT01, using DFS Management, expand **Replication** and then select **MDTProduction**.
|
||||
|
||||
2. In the middle pane, right-click the **MDT01** member and select **Properties**.
|
||||
|
||||
3. On the **MDT01 (MDTProduction) Properties** page, configure the following and then click **OK**:
|
||||
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
|
||||
In this scenario the size of the deployment share is known, but you might need to change the values for your environment. A good rule of thumb is to get the size of the 16 largest files and make sure they fit in the staging area. Here is a Windows PowerShell example that calculates the size of the 16 largest files in the E:\\MDTProduction deployment share:
|
||||
|
||||
``` syntax
|
||||
(Get-ChildItem E:\MDTProduction -Recurse | Sort-Object Length -Descending | Select-Object -First 16 | Measure-Object -Property Length -Sum).Sum /1GB
|
||||
```
|
||||
@ -204,34 +155,21 @@ Once the MDT01 and MDT02 servers are prepared, you are ready to configure the ac
|
||||
Figure 8. Configure the Staging settings.
|
||||
|
||||
4. In the middle pane, right-click the **MDT02** member and select **Properties**.
|
||||
|
||||
5. On the **MDT02 (MDTProduction) Properties** page, configure the following and then click **OK**:
|
||||
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
|
||||
**Note**
|
||||
It will take some time for the replication configuration to be picked up by the replication members (MDT01 and MDT02). The time for the initial sync will depend on the WAN link speed between the sites. After that, delta changes are replicated quickly.
|
||||
|
||||
|
||||
|
||||
### Verify replication
|
||||
|
||||
1. On MDT02, wait until you start to see content appear in the **E:\\MDTProduction** folder.
|
||||
|
||||
2. Using DFS Management, expand **Replication**, right-click **MDTProduction**, and select **Create Diagnostics Report**.
|
||||
|
||||
3. In the Diagnostics Report Wizard, on the **Type of Diagnostics Report or Test** page, select **Health report** and click **Next**.
|
||||
|
||||
4. On the **Path and Name** page, accept the default settings and click **Next**.
|
||||
|
||||
5. On the **Members to Include** page, accept the default settings and click **Next**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and click **Next**.
|
||||
|
||||
7. On the **Review Settings and Create Report** page, click **Create**.
|
||||
|
||||
8. Open the report in Internet Explorer, and if necessary, select the **Allow blocked content** option.
|
||||
|
||||

|
||||
@ -240,57 +178,37 @@ Figure 9. The DFS Replication Health Report.
|
||||
|
||||
## <a href="" id="sec04"></a>Configure Windows Deployment Services (WDS) in a remote site
|
||||
|
||||
|
||||
Like you did in the previous topic for MDT01, you need to add the MDT Production Lite Touch x64 Boot image to Windows Deployment Services on MDT02. For the following steps, we assume that WDS has already been installed on MDT02.
|
||||
|
||||
1. On MDT02, using the WDS console, right-click **Boot Images** and select **Add Boot Image**.
|
||||
|
||||
2. Browse to the E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim file and add the image with the default settings.
|
||||
|
||||
## <a href="" id="sec05"></a>Deploy the Windows 10 client to the remote site
|
||||
|
||||
|
||||
Now you should have a solution ready for deploying the Windows 10 client to the remote site, Stockholm, connecting to the MDT Production deployment share replica on MDT02.
|
||||
|
||||
1. Create a virtual machine with the following settings:
|
||||
|
||||
1. Name: PC0006
|
||||
|
||||
2. Location: C:\\VMs
|
||||
|
||||
3. Generation: 2
|
||||
|
||||
4. Memory: 2048 MB
|
||||
|
||||
5. Hard disk: 60 GB (dynamic disk)
|
||||
|
||||
2. Start the PC0006 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The machine will now load the Windows PE boot image from the WDS server.
|
||||
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
1. Password: P@ssw0rd
|
||||
|
||||
2. Select a task sequence to execute on this computer:
|
||||
|
||||
1. Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
2. Computer Name: PC0006
|
||||
|
||||
3. Applications: Select the Install - Adobe Reader XI - x86 application
|
||||
|
||||
4. The setup will now start and do the following:
|
||||
|
||||
1. Install the Windows 10 Enterprise operating system.
|
||||
|
||||
2. Install the added application.
|
||||
|
||||
3. Update the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
|
||||
[Deploy a Windows 10 image using MDT 2013 Update 2](deploy-a-windows-10-image-using-mdt.md)
|
||||
@ -300,12 +218,5 @@ Now you should have a solution ready for deploying the Windows 10 client to the
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,14 +5,15 @@ ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Configure Client Computers
|
||||
|
||||
To enable the Volume Activation Management Tool (VAMT) to function correctly, certain configuration changes are required on all client computers:
|
||||
|
||||
- An exception must be set in the client computer's firewall.
|
||||
|
||||
- A registry key must be created and set properly, for computers in a workgroup; otherwise, Windows® User Account Control (UAC) will not allow remote administrative operations.
|
||||
|
||||
Organizations where the VAMT will be widely used may benefit from making these changes inside the master image for Windows.
|
||||
@ -21,38 +22,29 @@ Organizations where the VAMT will be widely used may benefit from making these c
|
||||
This procedure only applies to clients running Windows Vista or later. For clients running Windows XP Service Pack 1, see [Connecting Through Windows Firewall](http://go.microsoft.com/fwlink/p/?LinkId=182933).
|
||||
|
||||
## Configuring the Windows Firewall to allow VAMT access
|
||||
|
||||
Enable the VAMT to access client computers using the **Windows Firewall** Control Panel:
|
||||
|
||||
1. Open Control Panel and double-click **System and Security**.
|
||||
|
||||
2. Click **Windows Firewall**.
|
||||
|
||||
3. Click **Allow a program or feature through Windows Firewall**.
|
||||
|
||||
4. Click the **Change settings** option.
|
||||
|
||||
5. Select the **Windows Management Instrumentation (WMI)** checkbox.
|
||||
|
||||
6. Click **OK**.
|
||||
|
||||
**Warning**
|
||||
By default, Windows Firewall Exceptions only apply to traffic originating on the local subnet. To expand the exception to apply to multiple subnets, you need to change the exception settings in the Windows Firewall with Advanced Security, as described below.
|
||||
|
||||
## Configure Windows Firewall to allow VAMT access across multiple subnets
|
||||
|
||||
Enable the VAMT to access client computers across multiple subnets using the **Windows Firewall with Advanced Security** Control Panel:
|
||||
|
||||

|
||||
|
||||
1. Open the Control Panel and double-click **Administrative Tools**.
|
||||
|
||||
2. Click **Windows Firewall with Advanced Security**.
|
||||
|
||||
3. Make your changes for each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private):
|
||||
|
||||
- Windows Management Instrumentation (ASync-In)
|
||||
|
||||
- Windows Management Instrumentation (DCOM-In)
|
||||
|
||||
- Windows Management Instrumentation (WMI-In)
|
||||
|
||||
4. In the **Windows Firewall with Advanced Security** dialog box, select **Inbound Rules** from the left-hand panel.
|
||||
@ -60,55 +52,38 @@ Enable the VAMT to access client computers across multiple subnets using the **W
|
||||
5. Right-click the desired rule and select **Properties** to open the **Properties** dialog box.
|
||||
|
||||
- On the **General** tab, select the **Allow the connection** checkbox.
|
||||
|
||||
- On the **Scope** tab, change the Remote IP Address setting from "Local Subnet" (default) to allow the specific access you need.
|
||||
|
||||
- On the **Advanced** tab, verify selection of all profiles that are applicable to the network (Domain or Private/Public).
|
||||
|
||||
In certain scenarios, only a limited set of TCP/IP ports are allowed through a hardware firewall. Administrators must ensure that WMI (which relies on RPC over TCP/IP) is allowed through these types of firewalls. By default, the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically-allocated ports. This is useful if, for example, the hardware firewall only allows traffic in a certain range of ports.
|
||||
|
||||
For more info, see [How to configure RPC dynamic port allocation to work with firewalls](http://go.microsoft.com/fwlink/p/?LinkId=182911).
|
||||
|
||||
## Create a registry value for the VAMT to access workgroup-joined computer
|
||||
|
||||
**Caution**
|
||||
This section contains information about how to modify the registry. Make sure to back up the registry before you modify it; in addition, ensure that you know how to restore the registry, if a problem occurs. For more information about how to back up, restore, and modify the registry, see [Windows registry information for advanced users](http://go.microsoft.com/fwlink/p/?LinkId=182912).
|
||||
|
||||
On the client computer, create the following registry key using regedit.exe.
|
||||
|
||||
1. Navigate to `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system`
|
||||
|
||||
2. Enter the following details:
|
||||
|
||||
**Value Name: LocalAccountTokenFilterPolicy**
|
||||
|
||||
**Type: DWORD**
|
||||
|
||||
**Value Data: 1**
|
||||
|
||||
**Note**
|
||||
To discover VAMT-manageable Windows computers in workgroups, you must enable network discovery on each client.
|
||||
|
||||
## Deployment options
|
||||
|
||||
There are several options for organizations to configure the WMI firewall exception for computers:
|
||||
|
||||
- **Image.** Add the configurations to the master Windows image deployed to all clients.
|
||||
|
||||
- **Group Policy.** If the clients are part of a domain, then all clients can be configured using Group Policy. The Group Policy setting for the WMI firewall exception is found in GPMC.MSC at: **Computer Configuration\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Inbound Rules**.
|
||||
|
||||
- **Script.** Execute a script using Microsoft System Center Configuration Manager or a third-party remote script execution facility.
|
||||
|
||||
- **Manual.** Configure the WMI firewall exception individually on each client.
|
||||
|
||||
The above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. In order to allow VAMT to query the up-to-date licensing status, the WMI exception must be maintained. We recommend administrators consult their network security policies and make clear decisions when creating the WMI exception.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Install and Configure VAMT](install-configure-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,21 +2,20 @@
|
||||
title: Configure MDT for UserExit scripts (Windows 10)
|
||||
description: In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address.
|
||||
ms.assetid: 29a421d1-12d2-414e-86dc-25b62f5238a7
|
||||
keywords: ["rules, script"]
|
||||
keywords: rules, script
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Configure MDT for UserExit scripts
|
||||
|
||||
|
||||
In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address. MDT supports calling external VBScripts as part of the Gather process; these scripts are referred to as UserExit scripts. The script also removes the colons in the MAC Address.
|
||||
|
||||
## Configure the rules to call a UserExit script
|
||||
|
||||
|
||||
You can call a UserExit by referencing the script in your rules. Then you can configure a property to be set to the result of a function of the VBScript. In this example, we have a VBScript named Setname.vbs (provided in the book sample files, in the UserExit folder).
|
||||
|
||||
``` syntax
|
||||
@ -32,7 +31,6 @@ The UserExit=Setname.vbs calls the script and then assigns the computer name to
|
||||
|
||||
## The Setname.vbs UserExit script
|
||||
|
||||
|
||||
The Setname.vbs script takes the MAC Address passed from the rules. The script then does some string manipulation to add a prefix (PC) and remove the semicolons from the MAC Address.
|
||||
|
||||
``` syntax
|
||||
@ -48,17 +46,13 @@ Function SetName(sMac)
|
||||
SetName = "PC" & re.Replace(sMac, "")
|
||||
End Function
|
||||
```
|
||||
|
||||
The first three lines of the script make up a header that all UserExit scripts have. The interesting part is the lines between Function and End Function. Those lines add a prefix (PC), remove the colons from the MAC Address, and return the value to the rules by setting the SetName value.
|
||||
|
||||
**Note**
|
||||
The purpose of this sample is not to recommend that you use the MAC Address as a base for computer naming, but to show you how to take a variable from MDT, pass it to an external script, make some changes to it, and then return the new value to the deployment process.
|
||||
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
@ -72,12 +66,3 @@ The purpose of this sample is not to recommend that you use the MAC Address as a
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Configure MDT settings (Windows 10)
|
||||
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) 2013 is its extension capabilities; there is virtually no limitation to what you can do in terms of customization.
|
||||
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
|
||||
keywords: ["customize, customization, deploy, features, tools"]
|
||||
keywords: customize, customization, deploy, features, tools
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Configure MDT settings
|
||||
|
||||
|
||||
One of the most powerful features in Microsoft Deployment Toolkit (MDT) 2013 is its extension capabilities; there is virtually no limitation to what you can do in terms of customization. In this topic, you learn about configuring customizations for your environment.
|
||||
|
||||
For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
|
||||

|
||||
@ -22,26 +21,17 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
- [Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md)
|
||||
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md)
|
||||
|
||||
- [Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
@ -53,12 +43,3 @@ Figure 1. The machines used in this topic.
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,34 +2,29 @@
|
||||
title: Configure MDT deployment share rules (Windows 10)
|
||||
description: In this topic, you will learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine.
|
||||
ms.assetid: b5ce2360-33cc-4b14-b291-16f75797391b
|
||||
keywords: ["rules, configuration, automate, deploy"]
|
||||
keywords: rules, configuration, automate, deploy
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Configure MDT deployment share rules
|
||||
|
||||
|
||||
In this topic, you will learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine. The rules engine in MDT is powerful: most of the settings used for operating system deployments are retrieved and assigned via the rules engine. In its simplest form, the rules engine is the CustomSettings.ini text file.
|
||||
|
||||
## <a href="" id="sec01"></a>Assign settings
|
||||
|
||||
|
||||
When using MDT, you can assign setting in three distinct ways:
|
||||
|
||||
- You can pre-stage the information before deployment.
|
||||
|
||||
- You can prompt the user or technician for information.
|
||||
|
||||
- You can have MDT generate the settings automatically.
|
||||
|
||||
In order illustrate these three options, let's look at some sample configurations.
|
||||
|
||||
## <a href="" id="sec02"></a>Sample configurations
|
||||
|
||||
|
||||
Before adding the more advanced components like scripts, databases, and web services, consider the commonly used configurations below; they demonstrate the power of the rules engine.
|
||||
|
||||
### Set computer name by MAC Address
|
||||
@ -75,12 +70,10 @@ OSDComputerName=PC-%SerialNumber%
|
||||
```
|
||||
|
||||
In this sample, you configure the rules to set the computer name to a prefix (PC-) and then the serial number. If the serial number of the machine is CND0370RJ7, the preceding configuration sets the computer name to PC-CND0370RJ7.
|
||||
|
||||
**Note**
|
||||
|
||||
Be careful when using the serial number to assign computer names. A serial number can contain more than 15 characters, but the Windows setup limits a computer name to 15 characters.
|
||||
|
||||
|
||||
|
||||
### Generate a limited computer name based on a serial number
|
||||
|
||||
To avoid assigning a computer name longer than 15 characters, you can configure the rules in more detail by adding VBScript functions, as follows:
|
||||
@ -112,7 +105,6 @@ MachineObjectOU=OU=Laptops,OU=Contoso,DC=contoso,DC=com
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md)
|
||||
@ -126,12 +118,3 @@ MachineObjectOU=OU=Laptops,OU=Contoso,DC=contoso,DC=com
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,67 +2,50 @@
|
||||
title: Create a Windows 10 reference image (Windows 10)
|
||||
description: Creating a reference image is important because that image serves as the foundation for the devices in your organization.
|
||||
ms.assetid: 9da2fb57-f2ff-4fce-a858-4ae4c237b5aa
|
||||
keywords: ["deploy, deployment, configure, customize, install, installation"]
|
||||
keywords: deploy, deployment, configure, customize, install, installation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Create a Windows 10 reference image
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Creating a reference image is important because that image serves as the foundation for the devices in your organization. In this topic, you will learn how to create a Windows 10 reference image using the Microsoft Deployment Toolkit (MDT) 2013 Update 2. You will create a deployment share, configure rules and settings, and import all the applications and operating system files required to build a Windows 10 reference image. After completing the steps outlined in this topic, you will have a Windows 10 reference image that can be used in your deployment solution.
|
||||
|
||||
For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, PC0001 is a Windows 10 Enterprise x64 client, and MDT01 is a Windows Server 2012 R2 standard server. HV01 is a Hyper-V host server, but HV01 could be replaced by PC0001 as long as PC0001 has enough memory and is capable of running Hyper-V. MDT01, HV01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation.
|
||||
|
||||
**Note**
|
||||
For important details about the setup for the steps outlined in this article, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 1. The machines used in this topic.
|
||||
|
||||
## The reference image
|
||||
|
||||
|
||||
The reference image described in this documentation is designed primarily for deployment to physical machines. However, the reference image is created on a virtual platform, before being automatically run through the System Preparation (Sysprep) tool process and captured to a Windows Imaging (WIM) file. The reasons for creating the reference image on a virtual platform are the following:
|
||||
|
||||
- You reduce development time and can use snapshots to test different configurations quickly.
|
||||
|
||||
- You rule out hardware issues. You simply get the best possible image, and if you have a problem, it's not likely to be hardware related.
|
||||
|
||||
- It ensures that you won't have unwanted applications that could be installed as part of a driver install but not removed by the Sysprep process.
|
||||
|
||||
- It's easy to move between lab, test, and production.
|
||||
|
||||
## <a href="" id="sec01"></a>Set up the MDT build lab deployment share
|
||||
|
||||
|
||||
With Windows 10, there is no hard requirement to create reference images; however, to reduce the time needed for deployment, you may want to create a reference image that contains a few base applications as well as all of the latest updates. This section will show you how to create and configure the MDT Build Lab deployment share to create a Windows 10 reference image. Because reference images will be deployed only to virtual machines during the creation process and have specific settings (rules), you should always create a separate deployment share specifically for this process.
|
||||
|
||||
### Create the MDT build lab deployment share
|
||||
|
||||
- On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**.
|
||||
|
||||
- Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
|
||||
- Use the following settings for the New Deployment Share Wizard:
|
||||
|
||||
- Deployment share path: E:\\MDTBuildLab
|
||||
|
||||
- Share name: MDTBuildLab$
|
||||
|
||||
- Deployment share description: MDT Build Lab
|
||||
|
||||
- <default>
|
||||
|
||||
- Verify that you can access the \\\\MDT01\\MDTBuildLab$ share.
|
||||
|
||||

|
||||
@ -72,9 +55,7 @@ Figure 2. The Deployment Workbench with the MDT Build Lab deployment share creat
|
||||
### Configure permissions for the deployment share
|
||||
|
||||
In order to write the reference image back to the deployment share, you need to assign Modify permissions to the MDT Build Account (MDT\_BA) for the **Captures** subfolder in the **E:\\MDTBuildLab** folder
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Modify the NTFS permissions for the **E:\\MDTBuildLab\\Captures** folder by running the following command in an elevated Windows PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
@ -87,7 +68,6 @@ Figure 3. Permissions configured for the MDT\_BA user.
|
||||
|
||||
## <a href="" id="sec02"></a>Add the setup files
|
||||
|
||||
|
||||
This section will show you how to populate the MDT 2013 Update 2 deployment share with the Windows 10 operating system source files, commonly referred to as setup files, which will be used to create a reference image. Setup files are used during the reference image creation process and are the foundation for the reference image.
|
||||
|
||||
### Add the Windows 10 installation files
|
||||
@ -96,27 +76,18 @@ MDT 2013 supports adding both full source Windows 10 DVDs (ISOs) and custom ima
|
||||
|
||||
**Note**
|
||||
Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.
|
||||
|
||||
|
||||
|
||||
### Add Windows 10 Enterprise x64 (full source)
|
||||
|
||||
In these steps we assume that you have copied the content of a Windows 10 Enterprise x64 ISO to the **E:\\Downloads\\Windows 10 Enterprise x64** folder.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Build Lab**.
|
||||
|
||||
3. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**.
|
||||
|
||||
4. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard:
|
||||
|
||||
5. Full set of source files
|
||||
|
||||
6. Source directory: E:\\Downloads\\Windows 10 Enterprise x64
|
||||
|
||||
7. Destination directory name: W10EX64RTM
|
||||
|
||||
8. After adding the operating system, in the **Operating Systems / Windows 10** folder, double-click the added operating system name in the **Operating System** node and change the name to the following: **Windows 10 Enterprise x64 RTM Default Image**
|
||||
|
||||

|
||||
@ -125,40 +96,27 @@ Figure 4. The imported Windows 10 operating system after renaming it.
|
||||
|
||||
## <a href="" id="sec03"></a>Add applications
|
||||
|
||||
|
||||
Before you create an MDT task sequence, you need to add all of the applications and other sample scripts to the MDT Build Lab share.
|
||||
|
||||
The steps in this section use a strict naming standard for your MDT applications. You add the "Install - " prefix for typical application installations that run a setup installer of some kind, and you use the "Configure - " prefix when an application configures a setting in the operating system. You also add an " - x86", " - x64", or "- x86-x64" suffix to indicate the application's architecture (some applications have installers for both architectures). Using a script naming standard is always recommended when using MDT as it helps maintain order and consistency.
|
||||
|
||||
By storing configuration items as MDT applications, it is easy to move these objects between various solutions, or between test and production environments. In this topic's step-by-step sections, you will add the following applications:
|
||||
|
||||
- Install - Microsoft Office 2013 Pro Plus - x86
|
||||
|
||||
- Install - Microsoft Silverlight 5.0 - x64
|
||||
|
||||
- Install - Microsoft Visual C++ 2005 SP1 - x86
|
||||
|
||||
- Install - Microsoft Visual C++ 2005 SP1 - x64
|
||||
|
||||
- Install - Microsoft Visual C++ 2008 SP1 - x86
|
||||
|
||||
- Install - Microsoft Visual C++ 2008 SP1 - x64
|
||||
|
||||
- Install - Microsoft Visual C++ 2010 SP1 - x86
|
||||
|
||||
- Install - Microsoft Visual C++ 2010 SP1 - x64
|
||||
|
||||
- Install - Microsoft Visual C++ 2012 Update 4 - x86
|
||||
|
||||
- Install - Microsoft Visual C++ 2012 Update 4 - x64
|
||||
|
||||
In these examples, we assume that you downloaded the software in this list to the E:\\Downloads folder. The first application is added using the UI, but because MDT supports Windows PowerShell, you add the other applications using Windows PowerShell.
|
||||
|
||||
**Note**
|
||||
All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](http://go.microsoft.com/fwlink/p/?LinkId=619523).
|
||||
|
||||
|
||||
|
||||
### Create the install: Microsoft Office Professional Plus 2013 x86
|
||||
|
||||
You can customize Office 2013. In the volume license versions of Office 2013, there is an Office Customization Tool you can use to customize the Office installation. In these steps we assume you have copied the Office 2013 installation files to the E:\\Downloads\\Office2013 folder.
|
||||
@ -166,11 +124,8 @@ You can customize Office 2013. In the volume license versions of Office 2013, th
|
||||
### Add the Microsoft Office Professional Plus 2013 x86 installation files
|
||||
|
||||
After adding the Microsoft Office Professional Plus 2013 x86 application, you then automate its setup by running the Office Customization Tool. In fact, MDT 2013 detects that you added the Office Professional Plus 2013 x86 application and creates a shortcut for doing this.
|
||||
|
||||
You also can customize the Office installation using a Config.xml file. But we recommend that you use the Office Customization Tool as described in the following steps, as it provides a much richer way of controlling Office 2013 settings.
|
||||
|
||||
1. Using the Deployment Workbench in the MDT Build Lab deployment share, expand the **Applications / Microsoft** node, and double-click **Install - Microsoft Office 2013 Pro Plus x86**.
|
||||
|
||||
2. In the **Office Products** tab, click **Office Customization Tool**, and click **OK** in the **Information** dialog box.
|
||||
|
||||

|
||||
@ -179,23 +134,14 @@ You also can customize the Office installation using a Config.xml file. But we r
|
||||
|
||||
**Note**
|
||||
If you don't see the Office Products tab, verify that you are using a volume license version of Office. If you are deploying Office 365, you need to download the Admin folder from Microsoft.
|
||||
|
||||
|
||||
|
||||
3. In the Office Customization Tool dialog box, select the Create a new Setup customization file for the following product option, select the Microsoft Office Professional Plus 2013 (32-bit) product, and click OK.
|
||||
|
||||
4. Use the following settings to configure the Office 2013 setup to be fully unattended:
|
||||
|
||||
1. Install location and organization name
|
||||
|
||||
- Organization name: Contoso
|
||||
|
||||
2. Licensing and user interface
|
||||
|
||||
1. Select Use KMS client key
|
||||
|
||||
2. Select I accept the terms in the License Agreement.
|
||||
|
||||
3. Select Display level: None
|
||||
|
||||

|
||||
@ -203,44 +149,31 @@ You also can customize the Office installation using a Config.xml file. But we r
|
||||
Figure 6. The licensing and user interface screen in the Microsoft Office Customization Tool
|
||||
|
||||
3. Modify Setup properties
|
||||
|
||||
- Add the **SETUP\_REBOOT** property and set the value to **Never**.
|
||||
|
||||
4. Modify user settings
|
||||
|
||||
- In the **Microsoft Office 2013** node, expand **Privacy**, select **Trust Center**, and enable the Disable Opt-in Wizard on first run setting.
|
||||
|
||||
5. From the **File** menu, select **Save**, and save the configuration as 0\_Office2013ProPlusx86.msp in the **E:\\MDTBuildLab\\Applications\\Install - Microsoft Office 2013 Pro Plus - x86\\Updates** folder.
|
||||
|
||||
**Note**
|
||||
The reason for naming the file with a 0 (zero) at the beginning is that the Updates folder also handles Microsoft Office updates, and they are installed in alphabetical order. The Office 2013 setup works best if the customization file is installed before any updates.
|
||||
|
||||
|
||||
|
||||
6. Close the Office Customization Tool, click Yes in the dialog box, and in the **Install - Microsoft Office 2013 Pro Plus - x86 Properties** window, click **OK**.
|
||||
|
||||
### Connect to the deployment share using Windows PowerShell
|
||||
|
||||
If you need to add many applications, you can take advantage of the PowerShell support that MDT has. To start using PowerShell against the deployment share, you must first load the MDT PowerShell snap-in and then make the deployment share a PowerShell drive (PSDrive).
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Import the snap-in and create the PSDrive by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
Import-Topic "C:\Program Files\Microsoft Deployment Toolkit\bin\MicrosoftDeploymentToolkit.psd1"
|
||||
|
||||
New-PSDrive -Name "DS001" -PSProvider MDTProvider -Root "E:\MDTBuildLab"
|
||||
```
|
||||
|
||||
### Create the install: Microsoft Visual C++ 2005 SP1 x86
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2005SP1x86.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2005 SP1 - x86"
|
||||
$CommandLine = "vcredist_x86.exe /Q"
|
||||
@ -252,11 +185,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1
|
||||
### Create the install: Microsoft Visual C++ 2005 SP1 x64
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2005SP1x64.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2005 SP1 - x64"
|
||||
$CommandLine = "vcredist_x64.exe /Q"
|
||||
@ -268,11 +198,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2005 SP1
|
||||
### Create the install: Microsoft Visual C++ 2008 SP1 x86
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2008SP1x86.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2008 SP1 - x86"
|
||||
$CommandLine = "vcredist_x86.exe /Q"
|
||||
@ -284,11 +211,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1
|
||||
### Create the install: Microsoft Visual C++ 2008 SP1 x64
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2008SP1x64.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2008 SP1 - x64"
|
||||
$CommandLine = "vcredist_x64.exe /Q"
|
||||
@ -300,11 +224,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2008 SP1
|
||||
### Create the install: Microsoft Visual C++ 2010 SP1 x86
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2010SP1x86.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2010 SP1 - x86"
|
||||
$CommandLine = "vcredist_x86.exe /Q"
|
||||
@ -316,11 +237,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1
|
||||
### Create the install: Microsoft Visual C++ 2010 SP1 x64
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2010SP1x64.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2010 SP1 - x64"
|
||||
$CommandLine = "vcredist_x64.exe /Q"
|
||||
@ -332,11 +250,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2010 SP1
|
||||
### Create the install: Microsoft Visual C++ 2012 Update 4 x86
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Update 4 x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2012Ux86.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2012 Update 4 - x86"
|
||||
$CommandLine = "vcredist_x86.exe /Q"
|
||||
@ -348,11 +263,8 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Upda
|
||||
### Create the install: Microsoft Visual C++ 2012 Update 4 x64
|
||||
|
||||
In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Update 4 x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to E:\\Downloads\\VC++2012Ux64.
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
$ApplicationName = "Install - Microsoft Visual C++ 2012 Update 4 - x64"
|
||||
$CommandLine = "vcredist_x64.exe /Q"
|
||||
@ -363,9 +275,7 @@ In these steps we assume that you have downloaded Microsoft Visual C++ 2012 Upda
|
||||
|
||||
## <a href="" id="sec04"></a>Create the reference image task sequence
|
||||
|
||||
|
||||
In order to build and capture your Windows 10 reference image for deployment using MDT, you will create a task sequence. The task sequence will reference the operating system and applications that you previously imported into the MDT Build Lab deployment share to build a Windows 10 reference image.
|
||||
|
||||
After creating the task sequence, you configure it to enable patching against the Windows Server Update Services (WSUS) server. The Task Sequence Windows Update action supports getting updates directly from Microsoft Update, but you get more stable patching if you use a local WSUS server. WSUS also allows for an easy process of approving the patches that you are deploying.
|
||||
|
||||
### Drivers and the reference image
|
||||
@ -377,27 +287,16 @@ Because we use modern virtual platforms for creating our reference images, we do
|
||||
To create a Windows 10 reference image task sequence, the process is as follows:
|
||||
|
||||
1. Using the Deployment Workbench in the MDT Build Lab deployment share, right-click **Task Sequences**, and create a new folder named **Windows 10**.
|
||||
|
||||
2. Expand the **Task Sequences** node, right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
1. Task sequence ID: REFW10X64-001
|
||||
|
||||
2. Task sequence name: Windows 10 Enterprise x64 RTM Default Image
|
||||
|
||||
3. Task sequence comments: Reference Build
|
||||
|
||||
4. Template: Standard Client Task Sequence
|
||||
|
||||
5. Select OS: Windows 10 Enterprise x64 RTM Default Image
|
||||
|
||||
6. Specify Product Key: Do not specify a product key at this time
|
||||
|
||||
7. Full Name: Contoso
|
||||
|
||||
8. Organization: Contoso
|
||||
|
||||
9. Internet Explorer home page: http://www.contoso.com
|
||||
|
||||
10. Admin Password: Do not specify an Administrator Password at this time
|
||||
|
||||
### Edit the Windows 10 task sequence
|
||||
@ -405,74 +304,46 @@ To create a Windows 10 reference image task sequence, the process is as follows
|
||||
The steps below walk you through the process of editing the Windows 10 reference image task sequence to include the actions required to update the reference image with the latest updates from WSUS, install roles and features, and utilities, and install Microsoft Office 2013.
|
||||
|
||||
1. In the Task Sequences / Windows 10 folder, right-click the Windows 10 Enterprise x64 RTM Default Image task sequence, and select Properties.
|
||||
|
||||
2. On the **Task Sequence** tab, configure the Windows 10 Enterprise x64 RTM Default Image task sequence with the following settings:
|
||||
|
||||
1. State Restore. Enable the Windows Update (Pre-Application Installation) action.
|
||||
|
||||
**Note**
|
||||
Enable an action by going to the Options tab and clearing the Disable this step check box.
|
||||
|
||||
|
||||
|
||||
2. State Restore. Enable the Windows Update (Post-Application Installation) action.
|
||||
|
||||
3. State Restore. Enable the Windows Update (Post-Application Installation) action. State Restore. After the **Tattoo** action, add a new **Group** action with the following setting:
|
||||
|
||||
- Name: Custom Tasks (Pre-Windows Update)
|
||||
|
||||
4. State Restore. After Windows Update (Post-Application Installation) action, rename Custom Tasks to Custom Tasks (Post-Windows Update).
|
||||
|
||||
**Note**
|
||||
The reason for adding the applications after the Tattoo action but before running Windows Update is simply to save time during the deployment. This way we can add all applications that will upgrade some of the built-in components and avoid unnecessary updating.
|
||||
|
||||
|
||||
|
||||
5. State Restore / Custom Tasks (Pre-Windows Update). Add a new Install Roles and Features action with the following settings:
|
||||
|
||||
1. Name: Install - Microsoft NET Framework 3.5.1
|
||||
|
||||
2. Select the operating system for which roles are to be installed: Windows 8.1
|
||||
|
||||
3. Select the roles and features that should be installed: .NET Framework 3.5 (includes .NET 2.0 and 3.0)
|
||||
|
||||
**Important**
|
||||
This is probably the most important step when creating a reference image. Many applications need the .NET Framework, and we strongly recommend having it available in the image. The one thing that makes this different from other components is that .NET Framework 3.5.1 is not included in the WIM file. It is installed from the **Sources\\SxS** folder on the media, and that makes it more difficult to add after the image has been deployed.
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 7. The task sequence after creating the Custom Tasks (Pre-Windows Update) group and adding the Install - Microsoft NET Framework 3.5.1 action.
|
||||
|
||||
6. State Restore - Custom Tasks (Pre-Windows Update). After the **Install - Microsoft NET Framework 3.5.1** action, add a new **Install Application** action with the following settings:
|
||||
|
||||
1. Name: Install - Microsoft Visual C++ 2005 SP1 - x86
|
||||
|
||||
2. Install a Single Application: Install - Microsoft Visual C++ 2005 SP1 - x86-x64
|
||||
|
||||
7. Repeat the previous step (add a new **Install Application**) to add the following applications:
|
||||
|
||||
1. Install - Microsoft Visual C++ 2005 SP1 - x64
|
||||
|
||||
2. Install - Microsoft Visual C++ 2008 SP1 - x86
|
||||
|
||||
3. Install - Microsoft Visual C++ 2008 SP1 - x64
|
||||
|
||||
4. Install - Microsoft Visual C++ 2010 SP1 - x86
|
||||
|
||||
5. Install - Microsoft Visual C++ 2010 SP1 - x64
|
||||
|
||||
6. Install - Microsoft Visual C++ 2012 Update 4 - x86
|
||||
|
||||
7. Install - Microsoft Visual C++ 2012 Update 4 - x64
|
||||
|
||||
8. Install - Microsoft Office 2013 Pro Plus - x86
|
||||
|
||||
8. After the Install - Microsoft Office 2013 Pro Plus - x86 action, add a new Restart computer action.
|
||||
|
||||
3. Click **OK**.
|
||||
|
||||
|
||||
### Optional configuration: Add a suspend action
|
||||
|
||||
The goal when creating a reference image is of course to automate everything. But sometimes you have a special configuration or application setup that is too time-consuming to automate. If you need to do some manual configuration, you can add a little-known feature called Lite Touch Installation (LTI) Suspend. If you add the LTISuspend.wsf script as a custom action in the task sequence, it will suspend the task sequence until you click the Resume Task Sequence shortcut icon on the desktop. In addition to using the LTI Suspend feature for manual configuration or installation, you can also use it simply for verifying a reference image before you allow the task sequence to continue and use Sysprep and capture the virtual machine.
|
||||
@ -491,23 +362,15 @@ When using MDT, you don't need to edit the Unattend.xml file very often because
|
||||
|
||||
**Note**
|
||||
You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the Install Roles and Features action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you are adding packages via Unattend.xml, it is version specific, so Unattend.xml must match the exact version of the operating system you are servicing.
|
||||
|
||||
|
||||
|
||||
Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:
|
||||
|
||||
1. Using the Deployment Workbench, right-click the **Windows 10 Enterprise x64 RTM Default Image** task sequence and select **Properties**.
|
||||
|
||||
2. In the **OS Info** tab, click **Edit Unattend.xml**. MDT now generates a catalog file. This will take a few minutes, and then Windows System Image Manager (Windows SIM) will start.
|
||||
|
||||
3. In Windows SIM, expand the **4 specialize** node in the **Answer File** pane and select the amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral entry.
|
||||
|
||||
4. In the **amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral properties** window (right-hand window), set the following values:
|
||||
|
||||
- DisableDevTools: true
|
||||
|
||||
5. Save the Unattend.xml file, and close Windows SIM.
|
||||
|
||||
6. On the Windows 10 Enterprise x64 RTM Default Image Properties, click **OK**.
|
||||
|
||||

|
||||
@ -516,19 +379,14 @@ Figure 10. Windows System Image Manager with the Windows 10 Unattend.xml.
|
||||
|
||||
## <a href="" id="sec05"></a>Configure the MDT deployment share rules
|
||||
|
||||
|
||||
Understanding rules is critical to successfully using MDT. Rules are configured using the Rules tab of the deployment share's properties. The Rules tab is essentially a shortcut to edit the CustomSettings.ini file that exists in the E:\\MDTBuildLab\\Control folder. This section discusses how to configure the MDT deployment share rules as part of your Windows 10 Enterprise deployment.
|
||||
|
||||
### MDT deployment share rules overview
|
||||
|
||||
In MDT, there are always two rule files: the CustomSettings.ini file and the Bootstrap.ini file. You can add almost any rule to either; however, the Bootstrap.ini file is copied from the Control folder to the boot image, so the boot image needs to be updated every time you change that file.
|
||||
|
||||
For that reason, add only a minimal set of rules to Bootstrap.ini, such as which deployment server and share to connect to - the DEPLOYROOT value. Put the other rules in CustomSettings.ini because that file is updated immediately when you click OK. By taking the following steps, you will configure the rules for the MDT Build Lab deployment share:
|
||||
|
||||
1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Properties**.
|
||||
|
||||
2. Select the **Rules** tab and modify using the following information:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
@ -585,30 +443,19 @@ For that reason, add only a minimal set of rules to Bootstrap.ini, such as which
|
||||
|
||||
**Note**
|
||||
For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it is acceptable to do so in this situation.
|
||||
|
||||
|
||||
|
||||
4. In the **Windows PE** tab, in the **Platform** drop-down list, select **x86**.
|
||||
|
||||
5. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
|
||||
1. Image description: MDT Build Lab x86
|
||||
|
||||
2. ISO file name: MDT Build Lab x86.iso
|
||||
|
||||
6. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
7. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
|
||||
1. Image description: MDT Build Lab x64
|
||||
|
||||
2. ISO file name: MDT Build Lab x64.iso
|
||||
|
||||
8. Click **OK**.
|
||||
|
||||
**Note**
|
||||
In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).
|
||||
|
||||
|
||||
|
||||
### Update the deployment share
|
||||
@ -616,14 +463,11 @@ In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except
|
||||
After the deployment share has been configured, it needs to be updated. This is the process when the Windows Windows PE boot images are created.
|
||||
|
||||
1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Update Deployment Share**.
|
||||
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
|
||||
**Note**
|
||||
The update process will take 5 to 10 minutes.
|
||||
|
||||
|
||||
|
||||
### The rules explained
|
||||
|
||||
Now that the MDT Build Lab deployment share (the share used to create the reference images) has been configured, it is time to explain the various settings used in the Bootstrap.ini and CustomSettings.ini files.
|
||||
@ -634,9 +478,7 @@ The CustomSettings.ini file is normally stored on the server, in the Deployment
|
||||
|
||||
**Note**
|
||||
The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.
|
||||
|
||||
|
||||
|
||||
### The Bootstrap.ini file
|
||||
|
||||
The Bootstrap.ini file is available via the deployment share's Properties dialog box, or via the E:\\MDTBuildLab\\Control folder on MDT01.
|
||||
@ -644,36 +486,27 @@ The Bootstrap.ini file is available via the deployment share's Properties dialog
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
[Default]
|
||||
DeployRoot=\\MDT01\MDTBuildLab$
|
||||
UserDomain=CONTOSO
|
||||
UserID=MDT_BA
|
||||
UserPassword=P@ssw0rd
|
||||
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
So, what are these settings?
|
||||
|
||||
- **Priority.** This determines the order in which different sections are read. This Bootstrap.ini has only one section, named \[Default\].
|
||||
|
||||
- **DeployRoot.** This is the location of the deployment share. Normally, this value is set by MDT, but you need to update the DeployRoot value if you move to another server or other share. If you don't specify a value, the Windows Deployment Wizard prompts you for a location.
|
||||
|
||||
- **UserDomain, UserID, and UserPassword.** These values are used for automatic log on to the deployment share. Again, if they are not specified, the wizard prompts you.
|
||||
|
||||
**Note**
|
||||
Caution is advised. These values are stored in clear text on the boot image. Use them only for the MDT Build Lab deployment share and not for the MDT Production deployment share that you learn to create in the next topic.
|
||||
|
||||
|
||||
|
||||
- **SkipBDDWelcome.** Even if it is nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.
|
||||
|
||||
**Note**
|
||||
All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.
|
||||
|
||||
|
||||
|
||||
### The CustomSettings.ini file
|
||||
|
||||
The CustomSettings.ini file, whose content you see on the Rules tab of the deployment share Properties dialog box, contains most of the properties used in the configuration.
|
||||
@ -710,109 +543,64 @@ SkipRoles=YES
|
||||
SkipCapture=NO
|
||||
SkipFinalSummary=YES
|
||||
```
|
||||
|
||||
- **Priority.** Has the same function as in Bootstrap.ini. Priority determines the order in which different sections are read. This CustomSettings.ini has only one section, named \[Default\]. In general, if you have multiple sections that set the same value, the value from the first section (higher priority) wins. The rare exceptions are listed in the ZTIGather.xml file.
|
||||
|
||||
- **\_SMSTSORGNAME.** The organization name displayed in the task sequence progress bar window during deployment.
|
||||
|
||||
- **UserDataLocation.** Controls the settings for user state backup. You do not need to use when building and capturing a reference image.
|
||||
|
||||
- **DoCapture.** Configures the task sequence to run the System Preparation (Sysprep) tool and capture the image to a file when the operating system is installed.
|
||||
|
||||
- **OSInstall.** Must be set to Y or YES (the code actually just looks for the Y character) for the setup to proceed.
|
||||
|
||||
- **AdminPassword.** Sets the local Administrator account password.
|
||||
|
||||
- **TimeZoneName.** Establishes the time zone to use. Don't confuse this value with TimeZone, which is only for legacy operating systems (Windows 7 and Windows Server 2003).
|
||||
|
||||
**Note**
|
||||
The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names.
|
||||
|
||||
|
||||
|
||||
- **JoinWorkgroup.** Configures Windows to join a workgroup.
|
||||
|
||||
- **HideShell.** Hides the Windows Shell during deployment. This is especially useful for Windows 8.1 deployments in which the deployment wizard will otherwise appear behind the tiles.
|
||||
|
||||
- **FinishAction.** Instructs MDT what to do when the task sequence is complete.
|
||||
|
||||
- **DoNotCreateExtraPartition.** Configures the task sequence not to create the extra partition for BitLocker. There is no need to do this for your reference image.
|
||||
|
||||
- **WSUSServer.** Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied.
|
||||
|
||||
- **SLSHARE.** Instructs MDT to copy the log files to a server share if something goes wrong during deployment, or when a deployment is successfully completed.
|
||||
|
||||
- **ApplyGPOPack.** Allows you to deploy local group policies created by Microsoft Security Compliance Manager (SCM).
|
||||
|
||||
- **SkipAdminPassword.** Skips the pane that asks for the Administrator password.
|
||||
|
||||
- **SkipProductKey.** Skips the pane that asks for the product key.
|
||||
|
||||
- **SkipComputerName.** Skips the Computer Name pane.
|
||||
|
||||
- **SkipDomainMemberShip.** Skips the Domain Membership pane. If set to Yes, you need to configure either the JoinWorkgroup value or the JoinDomain, DomainAdmin, DomainAdminDomain, and DomainAdminPassword properties.
|
||||
|
||||
- **SkipUserData.** Skips the pane for user state migration.
|
||||
|
||||
- **SkipLocaleSelection.** Skips the pane for selecting language and keyboard settings.
|
||||
|
||||
- **SkipTimeZone.** Skips the pane for setting the time zone.
|
||||
|
||||
- **SkipApplications.** Skips the Applications pane.
|
||||
|
||||
- **SkipBitLocker.** Skips the BitLocker pane.
|
||||
|
||||
- **SkipSummary.** Skips the initial Windows Deployment Wizard summary pane.
|
||||
|
||||
- **SkipRoles.** Skips the Install Roles and Features pane.
|
||||
|
||||
- **SkipCapture.** Skips the Capture pane.
|
||||
|
||||
- **SkipFinalSummary.** Skips the final Windows Deployment Wizard summary. Because you use FinishAction=Shutdown, you don't want the wizard to stop in the end so that you need to click OK before the machine shuts down.
|
||||
|
||||
## <a href="" id="sec06"></a>Build the Windows 10 reference image
|
||||
|
||||
|
||||
Once you have created your task sequence, you are ready to create the Windows 10 reference image. This will be performed by launching the task sequence from a virtual machine which will then automatically perform the reference image creation and capture process.
|
||||
|
||||
This steps below outline the process used to boot a virtual machine using an ISO boot image created by MDT, and then execute the reference image task sequence image to create and capture the Windows 10 reference image.
|
||||
|
||||
1. Copy the E:\\MDTBuildLab\\Boot\\MDT Build Lab x86.iso on MDT01 to C:\\ISO on the Hyper-V host.
|
||||
|
||||
**Note**
|
||||
Remember, in MDT you can use the x86 boot image to deploy both x86 and x64 operating system images. That's why you can use the x86 boot image instead of the x64 boot image.
|
||||
|
||||
|
||||
|
||||
2. Create a virtual machine with the following settings:
|
||||
|
||||
1. Name: REFW10X64-001
|
||||
|
||||
2. Location: C:\\VMs
|
||||
|
||||
3. Memory: 1024 MB
|
||||
|
||||
4. Network: External (The network that is connected to the same infrastructure as MDT01 is)
|
||||
|
||||
5. Hard disk: 60 GB (dynamic disk)
|
||||
|
||||
6. Image file: C:\\ISO\\MDT Build Lab x86.iso
|
||||
|
||||
3. Take a snapshot of the REFW10X64-001 virtual machine, and name it **Clean with MDT Build Lab x86 ISO**.
|
||||
|
||||
**Note**
|
||||
Taking a snapshot is useful if you need to restart the process and want to make sure you can start clean.
|
||||
|
||||
|
||||
|
||||
4. Start the REFW10X64-001 virtual machine. After booting into Windows PE, complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Default Image
|
||||
|
||||
2. Specify whether to capture an image: Capture an image of this reference computer
|
||||
|
||||
- Location: \\\\MDT01\\MDTBuildLab$\\Captures
|
||||
|
||||
3. File name: REFW10X64-001.wim
|
||||
|
||||

|
||||
@ -820,26 +608,18 @@ This steps below outline the process used to boot a virtual machine using an ISO
|
||||
Figure 13. The Windows Deployment Wizard for the Windows 10 reference image.
|
||||
|
||||
5. The setup now starts and does the following:
|
||||
|
||||
1. Installs the Windows 10 Enterprise operating system.
|
||||
|
||||
2. Installs the added applications, roles, and features.
|
||||
|
||||
3. Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
4. Stages Windows PE on the local disk.
|
||||
|
||||
5. Runs System Preparation (Sysprep) and reboots into Windows PE.
|
||||
|
||||
6. Captures the installation to a Windows Imaging (WIM) file.
|
||||
|
||||
7. Turns off the virtual machine.
|
||||
|
||||
After some time, you will have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the E:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
[Deploy a Windows 10 image using MDT 2013 Update 2](deploy-a-windows-10-image-using-mdt.md)
|
||||
@ -851,12 +631,3 @@ After some time, you will have a Windows 10 Enterprise x64 image that is fully
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Deploy a Windows 10 image using MDT 2013 Update 2 (Windows 10)
|
||||
description: This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically.
|
||||
ms.assetid: 1d70a3d8-1b1d-4051-b656-c0393a93f83c
|
||||
keywords: ["deployment, automate, tools, configure"]
|
||||
keywords: [eployment, automate, tools, configure
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Deploy a Windows 10 image using MDT 2013 Update 2
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically. You will prepare for this by creating a MDT deployment share that is used solely for image deployment. Separating the processes of creating reference images from the processes used to deploy them in production allows greater control of on both processes. You will then configure the deployment share, create a new task sequence, add applications, add drivers, add rules, and configure Active Directory permissions for deployment.
|
||||
@ -22,147 +21,95 @@ For the purposes of this topic, we will use three machines: DC01, MDT01, and PC0
|
||||
|
||||
**Note**
|
||||
For important details about the setup for the steps outlined in this article, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 1. The machines used in this topic.
|
||||
|
||||
## <a href="" id="sec01"></a>Step 1: Configure Active Directory permissions
|
||||
|
||||
|
||||
These steps will show you how to configure an Active Directory account with the permissions required to deploy a Windows 10 machine to the domain using MDT. These steps assume you have downloaded the sample [Set-OUPermissions.ps1 script](http://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to C:\\Setup\\Scripts on DC01. The account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01. In order for MDT to join machines into the contoso.com domain you need to create an account and configure permissions in Active Directory.
|
||||
|
||||
1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**.
|
||||
|
||||
2. Select the **Service Accounts** organizational unit (OU) and create the MDT\_JD account using the following settings:
|
||||
|
||||
1. Name: MDT\_JD
|
||||
|
||||
2. User logon name: MDT\_JD
|
||||
|
||||
3. Password: P@ssw0rd
|
||||
|
||||
4. User must change password at next logon: Clear
|
||||
|
||||
5. User cannot change password: Select
|
||||
|
||||
6. Password never expires: Select
|
||||
|
||||
3. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands and press **Enter** after each command:
|
||||
|
||||
``` syntax
|
||||
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force
|
||||
Set-Location C:\Setup\Scripts
|
||||
.\Set-OUPermissions.ps1 -Account MDT_JD
|
||||
-TargetOU "OU=Workstations,OU=Computers,OU=Contoso"
|
||||
```
|
||||
|
||||
4. The Set-OUPermissions.ps1 script allows the MDT\_JD user account permissions to manage computer accounts in the Contoso / Computers OU. Below you find a list of the permissions being granted:
|
||||
|
||||
1. Scope: This object and all descendant objects
|
||||
|
||||
1. Create Computer objects
|
||||
|
||||
2. Delete Computer objects
|
||||
|
||||
2. Scope: Descendant Computer objects
|
||||
|
||||
1. Read All Properties
|
||||
|
||||
2. Write All Properties
|
||||
|
||||
3. Read Permissions
|
||||
|
||||
4. Modify Permissions
|
||||
|
||||
5. Change Password
|
||||
|
||||
6. Reset Password
|
||||
|
||||
7. Validated write to DNS host name
|
||||
|
||||
8. Validated write to service principal name
|
||||
|
||||
## <a href="" id="sec02"></a>Step 2: Set up the MDT production deployment share
|
||||
|
||||
|
||||
When you are ready to deploy Windows 10 in a production environment, you will first create a new MDT deployment share. You should not use the same deployment share that you used to create the reference image for a production deployment. For guidance on creating a custom Windows 10 image, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
When you are ready to deploy Windows 10 in a production environment, you will first create a new MDT deployment share. You should not use the same deployment share that you used to create the reference image for a production deployment. For guidance on creating a custom Windows 10 image, see
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
|
||||
### Create the MDT production deployment share
|
||||
|
||||
The steps for creating the deployment share for production are the same as when you created the deployment share for creating the custom reference image:
|
||||
|
||||
1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd.**
|
||||
|
||||
2. Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
|
||||
3. On the **Path** page, in the **Deployment share path** text box, type **E:\\MDTProduction** and click **Next**.
|
||||
|
||||
4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and click **Next**.
|
||||
|
||||
5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and click **Next**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and click **Next** twice, and then click **Finish**.
|
||||
|
||||
7. Using File Explorer, verify that you can access the **\\\\MDT01\\MDTProduction$** share.
|
||||
|
||||
## <a href="" id="sec03"></a>Step 3: Add a custom image
|
||||
|
||||
|
||||
The next step is to add a reference image into the deployment share with the setup files required to successfully deploy Windows 10. When adding a custom image, you still need to copy setup files (an option in the wizard) because Windows 10 stores additional components in the Sources\\SxS folder which is outside the image and may be required when installing components.
|
||||
|
||||
### Add the Windows 10 Enterprise x64 RTM custom image
|
||||
|
||||
In these steps, we assume that you have completed the steps in the [Create a Windows 10 reference image](create-a-windows-10-reference-image.md) topic, so you have a Windows 10 reference image in the E:\\MDTBuildLab\\Captures folder on MDT01.
|
||||
|
||||
1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**; select the **Operating Systems** node, and create a folder named **Windows 10**.
|
||||
|
||||
2. Right-click the **Windows 10** folder and select **Import Operating System**.
|
||||
|
||||
3. On the **OS Type** page, select **Custom image file** and click **Next**.
|
||||
|
||||
4. On the **Image** page, in the **Source file** text box, browse to **E:\\MDTBuildLab\\Captures\\REFW10X64-001.wim** and click **Next**.
|
||||
|
||||
5. On the **Setup** page, select the **Copy Windows 7, Windows Server 2008 R2, or later setup files from the specified path** option; in the **Setup source directory** text box, browse to **E:\\MDTBuildLab\\Operating Systems\\W10EX64RTM** and click **Next**.
|
||||
|
||||
6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, click **Next** twice, and then click **Finish**.
|
||||
|
||||
7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to match the following: **Windows 10 Enterprise x64 RTM Custom Image**.
|
||||
|
||||
**Note**
|
||||
The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image.
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 2. The imported operating system after renaming it.
|
||||
|
||||
## <a href="" id="sec04"></a>Step 4: Add an application
|
||||
|
||||
|
||||
When you configure your MDT Build Lab deployment share, you will also add any applications to the new deployment share before creating your task sequence. This section walks you through the process of adding an application to the MDT Production deployment share using Adobe Reader as an example.
|
||||
|
||||
### Create the install: Adobe Reader XI x86
|
||||
|
||||
In this example, we assume that you have downloaded the Adobe Reader XI installation file (AdbeRdr11000\_eu\_ES.msi) to E:\\Setup\\Adobe Reader on MDT01.
|
||||
|
||||
1. Using the Deployment Workbench, expand the **MDT Production** node and navigate to the **Applications** node.
|
||||
|
||||
2. Right-click the **Applications** node, and create a new folder named **Adobe**.
|
||||
|
||||
3. In the **Applications** node, right-click the **Adobe** folder and select **New Application**.
|
||||
|
||||
4. On the **Application Type** page, select the **Application with source files** option and click **Next**.
|
||||
|
||||
5. On the **Details** page, in the **Application** name text box, type **Install - Adobe Reader XI - x86** and click **Next**.
|
||||
|
||||
6. On the **Source** page, in the **Source Directory** text box, browse to **E:\\Setup\\Adobe Reader XI** and click **Next**.
|
||||
|
||||
7. On the **Destination** page, in the **Specify the name of the directory that should be created** text box, type **Install - Adobe Reader XI - x86** and click **Next**.
|
||||
|
||||
8. On the **Command Details** page, in the **Command Line** text box, type **msiexec /i AdbeRdr11000\_eu\_ES.msi /q**, click **Next** twice, and then click **Finish**.
|
||||
|
||||

|
||||
@ -171,101 +118,61 @@ Figure 3. The Adobe Reader application added to the Deployment Workbench.
|
||||
|
||||
## <a href="" id="sec05"></a>Step 5: Prepare the drivers repository
|
||||
|
||||
|
||||
In order to deploy Windows 10 with MDT 2013 Update 2 successfully, you need drivers for the boot images and for the actual operating system. This section will show you how to add drivers for the boot image and operating system, using the following hardware models as examples:
|
||||
|
||||
- Lenovo ThinkPad T420
|
||||
|
||||
- Dell Latitude E6440
|
||||
|
||||
- HP EliteBook 8560w
|
||||
|
||||
- Microsoft Surface Pro
|
||||
|
||||
For boot images, you need to have storage and network drivers; for the operating system, you need to have the full suite of drivers.
|
||||
|
||||
**Note**
|
||||
You should only add drivers to the Windows PE images if the default drivers don't work. Adding drivers that are not necessary will only make the boot image larger and potentially delay the download time.
|
||||
|
||||
|
||||
|
||||
### Create the driver source structure in the file system
|
||||
|
||||
The key to successful management of drivers for MDT 2013 Update 2, as well as for any other deployment solution, is to have a really good driver repository. From this repository, you import drivers into MDT for deployment, but you should always maintain the repository for future use.
|
||||
|
||||
1. On MDT01, using File Explorer, create the **E:\\Drivers** folder.
|
||||
|
||||
2. In the **E:\\Drivers** folder, create the following folder structure:
|
||||
|
||||
1. WinPE x86
|
||||
|
||||
2. WinPE x64
|
||||
|
||||
3. Windows 10 x64
|
||||
|
||||
3. In the new Windows 10 x64 folder, create the following folder structure:
|
||||
|
||||
- Dell
|
||||
|
||||
- Latitude E6440
|
||||
|
||||
- HP
|
||||
|
||||
- HP EliteBook 8560w
|
||||
|
||||
- Lenovo
|
||||
|
||||
- ThinkPad T420 (4178)
|
||||
|
||||
- Microsoft Corporation
|
||||
|
||||
- Surface Pro 3
|
||||
|
||||
**Note**
|
||||
Even if you are not going to use both x86 and x64 boot images, we still recommend that you add the support structure for future use.
|
||||
|
||||
|
||||
|
||||
### Create the logical driver structure in MDT 2013 Update 2
|
||||
|
||||
When you import drivers to the MDT 2013 Update 2 driver repository, MDT creates a single instance folder structure based on driver class names. However, you can, and should, mimic the driver structure of your driver source repository in the Deployment Workbench. This is done by creating logical folders in the Deployment Workbench.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, select the **Out-of-Box Drivers** node.
|
||||
|
||||
2. In the **Out-Of-Box Drivers** node, create the following folder structure:
|
||||
|
||||
1. WinPE x86
|
||||
|
||||
2. WinPE x64
|
||||
|
||||
3. Windows 10 x64
|
||||
|
||||
3. In the **Windows 10 x64** folder, create the following folder structure:
|
||||
|
||||
- Dell Inc.
|
||||
|
||||
- Latitude E6440
|
||||
|
||||
- Hewlett-Packard
|
||||
|
||||
- HP EliteBook 8560w
|
||||
|
||||
- Lenovo
|
||||
|
||||
- 4178
|
||||
|
||||
- Microsoft Corporation
|
||||
|
||||
- Surface Pro 3
|
||||
|
||||
The preceding folder names are selected because they match the actual make and model values that MDT reads from the machines during deployment. You can find out the model values for your machines via the following command in Windows PowerShell:
|
||||
|
||||
``` syntax
|
||||
Get-WmiObject -Class:Win32_ComputerSystem
|
||||
```
|
||||
|
||||
Or, you can use this command in a normal command prompt:
|
||||
|
||||
``` syntax
|
||||
wmic csproduct get name
|
||||
```
|
||||
@ -279,23 +186,14 @@ Figure 4. The Out-of-Box Drivers structure in Deployment Workbench.
|
||||
### Create the selection profiles for boot image drivers
|
||||
|
||||
By default, MDT adds any storage and network drivers that you import to the boot images. However, you should add only the drivers that are necessary to the boot image. You can control which drivers are added by using selection profiles.
|
||||
|
||||
The drivers that are used for the boot images (Windows PE) are Windows 10 drivers. If you can’t locate Windows 10 drivers for your device, a Windows 7 or Windows 8.1 driver will most likely work, but Windows 10 drivers should be your first choice.
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Advanced Configuration** node, right-click the **Selection Profiles** node, and select **New Selection Profile**.
|
||||
|
||||
2. In the New Selection Profile Wizard, create a selection profile with the following settings:
|
||||
|
||||
1. Selection Profile name: WinPE x86
|
||||
|
||||
2. Folders: Select the WinPE x86 folder in Out-of-Box Drivers.
|
||||
|
||||
3. Again, right-click the **Selection Profiles** node, and select **New Selection Profile**.
|
||||
|
||||
4. In the New Selection Profile Wizard, create a selection profile with the following settings:
|
||||
|
||||
1. Selection Profile name: WinPE x64
|
||||
|
||||
2. Folders: Select the WinPE x64 folder in Out-of-Box Drivers.
|
||||
|
||||

|
||||
@ -305,17 +203,12 @@ Figure 5. Creating the WinPE x64 selection profile.
|
||||
### Extract and import drivers for the x64 boot image
|
||||
|
||||
Windows PE supports all the hardware models that we have, but here you learn to add boot image drivers to accommodate any new hardware that might require additional drivers. In this example, you add the latest Intel network drivers to the x64 boot image.
|
||||
|
||||
In these steps, we assume you have downloaded PROWinx64.exe from Intel.com and saved it to a temporary folder.
|
||||
|
||||
1. Extract PROWinx64.exe to a temporary folder - in this example to the **C:\\Tmp\\ProWinx64** folder.
|
||||
|
||||
2. Using File Explorer, create the **E:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
|
||||
3. Copy the content of the **C:\\Tmp\\PROWinx64\\PRO1000\\Winx64\\NDIS64** folder to the **E:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
|
||||
4. Using Deployment Workbench, expand the **Out-of-Box Drivers** node, right-click the **WinPE x64** node, and select **Import Drivers**. Use the following setting for the Import Drivers Wizard:
|
||||
|
||||
- Driver source directory: **E:\\Drivers\\WinPE x64\\Intel PRO1000**
|
||||
|
||||
### Download, extract, and import drivers
|
||||
@ -329,9 +222,7 @@ To get the updates, you download the drivers from the Lenovo ThinkVantage Update
|
||||
In these steps, we assume you have downloaded and extracted the drivers using ThinkVantage Update Retriever v5.0 to the E:\\Drivers\\Lenovo\\ThinkPad T420 (4178) folder.
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Lenovo** node.
|
||||
|
||||
2. Right-click the **4178** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard:
|
||||
|
||||
- Driver source directory: **E:\\Drivers\\Windows 10 x64\\Lenovo\\ThinkPad T420 (4178)**
|
||||
|
||||
### For the Latitude E6440
|
||||
@ -341,9 +232,7 @@ For the Dell Latitude E6440 model, you use the Dell Driver CAB file, which is ac
|
||||
In these steps, we assume you have downloaded and extracted the CAB file for the Latitude E6440 model to the E:\\Drivers\\Dell\\Latitude E6440 folder.
|
||||
|
||||
1. On **MDT01**, using the **Deployment Workbench**, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Dell** node.
|
||||
|
||||
2. Right-click the **Latitude E6440** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard:
|
||||
|
||||
- Driver source directory: **E:\\Drivers\\Windows 10 x64\\Dell\\Latitude E6440**
|
||||
|
||||
### For the HP EliteBook 8560w
|
||||
@ -353,9 +242,7 @@ For the HP EliteBook 8560w, you use HP SoftPaq Download Manager to get the drive
|
||||
In these steps, we assume you have downloaded and extracted the drivers for the HP EliteBook 8650w model to the E:\\Drivers\\Windows 10 x64\\HP\\HP EliteBook 8560w folder.
|
||||
|
||||
1. On **MDT01**, using the **Deployment Workbench**, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Hewlett-Packard** node.
|
||||
|
||||
2. Right-click the **HP EliteBook 8560w** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard:
|
||||
|
||||
- Driver source directory: **E:\\Drivers\\Windows 10 x64\\HP\\HP EliteBook 8560w**
|
||||
|
||||
### For the Microsoft Surface Pro 3
|
||||
@ -363,71 +250,43 @@ In these steps, we assume you have downloaded and extracted the drivers for the
|
||||
For the Microsoft Surface Pro model, you find the drivers on the Microsoft website. In these steps we assume you have downloaded and extracted the Surface Pro 3 drivers to the E:\\Drivers\\Windows 10 x64\\Microsoft\\Surface Pro 3 folder.
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the **MDT Production** node, expand the **Out-Of-Box Drivers** node, and expand the **Microsoft** node.
|
||||
|
||||
2. Right-click the **Surface Pro 3** folder and select **Import Drivers**; use the following setting for the Import Drivers Wizard:
|
||||
|
||||
- Driver source directory: **E:\\Drivers\\Windows 10 x64\\Microsoft\\Surface Pro 3**
|
||||
|
||||
## <a href="" id="sec06"></a>Step 6: Create the deployment task sequence
|
||||
|
||||
|
||||
This section will show you how to create the task sequence used to deploy your production Windows 10 reference image. You will then configure the tasks sequence to enable patching via a Windows Server Update Services (WSUS) server.
|
||||
|
||||
### Create a task sequence for Windows 10 Enterprise
|
||||
|
||||
1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, and create a folder named **Windows 10**.
|
||||
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
1. Task sequence ID: W10-X64-001
|
||||
|
||||
2. Task sequence name: Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
3. Task sequence comments: Production Image
|
||||
|
||||
4. Template: Standard Client Task Sequence
|
||||
|
||||
5. Select OS: Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
6. Specify Product Key: Do not specify a product key at this time
|
||||
|
||||
7. Full Name: Contoso
|
||||
|
||||
8. Organization: Contoso
|
||||
|
||||
9. Internet Explorer home page: about:blank
|
||||
|
||||
10. Admin Password: Do not specify an Administrator Password at this time
|
||||
|
||||
### Edit the Windows 10 task sequence
|
||||
|
||||
1. Right-click the **Windows 10 Enterprise x64 RTM Custom Image** task sequence, and select **Properties**.
|
||||
|
||||
2. On the **Task Sequence** tab, configure the **Windows 10 Enterprise x64 RTM Custom Image** task sequence with the following settings:
|
||||
|
||||
1. Preinstall. After the **Enable BitLocker (Offline)** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
|
||||
1. Name: Set DriverGroup001
|
||||
|
||||
2. Task Sequence Variable: DriverGroup001
|
||||
|
||||
3. Value: Windows 10 x64\\%Make%\\%Model%
|
||||
|
||||
2. Configure the **Inject Drivers** action with the following settings:
|
||||
|
||||
1. Choose a selection profile: Nothing
|
||||
|
||||
2. Install all drivers from the selection profile
|
||||
|
||||
**Note**
|
||||
The configuration above indicates that MDT should only use drivers from the folder specified by the DriverGroup001 property, which is defined by the "Choose a selection profile: Nothing" setting, and that MDT should not use plug and play to determine which drivers to copy, which is defined by the "Install all drivers from the selection profile" setting.
|
||||
|
||||
|
||||
|
||||
3. State Restore. Enable the **Windows Update (Pre-Application Installation)** action.
|
||||
|
||||
4. State Restore. Enable the **Windows Update (Post-Application Installation)** action.
|
||||
|
||||
3. Click **OK**.
|
||||
|
||||

|
||||
@ -436,21 +295,15 @@ Figure 6. The task sequence for production deployment.
|
||||
|
||||
## <a href="" id="sec07"></a>Step 7: Configure the MDT production deployment share
|
||||
|
||||
|
||||
In this section, you will learn how to configure the MDT Build Lab deployment share with the rules required to create a simple and dynamic deployment process. This includes configuring commonly used rules and an explanation of how these rules work.
|
||||
|
||||
### Configure the rules
|
||||
|
||||
1. On MDT01, using File Explorer, copy the following files from the **D:\\Setup\\Sample Files\\MDT Production\\Control** folder to **E:\\MDTProduction\\Control**. Overwrite the existing files.
|
||||
|
||||
1. Bootstrap.ini
|
||||
|
||||
2. CustomSettings.ini
|
||||
|
||||
2. Right-click the **MDT Production** deployment share and select **Properties**.
|
||||
|
||||
3. Select the **Rules** tab and modify using the following information:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
@ -486,9 +339,7 @@ In this section, you will learn how to configure the MDT Build Lab deployment sh
|
||||
SkipCapture=YES
|
||||
SkipFinalSummary=NO
|
||||
```
|
||||
|
||||
4. Click **Edit Bootstrap.ini** and modify using the following information:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
@ -498,43 +349,26 @@ In this section, you will learn how to configure the MDT Build Lab deployment sh
|
||||
UserID=MDT_BA
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
5. In the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected.
|
||||
|
||||
6. In the **General** sub tab, configure the following settings:
|
||||
|
||||
- In the **Lite Touch Boot Image Settings** area:
|
||||
|
||||
1. Image description: MDT Production x86
|
||||
|
||||
2. ISO file name: MDT Production x86.iso
|
||||
|
||||
**Note**
|
||||
Because you are going to use Pre-Boot Execution Environment (PXE) later to deploy the machines, you do not need the ISO file; however, we recommend creating ISO files because they are useful when troubleshooting deployments and for quick tests.
|
||||
|
||||
|
||||
|
||||
7. In the **Drivers and Patches** sub tab, select the **WinPE x86** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
|
||||
8. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
9. In the **General** sub tab, configure the following settings:
|
||||
|
||||
- In the **Lite Touch Boot Image Settings** area:
|
||||
|
||||
1. Image description: MDT Production x64
|
||||
|
||||
2. ISO file name: MDT Production x64.iso
|
||||
|
||||
10. In the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
|
||||
11. In the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box.
|
||||
|
||||
12. Click **OK**.
|
||||
|
||||
**Note**
|
||||
It will take a while for the Deployment Workbench to create the monitoring database and web service.
|
||||
|
||||
|
||||
|
||||

|
||||
@ -548,23 +382,18 @@ The rules for the MDT Production deployment share are somewhat different from th
|
||||
### The Bootstrap.ini file
|
||||
|
||||
This is the MDT Production Bootstrap.ini without the user credentials (except domain information):
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
DeployRoot=\\MDT01\MDTProduction$
|
||||
|
||||
UserDomain=CONTOSO
|
||||
UserID=MDT_BA
|
||||
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
### The CustomSettings.ini file
|
||||
|
||||
This is the CustomSettings.ini file with the new join domain information:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default
|
||||
@ -601,53 +430,34 @@ SkipCapture=YES
|
||||
SkipFinalSummary=NO
|
||||
EventService=http://MDT01:9800
|
||||
```
|
||||
|
||||
The additional properties to use in the MDT Production rules file are as follows:
|
||||
|
||||
- **JoinDomain.** The domain to join.
|
||||
|
||||
- **DomainAdmin.** The account to use when joining the machine to the domain.
|
||||
|
||||
- **DomainAdminDomain.** The domain for the join domain account.
|
||||
|
||||
- **DomainAdminPassword.** The password for the join domain account.
|
||||
|
||||
- **MachineObjectOU.** The organizational unit (OU) to which to add the computer account.
|
||||
|
||||
- **ScanStateArgs.** Arguments for the User State Migration Tool (USMT) ScanState command.
|
||||
|
||||
- **USMTMigFiles(\*).** List of USMT templates (controlling what to backup and restore).
|
||||
|
||||
- **EventService.** Activates logging information to the MDT monitoring web service.
|
||||
|
||||
### Optional deployment share configuration
|
||||
|
||||
If your organization has a Microsoft Software Assurance agreement, you also can subscribe to the additional Microsoft Desktop Optimization Package (MDOP) license (at an additional cost). Included in MDOP is Microsoft Diagnostics and Recovery Toolkit (DaRT), which contains tools that can help you troubleshoot MDT deployments, as well as troubleshoot Windows itself.
|
||||
If your organization has a Microsoft Software Assurance agreement, you also can subscribe to the additional Microsoft Desktop Optimization Package (MDOP) license (at an additional cost). Included in MDOP is Microsoft Diagnostics and Recovery Toolkit (DaRT), which contains tools that can help you
|
||||
troubleshoot MDT deployments, as well as troubleshoot Windows itself.
|
||||
|
||||
### Add DaRT 10 to the boot images
|
||||
|
||||
If you have licensing for MDOP and DaRT, you can add DaRT to the boot images using the steps in this section. If you do not have DaRT licensing, or don't want to use it, simply skip to the next section, [Update the Deployment Share](#bkmk-update-deployment). To enable the remote connection feature in MDT 2013 Update 2, you need to do the following:
|
||||
|
||||
- Install DaRT 10 (part of MDOP 2015 R1).
|
||||
|
||||
- Copy the two tools CAB files (Toolsx86.cab and Toolsx64.cab) to the deployment share.
|
||||
|
||||
- Configure the deployment share to add DaRT.
|
||||
|
||||
In these steps, we assume that you downloaded MDOP 2015 R1 and copied DaRT 10 to the E:\\Setup\\DaRT 10 folder on MDT01.
|
||||
|
||||
1. On MDT01, install DaRT 10 (MSDaRT10.msi) using the default settings.
|
||||
|
||||
2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder.
|
||||
|
||||
3. Copy the Toolsx64.cab file to **E:\\MDTProduction\\Tools\\x64**.
|
||||
|
||||
4. Copy the Toolsx86.cab file to **E:\\MDTProduction\\Tools\\x86**.
|
||||
|
||||
5. Using the Deployment Workbench, right-click the **MDT Production** deployment share and select **Properties**.
|
||||
|
||||
6. In the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected.
|
||||
|
||||
7. In the **Features** sub tab, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
||||
|
||||

|
||||
@ -655,35 +465,26 @@ In these steps, we assume that you downloaded MDOP 2015 R1 and copied DaRT 10 to
|
||||
Figure 8. Selecting the DaRT 10 feature in the deployment share.
|
||||
|
||||
8. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
9. In the **Features** sub tab, in addition to the default selected feature pack, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
||||
|
||||
10. Click **OK**.
|
||||
|
||||
### <a href="" id="bkmk-update-deployment"></a>Update the deployment share
|
||||
|
||||
Like the MDT Build Lab deployment share, the MDT Production deployment share needs to be updated after it has been configured. This is the process during which the Windows PE boot images are created.
|
||||
|
||||
1. Right-click the **MDT Production** deployment share and select **Update Deployment Share**.
|
||||
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
|
||||
**Note**
|
||||
The update process will take 5 to 10 minutes.
|
||||
|
||||
|
||||
|
||||
## <a href="" id="sec08"></a>Step 8: Deploy the Windows 10 client image
|
||||
|
||||
|
||||
These steps will walk you throug the process of using task sequences to deploy Windows 10 images through a fully automated process. First, you need to add the boot image to Windows Deployment Services (WDS) and then start the deployment. In contrast with deploying images from the MDT Build Lab deployment share, we recommend using the Pre-Installation Execution Environment (PXE) to start the full deployments in the datacenter, even though you technically can use an ISO/CD or USB to start the process.
|
||||
|
||||
### Configure Windows Deployment Services
|
||||
|
||||
You need to add the MDT Production Lite Touch x64 Boot image to WDS in preparation for the deployment. For the following steps, we assume that Windows Deployment Services has already been installed on MDT01.
|
||||
|
||||
1. Using the WDS console, right-click **Boot Images** and select **Add Boot Image**.
|
||||
|
||||
2. Browse to the E:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim file and add the image with the default settings.
|
||||
|
||||

|
||||
@ -693,19 +494,12 @@ Figure 9. The boot image added to the WDS console.
|
||||
### Deploy the Windows 10 client
|
||||
|
||||
At this point, you should have a solution ready for deploying the Windows 10 client. We recommend starting by trying a few deployments at a time until you are confident that your configuration works as expected. We find it useful to try some initial tests on virtual machines before testing on physical hardware. This helps rule out hardware issues when testing or troubleshooting. Here are the steps to deploy your Windows 10 image to a virtual machine:
|
||||
|
||||
1. Create a virtual machine with the following settings:
|
||||
|
||||
1. Name: PC0005
|
||||
|
||||
2. Location: C:\\VMs
|
||||
|
||||
3. Generation: 2
|
||||
|
||||
4. Memory: 2048 MB
|
||||
|
||||
5. Hard disk: 60 GB (dynamic disk)
|
||||
|
||||
2. Start the PC0005 virtual machine, and press **Enter** to start the PXE boot. The machine will now load the Windows PE boot image from the WDS server.
|
||||
|
||||

|
||||
@ -713,21 +507,13 @@ At this point, you should have a solution ready for deploying the Windows 10 cl
|
||||
Figure 10. The initial PXE boot process of PC0005.
|
||||
|
||||
3. After Windows PE has booted, complete the Windows Deployment Wizard using the following setting:
|
||||
|
||||
1. Password: P@ssw0rd
|
||||
|
||||
2. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
3. Computer Name: PC0005
|
||||
|
||||
4. Applications: Select the Install - Adobe Reader XI - x86 application.
|
||||
|
||||
4. The setup now starts and does the following:
|
||||
|
||||
1. Installs the Windows 10 Enterprise operating system.
|
||||
|
||||
2. Installs the added application.
|
||||
|
||||
3. Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
### Use the MDT 2013 monitoring feature
|
||||
@ -735,9 +521,7 @@ At this point, you should have a solution ready for deploying the Windows 10 cl
|
||||
Now that you have enabled the monitoring on the MDT Production deployment share, you can follow your deployment of PC0005 via the monitoring node.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, expand the **MDT Production** deployment share folder.
|
||||
|
||||
2. Select the **Monitoring** node, and wait until you see PC0005.
|
||||
|
||||
3. Double-click PC0005, and review the information.
|
||||
|
||||

|
||||
@ -754,23 +538,20 @@ Figure 12. The Event Viewer showing a successful deployment of PC0005.
|
||||
|
||||
## <a href="" id="sec09"></a>Multicast deployments
|
||||
|
||||
|
||||
Multicast deployment allows for image deployment with reduced network load during simultaneous deployments. Multicast is a useful operating system deployment feature in MDT deployments, however it is important to ensure that your network supports it and is designed for it.
|
||||
|
||||
### Requirements
|
||||
|
||||
Multicast requires that Windows Deployment Services (WDS) is running on Windows Server 2008 or later. In addition to the core MDT 2013 setup for multicast, the network needs to be configured to support multicast. In general, this means involving the organization networking team to make sure that Internet Group Management Protocol (IGMP) snooping is turned on and that the network is designed for multicast traffic. The multicast solution uses IGMPv3.
|
||||
Multicast requires that Windows Deployment Services (WDS) is running on Windows Server 2008 or later. In addition to the core MDT 2013 setup for multicast, the network needs to be configured to support multicast. In general, this means involving the organization networking team to make sure that
|
||||
Internet Group Management Protocol (IGMP) snooping is turned on and that the network is designed for multicast traffic. The multicast solution uses IGMPv3.
|
||||
|
||||
### Set up MDT for multicast
|
||||
|
||||
Setting up MDT for multicast is straightforward. You enable multicast on the deployment share, and MDT takes care of the rest.
|
||||
|
||||
1. On MDT01, right-click the **MDT Production** deployment share folder and select **Properties**.
|
||||
|
||||
2. In the **General** tab, select the **Enable multicast for this deployment share (requires Windows Server 2008 R2 Windows Deployment Services)** check box, and click **OK**.
|
||||
|
||||
3. Right-click the **MDT Production** deployment share folder and select **Update Deployment Share**.
|
||||
|
||||
4. After updating the deployment share, use the Windows Deployment Services console to, verify that the multicast namespace was created.
|
||||
|
||||

|
||||
@ -779,7 +560,6 @@ Figure 13. The newly created multicast namespace.
|
||||
|
||||
## <a href="" id="sec10"></a>Use offline media to deploy Windows 10
|
||||
|
||||
|
||||
In addition to network-based deployments, MDT supports the use of offline media-based deployments of Windows 10. You can very easily generate an offline version of your deployment share - either the full deployment share or a subset of it - by the use of selection profiles. The generated offline media can be burned to a DVD or copied to a USB stick for deployment.
|
||||
|
||||
Offline media are useful not only when you do not have network connectivity to the deployment share, but also when you have limited connection to the deployment share and do not want to copy 5 GB of data over the wire. Offline media can still join the domain, but you save the transfer of operating system images, drivers, and applications over the wire.
|
||||
@ -787,25 +567,15 @@ Offline media are useful not only when you do not have network connectivity to t
|
||||
### Create the offline media selection profile
|
||||
|
||||
To filter what is being added to the media, you create a selection profile. When creating selection profiles, you quickly realize the benefits of having created a good logical folder structure in the Deployment Workbench.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, in the **MDT Production / Advanced Configuration** node, right-click **Selection Profile**, and select **New Selection Profile**.
|
||||
|
||||
2. Use the following settings for the New Selection Profile Wizard:
|
||||
|
||||
1. General Settings
|
||||
|
||||
- Selection profile name: Windows 10 Offline Media
|
||||
|
||||
2. Folders
|
||||
|
||||
1. Applications / Adobe
|
||||
|
||||
2. Operating Systems / Windows 10
|
||||
|
||||
3. Out-Of-Box Drivers / WinPE x64
|
||||
|
||||
4. Out-Of-Box Drivers / Windows 10 x64
|
||||
|
||||
5. Task Sequences / Windows 10
|
||||
|
||||
### Create the offline media
|
||||
@ -813,20 +583,13 @@ To filter what is being added to the media, you create a selection profile. When
|
||||
In these steps, you generate offline media from the MDT Production deployment share. To filter what is being added to the media, you use the previously created selection profile.
|
||||
|
||||
1. On MDT01, using File Explorer, create the **E:\\MDTOfflineMedia** folder.
|
||||
|
||||
**Note**
|
||||
When creating offline media, you need to create the target folder first. It is crucial that you do not create a subfolder inside the deployment share folder because it will break the offline media.
|
||||
|
||||
|
||||
|
||||
2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration** node, right-click the **Media** node, and select **New Media**.
|
||||
|
||||
3. Use the following settings for the New Media Wizard:
|
||||
|
||||
- General Settings
|
||||
|
||||
1. Media path: **E:\\MDTOfflineMedia**
|
||||
|
||||
2. Selection profile: Windows 10 Offline Media
|
||||
|
||||
### Configure the offline media
|
||||
@ -834,27 +597,16 @@ In these steps, you generate offline media from the MDT Production deployment sh
|
||||
Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini files. These files are stored in the Control folder of the offline media; they also can be accessed via properties of the offline media in the Deployment Workbench.
|
||||
|
||||
1. On MDT01, using File Explorer, copy the CustomSettings.ini file from the **E:\\MDTBuildLab\\Control** folder to **E:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files.
|
||||
|
||||
2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**.
|
||||
|
||||
3. In the **General** tab, configure the following:
|
||||
|
||||
1. Clear the Generate x86 boot image check box.
|
||||
|
||||
2. ISO file name: Windows 10 Offline Media.iso
|
||||
|
||||
4. Still in the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
5. In the **General** sub tab, configure the following settings:
|
||||
|
||||
1. In the **Lite Touch Boot Image Settings** area:
|
||||
|
||||
- Image description: MDT Production x64
|
||||
|
||||
2. In the **Windows PE Customizations** area, set the Scratch space size to 128.
|
||||
|
||||
6. In the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
|
||||
7. Click **OK**.
|
||||
|
||||
### Generate the offline media
|
||||
@ -862,30 +614,22 @@ Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini fi
|
||||
You have now configured the offline media deployment share however the share has not yet been populated with the files required for deployment. Now everything is ready you populate the deployment share content folder and generate the offline media ISO.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, navigate to the **MDT Production / Advanced Configuration / Media** node.
|
||||
|
||||
2. Right-click the **MEDIA001** media, and select **Update Media Content**. The Update Media Content process now generates the offline media in the **E:\\MDTOfflineMedia\\Content** folder.
|
||||
|
||||
### Create a bootable USB stick
|
||||
|
||||
The ISO that you got when updating the offline media item can be burned to a DVD and used directly (it will be bootable), but it is often more efficient to use USB sticks instead since they are faster and can hold more data. (A dual-layer DVD is limited to 8.5 GB.)
|
||||
|
||||
Follow these steps to create a bootable USB stick from the offline media content:
|
||||
|
||||
1. On a physical machine running Windows 7 or later, insert the USB stick you want to use.
|
||||
|
||||
2. Copy the content of the **MDTOfflineMedia\\Content** folder to the root of the USB stick.
|
||||
|
||||
3. Start an elevated command prompt (run as Administrator), and start the Diskpart utility by typing **Diskpart** and pressing **Enter**.
|
||||
|
||||
4. In the Diskpart utility, you can type **list volume** (or the shorter **list vol**) to list the volumes, but you really only need to remember the drive letter of the USB stick to which you copied the content. In our example, the USB stick had the drive letter F.
|
||||
|
||||
5. In the Diskpart utility, type **select volume F** (replace F with your USB stick drive letter).
|
||||
|
||||
6. In the Diskpart utility, type **active**, and then type **exit**.
|
||||
|
||||
## <a href="" id="sec11"></a>Unified Extensible Firmware Interface (UEFI)-based deployments
|
||||
|
||||
|
||||
As referenced in [Windows 10 deployment tools](http://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UFEI.
|
||||
|
||||

|
||||
@ -894,7 +638,6 @@ Figure 14. The partitions when deploying an UEFI-based machine.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
@ -906,12 +649,3 @@ Figure 14. The partitions when deploying an UEFI-based machine.
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,48 +2,38 @@
|
||||
title: Deploy Windows 10 with the Microsoft Deployment Toolkit (Windows 10)
|
||||
description: This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically.
|
||||
ms.assetid: 837f009c-617e-4b3f-9028-2246067ee0fb
|
||||
keywords: ["deploy", "tools", "configure", "script"]
|
||||
keywords: deploy, tools, configure, script
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
author: mtniehaus
|
||||
ms.pagetype: mdt
|
||||
---
|
||||
|
||||
# Deploy Windows 10 with the Microsoft Deployment Toolkit
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 specifically.
|
||||
|
||||
The Microsoft Deployment Toolkit is a unified collection of tools, processes, and guidance for automating desktop and server deployment. In addition to reducing deployment time and standardizing desktop and server images, MDT enables you to more easily manage security and ongoing configurations. MDT builds on top of the core deployment tools in the Windows Assessment and Deployment Kit (Windows ADK) with additional guidance and features designed to reduce the complexity and time required for deployment in an enterprise environment.
|
||||
|
||||
MDT 2013 Update 2 supports the deployment of Windows 10, as well as Windows 7, Windows 8, Windows 8.1, and Windows Server 2012 R2. It also includes support for zero-touch installation (ZTI) with Microsoft System Center 2012 R2 Configuration Manager.
|
||||
|
||||
To download the latest version of MDT, visit the [MDT resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117).
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
|
||||
- [Deploy a Windows 10 image using MDT 2013 Update 2](deploy-a-windows-10-image-using-mdt.md)
|
||||
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
- [Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
## <a href="" id="proof"></a>Proof-of-concept environment
|
||||
|
||||
|
||||
For the purposes of this guide, and the topics discussed herein, we will use the following servers and client machines: DC01, MDT01, CM01, PC0001, and PC0002.
|
||||
|
||||

|
||||
@ -59,53 +49,34 @@ Figure 2. The organizational unit (OU) structure used in this guide.
|
||||
### Server details
|
||||
|
||||
- **DC01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as Active Directory Domain Controller, DNS Server, and DHCP Server in the contoso.com domain.
|
||||
|
||||
- Server name: DC01
|
||||
|
||||
- IP Address: 192.168.1.200
|
||||
|
||||
- Roles: DNS, DHCP, and Domain Controller
|
||||
|
||||
- **MDT01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as a member server in the contoso.com domain.
|
||||
|
||||
- Server name: MDT01
|
||||
|
||||
- IP Address: 192.168.1.210
|
||||
|
||||
- **CM01.** A Windows Server 2012 R2 Standard machine, fully patched with the latest security updates, and configured as a member server in the contoso.com domain.
|
||||
|
||||
- Server name: CM01
|
||||
|
||||
- IP Address: 192.168.1.214
|
||||
|
||||
### Client machine details
|
||||
|
||||
- **PC0001.** A Windows 10 Enterprise x64 machine, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This machine is referenced as the admin workstation.
|
||||
|
||||
- Client name: PC0001
|
||||
|
||||
- IP Address: DHCP
|
||||
|
||||
- **PC0002.** A Windows 7 SP1 Enterprise x64 machine, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This machine is referenced during the migration scenarios.
|
||||
|
||||
- Client name: PC0002
|
||||
|
||||
- IP Address: DHCP
|
||||
|
||||
## Sample files
|
||||
|
||||
|
||||
The information in this guide is designed to help you deploy Windows 10. In order to help you put the information you learn into practice more quickly, we recommend that you download a small set of sample files for the fictitious Contoso Corporation:
|
||||
|
||||
- [Gather.ps1](http://go.microsoft.com/fwlink/p/?LinkId=619361). This sample Windows PowerShell script performs the MDT Gather process in a simulated MDT environment. This allows you to test the MDT gather process and check to see if it is working correctly without performing a full Windows deployment.
|
||||
|
||||
- [Set-OUPermissions.ps1](http://go.microsoft.com/fwlink/p/?LinkId=619362). This sample Windows PowerShell script creates a domain account and then configures OU permissions to allow the account to join machines to the domain in the specified OU.
|
||||
|
||||
- [MDTSample.zip](http://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Microsoft Deployment Toolkit downloads and resources](http://go.microsoft.com/fwlink/p/?LinkId=618117)
|
||||
|
||||
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
||||
@ -119,12 +90,3 @@ The information in this guide is designed to help you deploy Windows 10. In ord
|
||||
[Sideload apps in Windows 10](sideload-apps-in-windows-10.md)
|
||||
|
||||
[Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,25 +2,25 @@
|
||||
title: Get started with the Microsoft Deployment Toolkit (MDT) (Windows 10)
|
||||
description: This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 in particular, as part of a Windows operating system deployment.
|
||||
ms.assetid: a256442c-be47-4bb9-a105-c831f58ce3ee
|
||||
keywords: ["deploy", "image", "feature", "install", "tools"]
|
||||
keywords: deploy, image, feature, install, tools
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Get started with the Microsoft Deployment Toolkit (MDT)
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), and MDT 2013 Update 2 in particular, as part of a Windows operating system deployment. MDT is one of the most important tools available to IT professionals today. You can use it to create reference images or as a complete deployment solution. MDT 2013 Update 2 also can be used to extend the operating system deployment features available in Microsoft System Center 2012 R2 Configuration Manager.
|
||||
|
||||
In addition to familiarizing you with the features and options available in MDT 2013 Update 2, this topic will walk you through the process of preparing for deploying Windows 10 using MDT by configuring Active Directory, creating an organizational unit (OU) structure, creating service accounts, configuring log files and folders, and installing the tools needed to view the logs and continue with the deployment process.
|
||||
|
||||
For the purposes of this topic, we will use two machines: DC01 and MDT01. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. MDT01 is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
For the purposes of this topic, we will use two machines: DC01 and MDT01. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. MDT01 is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see
|
||||
[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
|
||||

|
||||
|
||||
@ -28,16 +28,12 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
- [Key features in MDT 2013 Update 2](key-features-in-mdt-2013.md)
|
||||
|
||||
- [MDT 2013 Update 2 Lite Touch components](mdt-2013-lite-touch-components.md)
|
||||
|
||||
- [Prepare for deployment with MDT 2013 Update 2](prepare-for-windows-deployment-with-mdt-2013.md)
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Microsoft Deployment Toolkit downloads and documentation](http://go.microsoft.com/fwlink/p/?LinkId=618117)
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
@ -51,12 +47,3 @@ Figure 1. The machines used in this topic.
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,14 +5,15 @@ ms.assetid: 09a2c595-1a61-4da6-bd46-4ba8763cfd4f
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Import and Export VAMT Data
|
||||
You can use the Volume Activation Management Tool (VAMT) to import product-activation data from a Computer Information List (.cilx or .cil) file into SQL Server, and to export product-activation data into a .cilx file. A .cilx file is an XML file that stores computer and product-activation data. You can import data or export data during the following scenarios:
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) to import product-activation data from a Computer Information List (.cilx or .cil) file into SQL Server, and to export product-activation data into a .cilx file. A .cilx file is an XML file that stores computer and product-activation data.
|
||||
You can import data or export data during the following scenarios:
|
||||
- Import and merge data from previous versions of VAMT.
|
||||
|
||||
- Export data to use to perform proxy activations.
|
||||
|
||||
**Warning**
|
||||
@ -21,37 +22,25 @@ Editing a .cilx file using an application other than VAMT can corrupt the .cilx
|
||||
## Import VAMT Data
|
||||
|
||||
**To import data into VAMT**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box.
|
||||
|
||||
3. In the **Import List** dialog box, navigate to the .cilx file location, select the file, and click **Open**.
|
||||
|
||||
4. In the **Volume Activation Management Tool** dialog box, click **OK** to begin the import. VAMT displays a progress message while the file is being imported. Click **OK** when a message appears and confirms that the import has completed successfully.
|
||||
|
||||
## Export VAMT Data
|
||||
|
||||
Exporting VAMT data from a non-Internet-connected VAMT host computer is the first step of proxy activation using multiple VAMT hosts. To export product-activation data to a .cilx file:
|
||||
|
||||
1. In the left-side pane, you can click a product you want to export data for, or click **Products** if the list contains data for all products.
|
||||
|
||||
2. If you want to export only part of the data in a product list, in the product list view in the center pane select the products you want to export.
|
||||
|
||||
3. In the right-side **Actions** pane on, click **Export list** to open the **Export List** dialog box.
|
||||
|
||||
4. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file.
|
||||
|
||||
5. Under **Export options**, select one of the following data-type options:
|
||||
|
||||
- Export products and product keys
|
||||
|
||||
- Export products only
|
||||
|
||||
- Export proxy activation data only. Selecting this option ensures that the export contains only the licensing information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is checked.
|
||||
|
||||
6. If you have selected products to export, select the **Export selected product rows only** check box.
|
||||
|
||||
7. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Perform Proxy Activation](proxy-activation-vamt.md)
|
@ -5,13 +5,16 @@ ms.assetid: 5c7ae9b9-0dbc-4277-bc4f-8b3e4ab0bf50
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Install and Configure VAMT
|
||||
|
||||
This section describes how to install and configure the Volume Activation Management Tool (VAMT).
|
||||
|
||||
## In this Section
|
||||
|
||||
|Topic |Description |
|
||||
|------|------------|
|
||||
|[VAMT Requirements](vamt-requirements.md) |Provides system requirements for installing VAMT on a host computer. |
|
||||
@ -19,13 +22,7 @@ This section describes how to install and configure the Volume Activation Manage
|
||||
|[Configure Client Computers](configure-client-computers-vamt.md) |Describes how to configure client computers on your network to work with VAMT. |
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Introduction to VAMT](introduction-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,35 +5,27 @@ ms.assetid: d234468e-7917-4cf5-b0a8-4968454f7759
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Install a KMS Client Key
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys. For example, if you are converting a MAK-activated product to KMS activation.
|
||||
|
||||
**Note**
|
||||
By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products.
|
||||
|
||||
**To install a KMS Client key**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the left-side pane click **Products** to open the product list view in the center pane.
|
||||
|
||||
3. In the products list view in the center pane, select the products that need to have GVLKs installed. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
6. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||
|
||||
7. The **Install Product Key** dialog box displays the keys that are available to be installed.
|
||||
|
||||
8. Select the **Automatically select an AD or KMS client key** option and then click **Install Key**.
|
||||
|
||||
VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
@ -41,4 +33,5 @@ By default, volume license editions of Windows Vista, Windows® 7, Windows 8,
|
||||
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Perform KMS Activation](kms-activation-vamt.md)
|
@ -5,49 +5,35 @@ ms.assetid: 78812c87-2208-4f8b-9c2c-5a8a18b2d648
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Install a Product Key
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK).
|
||||
|
||||
**To install a Product key**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the left-side pane, click the product that you want to install keys onto.
|
||||
|
||||
3. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**.
|
||||
|
||||
6. In the products list view in the center pane, sort the list if needed and then select the products that need to have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||
|
||||
7. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||
|
||||
8. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAK based on the selected products. You can select a recommended product key or a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
||||
|
||||
9. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct MAK or KMS Host key (CSVLK), see [How to Choose the Right Volume License Key for Windows](http://go.microsoft.com/fwlink/p/?linkid=238382).
|
||||
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct MAK or KMS Host key (CSVLK), see [How to Choose the Right
|
||||
Volume License Key for Windows](http://go.microsoft.com/fwlink/p/?linkid=238382).
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Manage Product Keys](manage-product-keys-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,13 +5,16 @@ ms.assetid: 2eabd3e2-0a68-43a5-8189-2947e46482fc
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Install VAMT
|
||||
|
||||
This topic describes how to install the Volume Activation Management Tool (VAMT).
|
||||
|
||||
## Install VAMT
|
||||
|
||||
You can install VAMT as part of the [Windows Assessment and Deployment Kit (ADK)](http://go.microsoft.com/fwlink/p/?LinkId=526740) for Windows 10.
|
||||
|
||||
**Important**
|
||||
@ -22,15 +25,12 @@ The VAMT Microsoft Management Console snap-in ships as an x86 package.
|
||||
|
||||
After you install VAMT, if you have a computer information list (CIL) that was created in a previous version of VAMT, you must import the list into a SQL database. If you do not have SQL installed, you can download a free copy of Microsoft SQL Server Express and create a new database into which you can import the CIL. To install SQL Server Express:
|
||||
1. Install the Windows ADK.
|
||||
|
||||
2. Ensure that **Volume Activation Management Tool** and **Microsoft® SQL Server® 2012 Express** are selected to be installed.
|
||||
|
||||
3. Click **Install**.
|
||||
|
||||
|
||||
## Select a Database
|
||||
**Using a SQL database installed during ADK setup**
|
||||
|
||||
**Using a SQL database installed during ADK setup**
|
||||
If SQL Server 2012 Express was installed during ADK setup, the default database name will be **ADK**.By default, VAMT is configure to use a SQL database that is installed on the local machine during ADK setup and displays the server name as **.\\ADK**. If the SQL database was installed on another machine, you must configure the database to allow remote connections and you must provide the corresponding server name. If a new VAMT database needs to be created, provide a name for the new database.
|
||||
|
||||
**Using a SQL database installed outside of ADK setup**
|
||||
@ -38,20 +38,12 @@ If SQL Server 2012 Express was installed during ADK setup, the default database
|
||||
You must configure SQL installation to allow remote connections and you must provide the corresponding server name in the format: *Machine Name\\SQL Server Name*. If a new VAMT database needs to be created, provide a name for the new database.
|
||||
|
||||
## Uninstall VAMT
|
||||
|
||||
To uninstall VAMT via the **Programs and Features** Control Panel:
|
||||
|
||||
1. Open the **Control Panel** and select **Programs and Features**.
|
||||
|
||||
2. Select **Assessment and Deployment Kit** from the list of installed programs and click **Change**. Follow the instructions in the Windows ADK installer to remove VAMT.
|
||||
|
||||
## Related topics
|
||||
- [Install and Configure VAMT](install-configure-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,7 +2,8 @@
|
||||
title: Integrate Configuration Manager with MDT 2013 Update 2 (Windows 10)
|
||||
description: This topic will help you understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy a new or updated version of the Windows operating system.
|
||||
ms.assetid: 3bd1cf92-81e5-48dc-b874-0f5d9472e5a5
|
||||
keywords: ["deploy, image, customize, task sequence"]
|
||||
ms.pagetype: mdt
|
||||
keywords: deploy, image, customize, task sequence
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
@ -11,18 +12,14 @@ author: mtniehaus
|
||||
|
||||
# Integrate Configuration Manager with MDT 2013 Update 2
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic will help you understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy a new or updated version of the Windows operating system.
|
||||
|
||||
MDT 2013 is a free, supported download from Microsoft that adds approximately 280 enhancements to Windows operating system deployment with System Center 2012 R2 Configuration Manager SP1. It is, therefore, recommended that you utilize MDT when deploying the Windows operating system with Configuration Manager SP1. In addition to integrating MDT with Configuration Manager, we also recommend using MDT Lite Touch to create the Windows 10 reference images used in Configuration Manager. For more information on how to create a reference image, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
|
||||
## <a href="" id="sec01"></a>Why integrate MDT 2013 Update 2 with Configuration Manager
|
||||
|
||||
|
||||
As noted above, MDT adds many enhancements to Configuration Manager. While these enhancements are called Zero Touch, that name does not reflect how deployment is conducted. The following sections provide a few samples of the 280 enhancements that MDT 2013 Update 2 adds to Configuration Manager.
|
||||
|
||||
### MDT enables dynamic deployment
|
||||
@ -30,18 +27,14 @@ As noted above, MDT adds many enhancements to Configuration Manager. While these
|
||||
When MDT is integrated with Configuration Manager, the task sequence takes additional instructions from the MDT rules. In its most simple form, these settings are stored in a text file, the CustomSettings.ini file, but you can store the settings in Microsoft SQL Server databases, or have Microsoft Visual Basic Scripting Edition (VBScripts) or web services provide the settings used.
|
||||
|
||||
The task sequence uses instructions that allow you to reduce the number of task sequences in Configuration Manager and instead store settings outside the task sequence. Here are a few examples:
|
||||
|
||||
- The following settings instruct the task sequence to install the HP Hotkeys package, but only if the hardware is a HP EliteBook 8570w. Note that you don't have to add the package to the task sequence.
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Model
|
||||
[HP EliteBook 8570w]
|
||||
Packages001=PS100010:Install HP Hotkeys
|
||||
```
|
||||
|
||||
- The following settings instruct the task sequence to put laptops and desktops in different organizational units (OUs) during deployment, assign different computer names, and finally have the task sequence install the Cisco VPN client, but only if the machine is a laptop.
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority= ByLaptopType, ByDesktopType
|
||||
@ -90,24 +83,16 @@ MDT Zero Touch simply extends Configuration Manager with many useful built-in op
|
||||
|
||||
## <a href="" id="sec02"></a>Why use MDT Lite Touch to create reference images
|
||||
|
||||
|
||||
You can create reference images for Configuration Manager in Configuration Manager, but in general we recommend creating them in MDT Lite Touch for the following reasons:
|
||||
|
||||
- In a deployment project, it is typically much faster to create a reference image using MDT Lite Touch than Configuration Manager.
|
||||
|
||||
- You can use the same image for every type of operating system deployment - Microsoft Virtual Desktop Infrastructure (VDI), Microsoft System Center 2012 R2 Virtual Machine Manager (SCVMM), MDT, Configuration Manager, Windows Deployment Services (WDS), and more.
|
||||
|
||||
- Microsoft System Center 2012 R2 performs deployment in the LocalSystem context. This means that you cannot configure the Administrator account with all of the settings that you would like to be included in the image. MDT runs in the context of the Local Administrator, which means you can configure the look and feel of the configuration and then use the CopyProfile functionality to copy these changes to the default user during deployment.
|
||||
|
||||
- The Configuration Manager task sequence does not suppress user interface interaction.
|
||||
|
||||
- MDT Lite Touch supports a Suspend action that allows for reboots, which is useful when you need to perform a manual installation or check the reference image before it is automatically captured.
|
||||
|
||||
- MDT Lite Touch does not require any infrastructure and is easy to delegate.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
|
||||
@ -122,15 +107,7 @@ You can create reference images for Configuration Manager in Configuration Manag
|
||||
|
||||
[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
|
||||
|
||||
|
||||
[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||
|
||||
[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||
|
@ -5,10 +5,12 @@ ms.assetid: 0439685e-0bae-4967-b0d4-dd84ca6d7fa7
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Introduction to VAMT
|
||||
|
||||
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office®, and select other Microsoft products volume and retail activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in and can be installed on any computer that has one of the following Windows operating systems: Windows® 7, Windows 8, Windows 8.1, Windows 10,Windows Server 2008 R2, or Windows Server 2012.
|
||||
|
||||
**Note**
|
||||
@ -16,59 +18,44 @@ VAMT can be installed on, and can manage, physical or virtual instances. VAMT ca
|
||||
|
||||
## In this Topic
|
||||
- [Managing Multiple Activation Key (MAK) and Retail Activation](#bkmk-managingmak)
|
||||
|
||||
- [Managing Key Management Service (KMS) Activation](#bkmk-managingkms)
|
||||
|
||||
- [Enterprise Environment](#bkmk-enterpriseenvironment)
|
||||
|
||||
- [VAMT User Interface](#bkmk-userinterface)
|
||||
|
||||
## Managing Multiple Activation Key (MAK) and Retail Activation
|
||||
|
||||
You can use a MAK or a retail product key to activate Windows, Windows Server, or Office on an individual computer or a group of computers. VAMT enables two different activation scenarios:
|
||||
|
||||
- **Online activation.** Many enterprises maintain a single Windows system image or Office installation package for deployment across the enterprise. Occasionally there is also a need to use retail product keys in special situations. Online activation enables you to activate over the Internet any products installed with MAK, KMS host, or retail product keys on one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
||||
|
||||
- **Proxy activation.** This activation method enables you to perform volume activation for products installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS Host key (CSVLK), or retail product key to one or more client products and collects the installation ID (IID) from each client product. The VAMT host sends the IIDs to Microsoft on behalf of the client products and obtains the corresponding Confirmation IDs (CIDs). The VAMT host then installs the CIDs on the client products to complete the activation. Using this method, only the VAMT host computer needs Internet access. You can also activate products installed on computers in a workgroup that is completely isolated from any larger network, by installing a second instance of VAMT on a computer within the workgroup. Then, use removable media to transfer activation data between this new instance of VAMT and the Internet-connected VAMT host.
|
||||
|
||||
## Managing Key Management Service (KMS) Activation
|
||||
In addition to MAK or retail activation, you can use VAMT to perform volume activation using the Key Management Service (KMS). VAMT can install and activate GVLK (KMS client) keys on client products. GVLKs are the default product keys used by Volume License editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 as well as Microsoft Office 2010.
|
||||
|
||||
In addition to MAK or retail activation, you can use VAMT to perform volume activation using the Key Management Service (KMS). VAMT can install and activate GVLK (KMS client) keys on client products. GVLKs are the default product keys used by Volume License editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 as well as Microsoft Office 2010.
|
||||
VAMT treats a KMS Host key (CSVLK) product key identically to a retail-type product key; therefore, the experience for product key entry and activation management are identical for both these product key types.
|
||||
|
||||
## Enterprise Environment
|
||||
|
||||
VAMT is commonly implemented in enterprise environments. The following illustrates three common environments—Core Network, Secure Zone, and Isolated Lab.
|
||||
|
||||

|
||||
|
||||
In the Core Network environment, all computers are within a common network managed by Active Directory® Domain Services (AD DS). The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|
||||
|
||||
The Isolated Lab environment is a workgroup that is physically separate from the Core Network, and its computers do not have Internet access. The network security policy states that no information that could identify a specific computer or user may be transferred out of the Isolated Lab.
|
||||
|
||||
## VAMT User Interface
|
||||
|
||||
The following screenshot shows the VAMT graphical user interface.
|
||||
|
||||

|
||||
|
||||
VAMT provides a single, graphical user interface for managing activations, and for performing other activation-related tasks such as:
|
||||
|
||||
- **Adding and removing computers.** You can use VAMT to discover computers in the local environment. VAMT can discover computers by querying AD DS, workgroups, by individual computer name or IP address, or via a general LDAP query.
|
||||
|
||||
- **Discovering products.** You can use VAMT to discover Windows, Windows Server, Office, and select other products installed on the client computers.
|
||||
|
||||
- **Monitoring activation status.** You can collect activation information about each product, including the last 5 characters of the product key being used, the current license state (such as Licensed, Grace, Unlicensed), and the product edition information.
|
||||
|
||||
- **Managing product keys.** You can store multiple product keys and use VAMT to install these keys to remote client products. You can also determine the number of activations remaining for MAKs.
|
||||
|
||||
- **Managing activation data.** VAMT stores activation data in a SQL database. VAMT can export this data to other VAMT hosts or to an archive in XML format.
|
||||
|
||||
## Related topics
|
||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,34 +2,27 @@
|
||||
title: Key features in MDT 2013 Update 2 (Windows 10)
|
||||
description: The Microsoft Deployment Toolkit (MDT) has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0.
|
||||
ms.assetid: 858e384f-e9db-4a93-9a8b-101a503e4868
|
||||
keywords: ["deploy, feature, tools, upgrade, migrate, provisioning"]
|
||||
keywords: deploy, feature, tools, upgrade, migrate, provisioning
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Key features in MDT 2013 Update 2
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
The Microsoft Deployment Toolkit (MDT) has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0. The toolkit has evolved, both in functionality and popularity, and today it is considered fundamental to Windows operating system and enterprise application deployment.
|
||||
|
||||
MDT 2013 has many useful features, the most important of which are:
|
||||
|
||||
- **Windows Client support.** Supports Windows 7, Windows 8, Windows 8.1, and Windows 10.
|
||||
|
||||
- **Windows Server support.** Supports Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.
|
||||
|
||||
- **Additional operating systems support.** Supports Windows Thin PC and Windows Embedded POSReady 7, as well as Windows 8.1 Embedded Industry.
|
||||
|
||||
- **UEFI support.** Supports deployment to machines using Unified Extensible Firmware Interface (UEFI) version 2.3.1.
|
||||
|
||||
- **GPT support.** Supports deployment to machines that require the new GUID (globally unique identifier) partition table (GPT) format. This is related to UEFI.
|
||||
|
||||
- **Enhanced Windows PowerShell support.** Provides support for running PowerShell scripts.
|
||||
|
||||

|
||||
@ -37,23 +30,14 @@ MDT 2013 has many useful features, the most important of which are:
|
||||
Figure 2. The deployment share mounted as a standard PSDrive allows for administration using PowerShell.
|
||||
|
||||
- **Add local administrator accounts.** Allows you to add multiple user accounts to the local Administrators group on the target computers, either via settings or the deployment wizard.
|
||||
|
||||
- **Automated participation in CEIP and WER.** Provides configuration for participation in Windows Customer Experience Improvement Program (CEIP) and Windows Error Reporting (WER).
|
||||
|
||||
- **Deploy Windows RE.** Enables deployment of a customized Windows Recovery Environment (Windows RE) as part of the task sequence.
|
||||
|
||||
- **Deploy to VHD.** Provides ready-made task sequence templates for deploying Windows into a virtual hard disk (VHD) file.
|
||||
|
||||
- **Improved deployment wizard.** Provides additional progress information and a cleaner UI for the Lite Touch Deployment Wizard.
|
||||
|
||||
- **Monitoring.** Allows you to see the status of currently running deployments.
|
||||
|
||||
- **Apply GPO Pack.** Allows you to deploy local group policy objects created by Microsoft Security Compliance Manager (SCM).
|
||||
|
||||
- **Partitioning routines.** Provides improved partitioning routines to ensure that deployments work regardless of the current hard drive structure.
|
||||
|
||||
- **Offline BitLocker.** Provides the capability to have BitLocker enabled during the Windows Preinstallation Environment (Windows PE) phase, thus saving hours of encryption time.
|
||||
|
||||
- **USMT offline user-state migration.** Provides support for running the User State Migration Tool (USMT) capture offline, during the Windows PE phase of the deployment.
|
||||
|
||||

|
||||
@ -61,31 +45,17 @@ MDT 2013 has many useful features, the most important of which are:
|
||||
Figure 3. The offline USMT backup in action.
|
||||
|
||||
- **Install or uninstall Windows roles or features.** Enables you to select roles and features as part of the deployment wizard. MDT also supports uninstall of roles and features.
|
||||
|
||||
- **Microsoft System Center 2012 Orchestrator integration.** Provides the capability to use Orchestrator runbooks as part of the task sequence.
|
||||
|
||||
- **Support for DaRT.** Supports optional integration of the DaRT components into the boot image.
|
||||
|
||||
- **Support for Office 2013.** Provides added support for deploying Microsoft Office Professional Plus 2013.
|
||||
|
||||
- **Support for Modern UI app package provisioning.** Provisions applications based on the new Windows app package standard, which is used in Windows 8 and later.
|
||||
|
||||
- **Extensibility.** Provides the capability to extend MDT far beyond the built-in features by adding custom scripts, web services, System Center Orchestrator runbooks, PowerShell scripts, and VBScripts.
|
||||
|
||||
- **Upgrade task sequence.** Provides a new upgrade task sequence template that you can use to upgrade existing Windows 7, Windows 8, and Windows 8.1 systems directly to Windows 10, automatically preserving all data, settings, applications, and drivers. For more information about using this new upgrade task sequence, refer to the [Microsoft Deployment Toolkit resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117).
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Prepare for deployment with MDT 2013 Update 2](prepare-for-windows-deployment-with-mdt-2013.md)
|
||||
|
||||
[MDT 2013 Update 2 Lite Touch components](mdt-2013-lite-touch-components.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,66 +5,40 @@ ms.assetid: 5a3ae8e6-083e-4153-837e-ab0a225c1d10
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Perform KMS Activation
|
||||
|
||||
The Volume Activation Management Tool (VAMT) can be used to perform volume activation using the Key Management Service (KMS). You can use VAMT to activate Generic Volume Licensing Keys, or KMS client keys, on products accessible to VAMT. GVLKs are the default product keys used by the volume-license editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft Office 2010. GVLKs are already installed in volume-license editions of these products.
|
||||
|
||||
## Requirements
|
||||
|
||||
Before configuring KMS activation, ensure that your network and VAMT installation meet the following requirements:
|
||||
|
||||
- KMS host is set up and enabled.
|
||||
|
||||
- KMS clients can access the KMS host.
|
||||
|
||||
- VAMT is installed on a central computer with network access to all client computers.
|
||||
|
||||
- The products to be activated have been added to VAMT. For more information on adding product keys, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
||||
|
||||
- VAMT has administrative permissions on all computers to be activated, and Windows Management Instrumentation (WMI) is accessible through the Windows Firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
## To configure devices for KMS activation
|
||||
|
||||
**To configure devices for KMS activation**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. If necessary, set up the KMS activation preferences. If you don’t need to set up the preferences, skip to step 6 in this procedure. Otherwise, continue to step 2.
|
||||
|
||||
3. To set up the preferences, on the menu bar click **View**, then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
||||
|
||||
4. Under **Key Management Services host selection**, select one of the following options:
|
||||
|
||||
- **Find a KMS host automatically using DNS (default)**. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the Domain Name Service (DNS) to locate a KMS host and attempt activation.
|
||||
|
||||
- **Find a KMS host using DNS in this domain for supported products**. Enter the domain name. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the DNS in the specified domain to locate a KMS host and attempt activation.
|
||||
|
||||
- **Use specific KMS host**. Enter the KMS host name and KMS host port. For environments which do not use DNS for KMS host identification, VAMT sets the specified KMS host name and KMS host port on the target computer, and then instructs the computer to attempt activation with the specific KMS host.
|
||||
|
||||
5. Click **Apply**, and then click **OK** to close the **Volume Activation Management Tool Preferences** dialog box.
|
||||
|
||||
6. Select the products to be activated by selecting individual products in the product list view in the center pane. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
8. In the right-side pane, click **Activate** in the **Selected Items** menu, and then click **Volume activate**.
|
||||
|
||||
9. Click a credential option. Choose **Alternate credentials** only if you are activating products that require administrator credentials different from the ones you are currently using.
|
||||
|
||||
10. If you are supplying alternate credentials, at the prompt, type the appropriate user name and password and click **OK**.
|
||||
|
||||
VAMT displays the **Volume Activation** dialog box until it completes the requested action. When the process is finished, the updated activation status of each product appears in the product list view in the center pane.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,12 +5,13 @@ ms.assetid: aacd5ded-da11-4d27-a866-3f57332f5dec
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Perform Local Reactivation
|
||||
If you reinstall Windows® or Microsoft® Office 2010 on a computer that was initially activated using proxy activation (MAK, retail, or CSLVK (KMS host)), and have not made significant changes to the hardware, use this local reactivation procedure to reactivate the program on that computer.
|
||||
|
||||
If you reinstall Windows® or Microsoft® Office 2010 on a computer that was initially activated using proxy activation (MAK, retail, or CSLVK (KMS host)), and have not made significant changes to the hardware, use this local reactivation procedure to reactivate the program on that computer.
|
||||
Local reactivation relies upon data that was created during the initial proxy activation and stored in the Volume Activation Management Tool (VAMT) database. The database contains the installation ID (IID) and confirmation ID (Pending CID). Local reactivation uses this data to reapply the CID and reactivate those products. Reapplying the same CID conserves the remaining activations on the key.
|
||||
|
||||
**Note**
|
||||
@ -19,34 +20,23 @@ During the initial proxy activation, the CID is bound to a digital “fingerprin
|
||||
## To Perform a Local Reactivation
|
||||
|
||||
**To perform a local reactivation**
|
||||
|
||||
1. Open VAMT. Make sure that you are connected to the desired database.
|
||||
|
||||
2. In the left-side pane, click the product you want to reactivate to display the products list.
|
||||
|
||||
3. In the product list view in the center pane, select the desired products to be reactivated. You can sort the list by computer name by clicking on the **Computer Name** heading. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
6. In the right-side pane, click **Activate**, and then click **Apply Confirmation ID**.
|
||||
|
||||
7. Click a credential option. Choose **Alternate credentials** only if you are reactivating products that require administrator credentials different from the ones you are currently using.
|
||||
|
||||
8. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||
|
||||
VAMT displays the **Apply Confirmation ID** dialog box.
|
||||
|
||||
10. If you are using a different product key than the product key used for initial activation, you must complete a new activation to obtain a new CID.
|
||||
|
||||
11. If you are activating a product that requires administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** check box.
|
||||
|
||||
12. Click **OK**.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Manage Activations](manage-activations-vamt.md)
|
@ -5,10 +5,12 @@ ms.assetid: 53bad9ed-9430-4f64-a8de-80613870862c
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Manage Activations
|
||||
|
||||
This section describes how to activate a client computer, by using a variety of activation methods.
|
||||
|
||||
## In this Section
|
||||
@ -21,14 +23,6 @@ This section describes how to activate a client computer, by using a variety of
|
||||
|[Perform Local Reactivation](local-reactivation-vamt.md) |Describes how to reactivate an operating system or Office program that was reinstalled. |
|
||||
|[Activate an Active Directory Forest Online](activate-forest-vamt.md) |Describes how to use Active Directory-Based Activation to online activate an Active Directory forest. |
|
||||
|[Activate by Proxy an Active Directory Forest](activate-forest-by-proxy-vamt.md) |Describes how to use Active Directory-Based Activation to proxy activate an Active Directory forest that is not connected to the Internet. |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,12 +5,13 @@ ms.assetid: 4c6c4216-b4b7-437c-904e-4cb257f913cd
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Manage Product Keys
|
||||
This section describes how to add and remove a product key from the Volume Activation Management Tool (VAMT). After you add a product key to VAMT, you can install that product key on a product or products you select in the VAMT database.
|
||||
|
||||
This section describes how to add and remove a product key from the Volume Activation Management Tool (VAMT). After you add a product key to VAMT, you can install that product key on a product or products you select in the VAMT database.
|
||||
## In this Section
|
||||
|
||||
|Topic |Description |
|
||||
@ -19,12 +20,5 @@ This section describes how to add and remove a product key from the Volume Activ
|
||||
|[Install a Product Key](install-product-key-vamt.md) |Describes how to install a product key for specific product. |
|
||||
|[Install a KMS Client Key](install-kms-client-key-vamt.md) |Describes how to install a GVLK (KMS client) key. |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,14 +5,15 @@ ms.assetid: 233eefa4-3125-4965-a12d-297a67079dc4
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Manage VAMT Data
|
||||
|
||||
This section describes how to save, import, export, and merge a Computer Information List (CILX) file using the Volume Activation Management Tool (VAMT).
|
||||
|
||||
## In this Section
|
||||
|
||||
|Topic |Description |
|
||||
|------|------------|
|
||||
|[Import and Export VAMT Data](import-export-vamt-data.md) |Describes how to import and export VAMT data. |
|
||||
|
@ -2,22 +2,20 @@
|
||||
title: MDT 2013 Update 2 Lite Touch components (Windows 10)
|
||||
description: This topic provides an overview of the features in the Microsoft Deployment Toolkit (MDT) 2013 Update 2 that support Lite Touch Installation (LTI) for Windows 10.
|
||||
ms.assetid: 7d6fc159-e338-439e-a2e6-1778d0da9089
|
||||
keywords: ["deploy, install, deployment, boot, log, monitor"]
|
||||
keywords: deploy, install, deployment, boot, log, monitor
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# MDT 2013 Update 2 Lite Touch components
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic provides an overview of the features in the Microsoft Deployment Toolkit (MDT) 2013 Update 2 that support Lite Touch Installation (LTI) for Windows 10. An LTI deployment strategy requires very little infrastructure or user interaction, and can be used to deploy an operating system from a network share or from a physical media, such as a USB flash drive or disc.
|
||||
|
||||
When deploying the Windows operating system using MDT, most of the administration and configuration is done through the Deployment Workbench, but you also can perform many of the tasks using Windows PowerShell. The easiest way to find out how to use PowerShell in MDT is to use the Deployment Workbench to perform an operation and at the end of that task, click View Script. That will give you the PowerShell command.
|
||||
|
||||

|
||||
@ -26,22 +24,15 @@ Figure 4. If you click **View Script** on the right side, you will get the Power
|
||||
|
||||
## <a href="" id="sec01"></a>Deployment shares
|
||||
|
||||
|
||||
A deployment share is essentially a folder on the server that is shared and contains all the setup files and scripts needed for the deployment solution. It also holds the configuration files (called rules) that are gathered when a machine is deployed. These configuration files can reach out to other sources, like a database, external script, or web server to get additional settings for the deployment. For Lite Touch deployments, it is common to have two deployment shares: one for creating the reference images and one for deployment. For Zero Touch, it is common to have only the deployment share for creating reference images because Microsoft System Center 2012 R2 Configuration Manager deploys the image in the production environment.
|
||||
|
||||
## <a href="" id="sec02"></a>Rules
|
||||
|
||||
|
||||
The rules (CustomSettings.ini and Bootstrap.ini) make up the brain of MDT. The rules control the Windows Deployment Wizard on the client and, for example, can provide the following settings to the machine being deployed:
|
||||
|
||||
- Computer name
|
||||
|
||||
- Domain to join, and organizational unit (OU) in Active Directory to hold the computer object
|
||||
|
||||
- Whether to enable BitLocker
|
||||
|
||||
- Regional settings
|
||||
|
||||
You can manage hundreds of settings in the rules. For more information, see the [Microsoft Deployment Toolkit resource center](http://go.microsoft.com/fwlink/p/?LinkId=618117).
|
||||
|
||||

|
||||
@ -50,118 +41,78 @@ Figure 5. Example of a MDT rule. In this example, the new computer name is being
|
||||
|
||||
## <a href="" id="sec03"></a>Boot images
|
||||
|
||||
|
||||
Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment. They can be started from a CD or DVD, an ISO file, a USB device, or over the network using a Pre-Boot Execution Environment (PXE) server. The boot images connect to the deployment share on the server and start the deployment.
|
||||
Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment. They can be started from a CD or DVD, an ISO file, a USB device, or over the network using a Pre-Boot Execution Environment (PXE) server. The boot images connect to the deployment
|
||||
share on the server and start the deployment.
|
||||
|
||||
## <a href="" id="sec04"></a>Operating systems
|
||||
|
||||
|
||||
Using the Deployment Workbench, you import the operating systems you want to deploy. You can import either the full source (like the full Windows 10 DVD/ISO) or a custom image that you have created. The full-source operating systems are primarily used to create reference images; however, they also can be used for normal deployments.
|
||||
|
||||
## <a href="" id="sec05"></a>Applications
|
||||
|
||||
|
||||
Using the Deployment Workbench, you also add the applications you want to deploy. MDT supports virtually every executable Windows file type. The file can be a standard .exe file with command-line switches for an unattended install, a Microsoft Windows Installer (MSI) package, a batch file, or a VBScript. In fact, it can be just about anything that can be executed unattended. MDT also supports the new Universal Windows apps.
|
||||
|
||||
## <a href="" id="sec06"></a>Driver repository
|
||||
|
||||
|
||||
You also use the Deployment Workbench to import the drivers your hardware needs into a driver repository that lives on the server, not in the image.
|
||||
|
||||
## <a href="" id="sec07"></a>Packages
|
||||
|
||||
|
||||
With the Deployment Workbench, you can add any Microsoft packages that you want to use. The most commonly added packages are language packs, and the Deployment Workbench Packages node works well for those. You also can add security and other updates this way. However, we generally recommend that you use Windows Server Update Services (WSUS) for operating system updates. The rare exceptions are critical hotfixes that are not available via WSUS, packages for the boot image, or any other package that needs to be deployed before the WSUS update process starts.
|
||||
|
||||
## <a href="" id="sec08"></a>Task sequences
|
||||
|
||||
|
||||
Task sequences are the heart and soul of the deployment solution. When creating a task sequence, you need to select a template. The templates are located in the Templates folder in the MDT installation directory, and they determine which default actions are present in the sequence.
|
||||
|
||||
You can think of a task sequence as a list of actions that need to be executed in a certain order. Each action can also have conditions. Some examples of actions are as follows:
|
||||
|
||||
- **Gather.** Reads configuration settings from the deployment server.
|
||||
|
||||
- **Format and Partition.** Creates the partition(s) and formats them.
|
||||
|
||||
- **Inject Drivers.** Finds out which drivers the machine needs and downloads them from the central driver repository.
|
||||
|
||||
- **Apply Operating System.** Uses ImageX to apply the image.
|
||||
|
||||
- **Windows Update.** Connects to a WSUS server and updates the machine.
|
||||
|
||||
## <a href="" id="sec09"></a>Task sequence templates
|
||||
|
||||
|
||||
MDT comes with nine default task sequence templates. You can also create your own templates. As long as you store them in the Templates folder, they will be available when you create a new task sequence.
|
||||
|
||||
- **Sysprep and Capture task sequence.** Used to run the System Preparation (Sysprep) tool and capture an image of a reference computer.
|
||||
|
||||
**Note**
|
||||
It is preferable to use a complete build and capture instead of the Sysprep and Capture task sequence. A complete build and capture can be automated, whereas Sysprep and Capture cannot.
|
||||
|
||||
|
||||
|
||||
- **Standard Client task sequence.** The most frequently used task sequence. Used for creating reference images and for deploying clients in production.
|
||||
|
||||
- **Standard Client Replace task sequence.** Used to run User State Migration Tool (USMT) backup and the optional full Windows Imaging (WIM) backup action. Can also be used to do a secure wipe of a machine that is going to be decommissioned.
|
||||
|
||||
- **Custom task sequence.** As the name implies, a custom task sequence with only one default action (one Install Application action).
|
||||
|
||||
- **Standard Server task sequence.** The default task sequence for deploying operating system images to servers. The main difference between this template and the Standard Client task sequence template is that it does not contain any USMT actions because USMT is not supported on servers.
|
||||
|
||||
- **Lite Touch OEM task sequence.** Used to preload operating systems images on the computer hard drive. Typically used by computer original equipment manufacturers (OEMs) but some enterprise organizations also use this feature.
|
||||
|
||||
- **Post OS Installation task sequence.** A task sequence prepared to run actions after the operating system has been deployed. Very useful for server deployments but not often used for client deployments.
|
||||
|
||||
- **Deploy to VHD Client task sequence.** Similar to the Standard Client task sequence template but also creates a virtual hard disk (VHD) file on the target computer and deploys the image to the VHD file.
|
||||
|
||||
- **Deploy to VHD Server task sequence.** Same as the Deploy to VHD Client task sequence but for servers.
|
||||
|
||||
- **Standard Client Upgrade task sequence.** A simple task sequence template used to perform an in-place upgrade from Windows 7, Windows 8, or Windows 8.1 directly to Windows 10, automatically preserving existing data, settings, applications, and drivers.
|
||||
|
||||
## <a href="" id="sec10"></a>Selection profiles
|
||||
|
||||
|
||||
Selection profiles, which are available in the Advanced Configuration node, provide a way to filter content in the Deployment Workbench. Selection profiles are used for several purposes in the Deployment Workbench and in Lite Touch deployments. For example, they can be used to:
|
||||
|
||||
- Control which drivers and packages are injected into the Lite Touch (and generic) boot images.
|
||||
|
||||
- Control which drivers are injected during the task sequence.
|
||||
|
||||
- Control what is included in any media that you create.
|
||||
|
||||
- Control what is replicated to other deployment shares.
|
||||
|
||||
- Filter which task sequences and applications are displayed in the Deployment Wizard.
|
||||
|
||||
## <a href="" id="sec11"></a>Logging
|
||||
|
||||
|
||||
MDT uses many log files during operating system deployments. By default the logs are client side, but by configuring the deployment settings, you can have MDT store them on the server, as well.
|
||||
|
||||
**Note**
|
||||
The easiest way to view log files is to use Configuration Manager Trace (CMTrace), which is included in the [System Center 2012 R2 Configuration Manager Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=734717).
|
||||
|
||||
|
||||
|
||||
## <a href="" id="sec12"></a>Monitoring
|
||||
|
||||
|
||||
On the deployment share, you also can enable monitoring. After you enable monitoring, you will see all running deployments in the Monitor node in the Deployment Workbench.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Key features in MDT 2013 Update 2](key-features-in-mdt-2013.md)
|
||||
|
||||
[Prepare for deployment with MDT 2013 Update 2](prepare-for-windows-deployment-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Monitor activation (Windows 10)
|
||||
ms.assetid: 264a3e86-c880-4be4-8828-bf4c839dfa26
|
||||
description:
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: CFaw
|
||||
---
|
||||
|
||||
# Monitor activation
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -25,27 +26,15 @@ author: CFaw
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
You can monitor the success of the activation process for a computer running Windows 8.1 in several ways. The most popular methods include:
|
||||
|
||||
- Using the Volume Licensing Service Center website to track use of MAK keys.
|
||||
|
||||
- Using the **Slmgr /dlv** command on a client computer or on the KMS host. (For a full list of options, see [Slmgr.vbs Options](http://technet.microsoft.com/library/ff793433.aspx).)
|
||||
|
||||
- Viewing the licensing status, which is exposed through Windows Management Instrumentation (WMI); therefore, it is available to non-Microsoft or custom tools that can access WMI. (Windows PowerShell can also access WMI information.)
|
||||
|
||||
- Most licensing actions and events are recorded in the Event log.
|
||||
|
||||
- Microsoft System Center Operations Manager and the KMS Management Pack can provide insight and information to users of System Center Operations Manager.
|
||||
|
||||
- The VAMT provides a single site from which to manage and monitor volume activations. This is explained in the next section.
|
||||
|
||||
## See also
|
||||
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,46 +5,37 @@ ms.assetid: 8381792b-a454-4e66-9b4c-e6e4c9303823
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Perform Online Activation
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) to enable client products to be activated over the Internet. You can install the client products with any kind of product key that is eligible for online activation—Multiple Activation Key (MAK), retail, and Windows Key Management Services (KMS) host key.
|
||||
|
||||
## Requirements
|
||||
|
||||
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
||||
|
||||
- VAMT is installed on a central computer that has network access to all client computers.
|
||||
|
||||
- Both the VAMT host and client computers have Internet access.
|
||||
|
||||
- The products that you want to activate are added to VAMT.
|
||||
|
||||
- VAMT has administrative permissions on all computers that you intend to activate, and that Windows Management Instrumentation (WMI) can be accessed through the Windows firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
||||
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking
|
||||
**Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
||||
|
||||
## To Perform an Online Activation
|
||||
|
||||
**To perform an online activation**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
5. Select the products that you want to activate. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||
|
||||
6. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane and then point to **Activate**. If the **Actions** pane is not displayed, click the Show/Hide Action Pane button, which is located on the toolbar to the right of the Help button.
|
||||
|
||||
7. Point to **Online activate**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||
|
||||
8. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Plan for volume activation (Windows 10)
|
||||
description: Product activation is the process of validating software with the manufacturer after it has been installed on a specific computer.
|
||||
ms.assetid: f84b005b-c362-4a70-a84e-4287c0d2e4ca
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Plan for volume activation
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -32,64 +33,60 @@ During the activation process, information about the specific installation is ex
|
||||
The IP address is used only to verify the location of the request, because some editions of Windows (such as “Starter” editions) can only be activated within certain geographical target markets.
|
||||
|
||||
## Distribution channels and activation
|
||||
|
||||
In general, Microsoft software is obtained through three main channels: retail, original equipment manufacturer (OEM), and volume licensing agreements. Different activations methods are available through each channel. Because organizations are free to obtain software through multiple channels (for example, buying some at retail and others through a volume licensing program) most organizations choose to use a combination of activation methods.
|
||||
|
||||
### Retail activations
|
||||
The retail activation method has not changed in several versions of Windows and Windows Server. Each purchased copy comes with one unique product key (often referred to as a retail key). The user enters this key during product installation. The computer uses this retail key to complete the activation after the installation is complete. Most activations are performed online, but telephone activation is also available.
|
||||
|
||||
The retail activation method has not changed in several versions of Windows and Windows Server. Each purchased copy comes with one unique product key (often referred to as a retail key). The user enters this key during product installation. The computer uses this retail key to complete the activation after the installation is complete. Most activations are performed online, but telephone activation is also available.
|
||||
Recently, retail keys have been expanded into new distribution scenarios. Product key cards are available to activate products that have been preinstalled or downloaded. Programs such as Windows Anytime Upgrade and Get Genuine allow users to acquire legal keys separately from the software. These electronically distributed keys may come with media that contains software, they can come as a software shipment, or they may be provided on a printed card or electronic copy. Products are activated the same way with any of these retail keys.
|
||||
|
||||
### Original equipment manufacturer
|
||||
Most original equipment manufacturers (OEMs) sell systems that include a standard build of the Windows operating system. The hardware vendor activates Windows by associating the operating system with the firmware (BIOS) of the computer. This occurs before the computer is sent to the customer, and no additional actions are required.
|
||||
|
||||
Most original equipment manufacturers (OEMs) sell systems that include a standard build of the Windows operating system. The hardware vendor activates Windows by associating the operating system with the firmware (BIOS) of the computer. This occurs before the computer is sent to the customer, and no additional actions are required.
|
||||
OEM activation is valid as long as the customer uses the OEM-provided image on the system. OEM activation is available only for computers that are purchased through OEM channels and have the Windows operating system preinstalled.
|
||||
|
||||
### Volume licensing
|
||||
|
||||
Volume licensing offers customized programs that are tailored to the size and purchasing preference of the organization. To become a volume licensing customer, the organization must set up a volume licensing agreement with Microsoft.There is a common misunderstanding about acquiring licenses for a new computer through volume licensing. There are two legal ways to acquire a full Windows client license for a new computer:
|
||||
|
||||
- Have the license preinstalled through the OEM.
|
||||
|
||||
- Purchase a fully packaged retail product.
|
||||
|
||||
The licenses that are provided through volume licensing programs such as Open License, Select License, and Enterprise Agreements cover upgrades to Windows client operating systems only. An existing retail or OEM operating system license is needed for each computer running Windows 10, Windows 8.1 Pro, Windows 8 Pro, Windows 7 Professional or Ultimate, or Windows XP Professional before the upgrade rights obtained through volume licensing can be exercised.
|
||||
|
||||
Volume licensing is also available through certain subscription or membership programs, such as the Microsoft Partner Network and MSDN. These volume licenses may contain specific restrictions or other changes to the general terms applicable to volume licensing.
|
||||
|
||||
**Note**
|
||||
Some editions of the operating system, such as Windows 10 Enterprise, and some editions of application software are available only through volume licensing agreements or subscriptions.
|
||||
|
||||
## Activation models
|
||||
|
||||
For a user or IT department, there are no significant choices about how to activate products that are acquired through retail or OEM channels. The OEM performs the activation at the factory, and the user or the IT department need take no activation steps.
|
||||
|
||||
With a retail product, the Volume Activation Management Tool (VAMT), which is discussed later in this guide, helps you track and manage keys. For each retail activation, you can choose:
|
||||
|
||||
- Online activation
|
||||
|
||||
- Telephone activation
|
||||
|
||||
- VAMT proxy activation
|
||||
|
||||
Telephone activation is primarily used in situations where a computer is isolated from all networks. VAMT proxy activation (with retail keys) is sometimes used when an IT department wants to centralize retail activations or when a computer with a retail version of the operating system is isolated from the Internet but connected to the LAN. For volume-licensed products, however, you must determine the best method or combination of methods to use in your environment. For Windows 10 Pro and Enterprise, you can choose from three models:
|
||||
|
||||
- MAKs
|
||||
|
||||
- KMS
|
||||
|
||||
- Active Directory-based activation
|
||||
|
||||
**Note**
|
||||
A specialized method, Token-based activation, is available for specific situations when approved customers rely on a public key infrastructure in a completely isolated, and usually high-security, environment. For more information, contact your Microsoft Account Team or your service representative.
|
||||
|
||||
### Multiple activation key
|
||||
A Multiple Activation Key (MAK) is commonly used in small- or mid-sized organizations that have a volume licensing agreement, but they do not meet the requirements to operate a KMS or they prefer a simpler approach. A MAK also allows permanent activation of computers that are isolated from the KMS or are part of an isolated network that does not have enough computers to use the KMS.
|
||||
|
||||
A Multiple Activation Key (MAK) is commonly used in small- or mid-sized organizations that have a volume licensing agreement, but they do not meet the requirements to operate a KMS or they prefer a simpler approach. A MAK also
|
||||
allows permanent activation of computers that are isolated from the KMS or are part of an isolated network that does not have enough computers to use the KMS.
|
||||
|
||||
To use a MAK, the computers to be activated must have a MAK installed. The MAK is used for one-time activation with the Microsoft online hosted activation services, by telephone, or by using VAMT proxy activation.
|
||||
|
||||
In the simplest terms, a MAK acts like a retail key, except that a MAK is valid for activating multiple computers. Each MAK can be used a specific number of times. The VAMT can assist in tracking the number of activations that have been performed with each key and how many remain.
|
||||
|
||||
Organizations can download MAK and KMS keys from the [Volume Licensing Service Center](http://go.microsoft.com/fwlink/p/?LinkId=618213) website. Each MAK has a preset number of activations, which are based on a percentage of the count of licenses the organization purchases; however, you can increase the number of activations that are available with your MAK by calling Microsoft.
|
||||
|
||||
### Key Management Service
|
||||
|
||||
With the Key Management Service (KMS), IT pros can complete activations on their local network, eliminating the need for individual computers to connect to Microsoft for product activation. The KMS is a lightweight service that does not require a dedicated system and can easily be cohosted on a system that provides other services.
|
||||
|
||||
Volume editions of Windows 10 and Windows Server 2012 R2 (in addition to volume editions of operating system editions since Windows Vista and Windows Server 2008) automatically connect to a system that hosts the KMS to request activation. No action is required from the user.
|
||||
@ -99,14 +96,17 @@ The KMS requires a minimum number of computers (physical computers or virtual ma
|
||||
Planning to use the KMS includes selecting the best location for the KMS host and how many KMS hosts to have. One KMS host can handle a large number of activations, but organizations will often deploy two KMS hosts to ensure availability. Only rarely would more than two KMS hosts be used. The KMS can be hosted on a client computer or on a server, and it can be run on older versions of the operating system if proper configuration steps are taken. Setting up your KMS is discussed later in this guide.
|
||||
|
||||
### Active Directory-based activation
|
||||
|
||||
Active Directory-based activation is the newest type of volume activation, and it was introduced in Windows 8. In many ways, Active Directory-based activation is similar to activation by using the KMS, but the activated computer does not need to maintain periodic connectivity with the KMS host. Instead, a domain-joined computer running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 queries AD DS for a volume activation object that is stored in the domain. The operating system checks the digital signatures that are contained in the activation object, and then activates the device.
|
||||
|
||||
Active Directory-based activation allows enterprises to activate computers through a connection to their domain. Many companies have computers at remote or branch locations, where it is impractical to connect to a KMS, or would not reach the KMS activation threshold. Rather than use MAKs, Active Directory-based activation provides a way to activate computers running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 as long as the computers can contact the company’s domain. Active Directory-based activation offers the advantage of extending volume activation services everywhere you already have a domain presence.
|
||||
|
||||
## Network and connectivity
|
||||
|
||||
A modern business network has many nuances and interconnections. This section examines evaluating your network and the connections that are available to determine how volume activations will occur.
|
||||
|
||||
### Core network
|
||||
|
||||
Your core network is that part of your network that enjoys stable, high-speed, reliable connectivity to infrastructure servers. In many cases, the core network is also connected to the Internet, although that is not a requirement to use the KMS or Active Directory-based activation after the KMS server or AD DS is configured and active. Your core network likely consists of many network segments. In many organizations, the core network makes up the vast majority of the business network.
|
||||
|
||||
In the core network, a centralized KMS solution is usually recommended. You can also use Active Directory-based activation, but in many organizations, KMS will still be required to activate older client computers and computers that are not joined to the domain. Some administrators prefer to run both solutions to have the most flexibility, while others prefer to choose only a KMS-based solution for simplicity. Active Directory-based activation as the only solution is workable if all of the clients in your organization are running Windows 10, Windows 8.1, or Windows 8.
|
||||
@ -118,9 +118,11 @@ A typical core network that includes a KMS host is shown in Figure 1.
|
||||
**Figure 1**. Typical core network
|
||||
|
||||
### Isolated networks
|
||||
|
||||
In a large network, it is all but guaranteed that some segments will be isolated, either for security reasons or because of geography or connectivity issues.
|
||||
|
||||
**Isolated for security**<p>
|
||||
**Isolated for security**
|
||||
|
||||
Sometimes called a *high-security zone*, a particular network segment may be isolated from the core network by a firewall or disconnected from other networks totally. The best solution for activating computers in an isolated network depends on the security policies in place in the organization.
|
||||
|
||||
If the isolated network can access the core network by using outbound requests on TCP port 1688, and it is allowed to receive remote procedure calls (RPCs), you can perform activation by using the KMS in the core network, thereby avoiding the need to reach additional activation thresholds.
|
||||
@ -137,28 +139,24 @@ If the network is fully isolated, MAK-independent activation would be the recomm
|
||||
|
||||
**Branch offices and distant networks**
|
||||
From mining operations to ships at sea, organizations often have a few computers that are not easily connected to the core network or the Internet. Some organizations have network segments at branch offices that are large and well-connected internally, but have a slow or unreliable WAN link to the rest of the organization. In these situations, you have several options:
|
||||
|
||||
- **Active Directory-based activation**. In any site where the client computers are running Windows 10, Active Directory-based activation is supported, and it can be activated by joining the domain.
|
||||
|
||||
- **Local KMS**. If a site has 25 or more client computers, it can activate against a local KMS server.
|
||||
|
||||
- **Remote (core) KMS**. If the remote site has connectivity to an existing KMS (perhaps through a virtual private network (VPN) to the core network), that KMS can be used. Using the existing KMS means that you only need to meet the activation threshold on that server.
|
||||
|
||||
- **MAK activation**. If the site has only a few computers and no connectivity to an existing KMS host, MAK activation is the best option.
|
||||
|
||||
### Disconnected computers
|
||||
Some users may be in remote locations or may travel to many locations. This scenario is common for roaming clients, such as the computers that are used by salespeople or other users who are offsite but not at branch locations. This scenario can also apply to remote branch office locations that have no connection to the core network. You can consider this an “isolated network,” where the number of computers is one. Disconnected computers can use Active Directory-based activation, the KMS, or MAK depending on the client version and how often the computers connect to the core network.
|
||||
|
||||
Some users may be in remote locations or may travel to many locations. This scenario is common for roaming clients, such as the computers that are used by salespeople or other users who are offsite but not at branch locations. This scenario can also apply to remote branch office locations that have no connection to the core network. You can consider this an “isolated network,” where the number of computers is one. Disconnected computers can use Active Directory-based activation, the KMS, or MAK depending on the client version and how often the computers connect to the core network.
|
||||
If the computer is joined to the domain and running Windows 10, Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012 R2 8, you can use Active Directory-based activation—directly or through a VPN—at least once every 180 days. If the computer connects to a network with a KMS host at least every 180 days, but it does not support Active Directory-based activation, you can use KMS activation. Otherwise for computers that rarely or never connect to the network, use MAK independent activation (by using the telephone or the Internet).
|
||||
|
||||
### Test and development labs
|
||||
|
||||
Lab environments often have large numbers of virtual machines, and physical computers and virtual machines in labs are reconfigured frequently. Therefore, first determine whether the computers in test and development labs require activation. Editions of Windows 10 that include volume licensing will operate normally, even if they cannot activate immediately.
|
||||
|
||||
If you have ensured that your test or development copies of the operating system are within the license agreement, you may not need to activate the lab computers if they will be rebuilt frequently. If you require that the lab computers be activated, treat the lab as an isolated network and use the methods described earlier in this guide.
|
||||
|
||||
In labs that have a high turnover of computers and a small number of KMS clients, you must monitor the KMS activation count. You might need to adjust the time that the KMS caches the activation requests. The default is 30 days.
|
||||
|
||||
## Mapping your network to activation methods
|
||||
|
||||
Now it’s time to assemble the pieces into a working solution. By evaluating your network connectivity, the numbers of computers you have at each site, and the operating system versions in use in your environment, you have collected the information you need to determine which activation methods will work best for you. You can fill-in information in Table 1 to help you make this determination.
|
||||
|
||||
**Table 1**. Criteria for activation methods
|
||||
@ -174,21 +172,22 @@ Now it’s time to assemble the pieces into a working solution. By evaluating yo
|
||||
|Number of computers in test and development labs that will not be activated |None|
|
||||
|Number of computers that do not have a retail volume license |Retail (online or phone) |
|
||||
|Number of computers that do not have an OEM volume license |OEM (at factory) |
|
||||
|Total number of computer activations<p><strong>Note</strong><br>This total should match the total number of licensed computers in your organization. | |
|
||||
|Total number of computer activations<p><strong>Note</strong><br>This total should match the total number of licensed computers in your organization. |
|
||||
|
||||
## Choosing and acquiring keys
|
||||
|
||||
When you know which keys you need, you must obtain them. Generally speaking, volume licensing keys are collected in two ways:
|
||||
|
||||
- Go to the **Product Keys** section of the [Volume Licensing Service Center](http://go.microsoft.com/fwlink/p/?LinkID=618213) for the following agreements: Open, Open Value, Select, Enterprise, and Services Provider License.
|
||||
|
||||
- Contact your [Microsoft Activation Center](http://go.microsoft.com/fwlink/p/?LinkId=618264).
|
||||
|
||||
### KMS host keys
|
||||
|
||||
A KMS host needs a key that activates, or authenticates, the KMS host with Microsoft. This key is usually referred to as the *KMS host key*, but it is formally known as a *Microsoft Customer Support Volume License Key* (CSVLK). Most documentation and Internet references earlier than Windows 8.1 use the term KMS key, but CSVLK is becoming more common in current documentation and management tools.
|
||||
|
||||
A KMS host running Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2 can activate both Windows Server and Windows client operating systems. A KMS host key is also needed to create the activation objects in AD DS, as described later in this guide. You will need a KMS host key for any KMS that you want to set up and if you are going to use Active Directory-based activation.
|
||||
|
||||
### Generic volume licensing keys
|
||||
|
||||
When you create installation media or images for client computers that will be activated by KMS or Active Directory-based activation, install a generic volume license key (GVLK) for the edition of Windows you are creating. GVLKs are also referred to as KMS client setup keys.
|
||||
|
||||
Installation media from Microsoft for Enterprise editions of the Windows operating system may already contain the GVLK. One GVLK is available for each type of installation. Note that the GLVK will not activate the software against Microsoft activation servers, only against a KMS or Active Directory-based activation object. In other words, the GVLK does not work unless a valid KMS host key can be found. GVLKs are the only product keys that do not need to be kept confidential.
|
||||
@ -196,31 +195,24 @@ Installation media from Microsoft for Enterprise editions of the Windows operati
|
||||
Typically, you will not need to manually enter a GVLK unless a computer has been activated with a MAK or a retail key and it is being converted to a KMS activation or to Active Directory-based activation. If you need to locate the GVLK for a particular client edition, see [Appendix A: KMS Client Setup Keys](http://technet.microsoft.com/library/jj612867.aspx).
|
||||
|
||||
### Multiple activation keys
|
||||
|
||||
You will also need MAK keys with the appropriate number of activations available. You can see how many times a MAK has been used on the Volume Licensing Service Center website or in the VAMT.
|
||||
|
||||
## Selecting a KMS host
|
||||
|
||||
The KMS does not require a dedicated server. It can be cohosted with other services, such as AD DS domain controllers and read-only domain controllers.
|
||||
|
||||
KMS hosts can run on physical computers or virtual machines that are running any supported Windows operating system. A KMS host that is running Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2 can activate any Windows client or server operating system that supports volume activation. A KMS host that is running Windows 10 can activate only computers running Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista.
|
||||
|
||||
A single KMS host can support unlimited numbers of KMS clients, but Microsoft recommends deploying a minimum of two KMS hosts for failover purposes. However, as more clients are activated through Active Directory-based activation, the KMS and the redundancy of the KMS will become less important. Most organizations can use as few as two KMS hosts for their entire infrastructure.
|
||||
|
||||
The flow of KMS activation is shown in Figure 3, and it follows this sequence:
|
||||
|
||||
1. An administrator uses the VAMT console to configure a KMS host and install a KMS host key.
|
||||
|
||||
2. Microsoft validates the KMS host key, and the KMS host starts to listen for requests.
|
||||
|
||||
3. The KMS host updates resource records in DNS to allow clients to locate the KMS host. (Manually adding DNS records is required if your environment does not support DNS dynamic update protocol.)
|
||||
|
||||
4. A client configured with a GVLK uses DNS to locate the KMS host.
|
||||
|
||||
5. The client sends one packet to the KMS host.
|
||||
|
||||
6. The KMS host records information about the requesting client (by using a client ID). Client IDs are used to maintain the count of clients and detect when the same computer is requesting activation again. The client ID is only used to determine whether the activation thresholds are met. The IDs are not stored permanently or transmitted to Microsoft. If the KMS is restarted, the client ID collection starts again.
|
||||
|
||||
7. If the KMS host has a KMS host key that matches the products in the GVLK, the KMS host sends a single packet back to the client. This packet contains a count of the number of computers that have requested activation from this KMS host.
|
||||
|
||||
8. If the count exceeds the activation threshold for the product that is being activated, the client is activated. If the activation threshold has not yet been met, the client will try again.
|
||||
|
||||

|
||||
@ -229,12 +221,5 @@ The flow of KMS activation is shown in Figure 3, and it follows this sequence:
|
||||
|
||||
## See also
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Prepare for deployment with MDT 2013 Update 2 (Windows 10)
|
||||
description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT) 2013 Update 2.
|
||||
ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226
|
||||
keywords: ["deploy, system requirements"]
|
||||
keywords: deploy, system requirements
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Prepare for deployment with MDT 2013 Update 2
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT) 2013 Update 2. It covers the installation of the necessary system prerequisites, the creation of shared folders and service accounts, and the configuration of security permissions in the files system and in Active Directory.
|
||||
@ -22,88 +21,52 @@ For the purposes of this topic, we will use two machines: DC01 and MDT01. DC01 i
|
||||
|
||||
## <a href="" id="sec01"></a>System requirements
|
||||
|
||||
|
||||
MDT 2013 Update 2 requires the following components:
|
||||
|
||||
- Any of the following operating systems:
|
||||
|
||||
- Windows 7
|
||||
|
||||
- Windows 8
|
||||
|
||||
- Windows 8.1
|
||||
|
||||
- Windows 10
|
||||
|
||||
- Windows Server 2008 R2
|
||||
|
||||
- Windows Server 2012
|
||||
|
||||
- Windows Server 2012 R2
|
||||
|
||||
- Windows Assessment and Deployment Kit (ADK) for Windows 10
|
||||
|
||||
- Windows PowerShell
|
||||
|
||||
- Microsoft .NET Framework
|
||||
|
||||
## <a href="" id="sec02"></a>Install Windows ADK for Windows 10
|
||||
|
||||
|
||||
These steps assume that you have the MDT01 member server installed and configured and that you have downloaded [Windows ADK for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526803) to the E:\\Downloads\\ADK folder.
|
||||
|
||||
1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**.
|
||||
|
||||
2. Start the **ADK Setup** (E:\\Downloads\\ADK\\adksetup.exe), and on the first wizard page, click **Continue**.
|
||||
|
||||
3. On the **Select the features you want to change** page, select the features below and complete the wizard using the default settings:
|
||||
|
||||
1. Deployment Tools
|
||||
|
||||
2. Windows Preinstallation Environment (Windows PE)
|
||||
|
||||
3. User State Migration Tool (UMST)
|
||||
|
||||
## <a href="" id="sec03"></a>Install MDT 2013 Update 2
|
||||
|
||||
|
||||
These steps assume that you have downloaded [MDT 2013 Update 2](http://go.microsoft.com/fwlink/p/?LinkId=618117 ) to the E:\\Downloads\\MDT 2013 folder on MDT01.
|
||||
|
||||
1. On MDT01, log on as Administrator in the CONTOSO domain using a password of **P@ssw0rd**.
|
||||
|
||||
2. Install **MDT** (E:\\Downloads\\MDT 2013\\MicrosoftDeploymentToolkit2013\_x64.msi) with the default settings.
|
||||
|
||||
## <a href="" id="sec04"></a>Create the OU structure
|
||||
|
||||
|
||||
If you do not have an organizational unit (OU) structure in your Active Directory, you should create one. In this section, you create an OU structure and a service account for MDT 2013 Update 2.
|
||||
|
||||
1. On DC01, using Active Directory User and Computers, in the contoso.com domain level, create a top-level OU named **Contoso**.
|
||||
|
||||
2. In the **Contoso** OU, create the following OUs:
|
||||
|
||||
1. Accounts
|
||||
|
||||
2. Computers
|
||||
|
||||
3. Groups
|
||||
|
||||
3. In the **Contoso / Accounts** OU, create the following underlying OUs:
|
||||
|
||||
1. Admins
|
||||
|
||||
2. Service Accounts
|
||||
|
||||
3. Users
|
||||
|
||||
4. In the **Contoso / Computers** OU, create the following underlying OUs:
|
||||
|
||||
1. Servers
|
||||
|
||||
2. Workstations
|
||||
|
||||
5. In the **Contoso / Groups** OU, create the following OU:
|
||||
|
||||
- Security Groups
|
||||
|
||||

|
||||
@ -112,34 +75,22 @@ Figure 6. A sample of how the OU structure will look after all the OUs are creat
|
||||
|
||||
## <a href="" id="sec05"></a>Create the MDT service account
|
||||
|
||||
|
||||
When creating a reference image, you need an account for MDT. The MDT Build Account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01.
|
||||
|
||||
1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**.
|
||||
|
||||
2. Select the **Service Accounts** OU and create the **MDT\_BA** account using the following settings:
|
||||
|
||||
1. Name: MDT\_BA
|
||||
|
||||
2. User logon name: MDT\_BA
|
||||
|
||||
3. Password: P@ssw0rd
|
||||
|
||||
4. User must change password at next logon: Clear
|
||||
|
||||
5. User cannot change password: Selected
|
||||
|
||||
6. Password never expires: Selected
|
||||
|
||||
## <a href="" id="sec06"></a>Create and share the logs folder
|
||||
|
||||
|
||||
By default MDT stores the log files locally on the client. In order to capture a reference image, you will need to enable server-side logging and, to do that, you will need to have a folder in which to store the logs. For more information, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create and share the **E:\\Logs** folder by running the following commands in an elevated Windows PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
New-Item -Path E:\Logs -ItemType directory
|
||||
New-SmbShare ?Name Logs$ ?Path E:\Logs -ChangeAccess EVERYONE
|
||||
@ -152,7 +103,6 @@ Figure 7. The Sharing tab of the E:\\Logs folder after sharing it with PowerShel
|
||||
|
||||
## <a href="" id="sec07"></a>Use CMTrace to read log files (optional)
|
||||
|
||||
|
||||
The log files in MDT Lite Touch are formatted to be read by Configuration Manager Trace (CMTrace), which is available as part [of Microsoft System Center 2012 R2 Configuration Manager Toolkit](http://go.microsoft.com/fwlink/p/?LinkId=734717). You can use Notepad, but CMTrace formatting makes the logs easier to read.
|
||||
|
||||

|
||||
@ -161,20 +111,10 @@ Figure 8. An MDT log file opened in Notepad.
|
||||
|
||||

|
||||
|
||||
|
||||
Figure 9. The same log file, opened in CMTrace, is much easier to read.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Key features in MDT 2013 Update 2](key-features-in-mdt-2013.md)
|
||||
|
||||
[MDT 2013 Update 2 Lite Touch components](mdt-2013-lite-touch-components.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,10 +5,12 @@ ms.assetid: 35a919ed-f1cc-4d10-9c88-9bd634549dc3
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Perform Proxy Activation
|
||||
|
||||
You can use the Volume Activation Management Tool (VAMT) to perform activation for client computers that do not have Internet access. The client products can be installed with any type of product key that is eligible for proxy activation: Multiple activation Key (MAK), KMS Host key (CSVLK), or retail key.
|
||||
|
||||
In a typical proxy-activation scenario, the VAMT host computer distributes a MAK to one or more client computers and collects the installation ID (IID) from each computer. The VAMT host computer sends the IIDs to Microsoft on behalf of the client computers and obtains the corresponding Confirmation IDs (CIDs). The VAMT host computer then installs the CIDs on the client computer to complete the activation. Using this activation method, only the VAMT host computer needs Internet access.
|
||||
@ -17,16 +19,12 @@ In a typical proxy-activation scenario, the VAMT host computer distributes a MAK
|
||||
For workgroups that are completely isolated from any larger network, you can still perform MAK, KMS Host key (CSVLK), or retail proxy activation. This requires installing a second instance of VAMT on a computer within the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. For more information about this scenario, see [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md). Similarly, you can proxy activate a KMS Host key (CSVLK) located in an isolated network. You can also proxy activate a KMS Host key (CSVLK) in the core network if you do not want the KMS host computer to connect to Microsoft over the Internet.
|
||||
|
||||
## Requirements
|
||||
|
||||
Before performing proxy activation, ensure that your network and the VAMT installation meet the following requirements:
|
||||
|
||||
- There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you also need to have VAMT installed on one of the computers in the workgroup.
|
||||
|
||||
- The products to be activated have been added to VAMT and are installed with a retail product key, a KMS Host key (CSVLK) or a MAK. If the products have not been installed with a proper product key, refer to the steps in the [Add and Remove a Product Key](add-remove-product-key-vamt.md) section for instructions on how to install a product key.
|
||||
|
||||
- VAMT has administrative permissions on all products to be activated and Windows Management Instrumentation (WMI) is accessible through the Windows firewall.
|
||||
|
||||
- For workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
||||
|
||||
## To Perform Proxy Activation
|
||||
@ -34,43 +32,22 @@ The product keys that are installed on the client products must have a sufficien
|
||||
**To perform proxy activation**
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. If necessary, install product keys. For more information see:
|
||||
|
||||
- [Install a Product Key](install-product-key-vamt.md) to install retail, MAK, or KMS Host key (CSVLK).
|
||||
|
||||
- [Install a KMS Client Key](install-kms-client-key-vamt.md) to install GVLK (KMS client) keys.
|
||||
|
||||
3. In the **Products** list in the center pane, select the individual products to be activated. You can use the **Filter** function to narrow your search for products by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
6. In the right-side pane, click **Activate** and then click **Proxy activate** to open the **Proxy Activate** dialog box.
|
||||
|
||||
7. In the **Proxy Activate** dialog box click **Apply Confirmation ID, apply to selected machine(s) and activate**.
|
||||
|
||||
8. If you are activating products that require administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** checkbox.
|
||||
|
||||
9. Click **OK**.
|
||||
|
||||
10. VAMT displays the **Activating products** dialog box until it completes the requested action. If you selected the **Alternate Credentials** option, you will be prompted to enter the credentials.
|
||||
|
||||
**Note**
|
||||
You can use proxy activation to select products that have different key types and activate the products at the same time.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Refresh a Windows 7 computer with Windows 10 (Windows 10)
|
||||
description: This topic will show you how to use MDT 2013 Update 2 Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process.
|
||||
ms.assetid: 2866fb3c-4909-4c25-b083-6fc1f7869f6f
|
||||
keywords: ["reinstallation, customize, template, script, restore"]
|
||||
keywords: reinstallation, customize, template, script, restore
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Refresh a Windows 7 computer with Windows 10
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic will show you how to use MDT 2013 Update 2 Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process. The refresh scenario, or computer refresh, is a reinstallation of an operating system on the same machine. You can refresh the machine to the same operating system as it is currently running, or to a later version.
|
||||
@ -26,111 +25,74 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## <a href="" id="sec01"></a>The computer refresh process
|
||||
|
||||
|
||||
Even though a computer will appear, to the end user, to be upgraded, a computer refresh is not, technically, an in-place upgrade. A computer refresh also involves taking care of user data and settings from the old installation and making sure to restore those at the end of the installation.
|
||||
|
||||
For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh you will:
|
||||
|
||||
1. Back up data and settings locally, in a backup folder.
|
||||
|
||||
2. Wipe the partition, except for the backup folder.
|
||||
|
||||
3. Apply the new operating system image.
|
||||
|
||||
4. Install other applications.
|
||||
|
||||
5. Restore data and settings.
|
||||
|
||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are simply linked in the file system, which allows for fast migration, even when there is a lot of data.
|
||||
|
||||
**Note**
|
||||
In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file will contain the entire volume from the computer, and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire machine is not a supported scenario.
|
||||
|
||||
|
||||
|
||||
### Multi-user migration
|
||||
|
||||
By default, ScanState in USMT backs up all profiles on the machine, including local computer profiles. If you have a machine that has been in your environment for a while, it likely has several domain-based profiles on it, including those of former users. You can limit which profiles are backed up by configuring command-line switches to ScanState (added as rules in MDT).
|
||||
By default, ScanState in USMT backs up all profiles on the machine, including local computer profiles. If you have a machine that has been in your environment for a while, it likely has several domain-based profiles on it, including those of former users. You can limit which profiles are backed up
|
||||
by configuring command-line switches to ScanState (added as rules in MDT).
|
||||
|
||||
As an example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: ScanStateArgs=/ue:\*\\\* /ui:CONTOSO\\\*
|
||||
|
||||
**Note**
|
||||
You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days.
|
||||
|
||||
|
||||
|
||||
### Support for additional settings
|
||||
|
||||
In addition to the command-line switches that control which profiles to migrate, the XML templates control exactly what data is being migrated. You can control data within and outside the user profiles
|
||||
|
||||
## <a href="" id="sec02"></a>Create a custom User State Migration Tool (USMT) template
|
||||
|
||||
|
||||
In this section, you learn to migrate additional data using a custom template. You configure the environment to use a custom USMT XML template that will:
|
||||
|
||||
1. Back up the **C:\\Data** folder (including all files and folders).
|
||||
|
||||
2. Scan the local disk for PDF documents (\*.pdf files) and restore them into the **C:\\Data\\PDF Documents** folder on the destination machine.
|
||||
|
||||
The custom USMT template is named MigContosoData.xml, and you can find it in the sample files for this documentation, which include:
|
||||
|
||||
- [Gather script](http://go.microsoft.com/fwlink/p/?LinkId=619361)
|
||||
|
||||
- [Set-OUPermissions](http://go.microsoft.com/fwlink/p/?LinkId=619362) script
|
||||
|
||||
- [MDT Sample Web Service](http://go.microsoft.com/fwlink/p/?LinkId=619363)
|
||||
|
||||
### Add the custom XML template
|
||||
|
||||
In order to use the custom MigContosoData.xml USMT template, you need to copy it to the MDT Production deployment share and update the CustomSettings.ini file. In these steps, we assume you have downloaded the MigContosoData.xml file.
|
||||
|
||||
1. Using File Explorer, copy the MigContosoData.xml file to the **E:\\MDTProduction\\Tools\\x64\\USMT5** folder.
|
||||
|
||||
2. Using Notepad, edit the E:\\MDTProduction\\Control\\CustomSettings.ini file. After the USMTMigFiles002=MigUser.xml line add the following line:
|
||||
|
||||
``` syntax
|
||||
USMTMigFiles003=MigContosoData.xml
|
||||
```
|
||||
|
||||
3. Save the CustomSettings.ini file.
|
||||
|
||||
## <a href="" id="sec03"></a>Refresh a Windows 7 SP1 client
|
||||
|
||||
|
||||
After adding the additional USMT template and configuring the CustomSettings.ini file to use it, you are now ready to refresh a Windows 7 SP1 client to Windows 10. In these steps, we assume you have a Windows 7 SP1 client named PC0001 in your environment that is ready for a refresh to Windows 10.
|
||||
|
||||
**Note**
|
||||
MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property in the [MDT resource page](http://go.microsoft.com/fwlink/p/?LinkId=618117).
|
||||
|
||||
|
||||
|
||||
### Upgrade (refresh) a Windows 7 SP1 client
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\Administrator**. Start the Lite Touch Deploy Wizard by executing **\\\\MDT01\\MDTProduction$\\Scripts\\Litetouch.vbs**. Complete the deployment guide using the following settings:
|
||||
|
||||
1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM
|
||||
|
||||
2. Computer name: <default>
|
||||
|
||||
3. Specify where to save a complete computer backup: Do not back up the existing computer
|
||||
|
||||
**Note**
|
||||
Skip this optional full WIM backup. The USMT backup will still run.
|
||||
|
||||
|
||||
|
||||
2. Select one or more applications to install: Install - Adobe Reader XI - x86
|
||||
|
||||
3. The setup now starts and does the following:
|
||||
|
||||
1. Backs up user settings and data using USMT.
|
||||
|
||||
2. Installs the Windows 10 Enterprise x64 operating system.
|
||||
|
||||
3. Installs the added application(s).
|
||||
|
||||
4. Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
5. Restores user settings and data using USMT.
|
||||
|
||||

|
||||
@ -139,24 +101,15 @@ Figure 2. Starting the computer refresh from the running Windows 7 SP1 client.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
|
||||
[Deploy a Windows 10 image using MDT 2013 Update 2](deploy-a-windows-10-image-using-mdt.md)
|
||||
|
||||
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,40 +5,26 @@ ms.assetid: 4d44379e-dda1-4a8f-8ebf-395b6c0dad8e
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Remove Products
|
||||
|
||||
To remove one or more products from the Volume Activation Management Tool (VAMT), you can delete them from the product list view in the center pane.
|
||||
|
||||
**To delete one or more products**
|
||||
|
||||
1. Click a product node in the left-side pane.
|
||||
|
||||
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
5. Select the products you want to delete.
|
||||
|
||||
6. Click **Delete** in the **Selected Items** menu in the right-side pane.
|
||||
|
||||
7. On the **Confirm Delete Selected Products** dialog box, click **OK**.
|
||||
|
||||
## Related topics
|
||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,22 +2,20 @@
|
||||
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
||||
description: A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer.
|
||||
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
||||
keywords: ["deploy, deployment, replace"]
|
||||
keywords: deploy, deployment, replace
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Replace a Windows 7 computer with a Windows 10 computer
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it.
|
||||
|
||||
For the purposes of this topic, we will use four machines: DC01, MDT01, PC0002, and PC0007. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. PC0002 is an old machine running Windows 7 SP1. It is going to be replaced by a new Windows 10 machine, PC0007. User State Migration Tool (USMT) will be used to backup and restore data and settings. MDT01, PC0002, and PC0007 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
|
||||

|
||||
@ -26,42 +24,31 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## <a href="" id="sec01"></a>Prepare for the computer replace
|
||||
|
||||
|
||||
When preparing for the computer replace, you need to create a folder in which to store the backup, and a backup only task sequence that you run on the old computer.
|
||||
|
||||
### Configure the rules on the Microsoft Deployment Toolkit (MDT) Production share
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, update the MDT Production deployment share rules.
|
||||
|
||||
2. Change the **SkipUserData=YES** option to **NO**, and click **OK**.
|
||||
|
||||
### Create and share the MigData folder
|
||||
|
||||
1. On MDT01, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Create and share the **E:\\MigData** folder by running the following three commands in an elevated Windows PowerShell prompt:
|
||||
|
||||
``` syntax
|
||||
New-Item -Path E:\MigData -ItemType directory
|
||||
New-SmbShare ?Name MigData$ ?Path E:\MigData
|
||||
-ChangeAccess EVERYONE
|
||||
icacls E:\MigData /grant '"MDT_BA":(OI)(CI)(M)'
|
||||
```
|
||||
|
||||
### Create a backup only (replace) task sequence
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node and create a new folder named **Other**.
|
||||
|
||||
2. Right-click the **Other** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
1. Task sequence ID: REPLACE-001
|
||||
|
||||
2. Task sequence name: Backup Only Task Sequence
|
||||
|
||||
3. Task sequence comments: Run USMT to backup user data and settings
|
||||
|
||||
4. Template: Standard Client Replace Task Sequence
|
||||
|
||||
3. In the **Other** folder, double-click **Backup Only Task Sequence**, and then in the **Task Sequence** tab, review the sequence. Notice that it only contains a subset of the normal client task sequence actions.
|
||||
|
||||

|
||||
@ -70,36 +57,23 @@ When preparing for the computer replace, you need to create a folder in which to
|
||||
|
||||
## <a href="" id="sec02"></a>Perform the computer replace
|
||||
|
||||
|
||||
During a computer replace, these are the high-level steps that occur:
|
||||
|
||||
1. On the computer you are replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Window Imaging (WIM) backup.
|
||||
|
||||
2. On the new machine, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored.
|
||||
|
||||
### Execute the replace task sequence
|
||||
|
||||
1. On PC0002, log on as **CONTOSO\\Administrator**.
|
||||
|
||||
2. Verify that you have write access to the **\\\\MDT01\\MigData$** share.
|
||||
|
||||
3. Execute **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**.
|
||||
|
||||
4. Complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
1. Select a task sequence to execute on this computer: Backup Only Task Sequence
|
||||
|
||||
1. Specify where to save your data and settings: Specify a location
|
||||
|
||||
2. Location: \\\\MDT01\\MigData$\\PC0002
|
||||
|
||||
**Note**
|
||||
If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead.
|
||||
|
||||
|
||||
|
||||
2. Specify where to save a complete computer backup: Do not back up the existing computer
|
||||
|
||||
3. Password: P@ssw0rd
|
||||
|
||||
The task sequence will now run USMT (Scanstate.exe) to capture user data and settings of the machine.
|
||||
@ -117,17 +91,11 @@ During a computer replace, these are the high-level steps that occur:
|
||||
### Deploy the PC0007 virtual machine
|
||||
|
||||
1. Create a virtual machine with the following settings:
|
||||
|
||||
1. Name: PC0007
|
||||
|
||||
2. Location: C:\\VMs
|
||||
|
||||
3. Generation: 2
|
||||
|
||||
4. Memory: 2048 MB
|
||||
|
||||
5. Hard disk: 60 GB (dynamic disk)
|
||||
|
||||
2. Start the PC0007 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The machine will now load the Windows PE boot image from the WDS server.
|
||||
|
||||

|
||||
@ -135,30 +103,19 @@ During a computer replace, these are the high-level steps that occur:
|
||||
Figure 5. The initial PXE boot process of PC0005.
|
||||
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
1. Password: P@ssw0rd
|
||||
|
||||
2. Select a task sequence to execute on this computer:
|
||||
|
||||
1. Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
2. Computer Name: PC0007
|
||||
|
||||
3. Applications: Select the Install - Adobe Reader XI - x86 application.
|
||||
|
||||
4. The setup now starts and does the following:
|
||||
|
||||
1. Installs the Windows 10 Enterprise operating system.
|
||||
|
||||
2. Installs the added application.
|
||||
|
||||
3. Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
4. Restores the USMT backup from PC0002.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
@ -170,12 +127,3 @@ During a computer replace, these are the high-level steps that occur:
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
|
||||
[Configure MDT settings](configure-mdt-2013-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,59 +5,39 @@ ms.assetid: 72b04e8f-cd35-490c-91ab-27ea799b05d0
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Scenario 3: KMS Client Activation
|
||||
|
||||
In this scenario, you use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs). This can be performed on either Core Network or Isolated Lab computers. By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products. You do not have to enter a key to activate a product as a GVLK, unless you are converting a MAK-activated product to a KMS activation. For more information, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
||||
|
||||
The procedure that is described below assumes the following:
|
||||
|
||||
- The KMS Service is enabled and available to all KMS clients.
|
||||
|
||||
- VAMT has been installed and computers have been added to the VAMT database. See Parts 1 through 4 in either [Scenario 1: Online Activation](scenario-online-activation-vamt.md) or [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md) for more information.
|
||||
|
||||
## Activate KMS Clients
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. To set the KMS activation options, on the menu bar click **View**. Then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
||||
|
||||
3. In the **Volume Activation Management Tool Preferences** dialog box, under **KMS Management Services host selection** select from the following options:
|
||||
|
||||
- **Find a KMS host automatically using DNS**. This is the default setting. VAMT will instruct the computer to query the Domain Name Service (DNS) to locate a KMS host and perform activation. If the client contains a registry key with a valid KMS host, that value will be used instead.
|
||||
|
||||
- **Find a KMS host using DNS in this domain for supported products**. Select this option if you use a specific domain, and enter the name of the domain.
|
||||
|
||||
- **Use specific KMS host**. Select this option for environments which do not use DNS for KMS host identification, and manually enter the KMS host name and select the KMS host port. VAMT will set the specified KMS host name and KMS host port on the target computer, and then instruct the computer to perform activation with the specific KMS host.
|
||||
|
||||
4. In the left-side pane, in the **Products** node, click the product that you want to activate.
|
||||
|
||||
5. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
6. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||
|
||||
8. Select the products that you want to activate.
|
||||
|
||||
9. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane, click **Activate**, point to **Volume activate**, and then click the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||
|
||||
10. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
||||
|
||||
## Related topics
|
||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,49 +5,36 @@ ms.assetid: 94dba40e-383a-41e4-b74b-9e884facdfd3
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Scenario 1: Online Activation
|
||||
|
||||
In this scenario, the Volume Activation Management Tool (VAMT) is deployed in the Core Network environment. VAMT is installed on a central computer that has network access to all of the client computers. Both the VAMT host and the client computers have Internet access. The following illustration shows a diagram of an online activation scenario for Multiple Activation Keys (MAKs). You can use this scenario for online activation of the following key types:
|
||||
|
||||
- Multiple Activation Key (MAK)
|
||||
|
||||
- Windows Key Management Service (KMS) keys:
|
||||
|
||||
- KMS Host key (CSVLK)
|
||||
|
||||
- Generic Volume License Key (GVLK), or KMS client key
|
||||
|
||||
- Retail
|
||||
|
||||
The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|
||||
|
||||

|
||||
|
||||
## In This Topic
|
||||
- [Install and start VAMT on a networked host computer](#bkmk-partone)
|
||||
|
||||
- [Configure the Windows Management Instrumentation firewall exception on target computers](#bkmk-parttwo)
|
||||
|
||||
- [Connect to VAMT database](#bkmk-partthree)
|
||||
|
||||
- [Discover products](#bkmk-partfour)
|
||||
|
||||
- [Sort and filter the list of computers](#bkmk-partfive)
|
||||
|
||||
- [Collect status information from the computers in the list](#bkmk-partsix)
|
||||
|
||||
- [Add product keys and determine the remaining activation count](#bkmk-partseven)
|
||||
|
||||
- [Install the product keys](#bkmk-parteight)
|
||||
|
||||
- [Activate the client products](#bkmk-partnine)
|
||||
|
||||
## <a href="" id="bkmk-partone"></a>Step 1: Install and start VAMT on a networked host computer
|
||||
|
||||
1. Install VAMT on the host computer.
|
||||
|
||||
2. Click the VAMT icon in the **Start** menu to open VAMT.
|
||||
|
||||
## <a href="" id="bkmk-parttwo"></a>Step 2: Configure the Windows Management Instrumentation firewall exception on target computers
|
||||
@ -60,71 +47,50 @@ The Secure Zone represents higher-security Core Network computers that have addi
|
||||
## <a href="" id="bkmk-partthree"></a>Step 3: Connect to a VAMT database
|
||||
|
||||
1. If you are not already connected to a database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database where the keys that must be activated are located.
|
||||
|
||||
2. Click **Connect**.
|
||||
|
||||
3. If you are already connected to a database, VAMT displays an inventory of the products and product keys in the center pane, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to Server** to open **the Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data](manage-vamt-data.md)
|
||||
|
||||
## <a href="" id="bkmk-partfour"></a>Step 4: Discover products
|
||||
|
||||
1. In the left-side pane, in the **Products** node Products, click the product that you want to activate.
|
||||
|
||||
2. To open the **Discover Products** dialog box, click **Discover products** in the **Actions** menu in the right-side pane.
|
||||
|
||||
3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general Lightweight Directory Access Protocol (LDAP) query:
|
||||
|
||||
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a".
|
||||
|
||||
- To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
||||
|
||||
- To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||
|
||||
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks.
|
||||
|
||||
4. Click **Search**.
|
||||
|
||||
When the search is complete, the products that VAMT discovers appear in the product list view in the center pane.
|
||||
|
||||
## <a href="" id="bkmk-partfive"></a>Step 5: Sort and filter the list of computers
|
||||
|
||||
You can sort the list of products so that it is easier to find the computers that require product keys to be activated:
|
||||
|
||||
1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**.
|
||||
|
||||
2. To sort the list further, you can click one of the column headings to sort by that column.
|
||||
|
||||
3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane.
|
||||
|
||||
## <a href="" id="bkmk-partsix"></a>Step 6: Collect status information from the computers in the list
|
||||
|
||||
To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods:
|
||||
|
||||
- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key.
|
||||
|
||||
- To select computers which are not listed consecutively, hold down the **Ctrl** key and select each computer for which you want to collect the status information.
|
||||
|
||||
**To collect status information from the selected computers**
|
||||
|
||||
1. In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box, type the appropriate user name and password and then click **OK**.
|
||||
|
||||
2. VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
||||
|
||||
## <a href="" id="bkmk-partseven"></a>Step 7: Add product keys and determine the remaining activation count
|
||||
|
||||
1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box.
|
||||
|
||||
2. In the **Add Product Key** dialog box, you can select from one of the following methods to add product keys:
|
||||
|
||||
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add Key(s)**.
|
||||
|
||||
- To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
||||
|
||||
The keys that you have added appear in the **Product Keys** list view in the center pane.
|
||||
@ -133,32 +99,25 @@ To collect the status from select computers in the database, you can select comp
|
||||
If you are activating many products with a MAK, refresh the activation count of the MAK to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and then click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
||||
|
||||
## <a href="" id="bkmk-parteight"></a>Step 8: Install the product keys
|
||||
|
||||
1. In the left-side pane, click the product that you want to install keys on to.
|
||||
|
||||
2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Step 5: Sort and filter the list of computers](#bkmk-partfive).
|
||||
|
||||
3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||
|
||||
4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||
|
||||
5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you want to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
||||
|
||||
6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
|
||||
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct product key, see [How to Choose the Right Volume License Key for Windows.](http://go.microsoft.com/fwlink/p/?linkid=238382)
|
||||
|
||||
## <a href="" id="bkmk-partnine"></a>Step 9: Activate the client products
|
||||
|
||||
1. Select the individual products that you want to activate in the list-view pane.
|
||||
|
||||
2. On the menu bar, click **Action**, point to **Activate** and point to **Online activate**. You can also right-click the selected computers(s) to display the **Action** menu, point to **Activate** and point to **Online activate**. You can also click **Activate** in the **Selected Items** menu in the right-hand pane to access the **Activate** option.
|
||||
|
||||
3. If you are activating product keys using your current credential, click **Current credential** and continue to step 5. If you are activating products that require an administrator credential that is different from the one you are currently using, click the **Alternate credential** option.
|
||||
|
||||
4. Enter your alternate user name and password and click **OK**.
|
||||
|
||||
5. The **Activate** option contacts the Microsoft product-activation server over the Internet and requests activation for the selected products. VAMT displays the **Activating products** dialog box until the requested actions are completed.
|
||||
|
||||
**Note**
|
||||
@ -168,12 +127,5 @@ To collect the status from select computers in the database, you can select comp
|
||||
|
||||
## Related topics
|
||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,47 +5,43 @@ ms.assetid: ed5a8a56-d9aa-4895-918f-dd1898cb2c1a
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Scenario 2: Proxy Activation
|
||||
|
||||
In this scenario, the Volume Activation Management Tool (VAMT) is used to activate products that are installed on workgroup computers in an isolated lab environment. For workgroups which are isolated from the larger network, you can perform proxy activation of Multiple Activation Keys (MAKs), KMS Host keys (CSVLKs), Generic Volume License Keys (GVLKs) (or KMS client keys), or retail keys. Proxy activation is performed by installing a second instance of VAMT on a computer in the isolated workgroup. You can then use removable media to transfer VAMT Computer Information Lists (CILXs) between the instance of VAMT in the isolated workgroup and another VAMT host that has Internet access. The following diagram shows a Multiple Activation Key (MAK) proxy activation scenario:
|
||||
|
||||

|
||||
|
||||
## Step 1: Install VAMT on a Workgroup Computer in the Isolated Lab
|
||||
1. Install VAMT on a host computer in the isolated lab workgroup. This computer can be running Windows 7, Windows 8, Windows 10, Windows Server 2008 R2, or Windows Server® 2012.
|
||||
|
||||
1. Install VAMT on a host computer in the isolated lab workgroup. This computer can be running Windows 7, Windows 8, Windows 10, Windows Server 2008 R2, or Windows Server® 2012.
|
||||
2. Click the VAMT icon in the **Start** menu to open VAMT.
|
||||
|
||||
## Step 2: Configure the Windows Management Instrumentation Firewall Exception on Target Computers
|
||||
|
||||
- Ensure that the Windows Management Instrumentation (WMI) firewall exception has been enabled for all target computers. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
**Note**
|
||||
To retrieve the license status on the selected computers, VAMT must have administrative permissions on the remote computers and WMI must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
## Step 3: Connect to a VAMT Database
|
||||
|
||||
1. If the host computer in the isolated lab workgroup is not already connected to the database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database that contains the computers in the workgroup.
|
||||
|
||||
2. Click **Connect**.
|
||||
|
||||
3. If you are already connected to a database, in the center pane VAMT displays an inventory of the products and product keys, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to the Server** to open the **Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data.](manage-vamt-data.md)
|
||||
|
||||
## Step 4: Discover Products
|
||||
|
||||
1. In the left-side pane, in the **Products** node, click the product that you want to activate.
|
||||
|
||||
2. To open the **Discover Products** dialog box, click **Discover products** in the right-side pane.
|
||||
|
||||
3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query:
|
||||
|
||||
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names, click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||
|
||||
- To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that both IPv4 and IPv6addressing are supported.
|
||||
|
||||
- To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a".
|
||||
|
||||
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks.
|
||||
|
||||
4. Click **Search**.
|
||||
|
||||
The **Finding Computers** window appears and displays the search progress as the computers are located.
|
||||
@ -53,60 +49,45 @@ In this scenario, the Volume Activation Management Tool (VAMT) is used to activa
|
||||
When the search is complete, the products that VAMT discovers appear in the list view in the center pane.
|
||||
|
||||
## Step 5: Sort and Filter the List of Computers
|
||||
|
||||
You can sort the list of products so that it is easier to find the computers that require product keys to be activated:
|
||||
|
||||
1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**.
|
||||
|
||||
2. To sort the list further, you can click one of the column headings to sort by that column.
|
||||
|
||||
3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||
|
||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||
|
||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||
|
||||
- To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||
|
||||
5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane.
|
||||
|
||||
## Step 6: Collect Status Information from the Computers in the Isolated Lab
|
||||
|
||||
To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods:
|
||||
|
||||
- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key.
|
||||
|
||||
- To select computers which are not listed consecutively, hold down the **Ctrl** ley and select each computer for which you want to collect the status information.
|
||||
|
||||
**To collect status information from the selected computers**
|
||||
|
||||
1. In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and then click **OK**.
|
||||
|
||||
2. VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
||||
|
||||
## Step 7: Add Product Keys
|
||||
|
||||
1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box.
|
||||
|
||||
2. In the **Add Product Keys** dialog box, you can select from one of the following methods to add product keys:
|
||||
|
||||
- To add a single product key, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add key(s)**.
|
||||
|
||||
- To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
||||
|
||||
The keys that you have added appear in the **Product Keys** list view in the center pane.
|
||||
|
||||
## Step 8: Install the Product Keys on the Isolated Lab Computers
|
||||
|
||||
1. In the left-side pane, in the **Products** node click the product that you want to install keys onto.
|
||||
|
||||
2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Step 5: Sort and Filter the List of Computers](#step-5-sort-and-filter-the-list-of-computers).
|
||||
|
||||
3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||
|
||||
4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||
|
||||
5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
||||
|
||||
6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
||||
@ -118,75 +99,56 @@ To collect the status from select computers in the database, you can select comp
|
||||
Installing a MAK and overwriting the GVLK on client products must be done with care. If the RTM version of Windows Vista has been installed on the computer for more than 30 days, then its initial grace period has expired. As a result, it will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are available on the network. RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012, and volume editions of Office 2010 will not enter RFM.
|
||||
|
||||
## Step 9: Export VAMT Data to a .cilx File
|
||||
|
||||
In this step, you export VAMT from the workgroup’s host computer and save it in a .cilx file. Then you copy the .cilx file to removable media so that you can take it to a VAMT host computer that is connected to the Internet. In MAK proxy activation, it is critical to retain this file, because VAMT uses it to apply the Confirmation IDs (CIDs) to the proper products.
|
||||
|
||||
1. Select the individual products that successfully received a product key in Step 8. If needed, sort and filter the list to find the products.
|
||||
|
||||
2. In the right-side **Actions** pane, click **Export list** to open the **Export List** dialog box.
|
||||
|
||||
3. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file, or enter the name of the .cilx file to which you want to export the data.
|
||||
|
||||
4. Under **Export options**, select one of the following data-type options:
|
||||
|
||||
- Export products and product keys.
|
||||
|
||||
- Export products only.
|
||||
|
||||
- Export proxy activation data only. Selecting this option ensures that the export contains only the license information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is selected. This option should be used when an enterprise’s security policy states that no information that could identify a specific computer or user may be transferred out of the isolated lab and, therefore, this type of data must be excluded from the .cilx file that is transferred to the Core Network VAMT host.
|
||||
|
||||
5. If you have selected products to export, and not the entire set of data from the database, select the **Export selected product rows only** check box.
|
||||
|
||||
6. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully.
|
||||
|
||||
7. If you exported the list to a file on the host computer’s hard drive, copy the file to removable media, such as a disk drive, CD/DVD, or USB storage device.
|
||||
|
||||
**Important**
|
||||
Choosing the **Export proxy activation data only** option excludes Personally Identifiable Information (PII) from being saved in the .cilx file. Therefore, the .cilx file must be re-imported into the SQL Server database on the isolated lab workgroup’s VAMT host computer, so that the CIDs that are requested from Microsoft (discussed in Step 10) can be correctly assigned to the computers in the isolated lab group.
|
||||
|
||||
## Step 10: Acquire Confirmation IDs from Microsoft on the Internet-Connected Host Computer
|
||||
|
||||
1. Insert the removable media into the VAMT host that has Internet access.
|
||||
|
||||
2. Open VAMT. Make sure you are on the root node, and that the **Volume Activation Management Tool** view is displayed in the center pane.
|
||||
|
||||
3. In the right-side **Actions** pane, click **Acquire confirmation IDs for CILX** to open the **Acquire confirmation IDs for file** dialog box.
|
||||
|
||||
4. In the **Acquire confirmation IDs for file** dialog box, browse to the location of the .cilx file that you exported from the isolated lab host computer, select the file, and then click **Open**. VAMT displays an **Acquiring Confirmation IDs** message while it contacts Microsoft and collects the CIDs.
|
||||
|
||||
5. When the CID collection process is complete, VAMT displays a **Volume Activation Management Tool** message that shows the number of confirmation IDs that were successfully acquired, and the name of the file where the IDs were saved. Click **OK** to close the message.
|
||||
|
||||
## Step 11: Import the .cilx File onto the VAMT Host within the Isolated Lab Workgroup
|
||||
|
||||
1. Remove the storage device that contains the .cilx file from the Internet-connected VAMT host computer and insert it into the VAMT host computer in the isolated lab.
|
||||
|
||||
2. Open VAMT and verify that you are connected to the database that contains the computer with the product keys that you are activating.
|
||||
|
||||
3. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box.
|
||||
|
||||
4. In the **Import list** dialog box, browse to the location of the .cilx file that contains the CIDs, select the file, and then click **Open**.
|
||||
|
||||
5. Click **OK** to import the file and to overwrite any conflicting data in the database with data from the file.
|
||||
|
||||
6. VAMT displays a progress message while the data is being imported. Click **OK** when a message appears and confirms that the data has been successfully imported.
|
||||
|
||||
## Step 12: Apply the CIDs and Activate the Isolated Lab Computers
|
||||
1. Select the products to which you want to apply CIDs. If needed, sort and filter the list to find the products.
|
||||
|
||||
1. Select the products to which you want to apply CIDs. If needed, sort and filter the list to find the products.
|
||||
2. In the right-side **Selected Items** menu, click **Activate**, click **Apply Confirmation ID**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||
|
||||
VAMT displays the **Applying Confirmation Id** dialog box while it installs the CIDs on the selected products. When VAMT finishes installing the CIDs, the status appears in the **Action Sataus** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
||||
|
||||
## Step 13: (Optional) Reactivating Reimaged Computers in the Isolated Lab
|
||||
|
||||
If you have captured new images of the computers in the isolated lab, but the underlying hardware of those computers has not changed, VAMT can reactivate those computers using the CIDs that are stored in the database.
|
||||
|
||||
1. Redeploy products to each computer, using the same computer names as before.
|
||||
|
||||
2. Open VAMT.
|
||||
|
||||
3. In the right-side **Selected Items** menu, click **Activate**, click **Apply Confirmation ID**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||
|
||||
VAMT displays the **Applying Confirmation Id** dialog box while it installs the CIDs on the selected products. When VAMT finishes installing the CIDs, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||
|
||||
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
@ -199,12 +161,5 @@ If you have captured new images of the computers in the isolated lab, but the un
|
||||
|
||||
## Related topics
|
||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,49 +2,39 @@
|
||||
title: Set up MDT for BitLocker (Windows 10)
|
||||
ms.assetid: 386e6713-5c20-4d2a-a220-a38d94671a38
|
||||
description:
|
||||
keywords: ["disk, encryption, TPM, configure, secure, script"]
|
||||
keywords: disk, encryption, TPM, configure, secure, script
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Set up MDT for BitLocker
|
||||
|
||||
|
||||
This topic will show you how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT. BitLocker in Windows 10 has two requirements in regard to an operating system deployment:
|
||||
|
||||
- A protector, which can either be stored in the Trusted Platform Module (TPM) chip, or stored as a password. Technically, you also can use a USB stick to store the protector, but it's not a practical approach as the USB stick can be lost or stolen. We, therefore, recommend that you instead use a TPM chip and/or a password.
|
||||
|
||||
- Multiple partitions on the hard drive.
|
||||
|
||||
To configure your environment for BitLocker, you will need to do the following:
|
||||
|
||||
1. Configure Active Directory for BitLocker.
|
||||
|
||||
2. Download the various BitLocker scripts and tools.
|
||||
|
||||
3. Configure the operating system deployment task sequence for BitLocker.
|
||||
|
||||
4. Configure the rules (CustomSettings.ini) for BitLocker.
|
||||
|
||||
**Note**
|
||||
Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](http://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
||||
|
||||
|
||||
|
||||
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||
|
||||
## <a href="" id="sec01"></a>Configure Active Directory for BitLocker
|
||||
|
||||
|
||||
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
||||
|
||||
**Note**
|
||||
Depending on the Active Directory Schema version, you might need to update the Schema before you can store BitLocker information in Active Directory.
|
||||
|
||||
|
||||
|
||||
In Windows Server 2012 R2 (as well as in Windows Server 2008 R2 and Windows Server 2012), you have access to the BitLocker Drive Encryption Administration Utilities features, which will help you manage BitLocker. When you install the features, the BitLocker Active Directory Recovery Password Viewer is included, and it extends Active Directory Users and Computers with BitLocker Recovery information.
|
||||
|
||||

|
||||
@ -56,23 +46,14 @@ Figure 2. The BitLocker Recovery information on a computer object in the contoso
|
||||
The BitLocker Drive Encryption Administration Utilities are added as features via Server Manager (or Windows PowerShell):
|
||||
|
||||
1. On DC01, log on as **CONTOSO\\Administrator**, and, using Server Manager, click **Add roles and features**.
|
||||
|
||||
2. On the **Before you begin** page, click **Next**.
|
||||
|
||||
3. On the **Select installation type** page, select **Role-based or feature-based installation**, and click **Next**.
|
||||
|
||||
4. On the **Select destination server** page, select **DC01.contoso.com** and click **Next**.
|
||||
|
||||
5. On the **Select server roles** page, click **Next**.
|
||||
|
||||
6. On the **Select features** page, expand **Remote Server Administration Tools**, expand **Feature Administration Tools**, select the following features, and then click **Next**:
|
||||
|
||||
1. BitLocker Drive Encryption Administration Utilities
|
||||
|
||||
2. BitLocker Drive Encryption Tools
|
||||
|
||||
3. BitLocker Recovery Password Viewer
|
||||
|
||||
7. On the **Confirm installation selections** page, click **Install** and then click **Close**.
|
||||
|
||||

|
||||
@ -82,44 +63,27 @@ Figure 3. Selecting the BitLocker Drive Encryption Administration Utilities.
|
||||
### Create the BitLocker Group Policy
|
||||
|
||||
Following these steps, you enable the backup of BitLocker and TPM recovery information to Active Directory. You also enable the policy for the TPM validation profile.
|
||||
|
||||
1. On DC01, using Group Policy Management, right-click the **Contoso** organizational unit (OU), and select **Create a GPO in this domain, and Link it here**.
|
||||
|
||||
2. Assign the name **BitLocker Policy** to the new Group Policy.
|
||||
|
||||
3. Expand the **Contoso** OU, right-click the **BitLocker Policy**, and select **Edit**. Configure the following policy settings:
|
||||
|
||||
Computer Configuration / Policies / Administrative Templates / Windows Components / BitLocker Drive Encryption / Operating System Drives
|
||||
|
||||
1. Enable the **Choose how BitLocker-protected operating system drives can be recovered** policy, and configure the following settings:
|
||||
|
||||
1. Allow data recovery agent (default)
|
||||
|
||||
2. Save BitLocker recovery information to Active Directory Domain Services (default)
|
||||
|
||||
3. Do not enable BitLocker until recovery information is stored in AD DS for operating system drives
|
||||
|
||||
2. Enable the **Configure TPM platform validation profile for BIOS-based firmware configurations** policy.
|
||||
|
||||
3. Enable the **Configure TPM platform validation profile for native UEFI firmware configurations** policy.
|
||||
|
||||
Computer Configuration / Policies / Administrative Templates / System / Trusted Platform Module Services
|
||||
|
||||
4. Enable the **Turn on TPM backup to Active Directory Domain Services** policy.
|
||||
|
||||
**Note**
|
||||
If you consistently get the error "Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system." after encrypting a computer with BitLocker, you might have to change the various "Configure TPM platform validation profile" Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using.
|
||||
|
||||
|
||||
|
||||
### Set permissions in Active Directory for BitLocker
|
||||
|
||||
In addition to the Group Policy created previously, you need to configure permissions in Active Directory to be able to store the TPM recovery information. In these steps, we assume you have downloaded the [Add-TPMSelfWriteACE.vbs script](http://go.microsoft.com/fwlink/p/?LinkId=167133) from Microsoft to C:\\Setup\\Scripts on DC01.
|
||||
|
||||
1. On DC01, start an elevated PowerShell prompt (run as Administrator).
|
||||
|
||||
2. Configure the permissions by running the following command:
|
||||
|
||||
``` syntax
|
||||
cscript C:\Setup\Scripts\Add-TPMSelfWriteACE.vbs
|
||||
```
|
||||
@ -130,27 +94,21 @@ Figure 4. Running the Add-TPMSelfWriteACE.vbs script on DC01.
|
||||
|
||||
## <a href="" id="sec02"></a>Add BIOS configuration tools from Dell, HP, and Lenovo
|
||||
|
||||
|
||||
If you want to automate enabling the TPM chip as part of the deployment process, you need to download the vendor tools and add them to your task sequences, either directly or in a script wrapper.
|
||||
|
||||
### Add tools from Dell
|
||||
|
||||
The Dell tools are available via the Dell Client Configuration Toolkit (CCTK). The executable file from Dell is named cctk.exe. Here is a sample command to enable TPM and set a BIOS password using the cctk.exe tool:
|
||||
|
||||
``` syntax
|
||||
cctk.exe --tpm=on --valsetuppwd=Password1234
|
||||
```
|
||||
|
||||
### Add tools from HP
|
||||
|
||||
The HP tools are part of HP System Software Manager. The executable file from HP is named BiosConfigUtility.exe. This utility uses a configuration file for the BIOS settings. Here is a sample command to enable TPM and set a BIOS password using the BiosConfigUtility.exe tool:
|
||||
|
||||
``` syntax
|
||||
BIOSConfigUtility.EXE /SetConfig:TPMEnable.REPSET /NewAdminPassword:Password1234
|
||||
```
|
||||
|
||||
And the sample content of the TPMEnable.REPSET file:
|
||||
|
||||
``` syntax
|
||||
English
|
||||
Activate Embedded Security On Next Boot
|
||||
@ -162,38 +120,26 @@ Allow user to reject
|
||||
Embedded Security Device Availability
|
||||
*Available
|
||||
```
|
||||
|
||||
### Add tools from Lenovo
|
||||
|
||||
The Lenovo tools are a set of VBScripts available as part of the Lenovo BIOS Setup using Windows Management Instrumentation Deployment Guide. Lenovo also provides a separate download of the scripts. Here is a sample command to enable TPM using the Lenovo tools:
|
||||
|
||||
``` syntax
|
||||
cscript.exe SetConfig.vbs SecurityChip Active
|
||||
```
|
||||
|
||||
## <a href="" id="sec03"></a>Configure the Windows 10 task sequence to enable BitLocker
|
||||
|
||||
|
||||
When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it is helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In this task sequence, we are using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](http://go.microsoft.com/fwlink/p/?LinkId=619549). In the following task sequence, we have added five actions:
|
||||
|
||||
- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script to determine if TPM is enabled. Depending on the status, the script will set the TPMEnabled and TPMActivated properties to either true or false.
|
||||
|
||||
- **Configure BIOS for TPM.** Runs the vendor tools (in this case, HP, Dell, and Lenovo). To ensure this action is run only when necessary, add a condition so the action is run only when the TPM chip is not already activated. Use the properties from the ZTICheckforTPM.wsf.
|
||||
|
||||
**Note**
|
||||
It is common for organizations wrapping these tools in scripts to get additional logging and error handling.
|
||||
|
||||
|
||||
|
||||
- **Restart computer.** Self-explanatory, reboots the computer.
|
||||
|
||||
- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script one more time.
|
||||
|
||||
- **Enable BitLocker.** Runs the built-in action to activate BitLocker.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-2013-for-userexit-scripts.md)
|
||||
@ -207,12 +153,3 @@ When configuring a task sequence to run any BitLocker tool, either directly or u
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,44 +2,31 @@
|
||||
title: Simulate a Windows 10 deployment in a test environment (Windows 10)
|
||||
description: This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT.
|
||||
ms.assetid: 2de86c55-ced9-4078-b280-35e0329aea9c
|
||||
keywords: ["deploy, script,"]
|
||||
keywords: deploy, script
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Simulate a Windows 10 deployment in a test environment
|
||||
|
||||
|
||||
This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT. When working with advanced settings and rules, especially those like database calls, it is most efficient to be able to test the settings without having to run through a complete deployment. Luckily, MDT enables you to perform a simulated deployment by running the Gather process by itself. The simulation works best when you are using a domain-joined machine (client or server). In the following example, you use the PC0001 Windows 10 client.
|
||||
|
||||
For the purposes of this topic, you already will have either downloaded and installed the free Microsoft System Center 2012 R2 Configuration Manager Toolkit, or copied Configuration Manager Trace (CMTrace) if you have access to the System Center 2012 R2 Configuration Manager media. We also assume that you have downloaded the [sample Gather.ps1 script](http://go.microsoft.com/fwlink/p/?LinkId=619361) from the TechNet gallery.
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\Administrator** using the password **P@ssw0rd**.
|
||||
|
||||
2. Using Computer Management, add the **CONTOSO\\MDT\_BA** user account to the local **Administrators** group.
|
||||
|
||||
3. Log off, and then log on to PC0001 as **CONTOSO\\MDT\_BA**.
|
||||
|
||||
4. Using File Explorer, create a folder named **C:\\MDT**.
|
||||
|
||||
5. Copy the downloaded Gather.ps1 script to the **C:\\MDT** folder.
|
||||
|
||||
6. From the **\\\\MDT01\\MDTProduction$\\Scripts** folder, copy the following files to **C:\\MDT**:
|
||||
|
||||
1. ZTIDataAccess.vbs
|
||||
|
||||
2. ZTIGather.wsf
|
||||
|
||||
3. ZTIGather.xml
|
||||
|
||||
4. ZTIUtility.vbs
|
||||
|
||||
7. From the **\\\\MDT01\\MDTProduction$\\Control** folder, copy the CustomSettings.ini file to **C:\\MDT**.
|
||||
|
||||
8. In the **C:\\MDT** folder, create a subfolder named **X64**.
|
||||
|
||||
9. From the **\\\\MDT01\\MDTProduction$\\Tools\\X64** folder, copy the Microsoft.BDD.Utility.dll file to **C:\\MDT\\X64**.
|
||||
|
||||

|
||||
@ -47,17 +34,13 @@ For the purposes of this topic, you already will have either downloaded and inst
|
||||
Figure 6. The C:\\MDT folder with the files added for the simulation environment.
|
||||
|
||||
10. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press Enter after each command:
|
||||
|
||||
``` syntax
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
```
|
||||
|
||||
11. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder.
|
||||
|
||||
**Note**
|
||||
Warnings or errors with regard to the Wizard.hta are expected. If the log file looks okay, you are ready to try a real deployment.
|
||||
|
||||
|
||||
|
||||

|
||||
@ -66,7 +49,6 @@ Figure 7. The ZTIGather.log file from PC0001, displaying some of its hardware ca
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
@ -80,12 +62,3 @@ Figure 7. The ZTIGather.log file from PC0001, displaying some of its hardware ca
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,32 +5,29 @@ ms.assetid: 39d4abd4-801a-4e8f-9b8c-425a24a96764
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Update Product Status
|
||||
After you add computers to the VAMT database, you need to use the **Update license status** function to add the products that are installed on the computers. You can also use the **Update license status** at any time to retrieve the most current license status for any products in the VAMT database.
|
||||
|
||||
After you add computers to the VAMT database, you need to use the **Update license status** function to add the products that are installed on the computers. You can also use the **Update license status** at any time to retrieve the most current license status for any products in the VAMT database.
|
||||
To retrieve license status, VAMT must have administrative permissions on all selected computers and Windows Management Instrumentation (WMI) must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||
|
||||
**Note**
|
||||
The license-status query requires a valid computer name for each system queried. If the VAMT database contains computers that were added without Personally Identifiable Information, computer names will not be available for those computers, and the status for these computers will not be updated.
|
||||
|
||||
## Update the license status of a product
|
||||
|
||||
1. Open VAMT.
|
||||
|
||||
2. In the **Products** list, select one or more products that need to have their status updated.
|
||||
|
||||
3. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer.
|
||||
|
||||
4. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||
|
||||
VAMT displays the **Collecting product information** dialog box while it collects the status of all selected products. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
||||
|
||||
**Note**
|
||||
If a previously discovered Microsoft Office 2010 product has been uninstalled from the remote computer, updating its licensing status will cause the entry to be deleted from the **Office** product list view, and, consequently, the total number of discovered products will be smaller. However, the Windows installation of the same computer will not be deleted and will always be shown in the **Windows** products list view.
|
||||
|
||||
|
||||
|
||||
## Related topics
|
||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
@ -2,25 +2,23 @@
|
||||
title: Upgrade to Windows 10 with the Microsoft Deployment Toolkit (Windows 10)
|
||||
description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
ms.assetid: B8993151-3C1E-4F22-93F4-2C5F2771A460
|
||||
keywords: ["upgrade, update, task sequence, deploy"]
|
||||
keywords: upgrade, update, task sequence, deploy
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Upgrade to Windows 10 with the Microsoft Deployment Toolkit
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Deployment Toolkit (MDT) 2013 Update 2 task sequence to completely automate the process.
|
||||
|
||||
## Proof-of-concept environment
|
||||
|
||||
|
||||
For the purposes of this topic, we will use four machines: DC01, MDT01, and PC0001. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard machine, fully patched with the latest security updates, and configured as a member server in the fictional contoso.com domain. PC0001 is a machine with Windows 7 SP1, targeted for the Windows 10 upgrade. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||
|
||||

|
||||
@ -29,12 +27,10 @@ Figure 1. The machines used in this topic.
|
||||
|
||||
## Set up the upgrade task sequence
|
||||
|
||||
|
||||
MDT 2013 Update 2 adds support for Windows 10 deployment, including a new in-place upgrade task sequence template that makes the process really simple.
|
||||
|
||||
## Create the MDT production deployment share
|
||||
|
||||
|
||||
The steps to create the deployment share for production are the same as when you created the deployment share to create the custom reference image:
|
||||
|
||||
1. On MDT01, log on as Administrator in the CONTOSO domain with a password of **P@ssw0rd**.
|
||||
@ -47,18 +43,14 @@ The steps to create the deployment share for production are the same as when you
|
||||
|
||||
## Add Windows 10 Enterprise x64 (full source)
|
||||
|
||||
|
||||
In these steps we assume that you have copied the content of a Windows 10 Enterprise x64 ISO to the E:\\Downloads\\Windows 10 Enterprise x64 folder.
|
||||
|
||||
1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**.
|
||||
2. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**.
|
||||
3. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard:
|
||||
- Full set of source files
|
||||
|
||||
- Source directory: E:\\Downloads\\Windows 10 Enterprise x64
|
||||
|
||||
- Destination directory name: W10EX64RTM
|
||||
|
||||
4. After you add the operating system, in the **Operating Systems / Windows 10** folder, double-click the added operating system name in the **Operating System** node and change the name to the following: **Windows 10 Enterprise x64 RTM Default Image**
|
||||
|
||||

|
||||
@ -67,25 +59,16 @@ Figure 2. The imported Windows 10 operating system after you rename it.
|
||||
|
||||
## Create a task sequence to upgrade to Windows 10 Enterprise
|
||||
|
||||
|
||||
1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, and create a folder named **Windows 10**.
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
- Task sequence ID: W10-X64-UPG
|
||||
|
||||
- Task sequence name: Windows 10 Enterprise x64 RTM Upgrade
|
||||
|
||||
- Template: Standard Client Upgrade Task Sequence
|
||||
|
||||
- Select OS: Windows 10 Enterprise x64 RTM RTM Default Image
|
||||
|
||||
- Specify Product Key: Do not specify a product key at this time
|
||||
|
||||
- Full Name: Contoso
|
||||
|
||||
- Organization: Contoso
|
||||
|
||||
- Internet Explorer home page: about:blank
|
||||
|
||||
- Admin Password: Do not specify an Administrator Password at this time
|
||||
|
||||

|
||||
@ -94,17 +77,17 @@ Figure 3. The task sequence to upgrade to Windows 10.
|
||||
|
||||
## Perform the Windows 10 upgrade
|
||||
|
||||
|
||||
To initiate the in-place upgrade, perform the following steps on PC0003 (currently running Windows 7 SP1).
|
||||
|
||||
1. Start the MDT deployment wizard by running the following command: **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**
|
||||
2. Select the **Windows 10 Enterprise x64 RTM Upgrade** task sequence, and then click **Next**.
|
||||
2. Select the **Windows 10 Enterprise x64 RTM Upgrade** task sequence, and then click **Next**.
|
||||
|
||||

|
||||
|
||||
Figure 4. Upgrade task sequence.
|
||||
|
||||
3. On the **Credentials** tab, specify the **MDT\_BA** account, **P@ssw0rd** password, and **CONTOSO** for the domain. (Some or all of these values can be specified in Bootstrap.ini so they are automatically populated.)
|
||||
4. On the **Ready** tab, click **Begin** to start the task sequence.
|
||||
|
||||
When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
||||
|
||||

|
||||
@ -115,16 +98,7 @@ After the task sequence completes, the computer will be fully upgraded to Window
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
|
||||
|
||||
[Microsoft Deployment Toolkit downloads and resources](http://go.microsoft.com/fwlink/p/?LinkId=618117)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,63 +2,45 @@
|
||||
title: Use Orchestrator runbooks with MDT (Windows 10)
|
||||
description: This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
ms.assetid: 68302780-1f6f-4a9c-9407-b14371fdce3f
|
||||
keywords: ["web services, database"]
|
||||
keywords: web services, database
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Use Orchestrator runbooks with MDT
|
||||
|
||||
|
||||
This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
|
||||
MDT can integrate with System Center 2012 R2 Orchestrator, which is a component that ties the Microsoft System Center products together, as well as other products from both Microsoft and third-party vendors. The difference between using Orchestrator and "normal" web services, is that with Orchestrator you have a rich drag-and-drop style interface when building the solution, and little or no coding is required.
|
||||
|
||||
**Note**
|
||||
If you are licensed to use Orchestrator, we highly recommend that you start using it. To find out more about licensing options for System Center 2012 R2 and Orchestrator, visit the [System Center 2012 R2](http://go.microsoft.com/fwlink/p/?LinkId=619553) website.
|
||||
|
||||
|
||||
|
||||
## <a href="" id="sec01"></a>Orchestrator terminology
|
||||
|
||||
|
||||
Before diving into the core details, here is a quick course in Orchestrator terminology:
|
||||
|
||||
- **Orchestrator Server.** This is a server that executes runbooks.
|
||||
|
||||
- **Runbooks.** A runbook is similar to a task sequence; it is a series of instructions based on conditions. Runbooks consist of workflow activities; an activity could be Copy File, Get User from Active Directory, or even Write to Database.
|
||||
|
||||
- **Orchestrator Designer.** This is where you build the runbooks. In brief, you do that by creating an empty runbook, dragging in the activities you need, and then connecting them in a workflow with conditions and subscriptions.
|
||||
|
||||
- **Subscriptions.** These are variables that come from an earlier activity in the runbook. So if you first execute an activity in which you type in a computer name, you can then subscribe to that value in the next activity. All these variables are accumulated during the execution of the runbook.
|
||||
|
||||
- **Orchestrator Console.** This is the Microsoft Silverlight-based web page you can use interactively to execute runbooks. The console listens to TCP port 81 by default.
|
||||
|
||||
- **Orchestrator web services.** These are the web services you use in the Microsoft Deployment Toolkit to execute runbooks during deployment. The web services listen to TCP port 82 by default.
|
||||
|
||||
- **Integration packs.** These provide additional workflow activities you can import to integrate with other products or solutions, like the rest of Active Directory, other System Center 2012 R2 products, or Microsoft Exchange Server, to name a few.
|
||||
|
||||
**Note**
|
||||
To find and download additional integration packs, see [Integration Packs for System Center 2012 - Orchestrator](http://go.microsoft.com/fwlink/p/?LinkId=619554).
|
||||
|
||||
|
||||
|
||||
## <a href="" id="sec02"></a>Create a sample runbook
|
||||
|
||||
|
||||
This section assumes you have Orchestrator 2012 R2 installed on a server named OR01. In this section, you create a sample runbook, which is used to log some of the MDT deployment information into a text file on OR01.
|
||||
|
||||
1. On OR01, using File Explorer, create the **E:\\Logfile** folder, and grant Users modify permissions (NTFS).
|
||||
|
||||
2. In the **E:\\Logfile** folder, create the DeployLog.txt file.
|
||||
|
||||
**Note**
|
||||
Make sure File Explorer is configured to show known file extensions so the file is not named DeployLog.txt.txt.
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
Figure 23. The DeployLog.txt file.
|
||||
@ -70,17 +52,11 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 24. Folder created in the Runbooks node.
|
||||
|
||||
4. In the **Runbooks** node, right-click the **1.0 MDT** folder, and select **New / Runbook**.
|
||||
|
||||
5. On the ribbon bar, click **Check Out**.
|
||||
|
||||
6. Right-click the **New Runbook** label, select **Rename**, and assign the name **MDT Sample**.
|
||||
|
||||
7. Add (using a drag-and-drop operation) the following items from the **Activities** list to the middle pane:
|
||||
|
||||
1. Runbook Control / Initialize Data
|
||||
|
||||
2. Text File Management / Append Line
|
||||
|
||||
8. Connect **Initialize Data** to **Append Line**.
|
||||
|
||||

|
||||
@ -88,7 +64,6 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 25. Activities added and connected.
|
||||
|
||||
9. Right-click the **Initialize Data** activity, and select **Properties**
|
||||
|
||||
10. On **the Initialize Data Properties** page, click **Add**, change **Parameter 1** to **OSDComputerName**, and then click **Finish**.
|
||||
|
||||

|
||||
@ -96,11 +71,8 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 26. The Initialize Data Properties window.
|
||||
|
||||
11. Right-click the **Append Line** activity, and select **Properties**.
|
||||
|
||||
12. On the **Append Line Properties** page, in the **File** text box, type **E:\\Logfile\\DeployLog.txt**.
|
||||
|
||||
13. In the **File** encoding drop-down list, select **ASCII**.
|
||||
|
||||
14. In the **Append** area, right-click inside the **Text** text box and select **Expand**.
|
||||
|
||||

|
||||
@ -114,9 +86,7 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 28. Subscribing to data.
|
||||
|
||||
16. In the **Published Data** window, select the **OSDComputerName** item, and click **OK**.
|
||||
|
||||
17. After the **{OSDComputerName from "Initialize Data"}** text, type in **has been deployed at** and, once again, right-click and select **Subscribe / Published Data**.
|
||||
|
||||
18. In the **Published Data** window, select the **Show common Published Data** check box, select the **Activity end time** item, and click **OK**.
|
||||
|
||||

|
||||
@ -124,22 +94,13 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 29. The expanded text box after all subscriptions have been added.
|
||||
|
||||
19. On the **Append Line Properties** page, click **Finish**.
|
||||
|
||||
## <a href="" id="sec03"></a>Test the demo MDT runbook
|
||||
|
||||
|
||||
After the runbook is created, you are ready to test it.
|
||||
|
||||
1. On the ribbon bar, click **Runbook Tester**.
|
||||
|
||||
2. Click **Run**, and in the **Initialize Data Parameters** dialog box, use the following setting and then click **OK**:
|
||||
|
||||
- OSDComputerName: PC0010
|
||||
|
||||
3. Verify that all activities are green (for additional information, see each target).
|
||||
|
||||
4. Close the **Runbook Tester**.
|
||||
|
||||
5. On the ribbon bar, click **Check In**.
|
||||
|
||||

|
||||
@ -148,39 +109,22 @@ Figure 30. All tests completed.
|
||||
|
||||
## Use the MDT demo runbook from MDT
|
||||
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node, and create a folder named **Orchestrator**.
|
||||
|
||||
2. Right-click the **Orchestrator** node, and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
1. Task sequence ID: OR001
|
||||
|
||||
2. Task sequence name: Orchestrator Sample
|
||||
|
||||
3. Task sequence comments: <blank>
|
||||
|
||||
4. Template: Custom Task Sequence
|
||||
|
||||
3. In the **Orchestrator** node, double-click the **Orchestrator Sample** task sequence, and then select the **Task Sequence** tab.
|
||||
|
||||
4. Remove the default **Application Install** action.
|
||||
|
||||
5. Add a **Gather** action and select the **Gather only local data (do not process rules)** option.
|
||||
|
||||
6. After the **Gather** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
|
||||
1. Name: Set Task Sequence Variable
|
||||
|
||||
2. Task Sequence Variable: OSDComputerName
|
||||
|
||||
3. Value: %hostname%
|
||||
|
||||
7. After the **Set Task Sequence Variable** action, add a new **Execute Orchestrator Runbook** action with the following settings:
|
||||
|
||||
1. Orchestrator Server: OR01.contoso.com
|
||||
|
||||
2. Use Browse to select **1.0 MDT / MDT Sample**.
|
||||
|
||||
8. Click **OK**.
|
||||
|
||||

|
||||
@ -189,34 +133,21 @@ Figure 31. The ready-made task sequence.
|
||||
|
||||
## Run the orchestrator sample task sequence
|
||||
|
||||
|
||||
Since this task sequence just starts a runbook, you can test this on the PC0001 client that you used for the MDT simulation environment.
|
||||
|
||||
**Note**
|
||||
Make sure the account you are using has permissions to run runbooks on the Orchestrator server. For more information about runbook permissions, see [Runbook Permissions](http://go.microsoft.com/fwlink/p/?LinkId=619555).
|
||||
|
||||
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
|
||||
2. Using an elevated command prompt (run as Administrator), type the following command:
|
||||
|
||||
``` syntax
|
||||
cscript \\MDT01\MDTProduction$\Scripts\Litetouch.vbs
|
||||
```
|
||||
|
||||
3. Complete the Windows Deployment Wizard using the following information:
|
||||
|
||||
1. Task Sequence: Orchestrator Sample
|
||||
|
||||
2. Credentials:
|
||||
|
||||
1. User Name: MDT\_BA
|
||||
|
||||
2. Password: P@ssw0rd
|
||||
|
||||
3. Domain: CONTOSO
|
||||
|
||||
4. Wait until the task sequence is completed and then verify that the DeployLog.txt file in the E:\\Logfile folder on OR01 was updated.
|
||||
|
||||

|
||||
@ -225,7 +156,6 @@ Figure 32. The ready-made task sequence.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
@ -236,15 +166,7 @@ Figure 32. The ready-made task sequence.
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,7 +2,8 @@
|
||||
title: Use the MDT database to stage Windows 10 deployment information (Windows 10)
|
||||
description: This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini).
|
||||
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
|
||||
keywords: ["database, permissions, settings, configure, deploy"]
|
||||
ms.pagetype: mdt
|
||||
keywords: database, permissions, settings, configure, deploy
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
@ -11,43 +12,29 @@ author: mtniehaus
|
||||
|
||||
# Use the MDT database to stage Windows 10 deployment information
|
||||
|
||||
|
||||
This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini). You can use this process, for example, to add the client machines you want to deploy, specify their computer names and IP addresses, indicate applications to be deployed, and determine many additional settings for the machines.
|
||||
|
||||
## <a href="" id="sec01"></a>Database prerequisites
|
||||
|
||||
|
||||
MDT can use either SQL Server Express or full SQL Server, but since the deployment database isn't big, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment.
|
||||
|
||||
**Note**
|
||||
Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database.
|
||||
|
||||
|
||||
|
||||
## <a href="" id="sec02"></a>Create the deployment database
|
||||
|
||||
|
||||
The MDT database is by default created and managed from the Deployment Workbench. In these steps, we assume you have installed SQL Server 2012 SP1 Express on MDT01.
|
||||
|
||||
**Note**
|
||||
Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01.
|
||||
|
||||
|
||||
|
||||
1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**.
|
||||
|
||||
2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and click **Next**:
|
||||
|
||||
1. SQL Server Name: MDT01
|
||||
|
||||
2. Instance: SQLEXPRESS
|
||||
|
||||
3. Port: <blank>
|
||||
|
||||
4. Network Library: Named Pipes
|
||||
|
||||
3. On the **Database** page, select **Create a new database**; in the **Database** field, type **MDT** and click **Next**.
|
||||
|
||||
4. On the **SQL Share** page, in the **SQL Share** field, type **Logs$** and click **Next**. Click **Next** again and then click **Finish**.
|
||||
|
||||

|
||||
@ -56,13 +43,9 @@ Figure 8. The MDT database added to MDT01.
|
||||
|
||||
## <a href="" id="sec03"></a>Configure database permissions
|
||||
|
||||
|
||||
After creating the database, you need to assign permissions to it. In MDT, the account you used to run the deployment is used to access the database. In this environment, the network access account is MDT\_BA.
|
||||
|
||||
1. On MDT01, start SQL Server Management Studio.
|
||||
|
||||
2. In the **Connect to Server** dialog box, in the **Server name** list, select **MDT01\\SQLEXPRESS** and click **Connect**.
|
||||
|
||||
3. In the **Object Explorer** pane, expand the top-level **Security** node, right-click **Logins**, and select **New Login**.
|
||||
|
||||

|
||||
@ -70,11 +53,8 @@ After creating the database, you need to assign permissions to it. In MDT, the a
|
||||
Figure 9. The top-level Security node.
|
||||
|
||||
4. On the **Login - New** page, next to the **Login** name field, click **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles:
|
||||
|
||||
1. db\_datareader
|
||||
|
||||
2. public (default)
|
||||
|
||||
5. Click **OK**, and close SQL Server Management Studio.
|
||||
|
||||

|
||||
@ -83,17 +63,11 @@ Figure 10. Creating the login and settings permissions to the MDT database.
|
||||
|
||||
## <a href="" id="sec04"></a>Create an entry in the database
|
||||
|
||||
|
||||
To start using the database, you add a computer entry and assign a description and computer name. Use the computer's MAC Address as the identifier.
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration**, and expand **Database**.
|
||||
|
||||
2. Right-click **Computers**, select **New**, and add a computer entry with the following settings:
|
||||
|
||||
1. Description: New York Site - PC00075
|
||||
|
||||
2. MacAddress: <PC00075 MAC Address in the 00:00:00:00:00:00 format>
|
||||
|
||||
3. Details Tab / OSDComputerName: PC00075
|
||||
|
||||

|
||||
@ -102,7 +76,6 @@ Figure 11. Adding the PC00075 computer to the database.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
@ -116,12 +89,3 @@ Figure 11. Adding the PC00075 computer to the database.
|
||||
[Use web services in MDT](use-web-services-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Use the Volume Activation Management Tool (Windows 10)
|
||||
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
||||
ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Use the Volume Activation Management Tool
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -21,27 +22,26 @@ author: jdeckerMS
|
||||
- Windows Server 2008 R2
|
||||
|
||||
**Looking for retail activation?**
|
||||
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
||||
|
||||
By using the VAMT, you can automate and centrally manage the volume, retail, and MAK activation process for Windows, Office, and select other Microsoft products. The VAMT can manage volume activation by using MAKs or KMS. It is a standard Microsoft Management Console snap-in, and it can be installed on any computer running Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2.
|
||||
By using the VAMT, you can automate and centrally manage the volume, retail, and MAK activation process for Windows, Office, and select other Microsoft products. The VAMT can manage volume activation by using MAKs or KMS. It is a standard Microsoft Management Console snap-in, and it can be
|
||||
installed on any computer running Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2.
|
||||
|
||||
The VAMT is distributed as part of the Windows Assessment and Deployment Kit (Windows ADK), which is a free download available from Microsoft Download Center. For more information, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=526740).
|
||||
|
||||
In Windows Server 2012 R2, you can install the VAMT directly from Server Manager without downloading the Windows ADK by selecting the Volume Activation Services role or the Remote Server Administration Tools/Role Administration Tools/Volume Activation Tools feature.
|
||||
|
||||
## Activating with the Volume Activation Management Tool
|
||||
|
||||
You can use the VAMT to complete the activation process in products by using MAK and retail keys, and you can work with computers individually or in groups. The VAMT enables two activation scenarios:
|
||||
|
||||
- **Online activation**. Online activation enables you to activate over the Internet any products that are installed with MAK, KMS host, or retail product keys. You can activate one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
||||
|
||||
- **Proxy activation**. This activation method enables you to perform volume activation for products that are installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS host key, or retail product key to one or more client products and collects the installation ID from each client product. The VAMT host sends the installation IDs to Microsoft on behalf of the client products and obtains the corresponding confirmation IDs. The VAMT host then installs the confirmation IDs on the client products to complete their activation.
|
||||
|
||||
By using this method, only the VAMT host computer requires Internet access. Proxy activation by using the VAMT is beneficial for isolated network segments and for cases where your organization has a mix of retail, MAK, and KMS-based activations.
|
||||
|
||||
## Tracking products and computers with the Volume Activation Management Tool
|
||||
|
||||
The VAMT provides an overview of the activation and licensing status of computers across your network, as shown in Figure 18. Several prebuilt reports are also available to help you proactively manage licensing.
|
||||
|
||||

|
||||
@ -49,6 +49,7 @@ The VAMT provides an overview of the activation and licensing status of computer
|
||||
**Figure 18**. The VAMT showing the licensing status of multiple computers
|
||||
|
||||
## Tracking key usage with the Volume Activation Management Tool
|
||||
|
||||
The VAMT makes it easier to track the various keys that are issued to your organization. You can enter each key into VAMT, and then the VAMT can use those keys for online or proxy activation of clients. The tool can also describe what type of key it is and to which product group it belongs. The VAMT is the most convenient way to quickly determine how many activations remain on a MAK. Figure 19 shows an example of key types and usage.
|
||||
|
||||

|
||||
@ -56,28 +57,17 @@ The VAMT makes it easier to track the various keys that are issued to your organ
|
||||
**Figure 19**. The VAMT showing key types and usage
|
||||
|
||||
## Other Volume Activation Management Tool features
|
||||
|
||||
The VAMT stores information in a Microsoft SQL Server database for performance and flexibility, and it provides a single graphical user interface for managing activations and performing other activation-related tasks, such as:
|
||||
|
||||
- **Adding and removing computers**. You can use the VAMT to discover computers in the local environment. The VAMT can discover computers by querying AD DS, workgroups, or individual computer names or IP addresses, or through a general LDAP query.
|
||||
|
||||
- **Discovering products**. You can use the VAMT to discover Windows, Windows Server, Office, and select other products that are installed on the client computers.
|
||||
|
||||
- **Managing activation data**. The VAMT stores activation data in a SQL Server database. The tool can export this data in XML format to other VAMT hosts or to an archive.
|
||||
|
||||
For more information, see:
|
||||
|
||||
- [Volume Activation Management Tool (VAMT) Overview](http://go.microsoft.com/fwlink/p/?LinkId=618266)
|
||||
|
||||
- [VAMT Step-by-Step Scenarios](http://go.microsoft.com/fwlink/p/?LinkId=618267)
|
||||
|
||||
## See also
|
||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,31 +5,24 @@ ms.assetid: 13e0ceec-d827-4681-a5c3-8704349e3ba9
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Use VAMT in Windows PowerShell
|
||||
|
||||
The Volume Activation Management Tool (VAMT) PowerShell cmdlets can be used to perform the same functions as the Vamt.exe command-line tool.
|
||||
|
||||
**To install PowerShell 3.0**
|
||||
|
||||
- VAMT PowerShell cmdlets require Windows PowerShell, which is included in Windows 10, Windows 8 and Windows Server® 2012. You can download PowerShell for Windows 7 or other operating systems from the [Microsoft Download Center](http://go.microsoft.com/fwlink/p/?LinkId=218356).
|
||||
|
||||
**To install the Windows Assessment and Deployment Kit**
|
||||
|
||||
- In addition to PowerShell, you must import the VAMT PowerShell module. The module is included in the VAMT 3.0 folder after you install the Windows Assessment and Deployment Kit (Windows ADK).
|
||||
|
||||
**To prepare the VAMT PowerShell environment**
|
||||
|
||||
1. To open PowerShell with administrative credentials, click **Start** and type “PowerShell” to locate the program. Right-click **Windows PowerShell**, and then click **Run as administrator**. To open PowerShell in Windows 7, click **Start**, click **All Programs**, click **Accessories**, click **Windows PowerShell**, right-click **Windows PowerShell**, and then click **Run as administrator**.
|
||||
|
||||
**Important**
|
||||
If you are using a computer that has an 64-bit processor, select **Windows PowerShell (x86)**. VAMT PowerShell cmdlets are supported for the x86 architecture only. You must use an x86 version of Windows PowerShell to import the VAMT module, which are available in these directories:
|
||||
|
||||
- The x86 version of PowerShell is available in C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe
|
||||
|
||||
- The x86 version of the PowerShell ISE is available in C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell\_ise.exe
|
||||
|
||||
2. For all supported operating systems you can use the VAMT PowerShell module included with the Windows ADK. By default, the module is installed with the Windows ADK in the VAMT folder. Change directories to the directory where VAMT is located.
|
||||
|
||||
For example, if the Windows ADK is installed in the default location of `C:\Program Files(x86)\Windows Kits\10`, type:
|
||||
@ -38,20 +31,18 @@ The Volume Activation Management Tool (VAMT) PowerShell cmdlets can be used to p
|
||||
cd “C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\VAMT 3.0”
|
||||
```
|
||||
3. Import the VAMT PowerShell module. To import the module, type the following at a command prompt:
|
||||
|
||||
``` syntax
|
||||
Import-Module .\VAMT.psd1
|
||||
```
|
||||
Where **Import-Module** imports a module only into the current session. To import the module into all sessions, add an **Import-Module** command to a Windows PowerShell profile. For more information about profiles, type `get-help about_profiles`.
|
||||
|
||||
## To Get Help for VAMT PowerShell cmdlets
|
||||
You can view all of the help sections for a VAMT PowerShell cmdlet, or you can view only the section that you are interested in. To view all of the Help content for a VAMT cmdlet, type:
|
||||
|
||||
You can view all of the help sections for a VAMT PowerShell cmdlet, or you can view only the section that you are interested in. To view all of the Help content for a VAMT cmdlet, type:
|
||||
``` ps1
|
||||
get-help <cmdlet name> -all
|
||||
```
|
||||
For example, type:
|
||||
|
||||
``` ps1
|
||||
get-help get-VamtProduct -all
|
||||
```
|
||||
@ -62,24 +53,18 @@ The update-help cmdlet is not supported for VAMT PowerShell cmdlets. To view onl
|
||||
**To view VAMT PowerShell Help sections**
|
||||
|
||||
1. To get the syntax to use with a cmdlet, type the following at a command prompt:
|
||||
|
||||
``` ps1
|
||||
get-help <cmdlet name>
|
||||
```
|
||||
For example, type:
|
||||
|
||||
``` ps1
|
||||
get-help get-VamtProduct
|
||||
```
|
||||
|
||||
2. To see examples using a cmdlet, type:
|
||||
|
||||
``` ps1
|
||||
get-help <cmdlet name> -examples
|
||||
```
|
||||
|
||||
For example, type:
|
||||
|
||||
``` ps1
|
||||
get-help get-VamtProduct -examples
|
||||
```
|
@ -2,39 +2,29 @@
|
||||
title: Use web services in MDT (Windows 10)
|
||||
description: In this topic, you will learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment.
|
||||
ms.assetid: 8f47535e-0551-4ccb-8f02-bb97539c6522
|
||||
keywords: ["deploy, web apps"]
|
||||
keywords: deploy, web apps
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.pagetype: mdt
|
||||
ms.sitesec: library
|
||||
author: mtniehaus
|
||||
---
|
||||
|
||||
# Use web services in MDT
|
||||
|
||||
|
||||
In this topic, you will learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment. Web services provide a powerful way to assign settings during a deployment. Simply put, web services are web applications that run code on the server side, and MDT has built-in functions to call these web services.
|
||||
|
||||
Using a web service in MDT is straightforward, but it does require that you have enabled the Web Server (IIS) role on the server. Developing web services involves a little bit of coding, but for most web services used with MDT, you can use the free Microsoft Visual Studio Express 2013 for Web.
|
||||
|
||||
## <a href="" id="sec01"></a>Create a sample web service
|
||||
|
||||
|
||||
In these steps we assume you have installed Microsoft Visual Studio Express 2013 for Web on PC0001 (the Windows 10 client) and downloaded the [MDT Sample Web Service](http://go.microsoft.com/fwlink/p/?LinkId=619363) from the Microsoft Download Center and extracted it to C:\\Projects.
|
||||
|
||||
1. On PC0001, using Visual Studio Express 2013 for Web, open the C:\\Projects\\MDTSample\\ MDTSample.sln solution file.
|
||||
|
||||
2. On the ribbon bar, verify that Release is selected.
|
||||
|
||||
3. In the **Debug** menu, select the **Build MDTSample** action.
|
||||
|
||||
4. On MDT01, create a folder structure for **E:\\MDTSample\\bin**.
|
||||
|
||||
5. From PC0001, copy the C:\\Projects\\MDTSample\\obj\\Release\\MDTSample.dll file to the **E:\\MDTSample\\bin** folder on MDT01.
|
||||
|
||||
6. From PC0001, copy the following files from C:\\Projects\\MDTSample file to the **E:\\MDTSample** folder on MDT01:
|
||||
|
||||
1. Web.config
|
||||
|
||||
2. mdtsample.asmx
|
||||
|
||||

|
||||
@ -43,23 +33,14 @@ Figure 15. The sample project in Microsoft Visual Studio Express 2013 for Web.
|
||||
|
||||
## <a href="" id="sec02"></a>Create an application pool for the web service
|
||||
|
||||
|
||||
This section assumes that you have enabled the Web Server (IIS) role on MDT01.
|
||||
|
||||
1. On MDT01, using Server Manager, install the **IIS Management Console** role (available under Web Server (IIS) / Management Tools).
|
||||
|
||||
2. Using Internet Information Services (IIS) Manager, expand the **MDT01 (CONTOSO\\Administrator)** node. If prompted with the "Do you want to get started with Microsoft Web Platform?" question, select the **Do not show this message** check box and then click **No**.
|
||||
|
||||
3. Right-click **Application Pools**, select **Add Application Pool**, and configure the new application pool with the following settings:
|
||||
|
||||
1. Name: MDTSample
|
||||
|
||||
2. .NET Framework version: .NET Framework 4.0.30319
|
||||
|
||||
3. Manage pipeline mode: Integrated
|
||||
|
||||
4. Select the **Start application pool immediately** check box.
|
||||
|
||||
5. Click **OK**.
|
||||
|
||||

|
||||
@ -68,13 +49,9 @@ Figure 16. The new MDTSample application.
|
||||
|
||||
## <a href="" id="sec03"></a>Install the web service
|
||||
|
||||
|
||||
1. On MDT01, using Internet Information Services (IIS) Manager, expand **Sites**, right-click **Default Web Site**, and select **Add Application**. Use the following settings for the application:
|
||||
|
||||
1. Alias: MDTSample
|
||||
|
||||
2. Application pool: MDTSample
|
||||
|
||||
3. Physical Path: E:\\MDTSample
|
||||
|
||||

|
||||
@ -82,9 +59,7 @@ Figure 16. The new MDTSample application.
|
||||
Figure 17. Adding the MDTSample web application.
|
||||
|
||||
2. In the **Default Web Site** node, select the MDTSample web application, and in the right pane, double-click **Authentication**. Use the following settings for the **Authentication** dialog box:
|
||||
|
||||
1. Anonymous Authentication: Enabled
|
||||
|
||||
2. ASP.NET Impersonation: Disabled
|
||||
|
||||

|
||||
@ -93,19 +68,14 @@ Figure 18. Configuring Authentication for the MDTSample web service.
|
||||
|
||||
## <a href="" id="sec04"></a>Test the web service in Internet Explorer
|
||||
|
||||
|
||||
1. On PC0001, using Internet Explorer, navigate to: **http://MDT01/MDTSample/mdtsample.asmx**.
|
||||
|
||||
2. Click the **GetComputerName** link.
|
||||
|
||||

|
||||
|
||||
Figure 19. The MDT Sample web service.
|
||||
|
||||
3. On the **GetComputerName** page, type in the following settings, and click **Invoke**:
|
||||
|
||||
1. Model: Hewlett-Packard
|
||||
|
||||
2. SerialNumber: 123456789
|
||||
|
||||

|
||||
@ -114,37 +84,29 @@ Figure 20. The result from the MDT Sample web service.
|
||||
|
||||
## <a href="" id="sec05"></a>Test the web service in the MDT simulation environment
|
||||
|
||||
|
||||
After verifying the web service using Internet Explorer, you are ready to do the same test in the MDT simulation environment.
|
||||
|
||||
1. On PC0001, edit the CustomSettings.ini file in the **C:\\MDT** folder to look like the following:
|
||||
|
||||
``` syntax
|
||||
[Settings]
|
||||
Priority=Default, GetComputerName
|
||||
|
||||
[Default]
|
||||
OSInstall=YES
|
||||
|
||||
[GetComputerName]
|
||||
WebService=http://mdt01/MDTSample/mdtsample.asmx/GetComputerName
|
||||
Parameters=Model,SerialNumber
|
||||
OSDComputerName=string
|
||||
```
|
||||
|
||||

|
||||
|
||||
Figure 21. The updated CustomSettings.ini file.
|
||||
|
||||
2. Save the CustomSettings.ini file.
|
||||
|
||||
3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command:
|
||||
|
||||
``` syntax
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
```
|
||||
|
||||
4. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder.
|
||||
|
||||

|
||||
@ -153,7 +115,6 @@ Figure 22. The OSDCOMPUTERNAME value obtained from the web service.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-2013-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
@ -167,12 +128,4 @@ Figure 22. The OSDCOMPUTERNAME value obtained from the web service.
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt-2013.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt-2013.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,25 +5,16 @@ ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# VAMT Known Issues
|
||||
|
||||
The following list contains the current known issues with the Volume Activation Management Tool (VAMT) 3.0.
|
||||
|
||||
- The VAMT Windows Management Infrastructure (WMI) remote operations may take longer to execute if the target computer is in a sleep or standby state.
|
||||
|
||||
- Recovery of Non-Genuine computers is a two-step process. VAMT can be used to install a new product key and activate the computer. However, the computer itself must visit the [Windows Genuine Advantage](http://go.microsoft.com/fwlink/p/?linkid=182914) Web site to revalidate the computer's Genuine status. Upon successfully completing this step, the computer will be restored to full functionality. For more information on recovering Non-Genuine Windows computers, go to [Windows Volume Activation](http://go.microsoft.com/fwlink/p/?linkid=184668).
|
||||
|
||||
- When opening a Computer Information List (.cil file) saved in a previous version of VAMT, the edition information is not shown for each product in the center pane. Users must update the product status again to obtain the edition information.
|
||||
|
||||
- The remaining activation count can only be retrieved for MAKs.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,13 +5,16 @@ ms.assetid: d14d152b-ab8a-43cb-a8fd-2279364007b9
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# VAMT Requirements
|
||||
|
||||
This topic includes info about the product key and system requirements for VAMT.
|
||||
|
||||
## Product Key Requirements
|
||||
|
||||
The Volume Activation Management Tool (VAMT) can be used to perform activations using any of the following types of product keys.
|
||||
|
||||
|Product key type |Where to obtain |
|
||||
@ -20,6 +23,7 @@ The Volume Activation Management Tool (VAMT) can be used to perform activations
|
||||
|Retail product keys |Obtained at time of product purchase. |
|
||||
|
||||
## System Requirements
|
||||
|
||||
The following table lists the system requirements for the VAMT host computer.
|
||||
|
||||
|Item |Minimum system requirement |
|
||||
@ -31,7 +35,8 @@ The following table lists the system requirements for the VAMT host computer.
|
||||
|Display |1024x768 or higher resolution monitor |
|
||||
|Network |Connectivity to remote computers via Windows® Management Instrumentation (TCP/IP) and Microsoft® Activation Web Service on the Internet via HTTPS |
|
||||
|Operating System |Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, or Windows Server 2012. |
|
||||
|Additional Requirements |<ul><li>Connection to a SQL Server database. For more info, see [Install VAMT](install-vamt.md).</li><li>PowerShell 3.0: For Windows 8, Windows 8.1, Windows 10, and Windows Server® 2012, PowerShell is included in the installation. For previous versions of Windows and Windows Server, you must download PowerShell 3.0. To download PowerShell, go to [Download Windows PowerShell 3.0](http://go.microsoft.com/fwlink/p/?LinkId=218356).</li><li>If installing on Windows Server 2008 R2, you must also install .NET Framework 3.51.</li></ul> |
|
||||
|Additional Requirements |<ul><li>Connection to a SQL Server database. For more info, see [Install VAMT](install-vamt.md).</li><li>PowerShell 3.0: For Windows 8, Windows 8.1, Windows 10, and Windows Server® 2012, PowerShell is included in the installation. For previous versions of Windows and
|
||||
Windows Server, you must download PowerShell 3.0. To download PowerShell, go to [Download Windows PowerShell 3.0](http://go.microsoft.com/fwlink/p/?LinkId=218356).</li><li>If installing on Windows Server 2008 R2, you must also install .NET Framework 3.51.</li></ul> |
|
||||
|
||||
## Related topics
|
||||
- [Install and Configure VAMT](install-configure-vamt.md)
|
@ -5,10 +5,12 @@ ms.assetid: 455c542c-4860-4b57-a1f0-7e2d28e11a10
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# VAMT Step-by-Step Scenarios
|
||||
|
||||
This section provides step-by-step instructions on implementing the Volume Activation Management Tool (VAMT) in typical environments. VAMT supports many common scenarios; the scenarios in this section describe some of the most common to get you started.
|
||||
|
||||
## In this Section
|
||||
@ -21,12 +23,5 @@ This section provides step-by-step instructions on implementing the Volume Activ
|
||||
|
||||
## Related topics
|
||||
- [Introduction to VAMT](introduction-vamt.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,34 +5,30 @@ ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Volume Activation Management Tool (VAMT) Technical Reference
|
||||
|
||||
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
||||
|
||||
VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
|
||||
|
||||
- Windows® 7
|
||||
|
||||
- Windows 8
|
||||
|
||||
- Windows 8.1
|
||||
|
||||
- Windows 10
|
||||
|
||||
- Windows Server 2008 R2
|
||||
|
||||
- Windows Server® 2012
|
||||
|
||||
- Windows Server 2012 R2
|
||||
|
||||
**Important**
|
||||
VAMT is designed to manage volume activation for: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Microsoft Office 2010, and Microsoft Office 2013. Computers installed with volume editions of **Windows XP** or **Windows Server 2003** cannot be managed using VAMT. However, Office 2010 and Office 2013 products installed on these two operating systems can still be managed.
|
||||
VAMT is designed to manage volume activation for: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Microsoft Office 2010, and Microsoft Office 2013. Computers installed with volume editions of
|
||||
**Windows XP** or **Windows Server 2003** cannot be managed using VAMT. However, Office 2010 and Office 2013 products installed on these two operating systems can still be managed.
|
||||
|
||||
VAMT is only available in an EN-US (x86) package.
|
||||
|
||||
## In this Section
|
||||
|
||||
|Topic |Description |
|
||||
|------|------------|
|
||||
|[Introduction to VAMT](introduction-vamt.md) |Provides a description of VAMT and common usages. |
|
||||
@ -44,14 +40,4 @@ VAMT is only available in an EN-US (x86) package.
|
||||
|[Manage VAMT Data](manage-vamt-data.md) |Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT. |
|
||||
|[VAMT Step-by-Step Scenarios](vamt-step-by-step.md) |Provides step-by-step instructions for using VAMT in typical environments. |
|
||||
|[VAMT Known Issues](vamt-known-issues.md) |Lists known issues in VAMT. |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -2,16 +2,17 @@
|
||||
title: Volume Activation for Windows 10 (Windows 10)
|
||||
description: This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows.
|
||||
ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2
|
||||
keywords: ["vamt", "volume activation", "activation", "windows activation"]
|
||||
keywords: vamt, volume activation, activation, windows activation
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
author: jdeckerMS
|
||||
---
|
||||
|
||||
# Volume Activation for Windows 10
|
||||
**Applies to**
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 8.1
|
||||
- Windows 8
|
||||
@ -21,66 +22,42 @@ author: jdeckerMS
|
||||
- Windows Server 2008 R2
|
||||
|
||||
**Looking for volume licensing information?**
|
||||
|
||||
- [Download the Volume Licensing Reference Guide for Windows 10 Desktop Operating System](http://go.microsoft.com/fwlink/p/?LinkId=620104)
|
||||
|
||||
**Looking for retail activation?**
|
||||
|
||||
- [Get Help Activating Microsoft Windows](http://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||
|
||||
This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows.
|
||||
|
||||
*Volume activation* is the process that Microsoft volume licensing customers use to automate and manage the activation of Windows operating systems, Microsoft Office, and other Microsoft products across large organizations. Volume licensing is available to customers who purchase software under various volume programs (such as Open and Select) and to participants in programs such as the Microsoft Partner Program and MSDN Subscriptions.
|
||||
|
||||
Volume activation is a configurable solution that helps automate and manage the product activation process on computers running Windows operating systems that have been licensed under a volume licensing program. Volume activation is also used with other software from Microsoft (most notably the Office suites) that are sold under volume licensing agreements and that support volume activation.
|
||||
|
||||
This guide provides information and step-by-step guidance to help you choose a volume activation method that suits your environment, and then to configure that solution successfully. This guide describes the volume activation features that are available in Windows 10 and Windows Server 2012 R2 and the tools that are provided in these versions of Windows and Windows Server to manage volume activation.
|
||||
|
||||
Because most organizations will not immediately switch all computers to Windows 10, practical volume activation strategies must also take in to account how to work with the Windows 8, Windows 7, Windows Server 2012, and Windows Server 2008 R2Windows Server 2008 R2 operating systems. This guide discusses how the new volume activation tools can support earlier operating systems, but it does not discuss the tools that are provided with earlier operating system versions.
|
||||
Because most organizations will not immediately switch all computers to Windows 10, practical volume activation strategies must also take in to account how to work with the Windows 8, Windows 7, Windows Server 2012, and Windows Server 2008 R2Windows Server 2008 R2 operating systems. This guide
|
||||
discusses how the new volume activation tools can support earlier operating systems, but it does not discuss the tools that are provided with earlier operating system versions.
|
||||
|
||||
Volume activation—and the need for activation itself—is not new, and this guide does not review all of its concepts and history. You can find additional background in the appendices of this guide. For more information, see [Volume Activation Overview](http://go.microsoft.com/fwlink/p/?LinkId=618209) in the TechNet Library.
|
||||
|
||||
If you would like additional information about planning a volume activation deployment specifically for Windows 7 and Windows Server 2008 R2, please see the [Volume Activation Planning Guide for Windows 7](http://go.microsoft.com/fwlink/p/?LinkId=618210).
|
||||
|
||||
To successfully plan and implement a volume activation strategy, you must:
|
||||
|
||||
- Learn about and understand product activation.
|
||||
|
||||
- Review and evaluate the available activation types or models.
|
||||
|
||||
- Consider the connectivity of the clients to be activated.
|
||||
|
||||
- Choose the method or methods to be used with each type of client.
|
||||
|
||||
- Determine the types and number of product keys you will need.
|
||||
|
||||
- Determine the monitoring and reporting needs in your organization.
|
||||
|
||||
- Install and configure the tools required to support the methods selected.
|
||||
|
||||
Keep in mind that the method of activation does not change an organization’s responsibility to the licensing requirements. You must ensure that all software used in your organization is properly licensed and activated in accordance with the terms of the licensing agreements in place.
|
||||
|
||||
**In this guide:**
|
||||
|
||||
- [Plan for volume activation](plan-for-volume-activation-client.md)
|
||||
|
||||
- [Activate using Key Management Service](activate-using-key-management-service-vamt.md)
|
||||
|
||||
- [Activate using Active Directory-based activation](activate-using-active-directory-based-activation-client.md)
|
||||
|
||||
- [Activate clients running Windows 10](activate-windows-10-clients-vamt.md)
|
||||
|
||||
- [Monitor activation](monitor-activation-client.md)
|
||||
|
||||
- [Use the Volume Activation Management Tool](use-the-volume-activation-management-tool-client.md)
|
||||
|
||||
- [Appendix: Information sent to Microsoft during activation](appendix-information-sent-to-microsoft-during-activation-client.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,21 +5,19 @@ ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Access Credential Manager as a trusted caller
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Access Credential Manager as a trusted caller** policy setting is used by Credential Manager during backup and restore. No accounts should have this privilege because it is assigned only to the Winlogon service. Saved credentials of users may be compromised if this privilege is given to other entities.
|
||||
|
||||
Constant: SeTrustedCredManAccessPrivilege
|
||||
@ -27,7 +25,6 @@ Constant: SeTrustedCredManAccessPrivilege
|
||||
### Possible values
|
||||
|
||||
- User-defined list of accounts
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
@ -40,52 +37,17 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Use
|
||||
|
||||
### Default values
|
||||
|
||||
The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default domain policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default domain controller policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-alone server default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Domain controller effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member server effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client computer effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default domain policy | Not defined |
|
||||
| Default domain controller policy | Not defined |
|
||||
| Stand-alone server default settings | Not defined |
|
||||
| Domain controller effective default settings | Not defined |
|
||||
| Member server effective default settings | Not defined |
|
||||
| Client computer effective default settings | Not defined |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
This section describes features, tools, and guidance to help you manage this policy.
|
||||
|
||||
A restart of the computer is not required for this policy setting to be effective.
|
||||
@ -95,20 +57,15 @@ Any change to the user rights assignment for an account becomes effective the ne
|
||||
### Group Policy
|
||||
|
||||
Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:
|
||||
|
||||
1. Local policy settings
|
||||
|
||||
2. Site policy settings
|
||||
|
||||
3. Domain policy settings
|
||||
|
||||
4. OU policy settings
|
||||
|
||||
When a local setting is greyed out, it indicates that a GPO currently controls that setting.
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -124,15 +81,5 @@ Do not define the **Access Credential Manager as a trusted caller** policy setti
|
||||
None. Not defined is the default configuration.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[User Rights Assignment](user-rights-assignment.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,25 +5,22 @@ ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Access this computer from the network
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Access this computer from the network** policy setting determines which users can connect to the device from the network. This capability is required by a number of network protocols, including Server Message Block (SMB)-based protocols, NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+).
|
||||
|
||||
Users, devices, and service accounts gain or lose the **Access this computer from network** user right by being explicitly or implicitly added or removed from a security group that has been granted this user right. For example, a user account or a machine account may be explicitly added to a custom security group or a built-in security group, or it may be implicitly added by Windows to a computed security group such as Domain Users, Authenticated Users, or Enterprise Domain Controllers.
|
||||
|
||||
By default, user accounts and machine accounts are granted the **Access this computer from network** user right when computed groups such as Authenticated Users, and for domain controllers, the Enterprise Domain Controllers group, are defined in the default domain controllers Group Policy Object (GPO).
|
||||
|
||||
Constant: SeNetworkLogonRight
|
||||
@ -31,15 +28,12 @@ Constant: SeNetworkLogonRight
|
||||
### Possible values
|
||||
|
||||
- User-defined list of accounts
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
|
||||
- On desktop devices or member servers, grant this right only to users and administrators.
|
||||
|
||||
- On domain controllers, grant this right only to authenticated users, enterprise domain controllers, and administrators.
|
||||
|
||||
- This setting includes the **Everyone** group to ensure backward compatibility. Upon Windows upgrade, after you have verified that all users and groups are correctly migrated, you should remove the **Everyone** group and use the **Authenticated Users** group instead.
|
||||
|
||||
### Location
|
||||
@ -50,56 +44,21 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Use
|
||||
|
||||
The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default domain policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default domain controller policy</p></td>
|
||||
<td align="left"><p>Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-alone server default settings</p></td>
|
||||
<td align="left"><p>Everyone, Administrators, Users, Backup Operators</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Domain controller effective default settings</p></td>
|
||||
<td align="left"><p>Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member server effective default settings</p></td>
|
||||
<td align="left"><p>Everyone, Administrators, Users, Backup Operators</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client computer effective default settings</p></td>
|
||||
<td align="left"><p>Everyone, Administrators, Users, Backup Operators</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
|Server type of GPO | Default value |
|
||||
| - | - |
|
||||
| Default domain policy | Not defined |
|
||||
| Default domain controller policy | Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access |
|
||||
| Stand-alone server default settings |Everyone, Administrators, Users, Backup Operators |
|
||||
| Domain controller effective default settings | Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access |
|
||||
| Member server effective default settings | Everyone, Administrators, Users, Backup Operators |
|
||||
| Client computer effective default settings |Everyone, Administrators, Users, Backup Operators |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
When modifying this user right, the following actions might cause users and services to experience network access issues:
|
||||
|
||||
- Removing the Enterprise Domain Controllers security group
|
||||
|
||||
- Removing the Authenticated Users group or an explicit group that allows users, computers, and service accounts the user right to connect to computers over the network
|
||||
|
||||
- Removing all user and machine accounts
|
||||
|
||||
A restart of the device is not required for this policy setting to be effective.
|
||||
@ -111,18 +70,14 @@ Any change to the user rights assignment for an account becomes effective the ne
|
||||
Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:
|
||||
|
||||
1. Local policy settings
|
||||
|
||||
2. Site policy settings
|
||||
|
||||
3. Domain policy settings
|
||||
|
||||
4. OU policy settings
|
||||
|
||||
When a local setting is greyed out, it indicates that a GPO currently controls that setting.
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -131,27 +86,16 @@ Users who can connect from their device to the network can access resources on t
|
||||
|
||||
### Countermeasure
|
||||
|
||||
Restrict the **Access this computer from the network** user right to only those users and groups who require access to the computer. For example, if you configure this policy setting to the **Administrators** and **Users** groups, users who log on to the domain can access resources that are shared from servers in the domain if members of the **Domain Users** group are included in the local **Users** group.
|
||||
|
||||
**Note**
|
||||
If you are using IPsec to help secure network communications in your organization, ensure that a group that includes machine accounts is given this right. This right is required for successful computer authentication. Assigning this right to **Authenticated Users** or **Domain Computers** meets this requirement.
|
||||
Restrict the **Access this computer from the network** user right to only those users and groups who require access to the computer. For example, if you configure this policy setting to the **Administrators** and **Users** groups, users who log on to the domain can access resources that are shared
|
||||
from servers in the domain if members of the **Domain Users** group are included in the local **Users** group.
|
||||
|
||||
> **Note** If you are using IPsec to help secure network communications in your organization, ensure that a group that includes machine accounts is given this right. This right is required for successful computer authentication. Assigning this right to **Authenticated Users** or **Domain Computers** meets this requirement.
|
||||
|
||||
|
||||
### Potential impact
|
||||
|
||||
If you remove the **Access this computer from the network** user right on domain controllers for all users, no one can log on to the domain or use network resources. If you remove this user right on member servers, users cannot connect to those servers through the network. If you have installed optional components such as ASP.NET or Internet Information Services (IIS), you may need to assign this user right to additional accounts that are required by those components. It is important to verify that authorized users are assigned this user right for the devices that they need to access the network.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[User Rights Assignment](user-rights-assignment.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,29 +5,25 @@ ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Account lockout duration
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Account lockout duration** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Account lockout duration** policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. The available range is from 1 through 99,999 minutes. A value of 0 specifies that the account will be locked out until an administrator explicitly unlocks it. If **Account lockout threshold** is set to a number greater than zero, **Account lockout duration** must be greater than or equal to the value of [Reset account lockout counter after](reset-account-lockout-counter-after.md).
|
||||
|
||||
This policy setting is dependent on the **Account lockout threshold** policy setting that is defined, and it must be greater than or equal to the value specified for the [Reset account lockout counter after](reset-account-lockout-counter-after.md) policy setting.
|
||||
|
||||
### Possible values
|
||||
|
||||
- A user-defined number of minutes from 0 through 99,999
|
||||
|
||||
- Not defined
|
||||
|
||||
If [Account lockout threshold](account-lockout-threshold.md) is configured, after the specified number of failed attempts, the account will be locked out. If th **Account lockout duration** is set to 0, the account will remain locked until an administrator unlocks it manually.
|
||||
@ -42,50 +38,17 @@ It is advisable to set **Account lockout duration** to approximately 30 minutes
|
||||
|
||||
The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or Group Policy Object (GPO)</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default domain policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default domain controller policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-alone server default settings</p></td>
|
||||
<td align="left"><p>Not applicable</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Domain controller effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member server effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client computer effective default settings</p></td>
|
||||
<td align="left"><p>Not applicable</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or Group Policy Object (GPO) | Default value |
|
||||
| - | - |
|
||||
| Default domain policy | Not defined |
|
||||
| Default domain controller policy | Not defined |
|
||||
| Stand-alone server default settings | Not applicable |
|
||||
| Domain controller effective default settings | Not defined |
|
||||
| Member server effective default settings | Not defined |
|
||||
| Client computer effective default settings | Not applicable |
|
||||
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
More than a few unsuccessful password submissions during an attempt to log on to a computer might represent an attacker's attempts to determine an account password by trial and error. The Windows and Windows Server operating systems can track logon attempts, and you can configure the operating system to disable the account for a preset period of time after a specified number of failed attempts. Account lockout policy settings control the threshold for this response and what action to take after the threshold is reached.
|
||||
|
||||
### Vulnerability
|
||||
@ -102,14 +65,6 @@ Configuring the **Account lockout duration** policy setting to 0 so that account
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Account Lockout Policy](account-lockout-policy.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,14 +5,13 @@ ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Account Lockout Policy
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the Account Lockout Policy settings and links to information about each policy setting.
|
||||
@ -23,46 +22,14 @@ The following topics provide a discussion of each policy setting's implementatio
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Topic</th>
|
||||
<th align="left">Description</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>[Account lockout duration](account-lockout-duration.md)</p></td>
|
||||
<td align="left"><p>Describes the best practices, location, values, and security considerations for the <strong>Account lockout duration</strong> security policy setting.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>[Account lockout threshold](account-lockout-threshold.md)</p></td>
|
||||
<td align="left"><p>Describes the best practices, location, values, and security considerations for the <strong>Account lockout threshold</strong> security policy setting.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>[Reset account lockout counter after](reset-account-lockout-counter-after.md)</p></td>
|
||||
<td align="left"><p>Describes the best practices, location, values, and security considerations for the <strong>Reset account lockout counter after</strong> security policy setting.</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Topic | Description |
|
||||
| - | - |
|
||||
| [Account lockout duration](account-lockout-duration.md) | Describes the best practices, location, values, and security considerations for the **Account lockout duration** security policy setting. |
|
||||
| [Account lockout threshold](account-lockout-threshold.md) | Describes the best practices, location, values, and security considerations for the **Account lockout threshold** security policy setting. |
|
||||
| [Reset account lockout counter after](reset-account-lockout-counter-after.md) | Describes the best practices, location, values, and security considerations for the **Reset account lockout counter after** security policy setting. |
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configure security policy settings](how-to-configure-security-policy-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,35 +5,30 @@ ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Account lockout threshold
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Account lockout threshold** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Account lockout threshold** policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account cannot be used until you reset it or until the number of minutes specified by the [Account lockout duration](account-lockout-duration.md) policy setting expires. You can set a value from 1 through 999 failed sign-in attempts, or you can specify that the account will never be locked by setting the value to 0. If **Account lockout threshold** is set to a number greater than zero, **Account lockout duration** must be greater than or equal to the value of [Reset account lockout counter after](reset-account-lockout-counter-after.md).
|
||||
|
||||
Failed password attempts on workstations or member servers that have been locked by using CTRL+ALT+DELETE or password-protected screen savers do not count as failed sign-in attempts unless [Interactive logon: Require Domain Controller authentication to unlock workstation](interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md) is set to **Enabled**. If Interactive logon: Require Domain Controller authentication to unlock workstation is enabled, repeated failed password attempts to unlock the workstation will count against the account lockout threshold.
|
||||
|
||||
Brute force password attacks can be automated to try thousands or even millions of password combinations for any or all user accounts. Limiting the number of failed sign-ins that can be performed nearly eliminates the effectiveness of such attacks.
|
||||
|
||||
However, it is important to note that a denial-of-service (DoS) attack could be performed on a domain that has an account lockout threshold configured. A malicious user could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the value of **Account lockout threshold**, the attacker could potentially lock every account.
|
||||
|
||||
### Possible values
|
||||
|
||||
It is possible to configure the following values for the **Account lockout threshold** policy setting:
|
||||
|
||||
- A user-defined number from 0 through 999
|
||||
|
||||
- Not defined
|
||||
|
||||
Because vulnerabilities can exist when this value is configured and when it is not, organizations should weigh their identified threats and the risks that they are trying to mitigate. For information these settings, see [Countermeasure](#bkmk-countermeasure) in this topic
|
||||
@ -41,12 +36,8 @@ Because vulnerabilities can exist when this value is configured and when it is n
|
||||
### Best practices
|
||||
|
||||
The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, a setting above 4 and below 10 could be an acceptable starting point for your organization.
|
||||
|
||||
**Important**
|
||||
Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see [Implementation considerations](#bkmk-impleconsiderations) in this topic.
|
||||
|
||||
> **Important:** Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see [Implementation considerations](#bkmk-impleconsiderations) in this topic.
|
||||
|
||||
|
||||
### Location
|
||||
|
||||
**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy**
|
||||
@ -55,47 +46,15 @@ Implementation of this policy setting is dependent on your operational environme
|
||||
|
||||
The following table lists the actual and effective default policy values. Default values are also listed on the property page for the policy setting.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or Group Policy Object (GPO)</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default domain policy</p></td>
|
||||
<td align="left"><p>0 invalid sign-in attempts</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default domain controller policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-alone server default settings</p></td>
|
||||
<td align="left"><p>0 invalid sign-in attempts</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Domain controller effective default settings</p></td>
|
||||
<td align="left"><p>0 invalid sign-in attempts</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member server effective default settings</p></td>
|
||||
<td align="left"><p>0 invalid sign-in attempts</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Effective GPO default settings on client computers</p></td>
|
||||
<td align="left"><p>0 invalid sign-in attempts</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or Group Policy Object (GPO) | Default value |
|
||||
| - | - |
|
||||
| Default domain policy | 0 invalid sign-in attempts |
|
||||
| Default domain controller policy | Not defined |
|
||||
| Stand-alone server default settings | 0 invalid sign-in attempts |
|
||||
| Domain controller effective default settings | 0 invalid sign-in attempts |
|
||||
| Member server effective default settings |0 invalid sign-in attempts |
|
||||
| Effective GPO default settings on client computers |0 invalid sign-in attempts |
|
||||
|
||||
|
||||
### Policy management
|
||||
|
||||
This section describes features and tools that are available to help you manage this policy setting.
|
||||
@ -107,43 +66,30 @@ None. Changes to this policy setting become effective without a computer restart
|
||||
### <a href="" id="bkmk-impleconsiderations"></a>Implementation considerations
|
||||
|
||||
Implementation of this policy setting is dependent on your operational environment. You should consider threat vectors, deployed operating systems, and deployed apps, for example:
|
||||
|
||||
- The likelihood of an account theft or a DoS attack is based on the security design for your systems and environment. You should set the account lockout threshold in consideration of the known and perceived risk of those threats.
|
||||
|
||||
- When negotiating encryption types between clients, servers, and domain controllers, the Kerberos protocol can automatically retry account sign-in attempts that count toward the threshold limits that you set in this policy setting. In environments where different versions of the operating system are deployed, encryption type negotiation increases.
|
||||
|
||||
- Not all apps that are used in your environment effectively manage how many times a user can attempt to sign-in. For instance, if a connection drops repeatedly when a user is running the app, all subsequent failed sign-in attempts count toward the account lockout threshold.
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
|
||||
Brute force password attacks can use automated methods to try millions of password combinations for any user account. The effectiveness of such attacks can be almost eliminated if you limit the number of failed sign-in attempts that can be performed.
|
||||
|
||||
However, a DoS attack could be performed on a domain that has an account lockout threshold configured. An attacker could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the account lockout threshold, the attacker might be able to lock every account without needing any special privileges or being authenticated in the network.
|
||||
|
||||
**Note**
|
||||
Offline password attacks are not countered by this policy setting.
|
||||
|
||||
> **Note:** Offline password attacks are not countered by this policy setting.
|
||||
|
||||
|
||||
### <a href="" id="bkmk-countermeasure"></a>Countermeasure
|
||||
|
||||
Because vulnerabilities can exist when this value is configured and when it is not configured, two distinct countermeasures are defined. Organizations should weigh the choice between the two, based on their identified threats and the risks that they want to mitigate. The two countermeasure options are:
|
||||
|
||||
- Configure the **Account lockout threshold** setting to 0. This configuration ensures that accounts will not be locked, and it will prevent a DoS attack that intentionally attempts to lock accounts. This configuration also helps reduce Help Desk calls because users cannot accidentally lock themselves out of their accounts. Because it does not prevent a brute force attack, this configuration should be chosen only if both of the following criteria are explicitly met:
|
||||
|
||||
- The password policy setting requires all users to have complex passwords of 8 or more characters.
|
||||
|
||||
- A robust audit mechanism is in place to alert administrators when a series of failed sign-ins occur in the environment.
|
||||
|
||||
- Configure the **Account lockout threshold** policy setting to a sufficiently high value to provide users with the ability to accidentally mistype their password several times before the account is locked, but ensure that a brute force password attack still locks the account.
|
||||
|
||||
A good recommendation for such a configuration is 50 invalid sign-in attempts, which prevents accidental account lockouts and reduces the number of Help Desk calls, but does not prevent a DoS attack. We recommend this option if your organization cannot implement complex password requirements and an audit policy that alerts administrators to a series of failed sign-in attempts.
|
||||
|
||||
Using this type of policy must be accompanied by a process to unlock locked accounts. It must be possible to implement this policy whenever it is needed to help mitigate massive lockouts caused by an attack on your systems.
|
||||
|
||||
### Potential impact
|
||||
@ -155,15 +101,5 @@ If you configure the **Account lockout threshold** policy setting to 0, there is
|
||||
If you configure this policy setting to a number greater than 0, an attacker can easily lock any accounts for which the account name is known. This is especially dangerous considering that no credentials other than access to the network are necessary to lock the accounts.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Account Lockout Policy](account-lockout-policy.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,69 +5,30 @@ ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Account Policies
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
An overview of account policies in Windows and provides links to policy descriptions.
|
||||
|
||||
All account policies settings applied by using Group Policy are applied at the domain level. Default values are present in the built-in default domain controller policy for Password Policy settings, Account Lockout Policy settings, and Kerberos Policy settings. The domain account policy becomes the default local account policy of any device that is a member of the domain. If these policies are set at any level below the domain level in Active Directory Domain Services (AD DS), they affect only local accounts on member servers.
|
||||
|
||||
**Note**
|
||||
Each domain can have only one account policy. The account policy must be defined in the default domain policy or in a new policy that is linked to the root of the domain and given precedence over the default domain policy, which is enforced by the domain controllers in the domain. These domain-wide account policy settings (Password Policy, Account Lockout Policy, and Kerberos Policy) are enforced by the domain controllers in the domain; therefore, domain controllers always retrieve the values of these account policy settings from the default domain policy Group Policy Object (GPO).
|
||||
|
||||
> **Note:** Each domain can have only one account policy. The account policy must be defined in the default domain policy or in a new policy that is linked to the root of the domain and given precedence over the default domain policy, which is enforced by the domain controllers in the domain. These domain-wide account policy settings (Password Policy, Account Lockout Policy, and Kerberos Policy) are enforced by the domain controllers in the domain; therefore, domain controllers always retrieve the values of these account policy settings from the default domain policy Group Policy Object (GPO).
|
||||
|
||||
|
||||
The only exception is when another account policy is defined for an organizational unit (OU). The account policy settings for the OU affect the local policy on any computers that are contained in the OU. For example, if an OU policy defines a maximum password age that differs from the domain-level account policy, the OU policy will be applied and enforced only when users log on to the local computer. The default local computer policies apply only to computers that are in a workgroup or in a domain where neither an OU account policy nor a domain policy applies.
|
||||
|
||||
## In this section
|
||||
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Topic</th>
|
||||
<th align="left">Description</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>[Password Policy](password-policy.md)</p></td>
|
||||
<td align="left"><p>An overview of password policies for Windows and links to information for each policy setting.</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>[Account Lockout Policy](account-lockout-policy.md)</p></td>
|
||||
<td align="left"><p>Describes the Account Lockout Policy settings and links to information about each policy setting.</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>[Kerberos Policy](kerberos-policy.md)</p></td>
|
||||
<td align="left"><p>Describes the Kerberos Policy settings and provides links to policy setting descriptions.</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Topic | Description |
|
||||
| - | - |
|
||||
| [Password Policy](password-policy.md) | An overview of password policies for Windows and links to information for each policy setting. |
|
||||
| [Account Lockout Policy](account-lockout-policy.md) | Describes the Account Lockout Policy settings and links to information about each policy setting. |
|
||||
| [Kerberos Policy](kerberos-policy.md) | Describes the Kerberos Policy settings and provides links to policy setting descriptions. |
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configure security policy settings](how-to-configure-security-policy-settings.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,45 +5,35 @@ ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Administrator account status
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Accounts: Administrator account status** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
This security setting determines whether the local administrator account is enabled or disabled.
|
||||
|
||||
If you try to enable the administrator account after it has been disabled, and if the current administrator password does not meet the password requirements, you cannot enable the account. In this case, an alternative member of the Administrators group must reset the password on the administrator account.
|
||||
|
||||
If you disable this policy setting, and one of the following conditions exists on the computer, the administrator account is not disabled.
|
||||
|
||||
1. No other local administrator account exists
|
||||
|
||||
2. The administrator account is currently in use
|
||||
|
||||
3. All other local administrator accounts are:
|
||||
|
||||
1. Disabled
|
||||
|
||||
2. Listed in the [Deny log on locally](deny-log-on-locally.md) User Rights Assignment
|
||||
|
||||
If the current administrator password does not meet the password requirements, you will not be able to enable the administrator account again after it has been disabled. In this case, another member of the Administrators group must set the password on the administrator account.
|
||||
|
||||
### Possible values
|
||||
|
||||
- Enabled
|
||||
|
||||
- Disabled
|
||||
|
||||
- Not defined
|
||||
|
||||
By default, this setting is **Not defined** on domain controllers and **Enabled** on stand-alone servers.
|
||||
@ -60,56 +50,20 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Sec
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| Default Domain Policy | Not defined |
|
||||
| Default Domain Controller Policy |Not defined |
|
||||
| Stand-Alone Server Default Settings | Enabled |
|
||||
| DC Effective Default Settings | Enabled |
|
||||
| Member Server Effective Default Settings | Enabled |
|
||||
| Client Computer Effective Default Settings | Disabled |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
Disabling the administrator account can become a maintenance issue under certain circumstances. Reasons that an organization might consider disabling the built-in administrator account include:
|
||||
|
||||
- For some organizations, periodically changing the passwords for local accounts can be a daunting management challenge.
|
||||
|
||||
- By default, the administrator account cannot be locked—no matter how many failed attempts to sign in a user accrues. This makes it a prime target for brute-force, password-guessing attacks.
|
||||
|
||||
- This account has a well-known security identifier (SID). Some non-Microsoft tools allow you to authenticate over the network by specifying the SID rather than the account name. This means that even if you rename the administrator account, a malicious user could start a brute-force attack by using the SID.
|
||||
|
||||
### Restart requirement
|
||||
@ -119,22 +73,18 @@ None. Changes to this policy become effective without a device restart when they
|
||||
### Safe mode considerations
|
||||
|
||||
When you start a device in safe mode, the disabled administrator account is enabled only if the computer is non-domain joined and there are no other active local administrator accounts. If the computer is joined to a domain, the disabled administrator account is not enabled.
|
||||
|
||||
If the administrator account is disabled, you can still access the computer by using safe mode with the current administrative credentials. For example, if a failure occurs using a secure channel with a domain-joined computer, and there is no other local administrator account, you must restart the device in safe mode to fix the failure.
|
||||
|
||||
### How to access a disabled Administrator account
|
||||
|
||||
You can use the following methods to access a disabled Administrator account:
|
||||
|
||||
- When there is only one local administrator account that is disabled, start the device in safe mode (locally or over a network), and sign in by using the credentials for the administrator account on that computer.
|
||||
|
||||
- When there are local administrator accounts in addition to the built-in account, start the computer in safe mode (locally or over a network), and sign in by using the credentials for the administrator account on that device. An alternate method is to sign in to Windows by using another local Administrator account that was created.
|
||||
|
||||
- When there are local administrator accounts in addition to the built-in account, start the computer in safe mode (locally or over a network), and sign in by using the credentials for the administrator account on that device. An alternate method is to sign in to Windows by using another local
|
||||
Administrator account that was created.
|
||||
- When multiple domain-joined servers have a disabled local Administrator account that can be accessed in safe mode, you can remotely run psexec by using the following command: **net user administrator /active: no**.
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -144,25 +94,13 @@ The built-in administrator account cannot be locked out no matter how many faile
|
||||
### Countermeasure
|
||||
|
||||
Disable the **Accounts: Administrator account status** setting so that the built-in Administrator account cannot be used in a normal system startup.
|
||||
|
||||
If it is very difficult to maintain a regular schedule for periodic password changes for local accounts, you can disable the built-in administrator account instead of relying on regular password changes to protect it from attack.
|
||||
|
||||
### Potential impact
|
||||
|
||||
Maintenance issues can arise under certain circumstances if you disable the administrator account. For example, if the secure channel between a member computer and the domain controller fails in a domain environment for any reason and there is no other local administrator account, you must restart in safe mode to fix the problem that caused the secure channel to fail.
|
||||
|
||||
If the current administrator password does not meet the password requirements, you cannot enable the administrator account after it is disabled. If this situation occurs, another member of the administrators group must set the password on the administrator account.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,22 +5,20 @@ ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Block Microsoft accounts
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, management, and security considerations for the **Accounts: Block Microsoft accounts** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
This policy setting prevents users from adding new Microsoft accounts on a device
|
||||
This policy setting prevents users from adding new Microsoft accounts on a device.
|
||||
|
||||
If you click the **Users can’t add Microsoft accounts** setting option, users will not be able to switch a local account to a Microsoft account, or connect a domain account to a Microsoft account to drive sync, roaming, or other background services. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. Users will still be able to add app-specific Microsoft accounts for use with consumer apps. To block this use, turn off the ability to install consumer apps or the Store.
|
||||
|
||||
@ -29,11 +27,8 @@ If you click the **Users can’t add or log on with Microsoft accounts** setting
|
||||
If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
|
||||
|
||||
### Possible values
|
||||
|
||||
- This policy is disabled
|
||||
|
||||
- Users can’t add Microsoft accounts
|
||||
|
||||
- Users can’t add or log on with Microsoft accounts
|
||||
|
||||
By default, this setting is not defined on domain controllers and disabled on stand-alone servers.
|
||||
@ -41,7 +36,6 @@ By default, this setting is not defined on domain controllers and disabled on st
|
||||
### Best practices
|
||||
|
||||
- By disabling or not configuring this policy setting on the client computer, users will be able to use their Microsoft account, local account, or domain account for their sign-in session to Windows. It also enables the user to connect a local or domain account to a Microsoft account. This provides a convenient option for your users.
|
||||
|
||||
- If you need to limit the use of Microsoft accounts in your organization, click the **Users can’t add Microsoft accounts** setting option so that users will not be able to create new Microsoft accounts on a computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account.
|
||||
|
||||
### Location
|
||||
@ -52,50 +46,17 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Sec
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default Domain Policy | Not defined |
|
||||
| Default Domain Controller Policy | Not defined |
|
||||
| Stand-Alone Server Default Settings | Disabled |
|
||||
| DC Effective Default Settings | Disabled |
|
||||
| Member Server Effective Default Settings | Disabled |
|
||||
| Client Computer Effective Default Settings | Disabled |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
This section describes features and tools that are available to help you manage this policy.
|
||||
|
||||
### Restart requirement
|
||||
@ -104,7 +65,6 @@ None. Changes to this policy become effective without a device restart when they
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of the countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -121,14 +81,6 @@ Establishing greater control over accounts in your organization can give you mor
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,31 +5,26 @@ ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Guest account status
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Accounts: Guest account status** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Accounts: Guest account status** policy setting determines whether the Guest account is enabled or disabled.
|
||||
|
||||
This account allows unauthenticated network users to gain access to the system by logging on as a Guest with no password. Unauthorized users can access any resources that are accessible to the Guest account over the network. This means that any network shared folders with permissions that allow access to the Guest account, the Guests group, or the Everyone group will be accessible over the network. This can lead to the exposure or corruption of data.
|
||||
|
||||
### Possible values
|
||||
|
||||
- Enabled
|
||||
|
||||
- Disabled
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
@ -44,50 +39,17 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Sec
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p>Disabled</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default Domain Policy | Not defined |
|
||||
| Default Domain Controller Policy | Not defined |
|
||||
| Stand-Alone Server Default Settings | Disabled |
|
||||
| DC Effective Default Settings | Disabled |
|
||||
| Member Server Effective Default Settings | Disabled |
|
||||
| Client Computer Effective Default Settings | Disabled |
|
||||
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -104,14 +66,6 @@ All network users must be authenticated before they can access shared resources.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,25 +5,22 @@ ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Limit local account use of blank passwords to console logon only
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Accounts: Limit local account use of blank passwords to console logon only** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Accounts: Limit local account use of blank passwords to console logon only** policy setting determines whether remote interactive logons by network services such as Remote Desktop Services, Telnet, and File Transfer Protocol (FTP) are allowed for local accounts that have blank passwords. If this policy setting is enabled, a local account must have a nonblank password to be used to perform an interactive or network logon from a remote client.
|
||||
|
||||
This policy setting does not affect interactive logons that are performed physically at the console or logons that use domain accounts. It is possible for non-Microsoft applications that use remote interactive logons to bypass this policy setting.
|
||||
|
||||
Blank passwords are a serious threat to computer security and they should be forbidden through both corporate policy and suitable technical measures. Nevertheless, if a user with the ability to create new accounts creates one that has bypassed your domain-based password policy settings, that account might have a blank password. For example, a user could build a stand-alone system, create one or more accounts with blank passwords, and then join the computer to the domain. The local accounts with blank passwords would still function. Anyone who knows the account name can then use accounts with blank passwords to log on to systems.
|
||||
|
||||
Devices that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the device can log on by using a user account that does not have a password. This is especially important for portable devices.
|
||||
@ -33,9 +30,7 @@ If you apply this security policy to the Everyone group, no one will be able to
|
||||
### Possible values
|
||||
|
||||
- Enabled
|
||||
|
||||
- Disabled
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
@ -50,50 +45,17 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Sec
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p>Enabled</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default Domain Policy | Not defined |
|
||||
| Default Domain Controller Policy | Not defined |
|
||||
| Stand-Alone Server Default Settings | Enabled |
|
||||
| DC Effective Default Settings | Enabled |
|
||||
| Member Server Effective Default Settings | Enabled |
|
||||
| Client Computer Effective Default Settings | Enabled |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
This section describes features and tools that are available to help you manage this policy.
|
||||
|
||||
### Restart requirement
|
||||
@ -110,7 +72,6 @@ This policy setting can be configured by using the Group Policy Management Conso
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -126,15 +87,4 @@ Enable the **Accounts: Limit local account use of blank passwords to console log
|
||||
None. This is the default configuration.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,21 +5,19 @@ ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Rename administrator account
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Accounts: Rename administrator account** policy setting determines whether a different account name is associated with the security identifier (SID) for the administrator account.
|
||||
|
||||
Because the administrator account exists on all Windows 10 for desktop editions (Home, Pro, Enterprise, and Education), renaming the account makes it slightly more difficult for attackers to guess this user name and password combination.
|
||||
@ -27,67 +25,30 @@ Because the administrator account exists on all Windows 10 for desktop editions
|
||||
Rename the Administrator account by specifying a value for the **Accounts: Rename administrator account** policy setting.
|
||||
|
||||
### Possible values
|
||||
|
||||
- User-defined text
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
|
||||
- Be sure to inform users who are authorized to use this account of the new account name.
|
||||
|
||||
### Location
|
||||
|
||||
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
||||
|
||||
### Default values
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Administrator</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Administrator</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Administrator</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p>Administrator</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default Domain Policy | Not defined |
|
||||
| Default Domain Controller Policy | Not defined |
|
||||
| Stand-Alone Server Default Settings | Administrator |
|
||||
| DC Effective Default Settings | Administrator |
|
||||
| Member Server Effective Default Settings | Administrator |
|
||||
| Client Computer Effective Default Settings | Administrator |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
This section describes features and tools that are available to help you manage this policy.
|
||||
|
||||
### Restart requirement
|
||||
@ -104,7 +65,6 @@ This policy setting can be configured by using the Group Policy Management Conso
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -123,14 +83,6 @@ You must provide users who are authorized to use this account with the new accou
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,33 +5,29 @@ ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Accounts: Rename guest account
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, and security considerations for the **Accounts: Rename guest account** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Accounts: Rename guest account** policy setting determines whether a different account name is associated with the security identifier (SID) for the Guest account.
|
||||
|
||||
### Possible values
|
||||
|
||||
- *User-defined text*
|
||||
|
||||
- Guest
|
||||
|
||||
### Best practices
|
||||
|
||||
1. For devices in unsecured locations, renaming the account makes it more difficult for unauthorized users to guess it.
|
||||
|
||||
2. For computers in secured or trusted locations, keeping the name of the account as Guest provides consistency among devices
|
||||
|
||||
### Location
|
||||
@ -42,50 +38,17 @@ Computer Configuration\\Windows Settings\\Security Settings
|
||||
|
||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default Domain Policy</p></td>
|
||||
<td align="left"><p>Guest</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default Domain Controller Policy</p></td>
|
||||
<td align="left"><p>Guest</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-Alone Server Default Settings</p></td>
|
||||
<td align="left"><p>Guest</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>DC Effective Default Settings</p></td>
|
||||
<td align="left"><p>Guest</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member Server Effective Default Settings</p></td>
|
||||
<td align="left"><p>Guest</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client Computer Effective Default Settings</p></td>
|
||||
<td align="left"><p><em>User-defined text</em></p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default Domain Policy | Guest |
|
||||
| Default Domain Controller Policy | Guest |
|
||||
| Stand-Alone Server Default Settings | Guest |
|
||||
| DC Effective Default Settings | Guest |
|
||||
| Member Server Effective Default Settings | Guest |
|
||||
| Client Computer Effective Default Settings | *User-defined text* |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
This section describes features and tools that are available to help you manage this policy.
|
||||
|
||||
### Restart requirement
|
||||
@ -102,12 +65,12 @@ This policy setting can be configured by using the Group Policy Management Conso
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
|
||||
The guest account exists in all Windows server and client operating system versions beginning with Windows Server 2003 and Windows XP Professional. Because the account name is well known, it provides a vector for a malicious user to get access to network resources and attempt to elevate privileges or install software that could be used for a later attack on your system.
|
||||
The guest account exists in all Windows server and client operating system versions beginning with Windows Server 2003 and Windows XP Professional. Because the account name is well known, it provides a vector for a malicious user to get access to network resources and attempt to elevate privileges
|
||||
or install software that could be used for a later attack on your system.
|
||||
|
||||
### Countermeasure
|
||||
|
||||
@ -119,14 +82,6 @@ There should be little impact because the Guest account is disabled by default i
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Security Options](security-options.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,35 +5,28 @@ ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# Act as part of the operating system
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.
|
||||
|
||||
## Reference
|
||||
|
||||
|
||||
The **Act as part of the operating system** policy setting determines whether a process can assume the identity of any user and thereby gain access to the resources that the user is authorized to access. Typically, only low-level authentication services require this user right. Potential access is not limited to what is associated with the user by default. The calling process may request that arbitrary additional privileges be added to the access token. The calling process may also build an access token that does not provide a primary identity for auditing in the system event logs.
|
||||
|
||||
Constant: SeTcbPrivilege
|
||||
|
||||
### Possible values
|
||||
|
||||
- User-defined list of accounts
|
||||
|
||||
- Not defined
|
||||
|
||||
### Best practices
|
||||
|
||||
- Do not assign this right to any user accounts. Only assign this user right to trusted users.
|
||||
|
||||
- If a service requires this user right, configure the service to log on by using the local System account, which inherently includes this user right. Do not create a separate account and assign this user right to it.
|
||||
|
||||
### Location
|
||||
@ -44,50 +37,17 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Use
|
||||
|
||||
The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page.
|
||||
|
||||
<table>
|
||||
<colgroup>
|
||||
<col width="50%" />
|
||||
<col width="50%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th align="left">Server type or GPO</th>
|
||||
<th align="left">Default value</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Default domain policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Default domain controller policy</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Stand-alone server default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Domain controller effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left"><p>Member server effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left"><p>Client computer effective default settings</p></td>
|
||||
<td align="left"><p>Not defined</p></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
| Server type or GPO | Default value |
|
||||
| - | - |
|
||||
| Default domain policy | Not defined |
|
||||
| Default domain controller policy| Not defined |
|
||||
| Stand-alone server default settings | Not defined |
|
||||
| Domain controller effective default settings | Not defined |
|
||||
| Member server effective default settings | Not defined |
|
||||
| Client computer effective default settings | Not defined |
|
||||
|
||||
|
||||
## Policy management
|
||||
|
||||
|
||||
A restart of the device is not required for this policy setting to be effective.
|
||||
|
||||
Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on.
|
||||
@ -95,20 +55,15 @@ Any change to the user rights assignment for an account becomes effective the ne
|
||||
### Group Policy
|
||||
|
||||
Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:
|
||||
|
||||
1. Local policy settings
|
||||
|
||||
2. Site policy settings
|
||||
|
||||
3. Domain policy settings
|
||||
|
||||
4. OU policy settings
|
||||
|
||||
When a local setting is greyed out, it indicates that a GPO currently controls that setting.
|
||||
|
||||
## Security considerations
|
||||
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
### Vulnerability
|
||||
@ -124,15 +79,5 @@ Restrict the **Act as part of the operating system** user right to as few accoun
|
||||
There should be little or no impact because the **Act as part of the operating system** user right is rarely needed by any accounts other than the Local System account.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[User Rights Assignment](user-rights-assignment.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -5,21 +5,19 @@ ms.assetid: beb7097c-e674-4eab-b8e2-6f67c85d1f3f
|
||||
ms.prod: W10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: brianlic-msft
|
||||
---
|
||||
|
||||
# AD DS schema extensions to support TPM backup
|
||||
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic provides more details about this change and provides template schema extensions that you can incorporate into your organization.
|
||||
|
||||
## Why a schema extension is needed
|
||||
|
||||
|
||||
The TPM owner authorization value is now stored in a separate object which is linked to the Computer object. This value was stored as a property in the Computer object itself for the default Windows Server 2008 R2 schemas. Windows Server 2012 domain controllers have the default schema to backup TPM owner authorization information in the separate object. If you are not upgrading your domain controller to Windows Server 2012 you need to extend the schema to support this change. If Active Directory backup of the TPM owner authorization value is enabled in a Windows Server 2008 R2 environment without extending the schema, the TPM provisioning will fail and the TPM will remain in a Not Ready state for computers running Windows 8. The following are the two schema extensions that you can use to bring your Windows Server 2008 R2 domain to parity with Windows Server 2012:
|
||||
|
||||
### <a href="" id="tpmschemaextension-ldf-"></a>TpmSchemaExtension.ldf
|
||||
@ -48,11 +46,9 @@ This schema extension brings parity with the Windows Server 2012 schema and is r
|
||||
# http://support.microsoft.com/default.aspx?scid=kb;en-us;237677
|
||||
#
|
||||
#===============================================================================
|
||||
|
||||
#===============================================================================
|
||||
# New schema attributes
|
||||
#===============================================================================
|
||||
|
||||
#
|
||||
# ms-TPM-Srk-Pub-Thumbprint
|
||||
# GUID: 19d706eb-4d76-44a2-85d6-1c342be3be37
|
||||
@ -72,7 +68,6 @@ schemaIdGuid:: 6wbXGXZNokSF1hw0K+O+Nw==
|
||||
showInAdvancedViewOnly: TRUE
|
||||
isMemberOfPartialAttributeSet: FALSE
|
||||
rangeUpper: 20
|
||||
|
||||
#
|
||||
# ms-TPM-Owner-Information-Temp
|
||||
# GUID: c894809d-b513-4ff8-8811-f4f43f5ac7bc
|
||||
@ -92,7 +87,6 @@ rangeUpper: 128
|
||||
schemaIdGuid:: nYCUyBO1+E+IEfT0P1rHvA==
|
||||
showInAdvancedViewOnly: TRUE
|
||||
isMemberOfPartialAttributeSet: FALSE
|
||||
|
||||
#
|
||||
# ms-TPM-Tpm-Information-For-Computer
|
||||
# GUID: ea1b7b93-5e48-46d5-bc6c-4df4fda78a35
|
||||
@ -113,7 +107,6 @@ schemaIdGuid:: k3sb6khe1Ua8bE30/aeKNQ==
|
||||
showInAdvancedViewOnly: TRUE
|
||||
isMemberOfPartialAttributeSet: FALSE
|
||||
linkId: 2182
|
||||
|
||||
#
|
||||
# ms-TPM-TpmInformation-For-Computer-BL
|
||||
# GUID: 14fa84c9-8ecd-4348-bc91-6d3ced472ab7
|
||||
@ -134,41 +127,33 @@ schemaIdGuid:: yYT6FM2OSEO8kW087Ucqtw==
|
||||
showInAdvancedViewOnly: TRUE
|
||||
systemOnly: TRUE
|
||||
linkId: 2183
|
||||
|
||||
#
|
||||
# Commit the new attributes
|
||||
#
|
||||
|
||||
dn:
|
||||
changetype: modify
|
||||
add: schemaUpdateNow
|
||||
schemaUpdateNow: 1
|
||||
-
|
||||
|
||||
#
|
||||
# Modify the Computer schema to support the TPM link
|
||||
#
|
||||
|
||||
dn: CN=computer,CN=Schema,CN=Configuration,DC=X
|
||||
changetype: modify
|
||||
add: mayContain
|
||||
mayContain: msTPM-TpmInformationForComputer
|
||||
-
|
||||
|
||||
#
|
||||
# Commit the modification to the computer class
|
||||
#
|
||||
|
||||
dn:
|
||||
changetype: modify
|
||||
add: schemaUpdateNow
|
||||
schemaUpdateNow: 1
|
||||
-
|
||||
|
||||
#===============================================================================
|
||||
# New schema classes
|
||||
#===============================================================================
|
||||
|
||||
#
|
||||
# ms-TPM-Information-Objects-Container
|
||||
# GUID: e027a8bd-6456-45de-90a3-38593877ee74
|
||||
@ -189,7 +174,6 @@ schemaIdGUID:: vagn4FZk3kWQozhZOHfudA==
|
||||
defaultSecurityDescriptor: D:(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;DA)(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;SY)(A;;LOLCCCRP;;;DC)
|
||||
defaultHidingValue: TRUE
|
||||
defaultObjectCategory: CN=ms-TPM-Information-Objects-Container,CN=Schema,CN=Configuration,DC=X
|
||||
|
||||
#
|
||||
# ms-TPM-Information-Object
|
||||
# GUID: 85045b6a-47a6-4243-a7cc-6890701f662c
|
||||
@ -218,21 +202,17 @@ defaultObjectCategory: CN=ms-TPM-Information-Object,CN=Schema,CN=Configuration,D
|
||||
# NOTE: If the 'defaultSecurityDescriptor' value above is changed,
|
||||
# also change the other '.ldf' files in this directory, as appropriate.
|
||||
#
|
||||
|
||||
#
|
||||
# Commit the new TPM object class
|
||||
#
|
||||
|
||||
dn:
|
||||
changetype: modify
|
||||
add: schemaUpdateNow
|
||||
schemaUpdateNow: 1
|
||||
-
|
||||
|
||||
#===============================================================================
|
||||
# New objects
|
||||
#===============================================================================
|
||||
|
||||
#
|
||||
# Add the TPM container to its location in the directory
|
||||
#
|
||||
@ -246,12 +226,8 @@ You should be aware that only the Computer object that has created the TPM objec
|
||||
### TpmSchemaExtensionACLChanges.ldf
|
||||
|
||||
This schema update modifies the ACLs on the TPM object to be less restrictive so that any subsequent operating system which takes ownership of the computer object can update the owner authorization value in AD DS.
|
||||
|
||||
**Important**
|
||||
After implementing this schema update, any computer in the domain can update the OwnerAuth of the TPM object (although it cannot read the OwnerAuth). When using this extension, perform a regular backup of the TPM objects and enable auditing to track the changes for these objects.
|
||||
|
||||
> **Important** After implementing this schema update, any computer in the domain can update the OwnerAuth of the TPM object (although it cannot read the OwnerAuth). When using this extension, perform a regular backup of the TPM objects and enable auditing to track the changes for these objects.
|
||||
|
||||
|
||||
``` syntax
|
||||
#===============================================================================
|
||||
#
|
||||
@ -268,7 +244,6 @@ After implementing this schema update, any computer in the domain can update the
|
||||
#
|
||||
# This conversion does not apply to any 'ms-TPM-Information-Object' that
|
||||
# was created before the conversion.
|
||||
|
||||
#
|
||||
# Change History:
|
||||
# 12/2011 - Created
|
||||
@ -283,7 +258,6 @@ After implementing this schema update, any computer in the domain can update the
|
||||
# http://support.microsoft.com/default.aspx?scid=kb;en-us;237677
|
||||
#
|
||||
#===============================================================================
|
||||
|
||||
#
|
||||
# Modify the TPM-Information-Object class schema 'defaultSecurityDescriptor' to
|
||||
# allow any Domain Computer to write its properties (including the TPM OwnerAuth
|
||||
@ -293,29 +267,19 @@ After implementing this schema update, any computer in the domain can update the
|
||||
# with the value in the TPM-Information-Object class description in the
|
||||
# 'TpmSchemaExtension.ldf' file
|
||||
#
|
||||
|
||||
dn: CN=ms-TPM-Information-Object,CN=Schema,CN=Configuration,DC=X
|
||||
changetype: modify
|
||||
replace: defaultSecurityDescriptor
|
||||
defaultSecurityDescriptor: D:(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;DA)(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;SY)(A;;RPWPLO;;;DC)
|
||||
-
|
||||
|
||||
#
|
||||
# Commit the modification to the TPM-Information-Object schema
|
||||
#
|
||||
|
||||
dn:
|
||||
changetype: modify
|
||||
add: schemaUpdateNow
|
||||
schemaUpdateNow: 1
|
||||
-
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Add multiple apps to your enterprise data protection (EDP) Protected Apps list (Windows 10)
|
||||
description: Add multiple apps to your enterprise data protection (EDP) Protected Apps list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker Group Policy.
|
||||
description: Add multiple apps to your enterprise data protection (EDP) Protected Apps list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker.
|
||||
ms.assetid: b50db35d-a2a9-4b78-a95d-a1b066e66880
|
||||
keywords: ["EDP", "Enterprise Data Protection", "protected apps", "protected app list"]
|
||||
ms.prod: W10
|
||||
@ -17,7 +17,7 @@ author: eross-msft
|
||||
|
||||
<span style="color:#ED1C24;">[Some information relates to pre-released product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]</span>
|
||||
|
||||
Add multiple apps to your enterprise data protection (EDP) **Protected Apps** list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker Group Policy. For more info about how to create a custom URI using Intune, see [Windows 10 custom policy settings in Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkID=691330).
|
||||
Add multiple apps to your enterprise data protection (EDP) **Protected Apps** list at the same time, by using the Microsoft Intune Custom URI functionality and AppLocker. For more info about how to create a custom URI using Intune, see [Windows 10 custom policy settings in Microsoft Intune](http://go.microsoft.com/fwlink/p/?LinkID=691330).
|
||||
|
||||
**Important**
|
||||
Results can be unpredictable if you configure your policy using both the UI and the Custom URI method together. We recommend using a single method for each policy.
|
||||
@ -26,7 +26,7 @@ If you only want to add one app at a time, you can follow the instructions in th
|
||||
|
||||
**To add Universal Windows Platform (UWP) apps**
|
||||
|
||||
1. Go to the AppLocker Group Policy UI by opening a command line window and running secpol.msc. The local security policy MMC snap-in opens showing the **Security Settings**.
|
||||
1. Go to the AppLocker UI by opening a command line window and running secpol.msc. The local security policy MMC snap-in opens showing the **Security Settings**.
|
||||
|
||||
2. Double-click **Application Control Policies**, double-click **AppLocker**, right-click **Packaged app Rules**, and then click **Automatically Generate Rules**.<p>
|
||||
The **Automatically Generate Packaged app Rules** wizard opens, letting you create EDP-protected app polices for all of the installed apps on the device or for packaged apps within a specific folder.
|
||||
@ -69,7 +69,7 @@ After saving the policy, you’ll need to deploy it to your employee’s devices
|
||||
|
||||
**To add Classic Windows applications**
|
||||
|
||||
1. Go to the AppLocker Group Policy UI by opening a command line window and running secpol.msc. The local security policy MMC snap-in opens showing the **Security Settings**.
|
||||
1. Go to the AppLocker UI by opening a command line window and running secpol.msc. The local security policy MMC snap-in opens showing the **Security Settings**.
|
||||
|
||||
2. Double-click **Application Control Policies**, double-click **AppLocker**, right-click **Executable Rules**, and then click **Automatically Generate Rules**.<p>
|
||||
The **Automatically Generate Executable Rules** wizard opens, letting you create EDP-protected app polices by analyzing the files within a specific folder.
|
||||
|