diff --git a/windows/deployment/update/media/33771278-workbook-summary-tab-tiles.png b/windows/deployment/update/media/33771278-workbook-summary-tab-tiles.png deleted file mode 100644 index 7f1dddf600..0000000000 Binary files a/windows/deployment/update/media/33771278-workbook-summary-tab-tiles.png and /dev/null differ diff --git a/windows/deployment/update/media/8037522-workbook-summary-tab-tiles.png b/windows/deployment/update/media/8037522-workbook-summary-tab-tiles.png new file mode 100644 index 0000000000..ab21a1bcc0 Binary files /dev/null and b/windows/deployment/update/media/8037522-workbook-summary-tab-tiles.png differ diff --git a/windows/deployment/update/wufb-reports-workbook.md b/windows/deployment/update/wufb-reports-workbook.md index f99a8748e6..df61f9ca36 100644 --- a/windows/deployment/update/wufb-reports-workbook.md +++ b/windows/deployment/update/wufb-reports-workbook.md @@ -6,7 +6,7 @@ ms.prod: windows-client author: mestew ms.author: mstewart ms.topic: article -ms.date: 06/12/2023 +ms.date: 06/23/2023 ms.technology: itpro-updates --- @@ -44,13 +44,13 @@ The **Summary** tab gives you a brief high-level overview of the devices that yo Each of these tiles contains an option to **View details**. When **View details** is selected for a tile, a flyout appears with additional information. -:::image type="content" source="media/33771278-workbook-summary-tab-tiles.png" alt-text="Screenshot of the summary tab tiles in the Windows Update for Business reports workbook"::: +:::image type="content" source="media/8037522-workbook-summary-tab-tiles.png" alt-text="Screenshot of the summary tab tiles in the Windows Update for Business reports workbook"::: | Tile name | Description | View details description | |---|---|------| | **Enrolled devices** | Total number of devices that are enrolled into Windows Update for Business reports | Displays multiple charts about the operating systems (OS) for enrolled devices:
**OS Version**
**OS Edition**
**OS Servicing Channel**
**OS Architecture**| |**Active alerts** | Total number of active alerts on enrolled devices | Displays the top three active alert subtypes and the count of devices in each.

Select the count of **Devices** to display a table of the devices. This table is limited to the first 1000 rows. Select `...` to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial).

Select an **AlertSubtype** to display a list containing:
- Each **Error Code** in the alert subtype
- A **Description** of the error code
- A **Recommendation** to help you remediate the error code
- A count of **Devices** with the specific error code | -| **Windows 11 eligibility** | Percentage of devices that are capable of running Windows 11 | Displays the following items:
- **Windows 11 Readiness Status** chart
- **Readiness Reason(s) Breakdown** chart that displays Windows 11 requirements that aren't met.
- A table for **Readiness reason**. Select a reason to display a list of devices that don't meet a specific requirement for Windows 11. | +| **Windows 11 adoption** | Number of devices that are running Windows 11 | Displays the following items:
- **Windows 11 Device Count** chart, broken down by Windows 11 version
- **Windows 11 Eligibility Status** contains a **Readiness status** chart that lists the count of devices by OS version that are either capable or not capable of running Windows 11.
- The **Device List** allows you to choose a Windows 11 **Ineligibility Reason** to display devices that don't meet the selected requirement. | ### Summary tab charts @@ -64,15 +64,14 @@ The charts displayed in the **Summary** tab give you a general idea of the overa ## Quality updates tab -The **Quality updates** tab displays generalized data at the top by using tiles. The quality update data becomes more specific as you navigate lower in this tab. The top of the **Quality updates** tab contains tiles with the following information: - -- **Latest security update**: Count of devices that have reported successful installation of the latest security update. -- **Missing one security update**: Count of devices that haven't installed the latest security update. -- **Missing multiple security updates**: Count of devices that are missing two or more security updates. -- **Active alerts**: Count of active update and device alerts for quality updates. - -Selecting **View details** on any of the tiles displays a flyout with a chart that displays the first 1000 items. Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial). +The **Quality updates** tab displays generalized data at the top by using tiles. The quality update data becomes more specific as you navigate lower in this tab. The top of the **Quality updates** tab contains tiles with the following information and drill-down options: +| Tile name | Description | Drill-in description | +|---|---|---| +|**Latest security update**| Count of devices that have reported successful installation of the latest security update. | - Select **View details** to display a flyout with a chart that displays the first 1000 items.
- Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial). | +| **Missing one security update** | Count of devices that haven't installed the latest security update.| - Select **View details** to display a flyout with a chart that displays the first 1000 items.
- Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial).| +| **Missing multiple security updates** | Count of devices that are missing two or more security updates. | - Select **View details** to display a flyout with a chart that displays the first 1000 items.
- Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial). | +| **Expedite performance** | Overview of the progress for the expedited deployments of the latest security update. | - Select **View details** to display a flyout with a chart that displays the total progress of each deployment, number of alerts, and count of devices.
- Select the count from the **Alerts** column to display the alerts, by name, for the deployment. Selecting the device count for the alert name displays a list of devices with the alert.
- Select the count in the **TotalDevices** column to display a list of clients and their information for the deployment. | Below the tiles, the **Quality updates** tab is subdivided into **Update status** and **Device status** groups. These different chart groups allow you to easily discover trends in compliance data. For instance, you may remember that about third of your devices were in the installing state yesterday, but this number didn't change as much as you were expecting. That unexpected trend may cause you to investigate and resolve a potential issue before end users are impacted. diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-manage-driver-and-firmware-updates.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-manage-driver-and-firmware-updates.md index f24c59dc87..7393a266de 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-manage-driver-and-firmware-updates.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-manage-driver-and-firmware-updates.md @@ -20,7 +20,10 @@ ms.collection: > [!IMPORTANT] > **This feature will be rolled out when Intune's rollout is complete**. This feature is in **public preview**. The feature is being actively developed, and might not be complete. You can test and use these features in production environments and provide feedback. -We're excited to announce a new feature that gives you greater control over your driver and firmware updates. You can choose to receive driver and firmware updates automatically, or self-manage the deployment. We're building this driver and firmware functionality based on Intune’s release; therefore, you can use both Intune and Windows Autopatch controls together. +You can manage and control your driver and firmware updates with Windows Autopatch. You can choose to receive driver and firmware updates automatically, or self-manage the deployment. + +> [!TIP] +> Windows Autopatch's driver and firmware update management is based on [Intune’s driver and firmware update management](/mem/intune/protect/windows-driver-updates-overview). You can use **both** Intune and Windows Autopatch to manage your driver and firmware updates. ## Automatic and Self-managed modes @@ -28,16 +31,16 @@ Switching the toggle between Automatic and Self-managed modes creates driver pro | Modes | Description | | ----- | -----| -| Automatic | We recommend using **Automatic** mode.

Automatic mode (default) is recommended for organizations with standard Original Equipment Manufacturer (OEM) devices where no recent driver or hardware issues have occurred due to Windows Updates. Automatic mode ensures the best most secure drivers are installed using Autopatch deployment ring rollout.

| -| Self-managed | When you use the the **Self-managed** mode for drivers and firmware, no drivers are installed in your environment without your explicit approval. You can still use Intune to choose specific drivers and deploy them on a ring-by-ring basis.

Self-managed mode turns off Windows Autopatch’s automatic driver deployment. Instead, the Administrator controls the driver deployment.

The Administrator selects the individual drivers within an Intune driver update profile. Then, Autopatch creates an Intune driver update profiles per deployment ring; drivers can vary between deployment rings.

The drivers listed for selection represent only the drivers needed for the targeted clients, which are the Autopatch rings. Therefore, the drivers offered may vary between rings depending on the variety of device hardware in an organization.

| +| Automatic | We recommend using **Automatic** mode.

Automatic mode (default) is recommended for organizations with standard Original Equipment Manufacturer (OEM) devices where no recent driver or hardware issues have occurred due to Windows Updates. Automatic mode ensures the most secure drivers are installed using Autopatch deployment ring rollout.

| +| Self-managed | When you use the the **Self-managed** mode for drivers and firmware, no drivers are installed in your environment without your explicit approval. You can still use Intune to choose specific drivers and deploy them on a ring-by-ring basis.

Self-managed mode turns off Windows Autopatch’s automatic driver deployment. Instead, the Administrator controls the driver deployment.

The Administrator selects the individual driver within an Intune driver update profile. Then, Autopatch creates an Intune driver update profile per deployment ring. Drivers can vary between deployment rings.

The drivers listed for selection represent only the drivers needed for the targeted clients, which are the Autopatch rings. Therefore, the drivers offered may vary between rings depending on the variety of device hardware in an organization.

| -## Set the mode to Automatic or Self-managed mode +## Set driver and firmware updates to Automatic or Self-managed mode -**To set the mode to Automatic or Self-managed:** +**To set driver and firmware updates to Automatic or Self-managed mode:** 1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). 1. Navigate to **Devices** > **Windows Autopatch** > **Release management** > **Release settings**. -1. Find the **Windows Driver Updates** section, read and accept the agreement. +1. In the **Windows Driver Updates** section, read and accept the agreement. 1. Select either **Automatic** or **Self-managed**. ## View driver and firmware policies created by Windows Autopatch diff --git a/windows/hub/breadcrumb/toc.yml b/windows/hub/breadcrumb/toc.yml index 1d2a8a8bd6..66795447f6 100644 --- a/windows/hub/breadcrumb/toc.yml +++ b/windows/hub/breadcrumb/toc.yml @@ -59,9 +59,6 @@ items: - name: OS tocHref: /windows/security/operating-system-security/ topicHref: /windows/security/operating-system-security/ - - name: Network - tocHref: /windows/security/operating-system-security/network-security/ - topicHref: /windows/security/operating-system-security/network-security/ - name: Windows Defender Firewall tocHref: /windows/security/operating-system-security/network-security/windows-firewall/ topicHref: /windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security diff --git a/windows/hub/index.yml b/windows/hub/index.yml index a23387a5f4..4d3e1900ea 100644 --- a/windows/hub/index.yml +++ b/windows/hub/index.yml @@ -73,7 +73,7 @@ productDirectory: text: Windows Defender Credential Guard - url: /windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust text: Windows Hello for Business cloud Kerberos trust - - url: /education/windows/tutorial-school-deployment/windows/security/threat-protection/windows-defender-application-control/ + - url: /windows/security/threat-protection/windows-defender-application-control text: Windows Defender Application Control (WDAC) - url: /windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview text: Microsoft Defender Application Guard