mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #10200 from MicrosoftDocs/revert-10188-wufb-ds-rebrand-091624
Revert "[OOB Publish 09/16 @ 11 AM PDT] WufB-DS rebrand to Windows Autopatch"
This commit is contained in:
commit
fcab767afd
@ -431,7 +431,7 @@ This policy setting determines whether Windows is allowed to download fonts and
|
||||
|
||||
- If you enable this policy setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text.
|
||||
|
||||
- If you disable this policy setting, Windows doesn't connect to an online font provider and only enumerates locally installed fonts.
|
||||
- If you disable this policy setting, Windows doesn't connect to an online font provider and only enumerates locally-installed fonts.
|
||||
|
||||
- If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot.
|
||||
<!-- AllowFontProviders-Description-End -->
|
||||
@ -569,7 +569,7 @@ Specifies whether to allow app access to the Location service. Most restricted v
|
||||
This policy is deprecated and will only work on Windows 10 version 1809. Setting this policy will have no effect for other supported versions of Windows.
|
||||
This policy setting configures a Microsoft Entra joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>.
|
||||
For customers who enroll into the Microsoft Managed Desktop service, enabling this policy is required to allow Microsoft to process data for operational and analytic needs. See <https://go.microsoft.com/fwlink/?linkid=2184944> for more information.
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
hen these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
This setting has no effect on devices unless they're properly enrolled in Microsoft Managed Desktop. If you disable this policy setting, devices may not appear in Microsoft Managed Desktop.
|
||||
<!-- AllowMicrosoftManagedDesktopProcessing-Description-End -->
|
||||
|
||||
@ -888,7 +888,7 @@ To enable this behavior:
|
||||
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
|
||||
If you disable or don't configure this policy setting, devices enrolled to Windows Autopatch won't be able to take advantage of some deployment service features.
|
||||
If you disable or don't configure this policy setting, devices enrolled to the Windows Update for Business deployment service won't be able to take advantage of some deployment service features.
|
||||
<!-- AllowWUfBCloudProcessing-Description-End -->
|
||||
|
||||
<!-- AllowWUfBCloudProcessing-Editable-Begin -->
|
||||
@ -1739,7 +1739,7 @@ This policy setting controls whether Windows records attempts to connect with th
|
||||
|
||||
<!-- FeedbackHubAlwaysSaveDiagnosticsLocally-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Diagnostic files created when feedback is filed in the Feedback Hub app will always be saved locally. If this policy isn't present or set to false, users will be presented with the option to save locally. The default is to not save locally.
|
||||
Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy isn't present or set to false, users will be presented with the option to save locally. The default is to not save locally.
|
||||
<!-- FeedbackHubAlwaysSaveDiagnosticsLocally-Description-End -->
|
||||
|
||||
<!-- FeedbackHubAlwaysSaveDiagnosticsLocally-Editable-Begin -->
|
||||
@ -1761,8 +1761,8 @@ Diagnostic files created when feedback is filed in the Feedback Hub app will alw
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | False. The Feedback Hub won't always save a local copy of diagnostics that may be created when feedback is submitted. The user will have the option to do so. |
|
||||
| 1 | True. The Feedback Hub should always save a local copy of diagnostics that may be created when feedback is submitted. |
|
||||
| 0 (Default) | False. The Feedback Hub won't always save a local copy of diagnostics that may be created when a feedback is submitted. The user will have the option to do so. |
|
||||
| 1 | True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted. |
|
||||
<!-- FeedbackHubAlwaysSaveDiagnosticsLocally-AllowedValues-End -->
|
||||
|
||||
<!-- FeedbackHubAlwaysSaveDiagnosticsLocally-Examples-Begin -->
|
||||
|
@ -109,6 +109,22 @@ items:
|
||||
href: update/waas-wufb-group-policy.md
|
||||
- name: Deploy updates using CSPs and MDM
|
||||
href: update/waas-wufb-csp-mdm.md
|
||||
- name: Windows Update for Business deployment service
|
||||
items:
|
||||
- name: Windows Update for Business deployment service overview
|
||||
href: update/deployment-service-overview.md
|
||||
- name: Prerequisites for Windows Update for Business deployment service
|
||||
href: update/deployment-service-prerequisites.md
|
||||
- name: Deploy updates with the deployment service
|
||||
items:
|
||||
- name: Deploy feature updates using Graph Explorer
|
||||
href: update/deployment-service-feature-updates.md
|
||||
- name: Deploy expedited updates using Graph Explorer
|
||||
href: update/deployment-service-expedited-updates.md
|
||||
- name: Deploy driver and firmware updates using Graph Explorer
|
||||
href: update/deployment-service-drivers.md
|
||||
- name: Troubleshoot Windows Update for Business deployment service
|
||||
href: update/deployment-service-troubleshoot.md
|
||||
- name: Activate
|
||||
items:
|
||||
- name: Windows subscription activation
|
||||
|
@ -27,7 +27,7 @@ The safeguard holds lifespan varies depending on the time required to investigat
|
||||
|
||||
Safeguard holds only affect devices that use the Windows Update service for updates. We encourage IT admins who manage updates to devices through other channels (such as media installations or updates coming from Windows Server Update Services) to remain aware of known issues that might also be present in their environments.
|
||||
|
||||
IT admins managing updates using [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) also benefit from safeguard holds on devices that are likely to be affected by an issue. To learn more, see [Safeguard holds against likely and known issues](/windows/deployment/update/deployment-service-overview#safeguard-holds-against-likely-and-known-issues).
|
||||
IT admins managing updates using the [Windows Update for Business deployment service](/windows/deployment/update/deployment-service-overview) also benefit from safeguard holds on devices that are likely to be affected by an issue. To learn more, see [Safeguard holds against likely and known issues](/windows/deployment/update/deployment-service-overview#safeguard-holds-against-likely-and-known-issues).
|
||||
|
||||
## Am I affected by a safeguard hold?
|
||||
|
||||
|
@ -142,4 +142,4 @@ The following services are part of the Windows Update for Business product famil
|
||||
- Report on devices with update compliance issues
|
||||
- Analyze and display your data in multiple ways
|
||||
|
||||
- [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) is a cloud service designed to work with your existing Windows Update for Business policies. Windows Autopatch provides additional control over the approval, scheduling, and safeguarding of updates delivered from Windows Update to managed devices.
|
||||
- The [Windows Update for Business deployment service](deployment-service-overview.md) is a cloud service designed to work with your existing Windows Update for Business policies and Windows Update for Business reports. The deployment service provides additional control over the approval, scheduling, and safeguarding of updates delivered from Windows Update to managed devices.
|
||||
|
@ -27,6 +27,7 @@ Windows Update for Business reports is a cloud-based solution that provides info
|
||||
|
||||
Some of the benefits of Windows Update for Business reports are:
|
||||
|
||||
- Integration with [Windows Update for Business deployment service](deployment-service-overview.md) to enable per deployment reporting, monitoring, and troubleshooting.
|
||||
- Compatibility with [feature updates](/mem/intune/protect/windows-10-feature-updates) and [Expedite Windows quality updates](/mem/intune/protect/windows-10-expedite-updates) policies in Intune.
|
||||
- A new **Alerts** data type to assist you with identifying devices that encounter issues during the update process. Error code information is provided to help troubleshoot update issues.
|
||||
|
||||
|
@ -27,7 +27,7 @@ Before you begin the process of adding Windows Update for Business reports to yo
|
||||
- Devices can be [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join) or [Microsoft Entra hybrid joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid).
|
||||
- Devices that are [Microsoft Entra registered](/azure/active-directory/devices/concept-azure-ad-register) only (workplace joined) aren't supported with Windows Update for Business reports.
|
||||
- The Log Analytics workspace must be in a [supported region](#log-analytics-regions).
|
||||
- Data in the **Driver update** tab of the [workbook](wufb-reports-workbook.md) is only available for devices that receive driver and firmware updates from [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview).
|
||||
- Data in the **Driver update** tab of the [workbook](wufb-reports-workbook.md) is only available for devices that receive driver and firmware updates from the [Windows Update for Business deployment service](deployment-service-overview.md).
|
||||
|
||||
## Permissions
|
||||
|
||||
|
@ -75,9 +75,9 @@ Compliance status
|
||||
|
||||
|Value | Description |
|
||||
|---|---|
|
||||
| **Compliant** | The latest deployment from Windows Autopatch is installed on the client |
|
||||
| **NotCompliant** | The latest deployment from Windows Autopatch isn't installed on the client|
|
||||
| **NotApplicable** | Client isn't part of any Windows Autopatch deployments |
|
||||
| **Compliant** | The latest deployment from the Windows Update for Business deployment service is installed on the client |
|
||||
| **NotCompliant** | The latest deployment from the Windows Update for Business deployment service isn't installed on the client|
|
||||
| **NotApplicable** | Client isn't part of any Windows Update for Business deployment service deployments |
|
||||
|
||||
## OSServicingChannel
|
||||
|
||||
@ -98,7 +98,7 @@ High-level service state OSServicingChannel
|
||||
|
||||
|Value | Description |
|
||||
|---|---|
|
||||
| **Pending** | Windows Autopatch isn't targeting this update to this device because the update isn't ready. |
|
||||
| **Pending** | Windows Update for Business deployment service isn't targeting this update to this device because the update isn't ready. |
|
||||
| **Offering** | Service is offering the update to the device. The update is available for the device to get if it scans Windows Update. |
|
||||
| **OnHold** | Service is holding off on offering update to the device indefinitely. Until either the service or admin changes some condition, devices remain in this state. |
|
||||
| **Canceled** | Service canceled offering update to the device, and the device is confirmed to not be installing the update. |
|
||||
@ -207,9 +207,9 @@ Type of alert.
|
||||
|
||||
|Value | Description |
|
||||
|---|---|
|
||||
| **ServiceUpdateAlert** | Alert is relevant to Windows Autopatch's offering of the content to the client. |
|
||||
| **ServiceUpdateAlert** | Alert is relevant to Windows Update for Business deployment service's offering of the content to the client. |
|
||||
| **ClientUpdateAlert** | Alert is relevant to client's ability to progress through the installation of the update content. |
|
||||
| **ServiceDeviceAlert** | Alert is relevant to device's status within Windows Autopatch |
|
||||
| **ServiceDeviceAlert** | Alert is relevant to device's status within Windows Update for Business deployment service |
|
||||
| **ClientDeviceAlert** | Alert is relevant to device's state |
|
||||
| **DeploymentAlert** | Alert is relevant to an entire deployment, or a significant number of devices in the deployment. |
|
||||
|
||||
|
@ -39,15 +39,15 @@ UCClient acts as an individual device's record. It contains data such as the cur
|
||||
| **OSBuild** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `10.0.22621.1702` | The full operating system build installed on this device, such as Major.Minor.Build.Revision |
|
||||
| **OSBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | No | `22621` | The major build number, in int format, the device is using. |
|
||||
| **OSEdition** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Professional` | The Windows edition |
|
||||
| **OSFeatureUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Compliant` | Whether the device is on the latest feature update that's offered from Windows Autopatch, else NotApplicable. |
|
||||
| **OSFeatureUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Compliant` | Whether the device is on the latest feature update that's offered from the Windows Update for Business deployment service, else NotApplicable. |
|
||||
| **OSFeatureUpdateEOSTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The end of service date of the feature update currently installed on the device. |
|
||||
| **OSFeatureUpdateReleaseTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The release date of the feature update currently installed on the device. |
|
||||
| **OSFeatureUpdateStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `InService;EndOfService` | Whether the device is on the latest available feature update, for its feature update. |
|
||||
| **OSQualityUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `NotCompliant` | Whether the device is on the latest quality update that's offered from Windows Autopatch, else NotApplicable. |
|
||||
| **OSQualityUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `NotCompliant` | Whether the device is on the latest quality update that's offered from the Windows Update for Business deployment service, else NotApplicable. |
|
||||
| **OSQualityUpdateReleaseTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The release date of the quality update currently installed on the device. |
|
||||
| **OSQualityUpdateStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Latest;NotLatest` | Whether the device is on the latest available quality update, for its feature update. |
|
||||
| **OSRevisionNumber** | [int](/azure/kusto/query/scalar-data-types/int) | No | `836` | The revision, in int format, this device is on. |
|
||||
| **OSSecurityUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `NotCompliant` | Whether the device is on the latest security update (quality update where the Classification=Security) that's offered from Windows Autopatch, else NotApplicable. |
|
||||
| **OSSecurityUpdateComplianceStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `NotCompliant` | Whether the device is on the latest security update (quality update where the Classification=Security) that's offered from the Windows Update for Business deployment service, else NotApplicable. |
|
||||
| **OSSecurityUpdateStatus** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Latest;NotLatest;MultipleSecurityUpdatesMissing` | Whether the device is on the latest available security update, for its feature update. |
|
||||
| **OSServicingChannel** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `SAC` | The elected Windows 10 servicing channel of the device. |
|
||||
| **OSVersion** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `1909` | The Windows 10 operating system version currently installed on the device, such as 19H2, 20H1, 20H2. |
|
||||
|
@ -25,7 +25,7 @@ Update Event that combines the latest client-based data with the latest service-
|
||||
|---|---|---|---|---|
|
||||
| **AzureADDeviceId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Microsoft Entra Device ID |
|
||||
| **AzureADTenantId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Microsoft Entra tenant ID |
|
||||
| **CatalogId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Autopatch. |
|
||||
| **CatalogId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Update for Business deployment service. |
|
||||
| **ClientState** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `Installing` | This field applies to drivers only. Higher-level bucket of ClientSubstate. |
|
||||
| **ClientSubstate** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `DownloadStart` | Last-known state of this update relative to the device, from the client. |
|
||||
| **ClientSubstateRank** | [int](/azure/kusto/query/scalar-data-types/int) | No | `2300` | Ranking of client substates for sequential ordering in funnel-type views. The rankings between ServiceSubstate and ClientSubstate can be used together. |
|
||||
|
@ -16,7 +16,7 @@ ms.date: 12/06/2023
|
||||
|
||||
# UCDeviceAlert
|
||||
<!--37063317, 30141258, 37063041-->
|
||||
These alerts are activated as a result of an issue that is device-specific. It isn't specific to the combination of a specific update and a specific device. Like UpdateAlerts, the AlertType indicates where the Alert comes from (ServiceDeviceAlert, ClientDeviceAlert). For example, an EndOfService alert is a ClientDeviceAlert, as a build no longer being serviced (EOS) is a client-wide state. Meanwhile, DeviceRegistrationIssues in Windows Autopatch will be a ServiceDeviceAlert, as it's a device-wide state in the service to not be correctly registered.
|
||||
These alerts are activated as a result of an issue that is device-specific. It isn't specific to the combination of a specific update and a specific device. Like UpdateAlerts, the AlertType indicates where the Alert comes from (ServiceDeviceAlert, ClientDeviceAlert). For example, an EndOfService alert is a ClientDeviceAlert, as a build no longer being serviced (EOS) is a client-wide state. Meanwhile, DeviceRegistrationIssues in the Windows Update for Business deployment service will be a ServiceDeviceAlert, as it's a device-wide state in the service to not be correctly registered.
|
||||
|
||||
## Schema for UCDeviceAlert
|
||||
<!--8506381-->
|
||||
|
@ -24,7 +24,7 @@ Update Event that comes directly from the service-side. The event has only servi
|
||||
|---|---|---|---|---|
|
||||
| **AzureADDeviceId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Microsoft Entra Device ID |
|
||||
| **AzureADTenantId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Microsoft Entra tenant ID |
|
||||
| **CatalogId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Autopatch. |
|
||||
| **CatalogId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Update for Business deployment service. |
|
||||
| **DeploymentApprovedTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | This field applies to drivers only. Date and time of the update approval |
|
||||
| **DeploymentId** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `cf1b12a3-3d84-4ce3-bc8e-de48459e252d` | If this DeviceUpdateEvent is from content deployed by a deployment scheduler service policy, this GUID maps to that policy, otherwise it's empty. |
|
||||
| **DeploymentIsExpedited** | [bool](/azure/data-explorer/kusto/query/scalar-data-types/bool) | No | `1` | Currently, data isn't gathered to populate this field. It indicated whether the content is being expedited |
|
||||
|
@ -31,7 +31,7 @@ Alert for both client and service updates. Contains information that needs atten
|
||||
| **AlertType** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `ClientUpdateAlert` | The type of alert such as ClientUpdateAlert or ServiceUpdateAlert. Indicates which fields are present. |
|
||||
| **AzureADDeviceId** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `71db1a1a-f1a6-4a25-b88f-79c2f513dae0` | Microsoft Entra Device ID |
|
||||
| **AzureADTenantId** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `69ca04b0-703d-4b3a-9184-c4e3c15d6f5e` | Microsoft Entra tenant ID |
|
||||
| **CatalogId** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Autopatch. |
|
||||
| **CatalogId** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `b0f410599615e2ce15e6614ac3fc4ec62d80324020351e172edef89091a64f2f` | This field applies to drivers only. The Catalog ID of the update from Windows Update for Business deployment service. |
|
||||
| **ClientSubstate** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `DownloadStart` | If the alert is from the client, the ClientSubstate at the time this alert was activated or updated, else empty. |
|
||||
| **ClientSubstateRank** |[int](/azure/kusto/query/scalar-data-types/int) | No | `2300` | Rank of ClientSubstate |
|
||||
| **DeploymentId** |[string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `cf1b12a3-3d84-4ce3-bc8e-de48459e252d` | The deployment this alert is relative to, if there's one. |
|
||||
|
@ -75,7 +75,7 @@ The **Quality updates** tab displays generalized data at the top by using tiles.
|
||||
| **Missing one security update** | Count of devices that haven't installed the latest security update.| - Select **View details** to display a flyout with a chart that displays the first 1000 items. </br> - Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial).|
|
||||
| **Missing multiple security updates** | Count of devices that are missing two or more security updates. | - Select **View details** to display a flyout with a chart that displays the first 1000 items. </br> - Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial). |
|
||||
| **Active alerts** | Count of active update and device alerts for quality updates. | |
|
||||
| **Expedite status** | Overview of the progress for the expedited deployments of the latest security update. | Select **View details** to display a flyout with two tabs: **Deployments** and **Readiness** </br> </br> - The **Deployments** tab contains a chart that displays the total progress of each deployment, number of alerts, and count of devices. <ul><li> Select the count from the **Alerts** column to display the alerts, by name, for the deployment. Selecting the device count for the alert name displays a list of devices with the alert.</li><li> Select the count in the **TotalDevices** column to display a list of clients and their information for the deployment. <!--7626683--> </li></ul> </br> - The **Readiness** tab contains a chart that displays the number of devices that are **Eligible** and **Ineligible** to install expedited updates. The **Readiness** tab also contains a table listing the deployments for expedited updates. <!--8682382--> <ul><li> Select the count from the **Alerts** column to display devices with a status of **RegistrationMissingUpdateClient**, which means the device is missing the Update Health Tools. The Update Health Tools are installed starting with [KB4023057](https://support.microsoft.com/kb/4023057) or from a [stand-alone package from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=103324). Example PowerShell script to verify tools installation: `Get-CimInstance -ClassName Win32_Product \| Where-Object {$_.Name -match "Microsoft Update Health Tools"}` </li><li> Select the count of **TotalDevices** to display a list of devices in the deployment. <!--8682382-->|
|
||||
| **Expedite status** | Overview of the progress for the expedited deployments of the latest security update. | Select **View details** to display a flyout with two tabs: **Deployments** and **Readiness** </br> </br> - The **Deployments** tab contins a chart that displays the total progress of each deployment, number of alerts, and count of devices. <ul><li> Select the count from the **Alerts** column to display the alerts, by name, for the deployment. Selecting the device count for the alert name displays a list of devices with the alert.</li><li> Select the count in the **TotalDevices** column to display a list of clients and their information for the deployment. <!--7626683--> </li></ul> </br> - The **Readiness** tab contains a chart that displays the number of devices that are **Eligible** and **Ineligible** to install expedited udpates. The **Readiness** tab also contains a table listing the deployments for expedited updates. <!--8682382--> <ul><li> Select the count from the **Alerts** column to display devices with a status of **RegistrationMissingUpdateClient**, which means the device is missing the Update Health Tools. The Update Health Tools are installed starting with [KB4023057](https://support.microsoft.com/kb/4023057) or from a [stand-alone package from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=103324). Example PowerShell script to verify tools installation: `Get-CimInstance -ClassName Win32_Product \| Where-Object {$_.Name -match "Microsoft Update Health Tools"}` </li><li> Select the count of **TotalDevices** to display a list of devices in the deployment. <!--8682382-->|
|
||||
|
||||
Below the tiles, the **Quality updates** tab is subdivided into **Update status** and **Device status** groups. These different chart groups allow you to easily discover trends in compliance data. For instance, you may remember that about third of your devices were in the installing state yesterday, but this number didn't change as much as you were expecting. That unexpected trend may cause you to investigate and resolve a potential issue before end users are impacted.
|
||||
|
||||
@ -142,11 +142,11 @@ The **Device status** group for feature updates contains the following items:
|
||||
|
||||
## Driver updates tab
|
||||
|
||||
The **Driver update** tab provides information on driver and firmware update deployments from [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview). Generalized data is at the top of the page in tiles. The data becomes more specific as you navigate lower in this tab. The top of the driver updates tab contains tiles with the following information:
|
||||
The **Driver update** tab provides information on driver and firmware update deployments from [Windows Update for Business deployment service](deployment-service-overview.md). Generalized data is at the top of the page in tiles. The data becomes more specific as you navigate lower in this tab. The top of the driver updates tab contains tiles with the following information:
|
||||
|
||||
**Devices taking driver updates**: Count of devices that are installing driver and firmware updates.
|
||||
**Approved updates**: Count of approved driver updates
|
||||
**Total policies**: The total number of deployment polices for driver and firmware updates from [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview)
|
||||
**Total policies**: The total number of deployment polices for driver and firmware updates from [Windows Update for Business deployment service](deployment-service-overview.md)
|
||||
**Active alerts**: Count of active alerts for driver deployments
|
||||
|
||||
Selecting **View details** on any of the tiles displays a flyout with a chart that displays the first 1000 items. Select `...` from the flyout to export the full list, or display the query in [Log Analytics](/azure/azure-monitor/logs/log-analytics-tutorial).
|
||||
@ -199,7 +199,7 @@ Updates can go though many phases from when they're initially deployed to being
|
||||
- **Offering**: The update is being offered to the device for installation
|
||||
- **Installing**: The update is in the process of being installed on the device
|
||||
- **Installed**: The update has been installed on the device
|
||||
- **Canceled**: The update was canceled from the [deployment service](deployment-service-overview.md) before it was installed
|
||||
- **Cancelled**: The update was cancelled from the [deployment service](deployment-service-overview.md) before it was installed
|
||||
- **Uninstalled**: The update was uninstalled from the device by either an admin or a user
|
||||
- **OnHold**: The update was put on hold from the [deployment service](deployment-service-overview.md) before it was installed
|
||||
- **Unknown**: This state occurs when there's a record for the device in the [UCClient](wufb-reports-schema-ucclient.md) table, but there isn't a record for the specific update for the specific device in the [UCClientUpdateStatus](wufb-reports-schema-ucclientupdatestatus.md) table. This means that there is no record of the update for the device in question.
|
||||
|
@ -353,6 +353,7 @@ From a compliance standpoint, this change means that Microsoft will be the proce
|
||||
For Windows devices with diagnostic data turned on and that are joined to an [Azure AD tenant with billing address](/azure/cost-management-billing/manage/change-azure-account-profile) outside of the EU and EFTA, to enable the processor configuration option, the organization must sign up for any of the following enterprise services, which rely on diagnostic data:
|
||||
|
||||
- [Windows Update for Business reports](/windows/deployment/update/wufb-reports-overview)
|
||||
- [Windows Update for Business deployment service](/windows/deployment/update/deployment-service-overview)
|
||||
- [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview)
|
||||
- [Windows updates reports (in Microsoft Intune)](/mem/intune/protect/data-enable-windows-data#windows-data)
|
||||
|
||||
|
@ -44,7 +44,7 @@ The tools that you use for core workloads during Windows 10 deployments can stil
|
||||
|
||||
### Cloud-based solutions
|
||||
|
||||
- If you use [Windows Update for Business](/windows/deployment/update/waas-manage-updates-wufb) policies, you need to use the **Target Version** capability. This option is either through policy or [Windows Autopatch](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview). You need to use this option instead of only using feature update deferrals to upgrade from Windows 10 to Windows 11. Feature update deferrals are great for moving to newer versions of your current product. For example, Windows 10, version 21H2 to version 22H2. They don't automatically move devices between products, for example Windows 10 to Windows 11.
|
||||
- If you use [Windows Update for Business](/windows/deployment/update/waas-manage-updates-wufb) policies, you need to use the **Target Version** capability. This option is either through policy or the Windows Update for Business deployment service. You need to use this option instead of only using feature update deferrals to upgrade from Windows 10 to Windows 11. Feature update deferrals are great for moving to newer versions of your current product. For example, Windows 10, version 21H2 to version 22H2. They don't automatically move devices between products, for example Windows 10 to Windows 11.
|
||||
|
||||
- If you use [Microsoft Intune](/mem/intune/) and have a Microsoft 365 E3 license, use the [feature update deployments](/mem/intune/protect/windows-10-feature-updates) page to select the latest version of Windows 11 and upgrade Windows 10 devices to Windows 11. You can also continue using the same update experience controls to manage Windows 10 and Windows 11 on the **Update Rings** page in Intune. If you aren't ready to move to Windows 11, keep the feature update version set at the version you're currently on. When you're ready to start upgrading devices, change the feature update deployment setting to specify Windows 11.
|
||||
|
||||
|
@ -83,6 +83,7 @@ The following table describes the unique Windows Enterprise cloud-based features
|
||||
|-|-|
|
||||
|**[Windows subscription activation][WIN-5]**|Enables you to *step-up* from **Windows Pro edition** to **Enterprise edition**. You can eliminate license key management and the deployment of Enterprise edition images.|
|
||||
|**[Windows Autopatch][WIN-6]**|Cloud service that puts Microsoft in control of automating updates to Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams.|
|
||||
|**[Windows Update For Business deployment service][WIN-7]**|This cloud service gives you the control over the approval, scheduling, and safeguarding of quality, feature upgrades, and driver updates delivered from Windows Update.|
|
||||
|**[Universal Print][UP-1]**|Removes the need for on-premises print servers and enables any endpoint to print to cloud registered printers.|
|
||||
|**[Microsoft Connected Cache][WIN-8]**|A software solution that caches app and OS updates on the local network to save Internet bandwidth in locations with limited connectivity.|
|
||||
|**[Endpoint analytics proactive remediation][MEM-1]**|Helps you fix common support issues before end-users notice them.|
|
||||
@ -154,6 +155,7 @@ The following table lists the Windows 11 Enterprise cloud-based features and the
|
||||
|-|-|-|
|
||||
|**[Windows subscription activation][WIN-5]**|Yes|Yes|
|
||||
|**[Windows Autopatch][WIN-6]**|Yes|Yes|
|
||||
|**[Windows Update For Business deployment service][WIN-7]**|Yes|Yes|
|
||||
|**[Universal Print][UP-1]**|Yes|Yes|
|
||||
|**[Microsoft Connected Cache][WIN-8]**|Yes|Yes|
|
||||
|**[Endpoint analytics proactive remediation][MEM-1]**|Yes|Yes|
|
||||
|
Loading…
x
Reference in New Issue
Block a user